Database Administration Database Management System Term Paper

By grouping related database queries into transactions, DBMS systems can guarantee that each transaction satisfies the ACID properties: Atomicity, Consistency, Isolation, and Durability. However, if a database application is decomposed into transactions in an incorrect manner, the application may fail when executed concurrently. Concurrency control deals with the issues involved with allowing multiple people simultaneous access to shared entities (Ambler, 2004). A collision occurs when two activities, which may or may not be full-fledged transactions, attempt to change entities within a system of record. A database administrator can either devise ways to avoid collisions or detect and then resolve them. Transactions are collections of actions that potentially modify two or more entities. The easiest way for an application to implement transactions is to use the features supplied by the database. Transactions can be started, attempted, then committed or aborted via SQL code. Also, database APIs such as Java Database Connectivity and Open Database Connectivity provide classes that support basic transactional functionality.

...

Responsibilities include designing, implementing, and maintaining the database system. The DBA also establishes policies and procedures pertaining to the management, maintenance, and use of the DBMS such as security and concurrency control discussed in this paper.
Bibliography

Ambler, S. (2004, April 1). Concurrency Control. Retrieved November 27, 2004 from Agile Data Web site: http://www.agiledata.org/essays/concurrencyControl.html#Collisions

Database Administrator. Retrieved November 27, 2004 from TechTarget Web site: http://searchdatabase.techtarget.com/sDefinition/0,sid13_gci214169,00.html

Database Management System. Retrieved November 27, 2004 from TechTarget Web site: http://searchdatabase.techtarget.com/sDefinition/0,sid13_gci213669,00.html

Database Security and Administration (2001). Retrieved November 27, 04 from Web site: http://www.urgrgcc.edu/shastri/.%5CDatabase%20Course%5Cdb1-2a.htm

Sources Used in Documents:

Bibliography

Ambler, S. (2004, April 1). Concurrency Control. Retrieved November 27, 2004 from Agile Data Web site: http://www.agiledata.org/essays/concurrencyControl.html#Collisions

Database Administrator. Retrieved November 27, 2004 from TechTarget Web site: http://searchdatabase.techtarget.com/sDefinition/0,sid13_gci214169,00.html

Database Management System. Retrieved November 27, 2004 from TechTarget Web site: http://searchdatabase.techtarget.com/sDefinition/0,sid13_gci213669,00.html

Database Security and Administration (2001). Retrieved November 27, 04 from Web site: http://www.urgrgcc.edu/shastri/.%5CDatabase%20Course%5Cdb1-2a.htm


Cite this Document:

"Database Administration Database Management System" (2004, November 28) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/database-administration-database-management-60046

"Database Administration Database Management System" 28 November 2004. Web.26 April. 2024. <
https://www.paperdue.com/essay/database-administration-database-management-60046>

"Database Administration Database Management System", 28 November 2004, Accessed.26 April. 2024,
https://www.paperdue.com/essay/database-administration-database-management-60046

Related Documents

Hence, along with database security, it is important that the operating system is also secured from unauthorized access. Data Security Policy There are instances when not all information in a database is open for access to a user. Hence, there is the data security policy that controls the level of access a user has. According to Oracle Corporation Online, Data security includes the mechanisms that control the access and use of the

Another factor in open source database vendors leading this area is the focus on multiple models for scalability as can be seen in Table 1: DBMS Features Analysis. The support of multiple models of scalability also concentrates on OLTP transaction integration specifically within roles as defined in the security model (Pereira, Muppavarapu, Chung, 2006). Security will be discussed later in this analysis. The second factor used to evaluate closed source

management system (DBMS) is a program that provides the user with access to the data and also helps them in transforming their raw data into meaningful information. The database management system (DBMS) is therefore a collection of programs that helps in the management of data structure as well as in the control of access to the data that is stored in the database. The DBMS systems help users in

AMR Research (2005) believes that companies must begin developing and redeploying current order management architectures with the focus on delivering more flexibility rather than a strategy that delivers far less. The move toward customer-driven fulfillment processes requires the ability to build and adapt channel-specific, product-specific, and customer-specific order flows quickly without an army of developers creating custom code. However, the days of big bang, rip-and-replace implementations are over, and any

Design criteria exist at the levels of the technical, system integration aspects of the database to other systems through XML. This integration is critically important to ensure that the applications created can be effectively used over time and not have any scalability issues. There is also the need for designing the databases at the presentation layer to provide for scalability and flexibility of being able to create applications relatively quickly

These personal productivity systems also tend to be islands of customer data that need to be integrated into larger customer information systems to be effective (Zahay, 2008). Enterprise-class DBMS are capable of integrating to broader process workflows due to their underlying technical design. In addition, these DBMS are often used for more advanced customer strategies including data mining, business analytics of customer bases, and the development of long-term loyalty