www.georgelumayag.com
Ans. A database is a collection of occurrence of multiple record types containing the relationship between records, data aggregate and data items. A database may be defined as
A database is a collection of interrelated data store together without harmful and unnecessary redundancy (duplicate data) to serve multiple applications
The data is stored so that they are independent of programs, which use the data. A common and control approach is used in adding the new data, modifying and retrieving existing data or deletion of data within the database A running database has function in a corporation, factory, government department and other organization. Database is used for searching the data to answer some queries. A database may be design for batch processing, real time processing or on line processing.
DATABASE SYSTEM
Database System is an integrated collection of related files along with the detail about their definition, interpretation, manipulation and maintenance. It is a system, which satisfied the data need for various applications in an organization without unnecessary redundancy. A database system is based on the data. Also a database system can be run or executed by using software called DBMS (Database Management System). A database system controls the data from unauthorized access.
Foundation Data Concept
A hierarchy of several levels of data has been devised that differentiates between different groupings, or elements, of data. Data are logically organized into:
all transactions occurring during a period, whereas a master file contains all the permanent records. A history file is an obsolete transaction or master file retained for backup purposes or for long-term historical storage called archival storage.
Q. 2. What are the various characteristics of DBMS?
Ans. The major characteristics of database approach are:
• Self-describing Nature of a Database System
• Insulation between Programs and Data, and Data Abstraction
• Support of Multiple Views of the Data
• Sharing of Data and Multi user Transaction Processing
Q. 3. What are the various characteristics of DBMS approach?
Ans.
1. Self-contained nature
DBMS system contains data plus a full description of the data (called “metadata”) “metadata” is data about data - data formats, record structures, locations, how to access, indexes metadata is stored in a catalog and is used by DBMS software to know how to access the data. Contrast this with the file processing approach where application programs need to know the structure and format of records and data.
2. Program-data independence
Data independence is immunity of application programs to changes in storage structures and access techniques. E.g. adding a new field, changing index structure, changing data format, In a DBMS environment these changes are reflected in the catalog. Applications aren’t affected. Traditional file processing programs would all have to
change, possibly substantially.
3. Data abstraction
A DBMS provides users with a conceptual representation of data (for example, as objects with properties and inter-relationships). Storage details are hidden. Conceptual representation is provided in terms of a data model.
4. Support for multiple views
DBMS may allow different users to see different “views” of the DB, according to the perspective each one requires. E.g. a subset of the data - For example; the people using the payroll system need not/should not see data about students and class schedules. E.g. data presented in a different form from the way it is stored - For example someone interested in student transcripts might get a view which is formed by combining information from separate files or tables.
5. Centralized control of the data resource
The DBMS provides centralized control of data in an organization.
This brings a number of advantages:
(a) reduces redundancy
(b) avoids inconsistencies
(c) data can be shared
(d) standards can be enforced
(e) security restrictions can be applied
(f) integrity can be maintained
a, b. Redundancy and Inconsistencies
Redundancy is unnecessary duplication of data. For example if accounts department and registration department both keep student name, number and address.
Redundancy wastes space and duplicates effort in maintaining the data.
Redundancy also leads to inconsistency.
Inconsistent data is data which contradicts itself - e.g. two different addresses for a given student number. Inconsistency cannot occur if data is represented by a single entry (i.e. if there is no redundancy).
Controlled redundancy: Some redundancy may be desirable (for efficiency). A DBMS should be aware of it, and take care of propagating updates to all copies of a data item.
This is an objective, not yet currently supported.
c. Sharing
• Need concurrency control
• Multiple user views
d. Standards
E.g. data formats, record structures, naming, documentation
International, organizational, departmental ... standards
e. Security
- restricting unauthorized access
DBMS should perform security checks on all accesses.
f. Integrity
Maintaining validity of data;
e.g. employee numbers must be in some range
e.g. every course must have an instructor
e.g.. student number must be unique
e.g. hours worked cannot be more than 150
These things are expressed as constraints.
DBMS should perform integrity checks on all updates. Currently DBMSs provide limited integrity checks.
Q. 3. What are the various types of databases?
Ans. Types of Databases
Continuing developments in information technology and its business applications have resulted in the evolution of several major types of databases. Several major conceptual categories of databases that may be found in computer-using organizations include:
Operational Databases
The databases store detailed data needed to support the operations of the entire organization. They are also called subject area databases (SADB), transaction databases, and production databases: Examples are customer databases, personnel databases, inventory databases, and other databases containing data generated by business operations
Distributed Databases
Many organizations replicate and distribute copies or parts of databases to network
sewers at a variety of sites. These distributed databases can reside on network servers
on the World Wide Web, on corporate Intranets or extranets, or on other company networks. Distributed databases may be copies of operational or analytical. databases,
hypermedia or discussion databases, or any other type of database. Replication and distribution of databases is done to improve database performance and security.
External Databases
Access to external, privately owned online databases or data banks is available for a fee to end users and organizations from commercial online services, and with or without charge from many sources on the Internet, especially the Web.
Hypermedia Databases
It consists of hyperlinked pages of multimedia (text, graphics, and photographic images, video clips, audio segments, etc.). From a database management point of view, the set of interconnected multimedia pages at a website is a database of interrelated hypermedia page elements, rather than interrelated data records.
Q. 4. What do you mean by DBMS?
Ans. A DBMS is best described as a collection of programs that manage the database structure and that control shared access to the data in the database. Current DBMSes also store the relationships between the database components; they also take care of defining the required access paths to those components
A database management system (DBMS) is the combination of data, hardware, software and users to help an enterprise manage its operational data.
The main function of a DBMS is to provide efficient and reliable methods of data retrieval to many users. Efficient data retrieval is an essential function of database systems. DBMS must be able to deal with several users who try to simultaneously access several items and most frequently, the same data item A DBMS is a set of programs that is used to store and manipulation data that include the following:
• Adding new data, for example adding details of new student.
• Deleting unwanted data, for example deleting the details of students who have
completed course.
• Changing existing data, for example modifying the fee paid by the student.
A database is the information to be stored whereas the database management system is the system used to manage the database. . This structure may be regarded in terms of its hardware implementation, called the physical structure, or this structure may be regarded independently of its hardware implementation, called the logical structure. In either case, the data structure is regarded as static because a database cannot ‘process anything. The DBMS is regarded as dynamic because it is through the DBMS that all database processing takes place. How the DBMS presents data to the user is called the view structure.
There are two general modes for data use: queries and transactions. Both forms use the DBMS for processing. The query is processed for presentation in views and none of these processes are written to the database. The transactional is processed for updating values in the database variables. These updates are written to the database. A DBMS provides various functions like data security, data integrity, data sharing, data concurrence, data independence, data recovery etc. However, all database management systems that are now available in the market like Sybase, Oracle, and MS-Access do not provide the same set of functions, though all are meant for data management.
Q. 5. What are the various components of DBMS?
Ans. Basic Components: A database system has four components. These four
components are important for understanding and designing the database system. These
are:
1. Data
2. Hardware
3. Software
4. Users
1. Data
As we have discussed above, data is raw hand information collected by us. Data is made up of data item or data aggregate. A Data item is the smallest unit of named data: It may consist of bits or bytes. A Data item is often referred to as field or data element. A Data aggregate is the collection of data items within the record, which is given a name and referred as a whole. Data can be collected orally or written. A database can be integrated and shared. Data stored in a system is partition into one or two databases. So if by chance data lost or damaged at one place, then it can be accessed from the second place by using the sharing facility of data base system. So a shared data also cane be reused according to the user’s requirement. Also data must be in the integrated form. Integration means data should be in unique form i.e. data collected by using a well-defined manner with no redundancy, for example Roll number in a class is non-redundant form and so these have unique resistance, but names in class may be in the redundant form and can create lot of problems later on in using and accessing the data.
2. Hardware
Hardware is also a major and primary part of the database. Without hardware nothing can be done. The definition of Hardware is “which we can touch and see”, i.e. it has physical existences. All physical quantity or items are in this category. For example, all the hardware input/output and storage devices like keyboard, mouse, scanner, monitor, storage devices (hard disk, floppy disk, magnetic disk, and magnetic drum) etc. are commonly used with a computer system.
3. Software
Software is another major part of the database system. It is the other side of hardware. Hardware and software are two sides of a coin. They go side by side. Software is a system. Software are further subdivided into two categories, First type is system software (like all the operating systems, all the languages and system packages etc.) and second one is an application software (payroll, electricity billing, hospital management and hostel administration etc.). We can define software as which we cannot touch and see. Software only can execute. By using software, data can be manipulated, organized and stored. -
4. Users
Without user all of the above said components (data, hardware & software) are meaning less. User can collect the data, operate and handle the hardware. Also operator feeds the data and arranges the data in order by executing the software. Other components
1. People - Database administrator; system developer; end user.
2. CASE tools: Computer-aided Software Engineering (CASE) tools.
3. User interface - Microsoft Access; PowerBuilder.
4. Application Programs - PowerBuilder script language; Visual Basic; C++; COBOL.
5. Repository - Store definitions of data called METADATA, screen and report formats, menu definitions, etc.
6. Database - Store actual occurrences data.
7. DBMS - Provide tools to manage all of this - create data, maintain data, control security access to data and to the repository, etc.
Q. 6.What are the various functions of DBMS?
Ans. These functions will include support for at least all of the following:
• Data definition: The DBMS must be able to accept data definitions (external schemas, the conceptual schema, the internal schema, and all associated mappings) in source form and convert them to the appropriate object form.
• Data manipu1ation: The DBMS must be able to handle requests from the users to retrieve, update, or delete existing data the database, or to add new data to the database. In other words, the DBMS must include a data manipulation language (DML) processor component.
• Data security and integrity: The DBMS must monitor user requests and reject
any attempt to violate the security and integrity rules defined by the DBA.
• Data recovery and concurrency: The DBMS - or else some other related software component, usually called the transaction manager - must enforce certain recovery and concurrency controls.
• Data Dictionary: The DBMS must provide a data dictionary function. The data dictionary can be regarded as a database in its own right (but a system database, rather than a user database). The dictionary contains “data about the data” (sometimes called metadata) - that is, definitions of other objects in the system - rather than just”raw data.” In particular, all the various schemas and mapping (external, conceptual, etc.) will physically be stored, in both source and object form, in the dictionary. A comprehensive dictionary will also include cross- reference information, showing, for instance, which programs use which pieces of the database, which users require which reports, which terminals are connected to the system, and so on. The dictionary might even - in fact, probably should — be integrated into the database it defines, and thus include its own definition. It should certainly be possible to query the dictionary just like any other database, so that, for example, it is possible to tell which programs and or users are likely to be affected by some proposed change to the system.
Performance: It goes without saying that the DBMS should perform all of the functions identified above as efficiently as possible.
Q7. What are the advantages and disadvantages of a database approach?
Ans. ADVANTAGES OF DBMS
One of the major advantages of using a database system is that the organization
can be handled easily and have centralized management and control over the data by
the DBA. Some more and main advantages of database management system are given
below:
The main advantages of DBMS are:
1. Controlling Redundancy
In a DBMS there is no redundancy (duplicate data). If any type of duplicate data arises, then DBA can control and arrange data in non-redundant way. It stores the data on the basis of a primary key, which is always unique key and have non-redundant information. For example, Roll no is the primary key to store the student data.
In traditional file processing, every user group maintains its own files. Each group independently keeps files on their db e.g., students. Therefore, much of the data is stored twice or more. Redundancy leads to several problems:
• Duplication of effort
• Storage space wasted when the same data is stored repeatedly
Files that represent the same data may become inconsistent (since the updates are applied independently by each users group).We can use controlled redundancy.
2. Restricting Unauthorized Access
A DBMS should provide a security and authorization subsystem.
• Some db users will not be authorized to access all information in the db (e.g., financial data).
• Some users are allowed only to retrieve data.
• Some users are allowed both to retrieve and to update database.
3. Providing Persistent Storage for Program Objects and Data Structures
Data structure provided by DBMS must be compatible with the programming language’s data structures. E.g., object oriented DBMS are compatible with programming languages such as C++, SMALL TALK, and the DBMS software automatically performs conversions between programming data structure and file formats.
4. Permitting Inferencing and Actions Using Deduction Rules
Deductive database systems provide capabilities for defining deduction rules for inferencing new information from the stored database facts.
5. Inconsistency can be reduced
In a database system to some extent data is stored in, inconsistent way. Inconsistency is another form of delicacy. Suppose that an em1oyee “Japneet” work in department “Computer” is represented by two distinct entries in a database. So way inconsistent data is stored and DBA can remove this inconsistent data by using DBMS.
6. Data can be shared
In a database system data can be easily shared by different users. For example, student data can be share by teacher department, administrative block, accounts branch arid laboratory etc.
7. Standard can be enforced or maintained
By using database system, standard can be maintained in an organization. DBA is overall controller of database system. Database is manually computed, but when DBA uses a DBMS and enter the data in computer, then standard can be enforced or maintained by using the computerized system.
8. Security can be maintained
Passwords can be applied in a database system or file can be secured by DBA. Also in a database system, there are different coding techniques to code the data i.e. safe the data from unauthorized access. Also it provides login facility to use for securing and saving the data either by accidental threat or by intentional threat. Same recovery procedure can be also maintained to access the data by using the DBMS facility.
9. Integrity can be maintained
In a database system, data can be written or stored in integrated way. Integration means unification and sequencing of data. In other words it can be defined as “the data contained in the data base is both accurate and consistent”. ‘Data can be accessed if it is
compiled in a unique form. We can take primary key ad some secondary key for integration of data. Centralized control can also ensure that adequate checks are
incorporated in the DBMS to provide data integrity.
10. Confliction can be removed
In a database system, data can be written or arranged in a well-defined manner by DBA. So there is no confliction between the databases. DBA select the best file structure and accessing strategy to get better performance for the representation and use of the
data.
11. Providing Multiple User Interfaces
For example query languages, programming languages interfaces, forms, menu- driven interfaces, etc.
12. Representing Complex Relationships Among Data
It is used to represent Complex Relationships Among Data
13. Providing Backup and Recovery
The DBMS also provides back up and recovery features.
DISADVANTAGES OF DBMS
Database management system has many advantages, but due to some major problem
arise in using the DBMS, it has some disadvantages. These are explained as:
1.Cost
A significant disadvantage of DBMS is cost. In addition to the cost of purchasing or developing the software, the organization *111 also purchase or upgrade the hardware
and so it becomes a costly system. Also additional cost occurs due to migration of data
from one environment of DBMS to another environment.
2. Problems associated with centralization
Centralization also means that data is accessible from a single source. As we know the centralized data can be accessed by each user, so there is no security of data from unauthorized access and data can be damaged or lost.
3. Complexity of backup and recovery
Backup and recovery are fairly complex in DBMS environment. As in a DBMS, if you take a backup of the data then it may affect the multi-user database system which is in operation. Damage database can be recovered from the backup floppy, but iterate duplicacy in loading to the concurrent multi-user database system.
4. Confidentiality, Privacy and Security
When information is centralized and is made available to users from remote locations, the possibilities of abuse are often more than in a conventional system. To reduce the chances of unauthorized users accessing sensitive information, it is necessary to take technical, administrative and, possibly, legal measures. Most, databases store valuable information that must be protected against deliberate trespass and destruction.
5. Data Quality
Since the database is accessible to users remotely, adequate controls are needed to control users updating data and to control data quality. With increased number of users accessing data directly, there are enormous opportunities for users to damage the data. Unless there are suitable controls, the data quality may be compromised.
6. Data Integrity
Since a large number of users could be using .a database concurrently, technical safeguards are necessary to ensure that the data remain correct during operation. The main threat to data integrity comes from several different users attempting to update the same data at the same time. The database therefore needs to be protected against inadvertent changes by the users.
7. Enterprise Vulnerability
Centralizing all data of an enterprise in one database may mean that the database becomes an indispensable resource. The survival of the enterprise may depend on reliable information being available from its database. The enterprise therefore becomes vulnerable to the destruction of the database or to unauthorized modification of the database.
8. The Cost of using a DBMS
Conventional data processing systems are typically designed to run a number of well-defined, preplanned processes. Such systems are often “tuned” to run efficiently for the processes that they were designed for. Although the conventional systems are usually fairly inflexible in that new applications may be difficult to implement and/or expensive to run, they are usually very efficient for the applications they are designed for.
The database approach on the other hand provides a flexible alternative where new applications can be developed relatively inexpensively. The flexible approach is not without its costs and one of these costs is the additional cost of running applications that the conventional system was designed for. Using standardized software is almost always less machine efficient than specialized software.
Q. 8. List five significant differences between a file-processing system and a DBMS.
Ans. Before differentiating between file and database systems, there be need to understand the DBMS and its component. Let us consider an organization have a huge amount (collection) of data on its different departments, its employees, its products, sale and purchase order etc. As we know such type of data is accessed simultaneously by different and several employees. Now some users apply number of queries and want answers quickly. If data is stored in the files, then it will create a problem of slow processing. As we try to deal with this type of data management problem by storing the data in a collection of operating system files. Such type of techniques creates number of problems or drawbacks, which are discussed as below:
1. As we have not 1000GB main memory (primary memory) to store the data, so we store the data in some permanent storage device (secondary memory) like magnetic disk or magnetic tape etc. So file-oriented system fails in primary memory cases and we apply data base management system to store the data files permanently.
2. Suppose if we have such a large amount of primary memory on a 16 bit or 32 bit computer system, then there be a problem occur in file based system to use the data by direct or random addressing. Also we cannot call more then 2GB or 4Gb of data direct to the primary memory at a time. So there be need a database program to identify the data.
3. Some programs are too lengthy and complex which cannot store large amount of data in the files related to the operating systems. But a database system made it simple and fast.
4. We cannot change and access file-oriented data simultaneously, so we have requirement a type of system which can be used to access the large amount of data concurrently.
5. Also we cannot recall or recover the file-oriented data, but centralized database management solve such type of problem.
6. File oriented operating system provide only a password mechanism for security, but this is not successful in case of number of users are accessing the same data by using the same login.
At end we can sat that a DBMS is a piece of software that is designed to make the processing faster and easier.
Q 9 Describe major advantages of a database system over file system Or Discuss the DBMS and File processing system Also give the limitations of file processing system
Ans. TRADITIONAL FILE PROCESSING
Data are organized, stored, and processed in independent files of data records. In the traditional file processing approach, each business application was designed to use one or more specialized data files containing only specific types of data records
TRADITIONAL FILE SYSTEM OR FILE ORIENTED APPROACH
The business computers of 1980 were used in processing of business records and produce information using file oriented approach or file processing environment At that time that system was reliable and faster than the manual system of record keeping and processing In this system the data is organized in the form of different files. Since that system was the collection of files - so we can say it was a file-oriented system. Following terms was commonly used in this approach or the features of File oriented system.
1. Master file
The file that is created only once i.e. at the starting of computerization or a file which rarely changes. For example: In a bank master file the account no, name and balance are entered only once and less frequently changes.
2. File activity ratio
The number of records processed one run divided by total number of records. For example: if we changes 100 records from a bank file containing 200 records then file activity ratio is 100/200 0.5. It should be noted that this ratio of master file is less.
3. Transaction file
A file that is created repeatedly after regular interval of time. For example: the payroll file of employee is updated at the end of every month.
4. File volatility ratio
It is the number of records updated in a transaction file divided by total number of records. The file volatility ratio of transaction file is very high.
5. Work file
A temporary file that helps in sorting and merging of records from one file to other.
6. File organization
It means the arrangement of records in a particular order. There were three types of file organizations
In this system each dept has its own files designed for local applications. Each department has its own data processing staff, set of policies, working rules and report formats. It means programs were depending on the file structure or format of file. If the structure of file changes, the program has also to be changed. These days the file oriented approach is still used but has following limitations:
LIMITATIONS OF FILE ORIENTED APPROACH
• Duplicate data
Since all the files are independent of each other. So some of the fields or files are stored more than once. Hence duplicacy is more in case of file approach but dbms has controlled duplicacy.
• Separated and isolated data
To make a decision, a user might need data from two separate files. First, analysts and programmers to determine the specific data required from each file and the relationships between the data evaluated the files. Then applications could be written in a third generation language to process and extract the needed data. Imagine the work involved if data from several files was needed!
• Inconsistency
In this system, data is not consistent. If a data item is changed the all the files containing that data item need to be changed and updated properly. If all the files are not updated properly there may be high risk of inconsistency. DBMS have data consistency.
• Poor data integrity
A collection of data has integrity. A file is said to be have data integrity - it means a item is not be stored in duplicate manner. It has been seen that file oriented system have poor data integrity control. Data integrity has been achieved in DBMS.
• Every operation is programmable
The processing tasks like searching, editing, deletion etc should have separate programs. It means there were no functions available for these operations. DBMS have ready-made commands for such operations.
• Data inflexibility
Program-data interdependency and data isolation limited the flexibility of file processing systems in providing users with ad hoc information requests. Because designing applications was so programming-intensive, MIS department staff usually restricted information requests Therefore, users often resorted to manual methods to obtain needed information.
• Concurrency problem
It means using a same record at same time. This problem was common in file approach but can be controlled in DBMS.
• Application programs are dependent on the file format:
In file processing system the physical formats of the files are entered in the programs. The change in file means change in program and vice versa. No such problem in DBMS.
• Poor data security
All the files are stored in the flat form or text files. These files can be easily located and trapped because file approach, has no data security.
• Difficult to represent the complex objects:
Some the objects may be of variable length records can be computerized using this approach. DBMS has capability to handle fixed-length records as well as variable-length records.
• Can not support heavy databases:
The databases on the Internet can be handled by the files system - but DBMS like oracle is used for heavy data base applications. On the other hand the DBMS have following advantages.
• Difficulty in representing data from the user’s view
To create useful applications for the user, often data from various files must be combined. In file processing it was difficult to determine relationships between isolated data in order to meet user requirements.
PROBLEMS OF FILE PROCESSING
The file processing approach finally became too cumbersome, costly, and inflexible to supply the information needed to manage modem businesses. It was replaced by the database management approach. File processing systems had the following major problems:
• Data Redundancy
Independent data files included a lot of duplicated data; the same data was recorded
and stored in several files. This data redundancy caused problems when data had to
be updated, since separate file maintenance programs had to be developed and
coordinated to ensure that each file was properly updated. Unfortunately, a lot of
inconsistencies occurred among data stored in separate files.
• Lack of Data Integration
Having independent files made it difficult to provide end users with information for
ad hoc requests that required accessing data stored in several different files. Special
computer programs had to be written to retrieve data from each independent file. This
was so difficult, time-consuming, and costly for some organizations that it was
impossible to provide end users or management with such information.
• Data Dependence
In file processing systems, major components of the system - the organization of files,
their physical locations of storage hardware, and the application software used to
access those files — depended on one another in significant ways. Changes in the
format and structure of data and records in a file required that changes be made to all
of the programs that used that file. This program maintenance effort was a major
burden of file processing systems.
• Other Problems
It was easy for data elements to be defined differently by different end users and
applications. Integrity of the data was suspect because there was no control over their
use and maintenance by authorized end users.
Q.10. What are the various types of database uses?
Ans. Without user all o the above said components (data, hardware & software) are meaning less. User can collect the data, operate and handle the hardware. Also operator feeds the data and arranges the data in order by executing the software. Users are of mainly of four types. These are:
(a) Naïve user
Naïve user has no knowledge of database system and its any supporting software. These are used at the end form. These are like a layman, which have little bit knowledge or computer system. These users are mainly used for collecting the data on the notebooks or on the pre-deigned forms. An automated teller machine (ATMs) user are in these categories. Naïve user can work on any simple GUI base menu driven system. Internet using non-computer based person are in this form.
(b) End User or Data Entry Operators
Data entry operators are preliminary computer based users. The function of data entry operators are only to operate the computer (start! stop the computer) and feed or type the collected information (data) in menu driven application program and to execute it according to the analyst’ requirement. These user are also called On line users. These user communicate the database directly via an on line terminal or indirectly via a user interface. These users require certain amount of expertise in the computer programming language, but require complete knowledge of computer operations.
(c) Application programmer
He is also called simple programmer. The working of application programmer is to develop a new project i.e. program for a particular application or modify an existing program. Application programmer works according to some instructions given by database administrator (DBA). Application programmer can handle all the programming language like Fortran, Cobol, dbase etc.
(d) DBA (Data Base Administrator)
DBA is a major user. DBA either a single person or a group of persons. DBA is only the custodian of the business firm or organization but not the owner of the organization. As bank manager is the DBA of a bank, who takes care about the bank money and not use it. Only DBA can handle the information collected by end user and give the instructions to the application programmer for developing a new program or modifying an existing program. DBA is also called an overall controller of the organization. In computer department of a firm either system analysts or an EDP (Electronic Data Processing) Manager works as DBA. In other words DBA is the overall controller of complete hardware and software.
RESPONSIBILITIES OF DBA
As we know DBA is the overall commander of a computer system, so it has number of duties, but some of his/her major responsibilities are as follows:
Q11. Discuss the architecture of database management system.
Ans. DBMS ARCHITECTURE
There are many different framework have been suggested for the DBMS over the last several year. The generalized architecture of a database system is called ANSI/SPARC (American National Standards Institute/Standards Planning and Requirements Committee) model.
In 1972, a final report about database is submitted by ANSI (American National Standard Institute) and SPARC (Standard Planning And Requirement Committee). According to this approach, three levels of a database system was suggested and they are:
• External view (Individual user view)
• Conceptual View (Global or community user view)
• Internal level (physical or storage view).
For the system to be usable, it must retrieve data efficiently. This concern has led to the design of complex data structures for the representation of data in the database. Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify users’ interactions with the system.
These three views or levels of the architecture are as shown in the diagram as follows:
OBJECTIVES OF THREE LEVEL ARCHITECTURE
The database views were suggested because of following reasons or objectives of levels of a database:
1. Make the changes easy in database when some changes needed by environment.
2. The external view or user views do not depend upon any change made ii other view. For example changes in hardware, operating system or internal view should not change the external view.
3. The users of database should not worry about the physical implementation and internal working of database system.
4. The data should reside at same place and all the users can access it as per their requirements.
5. DBA can change the internal structure without effecting the user’s view.
6. The database should be simple and changes can be easily made.
7. It is independent of all hardware and software.
All the three levels are shown below
External/View level
The highest level of abstraction where only those parts of the entire database are included which are of concern to a user. Despite the use of simpler structures at the logical level, some complexity remains, because of the large size of the database. Many users of the database system will not be concerned with all this information. Instead, such users need to access only a part of the database. So that their interaction with the system is simplified, the view level of abstraction is defined. The system may provide many views for the same database.
Databases change over time as information is inserted and deleted. The collection of information stored in the database at a particular moment is called an instance of the database. The overall design of the database is called the database schema. Schemas are changed infrequently, if at all.
Database systems have several schemas, partitioned according to the levels of abstraction that we discussed. At the lowest level is the physical schema; at the intermediate level is the logical schema and at the highest level is a subschema.
The features of this view are
• The external or user view is at the highest level of database architecture.
• Here only one portion of database will be given to user.
• One portion may have many views.
• Many users and program can use the interested part of data base.
• By creating separate view of database, we can maintain security.
• Only limited access (read only, write only etc) can be provided in this view.
For example: The head of account department is interested only in accounts but in library information, the library department is only interested in books, staff and students etc. But all such data like student, books, accounts, staff etc is present at one place and every department can use it as per need.
Conceptual/Logical level
Database administrators, who must decide what information is to be kept in the database, use this level of abstraction. One conceptual view represents the entire database. There is only one conceptual view per database.
The description of data at this level is in a format independent of its physical representation. It also includes features that specify the checks to retain data consistence and integrity.
The features are:
• The conceptual or logical view describes the structure of many users.
• Only DBA can be defined it.
• It is the global view seen by many users.
• It is represented at middle level out of three level architecture.
• It is defined by defining the name, types, length of each data item. The create table
commands of Oracle creates this view.
• It is independent of all hardware and software.
Internal/Physical level
The lowest level of abstraction describes how the data are stored in the database, and what relationships exist among those data. The entire database is thus described in terms of a small number of relatively simple structures, although implementation of the simple structures at the logical level may involve complex physical-level structures, the user of the logical level does not need to be aware of this complexity.
The features are :
• It describes the actual or physical storage of data.
• It stores the data on hardware so that can be stored in optimal time and accessed
in optimal time.
• It is the third level in three level architecture.
• It stores the concepts like:
• B-tree and Hashing techniques for storage of data.
• Primary keys, secondary keys, pointers, sequences for data search.
• Data compression techniques.
• It is represented as
FILE EMP [
INDEX ON EMPNO
FIELD = {
(EMPNO: BYTE (4),
ENAME BYTE(25))]
Mapping between views
• The conceptual/internal mapping:
o defines conceptual and internal view correspondence
• specifies mapping from conceptual records to their stored counterparts
o An external/conceptual mapping:
• defines a particular external and conceptual view correspondence
• A change to the storage structure definition means that the conceptual/internal
mapping must be changed accordingly, so that the conceptual schema may remain
invariant, achieving physical data independence.
• A change to the conceptual definition means that the conceptual/external mapping
must be changed accordingly, so that the external schema may remain invariant,
achieving logical data independence.
Q. 12. Write a note on Database Language And Interfaces.
Ans. Some main types of languages and facilities are provided by DBMS.
1. Programming Language
2. Data Manipulation Language
3. Data Definition Language
4. Schema Description Language
5. Sub-Schema Description Language
6. SQL (Structured Query Language)
1. Programming Language
All the programming language like Cobol, Fortran, C, C++, Pascal etc. has syntax and semantics. These all have structured and logical structure, so these all commonly used to solve general and scientific problems. All the business-oriented problems can be solved by the three GL and Fourth Gt.
2. DML
Some language that gives instructions to the programming language and other languages is called data manipulation language (DML). This language creates interface (linkage) between user and application program. This is extension of the program of the language used to manipulate data in the database. DML involves’ retrieval of data from the database, insertion of new data into the database and deletion or modification of the existing data. Some data manipulation operations are also called QUERY’ or• QUERY OPERATIONS. A Query is a statement in DML that request the retrieval of data from the database i.e. to search the data according to the user requirement. The subset of the DML used to operate the query is known as Query Language. DML provides commands to select & retrieve data from the database. Commands used in the DML are to insert, to update & to delete the records. The commands have different syntax for different programming language. For example, Fortran, Cobol, C etc. provide such type of facility with the help of database management system. The data manipulation function provided by DBMS can be invoked in a application program directly by procedural calls or by processors statement. This procedure can be done by the compiler. The DML can become
procedural language according to the user requirement. If the DML is non-procedural than user will indicate only what is to be retrieved. In both the cases the DBMS optimize the exact answer by using DML.
3. DDL
Database management system provides a facility known as Data Definition Language or data description language (DDL). DDL can be used to define conceptual schema (Global) and also give some details about how to implement this schema in the physical devices used to store the data. The definition includes all the entity sets and their associated attributes as well as the relationship among the entities set. The definitions also have some constraints which are used in DML. DDL also have some meta-data (it is data about the data in database). Meta-data have data dictionary, directory, system catalog to describe data about data. The dictionary contains the information about the data stored in the database and it is consulted by DBMS before any data manipulation operations. The DBMS maintain the information on the file structure and also used some access method to access the data efficiently. DDL is used for the help of DML.
We can say that there is another language - Data Sub Language (DSL) which is the
combination of both DML and DDL.
DSL = DML + DDL
4. Schema Description Language (SDL) or Schema
It is necessary to describe the organization of the data in a formal manner. The logical and physical database descriptions are used by DBMS software. The complete and overall description of data is referred to as schema. The schema and subschema words are brought into DBMS by CODASYL (Conference on data system language committee) and also by the CODASYL’s database task group. Schema is also referred to as conceptual model or global view (community view) of data. Suppose a complete description of collected data having all classes and student data, all employees (teaching & non-teaching) data and other concept of data related to the college is called Schema of the college. We can say that we relate whole college data logically, which is called schema.
5 Sub Schema Description language
The term schema is used to mean an overall chart of the data items, types and record type stored in a database. The term sub-schema refers to an application programmer’s view of data he uses. Sub-schema is the part of schema. Many different sub-schemas can be derived from one schema. An application programmer does not use whole data i.e. full schema, e.g. As in an organization, purchase-order for the maintenance department is the sub-schema of the whole schema description of the purchase department in the hole industry. Two or more than two application- programmers use the different sub-schemas. One person named A uses the sub-schema purchase-order whereas programmer B uses the sub-schema supplier. Their operations and views are different according to their own sub-schema but both combined these two sub-schemas on the basis of a common key.
6. Structured Query Language (SQL):
SQL organized with the system R. System R means it is relational language. SQL is also called Structure Query Language. This language was developed in 1974 at IBM’s San Jose Research Center. The purpose of this language is to provide such non-procedural commands which are used for validation of the data and for searching the data. By using this language we can do any query about the data. SQL is sometimes named by SQUARE language. This language was helpful for both DDL and DML for the system R. Some SQL are also called Relational languages and used in a commercial RDBMS. Some commonly used SQL are ORACLE, INGRES, SYBASE etc. SQL resembles relational algebra and relational calculus in a relational system approach.
DBMS INTERFACES
Types of interfaces provided by the DBMS include:
Menu-Based interfaces for Web Clients or Browsing
• Present users with list of options (menus)
• Lead user through formulation of request
• Query is composed of selection options from menu displayed by system.
Forms-Based Interfaces
• Displays a form to each user
• User can fill out form to insert new data or fill out only certain entries.
• Designed and programmed for naïve users as interfaces to canned transactions.
Graphical User Interfaces
• Displays a schema to the user in diagram form. The user can specify a query by manipulating the diagram. GUIs use both forms and menus.
Natural Language Interfaces
• Accept requests in written English or other languages and attempt to understand them.
• Interface has its own schema, and a dictionary of important words. Uses the schema and dictionary to interpret a natural language request.
Interfaces for Parametric Users
• Parametric users have small set of operations they perform.
• Analysts and programmers design and implement a special interface for each class of naïve users.
• Often a small set of commands included to minimize the number of keystrokes required. (I.e. function keys)
Interfaces for the DBA
• Systems contain privileged commands only for DBA staff.
• Include commands for creating accounts, setting parameters, authorizing accounts,
changing the schema, reorganizing the storage structures etc.
Q.13. Describe the Classification of Database Management Systems.
Ans. Categories of DBMS
DBMS (Database Management System)
It is software to manage many databases. A DBMS is a software component or logical tool to handle the databases. All the queries from user about the data stored in the database will be handled by DBMS. There are many DBMSs available in market like dBase, FoxBASE, FoxPro, Oracle, Unify, Access etc.
RDBMS (Relational Data Base Management System)
Each database system uses a approach to store and maintain the data. For this purpose three data models were developed like Hierarchical model, Network Model and Relational Model. In the hierarchical model the data were arranged in the form of trees, in network model the data was arranged in the form of pointers and network and in relational model the data was arranged in the form of tables. The data stored in the form tables is easy to stored, maintain and understand. Many DBMS has been developed using approach of hierarchical and network models. Any DBMS that uses the relational data model for data storage and modeling Is called RDBMS. In RDBMS we can create relations among tables and can access the information from tables - while tables store stored in separately file and may or may not have identical structures. The RDBMS is based upon the rules given by Dr. Codd known as Dr. Codd’s Rules.
HDBMS (Heterogeneous DBMS)
In RDBMS we store the information related to the same kind of data like student data, teacher data, employee data etc. In HDBMS we store the data in the database which is entirely different.
DDBMS (Distributed DBMS)
During 1950s & 1960s there was trend to use independent or decentralized system. There was a duplication of hardware and facilities. In a centralized database system, the DBMS & data reside at a single place and all the control & location is limited to a single location, but the PCs are distributed geographically. Distributed system is parallel computing using multiple independent computers communicating over a network to accomplish a common objective or task. The type of hardware, programming languages, operating systems and other resources may vary drastically. It is similar to computer clustering with the main difference being a wide geographic dispersion of the resources
For example an organization may have an office in a building and have many sub- buildings that are connected using LAN. The current trend is towards distributed systems. This is a centralized system connected to intelligent remote sites. Each remote site have own storage and processing capabilities - but in a centralized or network there is a single storage.
OODBMS (Object Oriented DBMS)
Object-Oriented Database Management Systems (OODBMSs) have been developed to support new kinds of applications for which semantic and content are represented more efficiently with the object model. Therefore, the OODBMSs present the two main problems:
• Impedance mismatch: It is basically due to two reasons. Firstly, the no suitable abstractions of the operating systems, so when a client object has to invoke a method that is offered by a server object, and both objects are not into the same address space, it is necessary to use the mechanisms that are offered by the operating system, and these mechanisms do not became proper to the object oriented paradigm since they are oriented to communicate processes. In order to solve this problem intermediate software is included (e.g. COM or CORBA).In the second place, an impedance mismatch is also caused every time that the object-oriented applications need to use the operating system services.
• Interoperability problem between object models: Although different system elements use the object-oriented paradigm, an interoperability problem can exist between them. So, an application implemented using the C++ language, with the C++ object model, can easily interact with its objects, but when it wants to use objects that have been created with another programming language or another object-oriented database an interoperability problem appears.
The programming LANGUAGES like C, FORTRAN, PASCAL & FORTRAN use the POP (Procedure Oriented Approach) to develop applications, but the current trend is towards OOP (Object Oriented Programming). The languages like C++, Java, Oracle, C# (C Sharp). Visual Basic 6 use this approach. Many databases have been developed that follows this approach (OI approach) like Oracle. So the DBMS which follow OOP approach is called OODBMS.
Q. 14. Explain the difference between physical and logical data independence.
Ans. One of the biggest advantages of database is data independence. It means we can change the conceptual schema at one level without affecting the data at other level. It means we can change the structure of a database without affecting the data required by users and program. This feature was not available in file oriented approach. There are two types of data independence and they are:
1. Physical data independence
2. Logical data independence
Data Independence The ability to modify schema definition in on level without affecting schema definition in the next higher level is called data independence. There are two levels of data independence:
1. Physical data independence is the ability to modify the physical schema without
causing application programs to be rewritten. Modifications at the physical level are occasionally necessary to improve performance. It means we change the physical storage/level without affecting the conceptual or external view of the data. The new changes are absorbed by mapping techniques.
2. Logical data independence in the ability to modify the logical schema without
causing application program to be rewritten. Modifications at the logical level are necessary whenever the logical structure of the database is altered (for example, when money-market accounts are added to banking system).
Logical Data independence means if we add some new columns or remove some columns from table then the user view and programs should not changes. It is called the logical independence. For example: consider two users A & B. Both are selecting the empno and ename. If user B add a new column salary in his view/table then it will not effect the external view user; user A, but internal view of database has been changed for both users A & B. Now user A can also print the salary.
It means if we change in view then program which use this view need not to be changed.
Logical data independence is more difficult to achieve than is physical data independence, since application programs are heavily dependent on the logical structure of the data that they access.
Logical data independence means we change the physical storage/level without effecting the conceptual or external view of the data. Mapping techniques absorbs the new changes.
Q. 15. What is physical data independence?
Ans. Physical data independence is the ability to modify the physical schema without causing application programs to be rewritten. Modifications at the physical level are occasionally necessary to improve performance. It means we change the physical storage/level without affecting the conceptual or external view of the data. The new changes are absorbed by mapping techniques.
Q. 16. What do you mean by data redundancy?
Ans. Redundancy is unnecessary duplication of data. For example if accounts department and registration department both keep student name, number and address.
Redundancy wastes space and duplicates effort in maintaining the data.
Redundancy also leads to inconsistency.
Inconsistent data is data which contradicts itself - e.g. two different addresses for a given student number. Inconsistency cannot occur if data is represented by a single entry (i.e. if there is no redundancy).
Controlled redundancy
Some redundancy may be desirable (for efficiency). A DBMS should be aware of it, and take care of propagating updates to all copies of a data item.
This is an objective, not yet currently supported.
Q. 17. What do you man by database schema?
Ans. It is necessary to describe the organization, of the data in a formal manner. The logical and physical database descriptions are used by DBMS software. The complete and overall description of data is referred to as schema, The schema and subschema words are brought into DBMS by CODASYL (Conference on data system language1 committee) and also by the CODASYL’s database task group. Schema is also referred to as conceptual model or global view (community view) of data. Suppose a complete description of collected data having all classes and student data4 all employees (teaching & non-teaching) data and other concept of data related to the college is called Schema of the college. We can say that we relate whole college data logically, which is called schema.
Q. 18. Explain the distinctions among the terms primary key, candidate key and superkey.
Or
What is the significance of foreign key? Or What are the various keys?
Ans. Keys: As there are number of keys can be defined, but some commonly and mainly used keys are explained as below:
1. Primary Key
A key is a single attribute or combination of two or more, attributes of an entity that is used to identify one or more instances of the set. The attribute Roll # uniquely identifies an instance of the entity set STUDENT. It tells about student Amrita having address 101, Kashmir Avenue and phone no. 112746 and have paid fees 1500 on basis of Roll No. 15. The 15 is unique value and it gives unique identification of students So here Roll No is unique attribute and such a unique entity identifies called Primary Key. Primary key cannot be duplicate.
From the definition of candidate key, it should be clear that each relation must have at least one candidate key even if it is the combination of all the attributes in the relation since all tuples in a relation are distinct. Some relations may have more t one candidate keys.
As discussed earlier, the primary key of a relation is an arbitrarily but permanently selected candidate key. The primary key is important since it is the sole identifier for the tuples in a relation. Any tuple in a database may be identified by specifying relation name, primary key and its value. Also for a tuple to exist in a relation, it must be identifiable and therefore it must have a primary key. The relational data model therefore imposes the following two integrity constraints:
(a) No component of a primary key value can be null;
(b) Attempts to change the value of a primary key must be carefully controlled.
The first constraint is necessary because if we want to store information about some entity, then we must be able to identify it, otherwise difficulties are likely to arise. For example, if a relation
CLASS (STUNO, LECTURER, CNO)
has (STUNO, LECTURER) as the primary key then allowing tuples like
3123 NULL CP302
NULL SMITH CP302
is going to lead to ambiguity since the two tuples above may or may not be identical and the integrity of the database may be compromised. Unfortunately most commercial database systems do not support the concept of primary key and it would be possible to have a database state when integrity of the database is violated.
The second constraint above deals with changing of primary key values. Since the primary key is the tuple identifier, changing it needs very careful controls. Codd has suggested three possible approaches:
Method 1
Only a select group of users be authorised to change primary key values.
Method 2
Updates on primary key values be banned. If it was necessary to change a primary key, the tuple would first be deleted and then a new tuple with new primary key value but same other values would be inserted. Of course, this does require that the old values of attributes be remembered and be reinserted in the database.
Method 3
A different command for updating primary keys be made available. Making a distinction in altering the primary key and another attribute of a relation would remind users that care needs to be taken in updating primary keys.
2. Secondary Key
The ke1 which is not giving the unique identification and have duplicate infonna6o is called secondary key, e g in a STUDENT entity if Roll Number is the primary key, then Name of the student, address of the student, Phone number of the student and the fees paid by the student all are secondary keys. A secondary key is an attribute or combination of attributes that not be primary key and have duplicate data. In otherworlds secondary key is used after the identification of the primary key. Also we can identify the data from the combination of the secondary keys.
3. Super Key
If we add additional attributes to a primary key, the resulting combination would still uniquely identify an instance of the entity set Such keys are called super keys A primary key is therefore a minimum super key For example, if DOB (date of birth field or attribute) is the primary key, then by adding some additional information about the day of the month key in the DOB field, this field or attribute becomes more powerful and useful Such type of key is called super key Super key are less used in a small database file. Now these days it has less importance, but due to its feature, this key gives the complete description of the database.
4. Candidate Key
There may be two or more attributes or combination of attributes that uniquely identify an instance of an entity set These attributes or combination of attributes are called candidate keys. Candidate key also gives unique identification. Candidate key comes with primary key. A candidate is a combination of two or more attributes e.g. if Roll No. and student name are two different attributes then we combine these two attribute and form a single attribute Roll No. & Name, then this combination is the candidate key and it is unique and gives unique identification about a particular roll no. and about particular name.
5. Alternative Key
A candidate key which is not the primary key is called alternative key, e.g. if Roll No. and Name combination is the candidate key, then if Roll No, is the primary key, other key in the candidate key is Name. Name attribute work as the alternative key.
6 Foreign Key
Suppose there are some relations as: SP (S#, P#, QTY), relation S (S#, S Name, status, city) and relation P (P#, PName, Color, Weight, City). We know entity SP is defined as the relationship of the relation S and the relation P. These two relations has sand P# as the Primary Keys in relation S and P respectively, but in the relation SP we can take either # as the primary key or P# as the primary key. Suppose if we take P# as the primary key, then other primary key S# which is actually the primary key, but do not work as primary key in the relation SF is called the Foreign Key. If S# is the primary key then P# is the Foreign Key. Similarly in the relation ASSIGNMENT, attribute Emp #, Prod #, Job # are given and if S# and P# are the primary keys, then the Job # key is the Foreign Keys.
Q. 19. What are the major functions of a database administrator?
Ans. RESPONSIBILITIES OF DBA
As we know DBA is the overall commander of a computer system, so it has number of duties, but some of his/her major responsibilities are as follows:
1. DBA can control the data, hardware, and software and gives the instructions to the application programmer, end user and naive user.
2. DBA decides the information contents of the database. He decides the suitable database file structure for arrangement of data. He/She uses the proper DDL techniques.
3. DBA compiles the whole data in a particular order and sequence.
4. DBA decides where data can be stored i.e. take decision about the storage structure.
5. DBA decides which access strategy and technique should be used for accessing the data.
6. DBA communicates with the user by appropriate meeting. DBA co-operates with user.
7. DBA also define and apply authorized checks and validation procedures.
8. DBA also takes backup of the data on a backup storage device so that if data can then lost then it can be again recovered and compiled. DBA also recovers the damaged data.
9. DBA also changes the environment according to user or industry requirement and monitor the performance.
10. DBA should be good decision-maker. The decision taken by DBA should be correct, accurate & efficient.
11. DBA should have leadership quality.
12. DBA liaise with the user in the business to take confidence of the customer about the availability of data.
Q. 20. What do you mean by relationships? Explain different types of relationships.
Ans. Relationships: One table (relation) may be linked with another in what is known as a relationship. Relationships may be built into the database structure to facilitate the operation of relational joins at runtime.
The join operator is used to combine data from two or more relations (tables) in order to satisfy a particular query. Two relations may be joined when they share at least one common attribute. The join is implemented by considering each row in an instance of each relation. A row in relation R1 is joined to a row in relation R2 when the value of the common attribute(s) is equal in the two relations. The join of two relations is often called a binary join.
The join of two relations creates a new relation. The notation ‘R1 x R2’ indicates the join of relations R1 and R2. For example, consider the following:
Note that the instances of relation RI and R2 contain the same data values for attribute B. Data normalisation is concerned with decomposing a relation (e.g. R(A,B,C,D,E) into smaller relations (e.g. R1 and R2). The data values for attribute B in this context will be identical in R1 and R2. The instances of R1 and R2 are projections of
the instances of R(A,B,C,D,E) onto the attributes (A,B,C) and (B,D,E) respectively. A projection will not eliminate data values duplicate rows are removed, but this will not remove a data value from any attribute.
The join of relations RI and R2 is possible because B is a common attribute. The result of the join is:
The row (2 4 5 7 4) was formed by joining the row (2 4 5) from relation R1 to the row (4 7 4) from relation R2. The two rows were joined since each contained the same value for the common attribute B. The row (2 4 5) was not joined to the row (6 2 3) since the values of the common attribute (4 and 6) are not the same.
The relations joined in’ the preceding example shared exactly one common attribute. However, relations may share multiple common attributes. All of these common attributes must be used in creating a join. For example, the instances of relations R1 and R2 in the following example are joined using the common attributes B and C:
The row (6 1 4 9) was formed by joining the row (6 1 4) from relation R1 to the row
(1 4 9) from relation R2. The join was created since the common set of attributes (B and
C) contained identical values (1 and 4). The row (6 1 4) from R1 was not joined to the
row (1 2 1) from R2 since the common attributes did not share identical values - (1 4) in
R1 and (1 2) in R2.
The join operation provides a method for reconstructing a relation that was decomposed into two relations during the normalisation process. The join of two rows, however, can create a new row that was not a member of the original relation. Thus invalid information can be created during the join process.
Now suppose that a list of courses with their corresponding room numbers is required. Relations R1 and R4 contain the necessary information and can be joined using the attribute HOUR. The result of this join is:
This join creates the following invalid information (denoted by the coloured rows):
• Smith, Jones, and Brown take the same class at the same time from two different instructors in two different rooms.
• Jenkins (the Maths teacher) teaches English.
• Goldman (the English teacher) teaches Maths.
• Both instructors teach different courses at the same time.
Another possibility for a join is R3 and R4 (joined on INSTRUCTOR). The result would be:
This join creates the following invalid information:
• Jenkins teaches Math I and Algebra simultaneously at both 8:00 and 9:00.
A correct sequence is to join R1 and R3 (using COURSE) and then join the resulting relation with R4 (using both INSTRUCTOR and HOUR). The result would be:
Extracting the COURSE and ROOM attributes (and eliminating the duplicate row produced for the English course) would yield the desired result:
The correct result is obtained since the sequence (R1 x r3) x R4 satisfies the lossless (gainless?) join property
A relational database is in 4th normal form when the lossless join property can be used to answer unanticipated queries. However, the choice of joins must be evaluated carefully. Many different sequences of joins will recreate an instance of a relation. Some sequences are more desirable since they result in the creation of less invalid data during the join operation.
Suppose that a relation is decomposed using functional dependencies and multi- valued dependencies. Then at least one sequence of joins on the resulting relations exists that recreates the original instance with no invalid data created during any of the join operations.
For example, suppose that a list of grades by room number is desired. This question, which was probably not anticipated during database design, can be answered without creating invalid data by either of the following two join sequences:
The required information is contained with relations R2 and R4, but these relations
cannot be joined directly. In this case the solution requires joining all 4 relations.
The database may require a ‘lossless join’ relation, which is constructed to assure that any ad hoc inquiry’ can be answered with relational operators. This relation may contain attributes that are not logically related to each other. This occurs because the relation must serve as a bridge between the other relations in the database. For example, the lossless join relation will contain all attributes that appear only on the left side of a functional dependency. Other attributes may also be required, however, in developing the lossless join relation.
Consider relational schema R (A, B, C, D), A B and CD. Relations and are in 4th normal form. A third relation however, is required to satisfy the lossless join property. This relation can be used to join attributes B and D. This is accomplished by joining relations R1 and R3 and then joining the result to relation
R2. No invalid data is created during these joins. The relation is the lossless join relation for this database design.
A relation is usually developed by combining attributes about a particular subject or entity. The lossless join relation, however, is developed to represent a relationship among various relations. The lossless join relation may be difficult to populate initially and difficult to maintain - a result of including attributes that are not logically associated with each other.
The attributes within a lossless join relation often contain multi-valued dependencies. Consideration of 4th normal form is important in this situation. The lossless join relation can sometimes be decomposed into smaller relations by eliminating the multi-valued dependencies. These smaller relations are easier to populate and maintain.
Q. 21. What is an ER-diagram? Construct an ER diagram for a hospital with a set of patients and a set of doctors. Associate with each patient a log o1 the various tests and examinations conducted.
Or
Discuss in detail the ER diagram.
Or
What is one to many relationship? Give examples.
Or
Draw an ER diagram for a library management system, make suitable assumptions. Describe various symbols used in ER. diagram.
Or
Construct an ER diagram for a university registrar’s office. The office maintains data about each class, including the instructor, the enrollment and the time and place of the class meetings. For each student class pair, a grade is recorded also design a relational database for the said I.R. diagram.
Ans. E-R model grew out of the exercise of using commercially available DBMS to model application database. Earlier DBMS were based on hierarchical and network approach. E-R is a generalization of these models. Although it has some means of describing the physical database model, it is basically useful in the design of logical database model. This analysis is then used to organize data as a relation, normalizing relations and finally obtaining a relational database model.
The entity-relationship model for data uses three features to describe data. These are:
1. Entities, which specify distinct real-world items in an application.
2. Relationships, which connect entities and represent meaningful dependencies
between them.
3. Attributes, which specify properties of entities and relationships.
We illustrate these terms with an example. A vendor supplying items to a company, for example, is an entity. The item he supplies is another entity. A vendor supplying items are related in the sense that a vendor supplies an item. The act of supplying• defines a relationship between a vendor and an item. An entity set is a collection of similar entities. We can thus define a vendor set and an item set. Each member of an entity set is described by some attributes. For example, a vendor may be described by the attributes:
(vendor code, vendor name, address)
An item may be described by the attributes:
(item code, item name)
Relationship also can be characterized by a number of attributes. We can think of the relationship as supply between vendor and item entities: The relationship supply can be described by the attributes: (order no. date of supply)
Relationship between Entity Sets
The relationship between entity sets may be many-to-many (M: N), one-to-many (1: M), many-to-one (M: 1) or one-to-one (1:1). The 1:1 relationship between entity sets E1 and E2 indicates that for each entity in either set there is at most one entity in the second set that is associated with it. The 1: M relationship from entity set E1 to E2 indicates that for an occurrence of the entity from the set E1, there could be zero, one or more entities from the entity set E2 associated with it. Each entity in E2 is associated with at most one entity in the entity set E1. In the M: N relationship between entity sets E1 and E2, there is no restriction to the number of entities in one set associated with an entity in the other set. The database structure, employing the E-R model is usually shown pictorially using entity-relationship (E-R) diagram.
To illustrate these different types of relationships consider the following entity sets: DEPARTMENT, MANAGER, EMPLOYEE, and PROJECT
The relationship between a DEPARTMENT and a MANAGER is usually one-to- one; there is only one manager per department and a manager manages only one department. This relationship between entities is shown in Figure. Each entity is represented by a rectangle and the relationship between them is indicated by a direct line. The relationship for MANAGER to DEPARTMENT and from DEPARTMENT to MANAGER is both 1:1. Note that a one-to-one relationship between two entity sets does not imply that for an occurrence of an entity from one set at any time there must be an occurrence of an entity in the other set. In the case of an organization, there could be times when a department is without a manager or when an employee who is classified as a manager may be without a department to manage. Figure shows some instances of one-to-one relationships between the entities DEPARTMENT and MANAGER.
A one-to-many relationship exists from the entity MANAGER to the entity EMPLOYEE because there are several employees reporting to the manager. As we just pointed out, there could be an occurrence of the entity type MANAGER having zero occurrences of the entity type EMPLOYEE reporting to him or her. A reverse relationship, from EMPLOYEE to MANAGER, would be many to one, since many employees may be supervised by a single manager. However, given an instance of the entity set EMPLOYEE, there could be only one instance of the entity set MANAGER to whom that employee reports (assuming that no employee reports to more than one manager). The relationship between entities is illustrated in Figures shows some instances of this relationship.
Figure: Instances of 1: M Relationship
The relationship between the entity EMPLOYEE and the entity PROJECT can be derived as follows: Each employee could be involved in a number of different projects, and a number of employees could be working on a given project. This relationship between EMPLOYEE and PROJECT is many-to-many. It is illustrated in Figures shows some instances of such a relationship.
Figure: M : N Relationship
In the entity-relationship (E-R) diagram, entities are represented by rectangles, relationships by a diamond-shaped box and attributes by ellipses or ovals. The following
E-R diagram for vendor, item and their relationship is illustrated in Figure (a).
Representation of Entity Sets in the form of Relations
The entity relationship diagrams are useful in representing the relationship among entities they show the logical model of the database. E-R diagrams allow us to have an overview of the important entities for developing an information system and other relationship. Having obtained E-R diagrams, the next step is to replace each entity set and relationship set by a table or a relation. Each table has a name. The name used is the entity name. Each table has a number of rows and columns. Each row contains a number of the entity set. Each column corresponds to an attribute. Thus in the E-R diagram, the vendor entity is replaced by table below.
Table: Table For the Entity Vendor
The above table is also known as a relation. Vendor is the relation name. Each row of a relation is called a tuple. The titles used for the columns of a relation are known as relation attributes. Each tuple in the above example describes one vendor. Each element of a tuple gives specific property of that vendor. Each property is identified by the title used for an Attribute column. In a relation the rows may be in any order. The columns may also be depicted in any order. No two rows can be identical.
Since it is inconvenient to show the whole table corresponding to a relation, a more concise notation is used to depict a relation. It consists of the relation name and its attributes. The identifier of the relation is shown in bold face.
A specified value of a relation identifier uniquely identifies the row of a relation.
If a relationship is M: N, then the identifier of the relationship entity is a composite identifier, which includes the identifiers of the entity sets, which are related. On the other hand, if the relationship is 1:N, then the identifier of the relationship entity is the identifier of one of the entity sets in the relationship.. For example, the relations and identifiers corresponding to the E-R diagram of Figure are as shown:
Figure: E-R Diagram for Teacher, Student and their relationship
Teacher (Teacher-id, name, department, address)
Teaches (Teacher-id, Student-id)
Student (Student-id, name, department, address)
One may ask why an entity set is being represented as a relation. The main reasons
are case of storing relations as flat files in a computer and, more importantly, the existence of a sound theory on relations, which ensures good database design. The raw relations obtained as a first step in the above examples are transformed into normal relations. The rules for transformations called normalization are based on sound theoretical principles and ensure that the final normalized relations obtained reduce duplication of data, ensure that no mistake occur when data are added or, deleted and simplify retrieval of required data.
Q. 22. Discuss relational approach of database management system? Explain with the help of suitable relational operations to demonstrate insert, delete and update functions.
Or
What is relational model compare and contrast it with network and hierarchical model.
Ans. Database models are collection of conceptual tools for describing data
semantics and data constraints.
DBMS has number of ways to represent the data, But some important and commonly
used model are of four types, among which three are mainly used. These are:
I. Relational Model or Relational Approach
II. Hierarchical Model or Hierarchical Approach
III. Network Model or Network Approach
I. Relational Data Model
Relational Data Model has been developed from the research in deep and by testing and by trying through many stages. This model has advantages that it is simple to implement and easy to understand. We can express queries by using query language in this model. In this model relation is only constructed by setting the association among the attributes of an entity as well the relationship among different entities. One of the main reasons for introducing this model was to increase the productivity of the application programmers by eliminating the need to change application programmer, when a change is mode to the database. In this user need not know the exact physical structure. Data structure used in the data model represented by both entities and relationship between them. We can explain relation view of data on relational approach on the basis of following example.
Suppose there are three tables in which data is organized. These tables are Supplier tables or S table or S relation, Part table or P table or P relation, Shipment table of SP table or SP relation. The S table further has some fields or attributes. These are supplier number (S#), supplier name, status of the supplier and the city in which the supplier resides. Similarly P table has field part number (P#), part name, part color, weight of the part and location where the part is stored. Also SP table contains field supplier number (S#), part number (P#) and the quantity which supplier can ship. Each supplier s unique supplier number S# and similarly each part has unique part umber P#. These three tables are called relational table. S table is also called S-relation because it gives the relationship between different attributes. These attributes are field name and in the form of column. Rows of such table are called tuples. Pool of values in a particular w and attributes called domain. In other words domain is a pool of values from which actual value appearing in a given column are drawn. For example, in S table - S#, Sname, S-status are the attributes and s1, s2, s3 are domains. A relational table or relationship can be defined as:
Definition: A relation represented by table having n column, defined on domain Dl, D2, .... Dn is a subset of cartesian product DI x D2 x……x Dn.
Another definition is : It is collection of Dl, D2, D3,…….Dn then R is relation on these n sets if these n sets are ordered in n tuples such that each value of attribute belong to Dl, D2,…….Dn. These three relations are represented by diagram:
S table (Entity) or S Relation:
As in the .S table insertion, deletion and modifications can be done easily.
II. Hierarchical Model
It is a tree structure. It has one root and many branches, we call it parent child relationship. In this a single file has relation with many files and similarly we can say that it is the arrangement of individual data with group data. In an organization chart manager is the parent root and employees working under the manager are their children The representation of this model is expressed by linking different tables. Such type of representation is better for a linkage have many relationships with one. Some times it will create ambiguity in designing and defining the association and relationship between
SP table (Entity) or SP Relation:
In hierarchical approach, insertion can be done if a child has a parent and insertion on the child side is easy. Deletion and insertion is easy, but you can’t delete a parent: parent has one or more child. In the parent child relationship updation in parent and child both are difficult.
III. Network Approach
It is a complex approach of DBMS. In this we link all the records by using a chain or pointer. It has many to many relationships. Network approach is created when there are more than one relations in the database system. Network approach starts from on point and after connecting similar type of data it returns back to the same record.
Network approach is more symmetric than the hierarchical structure. In network model insertion at any point is very complex. We can insert only by creating a new record having linkage with other record. Similarly deletion is also complex if we delete any record than chain disconnect and whole structure vanish. Updation is also complex because we cannot change name or any data record because it connected with each other.
Difference between Relational, Hierarchical and Network Approaches:
(A) Relational Approach: Relational Approach (RA) has relationship between different entities and attribute in a particular entity. RA is in tabular form. RA
has one to one relationships. R-A has table in asymmetric form. Insertion, deletion,
updation in R table is very easy. Languages used in RA are SQL, Ingress, Oracle, Sybase. RA is simple in nature. Relational approach creates relationship between different entities and different attributes in the same entity. It is the best approach to represent the data than the other models.
(B) Hierarchical Approach: Hierarchical Approach (HA) creates a linkage between two or more entities. HA has parent child relationship. HA has one to many relationships. HA relationship is in symmetric form by defining parent and their child. Insertion, deletion, updation is little difficult than the RA. HA has IMS language, which is theoretical. It is Complex in nature.
(C) Network Approach: Network Approach (NA) has chain among many entities. NA has chaining technique or pointer technique. NA has many to many relationships. NA relationship is full or completely symmetric form because it has one chain symmetry. Insertion, deletion, updation is very difficult. NA has DBTG (Database Task Group) set hiving different classes & members. More complex than RA & HA.
Q. 23. What is the usage of unified modelling language (UML)?
Ans. UML is a graphical language for visualizing, specifying, constructing and documenting an object oriented software-intensive system’s artifacts.
Q. 24. What are graphical user interfaces?
Ans. A graphical user interface (GUI) is sometime pronounced “gooey” is a method of interacting with a computer through a metaphor of direct manipulation of graphical images and widgets in addition to text. GUI display visual elements such as icon, Windows and other gadgets
Q. 25. Define the term dangling pointer.
Ans. The pointers that points to nothing is called dangling pointer.
Q. 26. Write a short note on Mapping.
Ans. Mappings
• The conceptual/internal mapping:
defines conceptual and internal view correspondence specifies mapping from conceptual records to their stored counterparts
• An external/conceptual mapping:
defines a particular external and conceptual view correspondence
• A change to the storage structure definition means that the conceptual/internal mapping must be changed accordingly, so that the conceptual schema may remain invariant, achieving physical data independence.
• A change to the conceptual definition means that the conceptual/external mapping must be changed accordingly, so that the external schema may remain invariant,
achieving logical data independence.
Q. 27. Distinguish between RDBMS and DBMS.
http://ptucse.loremate.com/dbms/node/2
- Home
- Mission & Vision
- My Personal Docs
- News
- Opinion
- Poetry
- Quotes
- Short Stories
- Lost and Found
- ICT Rules & Legal Bases
- Annual Improvement Plan
- Accomplishments
- NCAE Y3 2012
- Facilities
- Reports/Liquidation
- ICT PTA
- Class Officers
- Students
- CP TLE Competencies
- Log Plans
- Lectures
- Trivia
- Outputs
- Exams
- Linked Online Tests
- Online Quiz
- Demo Outputs
- Review Materials
- Graduates
- Forms
- Certificates
- Manta-laan Publication
- Nite Presentations
- videos
- Linkages
- Online Survey
- Online Evaluations
- Smart Bro
- DTR
- Ans Key
- my picture
Ans. A database is a collection of occurrence of multiple record types containing the relationship between records, data aggregate and data items. A database may be defined as
A database is a collection of interrelated data store together without harmful and unnecessary redundancy (duplicate data) to serve multiple applications
The data is stored so that they are independent of programs, which use the data. A common and control approach is used in adding the new data, modifying and retrieving existing data or deletion of data within the database A running database has function in a corporation, factory, government department and other organization. Database is used for searching the data to answer some queries. A database may be design for batch processing, real time processing or on line processing.
DATABASE SYSTEM
Database System is an integrated collection of related files along with the detail about their definition, interpretation, manipulation and maintenance. It is a system, which satisfied the data need for various applications in an organization without unnecessary redundancy. A database system is based on the data. Also a database system can be run or executed by using software called DBMS (Database Management System). A database system controls the data from unauthorized access.
Foundation Data Concept
A hierarchy of several levels of data has been devised that differentiates between different groupings, or elements, of data. Data are logically organized into:
- Character
- Field
- Record
- File
all transactions occurring during a period, whereas a master file contains all the permanent records. A history file is an obsolete transaction or master file retained for backup purposes or for long-term historical storage called archival storage.
- Database
Q. 2. What are the various characteristics of DBMS?
Ans. The major characteristics of database approach are:
• Self-describing Nature of a Database System
• Insulation between Programs and Data, and Data Abstraction
• Support of Multiple Views of the Data
• Sharing of Data and Multi user Transaction Processing
Q. 3. What are the various characteristics of DBMS approach?
Ans.
1. Self-contained nature
DBMS system contains data plus a full description of the data (called “metadata”) “metadata” is data about data - data formats, record structures, locations, how to access, indexes metadata is stored in a catalog and is used by DBMS software to know how to access the data. Contrast this with the file processing approach where application programs need to know the structure and format of records and data.
2. Program-data independence
Data independence is immunity of application programs to changes in storage structures and access techniques. E.g. adding a new field, changing index structure, changing data format, In a DBMS environment these changes are reflected in the catalog. Applications aren’t affected. Traditional file processing programs would all have to
change, possibly substantially.
3. Data abstraction
A DBMS provides users with a conceptual representation of data (for example, as objects with properties and inter-relationships). Storage details are hidden. Conceptual representation is provided in terms of a data model.
4. Support for multiple views
DBMS may allow different users to see different “views” of the DB, according to the perspective each one requires. E.g. a subset of the data - For example; the people using the payroll system need not/should not see data about students and class schedules. E.g. data presented in a different form from the way it is stored - For example someone interested in student transcripts might get a view which is formed by combining information from separate files or tables.
5. Centralized control of the data resource
The DBMS provides centralized control of data in an organization.
This brings a number of advantages:
(a) reduces redundancy
(b) avoids inconsistencies
(c) data can be shared
(d) standards can be enforced
(e) security restrictions can be applied
(f) integrity can be maintained
a, b. Redundancy and Inconsistencies
Redundancy is unnecessary duplication of data. For example if accounts department and registration department both keep student name, number and address.
Redundancy wastes space and duplicates effort in maintaining the data.
Redundancy also leads to inconsistency.
Inconsistent data is data which contradicts itself - e.g. two different addresses for a given student number. Inconsistency cannot occur if data is represented by a single entry (i.e. if there is no redundancy).
Controlled redundancy: Some redundancy may be desirable (for efficiency). A DBMS should be aware of it, and take care of propagating updates to all copies of a data item.
This is an objective, not yet currently supported.
c. Sharing
• Need concurrency control
• Multiple user views
d. Standards
E.g. data formats, record structures, naming, documentation
International, organizational, departmental ... standards
e. Security
- restricting unauthorized access
DBMS should perform security checks on all accesses.
f. Integrity
Maintaining validity of data;
e.g. employee numbers must be in some range
e.g. every course must have an instructor
e.g.. student number must be unique
e.g. hours worked cannot be more than 150
These things are expressed as constraints.
DBMS should perform integrity checks on all updates. Currently DBMSs provide limited integrity checks.
Q. 3. What are the various types of databases?
Ans. Types of Databases
Continuing developments in information technology and its business applications have resulted in the evolution of several major types of databases. Several major conceptual categories of databases that may be found in computer-using organizations include:
Operational Databases
The databases store detailed data needed to support the operations of the entire organization. They are also called subject area databases (SADB), transaction databases, and production databases: Examples are customer databases, personnel databases, inventory databases, and other databases containing data generated by business operations
Distributed Databases
Many organizations replicate and distribute copies or parts of databases to network
sewers at a variety of sites. These distributed databases can reside on network servers
on the World Wide Web, on corporate Intranets or extranets, or on other company networks. Distributed databases may be copies of operational or analytical. databases,
hypermedia or discussion databases, or any other type of database. Replication and distribution of databases is done to improve database performance and security.
External Databases
Access to external, privately owned online databases or data banks is available for a fee to end users and organizations from commercial online services, and with or without charge from many sources on the Internet, especially the Web.
Hypermedia Databases
It consists of hyperlinked pages of multimedia (text, graphics, and photographic images, video clips, audio segments, etc.). From a database management point of view, the set of interconnected multimedia pages at a website is a database of interrelated hypermedia page elements, rather than interrelated data records.
Q. 4. What do you mean by DBMS?
Ans. A DBMS is best described as a collection of programs that manage the database structure and that control shared access to the data in the database. Current DBMSes also store the relationships between the database components; they also take care of defining the required access paths to those components
A database management system (DBMS) is the combination of data, hardware, software and users to help an enterprise manage its operational data.
The main function of a DBMS is to provide efficient and reliable methods of data retrieval to many users. Efficient data retrieval is an essential function of database systems. DBMS must be able to deal with several users who try to simultaneously access several items and most frequently, the same data item A DBMS is a set of programs that is used to store and manipulation data that include the following:
• Adding new data, for example adding details of new student.
• Deleting unwanted data, for example deleting the details of students who have
completed course.
• Changing existing data, for example modifying the fee paid by the student.
A database is the information to be stored whereas the database management system is the system used to manage the database. . This structure may be regarded in terms of its hardware implementation, called the physical structure, or this structure may be regarded independently of its hardware implementation, called the logical structure. In either case, the data structure is regarded as static because a database cannot ‘process anything. The DBMS is regarded as dynamic because it is through the DBMS that all database processing takes place. How the DBMS presents data to the user is called the view structure.
There are two general modes for data use: queries and transactions. Both forms use the DBMS for processing. The query is processed for presentation in views and none of these processes are written to the database. The transactional is processed for updating values in the database variables. These updates are written to the database. A DBMS provides various functions like data security, data integrity, data sharing, data concurrence, data independence, data recovery etc. However, all database management systems that are now available in the market like Sybase, Oracle, and MS-Access do not provide the same set of functions, though all are meant for data management.
Q. 5. What are the various components of DBMS?
Ans. Basic Components: A database system has four components. These four
components are important for understanding and designing the database system. These
are:
1. Data
2. Hardware
3. Software
4. Users
1. Data
As we have discussed above, data is raw hand information collected by us. Data is made up of data item or data aggregate. A Data item is the smallest unit of named data: It may consist of bits or bytes. A Data item is often referred to as field or data element. A Data aggregate is the collection of data items within the record, which is given a name and referred as a whole. Data can be collected orally or written. A database can be integrated and shared. Data stored in a system is partition into one or two databases. So if by chance data lost or damaged at one place, then it can be accessed from the second place by using the sharing facility of data base system. So a shared data also cane be reused according to the user’s requirement. Also data must be in the integrated form. Integration means data should be in unique form i.e. data collected by using a well-defined manner with no redundancy, for example Roll number in a class is non-redundant form and so these have unique resistance, but names in class may be in the redundant form and can create lot of problems later on in using and accessing the data.
2. Hardware
Hardware is also a major and primary part of the database. Without hardware nothing can be done. The definition of Hardware is “which we can touch and see”, i.e. it has physical existences. All physical quantity or items are in this category. For example, all the hardware input/output and storage devices like keyboard, mouse, scanner, monitor, storage devices (hard disk, floppy disk, magnetic disk, and magnetic drum) etc. are commonly used with a computer system.
3. Software
Software is another major part of the database system. It is the other side of hardware. Hardware and software are two sides of a coin. They go side by side. Software is a system. Software are further subdivided into two categories, First type is system software (like all the operating systems, all the languages and system packages etc.) and second one is an application software (payroll, electricity billing, hospital management and hostel administration etc.). We can define software as which we cannot touch and see. Software only can execute. By using software, data can be manipulated, organized and stored. -
4. Users
Without user all of the above said components (data, hardware & software) are meaning less. User can collect the data, operate and handle the hardware. Also operator feeds the data and arranges the data in order by executing the software. Other components
1. People - Database administrator; system developer; end user.
2. CASE tools: Computer-aided Software Engineering (CASE) tools.
3. User interface - Microsoft Access; PowerBuilder.
4. Application Programs - PowerBuilder script language; Visual Basic; C++; COBOL.
5. Repository - Store definitions of data called METADATA, screen and report formats, menu definitions, etc.
6. Database - Store actual occurrences data.
7. DBMS - Provide tools to manage all of this - create data, maintain data, control security access to data and to the repository, etc.
Q. 6.What are the various functions of DBMS?
Ans. These functions will include support for at least all of the following:
• Data definition: The DBMS must be able to accept data definitions (external schemas, the conceptual schema, the internal schema, and all associated mappings) in source form and convert them to the appropriate object form.
• Data manipu1ation: The DBMS must be able to handle requests from the users to retrieve, update, or delete existing data the database, or to add new data to the database. In other words, the DBMS must include a data manipulation language (DML) processor component.
• Data security and integrity: The DBMS must monitor user requests and reject
any attempt to violate the security and integrity rules defined by the DBA.
• Data recovery and concurrency: The DBMS - or else some other related software component, usually called the transaction manager - must enforce certain recovery and concurrency controls.
• Data Dictionary: The DBMS must provide a data dictionary function. The data dictionary can be regarded as a database in its own right (but a system database, rather than a user database). The dictionary contains “data about the data” (sometimes called metadata) - that is, definitions of other objects in the system - rather than just”raw data.” In particular, all the various schemas and mapping (external, conceptual, etc.) will physically be stored, in both source and object form, in the dictionary. A comprehensive dictionary will also include cross- reference information, showing, for instance, which programs use which pieces of the database, which users require which reports, which terminals are connected to the system, and so on. The dictionary might even - in fact, probably should — be integrated into the database it defines, and thus include its own definition. It should certainly be possible to query the dictionary just like any other database, so that, for example, it is possible to tell which programs and or users are likely to be affected by some proposed change to the system.
Performance: It goes without saying that the DBMS should perform all of the functions identified above as efficiently as possible.
Q7. What are the advantages and disadvantages of a database approach?
Ans. ADVANTAGES OF DBMS
One of the major advantages of using a database system is that the organization
can be handled easily and have centralized management and control over the data by
the DBA. Some more and main advantages of database management system are given
below:
The main advantages of DBMS are:
1. Controlling Redundancy
In a DBMS there is no redundancy (duplicate data). If any type of duplicate data arises, then DBA can control and arrange data in non-redundant way. It stores the data on the basis of a primary key, which is always unique key and have non-redundant information. For example, Roll no is the primary key to store the student data.
In traditional file processing, every user group maintains its own files. Each group independently keeps files on their db e.g., students. Therefore, much of the data is stored twice or more. Redundancy leads to several problems:
• Duplication of effort
• Storage space wasted when the same data is stored repeatedly
Files that represent the same data may become inconsistent (since the updates are applied independently by each users group).We can use controlled redundancy.
2. Restricting Unauthorized Access
A DBMS should provide a security and authorization subsystem.
• Some db users will not be authorized to access all information in the db (e.g., financial data).
• Some users are allowed only to retrieve data.
• Some users are allowed both to retrieve and to update database.
3. Providing Persistent Storage for Program Objects and Data Structures
Data structure provided by DBMS must be compatible with the programming language’s data structures. E.g., object oriented DBMS are compatible with programming languages such as C++, SMALL TALK, and the DBMS software automatically performs conversions between programming data structure and file formats.
4. Permitting Inferencing and Actions Using Deduction Rules
Deductive database systems provide capabilities for defining deduction rules for inferencing new information from the stored database facts.
5. Inconsistency can be reduced
In a database system to some extent data is stored in, inconsistent way. Inconsistency is another form of delicacy. Suppose that an em1oyee “Japneet” work in department “Computer” is represented by two distinct entries in a database. So way inconsistent data is stored and DBA can remove this inconsistent data by using DBMS.
6. Data can be shared
In a database system data can be easily shared by different users. For example, student data can be share by teacher department, administrative block, accounts branch arid laboratory etc.
7. Standard can be enforced or maintained
By using database system, standard can be maintained in an organization. DBA is overall controller of database system. Database is manually computed, but when DBA uses a DBMS and enter the data in computer, then standard can be enforced or maintained by using the computerized system.
8. Security can be maintained
Passwords can be applied in a database system or file can be secured by DBA. Also in a database system, there are different coding techniques to code the data i.e. safe the data from unauthorized access. Also it provides login facility to use for securing and saving the data either by accidental threat or by intentional threat. Same recovery procedure can be also maintained to access the data by using the DBMS facility.
9. Integrity can be maintained
In a database system, data can be written or stored in integrated way. Integration means unification and sequencing of data. In other words it can be defined as “the data contained in the data base is both accurate and consistent”. ‘Data can be accessed if it is
compiled in a unique form. We can take primary key ad some secondary key for integration of data. Centralized control can also ensure that adequate checks are
incorporated in the DBMS to provide data integrity.
10. Confliction can be removed
In a database system, data can be written or arranged in a well-defined manner by DBA. So there is no confliction between the databases. DBA select the best file structure and accessing strategy to get better performance for the representation and use of the
data.
11. Providing Multiple User Interfaces
For example query languages, programming languages interfaces, forms, menu- driven interfaces, etc.
12. Representing Complex Relationships Among Data
It is used to represent Complex Relationships Among Data
13. Providing Backup and Recovery
The DBMS also provides back up and recovery features.
DISADVANTAGES OF DBMS
Database management system has many advantages, but due to some major problem
arise in using the DBMS, it has some disadvantages. These are explained as:
1.Cost
A significant disadvantage of DBMS is cost. In addition to the cost of purchasing or developing the software, the organization *111 also purchase or upgrade the hardware
and so it becomes a costly system. Also additional cost occurs due to migration of data
from one environment of DBMS to another environment.
2. Problems associated with centralization
Centralization also means that data is accessible from a single source. As we know the centralized data can be accessed by each user, so there is no security of data from unauthorized access and data can be damaged or lost.
3. Complexity of backup and recovery
Backup and recovery are fairly complex in DBMS environment. As in a DBMS, if you take a backup of the data then it may affect the multi-user database system which is in operation. Damage database can be recovered from the backup floppy, but iterate duplicacy in loading to the concurrent multi-user database system.
4. Confidentiality, Privacy and Security
When information is centralized and is made available to users from remote locations, the possibilities of abuse are often more than in a conventional system. To reduce the chances of unauthorized users accessing sensitive information, it is necessary to take technical, administrative and, possibly, legal measures. Most, databases store valuable information that must be protected against deliberate trespass and destruction.
5. Data Quality
Since the database is accessible to users remotely, adequate controls are needed to control users updating data and to control data quality. With increased number of users accessing data directly, there are enormous opportunities for users to damage the data. Unless there are suitable controls, the data quality may be compromised.
6. Data Integrity
Since a large number of users could be using .a database concurrently, technical safeguards are necessary to ensure that the data remain correct during operation. The main threat to data integrity comes from several different users attempting to update the same data at the same time. The database therefore needs to be protected against inadvertent changes by the users.
7. Enterprise Vulnerability
Centralizing all data of an enterprise in one database may mean that the database becomes an indispensable resource. The survival of the enterprise may depend on reliable information being available from its database. The enterprise therefore becomes vulnerable to the destruction of the database or to unauthorized modification of the database.
8. The Cost of using a DBMS
Conventional data processing systems are typically designed to run a number of well-defined, preplanned processes. Such systems are often “tuned” to run efficiently for the processes that they were designed for. Although the conventional systems are usually fairly inflexible in that new applications may be difficult to implement and/or expensive to run, they are usually very efficient for the applications they are designed for.
The database approach on the other hand provides a flexible alternative where new applications can be developed relatively inexpensively. The flexible approach is not without its costs and one of these costs is the additional cost of running applications that the conventional system was designed for. Using standardized software is almost always less machine efficient than specialized software.
Q. 8. List five significant differences between a file-processing system and a DBMS.
Ans. Before differentiating between file and database systems, there be need to understand the DBMS and its component. Let us consider an organization have a huge amount (collection) of data on its different departments, its employees, its products, sale and purchase order etc. As we know such type of data is accessed simultaneously by different and several employees. Now some users apply number of queries and want answers quickly. If data is stored in the files, then it will create a problem of slow processing. As we try to deal with this type of data management problem by storing the data in a collection of operating system files. Such type of techniques creates number of problems or drawbacks, which are discussed as below:
1. As we have not 1000GB main memory (primary memory) to store the data, so we store the data in some permanent storage device (secondary memory) like magnetic disk or magnetic tape etc. So file-oriented system fails in primary memory cases and we apply data base management system to store the data files permanently.
2. Suppose if we have such a large amount of primary memory on a 16 bit or 32 bit computer system, then there be a problem occur in file based system to use the data by direct or random addressing. Also we cannot call more then 2GB or 4Gb of data direct to the primary memory at a time. So there be need a database program to identify the data.
3. Some programs are too lengthy and complex which cannot store large amount of data in the files related to the operating systems. But a database system made it simple and fast.
4. We cannot change and access file-oriented data simultaneously, so we have requirement a type of system which can be used to access the large amount of data concurrently.
5. Also we cannot recall or recover the file-oriented data, but centralized database management solve such type of problem.
6. File oriented operating system provide only a password mechanism for security, but this is not successful in case of number of users are accessing the same data by using the same login.
At end we can sat that a DBMS is a piece of software that is designed to make the processing faster and easier.
Q 9 Describe major advantages of a database system over file system Or Discuss the DBMS and File processing system Also give the limitations of file processing system
Ans. TRADITIONAL FILE PROCESSING
Data are organized, stored, and processed in independent files of data records. In the traditional file processing approach, each business application was designed to use one or more specialized data files containing only specific types of data records
TRADITIONAL FILE SYSTEM OR FILE ORIENTED APPROACH
The business computers of 1980 were used in processing of business records and produce information using file oriented approach or file processing environment At that time that system was reliable and faster than the manual system of record keeping and processing In this system the data is organized in the form of different files. Since that system was the collection of files - so we can say it was a file-oriented system. Following terms was commonly used in this approach or the features of File oriented system.
1. Master file
The file that is created only once i.e. at the starting of computerization or a file which rarely changes. For example: In a bank master file the account no, name and balance are entered only once and less frequently changes.
2. File activity ratio
The number of records processed one run divided by total number of records. For example: if we changes 100 records from a bank file containing 200 records then file activity ratio is 100/200 0.5. It should be noted that this ratio of master file is less.
3. Transaction file
A file that is created repeatedly after regular interval of time. For example: the payroll file of employee is updated at the end of every month.
4. File volatility ratio
It is the number of records updated in a transaction file divided by total number of records. The file volatility ratio of transaction file is very high.
5. Work file
A temporary file that helps in sorting and merging of records from one file to other.
6. File organization
It means the arrangement of records in a particular order. There were three types of file organizations
- Sequential
- Direct
- Indexed sequential
In this system each dept has its own files designed for local applications. Each department has its own data processing staff, set of policies, working rules and report formats. It means programs were depending on the file structure or format of file. If the structure of file changes, the program has also to be changed. These days the file oriented approach is still used but has following limitations:
LIMITATIONS OF FILE ORIENTED APPROACH
• Duplicate data
Since all the files are independent of each other. So some of the fields or files are stored more than once. Hence duplicacy is more in case of file approach but dbms has controlled duplicacy.
• Separated and isolated data
To make a decision, a user might need data from two separate files. First, analysts and programmers to determine the specific data required from each file and the relationships between the data evaluated the files. Then applications could be written in a third generation language to process and extract the needed data. Imagine the work involved if data from several files was needed!
• Inconsistency
In this system, data is not consistent. If a data item is changed the all the files containing that data item need to be changed and updated properly. If all the files are not updated properly there may be high risk of inconsistency. DBMS have data consistency.
• Poor data integrity
A collection of data has integrity. A file is said to be have data integrity - it means a item is not be stored in duplicate manner. It has been seen that file oriented system have poor data integrity control. Data integrity has been achieved in DBMS.
• Every operation is programmable
The processing tasks like searching, editing, deletion etc should have separate programs. It means there were no functions available for these operations. DBMS have ready-made commands for such operations.
• Data inflexibility
Program-data interdependency and data isolation limited the flexibility of file processing systems in providing users with ad hoc information requests. Because designing applications was so programming-intensive, MIS department staff usually restricted information requests Therefore, users often resorted to manual methods to obtain needed information.
• Concurrency problem
It means using a same record at same time. This problem was common in file approach but can be controlled in DBMS.
• Application programs are dependent on the file format:
In file processing system the physical formats of the files are entered in the programs. The change in file means change in program and vice versa. No such problem in DBMS.
• Poor data security
All the files are stored in the flat form or text files. These files can be easily located and trapped because file approach, has no data security.
• Difficult to represent the complex objects:
Some the objects may be of variable length records can be computerized using this approach. DBMS has capability to handle fixed-length records as well as variable-length records.
• Can not support heavy databases:
The databases on the Internet can be handled by the files system - but DBMS like oracle is used for heavy data base applications. On the other hand the DBMS have following advantages.
• Difficulty in representing data from the user’s view
To create useful applications for the user, often data from various files must be combined. In file processing it was difficult to determine relationships between isolated data in order to meet user requirements.
PROBLEMS OF FILE PROCESSING
The file processing approach finally became too cumbersome, costly, and inflexible to supply the information needed to manage modem businesses. It was replaced by the database management approach. File processing systems had the following major problems:
• Data Redundancy
Independent data files included a lot of duplicated data; the same data was recorded
and stored in several files. This data redundancy caused problems when data had to
be updated, since separate file maintenance programs had to be developed and
coordinated to ensure that each file was properly updated. Unfortunately, a lot of
inconsistencies occurred among data stored in separate files.
• Lack of Data Integration
Having independent files made it difficult to provide end users with information for
ad hoc requests that required accessing data stored in several different files. Special
computer programs had to be written to retrieve data from each independent file. This
was so difficult, time-consuming, and costly for some organizations that it was
impossible to provide end users or management with such information.
• Data Dependence
In file processing systems, major components of the system - the organization of files,
their physical locations of storage hardware, and the application software used to
access those files — depended on one another in significant ways. Changes in the
format and structure of data and records in a file required that changes be made to all
of the programs that used that file. This program maintenance effort was a major
burden of file processing systems.
• Other Problems
It was easy for data elements to be defined differently by different end users and
applications. Integrity of the data was suspect because there was no control over their
use and maintenance by authorized end users.
Q.10. What are the various types of database uses?
Ans. Without user all o the above said components (data, hardware & software) are meaning less. User can collect the data, operate and handle the hardware. Also operator feeds the data and arranges the data in order by executing the software. Users are of mainly of four types. These are:
(a) Naïve user
Naïve user has no knowledge of database system and its any supporting software. These are used at the end form. These are like a layman, which have little bit knowledge or computer system. These users are mainly used for collecting the data on the notebooks or on the pre-deigned forms. An automated teller machine (ATMs) user are in these categories. Naïve user can work on any simple GUI base menu driven system. Internet using non-computer based person are in this form.
(b) End User or Data Entry Operators
Data entry operators are preliminary computer based users. The function of data entry operators are only to operate the computer (start! stop the computer) and feed or type the collected information (data) in menu driven application program and to execute it according to the analyst’ requirement. These user are also called On line users. These user communicate the database directly via an on line terminal or indirectly via a user interface. These users require certain amount of expertise in the computer programming language, but require complete knowledge of computer operations.
(c) Application programmer
He is also called simple programmer. The working of application programmer is to develop a new project i.e. program for a particular application or modify an existing program. Application programmer works according to some instructions given by database administrator (DBA). Application programmer can handle all the programming language like Fortran, Cobol, dbase etc.
(d) DBA (Data Base Administrator)
DBA is a major user. DBA either a single person or a group of persons. DBA is only the custodian of the business firm or organization but not the owner of the organization. As bank manager is the DBA of a bank, who takes care about the bank money and not use it. Only DBA can handle the information collected by end user and give the instructions to the application programmer for developing a new program or modifying an existing program. DBA is also called an overall controller of the organization. In computer department of a firm either system analysts or an EDP (Electronic Data Processing) Manager works as DBA. In other words DBA is the overall controller of complete hardware and software.
RESPONSIBILITIES OF DBA
As we know DBA is the overall commander of a computer system, so it has number of duties, but some of his/her major responsibilities are as follows:
- DBA can control the data, hardware, and software and gives the instructions to the application programmer, end user and naive user.
- DBA decides the information contents of the database. He decides the suitable database file structure for arrangement of data. He/She uses the proper DDL techniques.
- DBA compiles the whole data in a particular order and sequence.
- DBA decides where data can be stored i.e. take decision about the storage structure.
- DBA decides which access strategy and technique should be used for accessing the data.
- DBA communicates with the user by appropriate meeting, DBA co-operates with
- DBA also define and, apply authorized checks and validation procedures.
- DBA also takes backup of the data on a backup storage device so that if data can be lost then it can be again recovered and compiled. DBA also recovers the damaged data.
- DBA also changes the environment according to user or industry requirement and monitor the performance.
- DBA should be good decision-maker. The decision taken by DBA should be correct, accurate & efficient.
- DBA should have leadership quality.
- DBA liaise with the user in the business to take confidence of the customer about availability of data.
Q11. Discuss the architecture of database management system.
Ans. DBMS ARCHITECTURE
There are many different framework have been suggested for the DBMS over the last several year. The generalized architecture of a database system is called ANSI/SPARC (American National Standards Institute/Standards Planning and Requirements Committee) model.
In 1972, a final report about database is submitted by ANSI (American National Standard Institute) and SPARC (Standard Planning And Requirement Committee). According to this approach, three levels of a database system was suggested and they are:
• External view (Individual user view)
• Conceptual View (Global or community user view)
• Internal level (physical or storage view).
For the system to be usable, it must retrieve data efficiently. This concern has led to the design of complex data structures for the representation of data in the database. Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify users’ interactions with the system.
These three views or levels of the architecture are as shown in the diagram as follows:
OBJECTIVES OF THREE LEVEL ARCHITECTURE
The database views were suggested because of following reasons or objectives of levels of a database:
1. Make the changes easy in database when some changes needed by environment.
2. The external view or user views do not depend upon any change made ii other view. For example changes in hardware, operating system or internal view should not change the external view.
3. The users of database should not worry about the physical implementation and internal working of database system.
4. The data should reside at same place and all the users can access it as per their requirements.
5. DBA can change the internal structure without effecting the user’s view.
6. The database should be simple and changes can be easily made.
7. It is independent of all hardware and software.
All the three levels are shown below
External/View level
The highest level of abstraction where only those parts of the entire database are included which are of concern to a user. Despite the use of simpler structures at the logical level, some complexity remains, because of the large size of the database. Many users of the database system will not be concerned with all this information. Instead, such users need to access only a part of the database. So that their interaction with the system is simplified, the view level of abstraction is defined. The system may provide many views for the same database.
Databases change over time as information is inserted and deleted. The collection of information stored in the database at a particular moment is called an instance of the database. The overall design of the database is called the database schema. Schemas are changed infrequently, if at all.
Database systems have several schemas, partitioned according to the levels of abstraction that we discussed. At the lowest level is the physical schema; at the intermediate level is the logical schema and at the highest level is a subschema.
The features of this view are
• The external or user view is at the highest level of database architecture.
• Here only one portion of database will be given to user.
• One portion may have many views.
• Many users and program can use the interested part of data base.
• By creating separate view of database, we can maintain security.
• Only limited access (read only, write only etc) can be provided in this view.
For example: The head of account department is interested only in accounts but in library information, the library department is only interested in books, staff and students etc. But all such data like student, books, accounts, staff etc is present at one place and every department can use it as per need.
Conceptual/Logical level
Database administrators, who must decide what information is to be kept in the database, use this level of abstraction. One conceptual view represents the entire database. There is only one conceptual view per database.
The description of data at this level is in a format independent of its physical representation. It also includes features that specify the checks to retain data consistence and integrity.
The features are:
• The conceptual or logical view describes the structure of many users.
• Only DBA can be defined it.
• It is the global view seen by many users.
• It is represented at middle level out of three level architecture.
• It is defined by defining the name, types, length of each data item. The create table
commands of Oracle creates this view.
• It is independent of all hardware and software.
Internal/Physical level
The lowest level of abstraction describes how the data are stored in the database, and what relationships exist among those data. The entire database is thus described in terms of a small number of relatively simple structures, although implementation of the simple structures at the logical level may involve complex physical-level structures, the user of the logical level does not need to be aware of this complexity.
The features are :
• It describes the actual or physical storage of data.
• It stores the data on hardware so that can be stored in optimal time and accessed
in optimal time.
• It is the third level in three level architecture.
• It stores the concepts like:
• B-tree and Hashing techniques for storage of data.
• Primary keys, secondary keys, pointers, sequences for data search.
• Data compression techniques.
• It is represented as
FILE EMP [
INDEX ON EMPNO
FIELD = {
(EMPNO: BYTE (4),
ENAME BYTE(25))]
Mapping between views
• The conceptual/internal mapping:
o defines conceptual and internal view correspondence
• specifies mapping from conceptual records to their stored counterparts
o An external/conceptual mapping:
• defines a particular external and conceptual view correspondence
• A change to the storage structure definition means that the conceptual/internal
mapping must be changed accordingly, so that the conceptual schema may remain
invariant, achieving physical data independence.
• A change to the conceptual definition means that the conceptual/external mapping
must be changed accordingly, so that the external schema may remain invariant,
achieving logical data independence.
Q. 12. Write a note on Database Language And Interfaces.
Ans. Some main types of languages and facilities are provided by DBMS.
1. Programming Language
2. Data Manipulation Language
3. Data Definition Language
4. Schema Description Language
5. Sub-Schema Description Language
6. SQL (Structured Query Language)
1. Programming Language
All the programming language like Cobol, Fortran, C, C++, Pascal etc. has syntax and semantics. These all have structured and logical structure, so these all commonly used to solve general and scientific problems. All the business-oriented problems can be solved by the three GL and Fourth Gt.
2. DML
Some language that gives instructions to the programming language and other languages is called data manipulation language (DML). This language creates interface (linkage) between user and application program. This is extension of the program of the language used to manipulate data in the database. DML involves’ retrieval of data from the database, insertion of new data into the database and deletion or modification of the existing data. Some data manipulation operations are also called QUERY’ or• QUERY OPERATIONS. A Query is a statement in DML that request the retrieval of data from the database i.e. to search the data according to the user requirement. The subset of the DML used to operate the query is known as Query Language. DML provides commands to select & retrieve data from the database. Commands used in the DML are to insert, to update & to delete the records. The commands have different syntax for different programming language. For example, Fortran, Cobol, C etc. provide such type of facility with the help of database management system. The data manipulation function provided by DBMS can be invoked in a application program directly by procedural calls or by processors statement. This procedure can be done by the compiler. The DML can become
procedural language according to the user requirement. If the DML is non-procedural than user will indicate only what is to be retrieved. In both the cases the DBMS optimize the exact answer by using DML.
3. DDL
Database management system provides a facility known as Data Definition Language or data description language (DDL). DDL can be used to define conceptual schema (Global) and also give some details about how to implement this schema in the physical devices used to store the data. The definition includes all the entity sets and their associated attributes as well as the relationship among the entities set. The definitions also have some constraints which are used in DML. DDL also have some meta-data (it is data about the data in database). Meta-data have data dictionary, directory, system catalog to describe data about data. The dictionary contains the information about the data stored in the database and it is consulted by DBMS before any data manipulation operations. The DBMS maintain the information on the file structure and also used some access method to access the data efficiently. DDL is used for the help of DML.
We can say that there is another language - Data Sub Language (DSL) which is the
combination of both DML and DDL.
DSL = DML + DDL
4. Schema Description Language (SDL) or Schema
It is necessary to describe the organization of the data in a formal manner. The logical and physical database descriptions are used by DBMS software. The complete and overall description of data is referred to as schema. The schema and subschema words are brought into DBMS by CODASYL (Conference on data system language committee) and also by the CODASYL’s database task group. Schema is also referred to as conceptual model or global view (community view) of data. Suppose a complete description of collected data having all classes and student data, all employees (teaching & non-teaching) data and other concept of data related to the college is called Schema of the college. We can say that we relate whole college data logically, which is called schema.
5 Sub Schema Description language
The term schema is used to mean an overall chart of the data items, types and record type stored in a database. The term sub-schema refers to an application programmer’s view of data he uses. Sub-schema is the part of schema. Many different sub-schemas can be derived from one schema. An application programmer does not use whole data i.e. full schema, e.g. As in an organization, purchase-order for the maintenance department is the sub-schema of the whole schema description of the purchase department in the hole industry. Two or more than two application- programmers use the different sub-schemas. One person named A uses the sub-schema purchase-order whereas programmer B uses the sub-schema supplier. Their operations and views are different according to their own sub-schema but both combined these two sub-schemas on the basis of a common key.
6. Structured Query Language (SQL):
SQL organized with the system R. System R means it is relational language. SQL is also called Structure Query Language. This language was developed in 1974 at IBM’s San Jose Research Center. The purpose of this language is to provide such non-procedural commands which are used for validation of the data and for searching the data. By using this language we can do any query about the data. SQL is sometimes named by SQUARE language. This language was helpful for both DDL and DML for the system R. Some SQL are also called Relational languages and used in a commercial RDBMS. Some commonly used SQL are ORACLE, INGRES, SYBASE etc. SQL resembles relational algebra and relational calculus in a relational system approach.
DBMS INTERFACES
Types of interfaces provided by the DBMS include:
Menu-Based interfaces for Web Clients or Browsing
• Present users with list of options (menus)
• Lead user through formulation of request
• Query is composed of selection options from menu displayed by system.
Forms-Based Interfaces
• Displays a form to each user
• User can fill out form to insert new data or fill out only certain entries.
• Designed and programmed for naïve users as interfaces to canned transactions.
Graphical User Interfaces
• Displays a schema to the user in diagram form. The user can specify a query by manipulating the diagram. GUIs use both forms and menus.
Natural Language Interfaces
• Accept requests in written English or other languages and attempt to understand them.
• Interface has its own schema, and a dictionary of important words. Uses the schema and dictionary to interpret a natural language request.
Interfaces for Parametric Users
• Parametric users have small set of operations they perform.
• Analysts and programmers design and implement a special interface for each class of naïve users.
• Often a small set of commands included to minimize the number of keystrokes required. (I.e. function keys)
Interfaces for the DBA
• Systems contain privileged commands only for DBA staff.
• Include commands for creating accounts, setting parameters, authorizing accounts,
changing the schema, reorganizing the storage structures etc.
Q.13. Describe the Classification of Database Management Systems.
Ans. Categories of DBMS
DBMS (Database Management System)
It is software to manage many databases. A DBMS is a software component or logical tool to handle the databases. All the queries from user about the data stored in the database will be handled by DBMS. There are many DBMSs available in market like dBase, FoxBASE, FoxPro, Oracle, Unify, Access etc.
RDBMS (Relational Data Base Management System)
Each database system uses a approach to store and maintain the data. For this purpose three data models were developed like Hierarchical model, Network Model and Relational Model. In the hierarchical model the data were arranged in the form of trees, in network model the data was arranged in the form of pointers and network and in relational model the data was arranged in the form of tables. The data stored in the form tables is easy to stored, maintain and understand. Many DBMS has been developed using approach of hierarchical and network models. Any DBMS that uses the relational data model for data storage and modeling Is called RDBMS. In RDBMS we can create relations among tables and can access the information from tables - while tables store stored in separately file and may or may not have identical structures. The RDBMS is based upon the rules given by Dr. Codd known as Dr. Codd’s Rules.
HDBMS (Heterogeneous DBMS)
In RDBMS we store the information related to the same kind of data like student data, teacher data, employee data etc. In HDBMS we store the data in the database which is entirely different.
DDBMS (Distributed DBMS)
During 1950s & 1960s there was trend to use independent or decentralized system. There was a duplication of hardware and facilities. In a centralized database system, the DBMS & data reside at a single place and all the control & location is limited to a single location, but the PCs are distributed geographically. Distributed system is parallel computing using multiple independent computers communicating over a network to accomplish a common objective or task. The type of hardware, programming languages, operating systems and other resources may vary drastically. It is similar to computer clustering with the main difference being a wide geographic dispersion of the resources
For example an organization may have an office in a building and have many sub- buildings that are connected using LAN. The current trend is towards distributed systems. This is a centralized system connected to intelligent remote sites. Each remote site have own storage and processing capabilities - but in a centralized or network there is a single storage.
OODBMS (Object Oriented DBMS)
Object-Oriented Database Management Systems (OODBMSs) have been developed to support new kinds of applications for which semantic and content are represented more efficiently with the object model. Therefore, the OODBMSs present the two main problems:
• Impedance mismatch: It is basically due to two reasons. Firstly, the no suitable abstractions of the operating systems, so when a client object has to invoke a method that is offered by a server object, and both objects are not into the same address space, it is necessary to use the mechanisms that are offered by the operating system, and these mechanisms do not became proper to the object oriented paradigm since they are oriented to communicate processes. In order to solve this problem intermediate software is included (e.g. COM or CORBA).In the second place, an impedance mismatch is also caused every time that the object-oriented applications need to use the operating system services.
• Interoperability problem between object models: Although different system elements use the object-oriented paradigm, an interoperability problem can exist between them. So, an application implemented using the C++ language, with the C++ object model, can easily interact with its objects, but when it wants to use objects that have been created with another programming language or another object-oriented database an interoperability problem appears.
The programming LANGUAGES like C, FORTRAN, PASCAL & FORTRAN use the POP (Procedure Oriented Approach) to develop applications, but the current trend is towards OOP (Object Oriented Programming). The languages like C++, Java, Oracle, C# (C Sharp). Visual Basic 6 use this approach. Many databases have been developed that follows this approach (OI approach) like Oracle. So the DBMS which follow OOP approach is called OODBMS.
Q. 14. Explain the difference between physical and logical data independence.
Ans. One of the biggest advantages of database is data independence. It means we can change the conceptual schema at one level without affecting the data at other level. It means we can change the structure of a database without affecting the data required by users and program. This feature was not available in file oriented approach. There are two types of data independence and they are:
1. Physical data independence
2. Logical data independence
Data Independence The ability to modify schema definition in on level without affecting schema definition in the next higher level is called data independence. There are two levels of data independence:
1. Physical data independence is the ability to modify the physical schema without
causing application programs to be rewritten. Modifications at the physical level are occasionally necessary to improve performance. It means we change the physical storage/level without affecting the conceptual or external view of the data. The new changes are absorbed by mapping techniques.
2. Logical data independence in the ability to modify the logical schema without
causing application program to be rewritten. Modifications at the logical level are necessary whenever the logical structure of the database is altered (for example, when money-market accounts are added to banking system).
Logical Data independence means if we add some new columns or remove some columns from table then the user view and programs should not changes. It is called the logical independence. For example: consider two users A & B. Both are selecting the empno and ename. If user B add a new column salary in his view/table then it will not effect the external view user; user A, but internal view of database has been changed for both users A & B. Now user A can also print the salary.
It means if we change in view then program which use this view need not to be changed.
Logical data independence is more difficult to achieve than is physical data independence, since application programs are heavily dependent on the logical structure of the data that they access.
Logical data independence means we change the physical storage/level without effecting the conceptual or external view of the data. Mapping techniques absorbs the new changes.
Q. 15. What is physical data independence?
Ans. Physical data independence is the ability to modify the physical schema without causing application programs to be rewritten. Modifications at the physical level are occasionally necessary to improve performance. It means we change the physical storage/level without affecting the conceptual or external view of the data. The new changes are absorbed by mapping techniques.
Q. 16. What do you mean by data redundancy?
Ans. Redundancy is unnecessary duplication of data. For example if accounts department and registration department both keep student name, number and address.
Redundancy wastes space and duplicates effort in maintaining the data.
Redundancy also leads to inconsistency.
Inconsistent data is data which contradicts itself - e.g. two different addresses for a given student number. Inconsistency cannot occur if data is represented by a single entry (i.e. if there is no redundancy).
Controlled redundancy
Some redundancy may be desirable (for efficiency). A DBMS should be aware of it, and take care of propagating updates to all copies of a data item.
This is an objective, not yet currently supported.
Q. 17. What do you man by database schema?
Ans. It is necessary to describe the organization, of the data in a formal manner. The logical and physical database descriptions are used by DBMS software. The complete and overall description of data is referred to as schema, The schema and subschema words are brought into DBMS by CODASYL (Conference on data system language1 committee) and also by the CODASYL’s database task group. Schema is also referred to as conceptual model or global view (community view) of data. Suppose a complete description of collected data having all classes and student data4 all employees (teaching & non-teaching) data and other concept of data related to the college is called Schema of the college. We can say that we relate whole college data logically, which is called schema.
Q. 18. Explain the distinctions among the terms primary key, candidate key and superkey.
Or
What is the significance of foreign key? Or What are the various keys?
Ans. Keys: As there are number of keys can be defined, but some commonly and mainly used keys are explained as below:
1. Primary Key
A key is a single attribute or combination of two or more, attributes of an entity that is used to identify one or more instances of the set. The attribute Roll # uniquely identifies an instance of the entity set STUDENT. It tells about student Amrita having address 101, Kashmir Avenue and phone no. 112746 and have paid fees 1500 on basis of Roll No. 15. The 15 is unique value and it gives unique identification of students So here Roll No is unique attribute and such a unique entity identifies called Primary Key. Primary key cannot be duplicate.
From the definition of candidate key, it should be clear that each relation must have at least one candidate key even if it is the combination of all the attributes in the relation since all tuples in a relation are distinct. Some relations may have more t one candidate keys.
As discussed earlier, the primary key of a relation is an arbitrarily but permanently selected candidate key. The primary key is important since it is the sole identifier for the tuples in a relation. Any tuple in a database may be identified by specifying relation name, primary key and its value. Also for a tuple to exist in a relation, it must be identifiable and therefore it must have a primary key. The relational data model therefore imposes the following two integrity constraints:
(a) No component of a primary key value can be null;
(b) Attempts to change the value of a primary key must be carefully controlled.
The first constraint is necessary because if we want to store information about some entity, then we must be able to identify it, otherwise difficulties are likely to arise. For example, if a relation
CLASS (STUNO, LECTURER, CNO)
has (STUNO, LECTURER) as the primary key then allowing tuples like
3123 NULL CP302
NULL SMITH CP302
is going to lead to ambiguity since the two tuples above may or may not be identical and the integrity of the database may be compromised. Unfortunately most commercial database systems do not support the concept of primary key and it would be possible to have a database state when integrity of the database is violated.
The second constraint above deals with changing of primary key values. Since the primary key is the tuple identifier, changing it needs very careful controls. Codd has suggested three possible approaches:
Method 1
Only a select group of users be authorised to change primary key values.
Method 2
Updates on primary key values be banned. If it was necessary to change a primary key, the tuple would first be deleted and then a new tuple with new primary key value but same other values would be inserted. Of course, this does require that the old values of attributes be remembered and be reinserted in the database.
Method 3
A different command for updating primary keys be made available. Making a distinction in altering the primary key and another attribute of a relation would remind users that care needs to be taken in updating primary keys.
2. Secondary Key
The ke1 which is not giving the unique identification and have duplicate infonna6o is called secondary key, e g in a STUDENT entity if Roll Number is the primary key, then Name of the student, address of the student, Phone number of the student and the fees paid by the student all are secondary keys. A secondary key is an attribute or combination of attributes that not be primary key and have duplicate data. In otherworlds secondary key is used after the identification of the primary key. Also we can identify the data from the combination of the secondary keys.
3. Super Key
If we add additional attributes to a primary key, the resulting combination would still uniquely identify an instance of the entity set Such keys are called super keys A primary key is therefore a minimum super key For example, if DOB (date of birth field or attribute) is the primary key, then by adding some additional information about the day of the month key in the DOB field, this field or attribute becomes more powerful and useful Such type of key is called super key Super key are less used in a small database file. Now these days it has less importance, but due to its feature, this key gives the complete description of the database.
4. Candidate Key
There may be two or more attributes or combination of attributes that uniquely identify an instance of an entity set These attributes or combination of attributes are called candidate keys. Candidate key also gives unique identification. Candidate key comes with primary key. A candidate is a combination of two or more attributes e.g. if Roll No. and student name are two different attributes then we combine these two attribute and form a single attribute Roll No. & Name, then this combination is the candidate key and it is unique and gives unique identification about a particular roll no. and about particular name.
5. Alternative Key
A candidate key which is not the primary key is called alternative key, e.g. if Roll No. and Name combination is the candidate key, then if Roll No, is the primary key, other key in the candidate key is Name. Name attribute work as the alternative key.
6 Foreign Key
Suppose there are some relations as: SP (S#, P#, QTY), relation S (S#, S Name, status, city) and relation P (P#, PName, Color, Weight, City). We know entity SP is defined as the relationship of the relation S and the relation P. These two relations has sand P# as the Primary Keys in relation S and P respectively, but in the relation SP we can take either # as the primary key or P# as the primary key. Suppose if we take P# as the primary key, then other primary key S# which is actually the primary key, but do not work as primary key in the relation SF is called the Foreign Key. If S# is the primary key then P# is the Foreign Key. Similarly in the relation ASSIGNMENT, attribute Emp #, Prod #, Job # are given and if S# and P# are the primary keys, then the Job # key is the Foreign Keys.
Q. 19. What are the major functions of a database administrator?
Ans. RESPONSIBILITIES OF DBA
As we know DBA is the overall commander of a computer system, so it has number of duties, but some of his/her major responsibilities are as follows:
1. DBA can control the data, hardware, and software and gives the instructions to the application programmer, end user and naive user.
2. DBA decides the information contents of the database. He decides the suitable database file structure for arrangement of data. He/She uses the proper DDL techniques.
3. DBA compiles the whole data in a particular order and sequence.
4. DBA decides where data can be stored i.e. take decision about the storage structure.
5. DBA decides which access strategy and technique should be used for accessing the data.
6. DBA communicates with the user by appropriate meeting. DBA co-operates with user.
7. DBA also define and apply authorized checks and validation procedures.
8. DBA also takes backup of the data on a backup storage device so that if data can then lost then it can be again recovered and compiled. DBA also recovers the damaged data.
9. DBA also changes the environment according to user or industry requirement and monitor the performance.
10. DBA should be good decision-maker. The decision taken by DBA should be correct, accurate & efficient.
11. DBA should have leadership quality.
12. DBA liaise with the user in the business to take confidence of the customer about the availability of data.
Q. 20. What do you mean by relationships? Explain different types of relationships.
Ans. Relationships: One table (relation) may be linked with another in what is known as a relationship. Relationships may be built into the database structure to facilitate the operation of relational joins at runtime.
- A relationship is between two tables in what is known as a one-to-many or parent-child or master-detail relationship where an occurrence on the ‘one’ or ‘parent’ or ‘master’ table may have any number of associated occurrences on the ‘many’ or ‘child’ or ‘detail’ table. To achieve this, the child table must contain fields which link back the primary key on the parent table. These fields on the child table are known as a foreign key, and the parent table is referred to as the foreign table (from the viewpoint of the child).
- It is possible for a record on the parent table to exist without corresponding records on the child table, but it should not be possible for an entry on the child table to exist without a corresponding entry on the parent table.
- A child record without a corresponding parent record is known as an orphan.
- It is possible for a table to be related to itself. For this to be possible it needs a foreign key which points back to the primary key. Note that these two keys cannot be comprised of exactly the same fields otherwise the record could only ever point to itself.
- A table may be the subject of any number of relationships, and it may be the
- Some database engines allow a parent table to be linked via a candidate key, but if this were changed it could result in the link to the child table being broken.
- Some database engines allow relationships to be managed by rules known as referential integrity or foreign key restraints. These will prevent entries onchild tables from being created if the foreign key does not exist on the parent table, or will deal with entries on child tables when the entry on the parent table is updated or deleted.
The join operator is used to combine data from two or more relations (tables) in order to satisfy a particular query. Two relations may be joined when they share at least one common attribute. The join is implemented by considering each row in an instance of each relation. A row in relation R1 is joined to a row in relation R2 when the value of the common attribute(s) is equal in the two relations. The join of two relations is often called a binary join.
The join of two relations creates a new relation. The notation ‘R1 x R2’ indicates the join of relations R1 and R2. For example, consider the following:
Note that the instances of relation RI and R2 contain the same data values for attribute B. Data normalisation is concerned with decomposing a relation (e.g. R(A,B,C,D,E) into smaller relations (e.g. R1 and R2). The data values for attribute B in this context will be identical in R1 and R2. The instances of R1 and R2 are projections of
the instances of R(A,B,C,D,E) onto the attributes (A,B,C) and (B,D,E) respectively. A projection will not eliminate data values duplicate rows are removed, but this will not remove a data value from any attribute.
The join of relations RI and R2 is possible because B is a common attribute. The result of the join is:
The row (2 4 5 7 4) was formed by joining the row (2 4 5) from relation R1 to the row (4 7 4) from relation R2. The two rows were joined since each contained the same value for the common attribute B. The row (2 4 5) was not joined to the row (6 2 3) since the values of the common attribute (4 and 6) are not the same.
The relations joined in’ the preceding example shared exactly one common attribute. However, relations may share multiple common attributes. All of these common attributes must be used in creating a join. For example, the instances of relations R1 and R2 in the following example are joined using the common attributes B and C:
The row (6 1 4 9) was formed by joining the row (6 1 4) from relation R1 to the row
(1 4 9) from relation R2. The join was created since the common set of attributes (B and
C) contained identical values (1 and 4). The row (6 1 4) from R1 was not joined to the
row (1 2 1) from R2 since the common attributes did not share identical values - (1 4) in
R1 and (1 2) in R2.
The join operation provides a method for reconstructing a relation that was decomposed into two relations during the normalisation process. The join of two rows, however, can create a new row that was not a member of the original relation. Thus invalid information can be created during the join process.
Now suppose that a list of courses with their corresponding room numbers is required. Relations R1 and R4 contain the necessary information and can be joined using the attribute HOUR. The result of this join is:
This join creates the following invalid information (denoted by the coloured rows):
• Smith, Jones, and Brown take the same class at the same time from two different instructors in two different rooms.
• Jenkins (the Maths teacher) teaches English.
• Goldman (the English teacher) teaches Maths.
• Both instructors teach different courses at the same time.
Another possibility for a join is R3 and R4 (joined on INSTRUCTOR). The result would be:
This join creates the following invalid information:
• Jenkins teaches Math I and Algebra simultaneously at both 8:00 and 9:00.
A correct sequence is to join R1 and R3 (using COURSE) and then join the resulting relation with R4 (using both INSTRUCTOR and HOUR). The result would be:
Extracting the COURSE and ROOM attributes (and eliminating the duplicate row produced for the English course) would yield the desired result:
The correct result is obtained since the sequence (R1 x r3) x R4 satisfies the lossless (gainless?) join property
A relational database is in 4th normal form when the lossless join property can be used to answer unanticipated queries. However, the choice of joins must be evaluated carefully. Many different sequences of joins will recreate an instance of a relation. Some sequences are more desirable since they result in the creation of less invalid data during the join operation.
Suppose that a relation is decomposed using functional dependencies and multi- valued dependencies. Then at least one sequence of joins on the resulting relations exists that recreates the original instance with no invalid data created during any of the join operations.
For example, suppose that a list of grades by room number is desired. This question, which was probably not anticipated during database design, can be answered without creating invalid data by either of the following two join sequences:
The required information is contained with relations R2 and R4, but these relations
cannot be joined directly. In this case the solution requires joining all 4 relations.
The database may require a ‘lossless join’ relation, which is constructed to assure that any ad hoc inquiry’ can be answered with relational operators. This relation may contain attributes that are not logically related to each other. This occurs because the relation must serve as a bridge between the other relations in the database. For example, the lossless join relation will contain all attributes that appear only on the left side of a functional dependency. Other attributes may also be required, however, in developing the lossless join relation.
Consider relational schema R (A, B, C, D), A B and CD. Relations and are in 4th normal form. A third relation however, is required to satisfy the lossless join property. This relation can be used to join attributes B and D. This is accomplished by joining relations R1 and R3 and then joining the result to relation
R2. No invalid data is created during these joins. The relation is the lossless join relation for this database design.
A relation is usually developed by combining attributes about a particular subject or entity. The lossless join relation, however, is developed to represent a relationship among various relations. The lossless join relation may be difficult to populate initially and difficult to maintain - a result of including attributes that are not logically associated with each other.
The attributes within a lossless join relation often contain multi-valued dependencies. Consideration of 4th normal form is important in this situation. The lossless join relation can sometimes be decomposed into smaller relations by eliminating the multi-valued dependencies. These smaller relations are easier to populate and maintain.
Q. 21. What is an ER-diagram? Construct an ER diagram for a hospital with a set of patients and a set of doctors. Associate with each patient a log o1 the various tests and examinations conducted.
Or
Discuss in detail the ER diagram.
Or
What is one to many relationship? Give examples.
Or
Draw an ER diagram for a library management system, make suitable assumptions. Describe various symbols used in ER. diagram.
Or
Construct an ER diagram for a university registrar’s office. The office maintains data about each class, including the instructor, the enrollment and the time and place of the class meetings. For each student class pair, a grade is recorded also design a relational database for the said I.R. diagram.
Ans. E-R model grew out of the exercise of using commercially available DBMS to model application database. Earlier DBMS were based on hierarchical and network approach. E-R is a generalization of these models. Although it has some means of describing the physical database model, it is basically useful in the design of logical database model. This analysis is then used to organize data as a relation, normalizing relations and finally obtaining a relational database model.
The entity-relationship model for data uses three features to describe data. These are:
1. Entities, which specify distinct real-world items in an application.
2. Relationships, which connect entities and represent meaningful dependencies
between them.
3. Attributes, which specify properties of entities and relationships.
We illustrate these terms with an example. A vendor supplying items to a company, for example, is an entity. The item he supplies is another entity. A vendor supplying items are related in the sense that a vendor supplies an item. The act of supplying• defines a relationship between a vendor and an item. An entity set is a collection of similar entities. We can thus define a vendor set and an item set. Each member of an entity set is described by some attributes. For example, a vendor may be described by the attributes:
(vendor code, vendor name, address)
An item may be described by the attributes:
(item code, item name)
Relationship also can be characterized by a number of attributes. We can think of the relationship as supply between vendor and item entities: The relationship supply can be described by the attributes: (order no. date of supply)
Relationship between Entity Sets
The relationship between entity sets may be many-to-many (M: N), one-to-many (1: M), many-to-one (M: 1) or one-to-one (1:1). The 1:1 relationship between entity sets E1 and E2 indicates that for each entity in either set there is at most one entity in the second set that is associated with it. The 1: M relationship from entity set E1 to E2 indicates that for an occurrence of the entity from the set E1, there could be zero, one or more entities from the entity set E2 associated with it. Each entity in E2 is associated with at most one entity in the entity set E1. In the M: N relationship between entity sets E1 and E2, there is no restriction to the number of entities in one set associated with an entity in the other set. The database structure, employing the E-R model is usually shown pictorially using entity-relationship (E-R) diagram.
To illustrate these different types of relationships consider the following entity sets: DEPARTMENT, MANAGER, EMPLOYEE, and PROJECT
The relationship between a DEPARTMENT and a MANAGER is usually one-to- one; there is only one manager per department and a manager manages only one department. This relationship between entities is shown in Figure. Each entity is represented by a rectangle and the relationship between them is indicated by a direct line. The relationship for MANAGER to DEPARTMENT and from DEPARTMENT to MANAGER is both 1:1. Note that a one-to-one relationship between two entity sets does not imply that for an occurrence of an entity from one set at any time there must be an occurrence of an entity in the other set. In the case of an organization, there could be times when a department is without a manager or when an employee who is classified as a manager may be without a department to manage. Figure shows some instances of one-to-one relationships between the entities DEPARTMENT and MANAGER.
A one-to-many relationship exists from the entity MANAGER to the entity EMPLOYEE because there are several employees reporting to the manager. As we just pointed out, there could be an occurrence of the entity type MANAGER having zero occurrences of the entity type EMPLOYEE reporting to him or her. A reverse relationship, from EMPLOYEE to MANAGER, would be many to one, since many employees may be supervised by a single manager. However, given an instance of the entity set EMPLOYEE, there could be only one instance of the entity set MANAGER to whom that employee reports (assuming that no employee reports to more than one manager). The relationship between entities is illustrated in Figures shows some instances of this relationship.
Figure: Instances of 1: M Relationship
The relationship between the entity EMPLOYEE and the entity PROJECT can be derived as follows: Each employee could be involved in a number of different projects, and a number of employees could be working on a given project. This relationship between EMPLOYEE and PROJECT is many-to-many. It is illustrated in Figures shows some instances of such a relationship.
Figure: M : N Relationship
In the entity-relationship (E-R) diagram, entities are represented by rectangles, relationships by a diamond-shaped box and attributes by ellipses or ovals. The following
E-R diagram for vendor, item and their relationship is illustrated in Figure (a).
Representation of Entity Sets in the form of Relations
The entity relationship diagrams are useful in representing the relationship among entities they show the logical model of the database. E-R diagrams allow us to have an overview of the important entities for developing an information system and other relationship. Having obtained E-R diagrams, the next step is to replace each entity set and relationship set by a table or a relation. Each table has a name. The name used is the entity name. Each table has a number of rows and columns. Each row contains a number of the entity set. Each column corresponds to an attribute. Thus in the E-R diagram, the vendor entity is replaced by table below.
Table: Table For the Entity Vendor
The above table is also known as a relation. Vendor is the relation name. Each row of a relation is called a tuple. The titles used for the columns of a relation are known as relation attributes. Each tuple in the above example describes one vendor. Each element of a tuple gives specific property of that vendor. Each property is identified by the title used for an Attribute column. In a relation the rows may be in any order. The columns may also be depicted in any order. No two rows can be identical.
Since it is inconvenient to show the whole table corresponding to a relation, a more concise notation is used to depict a relation. It consists of the relation name and its attributes. The identifier of the relation is shown in bold face.
A specified value of a relation identifier uniquely identifies the row of a relation.
If a relationship is M: N, then the identifier of the relationship entity is a composite identifier, which includes the identifiers of the entity sets, which are related. On the other hand, if the relationship is 1:N, then the identifier of the relationship entity is the identifier of one of the entity sets in the relationship.. For example, the relations and identifiers corresponding to the E-R diagram of Figure are as shown:
Figure: E-R Diagram for Teacher, Student and their relationship
Teacher (Teacher-id, name, department, address)
Teaches (Teacher-id, Student-id)
Student (Student-id, name, department, address)
One may ask why an entity set is being represented as a relation. The main reasons
are case of storing relations as flat files in a computer and, more importantly, the existence of a sound theory on relations, which ensures good database design. The raw relations obtained as a first step in the above examples are transformed into normal relations. The rules for transformations called normalization are based on sound theoretical principles and ensure that the final normalized relations obtained reduce duplication of data, ensure that no mistake occur when data are added or, deleted and simplify retrieval of required data.
Q. 22. Discuss relational approach of database management system? Explain with the help of suitable relational operations to demonstrate insert, delete and update functions.
Or
What is relational model compare and contrast it with network and hierarchical model.
Ans. Database models are collection of conceptual tools for describing data
semantics and data constraints.
DBMS has number of ways to represent the data, But some important and commonly
used model are of four types, among which three are mainly used. These are:
I. Relational Model or Relational Approach
II. Hierarchical Model or Hierarchical Approach
III. Network Model or Network Approach
I. Relational Data Model
Relational Data Model has been developed from the research in deep and by testing and by trying through many stages. This model has advantages that it is simple to implement and easy to understand. We can express queries by using query language in this model. In this model relation is only constructed by setting the association among the attributes of an entity as well the relationship among different entities. One of the main reasons for introducing this model was to increase the productivity of the application programmers by eliminating the need to change application programmer, when a change is mode to the database. In this user need not know the exact physical structure. Data structure used in the data model represented by both entities and relationship between them. We can explain relation view of data on relational approach on the basis of following example.
Suppose there are three tables in which data is organized. These tables are Supplier tables or S table or S relation, Part table or P table or P relation, Shipment table of SP table or SP relation. The S table further has some fields or attributes. These are supplier number (S#), supplier name, status of the supplier and the city in which the supplier resides. Similarly P table has field part number (P#), part name, part color, weight of the part and location where the part is stored. Also SP table contains field supplier number (S#), part number (P#) and the quantity which supplier can ship. Each supplier s unique supplier number S# and similarly each part has unique part umber P#. These three tables are called relational table. S table is also called S-relation because it gives the relationship between different attributes. These attributes are field name and in the form of column. Rows of such table are called tuples. Pool of values in a particular w and attributes called domain. In other words domain is a pool of values from which actual value appearing in a given column are drawn. For example, in S table - S#, Sname, S-status are the attributes and s1, s2, s3 are domains. A relational table or relationship can be defined as:
Definition: A relation represented by table having n column, defined on domain Dl, D2, .... Dn is a subset of cartesian product DI x D2 x……x Dn.
Another definition is : It is collection of Dl, D2, D3,…….Dn then R is relation on these n sets if these n sets are ordered in n tuples such that each value of attribute belong to Dl, D2,…….Dn. These three relations are represented by diagram:
S table (Entity) or S Relation:
As in the .S table insertion, deletion and modifications can be done easily.
II. Hierarchical Model
It is a tree structure. It has one root and many branches, we call it parent child relationship. In this a single file has relation with many files and similarly we can say that it is the arrangement of individual data with group data. In an organization chart manager is the parent root and employees working under the manager are their children The representation of this model is expressed by linking different tables. Such type of representation is better for a linkage have many relationships with one. Some times it will create ambiguity in designing and defining the association and relationship between
SP table (Entity) or SP Relation:
In hierarchical approach, insertion can be done if a child has a parent and insertion on the child side is easy. Deletion and insertion is easy, but you can’t delete a parent: parent has one or more child. In the parent child relationship updation in parent and child both are difficult.
III. Network Approach
It is a complex approach of DBMS. In this we link all the records by using a chain or pointer. It has many to many relationships. Network approach is created when there are more than one relations in the database system. Network approach starts from on point and after connecting similar type of data it returns back to the same record.
Network approach is more symmetric than the hierarchical structure. In network model insertion at any point is very complex. We can insert only by creating a new record having linkage with other record. Similarly deletion is also complex if we delete any record than chain disconnect and whole structure vanish. Updation is also complex because we cannot change name or any data record because it connected with each other.
Difference between Relational, Hierarchical and Network Approaches:
(A) Relational Approach: Relational Approach (RA) has relationship between different entities and attribute in a particular entity. RA is in tabular form. RA
has one to one relationships. R-A has table in asymmetric form. Insertion, deletion,
updation in R table is very easy. Languages used in RA are SQL, Ingress, Oracle, Sybase. RA is simple in nature. Relational approach creates relationship between different entities and different attributes in the same entity. It is the best approach to represent the data than the other models.
(B) Hierarchical Approach: Hierarchical Approach (HA) creates a linkage between two or more entities. HA has parent child relationship. HA has one to many relationships. HA relationship is in symmetric form by defining parent and their child. Insertion, deletion, updation is little difficult than the RA. HA has IMS language, which is theoretical. It is Complex in nature.
(C) Network Approach: Network Approach (NA) has chain among many entities. NA has chaining technique or pointer technique. NA has many to many relationships. NA relationship is full or completely symmetric form because it has one chain symmetry. Insertion, deletion, updation is very difficult. NA has DBTG (Database Task Group) set hiving different classes & members. More complex than RA & HA.
Q. 23. What is the usage of unified modelling language (UML)?
Ans. UML is a graphical language for visualizing, specifying, constructing and documenting an object oriented software-intensive system’s artifacts.
Q. 24. What are graphical user interfaces?
Ans. A graphical user interface (GUI) is sometime pronounced “gooey” is a method of interacting with a computer through a metaphor of direct manipulation of graphical images and widgets in addition to text. GUI display visual elements such as icon, Windows and other gadgets
Q. 25. Define the term dangling pointer.
Ans. The pointers that points to nothing is called dangling pointer.
Q. 26. Write a short note on Mapping.
Ans. Mappings
• The conceptual/internal mapping:
defines conceptual and internal view correspondence specifies mapping from conceptual records to their stored counterparts
• An external/conceptual mapping:
defines a particular external and conceptual view correspondence
• A change to the storage structure definition means that the conceptual/internal mapping must be changed accordingly, so that the conceptual schema may remain invariant, achieving physical data independence.
• A change to the conceptual definition means that the conceptual/external mapping must be changed accordingly, so that the external schema may remain invariant,
achieving logical data independence.
Q. 27. Distinguish between RDBMS and DBMS.
http://ptucse.loremate.com/dbms/node/2
This is an online lecture in Computer Hardware Servicing, prepared by Mr. George P. Lumayag, ICT Coordinator. These Skills Learning Competencies are patterned from TESDA in preparation of the K to 12 implementation. Electro-Static Discharge (ESD) Tools Static electricity is easily generated by friction on carpets, tile flooring, clothing, hair, fabric, and etc. The friction of moving air alone will charge suspended parties and cause the buildup of static electrical charges on people and objects in the environment. Grounded antistatic work mats used electrostatic electricity. Examples of ESD Tools: Anti-static wrist strap Anti-static wrist strap-used to prevent ESD damage to computer equipment. Anti-static mat Anti-static - used to stand on or place hardware on to prevent static electricity from building up. Hand Tools A hand tool is a device for performing work on a material or a physical system using only hands. The hands tools can be manually used employing force, or electrically powered, using electrical current. Examples of Hand Tools: Flat head screwdriver Flat head screwdriver - used to loosen or tighten slotted screws. Philips head screwdriver Philips head screwdriver - used to loosen or tighten cross-head screws. Torx screwdriver Torx screwdriver - used to loosen or tighten screws that have a star-like depression on the top, a feature that is mainly found laptop. Hex driver Hex driver - sometimes called a nut driver, is used to tighten nuts in the same way that a screwdriver tightens screws. Needle-nose plier Needle-nose plier - used to hold small parts. Wire cutter Wire cutter - used to strip and cut wires. Tweezers Tweezers - used to manipulate small parts. Part retriever Part retriever - used to retrieve parts from location that are to small for your hand to fit. Flashlight Flashlight - used to light up areas that you cannot see well. Cleaning Tools Having the appropriate cleaning tools is essential when maintaining or repairing computers. Using these tools ensures the computer components are not damage during cleaning. Examples. Lint-free cloth Lint-free cloth - used to clean different computer components without scratching or leaving debris. Compressed air Compressed air - used to blow away dust and debris from different computer parts without touching the components. Cable ties Cable ties - used to bundle cables neatly inside and outside of a computer. Parts organizer Parts organized - used to hold screw, jumpers, fasteners and other small parts and prevents them from getting mixed together. Diagnostic Tools Computers are easier to use and more dependable with each new generation of hardware and operating system update, but that doesn't mean they're problem-free. Here's the most popularb tools for diagnosing your computer problems: Multimeter Multimeter -used to test the integrity of circuits and the quality of electricity in computer components. Loopback Adapter Loopback Adapter - used to test the functionality of computer ports. PC Tools for Software and Hardware Trouble Shooting. These are the PC Tools and Components that will be used in PC Hardware and Software Trouble Shootings. A lens
A lens is an optical device which transmits and refracts light, converging or diverging the beam.[citation needed] A simple lensconsists of a single optical element. A compound lens is an array of simple lenses (elements) with a common axis; the use of multiple elements allows more optical aberrations to be corrected than is possible with a single element. Lenses are typically made of glass or transparent plastic. Elements which refract electromagnetic radiation outside the visual spectrum are also called lenses: for instance, a microwave lens can be made from paraffin wax. http://en.wikipedia.org/wiki/Lens_(optics)
A ruler
A ruler, sometimes called a rule or line gauge, is an instrument used in geometry, technical drawing, printing and engineering/building to measure distances and/or to rule straight lines. Strictly speaking, the ruler is essentially a straightedge used to rule lines[citation needed], but typically the ruler also contains calibrated lines to measure distances.[1] http://en.wikipedia.org/wiki/Ruler
A T-square
A T-square is a technical drawing instrument used by draftsmen primarily as a guide for drawing horizontal lines on a drafting table. It may also guide a set square to draw vertical or diagonal lines. Its name comes from the general shape of the instrument where the horizontal member of the T slides on the side of the drafting table. T-squares come in varying sizes, common lengths being 18", 24", 30", 36" and 42".[citation needed]
T-squares are also used to measure and cut drywall. Drywall T-squares are typically made of aluminium and have a 48-inch (1,220 mm) long tongue.
Higher-end table saws are often equipped with T-square fences. These table saw fences are attached to a rail only on the front side of the table unlike traditional fences which clamp to both the front and the rear of the table. http://en.wikipedia.org/wiki/T-square
Steel rules
Steel rules come in rigid and flexible versions. While their primary purpose is accurate measurement, they can also be used as guides for laying out lines, and if rigid enough, for cutting. The thinner, more flexible rules can also be used to measure rounded or cambered work.
The differences in the prices of rules result from the various production methods, which also determine accuracy and legibility. Most rules are made by cutting the required length from a roll of band spring steel, with etched graduations. Rules made by this method are adequate for most applications and reasonably priced.
Higher-priced rules are cut, not stamped, from plate steel (stamping would cause the material to warp), and the edges are ground. Graduations are machined, much deeper than etched graduations, longer-lasting, and easier to read in poor light. http://www.fine-tools.com/mass.htm
A protractor
In geometry, a protractor is a square, circular or semicircular tool, typically in transparent perspex, for measuring angles. The units of measurement utilized are usually degrees (°).
They are used for a variety of mechanical and engineering-related applications, but perhaps the most common use is in geometry lessons in schools.
Some protractors are simple half-discs. More advanced protractors, such as the bevel protractor, have one or two swinging arms, which can be used to help measure the angle.
http://en.wikipedia.org/wiki/Protractor
An electronic calculator
An electronic calculator is a small, portable, usually inexpensive electronic device used to perform the basic operations of arithmetic. Modern calculators are more portable than most computers, though most PDAs are comparable in size to handheld calculators.
The first solid state electronic calculator was created in the 1960s, building on the history of tools such as the abacus, developed around 2000 BC; and the mechanical calculator, developed in the 17th century. It was developed in parallel with the analog computers of the day.
Pocket-sized devices became available in the 1970s, especially after the invention of the microprocessor developed serendipitously byIntel for a Busicom calculator.
Modern electronic calculators vary from cheap, give-away, credit-card sized models to sturdy desktop models with built-in printers. They became popular in the mid-1970s as integrated circuits made their size and cost small. By the end of that decade, calculator prices had reduced to a point where a basic calculator was affordable to most and they became common in schools. http://en.wikipedia.org/wiki/Calculator
A multimeter
A multimeter or a multitester, also known as a VOM (Volt-Ohm meter), is an electronic measuring instrument that combines several measurement functions in one unit. A typical multimeter may include features such as the ability to measure voltage, current andresistance. Multimeters may use analog or digital circuits--analog multimeters (AMM) and digital multimeters (often abbreviatedDMM or DVOM.) Analog instruments are usually based on a microammeter whose pointer moves over a scale calibrated for all the different measurements that can be made; digital instruments usually display digits, but may display a bar of a length proportional to the quantity being measured.
A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument which can measure to a very high degree of accuracy. They can be used to troubleshoot electrical problems in a wide array of industrial and household devices such as electronic equipment, motor controls, domestic appliances, power supplies, and wiring systems. http://en.wikipedia.org/wiki/Multimeter
An eraser
An eraser (US) or rubber (elsewhere) is an article of stationery that is used for removing pencil markings. Erasers have a rubbery consistency and are often pink or white. Some pencils have an eraser on one end. Typical erasers are made fromsynthetic rubber, but more expensive or specialized erasers are vinyl, plastic, or gum-like materials. Cheaper erasers can be made out of synthetic soy-based gum.
An eraser can be used of cleaning the RAM, a memory chip of the PC.
http://www.nlm.nih.gov/medlineplus/ency/article/002816.htm
paint brush brush 1 (brsh)
n.
1. a. A device consisting of bristles fastened into a handle, used in scrubbing, polishing, or painting.
b. The act of using this device.
2. A light touch in passing; a graze.
3. An instance of contact with something undesirable or dangerous: a brush with the law; a brush with death.
4. A bushy tail: the brush of a fox.
5. A sliding connection completing a circuit between a fixed and a moving conductor.
6. A snub; a brushoff.
http://www.thefreedictionary.com/Paint+brush
A vacuum
A vacuum is a space devoid of air or matter, or a tool that uses suction to clean.(noun)
1. An example of a vacuum is a space with nothing in it.
2. An example of a vacuum is something used to clean up dirt on a floor.
To vacuum is to clean using a tool that sucks dirt or other elements into a storage container. (verb)
An example of vacuum is to clean the dirt off the carpet using a vacuum cleaner.
http://www.yourdictionary.com/vacuum
A soldering gun
A soldering gun is an approximately pistol-shaped tool for soldering metals using tin-based solder to achieve a strong mechanical bond with good electrical contact. The tool has a trigger-style switch so it can be easily operated with one hand. The body of the tool contains a transformer with a primary winding connected to mains electricity when the trigger is pressed, and an incomplete single-turn secondary winding of thick copper with very low resistance. A soldering tip, made of a loop of thinner copper wire, is secured to the end of the transformer secondary by screws, completing the secondary winding. When the primary of the transformer is energized, several hundred amperes of current flow through the secondary and very rapidly heat the copper tip. Since the tip has a much higher resistance than the rest of the tubular copper winding, the tip, used for soldering, gets very hot while the remainder of the secondary warms much less. A tap on the primary winding is often used to light a pilot lamp which also provides illumination of the workpiece. http://en.wikipedia.org/wiki/Soldering_gun
Pliers
Pliers are a hand tool used to hold objects firmly, for bending, or physical compression. Generally, pliers consist of a pair of metal first-class levers joined at a fulcrum positioned closer to one end of the levers, creating short jaws on one side of the fulcrum, and longerhandles on the other side. This arrangement creates a mechanical advantage, allowing the force of the hand's grip to be amplified and focused on an object with precision. The jaws can also be used to manipulate objects too small or unwieldy to be manipulated with the fingers. http://en.wikipedia.org/wiki/Pliers
Diagonal pliers
Diagonal pliers (or wire cutters or diagonal cutting pliers) are pliers intended for the cutting of wire (they are generally not used to grab or turn anything). The plane defined by the cutting edges of the jaws intersects the joint rivet at an angle or "on a diagonal", hence the name. Instead of using a shearing action as with scissors, they cut by indenting and wedging the wire apart. The jaw edges are ground to a symmetrical "V" shape; thus the two jaws can be visualized to form the letter "X", as seen end-on when fully occluded. The pliers are made of tempered steel with inductive heating and quenching often used to selectively harden the jaws.
http://en.wikipedia.org/wiki/Diagonal_pliers
A Phillips screw driver
A Phillips screw driver is primarily used to fasten and unfasten screws with a star-like hole in their heads.
Read more: http://wiki.answers.com/Q/What_is_the_use_of_a_Philips_screwdriver#ixzz1yYGur1jE
http://wiki.answers.com/Q/What_is_the_use_of_a_Philips_screwdriver
A screwdriver
A screwdriver is a tool for driving screws or bolts with special slots, and sometimes for rotating other machine elements with the mating drive system. The screwdriver is made up of a head or tip, which engages with a screw, a mechanism to apply torque byrotating the tip, and some way to position and support the screwdriver. A typical hand screwdriver comprises an approximately cylindrical handle of a size and shape to be held by a human hand, and an axial shaft fixed to the handle, the tip of which is shaped to fit a particular type of screw. The handle and shaft allow the screwdriver to be positioned and supported and, when rotated, to apply torque. Screwdrivers are made in a variety of shapes, and the tip can be rotated manually or by an electric motor or other motor. http://en.wikipedia.org/wiki/Screwdriver
The flat head is also one of the most abused tools, often substituted for any number of other tools that might not be available. The fact is the flat head screwdriver is quite useful for more than tightening screws. Used for light prying, scraping, nudging or holding it can be pretty versatile. Treat it too badly, though, and it'll snap, leaving you with a fishing weight in your toolbox. http://autorepair.about.com/od/tools/a/tools_flathed.htm
Goggles or safety glasses
Goggles or safety glasses are forms of protective eyewear that usually enclose or protect the area surrounding the eye in order to prevent particulates, water or chemicals from striking the eyes. They are used in chemistry laboratories and in woodworking. They are often used in snow sports as well, and in swimming. Goggles are often worn when using power tools such as drills or chainsaws to prevent flying particles from damaging the eyes. Many types of goggles are available as prescription goggles for those with vision problems. http://en.wikipedia.org/wiki/Goggles
A glove
A glove (Middle English from Old English glof) is a garment covering the whole hand. Gloves have separate sheaths or openings for eachfinger and the thumb; if there is an opening but no covering sheath for each finger they are called "fingerless gloves". Fingerless gloves with one large opening rather than individual openings for each finger are sometimes called gauntlets. Gloves which cover the entire hand or fist but do not have separate finger openings or sheaths are called mittens. Mittens are warmer than gloves made of the same material because fingers maintain their warmth better when they are in contact with each other. Reduced surface area reduces heat loss. http://en.wikipedia.org/wiki/Glove
LAN tester
· What are the features of LAN tester?
· How do you establish LAN to LAN connection?
The traffic has to go through a router to connect one network to another. Read More
· What does a LAN does?
A "LAN" stands for Local Area Network. It's just what it sounds like. A group of private computers that are connected by a common private network. If you have 2 computers in your home, and they are... Read More
· What is a LAN?
a LAN is a Local Area Network Answer. A LAN is the short abbreviation for Local Area Network. In a LAN you usually have many computers connected together using ehternet, Wifi, etc. The computers in... Read More
· What are LANs?
LAN stands for Local Area Network. A computing term for a method of connecting computers, generally using wires, and generally in the one building. Read More
http://wiki.answers.com/Q/What_is_LAN_tester
An antistatic wrist strap
An antistatic wrist strap, ESD wrist strap, or ground bracelet is an antistatic device used to safely ground a person working on very sensitive electronic equipment, to prevent the buildup of static electricity on their body, which can result in electrostatic discharge (ESD). It is used in the electronics industry by workers working on electronic devices which can be damaged by ESD, and also sometimes by people working around explosives, to prevent electric sparks which could set off an explosion. It consists of a stretchy band offabric with fine conductive fibers woven into it, attached to a wire with a clip on the end to connect it to a ground conductor. The fibers are usually made of carbon or carbon-filled rubber, and the strap is bound with a stainless steel clasp or plate. They are usually used in conjunction with an antistatic mat on the workbench, or a special static-dissipating plastic laminate on the workbench surface. http://en.wikipedia.org/wiki/Antistatic_wrist_strap
A crimping tool
A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For example, network cables and phone cables are created using a crimping tool to connect the RJ-45 and RJ-11 connectors to the end of the cable. In the picture to the right, is an example of what a crimping tool looks like. This example shows a tool capable of crimping both RJ-11 and RJ-45 connectors. http://www.computerhope.com/jargon/c/crimp.htm
Sharp Pointed Tweezers The Tweezerman Pointed Tweezers feature perfectly aligned, hand filed tips made from 100 stainless steel. The fine, precision design makes eliminating even the most stubborn stray hairs a cinch.Caution: Tweezers are very sharp. Use with care. Keep out of the reach of children.Tweeze in the direction of hair growth, after a hot shower, or use a hot wash cloth to open pores. For ingrown hairs, cleanse skin and disinfect the tips of the tweezers with alcohol. After any work under the skin, clean area with hydrogen peroxide. Always replace protective cap on tweezer tips. http://reviews.sephora.com/8723/P63915/reviews.htm
A soldering iron
A soldering iron is a hand tool used in soldering. It supplies heat to melt the solder so that it can flow into the joint between two workpieces.
A soldering iron is composed of a heated metal tip and an insulated handle. Heating is often achieved electrically, by passing an electric current (supplied through an electrical cord or battery cables) through a resistive heating element. Portable irons can be heated by combustion of gas stored in a small tank, often using a catalytic heater rather than a flame. Simple irons less commonly used than in the past were simply a large copper bit on a handle, heated in a flame.
Soldering irons are most often used for installation, repairs, and limited production work in electronics assembly. High-volume production lines use other soldering methods.[1] Large irons may be used for soldering joints in sheet metal objects. Less common uses includepyrography (burning designs into wood) and plastic welding. http://en.wikipedia.org/wiki/Soldering_iron
An operating system
An operating system is a program designed to run other programs on a computer. A computer’s operating system is its most important program. It is considered the backbone of a computer, managing both software and hardware resources. Operating systems are responsible for everything from the control and allocation of memory to recognizing input from external devices and transmitting output to computer displays. They also manage files on computer hard drives and control peripherals, like printers and scanners. http://www.wisegeek.com/what-is-an-operating-system.htm
An application program
An application program (sometimes shortened to application) is any program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of application programs include word processors; database programs; Web browsers; development tools; drawing, paint, and image editing programs; and communication programs. Application programs use the services of the computer's operating system and other supporting programs. The formal requests for services and means of communicating with other programs that a programmer uses in writing an application program is called the application program interface (API). http://searchsoftwarequality.techtarget.com/definition/application-program
An oscilloscope
An oscilloscope, previously called an oscillograph, and informally known as a scope, CRO (for cathode-ray oscilloscope), or DSO (for the more modern digital storage oscilloscope), is a type of electronic test instrument that allows observation of constantly varying signalvoltages, usually as a two-dimensional graph of one or more electrical potential differences using the vertical or 'Y' axis, plotted as a function of time (horizontal or 'x' axis). Many signals, for example sound, can be converted to voltages and displayed this way. Signals are often periodic and repeat constantly, so that multiple samples of a signal which is actually varying with time are displayed as a steady picture. Many oscilloscopes (storage oscilloscopes) can also capture non-repeating waveforms for a specified time, and show a steady display of the captured segment.
Oscilloscopes are commonly used to observe the exact wave shape of an electrical signal. Oscilloscopes are usually calibrated so that voltage and time can be read as well as is possible by eye. This allows the measurement of, for example, peak-to-peak voltage of a waveform, the frequency of periodic signals, the time between pulses, the time taken for a to rise to full amplitude (rise time), and relative timing of several related signals.[1]
Oscilloscopes are used in the sciences, medicine, engineering, and telecommunications industry. General-purpose instruments are used for maintenance of electronic equipment and laboratory work. Special-purpose oscilloscopes may be used for such purposes as analyzing an automotive ignition system, or to display the waveform of the heartbeat as an electrocardiogram. Some computer sound software allows the sound being listened to to be displayed on the screen as by an oscilloscope.
Before the advent of digital electronics oscilloscopes used cathode ray tubes as their display element (hence were commonly referred to as CROs) and linear amplifiers for signal processing. More advanced storage oscilloscopes used special storage CRTs to maintain a steady display of a single brief signal. CROs were later largely superseded by digital storage oscilloscopes (DSOs) with thin panel displays, fast analog-to-digital converters and digital signal processors. DSOs without integrated displays (sometimes known as digitisers) are available at lower cost, and use a general-purpose digital computer to process and display waveforms. http://en.wikipedia.org/wiki/Oscilloscope
A hub
A hub is a piece of hardware that contains several ethernet ports that connects several computers. Connecting a hub to a network is very easy. You can simply connect a hub to your router, and then several computers to the hub. The IP addresses of the computers that are connected to the hub are assigned by the router it is connected to.
Hubs work by broadcasting data to all computers that are connected to it. When a computer or program makes a request for information from another computer, the originating computer sends (broadcasts) the request to the hub. The hub will then brodcast the request to all computers that are connect to it. When the destination computer receives the request, it sends the information back to the hub. Once again the hub broadcasts the information to all computers, with only the requesting computer acting on the information.
The downside to this type of connection is that the bandwidth is subdivided between the number of computers that are connected to the hub. If you have a 100Mbps connection, and 2 computers connected to the hub, then the bandwidth available to each computer is 50Mbps. With 4 computers, the bandwidth drops to 25Mbps.
An alternative to hubs are switches.
RJ45
RJ45 may refer to:
§ RJ45 (telecommunications), a connector standard for telephone cables
§ RJ45 (computers), a connector for computer network (Ethernet) cables
§ Modular connectors come in four sizes: 4-, 6-, 8-, and 10-position, where a position is a location for a contact. Not all of the positions may have contacts installed. When contacts are omitted, they are typically done so from the outermost pair of contacts inward, such that the number of contacts is almost always an even number. The insulating plastic bodies of 4P and 6P connectors have different widths, whereas 8P or 10P connectors share an even larger body width. The connector body positions with omitted contacts or contacts unattached to wires are unused for the electrical connection, but ensure that the plug fits correctly. For instance, RJ11 cables often have connectors with 6 positions and 4 contacts, to which are attached just 2 wires.
§ The connectors are designated with two numbers that represent the quantity of positions and contacts, with each number followed by a "P" and "C", respectively: for example, "6P2C" for a connector having 6 positions and 2 contacts. Alternate designations omit the "P" and "C" while separating the position and contact quantities with either an "x" ("6x2") or a slash ("6/2").
§ Internally, the contacts have sharp prongs that when crimped, pierce the insulation and connect with the wire conductor, a mechanism known as insulation displacement. Ethernet cables, in particular, may have solid or stranded wire conductors and the sharp prongs are different in the 8P8C connectors made for each type of wire. A modular plug for solid (single strand) wire often has three slightly splayed prongs on each contact to securely surround and grip the conductor. Modular plugs for stranded or tinsel wire have prongs that are designed to connect to multiple wire strands. Connector plugs are designed for either solid or stranded wire; a plug for one wire type might not make reliable contact when crimped to a cable with wires of the other type.
§ The dimensions of the connectors are such that a plug can be inserted into a jack that has more positions than the plug, leaving the jack's outermost contacts unconnected. However, not all plugs from all manufacturers have this capability, and some jack manufacturers warn that their jacks are not designed to accept smaller plugs without damage. If an inserted plug lacks contact slots at the outermost extremes, it may permanently deform the outmost contacts of an incompatible jack.
§ The contact positions are numbered sequentially starting from 1. When viewed head-on with the retention mechanism on the bottom, jacks will have contact position number 1 on the left and plugs will have it on the right. Contacts are numbered by the contact position. For example, on a 6-position, 2-contact plug, where the outermost four positions do not have contacts, the innermost two contacts are numbered 3 and 4.
§ Some modular connectors are indexed: their dimensions are intentionally non-standard, preventing connections with connectors of standard dimensions. The means of indexing may be non-standard cross-section dimensions or shapes, retention mechanism dimensions, or retention mechanism quantity. For example, a Modified Modular Jack (MMJ) using an offset latching tab was developed by Digital Equipment Corporation (DEC) to prevent accidental interchange of data and telephone cables.
http://en.wikipedia.org/wiki/RJ45
RJ45
RJ45 is a standard type of connector for network cables. RJ45 connectors are most commonly seen with Ethernet cables and networks.
RJ45 connectors feature eight pins to which the wire strands of a cable interface electrically. Standard RJ-45 pinouts define the arrangement of the individual wires needed when attaching connectors to a cable.
Several other kinds of connectors closely resemble RJ45 and can be easily confused for each other. The RJ-11 connectors used with telephone cables, for example, are only slightly smaller (narrower) than RJ-45 connectors. http://compnetworking.about.com/od/networkcables/g/bldef_rj45.htm
Switches
Switches are similar to hubs in that they allow you to connect multiple computers together on a network. You can also connect switches to routers in the same way you connect hubs.
There are several differences between hubs and switches, however, that can boost the performance of your network. The performance increase has to do with how data is transmitted between the computers on your network.
While hubs transmit data via broadcasting the data to all computers that are connected to it, switches establish a direct connection between the transmitting and receiving computers. The added benefit of this is that the bandwidth is not subdivided. If you have a 100Mbps bandwidth on your network with 2 computers connected to a switch, the total bandwidth available to both computers is 100Mbps. This means that each port on the switch has the full bandwidth dedicated to it.
Many switches also have the ability to either use half- or full-duplex (receive and transmit at the same time). Hubs are half-duplex, which means they can either receive or transmit, but not both at the same time.
As you can see you can replace existing hubs on your network with switches to increase the effective speed of your network. http://technicallyeasy.net/2008/11/what-are-hubs-and-switches/
A CD-ROM
A CD-ROM ( /ˌsiːˌdiːˈrɒm/, an acronym of "Compact Disc Read-only memory") is a pre-pressed compact disc that contains dataaccessible to, but not writable by, a computer for data storage and music playback. The 1985 “Yellow Book” standard developed bySony and Philips adapted the format to hold any form of binary data.[2]
CD-ROMs are popularly used to distribute computer software, including video games and multimedia applications, though any data can be stored (up to the capacity limit of a disc). Some CDs hold both computer data and audio with the latter capable of being played on aCD player, while data (such as software or digital video) is only usable on a computer (such as ISO 9660 format PC CD-ROMs). These are called enhanced CDs.
Even though many people use lowercase letters in this acronym, proper presentation is in all capital letters with a hyphen between CD and ROM. At the time of the technology's introduction it had more capacity than computer hard drives common at the time. The reverse is now true, with hard drives far exceeding CDs, DVDs and Blu-ray, though some experimental descendants of it such as HVDs may have more space and faster data rates than today's largest hard drive.
http://en.wikipedia.org/wiki/CD-ROM
DVD
DVD is an optical disc storage format, invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995. DVDs offer higher storage capacity than Compact Discs while having the same dimensions.
Pre-recorded DVDs are mass-produced using molding machines that physically stamp data onto the DVD. Such discs are known as DVD-ROM, because data can only be read and not written nor erased. Blank recordable DVD discs (DVD-R and DVD+R) can be recorded once using a DVD recorder and then function as a DVD-ROM. Rewritable DVDs (DVD-RW, DVD+RW, and DVD-RAM) can be recorded and erased multiple times.
DVDs are used in DVD-Video consumer digital video format and in DVD-Audio consumer digital audio format, as well as for authoringAVCHD discs. DVDs containing other types of information may be referred to as DVD data discs. http://en.wikipedia.org/wiki/DVD
A modem
A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from light emitting diodes to radio. The most familiar example is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in the voice frequency range of a telephone channel. These signals can be transmitted over telephone linesand demodulated by another modem at the receiver side to recover the digital data.
Modems are generally classified by the amount of data they can send in a given unit of time, usually expressed in bits per second (bit/s, or bps). Modems can alternatively be classified by their symbol rate, measured in baud. The baud unit denotes symbols per second, or the number of times per second the modem sends a new signal. For example, the ITU V.21 standard used audio frequency-shift keying, that is to say, tones of different frequencies, with two possible frequencies corresponding to two distinct symbols (or one bit per symbol), to carry 300 bits per second using 300 baud. By contrast, the original ITU V.22 standard, which was able to transmit and receive four distinct symbols (two bits per symbol), handled 1,200 bit/s by sending 600 symbols per second (600 baud) using phase shift keying.
http://en.wikipedia.org/wiki/Modem
A wireless router
A wireless router is a device that performs the functions of a router but also includes the functions of a wireless access point and anetwork switch. It is commonly used to provide access to the Internet or to some other computer network. It does not need a cabled connection. It can function in a wired LAN (local area network), in a wireless-only LAN (WLAN), or in a mixed wired/wireless network.
Most current wireless routers have the following characteristics:
§ LAN ports which function in the same manner as the ports of a network switch.
§ A WAN port which connects to a wide area network, typically one with Internet access. External destinations are accessed using this port.
§ A wireless antenna that allows connections to other wireless devices, such as NiCs, wireless repeaters, wireless access points, and wireless bridges. This antenna typically uses the Wi-Fi standard.
Some wireless routers also include a DSL or cable modem in addition to the other components.
http://en.wikipedia.org/wiki/Wireless_router
A printer
In computing, a printer is a peripheral which produces a text or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies. Many printers are primarily used as local peripherals, and are attached by a printer cable or, in most new printers, a USB cable to a computer which serves as a document source. Some printers, commonly known as network printers, have built-in network interfaces, typically wireless or Ethernet based, and can serve as a hard copy device for any user on the network. Individual printers are often designed to support both local and network connected users at the same time. In addition, a few modern printers can directly interface to electronic media such as memory cards, or to image capture devices such as digital camerasand scanners; some printers are combined with scanners or fax machines in a single unit, and can function as photocopiers. Printers that include non-printing features are sometimes called multifunction printers (MFP), multi-function devices (MFD), or all-in-one (AIO) printers. Most MFPs include printing, scanning, and copying among their many features.
http://en.wikipedia.org/wiki/Printer_(computing)
client-server
In the context of client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the "server" performs some computational task on behalf of "clients". The clients either run on the same computer or connect through the network.
In most common use, server is a physical computer (a computer hardware system) dedicated to running one or more such services (as a host),[1] to serve the needs of users of the other computers on the network. Depending on the computing service that it offers it could be a database server, file server, mail server, print server, web server, gaming server, or some other kind of server.
In the context of Internet Protocol (IP) networking, a server is a program that operates as a socket listener.[2]
Servers often provide essential services across a network, either to private users inside a large organization or to public users via the Internet. http://en.wikipedia.org/wiki/Server_(computing)
A peripheral
A peripheral is a device connected to a host computer, but not part of it, and is more or less dependent on the host. These are also input/output devices. It expands the host's capabilities, but does not form part of the core computer architecture.
Definition: Any auxiliary device such as a mouse, keyboard, hard drive, etc. that connects to and works with the computer in some way. Usually, the word peripheral is used to refer to a device external to the computer, like a scanner, but the devices located inside the computer case are also technically peripherals. Also Known As: external peripheral, auxiliary component
Examples: "Many of the external peripherals I own, such as my scanner and printer, connect to the peripheral ports on the back of my computer."[1]
There are three different types of peripherals: Input Output Storage
An output peripheral is an external device that provides input and output for the computer. For example RAM has a peripheral output. Some peripherals, such as the external hardrive, provide both input and output for the computer. Usually for every external device there are input and output peripherals. An example of only input peripherals, a keyboard and a mouse are input and peripherals. An example of an output peripherals are hard drives disk. The storage peripherals are also considered to be used to store information on the computer for future use. http://en.wikipedia.org/wiki/Peripheral
A desktop computer
A desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Early desktop computers are designed to lay flat on the desk, while modern towers stand upright. Most modern desktop computers have separate screens and keyboards.
Prior to the widespread use of microprocessors, a computer that could fit on a desk was considered remarkably small. Early personal computers, like the IBM PC, were "desktop" machines, with a horizontally-oriented computer case, usually intended to have the display screen placed on top to save space on the desktop. In modern usage the word "desktop" usually refers to tower cases that are in fact more often located on the floor under the desk than on a desk.
Technically speaking desktop and tower computers are two different styles of computer case that use desk space in varying ways.[original research?] Cases intended for home theater PC systems are usually considered to be desktop cases in both senses, regardless of orientation and placement.[original research?]
http://en.wikipedia.org/wiki/Desktop_computer
Random access memory (RAM)
Random access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored datato be accessed in any order with a worst case performance of constant time. Strictly speaking, modern types of DRAM are not random access, as data is read in bursts, although the name DRAM / RAM has stuck. However, many types of SRAM, ROM, OTP, and NOR flash are still random access even in a strict sense. RAM is often associated with volatile types of memory (such as DRAM memory modules), where its stored information is lost if the power is removed. Many other types of non-volatile memory are RAM as well, including most types of ROM and a type of flash memory called NOR-Flash. The first RAM modules to come into the market were created in 1951 and were sold until the late 1960s and early 1970s. http://en.wikipedia.org/wiki/Random-access_memory
DDR SDRAM
Double data rate synchronous dynamic random-access memory (DDR SDRAM) is a class of memory integrated circuits used incomputers. DDR SDRAM (sometimes referred to as DDR1 SDRAM) has been superseded by DDR2 SDRAM and DDR3 SDRAM, neither of which are either forward or backward compatible with DDR SDRAM, meaning that DDR2 or DDR3 memory modules will not work in DDR equipped motherboards, and vice versa.
Compared to single data rate (SDR) SDRAM, the DDR SDRAM interface makes higher transfer rates possible by more strict control of the timing of the electrical data and clock signals. Implementations often have to use schemes such as phase-locked loops and self-calibration to reach the required timing accuracy.[1][2] The interface uses double pumping (transferring data on both the rising and falling edges of the clock signal) to lower the clock frequency. One advantage of keeping the clock frequency down is that it reduces the signal integrity requirements on the circuit board connecting the memory to the controller. The name "double data rate" refers to the fact that a DDR SDRAM with a certain clock frequency achieves nearly twice the bandwidth of a single data rate (SDR) SDRAM running at the same clock frequency, due to this double pumping.
With data being transferred 64 bits at a time, DDR SDRAM gives a transfer rate of (memory bus clock rate) × 2 (for dual rate) × 64 (number of bits transferred) / 8 (number of bits/byte). Thus, with a bus frequency of 100 MHz, DDR SDRAM gives a maximum transfer rate of 1600 MB/s.
"Beginning in 1996 and concluding in June 2000, JEDEC developed the DDR (Double Data Rate) SDRAM specification (JESD79)."[3]JEDEC has set standards for data rates of DDR SDRAM, divided into two parts. The first specification is for memory chips, and the second is for memory modules.
http://en.wikipedia.org/wiki/DDR_SDRAM
A hard disk drive
A hard disk drive (HDD; also hard drive, hard disk, or disk drive)[2] is a device for storing and retrieving digital information, primarily computer data. It consists of one or more rigid (hence "hard") rapidly rotating discs (platters) coated with magnetic material, and withmagnetic heads arranged to write data to the surfaces and read it from them.
Hard drives are classified as non-volatile, random access, digital, magnetic, data storage devices. Introduced by IBM in 1956, hard disk drives have decreased in cost and physical size over the years while dramatically increasing in capacity and speed.
Hard disk drives have been the dominant device for secondary storage of data in general purpose computers since the early 1960s.[3]They have maintained this position because advances in their recording capacity, cost, reliability, and speed have kept pace with the requirements for secondary storage.[3] http://en.wikipedia.org/wiki/Hard_disk_drive
a motherboard
In personal computers, a motherboard is the central printed circuit board in many modern computers and holds many of the crucial components of the system, providing connectors for other peripherals. The motherboard is sometimes alternatively known as the mainboard, system board, planar board or, on Apple computers, the logic board.[1] It is also sometimes casually shortened to mobo. http://en.wikipedia.org/wiki/Motherboard
A video card
A video card (also called a display card, graphics card, graphics board, display adapter or graphics adapter) is an expansion card which generates a feed of output images to a display. Most video cards offer various functions such as accelerated rendering of 3Dscenes and 2D graphics, MPEG-2/MPEG-4 decoding, TV output, or the ability to connect multiple monitors (multi-monitor).
Video hardware can be integrated into the motherboard or (as with more recent designs) the CPU, but all modern motherboards (and some from the 1990s) provide expansion ports to which a video card can be attached. In this configuration it is sometimes referred to as a video controller or graphics controller. Modern low-end to mid-range motherboards often include a graphics chipset manufactured by the developer of the northbridge (e.g. an nForce chipset with Nvidia graphics or an Intel chipset with Intel graphics) on the motherboard. This graphics chip usually has a small quantity of embedded memory and takes some of the system's main RAM, reducing the total RAM available. This is usually called integrated graphics or on-board graphics, and is usually low in performance and undesirable for those wishing to run 3D applications. A dedicated graphics card on the other hand has its own Random Access Memory or RAM and Processor specifically for processing video images, and thus offloads this work from the CPU and system RAM. Almost all of these motherboards allow the disabling of the integrated graphics chip in BIOS, and have an AGP, PCI, or PCI Express slot for adding a higher-performance graphics card in place of the integrated graphics. http://en.wikipedia.org/wiki/Video_card
A sound card
A sound card (also known as an audio card) is an internal computer expansion card that facilitates the input and output of audio signals to and from a computer under control of computer programs. The term sound card is also applied to external audio interfaces that use software to generate sound, as opposed to using hardware inside the PC. Typical uses of sound cards include providing the audio component for multimedia applications such as music composition, editing video or audio, presentation, education and entertainment (games) and video projection.
Sound functionality can also be integrated onto the motherboard, using basically the same components as a plug-in card. The best plug-in cards, which use better and more expensive components, can achieve higher quality than integrated sound. The integrated sound system is often still referred to as a "sound card". http://en.wikipedia.org/wiki/Sound_card
Processor
Processor or Processing unit may refer to:
[edit]Computing
§ Central processing unit (CPU), an electronic circuit which executes computer programs, containing a processing unit and a control unit
§ Processing unit, in Von Neumann computer architecture, contains an arithmetic logic unit (ALU) and processor registers
§ Microprocessor, a CPU on one silicon chip as part of a microcomputer
§ Graphics processing unit (GPU / VPU), a dedicated graphics rendering device for a personal computer or game console
§ Physics processing unit (PPU), a dedicated microprocessor designed to handle the calculations of physics
§ Digital signal processor, a specialized microprocessor designed specifically for digital signal processing
§ Network processor, a microprocessor specifically targeted at the networking application domain
§ Front end processor, a helper processor for communication between a host computer and other devices
§ Coprocessor
§ Floating point unit
§ Data processor, a system that translates or converts between different data formats
§ Word processor, a computer application used for the production of printable material
§ Audio processor, used in studios and radio stations
http://en.wikipedia.org/wiki/Processor
CPU Cooling Fan
The components inside a computer's case, especially integrated circuits or chips, generate heat as a by-product. A build up of heat can be devastating to integrated circuits, which normally have a long life expectancy. For that reason, a combination of fans and heat sinks are used to remove excess heat from inside a computer.
Read more: Definition of CPU Cooling Fan | eHow.com http://www.ehow.com/facts_5001672_definition-cpu-cooling-fan.html#ixzz1yTsvfRcL
While a typical desktop computer case contains a large fan to remove heat that builds up inside the cabinet from various components, CPU fans are mounted directly on top of the computer's central processing unit for the sole purpose of dissipating heat on that one single chip. This is because the CPU can become extremely heated in proportion to the amount of work it is doing.
Read more: Definition of CPU Cooling Fan | eHow.com http://www.ehow.com/facts_5001672_definition-cpu-cooling-fan.html#ixzz1yTszLQd7
http://www.ehow.com/facts_5001672_definition-cpu-cooling-fan.html
CMOS
Complementary Metal-Oxide Semiconductor. The CMOS is where the basic modifiable settings of the computer (BIOS, Basic Input-Output System) (Date, time, memory) are stored. These settings are maintained when the power is turned off by a minute current, and that current is supplied by the CMOS battery
Read more: http://wiki.answers.com/Q/What_is_the_meaning_of_cmos_in_cmos_battery#ixzz1yY3p6Vxy
http://wiki.answers.com/Q/What_is_the_meaning_of_cmos_in_cmos_battery
A power supply unit
A power supply unit (PSU) converts mains AC to low-voltage regulated DC power for the internal components of a computer. Modern personal computers universally use a switched-mode power supply. Some power supplies have a manual selector for input voltage, while others automatically adapt to the supply voltage.
Most modern desktop personal computer power supplies conform to the ATX form factor. ATX power supplies are turned on and off by a signal from the motherboard. They also provide a signal to the motherboard to indicate when the DC power lines are correct so that the computer is able to boot up. While an ATX power supply is connected to the mains supply it provides a 5 V stand-by (5VSB) line so that the standby functions on the computer and certain peripherals are powered. The most recent ATX PSU standard is version 2.31 of mid-2008. http://en.wikipedia.org/wiki/Power_supply_unit_(computer)
Parallel ATA (PATA)
Parallel ATA (PATA), originally AT Attachment, is an interface standard for the connection of storage devices such ashard disks, floppy drives, and optical disc drives in computers. The standard is maintained by X3/INCITS committee.[1] It uses the underlying AT Attachment (ATA) and AT Attachment Packet Interface (ATAPI) standards.
The Parallel ATA standard is the result of a long history of incremental technical development, which began with the original AT Attachment interface, developed for use in early PC AT equipment. The ATA interface itself evolved in several stages from Western Digital's original Integrated Drive Electronics (IDE) interface. As a result, many near-synonyms for ATA/ATAPI and its previous incarnations are still in common informal use. After the introduction of Serial ATA in 2003, the original ATA was renamed Parallel ATA, PATA for short.
Parallel ATA cables have a maximum allowable length of only 18 in (457 mm).[2][3] Because of this limit, the technology normally appears as an internal computer storage interface. For many years ATA provided the most common and the least expensive interface for this application. It has largely been replaced by Serial ATA (SATA) in newer systems. http://en.wikipedia.org/wiki/Parallel_ATA
IDE cable A liquid crystal display (LCD)
A liquid crystal display (LCD) is a flat panel display, electronic visual display, or video display that uses the light modulating properties of liquid crystals (LCs). LCs do not emit light directly.
LCD displays are available to display arbitrary images (as in a general-purpose computer display) or fixed images which can be displayed or hidden, such as preset words, digits, 7-segment displays, etc., as in a digital clock. They use the same basic technology, except that arbitrary images are made up of a large number of small pixels, while other displays have larger elements.
LCDs are used in a wide range of applications, including computer monitors, television, instrument panels, aircraft cockpit displays, signage, etc. They are common in consumer devices such as video players, gaming devices, clocks, watches, calculators, and telephones. LCDs have replaced cathode ray tube (CRT) displays in most applications. They are available in a wider range of screen sizes than CRT and plasma displays, and since they do not use phosphors, they cannot suffer image burn-in. LCDs are, however, susceptible to image persistence.[1]
The LCD is more energy efficient and offers safer disposal than a CRT. Its low electrical power consumption enables it to be used inbattery-powered electronic equipment. It is an electronically modulated optical device made up of any number of segments filled withliquid crystals and arrayed in front of a light source (backlight) or reflector to produce images in color or monochrome. Liquid crystals were first developed in 1888.[2] By 2008 worldwide sales of televisions with LCD screens exceeded annual sales of CRT units; the CRT became obsolete for most purposes.
http://en.wikipedia.org/wiki/Liquid_crystal_display
Cathode Ray Tube (CRT)
The cathode ray tube (CRT) is a vacuum tube containing an electron gun (a source of electrons or electron emitter) and afluorescent screen used to view images. It has a means to accelerate and deflect the electron beam onto the fluorescent screen to create the images. The image may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radartargets and others. CRTs have also been used as memory devices, in which case the visible light emitted from the fluoresecent material (if any) is not intended to have significant meaning to a visual observer (though the visible pattern on the tube face may cryptically represent the stored data).
The CRT uses an evacuated glass envelope which is large, deep (i.e. long from front screen face to rear end), fairly heavy, and relatively fragile. As a matter of safety, the face is typically made of thick lead glass so as to be highly shatter-resistant and to block most X-ray emissions, particularly if the CRT is used in a consumer product.
CRTs have largely been superseded by more modern display technologies such as LCD, plasma display, and OLED, which offer lower manufacturing and distribution costs.
http://en.wikipedia.org/wiki/Cathode_ray_tube
BIOS
In IBM PC compatible computers, the Basic Input Output System (In IBM PC compatible computers, the Basic Input Output System (BIOS), also known as the System BIOS or ROM BIOS ( /ˈbaɪ.oʊs/), is a de facto standard defining a firmware interface.[1] The name originated as the name of a component of CP/M (circa 1973-1974), where the BIOS was loaded from disc rather than stored as firmware on ROM (because ROMs were expensive and difficult to reprogram at the time).The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot firmware'). When the PC starts up, the first job for the BIOS is the power-on self-test, which initializes and identifies system devices such as the CPU, RAM, video display card,keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates boot loader software held on aperipheral device (designated as a 'boot device'), such as a hard disk or a CD/DVD, and loads and executes that software, giving it control of the PC.[2] This process is known as booting, or booting up, which is short for bootstrapping.
BIOS software is stored on a non-volatile ROM chip on the motherboard. It is specifically designed to work with each particular model of computer, interfacing with various devices that make up the complementary chipset of the system. In modern computer systems theBIOS chip's contents can be rewritten without removing it from the motherboard, allowing BIOS software to be upgraded in place.
A BIOS has a user interface (UI), typically a menu system accessed by pressing a certain key on the keyboard when the PC starts. In the BIOS UI, a user can:
§ configure hardware
§ set the system clock
§ enable or disable system components
§ select which devices are eligible to be a potential boot device
§ set various password prompts, such as a password for securing access to the BIOS user interface functions itself and preventing malicious users from booting the system from unauthorized peripheral devices.
http://en.wikipedia.org/wiki/BIOS), also known as the System BIOS or ROM BIOS ( /ˈbaɪ.oʊs/), is a de facto standard defining a firmware interface.[1] The name originated as the name of a component of CP/M (circa 1973-1974), where the BIOS was loaded from disc rather than stored as firmware on ROM (because ROMs were expensive and difficult to reprogram at the time).
The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot firmware'). When the PC starts up, the first job for the BIOS is the power-on self-test, which initializes and identifies system devices such as the CPU, RAM, video display card,keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates boot loader software held on aperipheral device (designated as a 'boot device'), such as a hard disk or a CD/DVD, and loads and executes that software, giving it control of the PC.[2] This process is known as booting, or booting up, which is short for bootstrapping.
BIOS software is stored on a non-volatile ROM chip on the motherboard. It is specifically designed to work with each particular model of computer, interfacing with various devices that make up the complementary chipset of the system. In modern computer systems theBIOS chip's contents can be rewritten without removing it from the motherboard, allowing BIOS software to be upgraded in place.
A BIOS has a user interface (UI), typically a menu system accessed by pressing a certain key on the keyboard when the PC starts. In the BIOS UI, a user can:
§ configure hardware
§ set the system clock
§ enable or disable system components
§ select which devices are eligible to be a potential boot device
§ set various password prompts, such as a password for securing access to the BIOS user interface functions itself and preventing malicious users from booting the system from unauthorized peripheral devices.
http://en.wikipedia.org/wiki/BIOS
Utility software
Utility software is system software designed to help analyze, configure, optimize or maintain a computer. A single piece of utility software is usually called a utility or tool.
Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, application software and data storage) operates. Due to this focus, utilities are often rather technical and targeted at people with an advanced level of computer knowledge - in contrast to application software, which allows users to do things like creating text documents, playing games, listening to music or viewing websites.
[edit]Utility software categories
§ Anti-virus utilities scan for computer viruses.
§ Backup utilities can make a copy of all information stored on a disk, and restore either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of accidental deletion).
§ Data compression utilities output a shorter stream or a smaller file when provided with a stream or file.
§ Disk checkers can scan operating hard drive.
§ Disk cleaners can find files that are unnecessary to computer operation, or take up considerable amounts of space. Disk cleaner helps the user to decide what to delete when their hard disk is full.
§ Disk compression utilities can transparently compress/uncompress the contents of a disk, increasing the capacity of the disk.
§ Disk defragmenters can detect computer files whose contents are broken across several locations on the hard disk, and move the fragments to one location to increase efficiency.
§ Disk partitions can divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive.
§ Disk space analyzers for the visualization of disk space usage by getting the size for each folder (including sub folders) & files in folder or drive. showing the distribution of the used space.
§ Disk storage utilities
§ Archive utilities output a stream or a single file when provided with a directory or a set of files. Archive utilities, unlike archive suites, usually do not include compression or encryption capabilities. Some archive utilities may even have a separate un-archive utility for the reverse operation.
§ File managers provide a convenient method of performing routine data management tasks, such as deleting, renaming, cataloging, uncataloging, moving, copying, merging, generating and modifying data sets.
§ Cryptographic utilities encrypt and decrypt streams and files.
§ Hex editors directly modify the text or data of a file. These files could be data or an actual program.
§ Memory testers check for memory failures.
§ Network utilities analyze the computer's network connectivity, configure network settings, check data transfer or log events.
§ Registry cleaners clean and optimize the Windows registry by removing old registry keys that are no longer in use.
§ Screensavers were desired to prevent phosphor burn-in on CRT and plasma computer monitors by blanking the screen or filling it with moving images or patterns when the computer is not in use. Contemporary screensavers are used primarily for entertainment or security.
§ System monitors for monitoring resources and performance in a computer system.
§ System profilers provide detailed information about the software installed and hardware attached to the computer. http://en.wikipedia.org/wiki/Utility_software
Create a free website with Weebly var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-7870337-1']); _gaq.push(['_setDomainName', 'none']); _gaq.push(['_setAllowLinker', true]); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); _qoptions={ qacct:"p-0dYLvhSGGqUWo" }; (function(jQuery) { try { if (jQuery) { jQuery('div.blog-social div.fb-like').attr('class', 'blog-social-item blog-fb-like'); jQuery('#commentArea iframe').css('min-height', '410px'); } else { // Prototype $$('div.blog-social div.fb-like').each(function(div) { div.className = 'blog-social-item blog-fb-like'; }); $$('#commentArea iframe').each(function(iframe) { iframe.style.minHeight = '410px'; }); } } catch(ex) {} })(window._W && _W.jQuery); This website is maintained and developed by Mr. George P. Lumayag , ICT Coordinator
A lens is an optical device which transmits and refracts light, converging or diverging the beam.[citation needed] A simple lensconsists of a single optical element. A compound lens is an array of simple lenses (elements) with a common axis; the use of multiple elements allows more optical aberrations to be corrected than is possible with a single element. Lenses are typically made of glass or transparent plastic. Elements which refract electromagnetic radiation outside the visual spectrum are also called lenses: for instance, a microwave lens can be made from paraffin wax. http://en.wikipedia.org/wiki/Lens_(optics)
A ruler
A ruler, sometimes called a rule or line gauge, is an instrument used in geometry, technical drawing, printing and engineering/building to measure distances and/or to rule straight lines. Strictly speaking, the ruler is essentially a straightedge used to rule lines[citation needed], but typically the ruler also contains calibrated lines to measure distances.[1] http://en.wikipedia.org/wiki/Ruler
A T-square
A T-square is a technical drawing instrument used by draftsmen primarily as a guide for drawing horizontal lines on a drafting table. It may also guide a set square to draw vertical or diagonal lines. Its name comes from the general shape of the instrument where the horizontal member of the T slides on the side of the drafting table. T-squares come in varying sizes, common lengths being 18", 24", 30", 36" and 42".[citation needed]
T-squares are also used to measure and cut drywall. Drywall T-squares are typically made of aluminium and have a 48-inch (1,220 mm) long tongue.
Higher-end table saws are often equipped with T-square fences. These table saw fences are attached to a rail only on the front side of the table unlike traditional fences which clamp to both the front and the rear of the table. http://en.wikipedia.org/wiki/T-square
Steel rules
Steel rules come in rigid and flexible versions. While their primary purpose is accurate measurement, they can also be used as guides for laying out lines, and if rigid enough, for cutting. The thinner, more flexible rules can also be used to measure rounded or cambered work.
The differences in the prices of rules result from the various production methods, which also determine accuracy and legibility. Most rules are made by cutting the required length from a roll of band spring steel, with etched graduations. Rules made by this method are adequate for most applications and reasonably priced.
Higher-priced rules are cut, not stamped, from plate steel (stamping would cause the material to warp), and the edges are ground. Graduations are machined, much deeper than etched graduations, longer-lasting, and easier to read in poor light. http://www.fine-tools.com/mass.htm
A protractor
In geometry, a protractor is a square, circular or semicircular tool, typically in transparent perspex, for measuring angles. The units of measurement utilized are usually degrees (°).
They are used for a variety of mechanical and engineering-related applications, but perhaps the most common use is in geometry lessons in schools.
Some protractors are simple half-discs. More advanced protractors, such as the bevel protractor, have one or two swinging arms, which can be used to help measure the angle.
http://en.wikipedia.org/wiki/Protractor
An electronic calculator
An electronic calculator is a small, portable, usually inexpensive electronic device used to perform the basic operations of arithmetic. Modern calculators are more portable than most computers, though most PDAs are comparable in size to handheld calculators.
The first solid state electronic calculator was created in the 1960s, building on the history of tools such as the abacus, developed around 2000 BC; and the mechanical calculator, developed in the 17th century. It was developed in parallel with the analog computers of the day.
Pocket-sized devices became available in the 1970s, especially after the invention of the microprocessor developed serendipitously byIntel for a Busicom calculator.
Modern electronic calculators vary from cheap, give-away, credit-card sized models to sturdy desktop models with built-in printers. They became popular in the mid-1970s as integrated circuits made their size and cost small. By the end of that decade, calculator prices had reduced to a point where a basic calculator was affordable to most and they became common in schools. http://en.wikipedia.org/wiki/Calculator
A multimeter
A multimeter or a multitester, also known as a VOM (Volt-Ohm meter), is an electronic measuring instrument that combines several measurement functions in one unit. A typical multimeter may include features such as the ability to measure voltage, current andresistance. Multimeters may use analog or digital circuits--analog multimeters (AMM) and digital multimeters (often abbreviatedDMM or DVOM.) Analog instruments are usually based on a microammeter whose pointer moves over a scale calibrated for all the different measurements that can be made; digital instruments usually display digits, but may display a bar of a length proportional to the quantity being measured.
A multimeter can be a hand-held device useful for basic fault finding and field service work or a bench instrument which can measure to a very high degree of accuracy. They can be used to troubleshoot electrical problems in a wide array of industrial and household devices such as electronic equipment, motor controls, domestic appliances, power supplies, and wiring systems. http://en.wikipedia.org/wiki/Multimeter
An eraser
An eraser (US) or rubber (elsewhere) is an article of stationery that is used for removing pencil markings. Erasers have a rubbery consistency and are often pink or white. Some pencils have an eraser on one end. Typical erasers are made fromsynthetic rubber, but more expensive or specialized erasers are vinyl, plastic, or gum-like materials. Cheaper erasers can be made out of synthetic soy-based gum.
An eraser can be used of cleaning the RAM, a memory chip of the PC.
http://www.nlm.nih.gov/medlineplus/ency/article/002816.htm
paint brush brush 1 (brsh)
n.
1. a. A device consisting of bristles fastened into a handle, used in scrubbing, polishing, or painting.
b. The act of using this device.
2. A light touch in passing; a graze.
3. An instance of contact with something undesirable or dangerous: a brush with the law; a brush with death.
4. A bushy tail: the brush of a fox.
5. A sliding connection completing a circuit between a fixed and a moving conductor.
6. A snub; a brushoff.
http://www.thefreedictionary.com/Paint+brush
A vacuum
A vacuum is a space devoid of air or matter, or a tool that uses suction to clean.(noun)
1. An example of a vacuum is a space with nothing in it.
2. An example of a vacuum is something used to clean up dirt on a floor.
To vacuum is to clean using a tool that sucks dirt or other elements into a storage container. (verb)
An example of vacuum is to clean the dirt off the carpet using a vacuum cleaner.
http://www.yourdictionary.com/vacuum
A soldering gun
A soldering gun is an approximately pistol-shaped tool for soldering metals using tin-based solder to achieve a strong mechanical bond with good electrical contact. The tool has a trigger-style switch so it can be easily operated with one hand. The body of the tool contains a transformer with a primary winding connected to mains electricity when the trigger is pressed, and an incomplete single-turn secondary winding of thick copper with very low resistance. A soldering tip, made of a loop of thinner copper wire, is secured to the end of the transformer secondary by screws, completing the secondary winding. When the primary of the transformer is energized, several hundred amperes of current flow through the secondary and very rapidly heat the copper tip. Since the tip has a much higher resistance than the rest of the tubular copper winding, the tip, used for soldering, gets very hot while the remainder of the secondary warms much less. A tap on the primary winding is often used to light a pilot lamp which also provides illumination of the workpiece. http://en.wikipedia.org/wiki/Soldering_gun
Pliers
Pliers are a hand tool used to hold objects firmly, for bending, or physical compression. Generally, pliers consist of a pair of metal first-class levers joined at a fulcrum positioned closer to one end of the levers, creating short jaws on one side of the fulcrum, and longerhandles on the other side. This arrangement creates a mechanical advantage, allowing the force of the hand's grip to be amplified and focused on an object with precision. The jaws can also be used to manipulate objects too small or unwieldy to be manipulated with the fingers. http://en.wikipedia.org/wiki/Pliers
Diagonal pliers
Diagonal pliers (or wire cutters or diagonal cutting pliers) are pliers intended for the cutting of wire (they are generally not used to grab or turn anything). The plane defined by the cutting edges of the jaws intersects the joint rivet at an angle or "on a diagonal", hence the name. Instead of using a shearing action as with scissors, they cut by indenting and wedging the wire apart. The jaw edges are ground to a symmetrical "V" shape; thus the two jaws can be visualized to form the letter "X", as seen end-on when fully occluded. The pliers are made of tempered steel with inductive heating and quenching often used to selectively harden the jaws.
http://en.wikipedia.org/wiki/Diagonal_pliers
A Phillips screw driver
A Phillips screw driver is primarily used to fasten and unfasten screws with a star-like hole in their heads.
Read more: http://wiki.answers.com/Q/What_is_the_use_of_a_Philips_screwdriver#ixzz1yYGur1jE
http://wiki.answers.com/Q/What_is_the_use_of_a_Philips_screwdriver
A screwdriver
A screwdriver is a tool for driving screws or bolts with special slots, and sometimes for rotating other machine elements with the mating drive system. The screwdriver is made up of a head or tip, which engages with a screw, a mechanism to apply torque byrotating the tip, and some way to position and support the screwdriver. A typical hand screwdriver comprises an approximately cylindrical handle of a size and shape to be held by a human hand, and an axial shaft fixed to the handle, the tip of which is shaped to fit a particular type of screw. The handle and shaft allow the screwdriver to be positioned and supported and, when rotated, to apply torque. Screwdrivers are made in a variety of shapes, and the tip can be rotated manually or by an electric motor or other motor. http://en.wikipedia.org/wiki/Screwdriver
The flat head is also one of the most abused tools, often substituted for any number of other tools that might not be available. The fact is the flat head screwdriver is quite useful for more than tightening screws. Used for light prying, scraping, nudging or holding it can be pretty versatile. Treat it too badly, though, and it'll snap, leaving you with a fishing weight in your toolbox. http://autorepair.about.com/od/tools/a/tools_flathed.htm
Goggles or safety glasses
Goggles or safety glasses are forms of protective eyewear that usually enclose or protect the area surrounding the eye in order to prevent particulates, water or chemicals from striking the eyes. They are used in chemistry laboratories and in woodworking. They are often used in snow sports as well, and in swimming. Goggles are often worn when using power tools such as drills or chainsaws to prevent flying particles from damaging the eyes. Many types of goggles are available as prescription goggles for those with vision problems. http://en.wikipedia.org/wiki/Goggles
A glove
A glove (Middle English from Old English glof) is a garment covering the whole hand. Gloves have separate sheaths or openings for eachfinger and the thumb; if there is an opening but no covering sheath for each finger they are called "fingerless gloves". Fingerless gloves with one large opening rather than individual openings for each finger are sometimes called gauntlets. Gloves which cover the entire hand or fist but do not have separate finger openings or sheaths are called mittens. Mittens are warmer than gloves made of the same material because fingers maintain their warmth better when they are in contact with each other. Reduced surface area reduces heat loss. http://en.wikipedia.org/wiki/Glove
LAN tester
· What are the features of LAN tester?
· How do you establish LAN to LAN connection?
The traffic has to go through a router to connect one network to another. Read More
· What does a LAN does?
A "LAN" stands for Local Area Network. It's just what it sounds like. A group of private computers that are connected by a common private network. If you have 2 computers in your home, and they are... Read More
· What is a LAN?
a LAN is a Local Area Network Answer. A LAN is the short abbreviation for Local Area Network. In a LAN you usually have many computers connected together using ehternet, Wifi, etc. The computers in... Read More
· What are LANs?
LAN stands for Local Area Network. A computing term for a method of connecting computers, generally using wires, and generally in the one building. Read More
http://wiki.answers.com/Q/What_is_LAN_tester
An antistatic wrist strap
An antistatic wrist strap, ESD wrist strap, or ground bracelet is an antistatic device used to safely ground a person working on very sensitive electronic equipment, to prevent the buildup of static electricity on their body, which can result in electrostatic discharge (ESD). It is used in the electronics industry by workers working on electronic devices which can be damaged by ESD, and also sometimes by people working around explosives, to prevent electric sparks which could set off an explosion. It consists of a stretchy band offabric with fine conductive fibers woven into it, attached to a wire with a clip on the end to connect it to a ground conductor. The fibers are usually made of carbon or carbon-filled rubber, and the strap is bound with a stainless steel clasp or plate. They are usually used in conjunction with an antistatic mat on the workbench, or a special static-dissipating plastic laminate on the workbench surface. http://en.wikipedia.org/wiki/Antistatic_wrist_strap
A crimping tool
A crimping tool is a tool designed to crimp or connect a connector to the end of a cable. For example, network cables and phone cables are created using a crimping tool to connect the RJ-45 and RJ-11 connectors to the end of the cable. In the picture to the right, is an example of what a crimping tool looks like. This example shows a tool capable of crimping both RJ-11 and RJ-45 connectors. http://www.computerhope.com/jargon/c/crimp.htm
Sharp Pointed Tweezers The Tweezerman Pointed Tweezers feature perfectly aligned, hand filed tips made from 100 stainless steel. The fine, precision design makes eliminating even the most stubborn stray hairs a cinch.Caution: Tweezers are very sharp. Use with care. Keep out of the reach of children.Tweeze in the direction of hair growth, after a hot shower, or use a hot wash cloth to open pores. For ingrown hairs, cleanse skin and disinfect the tips of the tweezers with alcohol. After any work under the skin, clean area with hydrogen peroxide. Always replace protective cap on tweezer tips. http://reviews.sephora.com/8723/P63915/reviews.htm
A soldering iron
A soldering iron is a hand tool used in soldering. It supplies heat to melt the solder so that it can flow into the joint between two workpieces.
A soldering iron is composed of a heated metal tip and an insulated handle. Heating is often achieved electrically, by passing an electric current (supplied through an electrical cord or battery cables) through a resistive heating element. Portable irons can be heated by combustion of gas stored in a small tank, often using a catalytic heater rather than a flame. Simple irons less commonly used than in the past were simply a large copper bit on a handle, heated in a flame.
Soldering irons are most often used for installation, repairs, and limited production work in electronics assembly. High-volume production lines use other soldering methods.[1] Large irons may be used for soldering joints in sheet metal objects. Less common uses includepyrography (burning designs into wood) and plastic welding. http://en.wikipedia.org/wiki/Soldering_iron
An operating system
An operating system is a program designed to run other programs on a computer. A computer’s operating system is its most important program. It is considered the backbone of a computer, managing both software and hardware resources. Operating systems are responsible for everything from the control and allocation of memory to recognizing input from external devices and transmitting output to computer displays. They also manage files on computer hard drives and control peripherals, like printers and scanners. http://www.wisegeek.com/what-is-an-operating-system.htm
An application program
An application program (sometimes shortened to application) is any program designed to perform a specific function directly for the user or, in some cases, for another application program. Examples of application programs include word processors; database programs; Web browsers; development tools; drawing, paint, and image editing programs; and communication programs. Application programs use the services of the computer's operating system and other supporting programs. The formal requests for services and means of communicating with other programs that a programmer uses in writing an application program is called the application program interface (API). http://searchsoftwarequality.techtarget.com/definition/application-program
An oscilloscope
An oscilloscope, previously called an oscillograph, and informally known as a scope, CRO (for cathode-ray oscilloscope), or DSO (for the more modern digital storage oscilloscope), is a type of electronic test instrument that allows observation of constantly varying signalvoltages, usually as a two-dimensional graph of one or more electrical potential differences using the vertical or 'Y' axis, plotted as a function of time (horizontal or 'x' axis). Many signals, for example sound, can be converted to voltages and displayed this way. Signals are often periodic and repeat constantly, so that multiple samples of a signal which is actually varying with time are displayed as a steady picture. Many oscilloscopes (storage oscilloscopes) can also capture non-repeating waveforms for a specified time, and show a steady display of the captured segment.
Oscilloscopes are commonly used to observe the exact wave shape of an electrical signal. Oscilloscopes are usually calibrated so that voltage and time can be read as well as is possible by eye. This allows the measurement of, for example, peak-to-peak voltage of a waveform, the frequency of periodic signals, the time between pulses, the time taken for a to rise to full amplitude (rise time), and relative timing of several related signals.[1]
Oscilloscopes are used in the sciences, medicine, engineering, and telecommunications industry. General-purpose instruments are used for maintenance of electronic equipment and laboratory work. Special-purpose oscilloscopes may be used for such purposes as analyzing an automotive ignition system, or to display the waveform of the heartbeat as an electrocardiogram. Some computer sound software allows the sound being listened to to be displayed on the screen as by an oscilloscope.
Before the advent of digital electronics oscilloscopes used cathode ray tubes as their display element (hence were commonly referred to as CROs) and linear amplifiers for signal processing. More advanced storage oscilloscopes used special storage CRTs to maintain a steady display of a single brief signal. CROs were later largely superseded by digital storage oscilloscopes (DSOs) with thin panel displays, fast analog-to-digital converters and digital signal processors. DSOs without integrated displays (sometimes known as digitisers) are available at lower cost, and use a general-purpose digital computer to process and display waveforms. http://en.wikipedia.org/wiki/Oscilloscope
A hub
A hub is a piece of hardware that contains several ethernet ports that connects several computers. Connecting a hub to a network is very easy. You can simply connect a hub to your router, and then several computers to the hub. The IP addresses of the computers that are connected to the hub are assigned by the router it is connected to.
Hubs work by broadcasting data to all computers that are connected to it. When a computer or program makes a request for information from another computer, the originating computer sends (broadcasts) the request to the hub. The hub will then brodcast the request to all computers that are connect to it. When the destination computer receives the request, it sends the information back to the hub. Once again the hub broadcasts the information to all computers, with only the requesting computer acting on the information.
The downside to this type of connection is that the bandwidth is subdivided between the number of computers that are connected to the hub. If you have a 100Mbps connection, and 2 computers connected to the hub, then the bandwidth available to each computer is 50Mbps. With 4 computers, the bandwidth drops to 25Mbps.
An alternative to hubs are switches.
RJ45
RJ45 may refer to:
§ RJ45 (telecommunications), a connector standard for telephone cables
§ RJ45 (computers), a connector for computer network (Ethernet) cables
§ Modular connectors come in four sizes: 4-, 6-, 8-, and 10-position, where a position is a location for a contact. Not all of the positions may have contacts installed. When contacts are omitted, they are typically done so from the outermost pair of contacts inward, such that the number of contacts is almost always an even number. The insulating plastic bodies of 4P and 6P connectors have different widths, whereas 8P or 10P connectors share an even larger body width. The connector body positions with omitted contacts or contacts unattached to wires are unused for the electrical connection, but ensure that the plug fits correctly. For instance, RJ11 cables often have connectors with 6 positions and 4 contacts, to which are attached just 2 wires.
§ The connectors are designated with two numbers that represent the quantity of positions and contacts, with each number followed by a "P" and "C", respectively: for example, "6P2C" for a connector having 6 positions and 2 contacts. Alternate designations omit the "P" and "C" while separating the position and contact quantities with either an "x" ("6x2") or a slash ("6/2").
§ Internally, the contacts have sharp prongs that when crimped, pierce the insulation and connect with the wire conductor, a mechanism known as insulation displacement. Ethernet cables, in particular, may have solid or stranded wire conductors and the sharp prongs are different in the 8P8C connectors made for each type of wire. A modular plug for solid (single strand) wire often has three slightly splayed prongs on each contact to securely surround and grip the conductor. Modular plugs for stranded or tinsel wire have prongs that are designed to connect to multiple wire strands. Connector plugs are designed for either solid or stranded wire; a plug for one wire type might not make reliable contact when crimped to a cable with wires of the other type.
§ The dimensions of the connectors are such that a plug can be inserted into a jack that has more positions than the plug, leaving the jack's outermost contacts unconnected. However, not all plugs from all manufacturers have this capability, and some jack manufacturers warn that their jacks are not designed to accept smaller plugs without damage. If an inserted plug lacks contact slots at the outermost extremes, it may permanently deform the outmost contacts of an incompatible jack.
§ The contact positions are numbered sequentially starting from 1. When viewed head-on with the retention mechanism on the bottom, jacks will have contact position number 1 on the left and plugs will have it on the right. Contacts are numbered by the contact position. For example, on a 6-position, 2-contact plug, where the outermost four positions do not have contacts, the innermost two contacts are numbered 3 and 4.
§ Some modular connectors are indexed: their dimensions are intentionally non-standard, preventing connections with connectors of standard dimensions. The means of indexing may be non-standard cross-section dimensions or shapes, retention mechanism dimensions, or retention mechanism quantity. For example, a Modified Modular Jack (MMJ) using an offset latching tab was developed by Digital Equipment Corporation (DEC) to prevent accidental interchange of data and telephone cables.
http://en.wikipedia.org/wiki/RJ45
RJ45
RJ45 is a standard type of connector for network cables. RJ45 connectors are most commonly seen with Ethernet cables and networks.
RJ45 connectors feature eight pins to which the wire strands of a cable interface electrically. Standard RJ-45 pinouts define the arrangement of the individual wires needed when attaching connectors to a cable.
Several other kinds of connectors closely resemble RJ45 and can be easily confused for each other. The RJ-11 connectors used with telephone cables, for example, are only slightly smaller (narrower) than RJ-45 connectors. http://compnetworking.about.com/od/networkcables/g/bldef_rj45.htm
Switches
Switches are similar to hubs in that they allow you to connect multiple computers together on a network. You can also connect switches to routers in the same way you connect hubs.
There are several differences between hubs and switches, however, that can boost the performance of your network. The performance increase has to do with how data is transmitted between the computers on your network.
While hubs transmit data via broadcasting the data to all computers that are connected to it, switches establish a direct connection between the transmitting and receiving computers. The added benefit of this is that the bandwidth is not subdivided. If you have a 100Mbps bandwidth on your network with 2 computers connected to a switch, the total bandwidth available to both computers is 100Mbps. This means that each port on the switch has the full bandwidth dedicated to it.
Many switches also have the ability to either use half- or full-duplex (receive and transmit at the same time). Hubs are half-duplex, which means they can either receive or transmit, but not both at the same time.
As you can see you can replace existing hubs on your network with switches to increase the effective speed of your network. http://technicallyeasy.net/2008/11/what-are-hubs-and-switches/
A CD-ROM
A CD-ROM ( /ˌsiːˌdiːˈrɒm/, an acronym of "Compact Disc Read-only memory") is a pre-pressed compact disc that contains dataaccessible to, but not writable by, a computer for data storage and music playback. The 1985 “Yellow Book” standard developed bySony and Philips adapted the format to hold any form of binary data.[2]
CD-ROMs are popularly used to distribute computer software, including video games and multimedia applications, though any data can be stored (up to the capacity limit of a disc). Some CDs hold both computer data and audio with the latter capable of being played on aCD player, while data (such as software or digital video) is only usable on a computer (such as ISO 9660 format PC CD-ROMs). These are called enhanced CDs.
Even though many people use lowercase letters in this acronym, proper presentation is in all capital letters with a hyphen between CD and ROM. At the time of the technology's introduction it had more capacity than computer hard drives common at the time. The reverse is now true, with hard drives far exceeding CDs, DVDs and Blu-ray, though some experimental descendants of it such as HVDs may have more space and faster data rates than today's largest hard drive.
http://en.wikipedia.org/wiki/CD-ROM
DVD
DVD is an optical disc storage format, invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995. DVDs offer higher storage capacity than Compact Discs while having the same dimensions.
Pre-recorded DVDs are mass-produced using molding machines that physically stamp data onto the DVD. Such discs are known as DVD-ROM, because data can only be read and not written nor erased. Blank recordable DVD discs (DVD-R and DVD+R) can be recorded once using a DVD recorder and then function as a DVD-ROM. Rewritable DVDs (DVD-RW, DVD+RW, and DVD-RAM) can be recorded and erased multiple times.
DVDs are used in DVD-Video consumer digital video format and in DVD-Audio consumer digital audio format, as well as for authoringAVCHD discs. DVDs containing other types of information may be referred to as DVD data discs. http://en.wikipedia.org/wiki/DVD
A modem
A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from light emitting diodes to radio. The most familiar example is a voice band modem that turns the digital data of a personal computer into modulated electrical signals in the voice frequency range of a telephone channel. These signals can be transmitted over telephone linesand demodulated by another modem at the receiver side to recover the digital data.
Modems are generally classified by the amount of data they can send in a given unit of time, usually expressed in bits per second (bit/s, or bps). Modems can alternatively be classified by their symbol rate, measured in baud. The baud unit denotes symbols per second, or the number of times per second the modem sends a new signal. For example, the ITU V.21 standard used audio frequency-shift keying, that is to say, tones of different frequencies, with two possible frequencies corresponding to two distinct symbols (or one bit per symbol), to carry 300 bits per second using 300 baud. By contrast, the original ITU V.22 standard, which was able to transmit and receive four distinct symbols (two bits per symbol), handled 1,200 bit/s by sending 600 symbols per second (600 baud) using phase shift keying.
http://en.wikipedia.org/wiki/Modem
A wireless router
A wireless router is a device that performs the functions of a router but also includes the functions of a wireless access point and anetwork switch. It is commonly used to provide access to the Internet or to some other computer network. It does not need a cabled connection. It can function in a wired LAN (local area network), in a wireless-only LAN (WLAN), or in a mixed wired/wireless network.
Most current wireless routers have the following characteristics:
§ LAN ports which function in the same manner as the ports of a network switch.
§ A WAN port which connects to a wide area network, typically one with Internet access. External destinations are accessed using this port.
§ A wireless antenna that allows connections to other wireless devices, such as NiCs, wireless repeaters, wireless access points, and wireless bridges. This antenna typically uses the Wi-Fi standard.
Some wireless routers also include a DSL or cable modem in addition to the other components.
http://en.wikipedia.org/wiki/Wireless_router
A printer
In computing, a printer is a peripheral which produces a text or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies. Many printers are primarily used as local peripherals, and are attached by a printer cable or, in most new printers, a USB cable to a computer which serves as a document source. Some printers, commonly known as network printers, have built-in network interfaces, typically wireless or Ethernet based, and can serve as a hard copy device for any user on the network. Individual printers are often designed to support both local and network connected users at the same time. In addition, a few modern printers can directly interface to electronic media such as memory cards, or to image capture devices such as digital camerasand scanners; some printers are combined with scanners or fax machines in a single unit, and can function as photocopiers. Printers that include non-printing features are sometimes called multifunction printers (MFP), multi-function devices (MFD), or all-in-one (AIO) printers. Most MFPs include printing, scanning, and copying among their many features.
http://en.wikipedia.org/wiki/Printer_(computing)
client-server
In the context of client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the "server" performs some computational task on behalf of "clients". The clients either run on the same computer or connect through the network.
In most common use, server is a physical computer (a computer hardware system) dedicated to running one or more such services (as a host),[1] to serve the needs of users of the other computers on the network. Depending on the computing service that it offers it could be a database server, file server, mail server, print server, web server, gaming server, or some other kind of server.
In the context of Internet Protocol (IP) networking, a server is a program that operates as a socket listener.[2]
Servers often provide essential services across a network, either to private users inside a large organization or to public users via the Internet. http://en.wikipedia.org/wiki/Server_(computing)
A peripheral
A peripheral is a device connected to a host computer, but not part of it, and is more or less dependent on the host. These are also input/output devices. It expands the host's capabilities, but does not form part of the core computer architecture.
Definition: Any auxiliary device such as a mouse, keyboard, hard drive, etc. that connects to and works with the computer in some way. Usually, the word peripheral is used to refer to a device external to the computer, like a scanner, but the devices located inside the computer case are also technically peripherals. Also Known As: external peripheral, auxiliary component
Examples: "Many of the external peripherals I own, such as my scanner and printer, connect to the peripheral ports on the back of my computer."[1]
There are three different types of peripherals: Input Output Storage
An output peripheral is an external device that provides input and output for the computer. For example RAM has a peripheral output. Some peripherals, such as the external hardrive, provide both input and output for the computer. Usually for every external device there are input and output peripherals. An example of only input peripherals, a keyboard and a mouse are input and peripherals. An example of an output peripherals are hard drives disk. The storage peripherals are also considered to be used to store information on the computer for future use. http://en.wikipedia.org/wiki/Peripheral
A desktop computer
A desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Early desktop computers are designed to lay flat on the desk, while modern towers stand upright. Most modern desktop computers have separate screens and keyboards.
Prior to the widespread use of microprocessors, a computer that could fit on a desk was considered remarkably small. Early personal computers, like the IBM PC, were "desktop" machines, with a horizontally-oriented computer case, usually intended to have the display screen placed on top to save space on the desktop. In modern usage the word "desktop" usually refers to tower cases that are in fact more often located on the floor under the desk than on a desk.
Technically speaking desktop and tower computers are two different styles of computer case that use desk space in varying ways.[original research?] Cases intended for home theater PC systems are usually considered to be desktop cases in both senses, regardless of orientation and placement.[original research?]
http://en.wikipedia.org/wiki/Desktop_computer
Random access memory (RAM)
Random access memory (RAM) is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored datato be accessed in any order with a worst case performance of constant time. Strictly speaking, modern types of DRAM are not random access, as data is read in bursts, although the name DRAM / RAM has stuck. However, many types of SRAM, ROM, OTP, and NOR flash are still random access even in a strict sense. RAM is often associated with volatile types of memory (such as DRAM memory modules), where its stored information is lost if the power is removed. Many other types of non-volatile memory are RAM as well, including most types of ROM and a type of flash memory called NOR-Flash. The first RAM modules to come into the market were created in 1951 and were sold until the late 1960s and early 1970s. http://en.wikipedia.org/wiki/Random-access_memory
DDR SDRAM
Double data rate synchronous dynamic random-access memory (DDR SDRAM) is a class of memory integrated circuits used incomputers. DDR SDRAM (sometimes referred to as DDR1 SDRAM) has been superseded by DDR2 SDRAM and DDR3 SDRAM, neither of which are either forward or backward compatible with DDR SDRAM, meaning that DDR2 or DDR3 memory modules will not work in DDR equipped motherboards, and vice versa.
Compared to single data rate (SDR) SDRAM, the DDR SDRAM interface makes higher transfer rates possible by more strict control of the timing of the electrical data and clock signals. Implementations often have to use schemes such as phase-locked loops and self-calibration to reach the required timing accuracy.[1][2] The interface uses double pumping (transferring data on both the rising and falling edges of the clock signal) to lower the clock frequency. One advantage of keeping the clock frequency down is that it reduces the signal integrity requirements on the circuit board connecting the memory to the controller. The name "double data rate" refers to the fact that a DDR SDRAM with a certain clock frequency achieves nearly twice the bandwidth of a single data rate (SDR) SDRAM running at the same clock frequency, due to this double pumping.
With data being transferred 64 bits at a time, DDR SDRAM gives a transfer rate of (memory bus clock rate) × 2 (for dual rate) × 64 (number of bits transferred) / 8 (number of bits/byte). Thus, with a bus frequency of 100 MHz, DDR SDRAM gives a maximum transfer rate of 1600 MB/s.
"Beginning in 1996 and concluding in June 2000, JEDEC developed the DDR (Double Data Rate) SDRAM specification (JESD79)."[3]JEDEC has set standards for data rates of DDR SDRAM, divided into two parts. The first specification is for memory chips, and the second is for memory modules.
http://en.wikipedia.org/wiki/DDR_SDRAM
A hard disk drive
A hard disk drive (HDD; also hard drive, hard disk, or disk drive)[2] is a device for storing and retrieving digital information, primarily computer data. It consists of one or more rigid (hence "hard") rapidly rotating discs (platters) coated with magnetic material, and withmagnetic heads arranged to write data to the surfaces and read it from them.
Hard drives are classified as non-volatile, random access, digital, magnetic, data storage devices. Introduced by IBM in 1956, hard disk drives have decreased in cost and physical size over the years while dramatically increasing in capacity and speed.
Hard disk drives have been the dominant device for secondary storage of data in general purpose computers since the early 1960s.[3]They have maintained this position because advances in their recording capacity, cost, reliability, and speed have kept pace with the requirements for secondary storage.[3] http://en.wikipedia.org/wiki/Hard_disk_drive
a motherboard
In personal computers, a motherboard is the central printed circuit board in many modern computers and holds many of the crucial components of the system, providing connectors for other peripherals. The motherboard is sometimes alternatively known as the mainboard, system board, planar board or, on Apple computers, the logic board.[1] It is also sometimes casually shortened to mobo. http://en.wikipedia.org/wiki/Motherboard
A video card
A video card (also called a display card, graphics card, graphics board, display adapter or graphics adapter) is an expansion card which generates a feed of output images to a display. Most video cards offer various functions such as accelerated rendering of 3Dscenes and 2D graphics, MPEG-2/MPEG-4 decoding, TV output, or the ability to connect multiple monitors (multi-monitor).
Video hardware can be integrated into the motherboard or (as with more recent designs) the CPU, but all modern motherboards (and some from the 1990s) provide expansion ports to which a video card can be attached. In this configuration it is sometimes referred to as a video controller or graphics controller. Modern low-end to mid-range motherboards often include a graphics chipset manufactured by the developer of the northbridge (e.g. an nForce chipset with Nvidia graphics or an Intel chipset with Intel graphics) on the motherboard. This graphics chip usually has a small quantity of embedded memory and takes some of the system's main RAM, reducing the total RAM available. This is usually called integrated graphics or on-board graphics, and is usually low in performance and undesirable for those wishing to run 3D applications. A dedicated graphics card on the other hand has its own Random Access Memory or RAM and Processor specifically for processing video images, and thus offloads this work from the CPU and system RAM. Almost all of these motherboards allow the disabling of the integrated graphics chip in BIOS, and have an AGP, PCI, or PCI Express slot for adding a higher-performance graphics card in place of the integrated graphics. http://en.wikipedia.org/wiki/Video_card
A sound card
A sound card (also known as an audio card) is an internal computer expansion card that facilitates the input and output of audio signals to and from a computer under control of computer programs. The term sound card is also applied to external audio interfaces that use software to generate sound, as opposed to using hardware inside the PC. Typical uses of sound cards include providing the audio component for multimedia applications such as music composition, editing video or audio, presentation, education and entertainment (games) and video projection.
Sound functionality can also be integrated onto the motherboard, using basically the same components as a plug-in card. The best plug-in cards, which use better and more expensive components, can achieve higher quality than integrated sound. The integrated sound system is often still referred to as a "sound card". http://en.wikipedia.org/wiki/Sound_card
Processor
Processor or Processing unit may refer to:
[edit]Computing
§ Central processing unit (CPU), an electronic circuit which executes computer programs, containing a processing unit and a control unit
§ Processing unit, in Von Neumann computer architecture, contains an arithmetic logic unit (ALU) and processor registers
§ Microprocessor, a CPU on one silicon chip as part of a microcomputer
§ Graphics processing unit (GPU / VPU), a dedicated graphics rendering device for a personal computer or game console
§ Physics processing unit (PPU), a dedicated microprocessor designed to handle the calculations of physics
§ Digital signal processor, a specialized microprocessor designed specifically for digital signal processing
§ Network processor, a microprocessor specifically targeted at the networking application domain
§ Front end processor, a helper processor for communication between a host computer and other devices
§ Coprocessor
§ Floating point unit
§ Data processor, a system that translates or converts between different data formats
§ Word processor, a computer application used for the production of printable material
§ Audio processor, used in studios and radio stations
http://en.wikipedia.org/wiki/Processor
CPU Cooling Fan
The components inside a computer's case, especially integrated circuits or chips, generate heat as a by-product. A build up of heat can be devastating to integrated circuits, which normally have a long life expectancy. For that reason, a combination of fans and heat sinks are used to remove excess heat from inside a computer.
Read more: Definition of CPU Cooling Fan | eHow.com http://www.ehow.com/facts_5001672_definition-cpu-cooling-fan.html#ixzz1yTsvfRcL
While a typical desktop computer case contains a large fan to remove heat that builds up inside the cabinet from various components, CPU fans are mounted directly on top of the computer's central processing unit for the sole purpose of dissipating heat on that one single chip. This is because the CPU can become extremely heated in proportion to the amount of work it is doing.
Read more: Definition of CPU Cooling Fan | eHow.com http://www.ehow.com/facts_5001672_definition-cpu-cooling-fan.html#ixzz1yTszLQd7
http://www.ehow.com/facts_5001672_definition-cpu-cooling-fan.html
CMOS
Complementary Metal-Oxide Semiconductor. The CMOS is where the basic modifiable settings of the computer (BIOS, Basic Input-Output System) (Date, time, memory) are stored. These settings are maintained when the power is turned off by a minute current, and that current is supplied by the CMOS battery
Read more: http://wiki.answers.com/Q/What_is_the_meaning_of_cmos_in_cmos_battery#ixzz1yY3p6Vxy
http://wiki.answers.com/Q/What_is_the_meaning_of_cmos_in_cmos_battery
A power supply unit
A power supply unit (PSU) converts mains AC to low-voltage regulated DC power for the internal components of a computer. Modern personal computers universally use a switched-mode power supply. Some power supplies have a manual selector for input voltage, while others automatically adapt to the supply voltage.
Most modern desktop personal computer power supplies conform to the ATX form factor. ATX power supplies are turned on and off by a signal from the motherboard. They also provide a signal to the motherboard to indicate when the DC power lines are correct so that the computer is able to boot up. While an ATX power supply is connected to the mains supply it provides a 5 V stand-by (5VSB) line so that the standby functions on the computer and certain peripherals are powered. The most recent ATX PSU standard is version 2.31 of mid-2008. http://en.wikipedia.org/wiki/Power_supply_unit_(computer)
Parallel ATA (PATA)
Parallel ATA (PATA), originally AT Attachment, is an interface standard for the connection of storage devices such ashard disks, floppy drives, and optical disc drives in computers. The standard is maintained by X3/INCITS committee.[1] It uses the underlying AT Attachment (ATA) and AT Attachment Packet Interface (ATAPI) standards.
The Parallel ATA standard is the result of a long history of incremental technical development, which began with the original AT Attachment interface, developed for use in early PC AT equipment. The ATA interface itself evolved in several stages from Western Digital's original Integrated Drive Electronics (IDE) interface. As a result, many near-synonyms for ATA/ATAPI and its previous incarnations are still in common informal use. After the introduction of Serial ATA in 2003, the original ATA was renamed Parallel ATA, PATA for short.
Parallel ATA cables have a maximum allowable length of only 18 in (457 mm).[2][3] Because of this limit, the technology normally appears as an internal computer storage interface. For many years ATA provided the most common and the least expensive interface for this application. It has largely been replaced by Serial ATA (SATA) in newer systems. http://en.wikipedia.org/wiki/Parallel_ATA
IDE cable A liquid crystal display (LCD)
A liquid crystal display (LCD) is a flat panel display, electronic visual display, or video display that uses the light modulating properties of liquid crystals (LCs). LCs do not emit light directly.
LCD displays are available to display arbitrary images (as in a general-purpose computer display) or fixed images which can be displayed or hidden, such as preset words, digits, 7-segment displays, etc., as in a digital clock. They use the same basic technology, except that arbitrary images are made up of a large number of small pixels, while other displays have larger elements.
LCDs are used in a wide range of applications, including computer monitors, television, instrument panels, aircraft cockpit displays, signage, etc. They are common in consumer devices such as video players, gaming devices, clocks, watches, calculators, and telephones. LCDs have replaced cathode ray tube (CRT) displays in most applications. They are available in a wider range of screen sizes than CRT and plasma displays, and since they do not use phosphors, they cannot suffer image burn-in. LCDs are, however, susceptible to image persistence.[1]
The LCD is more energy efficient and offers safer disposal than a CRT. Its low electrical power consumption enables it to be used inbattery-powered electronic equipment. It is an electronically modulated optical device made up of any number of segments filled withliquid crystals and arrayed in front of a light source (backlight) or reflector to produce images in color or monochrome. Liquid crystals were first developed in 1888.[2] By 2008 worldwide sales of televisions with LCD screens exceeded annual sales of CRT units; the CRT became obsolete for most purposes.
http://en.wikipedia.org/wiki/Liquid_crystal_display
Cathode Ray Tube (CRT)
The cathode ray tube (CRT) is a vacuum tube containing an electron gun (a source of electrons or electron emitter) and afluorescent screen used to view images. It has a means to accelerate and deflect the electron beam onto the fluorescent screen to create the images. The image may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radartargets and others. CRTs have also been used as memory devices, in which case the visible light emitted from the fluoresecent material (if any) is not intended to have significant meaning to a visual observer (though the visible pattern on the tube face may cryptically represent the stored data).
The CRT uses an evacuated glass envelope which is large, deep (i.e. long from front screen face to rear end), fairly heavy, and relatively fragile. As a matter of safety, the face is typically made of thick lead glass so as to be highly shatter-resistant and to block most X-ray emissions, particularly if the CRT is used in a consumer product.
CRTs have largely been superseded by more modern display technologies such as LCD, plasma display, and OLED, which offer lower manufacturing and distribution costs.
http://en.wikipedia.org/wiki/Cathode_ray_tube
BIOS
In IBM PC compatible computers, the Basic Input Output System (In IBM PC compatible computers, the Basic Input Output System (BIOS), also known as the System BIOS or ROM BIOS ( /ˈbaɪ.oʊs/), is a de facto standard defining a firmware interface.[1] The name originated as the name of a component of CP/M (circa 1973-1974), where the BIOS was loaded from disc rather than stored as firmware on ROM (because ROMs were expensive and difficult to reprogram at the time).The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot firmware'). When the PC starts up, the first job for the BIOS is the power-on self-test, which initializes and identifies system devices such as the CPU, RAM, video display card,keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates boot loader software held on aperipheral device (designated as a 'boot device'), such as a hard disk or a CD/DVD, and loads and executes that software, giving it control of the PC.[2] This process is known as booting, or booting up, which is short for bootstrapping.
BIOS software is stored on a non-volatile ROM chip on the motherboard. It is specifically designed to work with each particular model of computer, interfacing with various devices that make up the complementary chipset of the system. In modern computer systems theBIOS chip's contents can be rewritten without removing it from the motherboard, allowing BIOS software to be upgraded in place.
A BIOS has a user interface (UI), typically a menu system accessed by pressing a certain key on the keyboard when the PC starts. In the BIOS UI, a user can:
§ configure hardware
§ set the system clock
§ enable or disable system components
§ select which devices are eligible to be a potential boot device
§ set various password prompts, such as a password for securing access to the BIOS user interface functions itself and preventing malicious users from booting the system from unauthorized peripheral devices.
http://en.wikipedia.org/wiki/BIOS), also known as the System BIOS or ROM BIOS ( /ˈbaɪ.oʊs/), is a de facto standard defining a firmware interface.[1] The name originated as the name of a component of CP/M (circa 1973-1974), where the BIOS was loaded from disc rather than stored as firmware on ROM (because ROMs were expensive and difficult to reprogram at the time).
The BIOS software is built into the PC, and is the first code run by a PC when powered on ('boot firmware'). When the PC starts up, the first job for the BIOS is the power-on self-test, which initializes and identifies system devices such as the CPU, RAM, video display card,keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates boot loader software held on aperipheral device (designated as a 'boot device'), such as a hard disk or a CD/DVD, and loads and executes that software, giving it control of the PC.[2] This process is known as booting, or booting up, which is short for bootstrapping.
BIOS software is stored on a non-volatile ROM chip on the motherboard. It is specifically designed to work with each particular model of computer, interfacing with various devices that make up the complementary chipset of the system. In modern computer systems theBIOS chip's contents can be rewritten without removing it from the motherboard, allowing BIOS software to be upgraded in place.
A BIOS has a user interface (UI), typically a menu system accessed by pressing a certain key on the keyboard when the PC starts. In the BIOS UI, a user can:
§ configure hardware
§ set the system clock
§ enable or disable system components
§ select which devices are eligible to be a potential boot device
§ set various password prompts, such as a password for securing access to the BIOS user interface functions itself and preventing malicious users from booting the system from unauthorized peripheral devices.
http://en.wikipedia.org/wiki/BIOS
Utility software
Utility software is system software designed to help analyze, configure, optimize or maintain a computer. A single piece of utility software is usually called a utility or tool.
Utility software usually focuses on how the computer infrastructure (including the computer hardware, operating system, application software and data storage) operates. Due to this focus, utilities are often rather technical and targeted at people with an advanced level of computer knowledge - in contrast to application software, which allows users to do things like creating text documents, playing games, listening to music or viewing websites.
[edit]Utility software categories
§ Anti-virus utilities scan for computer viruses.
§ Backup utilities can make a copy of all information stored on a disk, and restore either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of accidental deletion).
§ Data compression utilities output a shorter stream or a smaller file when provided with a stream or file.
§ Disk checkers can scan operating hard drive.
§ Disk cleaners can find files that are unnecessary to computer operation, or take up considerable amounts of space. Disk cleaner helps the user to decide what to delete when their hard disk is full.
§ Disk compression utilities can transparently compress/uncompress the contents of a disk, increasing the capacity of the disk.
§ Disk defragmenters can detect computer files whose contents are broken across several locations on the hard disk, and move the fragments to one location to increase efficiency.
§ Disk partitions can divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive.
§ Disk space analyzers for the visualization of disk space usage by getting the size for each folder (including sub folders) & files in folder or drive. showing the distribution of the used space.
§ Disk storage utilities
§ Archive utilities output a stream or a single file when provided with a directory or a set of files. Archive utilities, unlike archive suites, usually do not include compression or encryption capabilities. Some archive utilities may even have a separate un-archive utility for the reverse operation.
§ File managers provide a convenient method of performing routine data management tasks, such as deleting, renaming, cataloging, uncataloging, moving, copying, merging, generating and modifying data sets.
§ Cryptographic utilities encrypt and decrypt streams and files.
§ Hex editors directly modify the text or data of a file. These files could be data or an actual program.
§ Memory testers check for memory failures.
§ Network utilities analyze the computer's network connectivity, configure network settings, check data transfer or log events.
§ Registry cleaners clean and optimize the Windows registry by removing old registry keys that are no longer in use.
§ Screensavers were desired to prevent phosphor burn-in on CRT and plasma computer monitors by blanking the screen or filling it with moving images or patterns when the computer is not in use. Contemporary screensavers are used primarily for entertainment or security.
§ System monitors for monitoring resources and performance in a computer system.
§ System profilers provide detailed information about the software installed and hardware attached to the computer. http://en.wikipedia.org/wiki/Utility_software
Create a free website with Weebly var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-7870337-1']); _gaq.push(['_setDomainName', 'none']); _gaq.push(['_setAllowLinker', true]); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); _qoptions={ qacct:"p-0dYLvhSGGqUWo" }; (function(jQuery) { try { if (jQuery) { jQuery('div.blog-social div.fb-like').attr('class', 'blog-social-item blog-fb-like'); jQuery('#commentArea iframe').css('min-height', '410px'); } else { // Prototype $$('div.blog-social div.fb-like').each(function(div) { div.className = 'blog-social-item blog-fb-like'; }); $$('#commentArea iframe').each(function(iframe) { iframe.style.minHeight = '410px'; }); } } catch(ex) {} })(window._W && _W.jQuery); This website is maintained and developed by Mr. George P. Lumayag , ICT Coordinator