In the “DBM approach” to information systems, which responsibilities are typically handled by application programs (as opposed to the database management system itself)? Select the most accurate description of what application programs perform.

Difficulty: Easy

Correct Answer: processing functions

Explanation:


Introduction / Context:
In a classical database environment, the division of labor between application programs and the database management system (DBMS) matters. The DBMS provides storage, access paths, and security primitives, while application programs implement business logic. This question asks which tasks application programs typically undertake in the “DBM approach.”


Given Data / Assumptions:

  • “DBM approach” refers to conventional systems where a DBMS manages data.
  • Application programs include business rules, validations, and process flow.
  • DBMS features include data storage, retrieval, concurrency, and security primitives.


Concept / Approach:
Application programs are primarily responsible for processing functions—that is, implementing business logic, calculations, workflows, and user interactions. The DBMS generally handles storage functions (physical organization, indexing, logging) and access control (privileges, roles, authentication). While applications may invoke or supplement access control, the canonical responsibility for storage and core access mechanisms lies with the DBMS layer.


Step-by-Step Solution:
Identify what each layer traditionally owns.Map responsibilities: DBMS = storage + access methods/security primitives; Application = business processing.Select the option that best fits the application’s domain: “processing functions.”


Verification / Alternative check:
Review common architectures: 3-tier systems isolate the data tier (DBMS) from the application tier (logic). Even in client–server, SQL encapsulates data operations; applications orchestrate processes and rules.


Why Other Options Are Wrong:

  • Storage function: The DBMS is optimized to provide storage and recovery, not the application code.
  • Access control: Core authorization/authentication are DBMS features, though applications can add additional checks.
  • All of the above / None: Overinclusive or incorrect; the clearest role of application programs is processing.


Common Pitfalls:
Assuming that because applications can enforce some security, they “own” access control; mixing responsibilities can cause duplicated logic and inconsistencies.


Final Answer:
processing functions

More Questions from Database Systems

Discussion & Comments

No comments yet. Be the first to comment!
Join Discussion