Database Management System (DBMS)
Software that creates, stores, retrieves, and manages data in one or more databases.
Relational Database Management System (RDBMS)
A type of DBMS that organises data into two-dimensional tables (relations) linked by keys.
Outline the Functions and Tools of a DBMS
- Data dictionary: The DBMS maintains a dedicated “metadata repository” that lists every table, column, data‑type, length and relationship, so the engine always knows the exact structure it must enforce.
- Data safety: Built‑in backup, recovery and integrity‑checking modules create consistent snapshots, ship logs and verify pages so that data can be restored accurately after hardware failures or user errors.
- Query processor: An SQL interpreter parses each query, validates it against the schema and hands it to an optimiser that chooses the most efficient execution plan before returning the result set.
- Storage engine: Low‑level routines handle all create, read, update and delete (CRUD) operations on disk, translating logical rows into physical pages and ensuring every change is recorded in the transaction log.
- Concurrency control: A transaction manager applies locks, timestamps or multiversion snapshots so that many users can work simultaneously without overwriting one another, giving the illusion of a serial schedule.
- Security services: The DBMS enforces role‑based access rights that specify who may read or write each object, records every change in an audit trail, and optionally encrypts data at rest and in transit to safeguard confidentiality.
- Database‑administrator (DBA) tasks: The DBA designs and updates schemas, assigns user privileges and passwords, schedules backups, and drafts disaster‑recovery plans to keep the system resilient and compliant.
- Data‑definition language (DDL): A privileged command set (part of) which allows DBAs to create, alter or drop objects, automatically updating the data dictionary with each structural change.
How a DBMS Promotes Data Security
- Data validation:
- Column data‑types, length limits and CHECK constraints block out‑of‑range or ill‑formed values as they enter the database.
- NOT NULL, primary‑key and foreign‑key rules stop duplicates and orphan records.