SlideShare a Scribd company logo
3
Most read
5
Most read
7
Most read
Muhammad Umair
Oracle Database 11g Developer Track
› Database Security
› Database Recovery
› Data Integrity
› Transaction Support
› Concurrency Control
› Database Security
– DBMS furnishes mechanisms to prevent data from accidental or
intentional looses, destruction or misuse.
– Two of common security mechanisms are:
› Authentication
– DBMS requires people to prove their identity before connecting to
the database
› Authorization
– DMBS enable developers to define right or privileges of the
database users
› Database Recovery
– DBMS furnishes mechanisms to restore data efficiently and
accurately after any type of loss od damage
– Two of the recovery mechanisms are:
› Back-up
– A copy of database is maintained to be use for recovery in case of
damage of the whole or some of its parts
› Change-log Maintenance
– The changes mage to the data are recorded so that data may be
restored to some of its previous state.
› Data Integrity
– DBMS furnishes mechanisms to ensure that only valid data in
entered into the database
› Data integrity mechanisms:
– Enable developers to define constraints on data.
– Enable developers to create code segments to ensure validity of
data before or after some DML statements for example triggers
› Transection Support Service
– DBMS furnishes mechanisms to ensure that either all updates
included in a transaction are made or none of them is made.
– As part of transection support mechanisms DBMS let user to commit
or rollback their transactions
› Concurrency Control Service
– DBMS furnishes mechanisms to prevent from data inconsistency
when two or more transaction occurs same data at same time.
› Locking Mechanism
– A resource accessed by a transaction is banned for other
transaction until that transaction completed.
– There are two types of locks
– Shared Lock
› A lock that is applied for readers. It can be shared by many transaction
– Exclusive Lock
› A lock that is applied for writers. It cant be shared by different transaction
› Dead Lock
– A situation in which locks don’t resolve by automatic process, until
DBMS takes special action for their resolution
– In a database, a deadlock is a situation in which two or more
transactions are waiting for one another to give up locks. For
example, Transaction A might hold a lock on some rows in the
Accounts table and needs to update some rows in the Orders table
to finish

More Related Content

PDF
CS8791 Cloud Computing - Question Bank
PPTX
Optimistic concurrency control in Distributed Systems
PPTX
Replication in Distributed Systems
PDF
1. GRID COMPUTING
PDF
Object Oriented Analysis Design using UML
PPTX
Middleware in Distributed System-RPC,RMI
PPTX
Trends in distributed systems
PPTX
3 tier data warehouse
 
CS8791 Cloud Computing - Question Bank
Optimistic concurrency control in Distributed Systems
Replication in Distributed Systems
1. GRID COMPUTING
Object Oriented Analysis Design using UML
Middleware in Distributed System-RPC,RMI
Trends in distributed systems
3 tier data warehouse
 

What's hot (20)

PPTX
Transactions and Concurrency Control
PPTX
Distributed system architecture
PPTX
PPT on Hadoop
PPTX
Concurrency control
PPTX
Shadow paging
PPTX
Task programming
PPTX
Model Based Software Architectures
PPTX
Client server chat application
PPTX
COMPUTER NETWORKS NOTES Unit 4
PPT
Cloud computing architectures
PPTX
Servlets api overview
PPT
File models and file accessing models
PPTX
Physical and Logical Clocks
PPTX
Implementation levels of virtualization
PDF
Vc dimension in Machine Learning
PPT
Transport services
PPTX
Cloud platforms - Cloud Computing
PDF
Lecture 4 principles of parallel algorithm design updated
PPT
PPTX
Ch13 security engineering
Transactions and Concurrency Control
Distributed system architecture
PPT on Hadoop
Concurrency control
Shadow paging
Task programming
Model Based Software Architectures
Client server chat application
COMPUTER NETWORKS NOTES Unit 4
Cloud computing architectures
Servlets api overview
File models and file accessing models
Physical and Logical Clocks
Implementation levels of virtualization
Vc dimension in Machine Learning
Transport services
Cloud platforms - Cloud Computing
Lecture 4 principles of parallel algorithm design updated
Ch13 security engineering
Ad

Viewers also liked (20)

PDF
Fehr Family 1
PDF
Relatório anual 2012 versão em português
PDF
Boletim (20)
PDF
Naidunia ePaper 30 May 2016
PDF
10 valkuilen algemeen
PDF
Dissertação_VITFID_2014_Vitório Fidalgo
PPTX
Sequência literária
PDF
Ziemba
DOCX
Ética profesional
PDF
Ragtrader Article
PPTX
Partes de un castillo medieval.nicole
DOCX
CV -Syed Fawaad Hussain
PDF
Boletim (3)
PDF
Magazine nº1
PDF
Boletim (2)
PDF
ICDNantes2016 management-audencia
DOCX
Taller miguel aneiderrodriguezs
PDF
Mikroskopio digitala ezaugarriak erabilera eta jarduerak 2016
PPT
A Primeira Guerra Mundial1
PPTX
My mother tongue - Telugu
Fehr Family 1
Relatório anual 2012 versão em português
Boletim (20)
Naidunia ePaper 30 May 2016
10 valkuilen algemeen
Dissertação_VITFID_2014_Vitório Fidalgo
Sequência literária
Ziemba
Ética profesional
Ragtrader Article
Partes de un castillo medieval.nicole
CV -Syed Fawaad Hussain
Boletim (3)
Magazine nº1
Boletim (2)
ICDNantes2016 management-audencia
Taller miguel aneiderrodriguezs
Mikroskopio digitala ezaugarriak erabilera eta jarduerak 2016
A Primeira Guerra Mundial1
My mother tongue - Telugu
Ad

Similar to Services of dbms (20)

PPT
Functions of database management systems
PPT
PPT
Ch 13 D B Admin
PDF
Dbms module iii
PPT
Database Management Systems (DBMS)
PPTX
Ch 9
DOCX
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
PPT
Transaction
PDF
Transaction & Concurrency Control
PPT
Introduction to database management system
PPTX
transaction ,concurrency , and DDBMS
PPTX
sdggjhgdagsjfegsfgrthtADBMS Lecture 1.pptx
DOCX
Mi0034 database management system
DOCX
Dbms voc 5 unit
PPT
dbms.ppt
PPT
Lecture 5 Deadlocks in Database Systems.ppt
PPTX
Transaction management
PPT
01-Description of the Transport Layer.ppt
PPT
Svetlin Nakov - Database Transactions
Functions of database management systems
Ch 13 D B Admin
Dbms module iii
Database Management Systems (DBMS)
Ch 9
DBF-Lecture11-Chapter12.pptDatabase Principles Fundam.docx
Transaction
Transaction & Concurrency Control
Introduction to database management system
transaction ,concurrency , and DDBMS
sdggjhgdagsjfegsfgrthtADBMS Lecture 1.pptx
Mi0034 database management system
Dbms voc 5 unit
dbms.ppt
Lecture 5 Deadlocks in Database Systems.ppt
Transaction management
01-Description of the Transport Layer.ppt
Svetlin Nakov - Database Transactions

More from Umair Shakir (17)

PPTX
Basic SQL Statments
PPTX
Database Joins
PPTX
Introduction to Sql
PPTX
Constraints
PPTX
Task of db administrator
PPTX
Schema Objects
PPTX
Relationships
PPTX
Relational model
PPTX
Normalization
PPTX
Key and its different types
PPTX
Er model
PPTX
Introduction to basic database concepts
PPTX
Dbms and rdbms
PPTX
Database planning
PPTX
Conceptual database design
DOCX
Work Sheet
DOCX
G to a
Basic SQL Statments
Database Joins
Introduction to Sql
Constraints
Task of db administrator
Schema Objects
Relationships
Relational model
Normalization
Key and its different types
Er model
Introduction to basic database concepts
Dbms and rdbms
Database planning
Conceptual database design
Work Sheet
G to a

Recently uploaded (20)

PDF
Cost to Outsource Software Development in 2025
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PPTX
GSA Content Generator Crack (2025 Latest)
PPTX
Introduction to Windows Operating System
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PPTX
Tech Workshop Escape Room Tech Workshop
PDF
DNT Brochure 2025 – ISV Solutions @ D365
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Topaz Photo AI Crack New Download (Latest 2025)
PPTX
Computer Software - Technology and Livelihood Education
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PDF
Types of Token_ From Utility to Security.pdf
Cost to Outsource Software Development in 2025
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
EaseUS PDF Editor Pro 6.2.0.2 Crack with License Key 2025
How to Use SharePoint as an ISO-Compliant Document Management System
Oracle Fusion HCM Cloud Demo for Beginners
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Why Generative AI is the Future of Content, Code & Creativity?
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
GSA Content Generator Crack (2025 Latest)
Introduction to Windows Operating System
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
Tech Workshop Escape Room Tech Workshop
DNT Brochure 2025 – ISV Solutions @ D365
iTop VPN Crack Latest Version Full Key 2025
Topaz Photo AI Crack New Download (Latest 2025)
Computer Software - Technology and Livelihood Education
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Types of Token_ From Utility to Security.pdf

Services of dbms

  • 1. Muhammad Umair Oracle Database 11g Developer Track
  • 2. › Database Security › Database Recovery › Data Integrity › Transaction Support › Concurrency Control
  • 3. › Database Security – DBMS furnishes mechanisms to prevent data from accidental or intentional looses, destruction or misuse. – Two of common security mechanisms are: › Authentication – DBMS requires people to prove their identity before connecting to the database › Authorization – DMBS enable developers to define right or privileges of the database users
  • 4. › Database Recovery – DBMS furnishes mechanisms to restore data efficiently and accurately after any type of loss od damage – Two of the recovery mechanisms are: › Back-up – A copy of database is maintained to be use for recovery in case of damage of the whole or some of its parts › Change-log Maintenance – The changes mage to the data are recorded so that data may be restored to some of its previous state.
  • 5. › Data Integrity – DBMS furnishes mechanisms to ensure that only valid data in entered into the database › Data integrity mechanisms: – Enable developers to define constraints on data. – Enable developers to create code segments to ensure validity of data before or after some DML statements for example triggers
  • 6. › Transection Support Service – DBMS furnishes mechanisms to ensure that either all updates included in a transaction are made or none of them is made. – As part of transection support mechanisms DBMS let user to commit or rollback their transactions
  • 7. › Concurrency Control Service – DBMS furnishes mechanisms to prevent from data inconsistency when two or more transaction occurs same data at same time. › Locking Mechanism – A resource accessed by a transaction is banned for other transaction until that transaction completed. – There are two types of locks – Shared Lock › A lock that is applied for readers. It can be shared by many transaction – Exclusive Lock › A lock that is applied for writers. It cant be shared by different transaction
  • 8. › Dead Lock – A situation in which locks don’t resolve by automatic process, until DBMS takes special action for their resolution – In a database, a deadlock is a situation in which two or more transactions are waiting for one another to give up locks. For example, Transaction A might hold a lock on some rows in the Accounts table and needs to update some rows in the Orders table to finish