Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

Advantages and disadvantages of DBMS over traditional file processing system?

user-image
Question added by Anushiya Pushparaja
Date Posted: 2013/11/20

How DBMS is advantageous over traditional file system. Mention four suitable reasons to justify your answer.

Ahmed Hesham
by Ahmed Hesham , IT Support , Dino Activations

The principal advantages of DBMS over file processing system:

 

Flexibility: Because programs and data are independent, programs do not have to be modified when types of unrelated data are added to or deleted from the database, or when physical storage changes.

Fast response to information requests: Because data is integrated into a single database, complex requests can be handled much more rapidly than locating data separately. In many businesses, faster response means better customer service.

Multiple access: Database software allows data to be accessed in a variety of ways (through various key fields), by using several programming languages (both3GL and nonprocedural4GL programs).

Lower user training costs: Users often find it easier to learn such systems and training costs may be reduced. Also, the total time taken to process requests may be less, which would increase user productivity.

Less storage: Theoretically, all occurrences of data items need be stored only once, thereby eliminating the storage of redundant data. System developers and database designers often use data normalization to minimize data redundancy.

 

Here are some disadvantages:

 

• DBMS subjects business to risk of critical data loss in its electronic format and can be more readily stolen without proper security.

• The cost of a DBMS can be prohibitive for small enterprises as they struggle with cost justification for making investment in the infrastructure.

• Improper use of the DBMS can lead to incorrect decision making as people take presented data for granted as accurate.

• Data can be stolen by weak password security policy.