Exploring Databases and SQL

Exploring Databases and SQL
What is a database? Is a database the same as a database management system (DBMS)? Why or why not?
A database represents the collection of organized information with the main aim of ease in accessibility, management, and automation. A database is different from the database management system. This is because database management system represents program or software that enables the user or users of digital computers to create and access data through the database. Database management system performs the role of the database manager thus managing activities (creation and accessibility) within the database. Database management system operates on strict instructions from users in order to offer direction on the physical location of the information within the database (Seltzer p. 52-58).
Identify at least three popular DBMS’s in use today and note some of their common features.
Relational Database Management Systems: this database management system draws the name from the ability to normalize data that are stored in the form of tables (rows and columns). The correlation between data from one or more tables must be joined and managed correctly by the user. The information unveiled by this program undergoes manipulation by the Structured Query Language (SQL). Some examples of the relational database management system include IBM DB2, SQLite, and Oracle (Deperlioglu et al, p. 107-120).
Flat File Based Database Management Systems: These database management systems represent the easiest and simplest programs to create and access information within the database. The programs come in the form of human readable text and binary forms. The programs are applicable to holding software configuration, stand-alone applications, and formats known for native storage. Examples of Flat File Based Database management system are Ms Excel and Comma Separated Values (CSV). Hierarchical Database Management Systems: this database management system operates just like the parent child tree model. These programs could store books with relevant information on chapters and verses. An example of these programs includes XML document (Deperlioglu et al, p. 107-120).
How are DBMS’s used today? Describe the benefits of DBMS.
Database management systems are used in the contemporary world to offer powerful and uniform mode of communication to facilitate inquiry. They are also used to harmonize data into a more logical model than lack of database management systems. Most users apply database management systems to enhance the effectiveness and efficiency of inquiry evaluation. It is also necessary to focus on integrity thus application of the database management systems. Database management systems act as warehouses of information hence serve as home for a large amount of data. Database management systems provide easier and accurate means to enable users identify information effectively and appropriately.
Describe the features, tools, and utilities of Structured Query Language (SQL).
SQL enables the user to have access to a database. SQL has the capacity to delete all records from a relevant database. SQL is also easy and straightforward to learn thus utilization of its purpose and other features. SQL has the ability to retrieve information from a database through manipulation process. It also updates the records within the database based on instructions from relevant and accurate sources. SQL just represent an ANSI standard in order to classify as quality and effective. SQL also has the ability to incorporate new information or data into the database. Tools to execute commands of the SQL include SQL Plus (Windows), SVRMGRL (DOS), SQL Plus (DOS), Open Database Connectivity (ODBC), and Toad/Quest Software (Ansari p. 522-531).
How can tasks be automated with SQL?
Tasks can undergo automation by injection of codes in relation to SQL. This would make users of the digital computers move to other sites by requesting to visit sites of their choice. Hackers usually apply the technique of automation of the SQL to direct users to other sites in the process of trying to access or create data within the database.
How is security implemented in a relational database?
Relational database can be restricted from public server if it contains sensitive data. This indicates that the database should operate under private network with requisite security demands and controls. The database should also apply the use of programs that are able to process requests from authorized individuals or users. This application would reduce the amount of viewers of the database thus enhancement of security of relational database (Murray p. 66).
Value of database management systems
In my opinion, database management systems are crucial to the creation and assessment of information within the database. This indicates that individuals have the opportunity to look for relevant information in relation to experimentation process. Database management systems enhance the integrity of creation and accessing data within the database. This makes the database management systems to be valuable in the research process. Database management systems are also valuable in storage of information with respect to different fields. This makes it easier for users to physically locate their relevant data in specific database.
Identify why having basic database skills is essential, regardless of your role within IT, in a small to the mid-size organization
Database skills are necessary because individuals develop the ability on how to create, access, and keep in touch with the current information. Development of ability to create and access information enables users of the digital computer to physical allocate information or date thus facilitates the process of research and experimentation. Database management skills are also crucial in development of the level of security in order to limit over population of the data storage program. This is essential to minimize chances of hackers and users who might interfere with the data within the database.

Works Cited
Murray, Meg Coffin. “Database Security: What Students Need To Know?” Journal of Information Technology Education 9.(2010): IIP61-IIP77. Education Research Complete. Web. 16 Sept. 2012.
Deperlioglu, Omer, Yilmaz Sarpkaya, and Ertugrul Ergun. “Development of a Relational Database for Learning Management Systems.” Turkish Online Journal Of Educational Technology – TOJET 10.4 (2011): 107-120. ERIC. Web. 16 Sept. 2012.
Seltzer, Margo. “Beyond Relational Databases.” Communications of the ACM 51.7 (2008): 52-58. Business Source Complete. Web. 16 Sept. 2012.
Ansari, Sid, and Edward R. Sykes. “SQL Injection in Oracle: An Exploration of Vulnerabilities.” International Journal on Computer Science & Engineering 4.4 (2012): 522-531. Academic Search Complete. Web. 16 Sept. 2012.

Latest Assignments