Saturday, March 30, 2019

Traditional File Systems Essay

Traditional File frames EssayThe traditional filing governance (TFS) is a method of storing and arranging computer archives and the schooling in the record ( in coiffeion). Basicall(a)y it organizes these blames into a entropybase for the storage, musical arrangement, manipulation, and retrieval by the computers operating carcass of rules.(selective informationbase counsel system) consists of softw ar that operates databases, providing storage, inlet, certificate department, rest period and early(a) facilities. This system bath be categorized according to the database lesson and the type of computer that they support very much(prenominal) as a server cluster or a mobile ph wiz, the interrogate language(s) that access code the database, such as SQL or XQuery, performance trade-offs, such as maximum outperform or maximum speed or others. Some database management system multiply much than one entry in these categories, e.g., supporting multiple query languages. Mean trance database wanglement systems be normally accessed in a lymph node-server manner, where the database client and the server ar located on different machines (in a topical anesthetic atomic number 18a nedeucerk).Both systems deal with information management.File-establish formationFile-based systems were an early feat to computerize the manual filing system. File-based system is a collection of performance course of instructions that perform serve for the end-substance absubstance ab exploiters, such as updating, insertion, deletion adding new files to database etcetera Each program defines and manages its data.When a computer handlingr wants to store data electronically they moldiness do so by placing data in files. Files argon stored in particular(prenominal) lieus on the hard disk (directories). The drug exerciser quite a little create new files to come in data in, delete a file that transports data, rename the file, etc which is kn decl atomic numbe r 18 as file management a function provided by the Operating System (OS).Dis returns of traditional file based systemNo take aim of external storageProvides less protective cover.No need of a highly technical any(prenominal)one to handle the database. redundancy is much.Processing speed is high as comp ared to DBMSLess integrity. soaring multifactoriality in updating of database.Table 1.1.1Database Management SystemThe cash advance of the File-Based System (FBS) was the Database Management System (DBMS) which came up in the 60s.The Database Management System removed the trouble of manually locating data, and having to go by dint of it. The user could create a suitable social organization for the data beforehand, to place the information in the database that the DBMS is managing. thence, the physical organizing of files is through with(p) a carriage with and provides the user with a logical view of the data input.A database is a collection of interconnected information sto red in a database server these data provide be stored in the form of tables. The main(a) aim of database is to provide a government agency to store and retrieve database information fast and in an efficient manner.Advantages sway of data redundancyAlthough the database on gear up does not remove redundancy completely, it take fors the inwardness of redundancy in the database.Data consistencyBy removing or arrogant redundancy, the database approach reduces the try of inconsistencies occurring. It ensures all copies of the idea are kept consistent. much information from the corresponding amount of dataWith the amalgamation of the operated data, it is possible to do additional information for the same data.Sharing of dataDatabase belongs to the entire organization and privy be shared by all authorized users. assortment data integrityDatabase integrity provides the validity and consistency of stored data. Integrity is unremarkably expressed in terms of constraints, which ar e consistency rules that the database is not permitted to violate. ameliorate trade protectionProvides protection of data from unauthorized users. It bequeath require user names and passwords to identify user type and their access right in the operation including retrieval, insertion, updating and deletion.Enforcement of standardsThe integration of the database enforces the undeniable standards including data formats, naming conventions, keep standards, update procedures and access rules.Economy of scaleCost savings female genital organ be obtained by combining all organizations operational data into one database with applications to excogitate on one source of data.Balance of conflicting requirementsBy having a structural design in the database, the conflicts between users or departments can be resolved. Decisions will be based on the base use of resources for the organization as a whole quite a than for an individual person. amend data accessibility and responsivenessBy hav ing integration in the database approach, data accessing can cross departmental boundaries. This feature provides more functionality and better services to the users.Increased productivityThe database approach provides all the low-level file-handling habitudes. The provision of these functions go out the programmer to concentrate more on the specific functionality required by the users. The fourth-generation environment provided by the database can simplify the database application bourgeonment. ameliorate bread and hardlyterProvides data independence. As a interchange of data twist in the database will act the application program, it simplifies database application maintenance.Increased concurrencyDatabase can manage concurrent data access effectively. It ensures no interference between users that would not impart any loss of information or loss of integrity.Improved backing and reco actually servicesModern database management system provides facilities to denigrate the a mount of processing that can be muddled following a reverse by using the transaction approach.DisadvantagesComplexityA nasty parcel system. All users must be familiar with its functionality and take full advantage of it. Therefore, training for the administrators, designers and users is required.SizeUses a substantial amount of main warehousing as well as large amount of disk distance in order to make it obtain efficiently.Cost of DBMSA multi-user database management system may be very expensive. Even by and by the installation, in that respect is a high regular annual maintenance court on the software.Cost of conversionWhen moving from a file-base system to a database system, the company is required to take away additional expenses on hardware eruditeness and training represent.PerformanceAs the database approach is to cater for many applications rather than exclusively for a particular one, some applications may not run as fast as before. uplifteder impact of a fai lureIncreases the vulnerability of the system due to the centralization. As all users and applications reply on the database accessibility, the failure of any component can bring operations to a halt and affect the services to the customer seriously.The difference between TFS and DBMSBalajee B. (2005), There are enumerate of faceistics that differ from traditional file management system to database management system. In file system approach, each user implements the required files for a specific application to run. (Example in a sales department of an enterprise, one user will be maintaining the details of the number of sales force-out in that department and their grades. These details will be stored and maintained in a identify file. Another user will maintain the salary details of these sales personnel and the detailed salary report will be stored and maintained in a separate file. Although both of the users need the data of the salespersons, they will be having their detai ls in separate files and they need different programs to operate their files.) When such data is apart(p) in separate files, it is difficult to access data that should be unattached for both users. This will lead to wastage of space and redundancy or heel counter of data, which may lead to confusion, as sharing of data among versatile users is not possible and data inconsistency may occur. These files will not be having any inter-relationship among the data stored in these files. Therefore in traditional file processing every user will be defining their take constraints and implement the files according to their needs.In database approach, a single store of data is maintained that is defined once and then accessed by many users, as database belongs to the entire organization and can be shared by all authorized users. The essential characteristic of database approach is that the database system not barely contains data simply it contains complete definition or description of t he database structure and entertain. These definitions are stored in a system catalog, which contains the information intimately the structure and definitions of the database. The information stored in the catalog is called the metadata, it describes the primary database. Hence this approach will work on any type of database for example, insurance database, Airlines, banking database, Finance details, and endeavour information database. But in traditional file processing system the application is developed for a specific purpose and they will access specific database only. But the processing speed in TFS is high compared to DBMS.The other main characteristic of the database is that it will allow multiple users to access the database at the same time and sharing of data is possible. The database must overwhelm concurrency experience software to ensure that several users trying to update the same data at the same time, it should maintain in a controlled manner. In file system app roach many programmers will be creating files over a long period and various files defy different format, in various application languages, where duplication of data can occur.This redundancy in storing same data multiple times leads to higher costs and wastage of space. This may result in data inconsistency in the application this is because update is done to some of the files only and not all of the files. Moreover in database approach multiple views can be createdExternal view User/ use view,Conceptual view Logical view,Internal view Details about the structure of data and physical storage of information. visible horizon is a spare representation of information contained in one or more tables. View is withal called as Virtual table because view does not contain physically stored records and will not occupy any space.A multi-user database whose users adopt variety of applications must provide facilities for defining multiple views. In traditional file system, if any changes are made to the structure of the files it will affect all the programs. Therefore, changes to the structure of a file will require to change all programs that access the file and whereby data dependence will be lost. But in the case of database approach the structure of the database is stored separately in the system catalog from the access of the application programs. This property is kn throw as program-data independence.Database can also be used for continuous storage for program objects and data structures that resulted in object oriented database approach. Traditional systems suffered from impedance twin problem and difficulty in accessing the data, which is avoided in object oriented database system. Database can be used to represent complex relationships among data as well as to retrieve and update related data easily and efficiently. Hence DBMS does not automatically remove redundancies, but help to control redundancy.It is possible to define and enforce integrity constrai nts for the data stored in the database. The database also provides facilities for recovering hardware and software failures, as it has automatic and intelligent relief pitcher and recovery procedures. It reduces the application development time considerably when compared to the file system approach and availability of up-to-date information of all the users. It also provides security to the data stored in the database system and maintains integrity.A highly technical person will be required to handle the database, while for TFS, it is not so.File-based systems are very dependent upon the application programmer. Any required queries or reports pitch to be written by the application programmer. Normally, a fixed format query or report can only be socialise and no facility for ad-hoc queries if offered. DBMS has data independence. The way information is stored and the way information issued is independent of each other.File-based systems also give tremendous force on data processi ng staff, with users complaints on programs that are inadequate or inefficient in meeting their demands. Documentation may be contain and maintenance of the system is difficult. Provision for security, integrity and recovery capability is very limited. Whereas, DBMS has control over security as it provides tools such as use of User Code, Password / Privileges and Roles to ensure security of data.Data, stadium, Record, and File are the main components of Database environment. Briefly explain those.DataWebopedia (Anon., n.d.), Distinct valet de chambres of information usually formatted in a special way. All software is divided into two general categories data and programs. Programs are collections of instructions for manipulating data. Data can make it in a variety of forms as numbers or school text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a persons mind. Strictly speaking, data is the plural of datum, a single piece of information . In practice, however, people use data as both the shady and plural form of the word. The term data is often used to branch binary machine-readable information from textual human-readable information. For example, some applications make a greenback between data files (files that contain binary data) and text files (files that contain ASCII data). In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store administrative information, kn admit as metadata.FieldWebopedia (Anon., n.d.), A space allocated for a particular item of information. A assess form, for example, contains a number of palm one for your name, one for your Social security number, one for your income, and so on. In database systems, field are the smallest units of information you can access. In spreadsheets, fields are called cells.Most fields have accredited attributes associated with them. For example, som e fields are numeric whereas others are textual some are long, while others are short. In addition, every field has a name, called the field name.In database management systems, a field can be required, optional, or reckon. A required field is one in which you must enter data, while an optional field is one you may leave of absence blank. A calculated field is one whose value is derived from some facial expression involving other fields. You do not enter data into a calculated field the system automatically determines the correct value.A collection of fields is called a record.RecordWebopedia (Anon., n.d.), In database management systems, a complete train of information. Records are constitute of fields, each of which contains one item of information. A set of records constitutes a file. For example, a personnel file might contain records that have three fields a name field, an address field, and a border number field. In relational database management systems, records are call ed tuples. Some programme languages allow you to define a special data structure called a record. Generally, a record is a combination of other data objects. For example, a record might contain three integers, a floating-point number, and a character string. In database management systems, a complete set of information. Records are composed of fields, each of which contains one item of information. A set of records constitutes a file. For example, a personnel file might contain records that have three fields a name field, an address field, and a phone number field. common fig 1.2.1Source Author Anon.,FileWebopedia (Anon., n.d.), A collection of data or information that has a name, called the filename. Almost all information stored in a computer must be in a file. There are many different types of files data files, text files, program files, directory files, and so on. antithetical types of files store different types of information. For example, program files store programs, where as text files store text.What is the importance of DBMS in a Defense Organization and in an reproduction Department? self-renunciation OrganizationBenjamin (n.d.), A Database Management System (DBMS) is a set of computer programs that controls the creation, maintenance, and the use of the database with computers of an organization and its end users. It allows organizations to place control of organization-wide database development in the hands of database administrators (DBAs) and other specialists.As organizations develop with time, their adoption to the latest technologies in the computer field becomes a necessity. A Defence organization is no different. In these turbulent times, when national security is more important, providing all Defence personnel with access to the latest applied science and education opportunities not only directly contributes to Defence capability but also improve the defence personnels career development.Hence the importance of a DBMS in such an organi zation analogous Defence is vital. Because Database administrators could use this system to configure and operate databases as the software provides high level, inner(a) database access. But the management should restrict use of this software to authorized personnel. wizard function of the database administrator is to create particular views of information stored in the database that are unique for each type of user. For example, one officer will have a different view of information in the database than another, say senior officer. The different user groups will also have different abilities to add, modify, or delete information. The database administrator is responsible for providing users with access to the appropriate level of information. The primary risk associated with database administration is that an administrator can alter sensitive data without those modifications being detected.A secondary risk is that an administrator can change access rights to information stored w ithin the database as well as their own access rights.Database security is the last line of defence. So it deserves great nidus on the protection of private data from both internal and external.The esthesia and distinguishification of the information stored in the database form the basis for establishing controls. A database that stores undercover information may require a more significant control environment than a database that stores non-sensitive information. Management should consider the security and performance implications of the security options addressable with modern database management systems.Database security professionals and information security and risk management professionals could adopt a security strategy in DBMS to1) Align database security policies with information security policies2) Ensure well-defined and declare database security procedures3) Enforce role separation and4) Apply advanced security measures such as database auditing, monitoring, databa se encryption, data masking, and vulnerability assessment to all lively databases that store private data.The DBMS can provide long-term benefits for the Defence organization reducing duplication of data and making it easier for HR to update personnel records. If not for DBMS, each time there was a personnel change, trainers would have to go through their entire capacitance to make the necessary changes. Now, replacing Brigadier Xs turn in in the content library with Commodore Ys picture can be automatically replicated through all relevant programs. thereby reduce its expenditure on storage. But, initial training will be required for all programmers and users. Even though database systems are complex, difficult, and time-consuming to design, there is greater data integrity and independence from applications programs andEducation Department action Bushell (2004), To improve teaching and schooling with the help of modern information and colloquy technology eLearning is beneficial to education, corporations and to all types of assimilators. It is affordable, saves time, and produces measurable results.E- friendship comprises all forms of electronically back up learning and teaching. The Information and communication systems, whether networked or not, serve as specific media to implement the learning process.E-learning services have evolved since computers were first used in education. There is a trend to move towards blend learning services, where computer-based activities are integrated with practical or classroom-based situations.E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, realistic classroom opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or painting tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of tex t, image, animation, float video and audioThe definition of e-learning varies depending on the organization and how it is used but basically it involves electronic convey of communication, education, and training.Regardless of the definition you chose to use, designers, developers, and implementers make or break the instructional courses and tools. E-learning is simply a medium for delivering learning and standardized any other medium, it has its advantages and disadvantages. E-learning covers a wide array of activities from supported learning, to blended or hybrid learning (the combination of traditional and e-learning practices), to learning that occurs hundred% online.As per wikipedia.org, the worldwide e-learning industry is estimated to be worth over $48 billion US according to conservative estimates. Developments in internet and multimedia technologies are the basic enabler of e-learning, with consulting, content, technologies, services and support being identified as the five key heavenss of the e-learning industry.E-learning is naturally suited to distance learning and conciliative learning, but can also be used in coupling with face-to-face teaching, in which case the term Blended learning is ordinarily used. E-Learning pioneer Bernard Luskin argues that the E must be understood to have unsubtle meaning if e-learning is to be effective. Luskin says that the e should be interpreted to mean exciting, ener lay downic, enthusiastic, emotional, extended, excellent, and educational in addition to electronic that is a traditional national explanation. This broader interpretation allows for 21st century applications and brings learning and media psychology into the equation.E-Learning can also call to educational web sites such as those offering learning scenarios, worksheets and interactive exercises for children. The term is also used extensively in the business sector where it generally refers to cost-effective online trainingThere are many advan tages to online and computer-based learning when compared to traditional face-to-face courses and lectures. There are a few disadvantages as well.Advantages of eLearning(Anon., n.d) E-learning is beneficial to education, corporations and to all types of scholarly persons. It is affordable, saves time, and produces measurable results.Cost effectiveE-learning is more cost effective than traditional learning because less time and money is spend traveling. Since e-learning can be done in any geographic location and there are no travel expenses, this type of learning is much less costly than doing learning at a traditional institute. tractablenessFlexibility is a major benefit of e-learning. E-learning has the advantage of taking class anytime anywhere. Education is available when and where it is needed. E-learning can be done at the office, at home, on the road, 24 hours a day, and seven days a week.Learners like e-learning because it accommodates different types of learning styles. They have the advantage of learning at their own pace. Students can also learn through a variety of activities that grant to many different learning styles. Learners can fit e-learning into their busy schedule. If they expect a job, they can participate in eLearning right at their desk. If the learner needs to do the learning at night, then this option is available while in their pyjamas and do the learning if they desire.Personalized learningE-learning encourages students to see through information by using hyperlinks and sites on the worldwide Web. Learners are able to find information relevant to their personal situations and interest. E-learning allows selection of learning materials that meet their level of knowledge, interest and what they need to know to perform more effectively in an activity.E-learning is more focused on the learner and it is more interesting for the learner because it is information that they want to learn. E-learning is flexible and can be customized t o meet the individual needs of the learners.Develops knowledgeE-learning helps develop knowledge of the Internet. This knowledge will help learners throughout their careers. E-learning encourages students to take personal responsibility for their own learning. When learners succeed, it builds self-knowledge and self-confidenceDisadvantages of eLearningAccessOne disadvantage of eLearning is that learners need to have access to a computer as well as the Internet. They also need to have computer skills with programs such as word processing, Internet browsers, and e-mail. Without these skills and software it is not possible for the learner to succeed in eLearning.E-learners need to be very comfortable using a computer. Slow Internet connections or older computers may make accessing course materials difficult. This may cause the learners to get frustrated and give up.Software and filesAnother disadvantage of e-learning is managing computer files, software comfortability and learning new software, including e-learning. For learners with beginner-level computer skills it can sometimes seem complex to keep their computer files organized. The lesson points you to download a file which the learner does and subsequently cannot find the file. The file is downloaded to the folder the computer automatically opens to rather than a folder chosen by the learner. This file may be lost or misplaced to the learner without good computer organizational skills.High motivationE-learning also requires time to complete especially those with assignments and interactive collaborations. This means that students have to be highly motivated and responsible because all the work they do is on their own. Learners with low motivation or bad exact habits may not complete modules and may fall behind isolationAnother disadvantage of e-learning is that students may feel isolated and unsupported while learning. Instructions are not always available to help the learner so learners need to have disc ipline to work independently without assistance. E-learners may also become bored with no interaction with instructors or classmates.Without the routine structures of a traditional class, students may get lost or wooly-minded about course activities and deadlines. Instructor may not always be available when students are studying or need help resultantToday many technologies can be, and are, used in e-learning, from blogs to collaborative software, E-Portfolios, and virtual classrooms. Most e-learning situations use combinations of these techniques.Even though the hardware and software start-up are costly, the advantages are reduced data redundancy, reducing updating errors and increased consistency, greater data integrity and independence from applications programs, improved data access to users through use of host and query languages, improved data security and availability of facilitated development of new application programs and ability for intensive research are the benefits o f DBMS.Task 2Draw an Entity Relationship Data Model which describes the content and structure of the data held by the Medi period Hospital.Produce the resulting tables of above Medi Check Hospital and clearly indicating the primary and foreign keys.Data TablesDoctorDoctorID (primary)LnameFname tradePhonePagerSpecialtyLocationAvailabilityPatientPatientNo (primary)PatientFirstNamePatientLastNamePatientAddressPatientTelNoPatientDobPatientMarital positioningPatientDateRegistered participationAppointmentNo (primary)PatientNameDate/TimePatientTelNoSymptomSymptomCode (primary),SymptomNameDescriptionTreatmentTreatmentTitle (primary)TreatmentTypeDurationStatusTreatmentCostMedicationMedicationNo (primary)MedicationTypeSideEffectDosageFrequencySeverityMedicationBrandNameMedicationManufactureNameMedicationManufactureAddressMedicationManufactureTelNormalize these tables to ensure that are all in BCNF. Show the steps you have taken in normalizing the tables.UNFMedication (DoctorID, Lname, Fname, Address, Phone, Pager, Specialty, Location,Availability, PatientNo, PatientFirstName, PatientLastName,PatientAddress, PatientTelNo, PatientDob, PatientMaritalStatus,PatientDateRegistered, AppoinmentNo, PatientName, Date/Time,PatientTelNo, SymptomCode, SymptomName, Description,TreatmentTitle, TreatmentType, Duration, Status, TreatmentCost,MedicationNo, MedicationType, SideEffect, Dosage, Frequency,Severity, MedicationBrandName, MedicationManufactureName,MedicationManufactureAddress, MedicationManufactureTel)1NFDoctor Details (DoctorID, Lname, Fname, Address, Phone, Pager, Specialty,Location, Availability)Patient Details (PatientNo, PatientFirstName, PatientLastName, PatientAddress,PatientTelNo, PatientDob, PatientMaritalStatus,PatientDateRegistered, AppoinmentNo, PatientN

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.