ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

Advantages and disadvantages of DBMS over traditional file processing system?

user-image
تم إضافة السؤال من قبل Anushiya Pushparaja
تاريخ النشر: 2013/11/20
Peter Anigbogu
من قبل Peter Anigbogu

How DBMS is advantageous over traditional file system. Mention four suitable reasons to justify your answer.

Ahmed Hesham
من قبل Ahmed Hesham , IT Support , Dino Activations

The principal advantages of DBMS over file processing system:

 

Flexibility: Because programs and data are independent, programs do not have to be modified when types of unrelated data are added to or deleted from the database, or when physical storage changes.

Fast response to information requests: Because data is integrated into a single database, complex requests can be handled much more rapidly than locating data separately. In many businesses, faster response means better customer service.

Multiple access: Database software allows data to be accessed in a variety of ways (through various key fields), by using several programming languages (both3GL and nonprocedural4GL programs).

Lower user training costs: Users often find it easier to learn such systems and training costs may be reduced. Also, the total time taken to process requests may be less, which would increase user productivity.

Less storage: Theoretically, all occurrences of data items need be stored only once, thereby eliminating the storage of redundant data. System developers and database designers often use data normalization to minimize data redundancy.

 

Here are some disadvantages:

 

• DBMS subjects business to risk of critical data loss in its electronic format and can be more readily stolen without proper security.

• The cost of a DBMS can be prohibitive for small enterprises as they struggle with cost justification for making investment in the infrastructure.

• Improper use of the DBMS can lead to incorrect decision making as people take presented data for granted as accurate.

• Data can be stolen by weak password security policy.