29 Dec 2022

84

Advanced Database Systems: Microsoft Access, DBMS, RDBMS

Format: APA

Academic level: College

Paper type: Coursework

Words: 622

Pages: 2

Downloads: 0

Organizations have different database need which change over time and which are unpredictable. Many organizations use Access database to handle many database issues, even though the database has its limitations. This paper explores Access database and its limitations; features, components of RDBMS including its pros and cons; and the difference between a database and a DBMS. 

Access and Its Limitations in a Distributed Database Model 

Microsoft Access database operates fully as an RDBMS with numerous excellent features. The database can meet the needs of many small to intermediate database need (Vine, 2012). Access database is effective for relational databases as it makes it possible to create vital database solutions quickly. Access lacks complex solutions like security, reliability, performance and scalability (Adikesavan, 2014). However, these features are unimportant for numerous solutions in relation to the capability of Access (Vine, 2012). For example, Access database solves many database issues that workgroups, small teams and individuals within a network face. Access database can handle numerous database difficulties in an organization compared to other expensive and sophisticated databases (Vine, 2012). People without IT knowledge can use Access database to handle different database issues cost-effectively. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

However, Access database has some limitations that hinder its application in a distributed database model. For example, Access is not suitable for web solutions because it was not designed to develop a website (Vine, 2012). Access database cannot be used in intranets and its core Jet Engine is less useful unless the number of simultaneous users is small (Vine, 2012). Access database only supports windows platforms and thus other platforms like Android, iPad, Mac are unsupported (Vine, 2012). There are also deployment issues as users must have an Access database and install Access to enjoy Access applications. Access database consumes a large space and the presence of different versions also causes challenges (Vine, 2012). Besides, Access database lacks the same security levels as mainframe database systems or SQL server (Adikesavan, 2014). Access lacks a robust data recovery and integrity compared to SQL Server (Adikesavan, 2014). Access is not scalable because it is restricted to 2 GB and if a database surpasses this, Access cannot solve the problem (Vine, 2012). Access is also limited in the number of simultaneous users. 

Features and Components of an RDBMS 

Features of RDBMS include the provision of data stored in tables, data is arranged in columns and rows, it supports virtual tables in which SQL queries can be used to retrieve data. RDBMS also offers data uniqueness because of the presence of the primary key. It also offers foreign key that maintains a single column in different tables to establish a relationship between them. It also offers referential integrity (Adikesavan, 2014). 

RDBMS has various components that include Hardware to support it, data dictionary to store data information, Users of the system, SQL Engine to interpret and execute SQL queries, and interface drivers to define data insertion, deletion, or retrieval techniques (Adikesavan, 2014). 

The presence of numerous features and components gives RDBMS different advantages. For example, it is fast and precise, offers high data security level, has a definite mechanism for individuals to work on it, it only allows data retrieval using SQL queries and it is durable, consistent and supports isolation (Adikesavan, 2014). 

Nevertheless, an RDBMS has some limitations. For example, it is challenging to manage during certain times, working with it requires adequate training and skills, it only works when supported by the required hardware and software and it is expensive (Adikesavan, 2014). 

Difference between a Database and a DBMS 

A database is different from a Database management system as a database comprises a collection of interrelated data whereas a DBMS is a platform in which the database can be created and updated using SQL queries (Chopra, 2010). A DBMS depicts relationships between different tables in a database, functions with different databases and maintains relationships between different databases. A DBMS supports data analysis by allowing users to create reports, graphs or tables (Chopra, 2010). 

In conclusion, databases and database systems constitute vital components of the database environment, even though they are different based on their functions and the operations that can be done on them. 

References 

Adikesavan, T. A. (2014).  Management information systems . Place of publication not identified: Prentice-Hall Of India. 

Chopra, R. (2010).  Database management systems (DBMS): A practical approach : concepts, principles, case studies, experiments . New Delhi: S. Chand. 

Vine, M. A. (2012).  Microsoft Access VBA programming for the absolute beginner . Boston, MA: Course Technology, Cengage Learning. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Advanced Database Systems: Microsoft Access, DBMS, RDBMS.
https://studybounty.com/advanced-database-systems-microsoft-access-dbms-rdbms-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration