SlideShare uma empresa Scribd logo
1 de 19
Database Management System
Name:- Raj Upadhyay Div.:- BX Roll. No.-58
Disadvantages of file
management system
(file processing systems)
 A file processing system is a collection of
files and programs that access/modify these
files. Typically, new files and programs are
added over time (by different programmers)
as new information needs to be stored and
new ways to access information are needed.
What is FPS?
When computers came, all the jobs become easy. But initial
days, records were stored in the form of files. The way we
stored in files is similar to papers, in the form of flat files –
to be simpler, in notepad. Yes, the information's where all in
the notepads with each fields of information separated by
space, tab comma, semicolon or any other symbol
All the files were grouped based on their categories; file
used to have only related information's and each file is
named properly. As we can see in the above sample file has
Student information. Student files for each class were
bundled inside different folders to identify it quickly.
Now, if we want to see a specific Student detail from a file,
what do we do? We know which file will have the data, we
open that file and search for his details. Fine, here we see
the files; we can open it and search for it. But imagine we
want to display student details in a UI. Now how will we
open a file, read or update it? There different programs like
C, C++, COBOL etc. which helps to do this task. Using
these programming languages, we can search for files, open
them, search for the data inside them, and go to specific line
in the file, add/update/delete specific information.
File processing system is good when there is only limited
number of files and data in are very less. As the data and
files in the system grow, handling them becomes difficult.
Disadvantages of file system
(file processing systems)
Data Redundancy
It is possible that the same information may be duplicated in
different files. This leads to data redundancy.
Data redundancy results in memory wastage.
 For example consider that some customers have both kinds
of accounts saving and current. In this case data about
customers-name, address, email, contact-number will be
duplicated in both files, file for saving accounts and file for
current accounts. This leads to requirement of higher
storage space. In other words, same information will be
stored in two different locations (files). And, it wastes
memory.
Data Inconsistency
 Due to data redundancy, it is possible that data may not be
in consistent state.
 For example, consider that an address of some customer
changes. And, that customer has both kinds of accounts.
Now, it is possible that this changed address is updated in
only one file, leaving address in other file as it is. As a
result of this, same customer will have two different
addresses in two different files, making data inconsistent.
Difficulty in Accessing Data
 Accessing data is not convenient and efficient in file
processing system.
 Conventional file-processing environments do not allow
needed data to be retrieved in a convenient and efficient
manner. More responsive data-retrieval systems are
required for general use.
 Suppose that one of the bank officer needs to find out the names of all
customer who lives within a particular postal-code area. The officer
asks the data-processing department to generate such a list. Because
the designer of the original system did not anticipate this request there
is no application program on hand to meet it . There is however an
application program to generate the list of all customers. The bank
officer has now two choices: either obtain the list of all customer and
extract the needed information manually or ask a system programmer
to write the necessary application program. Both alternatives are
obviously unsatisfactory. Suppose that such program is written and
that several days later, the same officer needs to trim that list to
include only those customers who have an account balance of $10,000
or more. As expected, a program to generate such list does not exist.
Again the officer has the preceding two options, neither of which is
satisfactory.
Limited Data Sharing or Data isolation
Data are scattered in various files.
Different files may have different formats. And these files
may be stored in different folders (directories) may be of
different computers of different departments.
So, due to this data isolation, it is difficult to share data
among different applications.
Integrity Problems
Data integrity means that the data contained in the database
is both correct and consistent. For this purpose, the data
stored in database must satisfy certain types of constraints
(rules).
For example, a balance for any account must not be less than
zero. Such constraints are enforced in the system by adding
appropriate code in application programs. But, when new
constraints are added, such as balance should not be less
than Rs. 5000, application programs need to be changed.
But, it is not an easy task to change programs whenever
required.
Atomicity Problems
 Any operation on database must be atomic. This means,
operation completes either 100% or 0%.
 For example, a fund transfer from one account to another
must happen in its entirely. But, computer systems are
vulnerable to failure, such as system crash, virus attack. If a
system failure occurs during the execution of fund transfer
operation, it may possible that amount to be transferred,
say Rs. 500, is debited from one account, but is not credited
to another account.
 This leaves database in inconsistent state. But, it is difficult
to ensure atomicity in a file processing system.
Concurrent Access Anomalies
 Multiple users are allowed to access data simultaneously
(concurrently). This is for the sake of better performance
and faster response.
 Consider an operation to debit (withdrawal) an account.
The program reads the old balance, calculates the new
balance, and writes new balance back to database. Suppose
an account has a balance of Rs. 5000. Now, a concurrent
withdrawal of Rs. 1000 and Rs. 2000 may leave the balance
Rs. 4000 or Rs. 3000 depending upon their completion time
rather than the correct value of Rs. 2000.
 Here, concurrent data access should be allowed under some
supervision.
 But, due to lack of co-ordination among different
application programs, this is not possible in file processing
systems.
Security Problems
Database should be accessible to users in a limited way.
Each user should be allowed to access data concerning his
application only.
For example, a customer can check balance only for his/her
own account. He She should not have access for information
about other accounts.
But in file processing system, application programs are
added in an ad hoc manner by different programmers. So, it
is difficult to enforce such kind of security constraints.
Disadvantages of file management system(file processing systems)

Mais conteúdo relacionado

Mais procurados

2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
koolkampus
 

Mais procurados (20)

Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
 
ER-Model-ER Diagram
ER-Model-ER DiagramER-Model-ER Diagram
ER-Model-ER Diagram
 
Multimedia Database
Multimedia Database Multimedia Database
Multimedia Database
 
Database approach
Database approachDatabase approach
Database approach
 
Decomposition using Functional Dependency
Decomposition using Functional DependencyDecomposition using Functional Dependency
Decomposition using Functional Dependency
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Users
 
3 Level Architecture
3 Level Architecture3 Level Architecture
3 Level Architecture
 
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
FUNCTION DEPENDENCY  AND TYPES & EXAMPLEFUNCTION DEPENDENCY  AND TYPES & EXAMPLE
FUNCTION DEPENDENCY AND TYPES & EXAMPLE
 
Language processors
Language processorsLanguage processors
Language processors
 
Operating System - Types Of Operating System Unit-1
Operating System - Types Of Operating System Unit-1Operating System - Types Of Operating System Unit-1
Operating System - Types Of Operating System Unit-1
 
Software tools
Software toolsSoftware tools
Software tools
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Directory structure
Directory structureDirectory structure
Directory structure
 
2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS2. Entity Relationship Model in DBMS
2. Entity Relationship Model in DBMS
 
Rdbms
RdbmsRdbms
Rdbms
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Dbms 3: 3 Schema Architecture
Dbms 3: 3 Schema ArchitectureDbms 3: 3 Schema Architecture
Dbms 3: 3 Schema Architecture
 
Introduction to DBMS(For College Seminars)
Introduction to DBMS(For College Seminars)Introduction to DBMS(For College Seminars)
Introduction to DBMS(For College Seminars)
 

Destaque

Database management system
Database management systemDatabase management system
Database management system
Faizan Shabbir
 
data resource management
 data resource management data resource management
data resource management
soodsurbhi123
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
yhen06
 
File system-and-database-chapter01-connoly
File system-and-database-chapter01-connolyFile system-and-database-chapter01-connoly
File system-and-database-chapter01-connoly
Temma Tems
 
Dbms role advantages
Dbms role advantagesDbms role advantages
Dbms role advantages
jeancly
 
Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment
>. <
 
Role of Database Management in Information Systems
Role of Database Management in Information SystemsRole of Database Management in Information Systems
Role of Database Management in Information Systems
waQas ilYas
 
Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to database
emailharmeet
 
Advantages of database management system
Advantages of database management system Advantages of database management system
Advantages of database management system
Nafeesa Naeem
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
ahfiki
 

Destaque (20)

Tree Traversals (In-order, Pre-order and Post-order)
Tree Traversals (In-order, Pre-order and Post-order)Tree Traversals (In-order, Pre-order and Post-order)
Tree Traversals (In-order, Pre-order and Post-order)
 
Advantages of DBMS
Advantages of DBMSAdvantages of DBMS
Advantages of DBMS
 
Database planning
Database planningDatabase planning
Database planning
 
Database management system
Database management systemDatabase management system
Database management system
 
Kotler Keller - Marketing Management 15th edition, Chapter 01
Kotler Keller - Marketing Management 15th edition, Chapter 01Kotler Keller - Marketing Management 15th edition, Chapter 01
Kotler Keller - Marketing Management 15th edition, Chapter 01
 
data resource management
 data resource management data resource management
data resource management
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
File system-and-database-chapter01-connoly
File system-and-database-chapter01-connolyFile system-and-database-chapter01-connoly
File system-and-database-chapter01-connoly
 
Dbms role advantages
Dbms role advantagesDbms role advantages
Dbms role advantages
 
File Processing System
File Processing SystemFile Processing System
File Processing System
 
Chapter 2 database environment
Chapter 2 database environmentChapter 2 database environment
Chapter 2 database environment
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 
Dbms9
Dbms9Dbms9
Dbms9
 
Role of Database Management in Information Systems
Role of Database Management in Information SystemsRole of Database Management in Information Systems
Role of Database Management in Information Systems
 
Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to database
 
Advantages of database management system
Advantages of database management system Advantages of database management system
Advantages of database management system
 
Database Design Slide 1
Database Design Slide 1Database Design Slide 1
Database Design Slide 1
 
DbMs
DbMsDbMs
DbMs
 
Dbms ppt
Dbms pptDbms ppt
Dbms ppt
 
DBMS
DBMSDBMS
DBMS
 

Semelhante a Disadvantages of file management system (file processing systems)

A database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdfA database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdf
angelfashions02
 
Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.ppt
LisaMalar
 
D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1
askme
 

Semelhante a Disadvantages of file management system (file processing systems) (20)

ms-11.pdf
ms-11.pdfms-11.pdf
ms-11.pdf
 
Unit3rd
Unit3rdUnit3rd
Unit3rd
 
Lecture 1&2(rdbms-ii)
Lecture 1&2(rdbms-ii)Lecture 1&2(rdbms-ii)
Lecture 1&2(rdbms-ii)
 
DBMS unit 1
DBMS unit 1DBMS unit 1
DBMS unit 1
 
8.DBMS.pptx
8.DBMS.pptx8.DBMS.pptx
8.DBMS.pptx
 
A database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdfA database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdf
 
Fundamentals of DBMS
Fundamentals of DBMSFundamentals of DBMS
Fundamentals of DBMS
 
PURPOSE OF DATABASE final.pptx
PURPOSE OF DATABASE final.pptxPURPOSE OF DATABASE final.pptx
PURPOSE OF DATABASE final.pptx
 
Ch01
Ch01Ch01
Ch01
 
Chap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.pptChap1-Introduction to database systems.ppt
Chap1-Introduction to database systems.ppt
 
Relational database management systems
Relational database management systemsRelational database management systems
Relational database management systems
 
Dbms
DbmsDbms
Dbms
 
INTRODUCTION TO DATABASE
INTRODUCTION TO DATABASEINTRODUCTION TO DATABASE
INTRODUCTION TO DATABASE
 
INTRODUCTION TO Database Management System (DBMS)
INTRODUCTION TO Database Management System (DBMS)INTRODUCTION TO Database Management System (DBMS)
INTRODUCTION TO Database Management System (DBMS)
 
Introduction To Database.ppt
Introduction To Database.pptIntroduction To Database.ppt
Introduction To Database.ppt
 
Data Processing in Fundamentals of IT
Data Processing in Fundamentals of ITData Processing in Fundamentals of IT
Data Processing in Fundamentals of IT
 
File based approach
File based approachFile based approach
File based approach
 
Ans mi0034-database management system-sda-2012-ii
Ans mi0034-database management system-sda-2012-iiAns mi0034-database management system-sda-2012-ii
Ans mi0034-database management system-sda-2012-ii
 
Database
DatabaseDatabase
Database
 
D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1
 

Mais de raj upadhyay

Mais de raj upadhyay (11)

JavaScript Regular Expression Match
JavaScript Regular Expression MatchJavaScript Regular Expression Match
JavaScript Regular Expression Match
 
Basics of java (1)
Basics of java (1)Basics of java (1)
Basics of java (1)
 
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
 
Folder Can't Delete How to Remove FILES That Won't Delete?
 Folder Can't Delete How to Remove FILES That Won't Delete? Folder Can't Delete How to Remove FILES That Won't Delete?
Folder Can't Delete How to Remove FILES That Won't Delete?
 
Recovering unallocated space of a usb flash drive
Recovering unallocated space of a usb flash driveRecovering unallocated space of a usb flash drive
Recovering unallocated space of a usb flash drive
 
Terminal commands ubuntu 2
Terminal commands ubuntu 2Terminal commands ubuntu 2
Terminal commands ubuntu 2
 
Terminal Commands (Linux - ubuntu) (part-1)
Terminal Commands  (Linux - ubuntu) (part-1)Terminal Commands  (Linux - ubuntu) (part-1)
Terminal Commands (Linux - ubuntu) (part-1)
 
Find out Which Versions of the .NET Framework are Installed on a PC.
Find out Which Versions of the .NET Framework are Installed on a PC.Find out Which Versions of the .NET Framework are Installed on a PC.
Find out Which Versions of the .NET Framework are Installed on a PC.
 
Relational Algebra,Types of join
Relational Algebra,Types of joinRelational Algebra,Types of join
Relational Algebra,Types of join
 
PL-SQL DIFFERENT PROGRAMS
PL-SQL DIFFERENT PROGRAMSPL-SQL DIFFERENT PROGRAMS
PL-SQL DIFFERENT PROGRAMS
 
How to get notification from google group
How to get notification from google groupHow to get notification from google group
How to get notification from google group
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Último (20)

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Disadvantages of file management system (file processing systems)

  • 1. Database Management System Name:- Raj Upadhyay Div.:- BX Roll. No.-58
  • 2. Disadvantages of file management system (file processing systems)
  • 3.  A file processing system is a collection of files and programs that access/modify these files. Typically, new files and programs are added over time (by different programmers) as new information needs to be stored and new ways to access information are needed. What is FPS?
  • 4. When computers came, all the jobs become easy. But initial days, records were stored in the form of files. The way we stored in files is similar to papers, in the form of flat files – to be simpler, in notepad. Yes, the information's where all in the notepads with each fields of information separated by space, tab comma, semicolon or any other symbol
  • 5. All the files were grouped based on their categories; file used to have only related information's and each file is named properly. As we can see in the above sample file has Student information. Student files for each class were bundled inside different folders to identify it quickly.
  • 6. Now, if we want to see a specific Student detail from a file, what do we do? We know which file will have the data, we open that file and search for his details. Fine, here we see the files; we can open it and search for it. But imagine we want to display student details in a UI. Now how will we open a file, read or update it? There different programs like C, C++, COBOL etc. which helps to do this task. Using these programming languages, we can search for files, open them, search for the data inside them, and go to specific line in the file, add/update/delete specific information. File processing system is good when there is only limited number of files and data in are very less. As the data and files in the system grow, handling them becomes difficult.
  • 7. Disadvantages of file system (file processing systems)
  • 8. Data Redundancy It is possible that the same information may be duplicated in different files. This leads to data redundancy. Data redundancy results in memory wastage.
  • 9.  For example consider that some customers have both kinds of accounts saving and current. In this case data about customers-name, address, email, contact-number will be duplicated in both files, file for saving accounts and file for current accounts. This leads to requirement of higher storage space. In other words, same information will be stored in two different locations (files). And, it wastes memory.
  • 10. Data Inconsistency  Due to data redundancy, it is possible that data may not be in consistent state.  For example, consider that an address of some customer changes. And, that customer has both kinds of accounts. Now, it is possible that this changed address is updated in only one file, leaving address in other file as it is. As a result of this, same customer will have two different addresses in two different files, making data inconsistent.
  • 11. Difficulty in Accessing Data  Accessing data is not convenient and efficient in file processing system.  Conventional file-processing environments do not allow needed data to be retrieved in a convenient and efficient manner. More responsive data-retrieval systems are required for general use.
  • 12.  Suppose that one of the bank officer needs to find out the names of all customer who lives within a particular postal-code area. The officer asks the data-processing department to generate such a list. Because the designer of the original system did not anticipate this request there is no application program on hand to meet it . There is however an application program to generate the list of all customers. The bank officer has now two choices: either obtain the list of all customer and extract the needed information manually or ask a system programmer to write the necessary application program. Both alternatives are obviously unsatisfactory. Suppose that such program is written and that several days later, the same officer needs to trim that list to include only those customers who have an account balance of $10,000 or more. As expected, a program to generate such list does not exist. Again the officer has the preceding two options, neither of which is satisfactory.
  • 13. Limited Data Sharing or Data isolation Data are scattered in various files. Different files may have different formats. And these files may be stored in different folders (directories) may be of different computers of different departments. So, due to this data isolation, it is difficult to share data among different applications.
  • 14. Integrity Problems Data integrity means that the data contained in the database is both correct and consistent. For this purpose, the data stored in database must satisfy certain types of constraints (rules). For example, a balance for any account must not be less than zero. Such constraints are enforced in the system by adding appropriate code in application programs. But, when new constraints are added, such as balance should not be less than Rs. 5000, application programs need to be changed. But, it is not an easy task to change programs whenever required.
  • 15. Atomicity Problems  Any operation on database must be atomic. This means, operation completes either 100% or 0%.  For example, a fund transfer from one account to another must happen in its entirely. But, computer systems are vulnerable to failure, such as system crash, virus attack. If a system failure occurs during the execution of fund transfer operation, it may possible that amount to be transferred, say Rs. 500, is debited from one account, but is not credited to another account.  This leaves database in inconsistent state. But, it is difficult to ensure atomicity in a file processing system.
  • 16. Concurrent Access Anomalies  Multiple users are allowed to access data simultaneously (concurrently). This is for the sake of better performance and faster response.  Consider an operation to debit (withdrawal) an account. The program reads the old balance, calculates the new balance, and writes new balance back to database. Suppose an account has a balance of Rs. 5000. Now, a concurrent withdrawal of Rs. 1000 and Rs. 2000 may leave the balance Rs. 4000 or Rs. 3000 depending upon their completion time rather than the correct value of Rs. 2000.
  • 17.  Here, concurrent data access should be allowed under some supervision.  But, due to lack of co-ordination among different application programs, this is not possible in file processing systems.
  • 18. Security Problems Database should be accessible to users in a limited way. Each user should be allowed to access data concerning his application only. For example, a customer can check balance only for his/her own account. He She should not have access for information about other accounts. But in file processing system, application programs are added in an ad hoc manner by different programmers. So, it is difficult to enforce such kind of security constraints.