SlideShare a Scribd company logo
1 of 33
/
DBMS Models
Some contemporary DBMS models include:
Relational DBMS: a type of logical database model that treats
data as if it were stored in two-dimensional tables. It can relate
data stored in one table to data
in another as long as the two tables share a common data
element.
Object-Oriented DBMS (OODBMS): a type of database that can
store graphics and other types of data to support multimedia
applications.
Object-Relational DBMS: a type of database that combines the
capabilities of a relational DBMS to store conventional
information and the capabilities of an
object-oriented DBMS.
After learning about the various DBMS models, let us
understand how to analyze this data for useful information.
/
Telecommunications Applications
The major telecommunications applications for e-business and
e-commerce are:
E-mail: reduces long-distance telephone charges and enables
different sections of an organization to communicate.
Voice mail: digitizes the sender’s spoken message and transmits
the message over a network. The message is then stored on a
disk for later use.
Groupware: provides additional e-mail support for enterprise-
wide communication and helps workgroups at different
locations in the organization.
Fax: transmits scanned documents with text and graphics over
telephone lines.
Teleconferencing: permits groups of people to talk
simultaneously over a telephone or via e-mail.
Videoconferencing: provides the teleconferencing facility with
an additional feature that allows people to see each other over
video screens.
Data conferencing: permits groups of people to work on the
same data simultaneously.
Digital information services: permits people to obtain
information from outside the organization instantly without
leaving their workstations.
Distance learning: delivers education to individuals at multiple
locations. Your participation in this course is an example of
distance learning.
Electronic Data Interchange (EDI): enables computer-to-
computer exchange of standard transaction documents such as
invoices, bills of lading, and purchase
orders between two organizations.
/
Managing Data Resources—Part 1
(media/SU_MIS3101_Dbase_hier.xls?
_&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=7390
7)
An IS manager should understand how to organize, access, and
use valuable data ef�ciently. Let us focus on how to manage
data resources.
In the top-down approach, a traditional data hierarchy starts
with a database. The database contains a number of interrelated
and unrelated �les. Let us consider
the example of a Sales Order Management database
(media/week3/SU_MIS3101_sale_mgmt_form.xls?
_&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=7390
7) . This database may contain several individual �les. Each
�le in the database contains a list of
records. Let us consider the Order Detail File. Each record can
be the name of each item. Each record consists of the same set
of �elds such as a Part Number of six
characters. A �eld is a grouping of characters into a word like a
person’s name, a group of words, or a complete number. A
character consists of a letter, number, or
symbol. Each character is created by a byte. The byte is usually
formed by a group of eight bits. The value of a bit can be either
0 or 1 and it is the smallest unit of data
a computer can handle. For example the letter J is created by the
byte 0100 1010.
Traditionally organizations grew independently within their own
areas, which are:
Sales & Marketing
Manufacturing
Accounting & Finance
Human Resources
Over the years, the �le environment process of a database led
to the separate departments or divisions in an organization
creating, maintaining, and operating
multiple master �les.
This traditional �le environment created problems such as data
redundancy and inconsistency, program data dependence,
in�exibility, poor security, and a lack of
data sharing and availability. A Database Management System
(DBMS) has the ability to address this problem.
https://myclasses.southuniversity.edu/content/enforced/73907-
17078457/media/SU_MIS3101_Dbase_hier.xls?_&d2lSessionVa
l=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907
https://myclasses.southuniversity.edu/content/enforced/73907-
17078457/media/week3/SU_MIS3101_sale_mgmt_form.xls?_&d
2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907
/
Broadband Networks
Broadband networks consist of high-speed transmission
technologies. The following broadband network services are
available:
Asynchronous Transfer Mode (ATM): Supports a transmission
rate of 1.5 megabits per second (Mbps) to more than 9 gigabits
per second (Gbps), parceling
data into �xed 53-byte cells for transmitting data, audio, and
video over the same network. ATM can transmit data from the
computers of different suppliers to
your desktop.
Digital Subscriber Line (DSL): Operates over existing copper
telephone lines to carry data, voice, and video but provides a
higher transmission capacity than
integrated services digital network (ISDN).
Asymmetric Digital Subscriber Line (ADSL): Provides
transmission speeds of 1.5 to 9 Mbps when receiving data and
up to 640 Kilobits per second (Kbps)
when sending data.
Frame relay: Relies on digital circuits that require less error
checking than packet switching. It is a shared network service
with a transmission rate of 56 Kbps
to more than 40 Mbps.
ISDN: Transmits data at the rate of 128 Kbps. ISDN is an
international standard for dial-up network access using existing
local telephone lines that integrate
data, image, video, and voice services.
Symmetric Digital Subscriber Line (SDSL): Provides a
transmission speed of 3 Mbps.
Cable modems: Operate over cable TV lines. Transmission
speed is up to 30 Mbps. These modems provide high-speed
access to corporate intranets and the
web.
T1 Line: Provides data transmission speeds of 1.544 Mbps. A
T1 line is a dedicated telephone connection that consists of 24
channels.
Let us now learn about several applications of the
telecommunication technology.
/
Response
No Submission
0 points
Emerging (F-D: 1-27)
27 points
Satisfactory (C: 28-31)
31 points
Proficient (B: 32-35)
35 points
Exemplary (A: 36-40)
40 points
Criterion
Score
Quality
of Initial
Posting
/ 40No initial posting
exists to evaluate.
The information provided is
inaccurate, not focused on
the assignment’s topic,
and/or does not answer the
question(s) fully. Response
demonstrates incomplete
understanding of the topic
and/or inadequate
preparation.
The information provided is accurate,
giving a basic understanding of the
topic(s) covered. A basic understanding
is when you are able to describe the
terms and concepts covered. Despite
this basic understanding, initial posting
may not include complete development
of all aspects of the assignment.
The information provided is accurate,
displaying a good understanding of the
topic(s) covered. A good understanding is
when you are able to explain the terms and
topics covered. Initial posting demonstrates
sincere reflection and addresses most
aspects of the assignment, although all
concepts may not be fully developed.
The information provided is
accurate, providing an in-depth,
well thought-out understanding
of the topic(s) covered. An in-
depth understanding provides an
analysis of the information,
synthesizing what is learned from
the course/assigned readings.
Participation
No Submission
0 points
Emerging (F-D: 1-
13)
13 points
Satisfactory (C: 14-16)
16 points
Proficient (B: 17-18)
18 points
Exemplary (A: 19-20)
20 points
Criterion
Score
Participation
in
Discussion
/ 20No responses to
other classmates
were posted in this
discussion forum.
May include one or
more of the
following:
*Comments to only
one other student's
post.
*Comments are not
substantive, such as
just one line or
saying, “Good job” or
“I agree.
*Comments are off
topic.
Comments to two or more
classmates’ initial posts but only
on one day of the week.
Comments are substantive,
meaning they reflect and expand
on what the other student wrote.
Comments to two or more
classmates’ initial posts on more
than one day. Comments are
substantive, meaning they
reflect and expand on what the
other student wrote.
Comments to two or more classmates’ initial posts and to
the instructor's comment (if applicable) on two or more
days. Responses demonstrate an analysis of peers’
comments, building on previous posts. Comments extend
and deepen meaningful conversation and may include a
follow-up question.
Writing
No Submission
0 points
Emerging (F-D: 1-
13)
13 points
Satisfaction (C: 14-16)
16 points
Proficient (B: 17-18)
18 points
Exemplary (A: 19-20)
20 points
Criterion
Score
Writing
Mechanics
(Spelling,
Grammar,
Citation
Style) and
Information
Literacy
/ 20No postings for
which to evaluate
language and
grammar exist.
Numerous issues in
any of the following:
grammar, mechanics,
spelling, use of slang,
and incomplete or
missing citations and
references. If
required for the
assignment, did not
use course, text,
and/or outside
readings (where
Some spelling, grammatical,
and/or structural errors are
present. Some errors in
formatting citations and
references are present. If
required for the assignment,
utilizes sources to support work
for initial post but not comments
to other students. Sources
include course/text readings but
outside sources (when relevant)
include non-
Minor errors in grammar, mechanics, or
spelling in the initial posting are present.
Minor errors in formatting citations and
references may exist. If required for the
assignment, utilizes sources to support work
for both the initial post and some of the
comments to other students. Sources include
course and text readings as well as outside
sources (when relevant) that are academic
and authoritative (e.g., journal articles, other
text books, .gov Web sites, professional
organization Web sites, cases, statutes, or
administrative rules).
Minor to no errors exist in grammar,
mechanics, or spelling in both the initial post
and comments to others. Formatting of
citations and references is correct. If required
for the assignment, utilizes sources to
support work for both the initial post and the
comments to other students. Sources include
course and text readings as well as outside
sources (when relevant) that are academic
and authoritative (e.g., journal articles, other
text books, .gov Web sites, professional
organization Web sites, cases, statutes, or
administrative rules).
/
Total / 80
Overall Score
Close
relevant) to support
work.
academic/authoritative, such as
Wikis and .com resources.
No Submission
0 points minimum
There was no submission
for this assignment.
Emerging (F to D Range)
1 point minimum
Satisfactory progress has not been met on the
competencies for this assignment.
Satisfactory (C Range)
56 points minimum
Satisfactory progress has been achieved on the
competencies for this assignment.
Proficient (B Range)
64 points minimum
Proficiency has been achieved on the
competencies for this assignment.
Exemplary (A Range)
72 points minimum
The competencies for this
assignment have been mastered.
/
Database Design with ER Diagrams
Designing a database requires both a conceptual and a physical
design. The conceptual or logical design models the database
from a business perspective. The
organization’s data model should re�ect its key business
processes and the decision-making requirements. Database
designers document the conceptual data
model with an entity-relationship (ER) diagram.
The boxes represent entities and the diamonds represent
relationships. The 1 or M on either side of the diamond can
either represent a one-to-many, one-to-one, or
many-to-many relationship between the corresponding entities.
The ER diagram shows that a customer can have more than one
order. An order can have more than
one item and an item can have more than one scheduled
delivery.
The process of creating small, stable, �exible, and adaptive
data structures from complex groups of data when designing a
relational database is called
normalization.
The two major types of distributed databases are:
Replicated databases: Can operate in an unconnected fashion.
The entire database is duplicated on batch basis when online.
Partitioned databases: Consist of parts that are physically stored
and maintained in one location and other parts that are stored
and maintained in other
locations. This design enables each remote CPU to store the
necessary data to serve the local area. Changes and transactions
from local �les are synchronized
with the central database on batch basis.
Let us now learn how to transmit this data to remote locations
of organizations, where users can use the data to extract
valuable information. The spread of
telecommunications and wireless networks has enabled data
transmission.
/
Hardware and Software for Digital Enterprise—Part 3
Computer hardware alone is not enough to run the IS function.
You also require appropriate computer software along with the
hardware. So let us focus now on
how software controls the operating system (OS) of a computer
and ful�ls the end user requirements in an organization.
Software
The two major types of software are:
Application software: Are programs written for a speci �c
business application and used by end users and application
programmers to run and develop
applications.
System software: Are programs that control the IS by
allocating, assigning, and scheduling system resources of a
computer. System software mediates
between application software and computer hardware and
coordinates the various parts of the computer system with the
OS. Several types of system
software are used for OSs such as:
Microsoft Windows— XP, Vista, Version 7, and Version 8
UNIX
IBM AIX
Linux
HPUX
Apple Macintosh
MS-DOS
Data Processing
IS can collect and process data in the following two ways:
Batch Processing: Accumulates and stores transactions in a
group until it is necessary to process them.
Online Processing: Enters transactions directly into the
computer system and processes them immediately.
In the client/server model of computing, the clients and the
servers connected to a network perform computer processing.
Network computers obtain most or all
their data and software from a central network server because
they have minimal or no local processing or storage capability.
Peer-to-peer computing puts
processing power back on users’ desktops linking individual
workstations and PCs through the Web or via private networks
to share disk storage space, data, and
processing power to accomplish a variety of tasks. Grid
computing is a form of peer-to-peer computing that divides
problems into smaller pieces that can run on
several computers that are organized into a computational grid.
When calculating expenses for buying a computer we consider
the total cost of ownership (TCO), which includes not only the
original cost of the computer system
but also the costs for upgrades, maintenance, training, and
technical support for hardware and software.
/
Telecommunications and Wireless Networks
Telecommunications
A corporate telecommunications system consists of:
Telephone system
Mobile Cellular communications
Video conferencing
Corporate Web site
LAN
WAN
Internet access
Enterprise networking
Telecommunications systems are developed under three
standards:
Transmission Control Protocol/Internet Protocol (TCP/IP):
Enables communication among diverse components on a
telecommunications network. TCP/IP
consists of a suite of protocols that has become the dominant
model for achieving connectivity within the Internet and
between computers and networks.
Protocols provide a common set of rules that enables this
communication.
Packet Switching: Makes ef�cient use of the network
communications capability by splitting messages into small
packets that travel independently along
different paths on a network and then reassemble at the
destination.
Client/Server Networks: Connect personal computers on a
network to multiple servers. Client/server networks distribute
most of the enterprise’s computing
power to the factory �oor and the desktop of every user.
Transmission Media
Principal transmission media for data transmission are:
Twisted copper telephone wire: This is the least expensive
medium and can transmit low volumes of data.
Coaxial copper cable: This is expensive to install but can
transmit high volumes of data.
Fiber-optic cable: This is also expensive to install but can
transmit high volumes of data.
Wireless transmission: This is of three types:
Microwave: cost effective for large volume transmission over
long distances
Satellite: cost effective for large volume transmission over long
distances
Low-frequency radio: cost effective for infrared waves
Let us now explore the various network designs used in
organizations to transmit data.
/
Network Designs
A manager can select from several network designs based on the
information requirements of the organization and transmission
distances. The designs are:
LANs: Can connect a cluster of digital workstations and PCs
within a 2,000-foot radius. A LAN is utilized for most corporate
computing tasks. LANS might use
the client/server or peer-to-peer architecture. LANs can be
connected using the bus, ring, or star topology. Transmission
media can be either wired or low-cost,
high-speed wireless 802.11. Wi-Fi standards can also provide
access to the Internet.
WANs: Are private networks that span broad geographic
distances, ranging from several miles to continents.
Metropolitan Area Networks (MANs): Span an urban area.
Value-Added Networks (VANs): Market WAN services to
companies that do not want to construct or maintain private
networks.
/
Hardware and Software for Digital Enterprise—Part 2
Storage
The primary storage consists of different types of
semiconductor memory chips:
Random Access Memory (RAM): Used for short-term storage of
data during the execution of program instructions.
Read-Only Memory (ROM): Used for permanent storage of
important program instructions like how to form various letters,
numbers, and symbols with fonts.
The main secondary storage technologies are:
Magnetic Disk: Data is stored by means of magnetized spots on
a hard or �oppy disk.
Optical Disk: Stores massive quantities of data in a highly
compact form.
Magnetic Tape: Large volumes of information are stored
sequentially by means of magnetized and non-magnetized spots
on a tape.
Communication Devices
Multimedia integrates two or more of the following types of
media transforming these into a computer-based application:
Text
Graphics
Sound
Voice
Full-motion video
Still video
Animation
Classification of Computer Hardware
Computer hardware is classi�ed as:
Mainframes: These are the largest computers used in very large
business organization, research, and military applications.
Midrange computers: These are minicomputers used in
factories, colleges, and research labs to act as servers that
provide software, printers, and the Internet
access to computers on its network.
Workstations: These are desktop computers with powerful
graphic and mathematical capabilities.
Supercomputers: These are sophisticated and powerful
computers that can perform complex and massive computations
rapidly.
PCs: These are laptop or desktop computers.
After discussing computer hardware let us explore the other
aspect of IS infrastructure—computer software
/
/
Multidimensional Data Analysis
Multidimensional Data Analysis
Online analytical processing (OLAP), also called
multidimensional data analysis, can represent relationships
among data as a multidimensional structure. This
structure can be visualized as cubes of data. Smaller cubes exist
within these cubes of data, allowing sophisticated data analysis.
We can ef�ciently analyze data
across the enterprise using a data warehouse on a platform that
extracts current and historical data from several operational
systems. The management of an
organization uses this consolidated data for decision making. In
addition, organizations can build smaller, decentralized
warehouses called data marts. A data mart
contains only a subset of the population of users.
Data mining analyzes large pools of data, including the contents
of data warehouses or data marts, to �nd patterns and rules that
can predict consumer behavior
and guide decision making. Hypermedia databases allow data to
be stored in nodes linked together in any user-speci�ed pattern.
The nodes can contain text,
graphics, voice, full-motion video, or executable programs.
An internal database can be Web-enabled to facilitate users to
access the database from any location. In a client/server
environment, the DBMS receives SQL
requests and provides the requested information directly to the
CPU of the user at the client end. For Web access the
middleware on the application server
transfers data from the organization’s internal database to the
web server. This server then delivers the information in the
form of a web page to the web user.
The software for handling databases could be a custom program
or a series of software scripts. Common gateway interface (CGI)
is a speci�cation for transferring
information between a Web server and a program designed to
accept and return data. The program could be written in any
programming language including
C++.NET, C#.NET, C, Java, Perl, or Visual Basic.NET.
After analyzing the data, let us discuss designing a database that
will meet the speci�c requirements of the organization.
/
Managing Data Resources—Part 2
DBMS
Con�guring the database technology for complex and rigorous
usage solves many traditional �le environment problems. A
DBMS is special software for creating
and maintaining a database and enabling individual business
applications to extract needed data without creating separate
�les or data de�nitions in computer
programs.
A DBMS includes:
Data De�nition Language: De�nes each data element as it
appears in the database.
Data Manipulation Language: Manipulates the data in the
database. End users and programmers use this language to
extract data from the database
according to their requests and applications.
Data Dictionary: Stores and organizes information about the
data maintained in a database.
Structured Query Language (SQL) is a popular data
manipulation language that gives users and application
programs an interactive query language to access the
data in databases.
The most important feature of a DBMS is its ability to separate
the logical and physical views of data. A programmer works
with the logical view of the data and need
not be concerned with the data’s physical location. A logical
description of the entire database, showing all the data elements
and their inter-relationships is called a
conceptual schema
(media/week3/SU_MIS3101_concept_schema.xls?_&d2lSession
Val=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907). A data
element
represents a �eld.
After understanding the concept of DBMS, let us explore the
various DBMS models used in digital enterprises.
https://myclasses.southuni versity.edu/content/enforced/73907-
17078457/media/week3/SU_MIS3101_concept_schema.xls?_&d
2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907
/
Hardware and Software for Digital Enterprise—Part 4
So far we have covered the basic concepts of computer
hardware and software. Software and hardware both depend on
program instructions. These programs are
written in several programming languages that are targeted to
meet certain organizational operations.
Programming Languages
The principal high-level programming languages used for
business include C++.NET, C#.NET, C, Visual Basic.NET, and
COBOL.
Fourth-generation languages contain different software tools to
enable users to develop software applications. These languages
are less procedural than
conventional programming languages and include popular
software tools such as:
Spreadsheets
Data Management
Presentation Graphics
Word Processing
Groupware
Web Browsers
E-mail
Enterprise software, which includes middleware and enterprise
application integration (EAI), are software tools to promote
enterprise-wide integration of IS
applications and business processes.
Object-Oriented Programming
Object-oriented programming tools include:
Java: an object-oriented programming language that can run on
any computer and operating system.
HTML: a page description language to create web pages.
XML: a language that describes the meaning of the data in a
web document so that the data can be used in computer
programs.
Object-oriented programming tools create structured documents
in which data and procedures are combined into one object. In
order to simplify the operations
the program just sends a message for an object to perform an
operation. The same message can be sent to different objects but
each time the operation may be
different. Object-oriented programming tools also exchange
data between Web sites and different legacy systems within a
company and between the systems of
different partners in a supply chain.
Now that we’ve learned about the basic concepts of comput er
hardware and software, let us now move on to learning how to
manage data resources using
hardware and software.
/
Hardware and Software for Digital Enterprise—Part 1
Let us discuss the basics of the computer hardware used for
digital enterprises.
Hardware
Contemporary computer systems require six major components
in four general categories:
Central Processing Unit (CPU): Manipulates symbols, letters,
and numbers and controls the other devices in the computer
systems.
Peripherals: Consists of input and output devices.
Primary and secondary storage: Stores data and program
instructions temporarily before and after processing.
Communication devices: Enables the use of multimedia, which
in turn combines two or more types of media into a computer-
based application.
Let us now explore each component in detail:
CPU
The two components of the CPU are:
Arithmetic-Logic Unit (ALU): Performs the computer’s
principal logic and arithmetic operations.
Control Unit: Controls and coordinates the other parts of the
computer system such as input and output devices and storage.
Peripherals
The principal input devices are:
Keyboards
Pointing devices
Touch screens
Magnetic Ink and Optical Character Recognition (MICR), which
are devices for check and bar code processing
Pen-based instruments
Digital scanners
Sensors
Audio input devices such as microphones and tape players
Radio Frequency Identi�cation Devices (RFID)
The principal output devices are:
Cathode Ray Tube (CRT) terminals
Light Emitting Diode (LED) terminals
Printers
Audio output devices such as speakers and headphones
/
DBMS ModelsSome contemporary DBMS models include

More Related Content

Similar to DBMS ModelsSome contemporary DBMS models include

What is the difference between Data and Information give an exa
What is the difference between Data and Information give an exaWhat is the difference between Data and Information give an exa
What is the difference between Data and Information give an exa
victorring
 
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxWeek 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
jessiehampson
 
What is and how does Cloud computing workA.Statement Clou.docx
 What is and how does Cloud computing workA.Statement Clou.docx What is and how does Cloud computing workA.Statement Clou.docx
What is and how does Cloud computing workA.Statement Clou.docx
MARRY7
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
smumbahelp
 
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.
`Shweta Bhavsar
 
Syllabus mca 2 rdbms i
Syllabus mca 2 rdbms iSyllabus mca 2 rdbms i
Syllabus mca 2 rdbms i
emailharmeet
 
HRMN300INSTRUCTIONS· Respond to all four questions below on.docx
HRMN300INSTRUCTIONS· Respond to all four questions below on.docxHRMN300INSTRUCTIONS· Respond to all four questions below on.docx
HRMN300INSTRUCTIONS· Respond to all four questions below on.docx
pooleavelina
 

Similar to DBMS ModelsSome contemporary DBMS models include (20)

Database Management System, Lecture-1
Database Management System, Lecture-1Database Management System, Lecture-1
Database Management System, Lecture-1
 
Database Concepts
Database ConceptsDatabase Concepts
Database Concepts
 
LectDBS_1.pdf
LectDBS_1.pdfLectDBS_1.pdf
LectDBS_1.pdf
 
Advantages And Uses Of SQL
Advantages And Uses Of SQLAdvantages And Uses Of SQL
Advantages And Uses Of SQL
 
ITB - UNIT 3.pdf
ITB - UNIT 3.pdfITB - UNIT 3.pdf
ITB - UNIT 3.pdf
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
 
Lecture 1 to 3intro to normalization in database
Lecture 1 to 3intro to  normalization in databaseLecture 1 to 3intro to  normalization in database
Lecture 1 to 3intro to normalization in database
 
What is the difference between Data and Information give an exa
What is the difference between Data and Information give an exaWhat is the difference between Data and Information give an exa
What is the difference between Data and Information give an exa
 
Unit01 dbms
Unit01 dbmsUnit01 dbms
Unit01 dbms
 
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docxWeek 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
Week 4 Lecture 1 - Databases and Data WarehousesManagement of .docx
 
What is and how does Cloud computing workA.Statement Clou.docx
 What is and how does Cloud computing workA.Statement Clou.docx What is and how does Cloud computing workA.Statement Clou.docx
What is and how does Cloud computing workA.Statement Clou.docx
 
M.sc. engg (ict) admission guide database management system 4
M.sc. engg (ict) admission guide   database management system 4M.sc. engg (ict) admission guide   database management system 4
M.sc. engg (ict) admission guide database management system 4
 
A relational model of data for large shared data banks
A relational model of data for large shared data banksA relational model of data for large shared data banks
A relational model of data for large shared data banks
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
Mi0034 database management systems
Mi0034  database management systemsMi0034  database management systems
Mi0034 database management systems
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management system
 
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND  CONSTRAINTS OF THE SAME.
WHAT IS A DBMS? EXPLAIN DIFFERENT MYSQL COMMANDS AND CONSTRAINTS OF THE SAME.
 
Syllabus mca 2 rdbms i
Syllabus mca 2 rdbms iSyllabus mca 2 rdbms i
Syllabus mca 2 rdbms i
 
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
Data Models [DATABASE SYSTEMS: Design, Implementation, and Management]
 
HRMN300INSTRUCTIONS· Respond to all four questions below on.docx
HRMN300INSTRUCTIONS· Respond to all four questions below on.docxHRMN300INSTRUCTIONS· Respond to all four questions below on.docx
HRMN300INSTRUCTIONS· Respond to all four questions below on.docx
 

More from LinaCovington707

Essay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docxEssay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docx
LinaCovington707
 
Envisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docxEnvisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docx
LinaCovington707
 
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docxENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
LinaCovington707
 
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docxEnglish 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
LinaCovington707
 
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docxENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
LinaCovington707
 

More from LinaCovington707 (20)

ESSAY #4In contrast to thinking of poor people as deserving of bei.docx
ESSAY #4In contrast to thinking of poor people as deserving of bei.docxESSAY #4In contrast to thinking of poor people as deserving of bei.docx
ESSAY #4In contrast to thinking of poor people as deserving of bei.docx
 
Essay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docxEssay # 3 Instructions Representations of War and Genocide .docx
Essay # 3 Instructions Representations of War and Genocide .docx
 
Essay 1 What is the role of the millennial servant leader on Capito.docx
Essay 1 What is the role of the millennial servant leader on Capito.docxEssay 1 What is the role of the millennial servant leader on Capito.docx
Essay 1 What is the role of the millennial servant leader on Capito.docx
 
ESSAY #6Over the course of the quarter, you have learned to apply .docx
ESSAY #6Over the course of the quarter, you have learned to apply .docxESSAY #6Over the course of the quarter, you have learned to apply .docx
ESSAY #6Over the course of the quarter, you have learned to apply .docx
 
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docxErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
ErrorsKeyboarding ErrorsCapitlalization ErrorsAbbreviation err.docx
 
Epidemiological ApplicationsDescribe how the concept of multifacto.docx
Epidemiological ApplicationsDescribe how the concept of multifacto.docxEpidemiological ApplicationsDescribe how the concept of multifacto.docx
Epidemiological ApplicationsDescribe how the concept of multifacto.docx
 
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docxEpidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
Epidemic, Endemic, and Pandemic Occurrence of Disease(s)One aspect.docx
 
ENVIRONMENTShould the US support initiatives that restrict carbo.docx
ENVIRONMENTShould the US support initiatives that restrict carbo.docxENVIRONMENTShould the US support initiatives that restrict carbo.docx
ENVIRONMENTShould the US support initiatives that restrict carbo.docx
 
ePortfolio CompletionResourcesDiscussion Participation Scoring.docx
ePortfolio CompletionResourcesDiscussion Participation Scoring.docxePortfolio CompletionResourcesDiscussion Participation Scoring.docx
ePortfolio CompletionResourcesDiscussion Participation Scoring.docx
 
eproduction and Animal BehaviorReproduction Explain why asexually.docx
eproduction and Animal BehaviorReproduction Explain why asexually.docxeproduction and Animal BehaviorReproduction Explain why asexually.docx
eproduction and Animal BehaviorReproduction Explain why asexually.docx
 
Envisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docxEnvisioning LeadershipIdentifying a challenge that evokes your pas.docx
Envisioning LeadershipIdentifying a challenge that evokes your pas.docx
 
EnvironmentOur environment is really important. We need to under.docx
EnvironmentOur environment is really important. We need to under.docxEnvironmentOur environment is really important. We need to under.docx
EnvironmentOur environment is really important. We need to under.docx
 
Environmental Awareness and Organizational Sustainability  Please .docx
Environmental Awareness and Organizational Sustainability  Please .docxEnvironmental Awareness and Organizational Sustainability  Please .docx
Environmental Awareness and Organizational Sustainability  Please .docx
 
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docxEnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
EnterobacteriaceaeThe family Enterobacteriaceae contains some or.docx
 
Ensuring your local region is prepared for any emergency is a comp.docx
Ensuring your local region is prepared for any emergency is a comp.docxEnsuring your local region is prepared for any emergency is a comp.docx
Ensuring your local region is prepared for any emergency is a comp.docx
 
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docxENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
ENG 2480 Major Assignment #3Essay #2 CharacterAnaly.docx
 
English EssayMLA format500 words or moreThis is Caue types of .docx
English EssayMLA format500 words or moreThis is Caue types of .docxEnglish EssayMLA format500 words or moreThis is Caue types of .docx
English EssayMLA format500 words or moreThis is Caue types of .docx
 
Eng 2480 British Literature after 1790NameApplying Wilde .docx
Eng 2480 British Literature after 1790NameApplying Wilde .docxEng 2480 British Literature after 1790NameApplying Wilde .docx
Eng 2480 British Literature after 1790NameApplying Wilde .docx
 
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docxEnglish 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
English 1C Critical Thinking Essay (6 - 6 12 pages, MLA 12pt font .docx
 
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docxENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
ENGL 227World FictionEssay #2Write a 2-3 page essay (with work.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

DBMS ModelsSome contemporary DBMS models include

  • 1. / DBMS Models Some contemporary DBMS models include: Relational DBMS: a type of logical database model that treats data as if it were stored in two-dimensional tables. It can relate data stored in one table to data in another as long as the two tables share a common data element. Object-Oriented DBMS (OODBMS): a type of database that can store graphics and other types of data to support multimedia applications. Object-Relational DBMS: a type of database that combines the capabilities of a relational DBMS to store conventional information and the capabilities of an object-oriented DBMS. After learning about the various DBMS models, let us understand how to analyze this data for useful information. / Telecommunications Applications
  • 2. The major telecommunications applications for e-business and e-commerce are: E-mail: reduces long-distance telephone charges and enables different sections of an organization to communicate. Voice mail: digitizes the sender’s spoken message and transmits the message over a network. The message is then stored on a disk for later use. Groupware: provides additional e-mail support for enterprise- wide communication and helps workgroups at different locations in the organization. Fax: transmits scanned documents with text and graphics over telephone lines. Teleconferencing: permits groups of people to talk simultaneously over a telephone or via e-mail. Videoconferencing: provides the teleconferencing facility with an additional feature that allows people to see each other over video screens. Data conferencing: permits groups of people to work on the same data simultaneously. Digital information services: permits people to obtain information from outside the organization instantly without leaving their workstations. Distance learning: delivers education to individuals at multiple locations. Your participation in this course is an example of distance learning.
  • 3. Electronic Data Interchange (EDI): enables computer-to- computer exchange of standard transaction documents such as invoices, bills of lading, and purchase orders between two organizations. / Managing Data Resources—Part 1 (media/SU_MIS3101_Dbase_hier.xls? _&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=7390 7) An IS manager should understand how to organize, access, and use valuable data ef�ciently. Let us focus on how to manage data resources. In the top-down approach, a traditional data hierarchy starts with a database. The database contains a number of interrelated and unrelated �les. Let us consider the example of a Sales Order Management database (media/week3/SU_MIS3101_sale_mgmt_form.xls? _&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=7390 7) . This database may contain several individual �les. Each �le in the database contains a list of records. Let us consider the Order Detail File. Each record can be the name of each item. Each record consists of the same set of �elds such as a Part Number of six characters. A �eld is a grouping of characters into a word like a person’s name, a group of words, or a complete number. A character consists of a letter, number, or symbol. Each character is created by a byte. The byte is usually formed by a group of eight bits. The value of a bit can be either
  • 4. 0 or 1 and it is the smallest unit of data a computer can handle. For example the letter J is created by the byte 0100 1010. Traditionally organizations grew independently within their own areas, which are: Sales & Marketing Manufacturing Accounting & Finance Human Resources Over the years, the �le environment process of a database led to the separate departments or divisions in an organization creating, maintaining, and operating multiple master �les. This traditional �le environment created problems such as data redundancy and inconsistency, program data dependence, in�exibility, poor security, and a lack of data sharing and availability. A Database Management System (DBMS) has the ability to address this problem. https://myclasses.southuniversity.edu/content/enforced/73907- 17078457/media/SU_MIS3101_Dbase_hier.xls?_&d2lSessionVa l=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907 https://myclasses.southuniversity.edu/content/enforced/73907- 17078457/media/week3/SU_MIS3101_sale_mgmt_form.xls?_&d 2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907
  • 5. / Broadband Networks Broadband networks consist of high-speed transmission technologies. The following broadband network services are available: Asynchronous Transfer Mode (ATM): Supports a transmission rate of 1.5 megabits per second (Mbps) to more than 9 gigabits per second (Gbps), parceling data into �xed 53-byte cells for transmitting data, audio, and video over the same network. ATM can transmit data from the computers of different suppliers to your desktop. Digital Subscriber Line (DSL): Operates over existing copper telephone lines to carry data, voice, and video but provides a higher transmission capacity than integrated services digital network (ISDN). Asymmetric Digital Subscriber Line (ADSL): Provides transmission speeds of 1.5 to 9 Mbps when receiving data and up to 640 Kilobits per second (Kbps) when sending data. Frame relay: Relies on digital circuits that require less error checking than packet switching. It is a shared network service with a transmission rate of 56 Kbps to more than 40 Mbps. ISDN: Transmits data at the rate of 128 Kbps. ISDN is an international standard for dial-up network access using existing local telephone lines that integrate data, image, video, and voice services.
  • 6. Symmetric Digital Subscriber Line (SDSL): Provides a transmission speed of 3 Mbps. Cable modems: Operate over cable TV lines. Transmission speed is up to 30 Mbps. These modems provide high-speed access to corporate intranets and the web. T1 Line: Provides data transmission speeds of 1.544 Mbps. A T1 line is a dedicated telephone connection that consists of 24 channels. Let us now learn about several applications of the telecommunication technology. / Response No Submission 0 points Emerging (F-D: 1-27) 27 points Satisfactory (C: 28-31) 31 points Proficient (B: 32-35) 35 points Exemplary (A: 36-40) 40 points
  • 7. Criterion Score Quality of Initial Posting / 40No initial posting exists to evaluate. The information provided is inaccurate, not focused on the assignment’s topic, and/or does not answer the question(s) fully. Response demonstrates incomplete understanding of the topic and/or inadequate preparation. The information provided is accurate, giving a basic understanding of the topic(s) covered. A basic understanding
  • 8. is when you are able to describe the terms and concepts covered. Despite this basic understanding, initial posting may not include complete development of all aspects of the assignment. The information provided is accurate, displaying a good understanding of the topic(s) covered. A good understanding is when you are able to explain the terms and topics covered. Initial posting demonstrates sincere reflection and addresses most aspects of the assignment, although all concepts may not be fully developed. The information provided is accurate, providing an in-depth, well thought-out understanding of the topic(s) covered. An in- depth understanding provides an
  • 9. analysis of the information, synthesizing what is learned from the course/assigned readings. Participation No Submission 0 points Emerging (F-D: 1- 13) 13 points Satisfactory (C: 14-16) 16 points Proficient (B: 17-18) 18 points Exemplary (A: 19-20) 20 points Criterion Score Participation in Discussion / 20No responses to other classmates
  • 10. were posted in this discussion forum. May include one or more of the following: *Comments to only one other student's post. *Comments are not substantive, such as just one line or saying, “Good job” or “I agree. *Comments are off topic. Comments to two or more classmates’ initial posts but only on one day of the week.
  • 11. Comments are substantive, meaning they reflect and expand on what the other student wrote. Comments to two or more classmates’ initial posts on more than one day. Comments are substantive, meaning they reflect and expand on what the other student wrote. Comments to two or more classmates’ initial posts and to the instructor's comment (if applicable) on two or more days. Responses demonstrate an analysis of peers’ comments, building on previous posts. Comments extend and deepen meaningful conversation and may include a follow-up question. Writing No Submission 0 points Emerging (F-D: 1- 13)
  • 12. 13 points Satisfaction (C: 14-16) 16 points Proficient (B: 17-18) 18 points Exemplary (A: 19-20) 20 points Criterion Score Writing Mechanics (Spelling, Grammar, Citation Style) and Information Literacy / 20No postings for which to evaluate language and grammar exist.
  • 13. Numerous issues in any of the following: grammar, mechanics, spelling, use of slang, and incomplete or missing citations and references. If required for the assignment, did not use course, text, and/or outside readings (where Some spelling, grammatical, and/or structural errors are present. Some errors in formatting citations and references are present. If required for the assignment,
  • 14. utilizes sources to support work for initial post but not comments to other students. Sources include course/text readings but outside sources (when relevant) include non- Minor errors in grammar, mechanics, or spelling in the initial posting are present. Minor errors in formatting citations and references may exist. If required for the assignment, utilizes sources to support work for both the initial post and some of the comments to other students. Sources include course and text readings as well as outside sources (when relevant) that are academic and authoritative (e.g., journal articles, other text books, .gov Web sites, professional organization Web sites, cases, statutes, or
  • 15. administrative rules). Minor to no errors exist in grammar, mechanics, or spelling in both the initial post and comments to others. Formatting of citations and references is correct. If required for the assignment, utilizes sources to support work for both the initial post and the comments to other students. Sources include course and text readings as well as outside sources (when relevant) that are academic and authoritative (e.g., journal articles, other text books, .gov Web sites, professional organization Web sites, cases, statutes, or administrative rules). / Total / 80 Overall Score
  • 16. Close relevant) to support work. academic/authoritative, such as Wikis and .com resources. No Submission 0 points minimum There was no submission for this assignment. Emerging (F to D Range) 1 point minimum Satisfactory progress has not been met on the competencies for this assignment. Satisfactory (C Range) 56 points minimum Satisfactory progress has been achieved on the competencies for this assignment. Proficient (B Range) 64 points minimum Proficiency has been achieved on the
  • 17. competencies for this assignment. Exemplary (A Range) 72 points minimum The competencies for this assignment have been mastered. / Database Design with ER Diagrams Designing a database requires both a conceptual and a physical design. The conceptual or logical design models the database from a business perspective. The organization’s data model should re�ect its key business processes and the decision-making requirements. Database designers document the conceptual data model with an entity-relationship (ER) diagram. The boxes represent entities and the diamonds represent relationships. The 1 or M on either side of the diamond can either represent a one-to-many, one-to-one, or many-to-many relationship between the corresponding entities. The ER diagram shows that a customer can have more than one order. An order can have more than one item and an item can have more than one scheduled delivery. The process of creating small, stable, �exible, and adaptive data structures from complex groups of data when designing a
  • 18. relational database is called normalization. The two major types of distributed databases are: Replicated databases: Can operate in an unconnected fashion. The entire database is duplicated on batch basis when online. Partitioned databases: Consist of parts that are physically stored and maintained in one location and other parts that are stored and maintained in other locations. This design enables each remote CPU to store the necessary data to serve the local area. Changes and transactions from local �les are synchronized with the central database on batch basis. Let us now learn how to transmit this data to remote locations of organizations, where users can use the data to extract valuable information. The spread of telecommunications and wireless networks has enabled data transmission. / Hardware and Software for Digital Enterprise—Part 3 Computer hardware alone is not enough to run the IS function. You also require appropriate computer software along with the hardware. So let us focus now on how software controls the operating system (OS) of a computer and ful�ls the end user requirements in an organization. Software
  • 19. The two major types of software are: Application software: Are programs written for a speci �c business application and used by end users and application programmers to run and develop applications. System software: Are programs that control the IS by allocating, assigning, and scheduling system resources of a computer. System software mediates between application software and computer hardware and coordinates the various parts of the computer system with the OS. Several types of system software are used for OSs such as: Microsoft Windows— XP, Vista, Version 7, and Version 8 UNIX IBM AIX Linux HPUX Apple Macintosh MS-DOS Data Processing IS can collect and process data in the following two ways: Batch Processing: Accumulates and stores transactions in a group until it is necessary to process them.
  • 20. Online Processing: Enters transactions directly into the computer system and processes them immediately. In the client/server model of computing, the clients and the servers connected to a network perform computer processing. Network computers obtain most or all their data and software from a central network server because they have minimal or no local processing or storage capability. Peer-to-peer computing puts processing power back on users’ desktops linking individual workstations and PCs through the Web or via private networks to share disk storage space, data, and processing power to accomplish a variety of tasks. Grid computing is a form of peer-to-peer computing that divides problems into smaller pieces that can run on several computers that are organized into a computational grid. When calculating expenses for buying a computer we consider the total cost of ownership (TCO), which includes not only the original cost of the computer system but also the costs for upgrades, maintenance, training, and technical support for hardware and software. / Telecommunications and Wireless Networks Telecommunications A corporate telecommunications system consists of: Telephone system
  • 21. Mobile Cellular communications Video conferencing Corporate Web site LAN WAN Internet access Enterprise networking Telecommunications systems are developed under three standards: Transmission Control Protocol/Internet Protocol (TCP/IP): Enables communication among diverse components on a telecommunications network. TCP/IP consists of a suite of protocols that has become the dominant model for achieving connectivity within the Internet and between computers and networks. Protocols provide a common set of rules that enables this communication. Packet Switching: Makes ef�cient use of the network communications capability by splitting messages into small packets that travel independently along different paths on a network and then reassemble at the destination. Client/Server Networks: Connect personal computers on a network to multiple servers. Client/server networks distribute most of the enterprise’s computing
  • 22. power to the factory �oor and the desktop of every user. Transmission Media Principal transmission media for data transmission are: Twisted copper telephone wire: This is the least expensive medium and can transmit low volumes of data. Coaxial copper cable: This is expensive to install but can transmit high volumes of data. Fiber-optic cable: This is also expensive to install but can transmit high volumes of data. Wireless transmission: This is of three types: Microwave: cost effective for large volume transmission over long distances Satellite: cost effective for large volume transmission over long distances Low-frequency radio: cost effective for infrared waves Let us now explore the various network designs used in organizations to transmit data. / Network Designs A manager can select from several network designs based on the
  • 23. information requirements of the organization and transmission distances. The designs are: LANs: Can connect a cluster of digital workstations and PCs within a 2,000-foot radius. A LAN is utilized for most corporate computing tasks. LANS might use the client/server or peer-to-peer architecture. LANs can be connected using the bus, ring, or star topology. Transmission media can be either wired or low-cost, high-speed wireless 802.11. Wi-Fi standards can also provide access to the Internet. WANs: Are private networks that span broad geographic distances, ranging from several miles to continents. Metropolitan Area Networks (MANs): Span an urban area. Value-Added Networks (VANs): Market WAN services to companies that do not want to construct or maintain private networks. / Hardware and Software for Digital Enterprise—Part 2 Storage The primary storage consists of different types of semiconductor memory chips: Random Access Memory (RAM): Used for short-term storage of data during the execution of program instructions.
  • 24. Read-Only Memory (ROM): Used for permanent storage of important program instructions like how to form various letters, numbers, and symbols with fonts. The main secondary storage technologies are: Magnetic Disk: Data is stored by means of magnetized spots on a hard or �oppy disk. Optical Disk: Stores massive quantities of data in a highly compact form. Magnetic Tape: Large volumes of information are stored sequentially by means of magnetized and non-magnetized spots on a tape. Communication Devices Multimedia integrates two or more of the following types of media transforming these into a computer-based application: Text Graphics Sound Voice Full-motion video Still video Animation Classification of Computer Hardware
  • 25. Computer hardware is classi�ed as: Mainframes: These are the largest computers used in very large business organization, research, and military applications. Midrange computers: These are minicomputers used in factories, colleges, and research labs to act as servers that provide software, printers, and the Internet access to computers on its network. Workstations: These are desktop computers with powerful graphic and mathematical capabilities. Supercomputers: These are sophisticated and powerful computers that can perform complex and massive computations rapidly. PCs: These are laptop or desktop computers. After discussing computer hardware let us explore the other aspect of IS infrastructure—computer software / / Multidimensional Data Analysis Multidimensional Data Analysis
  • 26. Online analytical processing (OLAP), also called multidimensional data analysis, can represent relationships among data as a multidimensional structure. This structure can be visualized as cubes of data. Smaller cubes exist within these cubes of data, allowing sophisticated data analysis. We can ef�ciently analyze data across the enterprise using a data warehouse on a platform that extracts current and historical data from several operational systems. The management of an organization uses this consolidated data for decision making. In addition, organizations can build smaller, decentralized warehouses called data marts. A data mart contains only a subset of the population of users. Data mining analyzes large pools of data, including the contents of data warehouses or data marts, to �nd patterns and rules that can predict consumer behavior and guide decision making. Hypermedia databases allow data to be stored in nodes linked together in any user-speci�ed pattern. The nodes can contain text, graphics, voice, full-motion video, or executable programs. An internal database can be Web-enabled to facilitate users to access the database from any location. In a client/server environment, the DBMS receives SQL requests and provides the requested information directly to the CPU of the user at the client end. For Web access the middleware on the application server transfers data from the organization’s internal database to the web server. This server then delivers the information in the form of a web page to the web user. The software for handling databases could be a custom program or a series of software scripts. Common gateway interface (CGI) is a speci�cation for transferring information between a Web server and a program designed to
  • 27. accept and return data. The program could be written in any programming language including C++.NET, C#.NET, C, Java, Perl, or Visual Basic.NET. After analyzing the data, let us discuss designing a database that will meet the speci�c requirements of the organization. / Managing Data Resources—Part 2 DBMS Con�guring the database technology for complex and rigorous usage solves many traditional �le environment problems. A DBMS is special software for creating and maintaining a database and enabling individual business applications to extract needed data without creating separate �les or data de�nitions in computer programs. A DBMS includes: Data De�nition Language: De�nes each data element as it appears in the database. Data Manipulation Language: Manipulates the data in the database. End users and programmers use this language to extract data from the database according to their requests and applications. Data Dictionary: Stores and organizes information about the data maintained in a database.
  • 28. Structured Query Language (SQL) is a popular data manipulation language that gives users and application programs an interactive query language to access the data in databases. The most important feature of a DBMS is its ability to separate the logical and physical views of data. A programmer works with the logical view of the data and need not be concerned with the data’s physical location. A logical description of the entire database, showing all the data elements and their inter-relationships is called a conceptual schema (media/week3/SU_MIS3101_concept_schema.xls?_&d2lSession Val=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907). A data element represents a �eld. After understanding the concept of DBMS, let us explore the various DBMS models used in digital enterprises. https://myclasses.southuni versity.edu/content/enforced/73907- 17078457/media/week3/SU_MIS3101_concept_schema.xls?_&d 2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907 / Hardware and Software for Digital Enterprise—Part 4 So far we have covered the basic concepts of computer hardware and software. Software and hardware both depend on program instructions. These programs are
  • 29. written in several programming languages that are targeted to meet certain organizational operations. Programming Languages The principal high-level programming languages used for business include C++.NET, C#.NET, C, Visual Basic.NET, and COBOL. Fourth-generation languages contain different software tools to enable users to develop software applications. These languages are less procedural than conventional programming languages and include popular software tools such as: Spreadsheets Data Management Presentation Graphics Word Processing Groupware Web Browsers E-mail Enterprise software, which includes middleware and enterprise application integration (EAI), are software tools to promote enterprise-wide integration of IS applications and business processes. Object-Oriented Programming
  • 30. Object-oriented programming tools include: Java: an object-oriented programming language that can run on any computer and operating system. HTML: a page description language to create web pages. XML: a language that describes the meaning of the data in a web document so that the data can be used in computer programs. Object-oriented programming tools create structured documents in which data and procedures are combined into one object. In order to simplify the operations the program just sends a message for an object to perform an operation. The same message can be sent to different objects but each time the operation may be different. Object-oriented programming tools also exchange data between Web sites and different legacy systems within a company and between the systems of different partners in a supply chain. Now that we’ve learned about the basic concepts of comput er hardware and software, let us now move on to learning how to manage data resources using hardware and software. / Hardware and Software for Digital Enterprise—Part 1 Let us discuss the basics of the computer hardware used for digital enterprises.
  • 31. Hardware Contemporary computer systems require six major components in four general categories: Central Processing Unit (CPU): Manipulates symbols, letters, and numbers and controls the other devices in the computer systems. Peripherals: Consists of input and output devices. Primary and secondary storage: Stores data and program instructions temporarily before and after processing. Communication devices: Enables the use of multimedia, which in turn combines two or more types of media into a computer- based application. Let us now explore each component in detail: CPU The two components of the CPU are: Arithmetic-Logic Unit (ALU): Performs the computer’s principal logic and arithmetic operations. Control Unit: Controls and coordinates the other parts of the computer system such as input and output devices and storage. Peripherals The principal input devices are: Keyboards
  • 32. Pointing devices Touch screens Magnetic Ink and Optical Character Recognition (MICR), which are devices for check and bar code processing Pen-based instruments Digital scanners Sensors Audio input devices such as microphones and tape players Radio Frequency Identi�cation Devices (RFID) The principal output devices are: Cathode Ray Tube (CRT) terminals Light Emitting Diode (LED) terminals Printers Audio output devices such as speakers and headphones /