SlideShare a Scribd company logo
1 of 18
Building a
Database
Database
What is database ?
 a collection of data or information that is
organized so that its contents can easily be
accessed, managed, and updated.
Type of database
 Manual database
 Computerized database
What is the difference
between manual database
and computerized
database?
Manual database
 Lists created on stone, metal or paper are
called manual database.
 Example: List students’ mark. The list
consists two columns, NAME and MARKS.
Teacher fill in the names and marks for each
subject according to level : year 7, year 8 etc.
These paper files are then stored in filling
cabinet.
Manual database – list students’ mark
Manual database
Disadvantages :
 Accesing file and updating is very time
consuming. for example when data needs
to be retreived or updated, the user has to
search through file to locate them
physically.
 Take up a lot of space since data has to be
stored files.
Computerized database
 Store data and manipulate a database using
computer .
Computerized database
Advantages :
 Store information only once since most database
software allows you to access information from
several files.
 Validation checks may be made on the data so
that there will be fewer errors in the data.
 Files can be linked together, which means that if
you update one of the files, all the other files that
depend on the same information will automatically
be updated.
 Access information is quickly.
Computerized database
Disadvantages :
 If the computer breaks down, you are not
able to access the details.
 It is easy to copy computer files.
 Training is needed to use system so that this
takes time and cost money
 Database may be corrupted / infected.
 Some database complicated to us.
Parts of database
Databases are organized in files which consist
of a series of records which in turn consist of a
series of fields.
Once your
understood this,
you will be well on
the way to
understanding
database.
Parts of database
 Files - a collection of data or information that
has been given a name.
Parts of database
 Records – one entry in a database.
Parts of database
 Fields – records contains a number of fields. (
each item in a record )
Parts of database : Scenario
1. Information of all student s in a
school could be save as student file
2. Student record card - record
3. Student number, forename, form,
DOB – field name
Two main types of database
 flat file database
 relational database
Two main types of database
Flat file database Relational database
Use on personal computer. Used a lot in large organisations.
Store data in one file at a time
and this must store all the data.
Store data in separate tables and
files.
(have links/ relationships which
allow data from another file to be
shown, used and edited but not
copy in a current file. So that
whenever the values the other file
change, the data displayed in the
current file also changes.
Not suitable for large database
because they can be slow, have
large file size and use a lot of
memory.
IMAGE OF RELATIONAL
DATABASE
ACTIVITY
 Activity 1 – brain storming
 Activity 1 – fill in he blanks
 Homework

More Related Content

What's hot

D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1askme
 
L4 working with tables and data
L4 working with tables and dataL4 working with tables and data
L4 working with tables and dataBryan Corpuz
 
How to build a data dictionary
How to build a data dictionaryHow to build a data dictionary
How to build a data dictionaryPiotr Kononow
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data managementSoushilove
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data ManagementSoushilove
 
Metadata lecture(9 17-14)
Metadata lecture(9 17-14)Metadata lecture(9 17-14)
Metadata lecture(9 17-14)mhb120
 
ppt on open office.org
ppt on open office.orgppt on open office.org
ppt on open office.orgDeepansh Goel
 
Introduction to databases
Introduction to databasesIntroduction to databases
Introduction to databasesakanksha007
 

What's hot (14)

D I T211 Chapter 1
D I T211    Chapter 1D I T211    Chapter 1
D I T211 Chapter 1
 
L4 working with tables and data
L4 working with tables and dataL4 working with tables and data
L4 working with tables and data
 
Database report
Database reportDatabase report
Database report
 
How to build a data dictionary
How to build a data dictionaryHow to build a data dictionary
How to build a data dictionary
 
DBMS Architecture
DBMS ArchitectureDBMS Architecture
DBMS Architecture
 
Unit 4 file and data management
Unit 4 file and data managementUnit 4 file and data management
Unit 4 file and data management
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 
Metadata lecture(9 17-14)
Metadata lecture(9 17-14)Metadata lecture(9 17-14)
Metadata lecture(9 17-14)
 
ppt on open office.org
ppt on open office.orgppt on open office.org
ppt on open office.org
 
Files Management
Files ManagementFiles Management
Files Management
 
Database basics
Database basicsDatabase basics
Database basics
 
File
FileFile
File
 
Introduction to databases
Introduction to databasesIntroduction to databases
Introduction to databases
 
Databases
DatabasesDatabases
Databases
 

Viewers also liked

Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 
Database concepts
Database conceptsDatabase concepts
Database conceptsDavid Hoen
 
Database constraints
Database constraintsDatabase constraints
Database constraintsDavid Hoen
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prologDavid Hoen
 
Information retrieval
Information retrievalInformation retrieval
Information retrievalDavid Hoen
 
Datamining with nb
Datamining with nbDatamining with nb
Datamining with nbDavid Hoen
 
Overview prolog
Overview prologOverview prolog
Overview prologDavid Hoen
 
Xml stylus studio
Xml stylus studioXml stylus studio
Xml stylus studioDavid Hoen
 
Computer security
Computer securityComputer security
Computer securityDavid Hoen
 
Text classification
Text classificationText classification
Text classificationDavid Hoen
 
Access data connection
Access data connectionAccess data connection
Access data connectionDavid Hoen
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationDavid Hoen
 
Text categorization as a graph
Text categorization as a graph Text categorization as a graph
Text categorization as a graph David Hoen
 

Viewers also liked (18)

Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Database concepts
Database conceptsDatabase concepts
Database concepts
 
Database constraints
Database constraintsDatabase constraints
Database constraints
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to prolog
Introduction to prologIntroduction to prolog
Introduction to prolog
 
Information retrieval
Information retrievalInformation retrieval
Information retrieval
 
Datamining with nb
Datamining with nbDatamining with nb
Datamining with nb
 
Overview prolog
Overview prologOverview prolog
Overview prolog
 
Xml stylus studio
Xml stylus studioXml stylus studio
Xml stylus studio
 
Prolog resume
Prolog resumeProlog resume
Prolog resume
 
Computer security
Computer securityComputer security
Computer security
 
Text classification
Text classificationText classification
Text classification
 
Naïve bayes
Naïve bayesNaïve bayes
Naïve bayes
 
Access data connection
Access data connectionAccess data connection
Access data connection
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Xml schema
Xml schemaXml schema
Xml schema
 
Text categorization as a graph
Text categorization as a graph Text categorization as a graph
Text categorization as a graph
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 

Similar to Building a-database

Module03
Module03Module03
Module03susir
 
Relational database revised
Relational database revisedRelational database revised
Relational database revisedmnodalo
 
Database Management Systems - Management Information System
Database Management Systems - Management Information SystemDatabase Management Systems - Management Information System
Database Management Systems - Management Information SystemNijaz N
 
File system vs database
File system vs databaseFile system vs database
File system vs databaseSanthiNivas
 
Disadvantages of file management system (file processing systems)
Disadvantages of file management system(file processing systems)Disadvantages of file management system(file processing systems)
Disadvantages of file management system (file processing systems) raj upadhyay
 
Week 1 Before the Advent of Database Systems & Fundamental Concepts
Week 1 Before the Advent of Database Systems & Fundamental ConceptsWeek 1 Before the Advent of Database Systems & Fundamental Concepts
Week 1 Before the Advent of Database Systems & Fundamental Conceptsoudesign
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1askme
 
Degonto file management
Degonto file managementDegonto file management
Degonto file managementDegonto Islam
 
Database Management System Part-1.pptx
Database Management System Part-1.pptxDatabase Management System Part-1.pptx
Database Management System Part-1.pptxArshveerSinghDhillon
 
Data Processing in Fundamentals of IT
Data Processing in Fundamentals of ITData Processing in Fundamentals of IT
Data Processing in Fundamentals of ITSanthiNivas
 
Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018Fizaril Amzari Omar
 
A database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdfA database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdfangelfashions02
 

Similar to Building a-database (20)

Module03
Module03Module03
Module03
 
Relational database revised
Relational database revisedRelational database revised
Relational database revised
 
8.DBMS.pptx
8.DBMS.pptx8.DBMS.pptx
8.DBMS.pptx
 
Data processing
Data processingData processing
Data processing
 
Database Management Systems - Management Information System
Database Management Systems - Management Information SystemDatabase Management Systems - Management Information System
Database Management Systems - Management Information System
 
File system vs database
File system vs databaseFile system vs database
File system vs database
 
RDMS AND SQL
RDMS AND SQLRDMS AND SQL
RDMS AND SQL
 
Disadvantages of file management system (file processing systems)
Disadvantages of file management system(file processing systems)Disadvantages of file management system(file processing systems)
Disadvantages of file management system (file processing systems)
 
Week 1 Before the Advent of Database Systems & Fundamental Concepts
Week 1 Before the Advent of Database Systems & Fundamental ConceptsWeek 1 Before the Advent of Database Systems & Fundamental Concepts
Week 1 Before the Advent of Database Systems & Fundamental Concepts
 
Dbms mca-section a
Dbms mca-section aDbms mca-section a
Dbms mca-section a
 
D I T211 Chapter 1 1
D I T211    Chapter 1 1D I T211    Chapter 1 1
D I T211 Chapter 1 1
 
DATABASE.pptx
DATABASE.pptxDATABASE.pptx
DATABASE.pptx
 
Data base
Data baseData base
Data base
 
Degonto file management
Degonto file managementDegonto file management
Degonto file management
 
DBMS (UNIT 5)
DBMS (UNIT 5)DBMS (UNIT 5)
DBMS (UNIT 5)
 
Database Management System Part-1.pptx
Database Management System Part-1.pptxDatabase Management System Part-1.pptx
Database Management System Part-1.pptx
 
6.2 software
6.2 software6.2 software
6.2 software
 
Data Processing in Fundamentals of IT
Data Processing in Fundamentals of ITData Processing in Fundamentals of IT
Data Processing in Fundamentals of IT
 
Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018
 
A database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdfA database is generally used for storing related, structured data, w.pdf
A database is generally used for storing related, structured data, w.pdf
 

More from David Hoen

Database introduction
Database introductionDatabase introduction
Database introductionDavid Hoen
 
Prolog programming
Prolog programmingProlog programming
Prolog programmingDavid Hoen
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in cryptoDavid Hoen
 
Nlp naive bayes
Nlp naive bayesNlp naive bayes
Nlp naive bayesDavid Hoen
 
Text classification methods
Text classification methodsText classification methods
Text classification methodsDavid Hoen
 
Sql database object
Sql database objectSql database object
Sql database objectDavid Hoen
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practiceDavid Hoen
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithmsDavid Hoen
 

More from David Hoen (11)

Database introduction
Database introductionDatabase introduction
Database introduction
 
Decision tree
Decision treeDecision tree
Decision tree
 
Prolog programming
Prolog programmingProlog programming
Prolog programming
 
Key exchange in crypto
Key exchange in cryptoKey exchange in crypto
Key exchange in crypto
 
Nlp naive bayes
Nlp naive bayesNlp naive bayes
Nlp naive bayes
 
Basic dns-mod
Basic dns-modBasic dns-mod
Basic dns-mod
 
Hashfunction
HashfunctionHashfunction
Hashfunction
 
Text classification methods
Text classification methodsText classification methods
Text classification methods
 
Sql database object
Sql database objectSql database object
Sql database object
 
Crypto theory to practice
Crypto theory to practiceCrypto theory to practice
Crypto theory to practice
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Building a-database

  • 2. What is database ?  a collection of data or information that is organized so that its contents can easily be accessed, managed, and updated.
  • 3. Type of database  Manual database  Computerized database What is the difference between manual database and computerized database?
  • 4. Manual database  Lists created on stone, metal or paper are called manual database.  Example: List students’ mark. The list consists two columns, NAME and MARKS. Teacher fill in the names and marks for each subject according to level : year 7, year 8 etc. These paper files are then stored in filling cabinet.
  • 5. Manual database – list students’ mark
  • 6. Manual database Disadvantages :  Accesing file and updating is very time consuming. for example when data needs to be retreived or updated, the user has to search through file to locate them physically.  Take up a lot of space since data has to be stored files.
  • 7. Computerized database  Store data and manipulate a database using computer .
  • 8. Computerized database Advantages :  Store information only once since most database software allows you to access information from several files.  Validation checks may be made on the data so that there will be fewer errors in the data.  Files can be linked together, which means that if you update one of the files, all the other files that depend on the same information will automatically be updated.  Access information is quickly.
  • 9. Computerized database Disadvantages :  If the computer breaks down, you are not able to access the details.  It is easy to copy computer files.  Training is needed to use system so that this takes time and cost money  Database may be corrupted / infected.  Some database complicated to us.
  • 10. Parts of database Databases are organized in files which consist of a series of records which in turn consist of a series of fields. Once your understood this, you will be well on the way to understanding database.
  • 11. Parts of database  Files - a collection of data or information that has been given a name.
  • 12. Parts of database  Records – one entry in a database.
  • 13. Parts of database  Fields – records contains a number of fields. ( each item in a record )
  • 14. Parts of database : Scenario 1. Information of all student s in a school could be save as student file 2. Student record card - record 3. Student number, forename, form, DOB – field name
  • 15. Two main types of database  flat file database  relational database
  • 16. Two main types of database Flat file database Relational database Use on personal computer. Used a lot in large organisations. Store data in one file at a time and this must store all the data. Store data in separate tables and files. (have links/ relationships which allow data from another file to be shown, used and edited but not copy in a current file. So that whenever the values the other file change, the data displayed in the current file also changes. Not suitable for large database because they can be slow, have large file size and use a lot of memory.
  • 18. ACTIVITY  Activity 1 – brain storming  Activity 1 – fill in he blanks  Homework