You are on page 1of 4

What are the disadvantages of flat-file system

Databases accessed on a network share are useful for access by many people who
are looking for information. Flat file databases are not usually accessed like this
since they belong with offline entities and form the machinery of operating systems
and local devices. Also, there are no transactions in a flat file database, so it is
limited in what it can actually do as a database entity. So a flat file database is
disadvantageous to a network user, who is accessing a multi-access, multi-tasking
relational online database which can be viewed from many different aspects.
What are different database constraints ?
Databases accessed on a network share are useful for access by many people who
are looking for information. Flat file databases are not usually accessed like this
since they belong with offline entities and form the machinery of operating systems
and local devices. Also, there are no transactions in a flat file database, so it is
limited in what it can actually do as a database entity. So a flat file database is
disadvantageous to a network user, who is accessing a multi-access, multi-tasking
relational online database which can be viewed from many different aspects.

Less security easy to extract information.

Data Inconsistency

Redundancy

Sharing of information is cumbersome task

Slow for huge database

Searching process is time consuming

They can suffer from data redundancy duplication of data.

There is a problem with data integrity if a patient moves house you would have
the old records with the old address which could cause confusion.

Tedious job to track duplicate records in Flat file database

Records in the database cannot be updated

No data security

Cannot handle huge database


What are different database constraints ?

In SQL, we have the following constraints:

NOT NULL - Indicates that a column cannot store NULL value

UNIQUE - Ensures that each row for a column must have a unique value

PRIMARY KEY - A combination of a NOT NULL and UNIQUE. Ensures that a column
(or combination of two or more columns) have a unique identity which helps to find a
particular record in a table more easily and quickly

FOREIGN KEY - Ensure the referential integrity of the data in one table to match
values in another table

CHECK - Ensures that the value in a column meets a specific condition

DEFAULT - Specifies a default value for a column

Constraints are part of a database schema definition.


A constraint is usually associated with a table and is created with a CREATE CONSTRAINT or
CREATE ASSERTION SQL statement.
They define certain properties that data in a database must comply with. They can apply to a
column, a whole table, more than one table or an entire schema. A reliable database system
ensures that constraints hold at all times (except possibly inside a transaction, for so called
deferred constraints).
Common kinds of constraints are:

not null - each value in a column must not be NULL

unique - value(s) in specified column(s) must be unique for each row in a table

primary key - value(s) in specified column(s) must be unique for each row in a table and
not be NULL; normally each table in a database should have a primary key - it is used to
identify individual records

foreign key - value(s) in specified column(s) must reference an existing record in another
table (via it's primary key or some other unique constraint)

check - an expression is specified, which must evaluate to true for constraint to be


satisfied

Explain the DBMS architecture in detail

The design of a DBMS depends on its architecture. It can be centralized or


decentralized or hierarchical. The architecture of a DBMS can be seen as either
single tier or multi-tier. An n-tier architecture divides the whole system into related
but independent n modules, which can be independently modified, altered,
changed, or replaced.

In 1-tier architecture, the DBMS is the only entity where the user directly sits on the
DBMS and uses it. Any changes done here will directly be done on the DBMS itself. It
does not provide handy tools for end-users. Database designers and programmers
normally prefer to use single-tier architecture.

If the architecture of DBMS is 2-tier, then it must have an application through which
the DBMS can be accessed. Programmers use 2-tier architecture where they access
the DBMS by means of an application. Here the application tier is entirely
independent of the database in terms of operation, design, and programming.
3-tier Architecture

A 3-tier architecture separates its tiers from each other based on the complexity of
the users and how they use the data present in the database. It is the most widely
used architecture to design a DBMS.

Database (Data) Tier At this tier, the database resides along with its query
processing languages. We also have the relations that define the data and their
constraints at this level.

Application (Middle) Tier At this tier reside the application server and the
programs that access the database. For a user, this application tier presents an
abstracted view of the database. End-users are unaware of any existence of the
database beyond the application. At the other end, the database tier is not aware of
any other user beyond the application tier. Hence, the application layer sits in the
middle and acts as a mediator between the end-user and the database.

User (Presentation) Tier End-users operate on this tier and they know nothing
about any existence of the database beyond this layer. At this layer, multiple views
of the database can be provided by the application. All views are generated by
applications that reside in the application tier.

Multiple-tier database architecture is highly modifiable, as almost all its components


are independent and can be changed independently.

You might also like