The Role of Databases and Database Management Systems in information management

This article differentiates between a database and a database management system.It also gives type of databases used by organisations such as centralised and distributed databases.Hirachichal,relational and the network databases are also explained.The article further explaines the uses of a database management system.A full text of this article is 1024 words 5 pages long.
In managing information, organizations are moving from file management systems to a better and efficient database management system. In this paper the author is going to differentiate between a database and a database management system [DBMS] and fully explain the types of databases used in various organizations.

A database is a collection of organized data with easy access and preserved over a long period, or a collection of interrelated data. Turban[2003:131]defines a database as a ''collection of related files, and where those related files can greatly affect user accessibility, query response times, data entry, security, and cost''. A database consolidates records previously stored in separate files so that a common pool of data records serves as a single central file or database for many data processing applications.

O''brian considers the following points as reasons for database processing. He says databases helps in eliminating data redundancy because independent data files include a lot of duplicated data. Secondly databases integrate data stored in a computer .Data can also be accessed faster from any point within the organization and users can access different portions of databases concurrently.

A database can be centralized or distributed. A centralized database has all the related files in one physical location. A decentralized database has complete copies of a database, in more than one location. There are two types of decentralized databases: replicated and partitioned-Turban [2003:132]. A replicate database has complete copies of the entire database in many locations, primarily to alleviate the single-point-of-failure problems of a centralized database as well as to increase user access responsiveness. A partitioned data base is subdivided, so that each location has a portion of the entire database.

A database management system controls all use of the databases of a computer using organization. It works in conjunction with the data management control programs of the operating system which are primarily concerned with physical input, output, and storage of data during processing.
The software program [or group of programs] as a database
management system [DBMS].The [DBMS] permits an organization to
store data in one location, from which it can be updated and
retrieved, and it provides access to the stored data by various
application programs. The DBMs also provides mechanisms for
maintaining the integrity of stored information, managing security
user access, recovering information when the system fails, and
accessing various database functions from within an application
written in a third generation, fourth generation, or object-oriented
language. The DBMS provides users with tools to add, delete,
maintain, display, print, search, and upgrade data.
Turban [2003:136] Introduction to Information Technology.
A DBMS removes the database from the control of individual programmers and computer users and places responsibility for it in the hands of the database administrator. This improves the integrity and security of the database.

There are three major types of data bases used in different organizations, namely the hierarchical structure, network structure, and the relational structure.

In the hierarchical structure, the relationship between records forms a hierarchy or tree structures. In this structure, all records are dependent and arranged in multi-level structures consisting of one root record and any number of subordinate levels. Thus, all of the relationships between records are one-to-many, since each data element is related to several records below it, but only one data element above it. The data elements or records at the highest level of the hierarchy is called the root and is the point of entry into the hierarchy. Data elements are stored and located by moving progressively downward from a root and along the branches of the tree until the desire record is located.

The advantage of a hierarchical database approach is the speed and efficiency with which it can be searched for data. This speed is possible because so much of the database is eliminated in the search with each ''turn'' going down the tree.

The second type of a database is the Network database. This type of a database views all records as sets. Each set is composed of an owner record and one or more member records. The network implements the one-to-many record structure. Unlike hierarchical data structures that require specific entrance points to find records in a hierarchy, network data structure can be entered and traversed more flexible.

The third type of a database is the relational model. It was developed in an attempt to simplify the representation of complex relationships between data elements within the database are viewed as being stored in the form of simple tables. Tables allow quick comparisons by row and column, and items are easy to retrieve by finding the point of intersection of a particular row and column.

In a relational database, these tables are called relations, and the model is based upon the mathematical theory of sets and relations. In this model, each row of data is equivalent to a record, and each column of data is equivalent to a field. In the relational model terminology, a row is called a tuple , and a column is called an attribute. The relational model is currently the most popular of the three common database structures because it provides the most flexibility and ease of use.

A database coupled with the database management system, can eliminate many of the problems associated with traditional file environment. Therefore, data redundancy, data isolation, and data inconsistency are minimized, and data can be shared among all users in the organization.

Bibliography
1 -Turban ''Introduction to information technology 2nd Ed'' 2003 John Willey & Sons
2- O''Brien ''Information Science Systems for You'' 2003
3-Barata Kimberly, ''Understanding Computers: An Overview for Records and Archives Staff'' '' IRMT 1999.
4-White, ''How Computers Work,How it Works Series'' Emeryville 1998
5-Parsons ''Computer Concepts'' Cambridge 1999

Etiwel Mutero holds a Bsc Honours Degree in Records and Archives Management through the Zimbabwe Open University.To order a full text of this article contact Etiwel on His Mobile phone +263773614293 or etiwelm02@gmail.com

Comments

  1. Hi! I am a digital marketer. The previous seo guy working for my client left a spammy comment at your blog with the username Janice Rafael which links to my client's site.
    Such comments are or might cause serious damage to my client's site with respect to SEO which is why I am request you here by to remove it asap.
    If you don't remove it by 12:00 am, Pacific Standard Time, 2nd January 2014, we will have use Google's Disavow Tool to get back-link removed and, sorry to say this, but Google may not look too nicely upon you either for not having removed the comment. Thanks in advance for your cooperation.

    ReplyDelete
    Replies
    1. Thanks man for contacting and for notifying me on your concerns.What I am made to understand is you are threatening me and not asking or requesting me to remove the comment.While I am willing to cooperate with your request,it is your tone or your language which you used in your "request". Your language sounds as if I am responsible for your workmate"s behavior or I am guilty of posting that comment.I never posted that comment on my blog and I don't even know the person who posted that comment,mine was only to create a blog and posting my articles there.Instead of threatening me, you must sort your squabbles with your employee or workmate whatever.However,I normally entertain polite requests.Thank you.

      Delete
    2. As soon as I receive a humble and polite request I will remove the comment.Thank you

      Delete
    3. There might be some misunderstanding. I never meant to be threatening and I apologize if I come across this way. If you look at my message you will see that I have used the word request multiple times. As for the google's penatly, its not a threat; it would have been a threat if I was a google executive and telling you that i am to impose the penalty. I only informed you that if you dont remove the link google wont look too nicely on you either. If you dont want to remove the link coz you find me threatening, then dont but then google penalizing you would be your responsibility. I have done my duty by sending the request and informing you. I hope that you will remove the link and my comments so that both you and my client can avoid a possible threat (from google). Thanks and all the best.

      Delete
  2. I like that kind of information, not only i like that post all peoples like that post, because of all given information was very excellent.
    Document Management Software
    Electronic Document Management System
    Cloud Document Management System
    Document Management System
    Electronic Document Management Software

    ReplyDelete
  3. You made such an interesting piece to read, giving every subject enlightenment for us to gain knowledge. Thanks for sharing the such information with us to read this... Marketing email sender tools blasting services

    ReplyDelete
  4. Kms Knowledge management system Thank you because you have been willing to share information with us. we will always appreciate all you have done here because I know you are very concerned with our.

    ReplyDelete

Post a Comment

Popular posts from this blog

Integrated Records Management

Causes of Archives and Records Deterioration and Their Methods of Control

Compare and contrast Maslow’s Hierarchy of needs with Herzberg’s Two Factor Theory.