
Hidden tasks performed by DBMS when users update and retrieve data.

Explanation of Solution
A DBMS is of no use to any user if it's not capable of providing some functions. Updation and retrieval are the fundamental job of a DBMS. Thus, a DBMS must provide to its users the ability to perform same. These tasks are solely the responsibility of a DBMS and a user needs not be aware of them.
The general steps followed in almost all operations are in diagram below:
An operation contains instructions given by users and some tasks that are performed at the backend.
The difference usually occurs at step 2 and 3 where more than one sub operations might be needed to complete the task.
An updation operation can be performed by a user in the following way: by adding a new record, changing an existing records or it's deletion. All these consist of some instructions given by user and some task performed by DBMS.
Updation:
1. adding new records:
User enters an item and requests the DBMS to add a new item into database.
Following tasks are performed by DBMS following the request:
- It checks whether the records already exist in Database
- If not, it creates a new record and adds it to the database.
- Informs the user that the operation is complete, and the record is now a part of the database.
2. Changing a record:
User requests the DBMS to change an item from the database.
Following tasks are performed by DBMS following the request:
- It reads the data from database that needs to be changed.
- It displays the current data to user so that new value can be provided for changing.
- It changes the value as soon as new value is provided.
3. Deleting a record:
User requests the DBMS to delete an item from the database.
Following tasks are performed by DBMS following the request:
- It reads the data from database that needs to be deleted.
- It displays the current data to user so that user is able to see what will be deleted.
- It deletes the value as soon as user confirms the deletion action.
Retrieval:
A user is capable of reading a value from database. Following are the steps performed by DBMS to complete the operation:
- It finds and reads the record from database
- It displays the record to user
Thus, an operation consists of both the task done by a user and the tasks performed by a user. The DBMs is fully capable of performing these sub tasks at backend without the user being aware of it.
Want to see more full solutions like this?
Chapter 7 Solutions
EBK CONCEPTS OF DATABASE MANAGEMENT
- 1 Vo V₁ V3 V₂ V₂ 2arrow_forwardI want a full report on Sperani security according to Project Mingment.arrow_forwardGiven a 8-bit addressable (256) locations in memory and 32 locations in cache, 3 bits are in the cache Tag. What is the cache location for memory address of 0x0100 0100? Provide the answer in decimal form.arrow_forward
- Q2: Solve the equation using the simplex method Max. Z 13x1 +11x2 Subject to constraints 4x1 +5x21500 5x1 +3x21575 x1 +2x2 <420 x1, x2≥0arrow_forwardBasically, you must build a desktop/android application that utilizes cryptographic techniques/protocols to secure communication (or data at rest). Try to achieve confidentiality, integrity, availability, authentication, non-repudiation (preferably all of them, otherwise few of them based on the requirement).You must demonstrate the use of these cryptographic techniques by showing some outputs/visualization results or captured traffic such as through Wireshark.1. Secure Chat ApplicationDescription: Build an encrypted chat application for desktop or Android that ensures confidentiality, integrity, authentication, and non-repudiation.Features:-- End-to-end encryption using AES-256 or Signal Protocol.--Digital signatures for non-repudiation.--Message integrity verification using HMAC.Secure login using two-factor authentication (2FA).--Server-side availability mechanisms (e.g., load balancing, backup storage). Technologies: Python (PyQt + PyCryptodome), Java (Android), Firebase for…arrow_forwardQ1: Draw the equation of z with constraints according to the graphic method Max Z-3 P1+5 P2 s.t. P1 4 P2 6 3 P1+2 P2 <18 P1, P2 20arrow_forward
- Many employees and suppliers are resistant to adopting the new e-procurement system. They are accustomed to traditional procurement methods and are hesitant to embrace the change. How would you effectively manage this resistance and ensure a smooth transition to the new system?arrow_forwardswitch status (learning, listening, for wording) Write a detailed explanation of the topic. networkarrow_forwardSolve thisarrow_forward
- Solve this please and fastarrow_forwardPlease original work Background information: Imagine you are a consultant for a fictional company, FutureTech Innovations, which specializes in advanced technology products. The company is interested in improving its decision-making processes by leveraging Business Analytics (BA) and Management Support Systems (MSS). Talk about how Online Analytical Processing (OLAP) could be used to analyze data from multiple perspectives at FutureTech. What dimensions (e.g., time, product, region) would be important, and how would OLAP enhance decision-making? Talk about the role of data visualization in helping FutureTech understand business performance. What types of visualizations (e.g., dashboards, charts) would be useful, and how would they assist in interpreting data? Please cite in text references and add weblinksarrow_forwardDesign a synchronous Up/Down counter to produce the following sequence (4 9 2,0,7,6,3,1,5) using T flip-flop. The counter should count up when Up/Down =1, and down when Up/Down = 0.arrow_forward
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY





