wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Explain DBMS in Brief

profile
Ashwith Moolya
Aug 02, 2022
0 Likes
0 Discussions
163 Reads

The full form of DBMS is Database Management System.

 A database management system is essentially nothing more than a computerized data-keeping system.

Users of the system are given facilities to perform several kinds of operations on such a system for either manipulation of the data in the database or the management of the database structure itself. 

 There are several types of databases that can be used on a mainframe to exploit inverted list, hierarchic, network, or relational.

Hierarchical and relational database systems have common benefits.

RDBMS has the additional, significant advantage over the hierarchical DB of being non-navigational.

By navigational, we mean that in a hierarchical database, the application programmer must know the structure of the database.

Relational databases include the following structures:

1.Database

2.Table

3.Indexes

4.Keys

Examples of DBMS are:

1.MySQL

2.MS-SQL

3.Postgre SQL


Comments ()


Sign in

Read Next

Latest Email Marketing Techniques

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Virtual memory in Operating System

Blog banner

Virtual Memory

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Rapido

Blog banner

IP Address

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Worms, viruses and Bots

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

MailChimp

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

What is service level Agreement?

Blog banner

Linux Memory Management

Blog banner

Direct Memory Access

Blog banner

Session Vulnerabilities

Blog banner

THE DESIRE OF MANY

Blog banner

BharatPe

Blog banner

Deadlock

Blog banner

Kernel in Operating System

Blog banner

The launch of UniMap by HERE

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Virtual memory

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

How Cyber Forensics use in AI

Blog banner

MACHINE LEARNING

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Mutual exclusion

Blog banner

Depression

Blog banner

Dekkers Algorithm

Blog banner

Sage

Blog banner

Sage business cloud accounting

Blog banner

Zoho

Blog banner

Real-time Scheduling - 53003230061

Blog banner

LiquidPlanner

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Malware Defense

Blog banner