16.8k views
5 votes
Enlist:

a) Factors that should be in mind of physical designer during selection of data type for an attribute.
b) Ways to enhance integrity of a database
c) Advantages of DBMS approach.
d) Disadvantages of File-based system approach.
e) Functions of DBMS.

User Fisherman
by
7.7k points

1 Answer

2 votes

Final answer:

Physical designers must factor in data nature and storage efficiency when selecting data types. Enhancing database integrity involves using constraints, triggers, audits, and access controls. A DBMS offers advantages like data integrity and security, while file-based systems may suffer from redundancy and poor security.

Step-by-step explanation:

Factors in Selection of Data Types for Attributes

When a physical designer is selecting a data type for an attribute, they should consider the following factors:

  • The nature of the data being stored.
  • Storage efficiency and how much space the data type requires.
  • Performance in terms of how quickly data can be retrieved and processed.
  • Compatibility with other systems that may interact with the database.
  • The potential for future data type modifications as the system evolves.



Ways to Enhance Database Integrity

  • Implement constraints such as primary keys, foreign keys, unique constraints, and check constraints.
  • Use triggers and stored procedures to maintain consistency.
  • Regular audits and data validation.
  • Apply access controls to restrict unauthorized data manipulation.



Advantages of DBMS Approach

  • Data consistency and integrity.
  • Improved data sharing and accessibility.
  • Increased data security.
  • Efficient data management through abstraction and encapsulation.



Disadvantages of File-Based System Approach

  • Data redundancy and inconsistency.
  • Lack of scalability.
  • Difficulties with data sharing and concurrent access.
  • Poor data security.



Functions of DBMS

  • Data storage management.
  • Data retrieval and manipulation.
  • Transaction management and concurrency control.
  • Backup and recovery mechanisms.
  • Access control and security enforcement.

User Chris Summers
by
7.8k points