Sunteți pe pagina 1din 3

1- What is the Database Structure and its types?

Basically, a data base structure is an assortment of either one or more records


arranged into tables and represented by rows and columns, whereby, each row
is considered as record, object or entity, and columns, as fields or attributes.

List of Some structural types of database management systems:

 Hierarchical: In this type of database, proceedings encompass data concerning


its clusters of either parent or child connections, somewhat like a tree
arrangement. The construction indicates that each record can possess
additional repeating evidence. It accumulates entirely records jointly.

 Network: These varieties of databases are mostly utilized on outsized digital


computers. Its more connections are from diverse categories of records. This
kind of database is well-thought-out to be more efficient. These databases
are comparable to that of hierarchical, in terms of structure. This type of
database is quite interconnected and looks like a cobweb.

 Relational: In this type of database there is a relational relationship between


data files, whereby they are interconnected in different forms, by use of
common data numbers or a key field. Data is stored in different access
control tables, with an identifiable key. This stands, more reliable than either
the hierarchical or network database structures. In relational databases,
tables or files filled up with data are called relations (tuples) designates a row
or record, and columns are referred to as attributes or fields.

 Object-Oriented databases: This data base increases the style of Java and
C++.It also provides full-featured database programming capability, though
encompassing native language compatibility. It enhances the database
functionality to object programming languages. This stands an analogy to the
application and database development into a constant data model and
language environment. It requires a smaller amount of coding, with a further
ordinary data modeling, and codes which are stress-free in terms of
maintenance.

2- Identify the following terms:

Bit: - it’s the basic representation of data (its value could be either 0 or 1).A byte is made of
eight bits and can make up a character.

Byte: It is a constituent of digital data that is most usually contains of eight bits. It is the
smallest addressable constituent of recollection in countless computer architectures.
Field - a field consists of a grouping of characters. A data field represents an attribute (a
characteristic or quality) of some entity (object, person, place, or event). A field in a record
that holds unique data which identifies that record from all the other records in the file or
database. E.g. Account number, product code and customer name.

Record: This epitomizes an assortment of elements that designates a real-world entity. It


consists of fields, with each field describing an attribute of the entity.

File: a cluster of connected records. Files are oftentimes categorized by the request for that they
are chiefly utilized (employee file). A main key in a file is the earth (or fields) whose worth
identifies a record amid others in a data file.

Database: It is an integrated collection of logically related records or files. A database


consolidates records previously stored in separate files into a common pool of data records that
provides data for many applications.

Entity: An entity stands for an object in the system that information is stored about. They
are usually recognizable concepts, either concrete or abstract, such as person, places,
things, or events which have relevance to the database

Attribute: An attribute is referred to us as a database constituent, such as a table or even a


database field. It describes instances in the row of a particular database.

3- What is Database Management? List the objectives of DBM

It is the art of storing and transforming data into information to support making decisions.
It involves the functions of creating, editing, manipulating and analyzing spatial and non-
spatial data in applications.

DBMS applications must be capable of solving challenging problems. Some of its objectives are
as follows:

 Provides for bulky storage of pertinent data


 Making easy access to data for the authorized user.
 Users get prompt responds
 Redundantly eliminate duplicate data.
 Allows the usability of active multiple users at a time.
 Allows the growth of database system
 Provides data integrity.
4- Discuss the different types of network topologies
In simple terms, Network Topologies are the graphic explanations of a
network arrangement, linking various nodes (sender and receiver) through
lines of connection. It simply displays how the layout of a network and how
different nodes in a network are connected to each other and how they
communicate. There are several types of network topography but I would like
to focus greatly on these 4 ones. These are as follows:

Mesh Topology: this type of network has all devices connected redundantly
between network nodes. Each node has a predominant linkage to every other
node in the network.

Star Topology: This network has devices are allied to a central computer,
called a hub. The nodes communicate across the network by passing data
through the hub.

Bus Topology: This topology is the central cable that links all devices on a
local-area network (LAN), also known as the backbone. This is often used to
describe the main network connections composing the Internet. Bus
networks are relatively inexpensive and easy to install for small networks.

Ring Topology: A local-area network (LAN) whose topology is a ring. That


is, all of the nodes are connected in a closed loop. Messages travel around
the ring, with each node reading those messages addressed to it.

5- What are management challenges in using wireless technology and the


guidelines solution?

Some of the major management challenges of using wireless technologies are the absence
of enough resources to provide employees with the required tools, necessary to use the
emerging technologies at its best. While some companies may have the adequate finances
to buy updated computers, they may not be able to afford the new and updated software.
Companies should make sure that they put in places effective measure on countering this
challenge by getting a good liaison with financial institutions for the purposes of getting
loans and other supports. More so, electromagnetic intervention and physical hitches that
hinder analysis of wireless networks also impede the smooth flow of network technologies.
In a way of countering this problem managements should make sure that, they have the
necessary expertise who is fully equipped to provide an adequate topological flow of
networks. In addition to coverage, data security and standards are major obstacles of
wireless networks deployment.

S-ar putea să vă placă și