Question

In: Computer Science

Although database systems have become the system of choice for new and reengineered systems, are there...

Although database systems have become the system of choice for new and reengineered systems, are there any situations where a traditional file based system might be chosen instead? Explain your answer with examples.

Solutions

Expert Solution

A traditional file-based system is chosen instead of database systems has a number of disadvantages.

Data redundancy

In an organization, files and applications are created by different programmers from various departments over long periods of time. This can lead to data redundancy, a situation that occurs in a database when a field needs to be updated in more than one table. This leads to several problems such as:

  • Inconsistency in data format
  • The same information being kept in several different files
  • Data inconsistency, a situation where various copies of the same data are conflicting, wastes storage space and duplicates effort

Data isolation

Data isolation  is a property that determines when and how changes made by one operation become visible to other concurrent users and systems and this issue occurs in a concurrency situation. It is difficult for new applications to retrieve the appropriate data, which might be stored in various files.

Integrity problems

It refers to the maintenance and assurance that the data in a database are correct and consistent. Following are the factors related to this issue :

  • Data values must satisfy certain consistency constraints that are specified in the application programs.
  • It is difficult to make changes to the application programs in order to enforce new constraints.

Security problems

Security can be a problem with a file-based approach because:

  • There are constraints regarding accessing privileges.
  • Application requirements are added to the system in an ad-hoc manner so it is difficult to enforce constraints.

Concurrency access

Concurrency is the ability of the database to allow multiple users access to the same record without adversely affecting transaction processing. A file-based system must manage, or prevent, concurrency by the application programs. In a file based system, when an application opens a file, that file is locked. This means that no one else has access to the file at the same time.

In database systems, concurrency is managed thus allowing multiple users access to the same record.


Related Solutions

General-purpose computers and domain-independent relational database systems have become a large market in the last several...
General-purpose computers and domain-independent relational database systems have become a large market in the last several decades. However, many people feel that generic data mining systems will not prevail in the data mining market. What do you think? For data mining, should we focus our efforts on developing domain-independent data mining tools or on developing domain-specific data mining solutions? Present your reasoning.
IT344- Database Management Systems book Fundamentals Of Database Systems please no copy and paste Use your...
IT344- Database Management Systems book Fundamentals Of Database Systems please no copy and paste Use your own words , No handwriting. Users prefer to stream high quality videos (e.g., watch YouTube) without lagging (i.e., slow loading). In this context, explain how UDP is better than TCP when streaming videos?
Discuss how database systems have revolutionised decision making and reporting practices.
Discuss how database systems have revolutionised decision making and reporting practices.
Database You have just started a new position on the database design staff at Gizmonic Consultants,...
Database You have just started a new position on the database design staff at Gizmonic Consultants, Inc. Your first project is to translate the database requirements for Continental Hotels into an ER representation. In the next project, you will derive a relational schema from an ER diagram and implement the schema, populate it, and query over it. Requirements: Develop an ERD to capture the entities and relationships specified in the requirements documentation below. Use only the conventions covered in class....
Although EHR systems have the potential to improve patient care and organizational efficiency and the US...
Although EHR systems have the potential to improve patient care and organizational efficiency and the US Government has provided financial incentives for adopting and financial penalties for not adopting EHRs, some providers still resist. Review available literature and determine what you believe to be the three biggest barriers or roadblocks for US physicians and hospitals in adopting EHR systems? Create and discuss a plan for addressing each of these barriers or roadblocks. You can create a single plan addressing all...
our company is creating the database for the sales system. These are the major components: Database...
our company is creating the database for the sales system. These are the major components: Database design User entry form design Report design Access and authentication Maintenance You are assigned as an IT manager. For this Discussion, gather information from the library and research other web resources. Write a plan describing your role in designing, developing, managing, and supporting the database.
Describe what a database system is and how it is used. What is a relational database...
Describe what a database system is and how it is used. What is a relational database system and how used in a company to benefit an organization? What does it mean to run a query?
Identify 5 benefits of using a Database management systems
Identify 5 benefits of using a Database management systems
Electronic Health Records (EHRs) have become the backbone of healthcare data systems. Discuss the pros and...
Electronic Health Records (EHRs) have become the backbone of healthcare data systems. Discuss the pros and cons of the proliferation of EHRs from both the patient and provider perspectives.
Discussion Database Security and UML Often, systems have only one level of security when it comes...
Discussion Database Security and UML Often, systems have only one level of security when it comes to databases. Imagine that someone is trying to add a name (which should be composed only of letters) to a database. The user mistakenly hits a number, and the system rejects the entry. Such security can be implemented at the database management system (DBMS) or the application level. Where would you apply security? Justify your choice. What are some alternative practices or standards of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT