Free Essay

Java Graphical User Interface (Gui) and Design Document

In: Computers and Technology

Submitted By risk87105
Words 2125
Pages 9
IT110-1204A-01: Introduction to Programming
Java Graphical User Interface (GUI) and Design Document
Joseph Mirabal
11/12/2012

Table of Contents Project Outline 3 Class Diagrams 5 Use Case Diagrams 8 Java Fundamentals 10 Java Application Planning Worksheet 10 Final value 10 Java classes used: 11 Java Control Structures 12 Java Application Worksheet 12 Explain what this piece of code is doing: 13 Error Handling and File Input/Output 15 Final Application Design & Screenshots 37

Project Outline

The company I am going to hypothetically create will be a sports store dedicated to selling different types of sporting equipment for all types of sports. I will mainly start my store by just selling sports balls. I will call my store Joey’s Sporting Balls and Equipment. I know the name sounds funny, but I am doing that on purpose to catch the attention of my potential customers. I want the name of my store to stick in their minds, and what better way to o than a pun or play on words. I will start off with two types of balls, a football and a basketball.
The football will be brown in color, will have white laces, and will come in different sizes according to the level of the athlete and also to have a range in prices. It will range in size from miniature footballs for fun, small for beginners and as gift items, medium or college level, and to a large size for professional athletes, or just people who like to imitate professional athletes for fun or for souvenirs, like the NFL. It will also have two styles: a nylon mesh material or a traditional pebble-grained leather cover or cowhide. There will also be different brands, such as Wilson, Starter, and Nike footballs. The user can also make their selections by size, type, name brand, or price.
The basketball will range in colors, from traditional colors such as different orange types to brown colors. There will also be colors for different sports teams and glow in the dark basketballs for night use. They will also range in size from miniatures, small, medium, and large. The size usually is measured in circumference, ranging from 22 inches to 36 inches for shot training. All sizes will be marked in the description by which level of athlete it is used for if it is applicable to that size, such as the NBA, WNBA and so forth. There will be different types of materials to choose from as well. The customer can choose from rubber material, nylon mesh, leather, types of grip on the ball, to synthetic materials. Like the footballs, there will also be name brands as well to choose from and also the option to choose the desired basketball based on price.

Class Diagrams

Here is the football class. As you can see, the objects of the class are designated by size, material type, name brand, and price. These are all the things a customer can choose from when looking for the desired type of football they want to purchase. Please note that there will be a description of each ball no matter how they choose to search for the desired ball they are looking for that will explain what type of ball it is and if it is used in different leagues, or if it is the official ball of that certain league. The methods at the bottom help the customer to either buy now or add the item to the cart so they can buy multiple items at once and not have to purchase every item one by one. There is also a continue shopping button to help them add multiple items to their order if they choose to.

Here is the basketball class. The attributes of the class are designated by size, material type, name-brand, price, and team colors. These are all the things a customer can choose from when looking for the desired type of football they want to purchase. Please note that there will be a description of each ball no matter how they choose to search for the desired ball they are looking for that will explain what type of ball it is and if it is used in different leagues, or if it is the official ball of that certain league. The methods at the bottom help the customer to either buy now or add the item to the cart so they can buy multiple items at once and not have to purchase every item one by one. There is also a continue shopping button to help them add multiple items to their order if they choose to.

This is the customer class. It shows all the attributes needed for the customer to place the order and sign up as a member of my store if they choose to. The methods at the bottom help the customer with checking out to purchase a product with the method of their choosing, saving the cart for later if they want to wait on the purchase and not have to go through re-ordering, Signing in or registering if they want to become or already are a member of my store, or simply asking a question if they need help with something or purchasing an item. PayPal and Bill Me later are really intertwined with each other; however I have seen multiple times in different web sites those methods being separate, which suggests Bill Me Later can also be used without going through PayPal.

Use Case Diagrams

As you can see there are many different interactions the customer can do on this web site. The tasks in the diagram above are pretty self-explanatory, however please note that in order for the customer to use the tasks of signing in, editing registered information such as addresses and credit card information, saving the cart for future purchasing, and signing out; they must be registered as a member of the store and online web site. The stick figure is the actor which in this case is the customer, and the bubbles are the tasks the actor/customer can achieve on the web site. The lines just connect the customer with the tasks they can perform.

Java Fundamentals
Java Application Planning Worksheet
Package name: joey's.sporting.balls.and.equipment
Variables to declare:
Variable Name Datatype (string, double, or boolean)
1. openingMsg String
2. nameInputMsg String
3. customerName String
4. nameOutputMsg String
5. returnInputMsg String
6. customerReturn String
7. returnOutputMsg String
8. greetingOutputMsg String
9. outputMsg String
Final value
Final value assigned to each variable when application was executed and how each was assigned either through user input or internally in the Java application:
Variable Name Final value User Input or Program
1. openingMsg *** Welcome to Joeys Sporting Balls & Equipment*** Program
2. nameInputMsg Enter your name Program
3. customerName Customers Inputted Name. (Joseph) User Input
4. nameOutputMsg Welcome + customerName. (Joseph) Program
5. returnInputMsg Are you a returning customer (yes or no)? Program
6. customerReturn Customers Input ( yes or no, y or n) User Input
7. returnOutputMsg Your return customer status is (yes or no, y or n). Program
8. greetingOutputMsg Thank you for visiting Joeys Sporting Balls & Equipment! Program
9. outputMsg Welcome Joseph. Your return customer status is (Yes or No, Y or N). Thank you for visiting Joeys Sporting Balls & Equipment! Program

Java classes used:
1. Show Message Dialog Box: JOptionPane.showMessageDialog
2. Input Dialog Box: JOptionPane.showInputDialog
Command to make specific Java classes available: import javax.swing.

Java Control Structures
Java Application Worksheet
Package name: joeys.sporting.balls.phase.pkg3 Additional Variables to declare in this program:
Variable Name Datatype (string, double, or boolean)
1. openingMsg1 string
2. openingMsg2 string
3. openingMsg3 string
4. openingMsg4 string
5. openingMsg5 string
6. openingMsg6 string
7. openingMsg7 string
8. openingMsg8 string
9. userid string
10. password string
11. loginMsg string
12. pwMsg string
13. invalidEntry string
14. returnYes boolean
15. returnNo boolean
16. returnInvalid boolean
17. returnName boolean
18. validCustomer boolean
19. returnFlag double
Explain what this piece of code is doing:
1. returnYes = customerReturn.equalsIgnoreCase( "y" );
If the user is a return customer, then they will hit “y” signaling they are a return customer. The code will also ignore if the user inputs either a lowercase “y” or an upper case “Y” as Java is case sensitive.
2. if (returnYes) … else if (returnNo) … else if (returnYes) returnFlag = 1; else if (returnNo) returnFlag = 2; else returnFlag = 0;
This code will give the program options based on what the user inputs into the system. If they are a return user, they will be prompted to enter their username and password; If they put that they are not a return customer, they will be prompted to set up a username and password; If they enter any other information that is invalid, they will get an invalid entry screen and will be prompted to set up a user name and password.
3. for (int i =1; i <= 3; i++) { … }
This is a loop, meaning they have three tries to enter a valid entry; in this case, a user name and password. If they enter an invalid entry more than three times, something will happen; in this case they will be kicked off the system.
4. switch(returnFlag) … case 1: … case 2: … default:
This gives the program different scenarios depending on what the user inputted into the program. If they are a return customer, then they will go through case 1, which is to input their user name and password. If they are a new customer, they will go through case 2 and set up a new user name and password. If they make an invalid entry, they will go through the default case, which in this case they are advised by the program that they made an invalid entry and then will be prompted to create a user name and password.

Error Handling and File Input/Output
Here are screenshots of my project with the new dialog boxes and error handling checks:

If you enter the wrong information on any of these fields you will then get this:

It will then ask you to create a password and ask for your name again; that’s if you have already been to the name dialog before.

Otherwise if you’ve entered the information correctly, you will continue the process and receive this dialog box along with others:

The quantity the customer would enter should be between 1 and 99 of the item. Here is an example of what would happen if the customer entered the wrong quantity such as 300 of the item:

There will then be a loop that will again ask you for the quantity of the item again so you can have a chance to enter the right quantity. There will also be a confirmation that the customer entered the right amount. I have not created the loop and confirmation as of yet, but there will be one in the future along with many more! After the customer is asked for the quantity, they will then be asked for their shipping address and confirmation of the address. Again, there will be a future loop for the address as well. After words, they will be asked for their phone number. A future loop will be created for that as well, along with a confirmation and loop for the product and product type. Here are screenshots of the address, and confirmation, and the phone number and confirmation:

After the process is over, there will be a file that is created within the Joeys.Sporting.BallsIP4 folder called filereader.txt. It will have important information about the customer and shipping information that the warehouse will be able to see. It is the read and write file so the customers information can be entered and their item can be shipped. It looks like this:

Final Application Design & Screenshots
Here is my Final project of an ordering screen for my store. I will not change my case and class diagrams as they pertain to the whole store; which includes searching and looking for the products. The final Java screen is an ordering screen only and isn’t the whole store and what the user can do at my online store. Here are screenshots of my online ordering system for my store. Again, this is just the online ordering screen; this does not include any searching for the product, or asking questions. It is just the ordering screen:

Here is a screenshot after hitting the Accept button ( Hitting the clear button will cler all the fields the customer has entered):

Here is the file it wrote the information to so the warehouse could see what the customer ordered:

Similar Documents

Premium Essay

Swot Analysis Of Hotel

...Which hotel should I stay? Which phone should I buy? These are some of the question which we face in our day today life. Where do we seek answer for it? Relatives, friends, neighbours, magazines, papers. But now a days it has been quite habit to check the world wide web for answer. Does searching the world wide web is easy the answer would be a big no. Why? Due to increase in the usage of world wide web lead to the increase in web data. So searching through the vast unclear data is difficult. This leads to the technique called opinion or sentiment analysis. The process extraction of useful information from the existing user reviews is called opinion mining. To achieve this we need to clean the data first which is a bit challenging task, since the writing varies from one user to another. The negative reviews may hold some positive points and vice versa we need to take that also into consideration to achieve proper...

Words: 1725 - Pages: 7

Premium Essay

Toward an Abstract Language on Top of Xacml for Web Services Security

...Lebanon b Department of Computer Engineering, Khalifa University of Science, Technology & Research, Abu Dhabi, UAE CDepartment of Computer Science, Kuwait University, Kuwait b Azzam Mourada, Hadi Otrok , Hamdi YahyaouiC and Lama Baajoura Abstract-We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML profile(s). Our proposed approach allows first to specify the XACML profiles, which are then translated using our intended compiler into XACML security policies. The main contributions of our approach are: (1) Describing dynamic security policies using an abstract and user friendly profile language on top of XACML, (2) generating automatically the the XACML policies and (3) separating the business and security concerns of composite web services, and hence developing them separately. Our solution address the problems related to the complexity and difficulty of specifying security policies in XACML and other standard languages. We tested the feasibility of our approach by developing the library system (LB) that is composed of several Web services and applying/realizing our approach to enforce security. Keywords. Web Services Security; XACML; Security Policies; RBAC. The Security Assertion Markup Language (SAML) [2], WS­ Security [3] and WS-XACML [4] are the most successful ones. The main problems...

Words: 2085 - Pages: 9

Premium Essay

Importanat Terms of Java

...A Abstract: A Java keyword used in a class definition to specify that a class is not to be instantiated, but rather inherited by other classes. An abstract class can have abstract methods that are not implemented in the abstract class, but in subclasses. Abstract class: A class that contains one or more abstract methods, and therefore can never be instantiated. Abstract classes are defined so that other classes can extend them and make them concrete by implementing the abstract methods. Abstract method: A method that has no implementation. Abstract Window Toolkit (AWT): A collection of graphical user interface (GUI) components that were implemented using native-platform versions of the components. These components provide that subset of functionality which is common to all native platforms. Largely supplanted by the Project Swing component set. See also Swing. Access control: The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing integrity, confidentiality, or availability constraints. ACID: The acronym for the four properties guaranteed by transactions: atomicity, consistency, isolation, and durability. Actual parameter list: The arguments specified in a particular method call. See also formal parameter list. API: Application Programming Interface. The specification of how a programmer writing an application accesses the behavior and state of classes and objects. Applet: A component that typically...

Words: 6835 - Pages: 28

Free Essay

Digital Marketing

...deletion for the same. It also stores the details of invoices generated by customer and payments made by them with all Payments details like credit card. The primary features of online shopping are high accuracy, design flexibility and easy availability. It uses database tables representing entities and relationships between entities. 1.2 OBJECTIVE OF ONLINE SHOPPING The system is capable of maintaining details of various customers, vendors, Products and storing all the day to day transactions such as generation of shipment address bills, handling customers and product receipts, updating of stores The central concept of the application is to allow the customer to shop virtually using the Internet and allow customers to buy the items and articles of their desire from the store. The information pertaining to the products are stores on an RDBMS at the server side (store). The Server process the customers and the items are shipped to the address submitted by them. 1 The application was designed into two modules 1. Buy module 2. Database module The Buy module is used for the customers who wish to buy the articles. The database module is for the storekeepers who maintains and updates the information pertaining to the articles and those of the customers. The end user of this product is a departmental store where the application is hosted on the web and the administrator maintains the database. The application which is deployed at the customer database, the details of the items...

Words: 4558 - Pages: 19

Free Essay

Project Management for the Central Goverment

...SOFTWARE REQUIREMENTS 3.1 Input Requirements…………………………………….……………………………………..8 3.2 Output Requirements………………………………………………………………………..8 3 3.3 Software Requirements…………………….………………………………………………..8 3.4 Hardware Requirements……………………………………………………………………..8 4. TOOL USED FOR DEVELOPMENT 4.1 NetBeans…………………………………………………………………………….……………….10 4.1.1 Features and Tools…………………..……………………………..………..…….10 4.1.2 Source Code Editor………………………………………………………………….10 4.1.3 GUI Builder………………………………………………………………………………..11 5. TECHNOLOGY TO BE USED 5.1 Introduction to Java…………………………………………………………..……………..13 5.1.1 Java Virtual Machine……………………………………………….…………..13 5.1.2 Principles………………………………………………………………………………..13 5.1.3 Versions……………………………………….………………………………………...14 5.1.4 Features of Java Language…………………………………………………..14 5.2 Multi Threading………………………………………………………………………….........16 5.2.1 Benefits of using threads……………………………………………………..17 5.2.2 Life Cycle of a Thread……………………………………………………………17 5.2.3 Thread Priority in Java………………………………………………………….18 5.3 Socket Programming in Java……….…………………………………………………..19 5.3.1 Ports and...

Words: 12882 - Pages: 52

Premium Essay

Database

...This page intentionally left blank Copyright © 2009, New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2861-2 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com Preface In recent years there have been significant advances in the development of high performance personal computer and networks. There is now an identifiable trend in industry toward downsizing that is replacing expensive mainframe computers with more cost-effective networks of personal computer that achieve the same or even better results. This trend has given rise to the architecture of the Client/Server Computing. The term Client/Server was first used in the 1980s in reference to personal computers on a network. The actual Client/Server model started gaining acceptance in the late 1980s. The term Client/Server is used to describe a computing model for the development of computerized systems. This model is based on the distribution of functions between two types of independent and autonomous entities:...

Words: 79055 - Pages: 317

Premium Essay

Data Communication and Networking

...SEMESTER III |SL. |COURSE CODE |COURSE TITLE |L |T |P |C | |NO | | | | | | | |THEORY | |1 |MC9231 |Computer Networks |3 |0 |0 |3 | |2 |MC9232 |Microprocessors and its |3 |0 |0 |3 | | | |Applications | | | | | |3 |MC9233 |Software Engineering |3 |0 |0 |3 | |4 |MC9234 |Computer Graphics |3 |0 |0 |3 | |5 |MC9235 |Web Programming |3 |0 |0 |3 | |PRACTICAL | |6 |MC9237 |Graphics Lab |0 |0 |3 |2 | |7 |MC9238 |Microprocessor Lab |0 |0 |3 ...

Words: 1592 - Pages: 7

Premium Essay

Software Requirement Specification of Library Mgmt System

...Introduction 1.1 Purpose The main objective of this document is to illustrate the requirements of the project Library Management system. The document gives the detailed description of the both functional and non-functional requirements proposed by the client. The purpose of this project is to provide a friendly environment to maintain the details of books and library members. The main purpose of this project is to maintain easy circulation system using computers and to provide different reports. This project describes the hardware and software interface requirements using ER diagrams and UML diagrams. 1.2 Document Conventions * Entire document should be justified. * Convention for Main title * Font face: Times New Roman * Font style: Bold * Font Size: 14 * Convention for Sub title * Font face: Times New Roman * Font style: Bold * Font Size: 12 * Convention for body * Font face: Times New Roman * Font Size: 12 1.3 Scope of Development Project Library Management System is basically updating the manual library system into an internet-based application so that the users can know the details of their accounts, availability of books and maximum limit for borrowing. The project is specifically designed for the use of librarians and library users. The product will work as a complete user interface for library management process and library usage from ordinary users. Library Management System can be used by any existing...

Words: 2807 - Pages: 12

Free Essay

Kft1

...SUBDOMAIN 430.1 - INTRODUCTION TO PROGRAMMING Competency 430.1.2: Algorithm Design and Development - The graduate designs and develops algorithms for problem solving and implements those algorithms using appropriate program code. Competency 430.1.3: Use of Data Structures - The graduate develops working programs that use appropriate data structures for problem solving. Competency 430.1.4: Modeling Systems Using Unified Modeling Language (UML) - The graduate develops and interprets Unified Modeling Language (UML) diagrams which model object-oriented designs. Competency 430.1.5: Object-Oriented Concepts - The graduate applies object-oriented concepts, develops object-oriented designs, and uses object-oriented programming techniques. Competency 430.1.6: Software Testing and Troubleshooting - The graduate applies software testing and troubleshooting strategies to determine programming errors and recommend appropriate solutions. Introduction: As a competent programmer, your ability to design and develop algorithms, your proficient use of data structures, and your ability to use the Unified Modeling Language (UML) to communicate and develop object-oriented designs will help you design and develop applications to meet customer requirements. A solid understanding of object-oriented concepts will help you develop applications that are maintainable and extensible. Strong competence in software testing and troubleshooting will allow you to validate and verify your applications...

Words: 2139 - Pages: 9

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Premium Essay

Web Application

...research has taught us that with each such interaction, we are prone to many malicious attacks, security lapses and even extremely skilled hacking operations. The field of Network Security and Cryptography has come a long way in the past decade, but it is safe to say that there is a lot more work to be done. Here we choose to concentrate on Web Applications and we particularly approach them from the developer’s perspective. With every step taken towards better security on the internet, end-users are doing their bit to safeguard their systems and data. However, keeping in mind how commercial and competitive the world we live in has become and the manner in which the market for web related products has grown, it becomes imperative for a developer to ensure that his web application is not just marketable as a breakthrough user friendly concept but also as a secure one. We imagine a world where, every skilled developer is able to make phenomenal applications and is able to provide his users with a large amount of credibility and reliability in terms of security. We aim to conceptualize and subsequently generate a security tool exclusively for the developer, which will be able to scan his work for security lapses and loopholes thereby enhancing the product testing process and making it more wholesome and complete. Chapter – 2 PROBLEM DEFINITION Our project aims at designing an application that has the following features: 1. Identify a selected set of software...

Words: 6435 - Pages: 26

Free Essay

Programming Lenguages

...ro1970’s Pascal is an influential imperative and procedural programming language, designed in 1968–1969 and published in 1970 by Niklaus Wirth as a small and efficient language intended to encourage good programming practices using structured programming and data structuring. A derivative known as Object Pascal designed for object-oriented programming was developed in 1985. ------------------------------- C is a general-purpose programming language initially developed by Dennis Ritchie between 1969 and 1973 at AT&T Bell Labs. Like most imperative languages in the ALGOL tradition, C has facilities for structured programming and allows lexical variable scope and recursion, while a static type system prevents many unintended operations. Its design provides constructs that map efficiently to typical machine instructions, and therefore it has found lasting use in applications that had formerly been coded in assembly language, most notably system software like the Unix computer operating system. ----------------------------------- Prolog is a general purpose logic programming language associated with artificial intelligence and computational linguistics. Prolog has its roots in first-order logic, a formal logic, and unlike many other programming languages, Prolog is declarative: the program logic is expressed in terms of relations, represented as facts and rules. A computation is initiated by running a query over these relations. The language was first conceived by a group around...

Words: 2012 - Pages: 9

Free Essay

Macoii

...Strategies Object-oriented programming embodies in software structures a number of powerful design strategies that are based on practical and proven software engineering techniques. By incorporating support for these strategies in software structures, object-oriented programming enables the manageable construction of more complex systems of software than was previously possible. The nature of these software structures has been shaped by decades of software engineering experience. The basic design strategies that are embodied in object-oriented programming are presented in the Table 1.1. The design strategies evolved as techniques for dealing with complex natural and man-made system. Because these strategies are so fundamental, they are encountered in other contexts and in other programming language forms. What is stressed here is the relationship of these strategies to the design and construction of object-oriented software. These strategies are widely supported by existing object-oriented languages though different languages may present them in different ways and some languages may support other variations of each one. For example, some object-oriented languages have additional ways of supporting generalization. The design strategies in object-oriented programming are effective for constructing software models of entities in the problem domain. In fact, some have argued that software design is largely about constructing a software model of the "real world" where each "real" entity...

Words: 16718 - Pages: 67

Premium Essay

Computer Os and Matienance Lab 1.1 & 5.1

...Report on Computer OS and Maintenance - Seminar One This report documents the Lab Project assignments given for week one. These assignments cover chapters one, three, five, and six of the Managing and Troubleshooting PCs Exam 220-801 book. This report also provides a brief summary of what information was learned. Table of Contents Page 1.1 Lab Exercise 1.1…………………….……………………………………… 4-5 1.2 Lab Exercise 5.1………………………………………….………………… 5-6 2 SUMMARY OF SEMINAR 1.......................................................................... 6 • Lab Exercise 1.1 If you have access to the Internet, do some searching on computer certifications. Make a personal certification tree or pathway that maps out a series of certifications to pursue that might interest you. Which certifications would be useful if you want to be a graphic designer, for example? What if you want to create computer games? I am interested in Video Game Design. Here is a certification pathway showing the types of certifications I would need to be successful in this field: Certificate in Game Design Includes classes for the following subjects  Game theory  Game genres  Design principles  3-D graphics programming  Character animation  Game engine architectures Java C++ Flash Bachelors Degree in Computer Programming Includes classes for the...

Words: 613 - Pages: 3

Premium Essay

Review Questions: Chapter 1

...Review Questions: Chapter 1 1.1. Define the following terms: data, database, DBMS, database system, database catalog, program-data independence, user view, DBA, end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. • Data – known facts that can be recorded and that have implicit meaning. • Database – a collection of related data with an implicit meaning. • DBMS – a collection of programs that enables users to create and maintain a database • Database system – not only contains the database itself bit also a complete definition or description of the database structure and constrains. • Database catalog – the information about the database structure is stored in the Database Catalog which contains the structure of each file, the type and storage format of each data item, and various constrains of the data. • Program-Data Independence – DBMS access programs do not require changes in all programs due to the change in the structure of a file because the structure of data files is stored in the DBMS catalog separately from the access programs. • User View – a database typically has many users, and each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data the is derived from the database files but is not explicitly stored. • DBA – a database administrator (short form DBA) is a person...

Words: 2493 - Pages: 10