What are the advantage of database approach over the traditional file system?
The database approach emphasizes the integration & sharing of data throughout the organization. The database approach offers a number of potential advantages compared to the traditional file processing system. Some advantages of the database approach are as follows: Show
Reference:
Admin A Database Management System (DBMS) is defined as the software system that allows users to define, create, maintain and control access to the database. DBMS makes it possible for end users to create, read, update and delete data in database. It is a layer between programs and data. Compared to the File Based Data Management System, Database Management System has many advantages. Some of these advantages are given below − Reducing Data RedundancyThe file based data management systems contained multiple files that were stored in many different locations in a system or even across multiple systems. Because of this, there were sometimes multiple copies of the same file which lead to data redundancy. This is prevented in a database as there is a single database and any change in it is reflected immediately. Because of this, there is no chance of encountering duplicate data. Sharing of DataIn a database, the users of the database can share the data among themselves. There are various levels of authorisation to access the data, and consequently the data can only be shared based on the correct authorisation protocols being followed. Many remote users can also access the database simultaneously and share the data between themselves. Data IntegrityData integrity means that the data is accurate and consistent in the database. Data Integrity is very important as there are multiple databases in a DBMS. All of these databases contain data that is visible to multiple users. So it is necessary to ensure that the data is correct and consistent in all the databases and for all the users. Data SecurityData Security is vital concept in a database. Only authorised users should be allowed to access the database and their identity should be authenticated using a username and password. Unauthorised users should not be allowed to access the database under any circumstances as it violates the integrity constraints. PrivacyThe privacy rule in a database means only the authorized users can access a database according to its privacy constraints. There are levels of database access and a user can only view the data he is allowed to. For example - In social networking sites, access constraints are different for different accounts a user may want to access. Backup and RecoveryDatabase Management System automatically takes care of backup and recovery. The users don't need to backup data periodically because this is taken care of by the DBMS. Moreover, it also restores the database after a crash or system failure to its previous condition. Data ConsistencyData consistency is ensured in a database because there is no data redundancy. All data appears consistently across the database and the data is same for all the users viewing the database. Moreover, any changes made to the database are immediately reflected to all the users and there is no data inconsistency. What are the 10 advantages of database approach?Advantages of Database Management System. Data Integrity. Data integrity means data is consistent and accurate in the database. ... . Data Security. Data security is a vital concept in a database. ... . Better data integration. ... . Minimized Data Inconsistency. ... . Faster Data Access. ... . Better decision making. ... . Simplicity. ... . Recovery and Backup.. Why database is better than traditional file system?DBMS provides data independence. File systems allow only one user to access data at a time. Data can be accessed simultaneously by multiple users in a DBMS. A file system provides less security than a database management system.
What are the other benefits of using a DBMS over a traditional file processing systems?Welcome back.. Introduction.. Advantages of DBMS over file system.. i. Redundancy can be reduced:. ii. Inconsistency can be avoided:. iii. Reduced programming effort:. iv. Security can be enforced:. v. Integrity can be maintained:. |