What is Database Management System?
What is DBMS?
The database management system is software that controls all the different manipulation of stored or to be stored data in a database. It allows the creation, update, manipulation, definition of a database.
As clear from the name it manages the whole database end to end for whatever operation that may be required. Some examples of DBMS are –
- IBM DB2
A database management system perform the following –
- Database Definition
- Data Updation
- Data Retrieval
This essentially defines how data is defined in the database. For example we have to create a database for students are PrepInsta users.
We will define the data as follows –
- Unique ID of signed up user
- Unique email ID of signed up user
- First Name
- Last Name
- Passwords etc
This majorly allows various operations like insertion of the new data, updating new data, deletion of data in the various database tables.
- Insertion – Inserting information of new user signed up on PrepInsta website
- Updation – Updating the password of the user who requested to change it
- Deletion – Deleting the complete or partial data of the user who has requested account deletion on PrepInsta.
The data is stored in various database servers and stored globally. For different instances like requesting login authentication details for a website. You need to communicate and retrieve a lot of data from database tables.
Database administration is important, a for a new employee who is working on database system for your company. You don’t want to give him deleting capabilities. So you create different roles like –
- Database Administrator – Who call perform all actions like modification, deletion, updation and creation etc.
- Database Manager – Who can define, update, modify but can’t delete
- Database Editor – Who can just retrieve and insert in the database
Note – The above are just for examples. Companies create their custom roles based upon exact requirements.
The security of the system is also important. You don’t want hackers to steal your confidential database or maybe update your database with false data. Thus for any access to database node. There is an authentication that happens along.