
A 'database management system' (DBMS) is computer software designed for the purpose of managing databases based on a variety of data models.
A DBMS is a complex set of software programs that controls the organization, storage, management, and retrieval of data in a database. A DBMS includes:
A modeling language to define the schema of each database hosted in the DBMS, according to the DBMS data model.
A DBMS is a complex set of software programs that controls the organization, storage, management, and retrieval of data in a database. A DBMS includes:
A modeling language to define the schema of each database hosted in the DBMS, according to the DBMS data model.
The four most common types of organizations are the hierarchical, network, relational and object models. Inverted lists and other methods are also used. A given database management system may provide one or more of the four models. The optimal structure depends on the natural organization of the application's data, and on the application's requirements (which include transaction rate (speed), reliability, maintainability, scalability, and cost).
The dominant model in use today is the ad hoc one embedded in SQL, despite the objections of purists who believe this model is a corruption of the relational model, since it violates several of its fundamental principles for the sake of practicality and performance. Many DBMSs also support the Open Database Connectivity API that supports a standard way for programmers to access the DBMS.
Data structures (fields, records, files and objects) optimized to deal with very large amounts of data stored on a permanent data storage device (which implies relatively slow access compared to volatile main memory).

A database query language and report writer to allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data.
It also controls the security of the database.
Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data.
If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function.
A transaction mechanism, that ideally would guarantee the ACID properties, in order to ensure data integrity, despite concurrent user accesses (concurrency control), and faults (fault tolerance).
It also maintains the integrity of the data in the database.
The DBMS can maintain the integrity of the database by not allowing more than one user to update the same record at the same time. The DBMS can help prevent duplicate records via unique index constraints; for example, no two customers with the same customer numbers (key fields) can be entered into the database. See ACID properties for more information (Redundancy avoidance).
The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data.
When a DBMS is used, information systems can be changed much more easily as the organization's information requirements change. New categories of data can be added to the database without disruption to the existing system.
Organizations may use one kind of DBMS for daily transaction processing and then move the detail onto another computer that uses another DBMS better suited for random inquiries and analysis. Overall systems design decisions are performed by data administrators and systems analysts. Detailed database design is performed by database administrators.
Database servers are specially designed computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with RAID disk arrays used for stable storage. Connected to one or more servers via a high-speed channel, hardware database accelerators are also used in large volume transaction processing environments.
DBMSs are found at the heart of most database applications. Sometimes DBMSs are built around a private multitasking kernel with built-in networking support although nowadays these functions are left to the operating system.
Logical view and physical view
A database management system provides the ability for many different users to share data and process resources. But as there can be many different users, there are many different database needs. The question now is: How can a single, unified database meet the differing requirement of so many users?
A DBMS minimizes these problems by providing two views of the database data: a physical view and a logical view. The physical view deals with the actual, physical arrangement and location of data in the direct access storage devices(DASDs). Database specialists use the physical view to make efficient use of storage and processing resources. Users, however, may wish to see data differently from how they are stored, and they do not want to know all the technical details of physical storage. After all, a business user is primarily interested in using the information, not in how it is stored. The logical view/user’s view, of a database program represents data in a format that is meaningful to a user and to the software programs that process those data. That is, the logical view tells the user, in user terms, what is in the database. One strength of a DBMS is that while there is only one physical view of the data, there can be an endless number of different logical views. This feature allows users to see database information in a more business-related way rather than from a technical, processing viewpoint. Thus the logical view refers to the way user views data, and the physical view to the way the data are physically stored and processed.
Features and capabilities of DBMS
One can characterize a DBMS as an "attribute management system" where attributes are small chunks of information that describe something. For example, "colour" is an attribute of a car. The value of the attribute may be a color such as "red", "blue" or "silver".
Alternatively, and especially in connection with the relational model of database management, the relation between attributes drawn from a specified set of domains can be seen as being primary. For instance, the database might indicate that a car that was originally "red" might fade to "pink" in time, provided it was of some particular "make" with an inferior paint job. Such higher arity relationships provide information on all of the underlying domains at the same time, with none of them being privileged above the others.
Throughout recent history specialized databases have existed for scientific, geospatial, imaging, document storage and like uses. Functionality drawn from such applications has lately begun appearing in mainstream DBMSs as well. However, the main focus there, at least when aimed at the commercial data processing market, is still on descriptive attributes on repetitive record structures.
Thus, the DBMSs of today roll together frequently-needed services or features of attribute management. By externalizing such functionality to the DBMS, applications effectively share code with each other and are relieved of much internal complexity. Features commonly offered by database management systems include:
Query ability
Querying is the process of requesting attribute information from various perspectives and combinations of factors. Example: "How many 2-door cars in Texas are green?"
A database query language and report writer allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function..
Backup and replication
Copies of attributes need to be made regularly in case primary disks or other equipment fails. A periodic copy of attributes may also be created for a distant organization that cannot readily access the original. DBMS usually provide utilities to facilitate the process of extracting and disseminating attribute sets.
When data is replicated between database servers, so that the information remains consistent throughout the database system and users cannot tell or even know which server in the DBMS they are using, the system is said to exhibit replication transparency.
Rule enforcement
Often one wants to apply rules to attributes so that the attributes are clean and reliable. For example, we may have a rule that says each car can have only one engine associated with it (identified by Engine Number). If somebody tries to associate a second engine with a given car, we want the DBMS to deny such a request and display an error message. However, with changes in the model specification such as, in this example, hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be added and removed as needed without significant data layout redesign.
Security
Often it is desirable to limit who can see or change which attributes or groups of attributes. This may be managed directly by individual, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements.
Computation
There are common computations requested on attributes such as counting, summing, averaging, sorting, grouping, cross-referencing, etc. Rather than have each computer application implement these from scratch, they can rely on the DBMS to supply such calculations.
Alternatively, and especially in connection with the relational model of database management, the relation between attributes drawn from a specified set of domains can be seen as being primary. For instance, the database might indicate that a car that was originally "red" might fade to "pink" in time, provided it was of some particular "make" with an inferior paint job. Such higher arity relationships provide information on all of the underlying domains at the same time, with none of them being privileged above the others.
Throughout recent history specialized databases have existed for scientific, geospatial, imaging, document storage and like uses. Functionality drawn from such applications has lately begun appearing in mainstream DBMSs as well. However, the main focus there, at least when aimed at the commercial data processing market, is still on descriptive attributes on repetitive record structures.
Thus, the DBMSs of today roll together frequently-needed services or features of attribute management. By externalizing such functionality to the DBMS, applications effectively share code with each other and are relieved of much internal complexity. Features commonly offered by database management systems include:
Query ability
Querying is the process of requesting attribute information from various perspectives and combinations of factors. Example: "How many 2-door cars in Texas are green?"
A database query language and report writer allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function..
Backup and replication
Copies of attributes need to be made regularly in case primary disks or other equipment fails. A periodic copy of attributes may also be created for a distant organization that cannot readily access the original. DBMS usually provide utilities to facilitate the process of extracting and disseminating attribute sets.
When data is replicated between database servers, so that the information remains consistent throughout the database system and users cannot tell or even know which server in the DBMS they are using, the system is said to exhibit replication transparency.
Rule enforcement
Often one wants to apply rules to attributes so that the attributes are clean and reliable. For example, we may have a rule that says each car can have only one engine associated with it (identified by Engine Number). If somebody tries to associate a second engine with a given car, we want the DBMS to deny such a request and display an error message. However, with changes in the model specification such as, in this example, hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be added and removed as needed without significant data layout redesign.
Security
Often it is desirable to limit who can see or change which attributes or groups of attributes. This may be managed directly by individual, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements.
Computation
There are common computations requested on attributes such as counting, summing, averaging, sorting, grouping, cross-referencing, etc. Rather than have each computer application implement these from scratch, they can rely on the DBMS to supply such calculations.
Specail Topicslink น่าสนใจ เกี่ยวกับประกันภัยรถยนต์ ป.1
http://www.pkinsure.com/asia-insurance.htm
http://www.pkinsure.com/index1.htm
http://www.pkinsure.com/apply.htm
http://www.pkinsure.com/วิริยะประกันภัย.htm
http://www.pkinsure.com/อาคเนย์ประกันภัย.htm
http://www.pkinsure.com/msigประกันภัย.htm
http://www.pkinsure.com/ประกันภัยไทยวิวัฒน์.htm
http://www.pkinsure.com/นำสินประกันภัย.htm
http://www.pkinsure.com/เอเชียประกันภัย.htm
http://www.pkinsure.com/แอลเอ็มจีประกันภัย.htm
http://www.pkinsure.com/ไทยไพบูลย์ประกันภัย.htm
http://www.pkinsure.com/ชาร์ทิสประกันภัย.htm
http://www.pkinsure.com/กมลประกันภัย.htm
http://www.pkinsure.com/อินทรประกันภัย.htm
http://www.pkinsure.com/เมืองไทยประกันภัย.htm
http://www.pkinsure.com/ฟินิกซ์ประกันภัย.htm
http://www.pkinsure.com/ประกันคุ้มภัย.htm
http://www.pkinsure.com/มิตรแท้ประกันภัย.htm
http://www.pkinsure.com/คูเนียประกันภัย.htm
http://www.pkinsure.com/เทเวศประกันภัย.htm
http://www.pkinsure.com/บีทีประกันภัย.htm
http://www.pkinsure.com/เอราวัณประกันภัย.htm
http://www.pkinsure.com/เจ้าพระยาประกันภัย.htm
http://www.pkinsure.com/ไทยเศรษฐกิจประกันภัย.htm
http://www.pkinsure.com/ศรีเมืองประกันภัย.htm
http://www.pkinsure.com/ไทยศรีประกันภัย.htm
http://www.pkinsure.com/อลิอันซ์ซีพีประกันภัย.htm
http://www.pkinsure.com/สินมั่นคงประกันภัย.htm
http://www.pkinsure.com/asia-insurance.htm
http://www.pkinsure.com/index1.htm
http://www.pkinsure.com/apply.htm
http://www.pkinsure.com/วิริยะประกันภัย.htm
http://www.pkinsure.com/อาคเนย์ประกันภัย.htm
http://www.pkinsure.com/msigประกันภัย.htm
http://www.pkinsure.com/ประกันภัยไทยวิวัฒน์.htm
http://www.pkinsure.com/นำสินประกันภัย.htm
http://www.pkinsure.com/เอเชียประกันภัย.htm
http://www.pkinsure.com/แอลเอ็มจีประกันภัย.htm
http://www.pkinsure.com/ไทยไพบูลย์ประกันภัย.htm
http://www.pkinsure.com/ชาร์ทิสประกันภัย.htm
http://www.pkinsure.com/กมลประกันภัย.htm
http://www.pkinsure.com/อินทรประกันภัย.htm
http://www.pkinsure.com/เมืองไทยประกันภัย.htm
http://www.pkinsure.com/ฟินิกซ์ประกันภัย.htm
http://www.pkinsure.com/ประกันคุ้มภัย.htm
http://www.pkinsure.com/มิตรแท้ประกันภัย.htm
http://www.pkinsure.com/คูเนียประกันภัย.htm
http://www.pkinsure.com/เทเวศประกันภัย.htm
http://www.pkinsure.com/บีทีประกันภัย.htm
http://www.pkinsure.com/เอราวัณประกันภัย.htm
http://www.pkinsure.com/เจ้าพระยาประกันภัย.htm
http://www.pkinsure.com/ไทยเศรษฐกิจประกันภัย.htm
http://www.pkinsure.com/ศรีเมืองประกันภัย.htm
http://www.pkinsure.com/ไทยศรีประกันภัย.htm
http://www.pkinsure.com/อลิอันซ์ซีพีประกันภัย.htm
http://www.pkinsure.com/สินมั่นคงประกันภัย.htm
www.aia-agent.ob.tc/index.htm
www.aia-agent.ob.tc/index1.htm
www.aia-agent.ob.tc/index2.htm
www.aia-agent.ob.tc/index3.htm
www.aia-agent.ob.tc/index4.htm
www.aia-agent.ob.tc/aboutus.htm
www.aia-agent.ob.tc/market.htm
www.aia-agent.ob.tc/news.htm
www.aia-agent.ob.tc/contact.htm
www.aia-agent.ob.tc/career.htm
http://www.aia-thailand.ob.tc/
http://www.aia-thailand.ob.tc/saving.htm
http://www.aia-thailand.ob.tc/group.htm
http://www.aia-thailand.ob.tc/saving.htm
http://www.aia-thailand.ob.tc/job.htm
http://www.aia-thailand.ob.tc/loan.htm
http://www.aia-thailand.ob.tc/person.htm
http://www.aia.thailand.bravehost.com/
http://www.aia-thailand.ob.tc/index.html
http://aia-thailand.bravehost.com/saving.htm
http://aia-thailand.bravehost.com/group.htm
http://aia-thailand.bravehost.com/person.htm
http://aia-thailand.bravehost.com/loan.htm
http://aia-thailand.bravehost.com/job.htm
www.aia-agent.ob.tc/index1.htm
www.aia-agent.ob.tc/index2.htm
www.aia-agent.ob.tc/index3.htm
www.aia-agent.ob.tc/index4.htm
www.aia-agent.ob.tc/aboutus.htm
www.aia-agent.ob.tc/market.htm
www.aia-agent.ob.tc/news.htm
www.aia-agent.ob.tc/contact.htm
www.aia-agent.ob.tc/career.htm
http://www.aia-thailand.ob.tc/
http://www.aia-thailand.ob.tc/saving.htm
http://www.aia-thailand.ob.tc/group.htm
http://www.aia-thailand.ob.tc/saving.htm
http://www.aia-thailand.ob.tc/job.htm
http://www.aia-thailand.ob.tc/loan.htm
http://www.aia-thailand.ob.tc/person.htm
http://www.aia.thailand.bravehost.com/
http://www.aia-thailand.ob.tc/index.html
http://aia-thailand.bravehost.com/saving.htm
http://aia-thailand.bravehost.com/group.htm
http://aia-thailand.bravehost.com/person.htm
http://aia-thailand.bravehost.com/loan.htm
http://aia-thailand.bravehost.com/job.htm
http://www.aia-thailand.com/index.htm
http://www.aia-thailand.com
http://www.aia-thailand.com/aboutus.htm
http://www.aia-thailand.com/market.htm
http://www.aia-thailand.com/news.htm
http://www.aia-thailand.com/contact.htm
http://www.aia-thailand.com/career.htm
aia AIA เอไอเอ รับสมัครตัวแทนประกันชีวิต สมัครตัวแทนประกันตัวแทนประกันชีวิต รายได้พิเศษ งานประจำ งาน part timeธุรกิจส่วนตัว ประกันกลุ่ม ประกันสุขภาพ
http://www.aia-thailand.com
http://www.aia-thailand.com/aboutus.htm
http://www.aia-thailand.com/market.htm
http://www.aia-thailand.com/news.htm
http://www.aia-thailand.com/contact.htm
http://www.aia-thailand.com/career.htm
aia AIA เอไอเอ รับสมัครตัวแทนประกันชีวิต สมัครตัวแทนประกันตัวแทนประกันชีวิต รายได้พิเศษ งานประจำ งาน part timeธุรกิจส่วนตัว ประกันกลุ่ม ประกันสุขภาพ