SlideShare a Scribd company logo
1 of 49
Filmon Habtemichael
Introduction
 We are navigating across the technological dimension
of MIS
 Previously we have seen Hardware and Software
technologies in relation to MIS
 Since you are studying Database courses in detail, this
lecture will focus less in the technical details
Introduction
 The information systems we have been discussing in
previous chapters are all databases
 DSS
 MIS
 ESS
 A well-designed and well-managed database is an
extremely valuable tool in supporting decision
making.
Recap- Hierarchy of Data
The database Approach
Traditional approach to data management
 An approach whereby separate data files are created and
stored for each application program.
Database approach to data management
 An approach whereby a pool of related data is shared by
multiple application programs
Traditional Approach
Problems with Traditional approach
 The resulting problems are
 Data redundancy and inconsistency,
 Program-data dependence,
 Inflexibility,
 Poor data security, and
 Inability to share data among applications.
Problems with Traditional approach
 Data redundancy is the presence of duplicate data in
multiple data files so that the same data are stored in
more than one place or location.
 Occurs when different groups in an organization
independently collect the same piece of data and store it
independently of each other
 wastes storage resources and also leads to data
inconsistency
Problems with Traditional approach
 Data Inconsistency: The same attribute may have
different values
 E.g. Change in Student ID, Change in Date etc
 E.g 2 Different coding system (like cloth retailers and
others
Problems with Traditional approach
 Program-Data Dependence
 Changes in programs require changes to the data.
 One program might be modified from a five-digit to a nine-digit zip
code. If the original data file were changed from five-digit to nine-digit
zip codes, then other programs that required the five-digit zip code
would no longer work properly
 Lack of Flexibility
 can deliver routine scheduled reports, but it cannot deliver ad hoc
reports or respond to unanticipated information requirements in a
timely fashion
 Poor Security
 Management may have no way of knowing who is accessing or even
making changes to the organization’s data.
 Lack of Data Sharing and Availability
 Information cannot flow freely across different functional areas or
different parts of the organization.
The Database Approach to Data Management
Database management system
 A DBMS is software that permits an organization to
centralize data, manage them efficiently, and provide
access to the stored data by application programs.
 End user doesn’t need where and how the data are
actually stored.
 This is done by separating the logical and physical views
of the data.
 The logical view presents data as they would be
perceived by end users or business specialists,
 whereas the physical view shows how data are actually
organized and structured on physical storage media.
Advantages
Disadvantages
Data Modeling
 Is one of the tools database designers use to show the
logical relationships among data
 A data model is a diagram of entities and their
relationships.
 Data modeling usually involves understanding a
specific business problem and analyzing the data and
information needed to deliver a solution.
 Enterprise data modeling is data modeling done at
the level of the entire enterprise.
 E.g. Entity-relationship (ER) diagrams
The Relational Database Model
 The most popular type of DBMS today
 There are other models too (flat files, hierarchical, and
network models)
 Data represented as two-dimensional tables
 Examples of Relational models are
 Oracle (current market leader)
 IBM DB2 (second market leader)
 Microsoft SQL Server (third market leader)
 Sybase,
 Microsoft Access, and
 MySQL.
Relational DB terms
 Projecting
 Manipulating data to eliminate columns in a table.
 Joining
 Manipulating data to combine two or more tables.
 Linking
 Data manipulation that combines two or more tables
using common data attributes to form a new table with
only the unique data attributes.
Non relational databases
 For over 30 years, relational database technology has been the
gold standard
 Relational DBMS and data warehouse products are not well-
suited for organizing and analyzing big data or data that do not
easily fit into columns and rows used in their data models.
 Non-relational database management systems use a more
flexible data model and are designed for managing large data
sets across many distributed machines
 Companies are turning to “NoSQL” non-relational database
services for
 Cloud computing,
 unprecedented data volumes,
 massive workloads for Web
 Oracle NoSQL Database is an example
Data Cleanup
Name Phone Gender Dues paid Date paid
Rahel K 07111213 Female 250 Nakfa 15 October
Nahom
H/mariam
07122332 Male 300 nalfa 15 October
Nahom
H/mariam
07603476 Male 300 nakfa 25 october
• The process of looking for and fixing inconsistencies to ensure that data is
accurate and complete.
• Consider below the database of sport’s gym
Finding the Anomalies
 Nahom paid his dues twice in October, hence the data
is redundant
 Notice that the data in the database is also
inconsistent: Nahom has changed his phone number,
but only one of the records reflects this change
• Reducing this database’s reliability is the lack of a
primary key to uniquely identify Nahom H/mariam’s
record. The first Nahom could Nahom Hailemariam ,
but the second might be Nahom Habtemariam
• These problems and irregularities in data are called
anomalies.
Overview of database files- Flat File
 Simple database program whose records have no
relationship to one another.
 do not use any of the database models
 Many spreadsheet and word processing programs have
flat file capabilities.
 Microsoft OneNote is designed to let people put ideas,
thoughts, and notes into a computer file.
One note
Single User
 A database installed on a personal computer
 E.g. Microsoft Office Access and FileMaker Pro
 InfoPath has built-in forms that can be used to enter
expense information, timesheet data, and a variety of
other information.
Multiple Users
 Small, midsize, and large businesses need multiuser
DBMSs to share information throughout the
organization over a network.
 These more powerful, expensive systems allow dozens
or hundreds of people to access the same database
system at the same time
Providing a User View
 DBMS is responsible for access to a database
 One of the first steps in installing and using a large
database involves telling the DBMS the logical and
physical structure of the data and relationships among
the data in the database for each user.
 This description is called a schema (as in schematic
diagram).
cont
 A schema can be part of the database or a separate
schema file.
 Schemas are entered into the DBMS via a data
definition language (DDL) which is a collection of
instructions and commands used to define and
describe data and relationships in a specific database.
cont
 Another important step in creating a database is to
establish a data dictionary, a detailed description of all
data used in the database. The data dictionary contains the
following data
 Name of the data item
 Aliases or other names that may be used to describe the item
 Range of values that can be used
 Type of data (such as alphanumeric or numeric)
 Amount of storage needed for the item
 Notation of the person responsible for updating it and the
various users who can access it
 List of reports that use the data item
Storing and Retrieving Data
 One function of a DBMS is to be an interface between an
application program and the database.
 When an application program needs data, it requests the
data through the DBMS.
 Two or more people or programs attempting to access the
same record in the same database at the same time can
cause a problem
 Concurrency control can be used to avoid this potential
problem.
 One approach is to lock out all other application programs
from access to a record if the record is being updated or used
by another program.
Manipulating Data and Generating Reports
 Some databases use Query-by-Example (QBE), which
is a visual approach to developing database queries or
requests.
cont
 In other cases, database commands can be used in a
programming language
SELECT * FROM ICT_STUDENTS
WHERE COURSE = “MIS”.
 In general, the commands that are used to manipulate
the database are part of the data manipulation
language (DML). which allows managers and other
database users to access, modify, and make queries
about data contained in the database to generate
reports
Database Administration
 A DBA is expected to have a clear understanding of the
fundamental business of the organization,
 Be proficient in the use of selected database
management systems and
 Stay abreast of emerging technologies and new design
approaches.
cont
 The role of the DBA is to plan, design, create, operate,
secure, monitor, and maintain databases.
 Typically, a DBA has a degree in computer science or
management information systems and some on-the-
job training with a particular database product
 The DBA also works with programmers as they build
applications
Popular Database Management Systems
 The popular DB2 relational database from IBM and
The Sybase IQ database are available on the Linux
operating system.
 A new form of database system is emerging that some
refer to as Database as a Service (DaaS) and others as
Database 2.0
 Popular companies like Google and Microsft are moving
in the DaaS direction.
Special-Purpose Database Systems
 Israeli Holocaust Database (www.yadvashem.org)
 contains information on about three million people in 14
languages
 iTunes
 store music and video catalog is a special-purpose
database system.
 Morphbank (www.morphbank.net)
 allows scientists from around the world to upload and
share biological and microscopic photographs and
descriptions that support research in many areas.
Selecting a Database Management System
 Database size: The number of records in the database
 Database cost: The purchase or lease costs of the database
 Concurrent users: The number of people who need to use
the database at the same time (the number of concurrent
users)
 Performance: How fast the database is able to update
records
 Integration: The ability to be integrated with other
applications and databases
 Vendor: The reputation and financial stability of the
database vendor
Using Databases with Other Software
 Front-end application is one that directly interacts with
people or users.
 Marketing researchers often use a database as a front
end to a statistical analysis program.
 Back-end application interacts with other programs or
applications; it only indirectly interacts with people or
users.
Linking the Company Database to the Internet
 Developing a seamless integration of traditional databases
with the Internet is often called a semantic Web.
 Good side: convenient for individual users, and increases
effectiveness and efficiency for businesses and organizations.
E,g eBay, amazon.com, Apple’s itunes
 Bad side: half a million database servers were vulnerable to
attack
 Google is rolling out a DBMS that will provide patients and
physicians with one storage location for all medical
records, accessed through a Web browser
 Google plans to encrypt the data and ask authentication
 But can reduce the number of paper forms and clerical errors
Linking the Company Database to the Internet
Users access an organization’s internal database through the Web using their desktop
PCs and Web browser software.
Data Warehouses, Data Marts, and Data Mining
 A data warehouse is a database that holds business
information from many sources in the enterprise,
covering all aspects of the company’s processes,
products, and customers
 A data warehouse stores historical data that has been
extracted from operational systems and external data
sources
 This data is “cleaned up” to remove inconsistencies
and integrated to create a new information database
that is more suitable for business analysis.
Online Transaction Processing VS Data Warehousing
THE CHALLENGE OF BIG DATA
 Big data doesn’t refer to any specific quantity, but
usually refers to data in the petabyte and exabyte range
 A single jet engine is capable of generating 10 terabytes
of data in just 30 minutes there are more than 25,000
airline flights each day.
 Even though “tweets” are limited to 140 characters each,
Twitter generates over 8 terabytes of data daily
Data Marts
 A subset of a data warehouse.
 Used to small and medium-sized businesses and to
departments within larger companies.
 Instead of storing all enterprise data in one huge
database, data marts contain a subset of the data for a
single aspect of a company’s business
Data Mining
 Data mining is an information-analysis tool that
involves the automated discovery of patterns and
relationships in a data warehouse.
 The University of Maryland- “forecast terrorist behavior
based on past actions”
 Extensively in marketing to improve
 customer retention;
 Pricing analysis; and customer segmentation analysis
 E-commerce presents another major opportunity for
effective use of data mining.
cont
 Predictive analysis is a form of data mining that
combines historical data with assumptions about
future conditions to predict outcomes of events
 My space, Facebook and others mines the data of all of
its members to determine which ads should be displayed
for each member to attract the maximum attention and
hits.
 Police Departments uses predictive analysis to predict
“when and where crimes were likely to occur, so officers
can be on hand to prevent their occurrence
Business Intelligence
 Closely linked to the concept of data mining
 Involves gathering enough of the right information in
a timely manner and usable form and analyzing it so
that it can have a positive effect on business strategy,
tactics, or operations.
 Business intelligence turns data into useful
information that is then distributed throughout an
enterprise.
cont
 Competitive intelligence is one aspect of business
intelligence limited to information about competitors
and the ways that knowledge affects strategy, tactics,
and operations.
 Competitive intelligence is not spying. Information
should be collected by examining published
information sources, conducting interviews, and using
other legal, ethical methods
 Counterintelligence: The steps an organization takes
to protect information sought by “hostile” intelligence
gatherers. E.g trade secrets
Thanks!
Any Question?

More Related Content

What's hot

Lecture 08 distributed dbms
Lecture 08 distributed dbmsLecture 08 distributed dbms
Lecture 08 distributed dbmsemailharmeet
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrityPooja Dixit
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management systemPooja Dixit
 
Knowledge management and business intelligence
Knowledge management and business intelligenceKnowledge management and business intelligence
Knowledge management and business intelligenceAzmi Taufik
 
Database replication
Database replicationDatabase replication
Database replicationArslan111
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed databaseSonia Panesar
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbmsTech_MX
 
Data base management system
Data base management systemData base management system
Data base management systemNavneet Jingar
 
Basic Concept Of Database Management System (DBMS) [Presentation Slide]
Basic Concept Of Database Management System (DBMS) [Presentation Slide]Basic Concept Of Database Management System (DBMS) [Presentation Slide]
Basic Concept Of Database Management System (DBMS) [Presentation Slide]Atik Israk
 
Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to databaseemailharmeet
 
Query Decomposition and data localization
Query Decomposition and data localization Query Decomposition and data localization
Query Decomposition and data localization Hafiz faiz
 
Distributed Database System
Distributed Database SystemDistributed Database System
Distributed Database SystemSulemang
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data ManagementBhavendra Chavan
 
Business intelligence and data warehouses
Business intelligence and data warehousesBusiness intelligence and data warehouses
Business intelligence and data warehousesDhani Ahmad
 

What's hot (20)

Lecture 08 distributed dbms
Lecture 08 distributed dbmsLecture 08 distributed dbms
Lecture 08 distributed dbms
 
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS ArchitectureDistributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
Distributed database management system
Distributed database management  systemDistributed database management  system
Distributed database management system
 
Databases
DatabasesDatabases
Databases
 
Knowledge management and business intelligence
Knowledge management and business intelligenceKnowledge management and business intelligence
Knowledge management and business intelligence
 
Types of databases
Types of databases   Types of databases
Types of databases
 
Database replication
Database replicationDatabase replication
Database replication
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed database
 
Mobile dbms
Mobile dbmsMobile dbms
Mobile dbms
 
Data base management system
Data base management systemData base management system
Data base management system
 
Basic Concept Of Database Management System (DBMS) [Presentation Slide]
Basic Concept Of Database Management System (DBMS) [Presentation Slide]Basic Concept Of Database Management System (DBMS) [Presentation Slide]
Basic Concept Of Database Management System (DBMS) [Presentation Slide]
 
Lecture 01 introduction to database
Lecture 01 introduction to databaseLecture 01 introduction to database
Lecture 01 introduction to database
 
Query Decomposition and data localization
Query Decomposition and data localization Query Decomposition and data localization
Query Decomposition and data localization
 
Distributed Database System
Distributed Database SystemDistributed Database System
Distributed Database System
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data Management
 
Business intelligence and data warehouses
Business intelligence and data warehousesBusiness intelligence and data warehouses
Business intelligence and data warehouses
 
Advanced DBMS presentation
Advanced DBMS presentationAdvanced DBMS presentation
Advanced DBMS presentation
 

Viewers also liked

Database System Concepts and Architecture
Database System Concepts and ArchitectureDatabase System Concepts and Architecture
Database System Concepts and Architecturesontumax
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architectureKumar
 
1 introduction databases and database users
1 introduction databases and database users1 introduction databases and database users
1 introduction databases and database usersKumar
 
Graphics devices
Graphics devicesGraphics devices
Graphics devicesKumar
 
Microsoft vs google ppt for final
Microsoft vs google ppt for finalMicrosoft vs google ppt for final
Microsoft vs google ppt for finalRashedul Amin
 
Management information system database management
Management information system database managementManagement information system database management
Management information system database managementOnline
 
Database Management Systems - Management Information System
Database Management Systems - Management Information SystemDatabase Management Systems - Management Information System
Database Management Systems - Management Information SystemNijaz N
 
Role of Database Management in Information Systems
Role of Database Management in Information SystemsRole of Database Management in Information Systems
Role of Database Management in Information SystemswaQas ilYas
 
Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Studymanagement 2
 
Database Management Systems (DBMS)
Database Management Systems (DBMS)Database Management Systems (DBMS)
Database Management Systems (DBMS)Dimara Hakim
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentationsameerraaj
 

Viewers also liked (15)

ITE 101 - Week 6
ITE 101 -  Week 6ITE 101 -  Week 6
ITE 101 - Week 6
 
Database System Concepts and Architecture
Database System Concepts and ArchitectureDatabase System Concepts and Architecture
Database System Concepts and Architecture
 
ITE 101 - Week 7
ITE 101 - Week 7ITE 101 - Week 7
ITE 101 - Week 7
 
2 database system concepts and architecture
2 database system concepts and architecture2 database system concepts and architecture
2 database system concepts and architecture
 
Google vs microsoft
Google vs microsoftGoogle vs microsoft
Google vs microsoft
 
1 introduction databases and database users
1 introduction databases and database users1 introduction databases and database users
1 introduction databases and database users
 
Graphics devices
Graphics devicesGraphics devices
Graphics devices
 
Microsoft vs google ppt for final
Microsoft vs google ppt for finalMicrosoft vs google ppt for final
Microsoft vs google ppt for final
 
Management information system database management
Management information system database managementManagement information system database management
Management information system database management
 
Database Management Systems - Management Information System
Database Management Systems - Management Information SystemDatabase Management Systems - Management Information System
Database Management Systems - Management Information System
 
Role of Database Management in Information Systems
Role of Database Management in Information SystemsRole of Database Management in Information Systems
Role of Database Management in Information Systems
 
Chapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case StudyChapter 11 Mis Information Technology Case Study
Chapter 11 Mis Information Technology Case Study
 
Database Management Systems (DBMS)
Database Management Systems (DBMS)Database Management Systems (DBMS)
Database Management Systems (DBMS)
 
Basic DBMS ppt
Basic DBMS pptBasic DBMS ppt
Basic DBMS ppt
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentation
 

Similar to Mis chapter 7 database systems

Similar to Mis chapter 7 database systems (20)

Database System Concepts
Database System ConceptsDatabase System Concepts
Database System Concepts
 
Dbms
DbmsDbms
Dbms
 
Dbms mca-section a
Dbms mca-section aDbms mca-section a
Dbms mca-section a
 
Dbms models
Dbms modelsDbms models
Dbms models
 
Database management system
Database management systemDatabase management system
Database management system
 
Lecture#5
Lecture#5Lecture#5
Lecture#5
 
Database and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsDatabase and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health Informatics
 
database introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdfdatabase introductoin optimization1-app6891.pdf
database introductoin optimization1-app6891.pdf
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
 
Dbms unit01
Dbms unit01Dbms unit01
Dbms unit01
 
Database & dbms
Database & dbmsDatabase & dbms
Database & dbms
 
DBMS and its Models
DBMS and its ModelsDBMS and its Models
DBMS and its Models
 
Chapter 5 data processing
Chapter 5 data processingChapter 5 data processing
Chapter 5 data processing
 
Database-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptxDatabase-management-system-dbms-ppt.pptx
Database-management-system-dbms-ppt.pptx
 
Unit01 dbms
Unit01 dbmsUnit01 dbms
Unit01 dbms
 
Database Concepts
Database ConceptsDatabase Concepts
Database Concepts
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
27 fcs157al2
27 fcs157al227 fcs157al2
27 fcs157al2
 
jose rizal
jose rizaljose rizal
jose rizal
 

More from Filmon Habtemichael Tesfai (8)

Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Mis chapter 8
Mis chapter 8Mis chapter 8
Mis chapter 8
 
Mis chapter 3
Mis chapter 3Mis chapter 3
Mis chapter 3
 
Mis chapter 4 information systems, management, and decision making
Mis chapter 4 information systems, management, and decision makingMis chapter 4 information systems, management, and decision making
Mis chapter 4 information systems, management, and decision making
 
Mis chapter 2
Mis chapter 2Mis chapter 2
Mis chapter 2
 
Mis chapter 7b
Mis chapter 7bMis chapter 7b
Mis chapter 7b
 
Mis chapter 5
Mis  chapter 5Mis  chapter 5
Mis chapter 5
 
Mis chapter 6
Mis chapter 6Mis chapter 6
Mis chapter 6
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Mis chapter 7 database systems

  • 2. Introduction  We are navigating across the technological dimension of MIS  Previously we have seen Hardware and Software technologies in relation to MIS  Since you are studying Database courses in detail, this lecture will focus less in the technical details
  • 3. Introduction  The information systems we have been discussing in previous chapters are all databases  DSS  MIS  ESS  A well-designed and well-managed database is an extremely valuable tool in supporting decision making.
  • 5. The database Approach Traditional approach to data management  An approach whereby separate data files are created and stored for each application program. Database approach to data management  An approach whereby a pool of related data is shared by multiple application programs
  • 7. Problems with Traditional approach  The resulting problems are  Data redundancy and inconsistency,  Program-data dependence,  Inflexibility,  Poor data security, and  Inability to share data among applications.
  • 8. Problems with Traditional approach  Data redundancy is the presence of duplicate data in multiple data files so that the same data are stored in more than one place or location.  Occurs when different groups in an organization independently collect the same piece of data and store it independently of each other  wastes storage resources and also leads to data inconsistency
  • 9. Problems with Traditional approach  Data Inconsistency: The same attribute may have different values  E.g. Change in Student ID, Change in Date etc  E.g 2 Different coding system (like cloth retailers and others
  • 10. Problems with Traditional approach  Program-Data Dependence  Changes in programs require changes to the data.  One program might be modified from a five-digit to a nine-digit zip code. If the original data file were changed from five-digit to nine-digit zip codes, then other programs that required the five-digit zip code would no longer work properly  Lack of Flexibility  can deliver routine scheduled reports, but it cannot deliver ad hoc reports or respond to unanticipated information requirements in a timely fashion  Poor Security  Management may have no way of knowing who is accessing or even making changes to the organization’s data.  Lack of Data Sharing and Availability  Information cannot flow freely across different functional areas or different parts of the organization.
  • 11. The Database Approach to Data Management
  • 12. Database management system  A DBMS is software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs.  End user doesn’t need where and how the data are actually stored.  This is done by separating the logical and physical views of the data.  The logical view presents data as they would be perceived by end users or business specialists,  whereas the physical view shows how data are actually organized and structured on physical storage media.
  • 13.
  • 16. Data Modeling  Is one of the tools database designers use to show the logical relationships among data  A data model is a diagram of entities and their relationships.  Data modeling usually involves understanding a specific business problem and analyzing the data and information needed to deliver a solution.  Enterprise data modeling is data modeling done at the level of the entire enterprise.  E.g. Entity-relationship (ER) diagrams
  • 17. The Relational Database Model  The most popular type of DBMS today  There are other models too (flat files, hierarchical, and network models)  Data represented as two-dimensional tables  Examples of Relational models are  Oracle (current market leader)  IBM DB2 (second market leader)  Microsoft SQL Server (third market leader)  Sybase,  Microsoft Access, and  MySQL.
  • 18. Relational DB terms  Projecting  Manipulating data to eliminate columns in a table.  Joining  Manipulating data to combine two or more tables.  Linking  Data manipulation that combines two or more tables using common data attributes to form a new table with only the unique data attributes.
  • 19. Non relational databases  For over 30 years, relational database technology has been the gold standard  Relational DBMS and data warehouse products are not well- suited for organizing and analyzing big data or data that do not easily fit into columns and rows used in their data models.  Non-relational database management systems use a more flexible data model and are designed for managing large data sets across many distributed machines  Companies are turning to “NoSQL” non-relational database services for  Cloud computing,  unprecedented data volumes,  massive workloads for Web  Oracle NoSQL Database is an example
  • 20. Data Cleanup Name Phone Gender Dues paid Date paid Rahel K 07111213 Female 250 Nakfa 15 October Nahom H/mariam 07122332 Male 300 nalfa 15 October Nahom H/mariam 07603476 Male 300 nakfa 25 october • The process of looking for and fixing inconsistencies to ensure that data is accurate and complete. • Consider below the database of sport’s gym
  • 21. Finding the Anomalies  Nahom paid his dues twice in October, hence the data is redundant  Notice that the data in the database is also inconsistent: Nahom has changed his phone number, but only one of the records reflects this change • Reducing this database’s reliability is the lack of a primary key to uniquely identify Nahom H/mariam’s record. The first Nahom could Nahom Hailemariam , but the second might be Nahom Habtemariam • These problems and irregularities in data are called anomalies.
  • 22. Overview of database files- Flat File  Simple database program whose records have no relationship to one another.  do not use any of the database models  Many spreadsheet and word processing programs have flat file capabilities.  Microsoft OneNote is designed to let people put ideas, thoughts, and notes into a computer file.
  • 24. Single User  A database installed on a personal computer  E.g. Microsoft Office Access and FileMaker Pro  InfoPath has built-in forms that can be used to enter expense information, timesheet data, and a variety of other information.
  • 25. Multiple Users  Small, midsize, and large businesses need multiuser DBMSs to share information throughout the organization over a network.  These more powerful, expensive systems allow dozens or hundreds of people to access the same database system at the same time
  • 26. Providing a User View  DBMS is responsible for access to a database  One of the first steps in installing and using a large database involves telling the DBMS the logical and physical structure of the data and relationships among the data in the database for each user.  This description is called a schema (as in schematic diagram).
  • 27. cont  A schema can be part of the database or a separate schema file.  Schemas are entered into the DBMS via a data definition language (DDL) which is a collection of instructions and commands used to define and describe data and relationships in a specific database.
  • 28. cont  Another important step in creating a database is to establish a data dictionary, a detailed description of all data used in the database. The data dictionary contains the following data  Name of the data item  Aliases or other names that may be used to describe the item  Range of values that can be used  Type of data (such as alphanumeric or numeric)  Amount of storage needed for the item  Notation of the person responsible for updating it and the various users who can access it  List of reports that use the data item
  • 29. Storing and Retrieving Data  One function of a DBMS is to be an interface between an application program and the database.  When an application program needs data, it requests the data through the DBMS.  Two or more people or programs attempting to access the same record in the same database at the same time can cause a problem  Concurrency control can be used to avoid this potential problem.  One approach is to lock out all other application programs from access to a record if the record is being updated or used by another program.
  • 30. Manipulating Data and Generating Reports  Some databases use Query-by-Example (QBE), which is a visual approach to developing database queries or requests.
  • 31. cont  In other cases, database commands can be used in a programming language SELECT * FROM ICT_STUDENTS WHERE COURSE = “MIS”.  In general, the commands that are used to manipulate the database are part of the data manipulation language (DML). which allows managers and other database users to access, modify, and make queries about data contained in the database to generate reports
  • 32. Database Administration  A DBA is expected to have a clear understanding of the fundamental business of the organization,  Be proficient in the use of selected database management systems and  Stay abreast of emerging technologies and new design approaches.
  • 33. cont  The role of the DBA is to plan, design, create, operate, secure, monitor, and maintain databases.  Typically, a DBA has a degree in computer science or management information systems and some on-the- job training with a particular database product  The DBA also works with programmers as they build applications
  • 34. Popular Database Management Systems  The popular DB2 relational database from IBM and The Sybase IQ database are available on the Linux operating system.  A new form of database system is emerging that some refer to as Database as a Service (DaaS) and others as Database 2.0  Popular companies like Google and Microsft are moving in the DaaS direction.
  • 35. Special-Purpose Database Systems  Israeli Holocaust Database (www.yadvashem.org)  contains information on about three million people in 14 languages  iTunes  store music and video catalog is a special-purpose database system.  Morphbank (www.morphbank.net)  allows scientists from around the world to upload and share biological and microscopic photographs and descriptions that support research in many areas.
  • 36. Selecting a Database Management System  Database size: The number of records in the database  Database cost: The purchase or lease costs of the database  Concurrent users: The number of people who need to use the database at the same time (the number of concurrent users)  Performance: How fast the database is able to update records  Integration: The ability to be integrated with other applications and databases  Vendor: The reputation and financial stability of the database vendor
  • 37. Using Databases with Other Software  Front-end application is one that directly interacts with people or users.  Marketing researchers often use a database as a front end to a statistical analysis program.  Back-end application interacts with other programs or applications; it only indirectly interacts with people or users.
  • 38. Linking the Company Database to the Internet  Developing a seamless integration of traditional databases with the Internet is often called a semantic Web.  Good side: convenient for individual users, and increases effectiveness and efficiency for businesses and organizations. E,g eBay, amazon.com, Apple’s itunes  Bad side: half a million database servers were vulnerable to attack  Google is rolling out a DBMS that will provide patients and physicians with one storage location for all medical records, accessed through a Web browser  Google plans to encrypt the data and ask authentication  But can reduce the number of paper forms and clerical errors
  • 39. Linking the Company Database to the Internet Users access an organization’s internal database through the Web using their desktop PCs and Web browser software.
  • 40. Data Warehouses, Data Marts, and Data Mining  A data warehouse is a database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers  A data warehouse stores historical data that has been extracted from operational systems and external data sources  This data is “cleaned up” to remove inconsistencies and integrated to create a new information database that is more suitable for business analysis.
  • 41.
  • 42. Online Transaction Processing VS Data Warehousing
  • 43. THE CHALLENGE OF BIG DATA  Big data doesn’t refer to any specific quantity, but usually refers to data in the petabyte and exabyte range  A single jet engine is capable of generating 10 terabytes of data in just 30 minutes there are more than 25,000 airline flights each day.  Even though “tweets” are limited to 140 characters each, Twitter generates over 8 terabytes of data daily
  • 44. Data Marts  A subset of a data warehouse.  Used to small and medium-sized businesses and to departments within larger companies.  Instead of storing all enterprise data in one huge database, data marts contain a subset of the data for a single aspect of a company’s business
  • 45. Data Mining  Data mining is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.  The University of Maryland- “forecast terrorist behavior based on past actions”  Extensively in marketing to improve  customer retention;  Pricing analysis; and customer segmentation analysis  E-commerce presents another major opportunity for effective use of data mining.
  • 46. cont  Predictive analysis is a form of data mining that combines historical data with assumptions about future conditions to predict outcomes of events  My space, Facebook and others mines the data of all of its members to determine which ads should be displayed for each member to attract the maximum attention and hits.  Police Departments uses predictive analysis to predict “when and where crimes were likely to occur, so officers can be on hand to prevent their occurrence
  • 47. Business Intelligence  Closely linked to the concept of data mining  Involves gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive effect on business strategy, tactics, or operations.  Business intelligence turns data into useful information that is then distributed throughout an enterprise.
  • 48. cont  Competitive intelligence is one aspect of business intelligence limited to information about competitors and the ways that knowledge affects strategy, tactics, and operations.  Competitive intelligence is not spying. Information should be collected by examining published information sources, conducting interviews, and using other legal, ethical methods  Counterintelligence: The steps an organization takes to protect information sought by “hostile” intelligence gatherers. E.g trade secrets