Client server database systems with the proliferation

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: n from Figure 16.14, the two are related activities and can reinforce each other. Usually, they are used in conjunction with each other. A data warehouse sets the stage for effective data mining. Data mining can be done where there is no data warehouse, but the data warehouse greatly improves the chances of success in data mining. Data mining is also different from OLAP, in that the latter is used to verify more complex human-generated hypotheses involving multiple dimensions, produces information summaries, and does not look for patterns. Thus OLAP is knowledge verification, while data mining is knowledge discovery. Furthermore, OLAP is multidimensional analysis and data mining is multi-variable, single-dimensional analysis. For example, while OLAP answers the questions of what is the average credit granted to customers who pay their monthly bills in full versus those who choose to take financing, data mining gives the attributes associated with customers who will take up financing. OTHER RELATED CONCEPTS Database Security The data stored in a database is often confidential and should not be accessed by unauthorized individuals. To prevent data stored in a database from being accessed by unauthorized individuals, database management systems commonly support the following security features: 1. From the point of view of access control, a database management system normally supports two types of database users - database administrator (having administrative access) and database user (having normal user access). A database administrator has privileges to add new users to the database, delete one or more users of a database, decide and enforce the various access rights of different users, make changes to the schema, and so on. On the other hand, a normal user can only view, modify, delete or add records; can enter data; can search for desired information; and can create and generate reports. 2. All database management systems have password-based user authentication mechanism. That is, all database users must enter their valid password to successfully authenticate...
View Full Document

Ask a homework question - tutors are online