Large databases can contain hundreds of interrelated files. Fortunately a database management system can shield users from the complex inner workings of the system, providing them with only the information and commands they need to get their jobs done. In fact, a well-designed database puts on different faces for different classes of users. Downsizing and Decentralizing The earliest file management programs could only do batch processing, which required users to accumulate transactions and feed them into computers in large batches. These batch systems weren’t able to provide the kind f immediate feedback we expect today.
Today disk drives, inexpensive memory, and sophisticated software have allowed interactive processing to replace batch processing for most applications. Users can now interact with data through terminals, viewing and changing values in real time. Batch processing is still used for printing periodic bills, invoices, and reports and for making backup copies of data files. But for applications that demand immediacy, such as airline reservations, banking transactions, and the like, interactive, multiuser database systems have taken over. Until recently most databases were housed in mainframe computers.
But for a growing number of organizations, the traditional centralized database on a mainframe system is no longer the norm. Some companies use a client/server approach: Database software in client desktop computers works with files stored in central server databases on mainframes, minicomputers, or desktop computers. Other companies use distributed databases that use data strewn out across networks on several different computers. From the user’s point of view, the differences between these approaches may not be apparent. Tomorrow’s Databases?
Many computer scientists believe that the relational data model may be supplanted in the next decade by an object-oriented data model, and that most future databases will be object-oriented databases rather than relational databases. Instead of storing records in tables and hierarchies, object-oriented databases store software objects that contain procedures (or instructions) along with data. Object-oriented databases often are used in conjunction with object-oriented programming languages. Tomorrow’s databases will be able to respond intelligently to commands and queries issued in natural human language.
Protection against invasion of privacy is not explicitly guaranteed by the U.S. Constitution. Legal scholars agree that the right to privacy-freedom from interference into the private sphere of a person’s affairs-is implied by other constitutional guarantees, although debates rage about exactly what this means. Federal and state laws provide various forms of privacy protection, but most of those laws were written years ago. When it comes to privacy violation, technology is far ahead of the law.