DBMS functions

There are several functions that a DBMS performs to ensure data
integrity and consistency of data in the database. The ten functions in the
DBMS are: data dictionary management, data storage management, data
transformation and presentation, security management, multiuser access control,
backup and recovery management, data integrity management, database access
languages and application programming interfaces, database communication
interfaces, and transaction management.

Functions of database management system
1.   
Data dictionary management
Data Dictionary is where the DBMS stores definitions
of the data elements and their relationships (metadata).  The DBMS uses
this function to look up the required data component structures and
relationships. When programs access data in a database they are basically going
through the DBMS. This function removes structural and data dependency and
provides the user with data abstraction. In turn, this makes things a lot
easier on the end user. The Data Dictionary is often hidden from the user and
is used by Database Administrators and Programmers.
2.     Data storage management
This
particular function is used for the storage of data and any related data entry
forms or screen definitions, report definitions, data validation rules,
procedural code, and structures that can handle video and picture formats.
Users do not need to know how data is stored or manipulated. Also involved with
this structure is a term called performance tuning that relates to a database’s
efficiency in relation to storage and access speed. 
3.     Data transformation and presentation
This function exists to transform any data entered into required data
structures. By using the data transformation and presentation function the DBMS
can determine the difference between logical and physical data formats.
4.     Security management
This is one of the most important functions in the DBMS. Security
management sets rules that determine specific users that are allowed to access
the database. Users are given a username and password or sometimes through
biometric authentication (such as a fingerprint or retina scan) but these types
of authentication tend to be more costly. This function also sets restraints on
what specific data any user can see or manage.
5.     Multiuser access control
Data integrity and data consistency are the basis of this function.
Multiuser access control is a very useful tool in a DBMS, it enables multiple
users to access the database simultaneously without affecting the integrity of
the database.
6.     Backup and recovery management
Backup and recovery is brought to mind whenever there is potential
outside threats to a database. For example if there is a power outage, recovery
management is how long it takes to recover the database after the outage.
Backup management refers to the data safety and integrity; for example backing
up all your mp3 files on a disk.
7.     Data integrity management
The DBMS enforces these rules to reduce things such as data redundancy,
which is when data is stored in more than one place unnecessarily, and
maximizing data consistency, making sure database is returning correct/same
answer each time for same question asked.
8.     Database access languages and application
programming interfaces
A query language is a nonprocedural language. An example of this is SQL
(structured query language). SQL is the most common query language supported by
the majority of DBMS vendors. The use of this language makes it easy for user
to specify what they want done without the headache of explaining how to
specifically do it.
9.     Database communication interfaces
This
refers to how a DBMS can accept different end user requests through different
network environments. An example of this can be easily related to the
internet. 
0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x