/
DBMS Models
Some contemporary DBMS models include:
Relational DBMS: a type of logical database model that treats data as if it were stored in two-dimensional tables. It can relate data stored in one table to data
in another as long as the two tables share a common data element.
Object-Oriented DBMS (OODBMS): a type of database that can store graphics and other types of data to support multimedia applications.
Object-Relational DBMS: a type of database that combines the capabilities of a relational DBMS to store conventional information and the capabilities of an
object-oriented DBMS.
After learning about the various DBMS models, let us understand how to analyze this data for useful information.
/
Telecommunications Applications
The major telecommunications applications for e-business and e-commerce are:
E-mail: reduces long-distance telephone charges and enables different sections of an organization to communicate.
Voice mail: digitizes the sender’s spoken message and transmits the message over a network. The message is then stored on a disk for later use.
Groupware: provides additional e-mail support for enterprise-wide communication and helps workgroups at different locations in the organization.
Fax: transmits scanned documents with text and graphics over telephone lines.
Teleconferencing: permits groups of people to talk simultaneously over a telephone or via e-mail.
Videoconferencing: provides the teleconferencing facility with an additional feature that allows people to see each other over video screens.
Data conferencing: permits groups of people to work on the same data simultaneously.
Digital information services: permits people to obtain information from outside the organization instantly without leaving their workstations.
Distance learning: delivers education to individuals at multiple locations. Your participation in this course is an example of distance learning.
Electronic Data Interchange (EDI): enables computer-to-computer exchange of standard transaction documents such as invoices, bills of lading, and purchase
orders between two organizations.
/
Managing Data Resources—Part 1
(media/SU_MIS3101_Dbase_hier.xls?
_&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907)
An IS manager should understand how to organize, access, and use valuable data ef�ciently. Let us focus on how to manage data resources.
In the top-down approach, a traditional data hierarchy starts with a database. The database contains a number of interrelated and unrelated �les. Let us consider
the example of a Sales Order Management database (media/week3/SU_MIS3101_sale_mgmt_form.xls?
_&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907) . This database may contain several individual �les. Each �le in the database contains a list of
records. Let us consider the Order Detail File. Each record can be the name of each item. Each record consists of the same set of �elds such as a Part Number of six
characters. A �eld is a grouping of c ...
Web & Social Media Analytics Previous Year Question Paper.pdf
DBMS ModelsSome contemporary DBMS models include
1. /
DBMS Models
Some contemporary DBMS models include:
Relational DBMS: a type of logical database model that treats
data as if it were stored in two-dimensional tables. It can relate
data stored in one table to data
in another as long as the two tables share a common data
element.
Object-Oriented DBMS (OODBMS): a type of database that can
store graphics and other types of data to support multimedia
applications.
Object-Relational DBMS: a type of database that combines the
capabilities of a relational DBMS to store conventional
information and the capabilities of an
object-oriented DBMS.
After learning about the various DBMS models, let us
understand how to analyze this data for useful information.
/
Telecommunications Applications
2. The major telecommunications applications for e-business and
e-commerce are:
E-mail: reduces long-distance telephone charges and enables
different sections of an organization to communicate.
Voice mail: digitizes the sender’s spoken message and transmits
the message over a network. The message is then stored on a
disk for later use.
Groupware: provides additional e-mail support for enterprise-
wide communication and helps workgroups at different
locations in the organization.
Fax: transmits scanned documents with text and graphics over
telephone lines.
Teleconferencing: permits groups of people to talk
simultaneously over a telephone or via e-mail.
Videoconferencing: provides the teleconferencing facility with
an additional feature that allows people to see each other over
video screens.
Data conferencing: permits groups of people to work on the
same data simultaneously.
Digital information services: permits people to obtain
information from outside the organization instantly without
leaving their workstations.
Distance learning: delivers education to individuals at multiple
locations. Your participation in this course is an example of
distance learning.
3. Electronic Data Interchange (EDI): enables computer-to-
computer exchange of standard transaction documents such as
invoices, bills of lading, and purchase
orders between two organizations.
/
Managing Data Resources—Part 1
(media/SU_MIS3101_Dbase_hier.xls?
_&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=7390
7)
An IS manager should understand how to organize, access, and
use valuable data ef�ciently. Let us focus on how to manage
data resources.
In the top-down approach, a traditional data hierarchy starts
with a database. The database contains a number of interrelated
and unrelated �les. Let us consider
the example of a Sales Order Management database
(media/week3/SU_MIS3101_sale_mgmt_form.xls?
_&d2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=7390
7) . This database may contain several individual �les. Each
�le in the database contains a list of
records. Let us consider the Order Detail File. Each record can
be the name of each item. Each record consists of the same set
of �elds such as a Part Number of six
characters. A �eld is a grouping of characters into a word like a
person’s name, a group of words, or a complete number. A
character consists of a letter, number, or
symbol. Each character is created by a byte. The byte is usually
formed by a group of eight bits. The value of a bit can be either
4. 0 or 1 and it is the smallest unit of data
a computer can handle. For example the letter J is created by the
byte 0100 1010.
Traditionally organizations grew independently within their own
areas, which are:
Sales & Marketing
Manufacturing
Accounting & Finance
Human Resources
Over the years, the �le environment process of a database led
to the separate departments or divisions in an organization
creating, maintaining, and operating
multiple master �les.
This traditional �le environment created problems such as data
redundancy and inconsistency, program data dependence,
in�exibility, poor security, and a lack of
data sharing and availability. A Database Management System
(DBMS) has the ability to address this problem.
https://myclasses.southuniversity.edu/content/enforced/73907-
17078457/media/SU_MIS3101_Dbase_hier.xls?_&d2lSessionVa
l=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907
https://myclasses.southuniversity.edu/content/enforced/73907-
17078457/media/week3/SU_MIS3101_sale_mgmt_form.xls?_&d
2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907
5. /
Broadband Networks
Broadband networks consist of high-speed transmission
technologies. The following broadband network services are
available:
Asynchronous Transfer Mode (ATM): Supports a transmission
rate of 1.5 megabits per second (Mbps) to more than 9 gigabits
per second (Gbps), parceling
data into �xed 53-byte cells for transmitting data, audio, and
video over the same network. ATM can transmit data from the
computers of different suppliers to
your desktop.
Digital Subscriber Line (DSL): Operates over existing copper
telephone lines to carry data, voice, and video but provides a
higher transmission capacity than
integrated services digital network (ISDN).
Asymmetric Digital Subscriber Line (ADSL): Provides
transmission speeds of 1.5 to 9 Mbps when receiving data and
up to 640 Kilobits per second (Kbps)
when sending data.
Frame relay: Relies on digital circuits that require less error
checking than packet switching. It is a shared network service
with a transmission rate of 56 Kbps
to more than 40 Mbps.
ISDN: Transmits data at the rate of 128 Kbps. ISDN is an
international standard for dial-up network access using existing
local telephone lines that integrate
data, image, video, and voice services.
6. Symmetric Digital Subscriber Line (SDSL): Provides a
transmission speed of 3 Mbps.
Cable modems: Operate over cable TV lines. Transmission
speed is up to 30 Mbps. These modems provide high-speed
access to corporate intranets and the
web.
T1 Line: Provides data transmission speeds of 1.544 Mbps. A
T1 line is a dedicated telephone connection that consists of 24
channels.
Let us now learn about several applications of the
telecommunication technology.
/
Response
No Submission
0 points
Emerging (F-D: 1-27)
27 points
Satisfactory (C: 28-31)
31 points
Proficient (B: 32-35)
35 points
Exemplary (A: 36-40)
40 points
7. Criterion
Score
Quality
of Initial
Posting
/ 40No initial posting
exists to evaluate.
The information provided is
inaccurate, not focused on
the assignment’s topic,
and/or does not answer the
question(s) fully. Response
demonstrates incomplete
understanding of the topic
and/or inadequate
preparation.
The information provided is accurate,
giving a basic understanding of the
topic(s) covered. A basic understanding
8. is when you are able to describe the
terms and concepts covered. Despite
this basic understanding, initial posting
may not include complete development
of all aspects of the assignment.
The information provided is accurate,
displaying a good understanding of the
topic(s) covered. A good understanding is
when you are able to explain the terms and
topics covered. Initial posting demonstrates
sincere reflection and addresses most
aspects of the assignment, although all
concepts may not be fully developed.
The information provided is
accurate, providing an in-depth,
well thought-out understanding
of the topic(s) covered. An in-
depth understanding provides an
9. analysis of the information,
synthesizing what is learned from
the course/assigned readings.
Participation
No Submission
0 points
Emerging (F-D: 1-
13)
13 points
Satisfactory (C: 14-16)
16 points
Proficient (B: 17-18)
18 points
Exemplary (A: 19-20)
20 points
Criterion
Score
Participation
in
Discussion
/ 20No responses to
other classmates
10. were posted in this
discussion forum.
May include one or
more of the
following:
*Comments to only
one other student's
post.
*Comments are not
substantive, such as
just one line or
saying, “Good job” or
“I agree.
*Comments are off
topic.
Comments to two or more
classmates’ initial posts but only
on one day of the week.
11. Comments are substantive,
meaning they reflect and expand
on what the other student wrote.
Comments to two or more
classmates’ initial posts on more
than one day. Comments are
substantive, meaning they
reflect and expand on what the
other student wrote.
Comments to two or more classmates’ initial posts and to
the instructor's comment (if applicable) on two or more
days. Responses demonstrate an analysis of peers’
comments, building on previous posts. Comments extend
and deepen meaningful conversation and may include a
follow-up question.
Writing
No Submission
0 points
Emerging (F-D: 1-
13)
12. 13 points
Satisfaction (C: 14-16)
16 points
Proficient (B: 17-18)
18 points
Exemplary (A: 19-20)
20 points
Criterion
Score
Writing
Mechanics
(Spelling,
Grammar,
Citation
Style) and
Information
Literacy
/ 20No postings for
which to evaluate
language and
grammar exist.
13. Numerous issues in
any of the following:
grammar, mechanics,
spelling, use of slang,
and incomplete or
missing citations and
references. If
required for the
assignment, did not
use course, text,
and/or outside
readings (where
Some spelling, grammatical,
and/or structural errors are
present. Some errors in
formatting citations and
references are present. If
required for the assignment,
14. utilizes sources to support work
for initial post but not comments
to other students. Sources
include course/text readings but
outside sources (when relevant)
include non-
Minor errors in grammar, mechanics, or
spelling in the initial posting are present.
Minor errors in formatting citations and
references may exist. If required for the
assignment, utilizes sources to support work
for both the initial post and some of the
comments to other students. Sources include
course and text readings as well as outside
sources (when relevant) that are academic
and authoritative (e.g., journal articles, other
text books, .gov Web sites, professional
organization Web sites, cases, statutes, or
15. administrative rules).
Minor to no errors exist in grammar,
mechanics, or spelling in both the initial post
and comments to others. Formatting of
citations and references is correct. If required
for the assignment, utilizes sources to
support work for both the initial post and the
comments to other students. Sources include
course and text readings as well as outside
sources (when relevant) that are academic
and authoritative (e.g., journal articles, other
text books, .gov Web sites, professional
organization Web sites, cases, statutes, or
administrative rules).
/
Total / 80
Overall Score
16. Close
relevant) to support
work.
academic/authoritative, such as
Wikis and .com resources.
No Submission
0 points minimum
There was no submission
for this assignment.
Emerging (F to D Range)
1 point minimum
Satisfactory progress has not been met on the
competencies for this assignment.
Satisfactory (C Range)
56 points minimum
Satisfactory progress has been achieved on the
competencies for this assignment.
Proficient (B Range)
64 points minimum
Proficiency has been achieved on the
17. competencies for this assignment.
Exemplary (A Range)
72 points minimum
The competencies for this
assignment have been mastered.
/
Database Design with ER Diagrams
Designing a database requires both a conceptual and a physical
design. The conceptual or logical design models the database
from a business perspective. The
organization’s data model should re�ect its key business
processes and the decision-making requirements. Database
designers document the conceptual data
model with an entity-relationship (ER) diagram.
The boxes represent entities and the diamonds represent
relationships. The 1 or M on either side of the diamond can
either represent a one-to-many, one-to-one, or
many-to-many relationship between the corresponding entities.
The ER diagram shows that a customer can have more than one
order. An order can have more than
one item and an item can have more than one scheduled
delivery.
The process of creating small, stable, �exible, and adaptive
data structures from complex groups of data when designing a
18. relational database is called
normalization.
The two major types of distributed databases are:
Replicated databases: Can operate in an unconnected fashion.
The entire database is duplicated on batch basis when online.
Partitioned databases: Consist of parts that are physically stored
and maintained in one location and other parts that are stored
and maintained in other
locations. This design enables each remote CPU to store the
necessary data to serve the local area. Changes and transactions
from local �les are synchronized
with the central database on batch basis.
Let us now learn how to transmit this data to remote locations
of organizations, where users can use the data to extract
valuable information. The spread of
telecommunications and wireless networks has enabled data
transmission.
/
Hardware and Software for Digital Enterprise—Part 3
Computer hardware alone is not enough to run the IS function.
You also require appropriate computer software along with the
hardware. So let us focus now on
how software controls the operating system (OS) of a computer
and ful�ls the end user requirements in an organization.
Software
19. The two major types of software are:
Application software: Are programs written for a speci �c
business application and used by end users and application
programmers to run and develop
applications.
System software: Are programs that control the IS by
allocating, assigning, and scheduling system resources of a
computer. System software mediates
between application software and computer hardware and
coordinates the various parts of the computer system with the
OS. Several types of system
software are used for OSs such as:
Microsoft Windows— XP, Vista, Version 7, and Version 8
UNIX
IBM AIX
Linux
HPUX
Apple Macintosh
MS-DOS
Data Processing
IS can collect and process data in the following two ways:
Batch Processing: Accumulates and stores transactions in a
group until it is necessary to process them.
20. Online Processing: Enters transactions directly into the
computer system and processes them immediately.
In the client/server model of computing, the clients and the
servers connected to a network perform computer processing.
Network computers obtain most or all
their data and software from a central network server because
they have minimal or no local processing or storage capability.
Peer-to-peer computing puts
processing power back on users’ desktops linking individual
workstations and PCs through the Web or via private networks
to share disk storage space, data, and
processing power to accomplish a variety of tasks. Grid
computing is a form of peer-to-peer computing that divides
problems into smaller pieces that can run on
several computers that are organized into a computational grid.
When calculating expenses for buying a computer we consider
the total cost of ownership (TCO), which includes not only the
original cost of the computer system
but also the costs for upgrades, maintenance, training, and
technical support for hardware and software.
/
Telecommunications and Wireless Networks
Telecommunications
A corporate telecommunications system consists of:
Telephone system
21. Mobile Cellular communications
Video conferencing
Corporate Web site
LAN
WAN
Internet access
Enterprise networking
Telecommunications systems are developed under three
standards:
Transmission Control Protocol/Internet Protocol (TCP/IP):
Enables communication among diverse components on a
telecommunications network. TCP/IP
consists of a suite of protocols that has become the dominant
model for achieving connectivity within the Internet and
between computers and networks.
Protocols provide a common set of rules that enables this
communication.
Packet Switching: Makes ef�cient use of the network
communications capability by splitting messages into small
packets that travel independently along
different paths on a network and then reassemble at the
destination.
Client/Server Networks: Connect personal computers on a
network to multiple servers. Client/server networks distribute
most of the enterprise’s computing
22. power to the factory �oor and the desktop of every user.
Transmission Media
Principal transmission media for data transmission are:
Twisted copper telephone wire: This is the least expensive
medium and can transmit low volumes of data.
Coaxial copper cable: This is expensive to install but can
transmit high volumes of data.
Fiber-optic cable: This is also expensive to install but can
transmit high volumes of data.
Wireless transmission: This is of three types:
Microwave: cost effective for large volume transmission over
long distances
Satellite: cost effective for large volume transmission over long
distances
Low-frequency radio: cost effective for infrared waves
Let us now explore the various network designs used in
organizations to transmit data.
/
Network Designs
A manager can select from several network designs based on the
23. information requirements of the organization and transmission
distances. The designs are:
LANs: Can connect a cluster of digital workstations and PCs
within a 2,000-foot radius. A LAN is utilized for most corporate
computing tasks. LANS might use
the client/server or peer-to-peer architecture. LANs can be
connected using the bus, ring, or star topology. Transmission
media can be either wired or low-cost,
high-speed wireless 802.11. Wi-Fi standards can also provide
access to the Internet.
WANs: Are private networks that span broad geographic
distances, ranging from several miles to continents.
Metropolitan Area Networks (MANs): Span an urban area.
Value-Added Networks (VANs): Market WAN services to
companies that do not want to construct or maintain private
networks.
/
Hardware and Software for Digital Enterprise—Part 2
Storage
The primary storage consists of different types of
semiconductor memory chips:
Random Access Memory (RAM): Used for short-term storage of
data during the execution of program instructions.
24. Read-Only Memory (ROM): Used for permanent storage of
important program instructions like how to form various letters,
numbers, and symbols with fonts.
The main secondary storage technologies are:
Magnetic Disk: Data is stored by means of magnetized spots on
a hard or �oppy disk.
Optical Disk: Stores massive quantities of data in a highly
compact form.
Magnetic Tape: Large volumes of information are stored
sequentially by means of magnetized and non-magnetized spots
on a tape.
Communication Devices
Multimedia integrates two or more of the following types of
media transforming these into a computer-based application:
Text
Graphics
Sound
Voice
Full-motion video
Still video
Animation
Classification of Computer Hardware
25. Computer hardware is classi�ed as:
Mainframes: These are the largest computers used in very large
business organization, research, and military applications.
Midrange computers: These are minicomputers used in
factories, colleges, and research labs to act as servers that
provide software, printers, and the Internet
access to computers on its network.
Workstations: These are desktop computers with powerful
graphic and mathematical capabilities.
Supercomputers: These are sophisticated and powerful
computers that can perform complex and massive computations
rapidly.
PCs: These are laptop or desktop computers.
After discussing computer hardware let us explore the other
aspect of IS infrastructure—computer software
/
/
Multidimensional Data Analysis
Multidimensional Data Analysis
26. Online analytical processing (OLAP), also called
multidimensional data analysis, can represent relationships
among data as a multidimensional structure. This
structure can be visualized as cubes of data. Smaller cubes exist
within these cubes of data, allowing sophisticated data analysis.
We can ef�ciently analyze data
across the enterprise using a data warehouse on a platform that
extracts current and historical data from several operational
systems. The management of an
organization uses this consolidated data for decision making. In
addition, organizations can build smaller, decentralized
warehouses called data marts. A data mart
contains only a subset of the population of users.
Data mining analyzes large pools of data, including the contents
of data warehouses or data marts, to �nd patterns and rules that
can predict consumer behavior
and guide decision making. Hypermedia databases allow data to
be stored in nodes linked together in any user-speci�ed pattern.
The nodes can contain text,
graphics, voice, full-motion video, or executable programs.
An internal database can be Web-enabled to facilitate users to
access the database from any location. In a client/server
environment, the DBMS receives SQL
requests and provides the requested information directly to the
CPU of the user at the client end. For Web access the
middleware on the application server
transfers data from the organization’s internal database to the
web server. This server then delivers the information in the
form of a web page to the web user.
The software for handling databases could be a custom program
or a series of software scripts. Common gateway interface (CGI)
is a speci�cation for transferring
information between a Web server and a program designed to
27. accept and return data. The program could be written in any
programming language including
C++.NET, C#.NET, C, Java, Perl, or Visual Basic.NET.
After analyzing the data, let us discuss designing a database that
will meet the speci�c requirements of the organization.
/
Managing Data Resources—Part 2
DBMS
Con�guring the database technology for complex and rigorous
usage solves many traditional �le environment problems. A
DBMS is special software for creating
and maintaining a database and enabling individual business
applications to extract needed data without creating separate
�les or data de�nitions in computer
programs.
A DBMS includes:
Data De�nition Language: De�nes each data element as it
appears in the database.
Data Manipulation Language: Manipulates the data in the
database. End users and programmers use this language to
extract data from the database
according to their requests and applications.
Data Dictionary: Stores and organizes information about the
data maintained in a database.
28. Structured Query Language (SQL) is a popular data
manipulation language that gives users and application
programs an interactive query language to access the
data in databases.
The most important feature of a DBMS is its ability to separate
the logical and physical views of data. A programmer works
with the logical view of the data and need
not be concerned with the data’s physical location. A logical
description of the entire database, showing all the data elements
and their inter-relationships is called a
conceptual schema
(media/week3/SU_MIS3101_concept_schema.xls?_&d2lSession
Val=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907). A data
element
represents a �eld.
After understanding the concept of DBMS, let us explore the
various DBMS models used in digital enterprises.
https://myclasses.southuni versity.edu/content/enforced/73907-
17078457/media/week3/SU_MIS3101_concept_schema.xls?_&d
2lSessionVal=tMO8UB8lK2GctRXeoaaWqV7nV&ou=73907
/
Hardware and Software for Digital Enterprise—Part 4
So far we have covered the basic concepts of computer
hardware and software. Software and hardware both depend on
program instructions. These programs are
29. written in several programming languages that are targeted to
meet certain organizational operations.
Programming Languages
The principal high-level programming languages used for
business include C++.NET, C#.NET, C, Visual Basic.NET, and
COBOL.
Fourth-generation languages contain different software tools to
enable users to develop software applications. These languages
are less procedural than
conventional programming languages and include popular
software tools such as:
Spreadsheets
Data Management
Presentation Graphics
Word Processing
Groupware
Web Browsers
E-mail
Enterprise software, which includes middleware and enterprise
application integration (EAI), are software tools to promote
enterprise-wide integration of IS
applications and business processes.
Object-Oriented Programming
30. Object-oriented programming tools include:
Java: an object-oriented programming language that can run on
any computer and operating system.
HTML: a page description language to create web pages.
XML: a language that describes the meaning of the data in a
web document so that the data can be used in computer
programs.
Object-oriented programming tools create structured documents
in which data and procedures are combined into one object. In
order to simplify the operations
the program just sends a message for an object to perform an
operation. The same message can be sent to different objects but
each time the operation may be
different. Object-oriented programming tools also exchange
data between Web sites and different legacy systems within a
company and between the systems of
different partners in a supply chain.
Now that we’ve learned about the basic concepts of comput er
hardware and software, let us now move on to learning how to
manage data resources using
hardware and software.
/
Hardware and Software for Digital Enterprise—Part 1
Let us discuss the basics of the computer hardware used for
digital enterprises.
31. Hardware
Contemporary computer systems require six major components
in four general categories:
Central Processing Unit (CPU): Manipulates symbols, letters,
and numbers and controls the other devices in the computer
systems.
Peripherals: Consists of input and output devices.
Primary and secondary storage: Stores data and program
instructions temporarily before and after processing.
Communication devices: Enables the use of multimedia, which
in turn combines two or more types of media into a computer-
based application.
Let us now explore each component in detail:
CPU
The two components of the CPU are:
Arithmetic-Logic Unit (ALU): Performs the computer’s
principal logic and arithmetic operations.
Control Unit: Controls and coordinates the other parts of the
computer system such as input and output devices and storage.
Peripherals
The principal input devices are:
Keyboards
32. Pointing devices
Touch screens
Magnetic Ink and Optical Character Recognition (MICR), which
are devices for check and bar code processing
Pen-based instruments
Digital scanners
Sensors
Audio input devices such as microphones and tape players
Radio Frequency Identi�cation Devices (RFID)
The principal output devices are:
Cathode Ray Tube (CRT) terminals
Light Emitting Diode (LED) terminals
Printers
Audio output devices such as speakers and headphones
/