SlideShare a Scribd company logo
1 of 42
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Objectives Overview
Define the term,
database, and explain
how a database
interacts with data and
information
Define the term, data
integrity, and describe
the qualities of valuable
information
Discuss the terms
character, field, record,
and file
Describe file
maintenance
techniques and
validation techniques
Differentiate between a
file processing
approach and the
database approach
Discovering Computers 2012: Chapter 10
2See Page 513
for Detailed Objectives
Objectives Overview
Discuss the functions
common to most
database management
systems
Describe characteristics
of relational, object-
oriented, and
multidimensional
databases
Explain how to access
Web databases
Identify database design
guidelines and discuss
the responsibilities of
database analysts and
administrators
Discovering Computers 2012: Chapter 10
3See Page 513
for Detailed Objectives
Databases, Data, and Information
Database
• Collection of
data organized
in a manner
that allows
access,
retrieval, and
use of that
data
Data
• Collection of
unprocessed
items
• Text
• Numbers
• Images
• Audio
• Video
Information
• Processed data
• Documents
• Audio
• Images
• Video
Discovering Computers 2012: Chapter 10
4Page 514
Databases, Data, and Information
Discovering Computers 2012: Chapter 10
5Pages 514 – 515
Figure 10-1
Databases, Data, and Information
• Database software, often called a database
management system (DBMS), allows users to:
Discovering Computers 2012: Chapter 10
6Page 515
Create a computerized
database
Add, modify, and
delete data
Sort and retrieve data
Create forms and
reports from the data
Databases, Data, and Information
• Data integrity identifies the quality of the data
• Garbage in, garbage out (GIGO) points out the
accuracy of a computer’s output depends on the
accuracy of the input
Discovering Computers 2012: Chapter 10
7Page 516
Databases, Data, and Information
• Valuable information should have the following
characteristics:
Discovering Computers 2012: Chapter 10
8Pages 516 - 517
Accurate Verifiable Timely Organized
Accessible Useful
Cost-
effective
The Hierarchy of Data
• Data is organized in layers
– Files, records, fields, characters
Discovering Computers 2012: Chapter 10
9Page 517
Figure 10-2
The Hierarchy of Data
• A character is one byte
– Numbers, letters, space,
punctuation marks, or
other symbols
• A field is a combination
of one or more related
characters
– Field name
– Field size
– Data type
Discovering Computers 2012: Chapter 10
10Page 518
Figure 10-3
The Hierarchy of Data
• Common data types include:
Discovering Computers 2012: Chapter 10
11Page 518
Text Numeric AutoNumber Currency
Date Memo Yes/No Hyperlink
Object Attachment
The Hierarchy of Data
Discovering Computers 2012: Chapter 10
12Page 519
Figure 10-4
• A record is a group of related fields
– A primary key uniquely identifies each record
• A data file is a collection of related records
Maintaining Data
• File maintenance refers to the procedures that
keep data current
Discovering Computers 2012: Chapter 10
13Page 520
Adding
records
Modifying
records
Deleting
records
Maintaining Data
• Users add new records to a file when they obtain
new data
Discovering Computers 2012: Chapter 10
14Page 520
Figure 10-5
Maintaining Data
• Users modify a record to correct inaccurate data
or update old data
Discovering Computers 2012: Chapter 10
15Page 521
Figure 10-6
Maintaining Data
• When a record no longer is needed, a user deletes
it from a file
Discovering Computers 2012: Chapter 10
16Page 522
Figure 10-7
Maintaining Data
• Validation compares data with a set of rules or
values to find out if the data is correct
Discovering Computers 2012: Chapter 10
17Pages 522 - 524
Alphabetic/Numeric
check
Range check Consistency check
Completeness check Check digit Other checks
File Processing Versus Databases
Discovering Computers 2012: Chapter 10
18Pages 524 - 526
File processing system
• Each department has its
own set of files
• Used for many years
• Have data redundancy
• Isolate data
Database approach
• Programs and users share
data
• Reduce data redundancy
• Improve data integrity
• Share data
• Allows easier access
• Reduces development time
• Can be more vulnerable
File Processing Versus Databases
Discovering Computers 2012: Chapter 10
19Page 525
Figure 10-10
Database Management Systems
Discovering Computers 2012: Chapter 10
20Page 527
Figure 10-11
Database Management Systems
• A data dictionary contains data about each file in
the database and each field in those files
Discovering Computers 2012: Chapter 10
21Pages 527 – 528
Figure 10-12
Database Management Systems
• A DBMS provides several tools that allow users
and programs to retrieve and maintain data in the
database
Discovering Computers 2012: Chapter 10
22Page 528
Query language
Query by example
Form
Report generator
Database Management Systems
• A query language consists of simple, English-like
statements that allow users to specify the data to
display, print, or store
• Query by example (QBE) provides a GUI to assist
users with retrieving data
Discovering Computers 2012: Chapter 10
23Page 528
Database Management Systems
Discovering Computers 2012: Chapter 10
24Page 529
Figure 10-13
Database Management Systems
• A form is a window on the screen that provides
areas for entering or modifying data in a database
Discovering Computers 2012: Chapter 10
25Page 530
Figure 10-15
Database Management Systems
• A report generator allows users to design a report
on the screen, retrieve data into the report
design, and then display or print the report
Discovering Computers 2012: Chapter 10
26Page 531
Figure 10-16
Database Management Systems
A DBMS provides means to
ensure that only authorized users
access data at permitted times
•Access privileges
•Principle of least privilege
Discovering Computers 2012: Chapter 10
27Page 531
Database Management Systems
• A DMBS provides a variety of techniques to
restore the database to a usable form in case it is
damaged or destroyed
Discovering Computers 2012: Chapter 10
28Pages 531 - 532
Backup Log
Recovery
utility
Continuous
backup
Database Management Systems
Discovering Computers 2012: Chapter 10
29Page 532
Figure 10-17
Relational, Object-Oriented, and
Multidimensional Databases
Discovering Computers 2012: Chapter 10
30Page 533
Figure 10-18
• A data model consists of rules and standards that
define how the database organizes data
Relational, Object-Oriented, and
Multidimensional Databases
• A relational database
stores data in tables
that consist of rows and
columns
– Each row has a primary
key
– Each column has a
unique name
• A relationship is a link
within the data
Discovering Computers 2012: Chapter 10
31Page 533
Figure 10-20
Relational, Object-Oriented, and
Multidimensional Databases
• Structured Query Language (SQL) is a query
language that allows users to manage, update,
and retrieve data
Discovering Computers 2012: Chapter 10
32Page 534
Figure 10-21
Relational, Object-Oriented, and
Multidimensional Databases
• An object-oriented database (OODB) stores data
in objects
• Examples of applications appropriate for an
object-oriented database include:
Discovering Computers 2012: Chapter 10
33Page 534
Multimedia
database
Groupware
database
Computer-
aided design
database
Hypertext
database
Relational, Object-Oriented, and
Multidimensional Databases
Discovering Computers 2012: Chapter 10
34Page 535
Figure 10-22
Relational, Object-Oriented, and
Multidimensional Databases
• A multidimensional database can store data in more
than two dimensions of data
– Sometimes known as a hypercube
– Can consolidate data much faster than a relational database
• A data warehouse is a huge database that stores and
manages the data required to analyze historical and
current transactions
Discovering Computers 2012: Chapter 10
35Pages 535 - 536
Web Databases
• Databases on the Web allow you to:
Discovering Computers 2012: Chapter 10
36Page 536
Shop for
products or
services
Buy or sell stocks Search for a job
Make airline
reservations
Register for
college classes
Check semester
grades
Web Databases
Discovering Computers 2012: Chapter 10
37Page 536
Figure 10-23
Database Administration
• It is important to have a carefully designed
database
Discovering Computers 2012: Chapter 10
38Page 537
Figure 10-24
Database Administration
Database analysts and administrators are responsible
for managing and coordinating all database activities
Database Analyst (DA)
Decides on proper field
placement, defines data
relationship, and identifies
users’ access privileges
Database Administrator (DBA)
Creates and maintains the data
dictionary, manages security,
monitors performance, and
checks backup and recovery
procedures
Discovering Computers 2012: Chapter 10
39Page 538
Database Administration
• Employees should learn
how to use the data in
the database effectively
– Interact with database
– Identify new data for the
database
– Maintain the database
Discovering Computers 2012: Chapter 10
40Page 538
Figure 10-25
Summary
How data and
information are
valuable assets to
an organization
Methods for
maintaining high-
quality data
Assessing the
quality of valuable
information
Advantages of
organizing data in
a database
Various types of
databases
Roles of the
database analysts
and administrators
Discovering Computers 2012: Chapter 10
41Page 539
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Chapter 10 Complete

More Related Content

What's hot

The Next Evolution in Storage Virtualization Management White Paper
The Next Evolution in Storage Virtualization Management White PaperThe Next Evolution in Storage Virtualization Management White Paper
The Next Evolution in Storage Virtualization Management White Paper
Hitachi Vantara
 
Vbmca204821311240
Vbmca204821311240Vbmca204821311240
Vbmca204821311240
Ayushi Jain
 
Active directory & exchange 3 3-11
Active directory & exchange 3 3-11Active directory & exchange 3 3-11
Active directory & exchange 3 3-11
jlrden
 

What's hot (20)

Digital content management system
Digital content management systemDigital content management system
Digital content management system
 
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
BFC: High-Performance Distributed Big-File Cloud Storage Based On Key-Value S...
 
Presentations on web database
Presentations on web databasePresentations on web database
Presentations on web database
 
Scope of Data Integration
Scope of Data IntegrationScope of Data Integration
Scope of Data Integration
 
Data Archiving white paper
Data Archiving white paperData Archiving white paper
Data Archiving white paper
 
Lecture 04 data resource management
Lecture 04 data resource managementLecture 04 data resource management
Lecture 04 data resource management
 
The Next Evolution in Storage Virtualization Management White Paper
The Next Evolution in Storage Virtualization Management White PaperThe Next Evolution in Storage Virtualization Management White Paper
The Next Evolution in Storage Virtualization Management White Paper
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 
Managing data resources
Managing  data resourcesManaging  data resources
Managing data resources
 
Vbmca204821311240
Vbmca204821311240Vbmca204821311240
Vbmca204821311240
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
EUDAT B2SHARE: How to store and publish research data | www.eudat.eu
EUDAT B2SHARE: How to store and publish research data | www.eudat.euEUDAT B2SHARE: How to store and publish research data | www.eudat.eu
EUDAT B2SHARE: How to store and publish research data | www.eudat.eu
 
Data warehouse,data mining & Big Data
Data warehouse,data mining & Big DataData warehouse,data mining & Big Data
Data warehouse,data mining & Big Data
 
Information Technology 104
Information Technology 104Information Technology 104
Information Technology 104
 
Df25632640
Df25632640Df25632640
Df25632640
 
Info sphere overview
Info sphere overviewInfo sphere overview
Info sphere overview
 
Cloud Storage: Focusing On Back End Storage Architecture
Cloud Storage: Focusing On Back End Storage ArchitectureCloud Storage: Focusing On Back End Storage Architecture
Cloud Storage: Focusing On Back End Storage Architecture
 
B2DROP User Training | www.eudat.eu |
B2DROP User Training | www.eudat.eu | B2DROP User Training | www.eudat.eu |
B2DROP User Training | www.eudat.eu |
 
Multimedia database
Multimedia databaseMultimedia database
Multimedia database
 
Active directory & exchange 3 3-11
Active directory & exchange 3 3-11Active directory & exchange 3 3-11
Active directory & exchange 3 3-11
 

Similar to Database Management

Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database management
haider ali
 
Database Management.pptxqqwwqwqwqqweqwqw
Database Management.pptxqqwwqwqwqqweqwqwDatabase Management.pptxqqwwqwqwqqweqwqw
Database Management.pptxqqwwqwqwqqweqwqw
adrianantopina1
 

Similar to Database Management (20)

Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database management
 
Database Management.pptxqqwwqwqwqqweqwqw
Database Management.pptxqqwwqwqwqqweqwqwDatabase Management.pptxqqwwqwqwqqweqwqw
Database Management.pptxqqwwqwqwqqweqwqw
 
Discovering Computers: Chapter 10
Discovering Computers: Chapter 10Discovering Computers: Chapter 10
Discovering Computers: Chapter 10
 
Database
DatabaseDatabase
Database
 
DBMS Lecture 1.ppt
DBMS Lecture 1.pptDBMS Lecture 1.ppt
DBMS Lecture 1.ppt
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
Lecture-4: Introduction to Programming & Databases
Lecture-4: Introduction to Programming & DatabasesLecture-4: Introduction to Programming & Databases
Lecture-4: Introduction to Programming & Databases
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
Bridging the Last Mile: Getting Data to the People Who Need It (APAC)
 
INT 1010 07-5.pdf
INT 1010 07-5.pdfINT 1010 07-5.pdf
INT 1010 07-5.pdf
 
Lecture-1.ppt
Lecture-1.pptLecture-1.ppt
Lecture-1.ppt
 
Database Technology- ITM
Database Technology- ITMDatabase Technology- ITM
Database Technology- ITM
 
Database Technology- ITM
Database Technology- ITMDatabase Technology- ITM
Database Technology- ITM
 
Denodo: Enabling a Data Mesh Architecture and Data Sharing Culture at Landsba...
Denodo: Enabling a Data Mesh Architecture and Data Sharing Culture at Landsba...Denodo: Enabling a Data Mesh Architecture and Data Sharing Culture at Landsba...
Denodo: Enabling a Data Mesh Architecture and Data Sharing Culture at Landsba...
 
The technology of the business data lake
The technology of the business data lakeThe technology of the business data lake
The technology of the business data lake
 
Logical Data Fabric and Data Mesh – Driving Business Outcomes
Logical Data Fabric and Data Mesh – Driving Business OutcomesLogical Data Fabric and Data Mesh – Driving Business Outcomes
Logical Data Fabric and Data Mesh – Driving Business Outcomes
 
Agile BI with Data Virtualization (session 2 from Packed Lunch Webinar Series)
Agile BI with Data Virtualization (session 2 from Packed Lunch Webinar Series)Agile BI with Data Virtualization (session 2 from Packed Lunch Webinar Series)
Agile BI with Data Virtualization (session 2 from Packed Lunch Webinar Series)
 
Database Concepts 101
Database Concepts 101Database Concepts 101
Database Concepts 101
 
IBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - HighlightsIBM InfoSphere Optim Solutions - Highlights
IBM InfoSphere Optim Solutions - Highlights
 
Mobile Offline First for inclusive data that spans the data divide
Mobile Offline First for inclusive data that spans the data divideMobile Offline First for inclusive data that spans the data divide
Mobile Offline First for inclusive data that spans the data divide
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Database Management

  • 1. Your Interactive Guide to the Digital World Discovering Computers 2012
  • 2. Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe the qualities of valuable information Discuss the terms character, field, record, and file Describe file maintenance techniques and validation techniques Differentiate between a file processing approach and the database approach Discovering Computers 2012: Chapter 10 2See Page 513 for Detailed Objectives
  • 3. Objectives Overview Discuss the functions common to most database management systems Describe characteristics of relational, object- oriented, and multidimensional databases Explain how to access Web databases Identify database design guidelines and discuss the responsibilities of database analysts and administrators Discovering Computers 2012: Chapter 10 3See Page 513 for Detailed Objectives
  • 4. Databases, Data, and Information Database • Collection of data organized in a manner that allows access, retrieval, and use of that data Data • Collection of unprocessed items • Text • Numbers • Images • Audio • Video Information • Processed data • Documents • Audio • Images • Video Discovering Computers 2012: Chapter 10 4Page 514
  • 5. Databases, Data, and Information Discovering Computers 2012: Chapter 10 5Pages 514 – 515 Figure 10-1
  • 6. Databases, Data, and Information • Database software, often called a database management system (DBMS), allows users to: Discovering Computers 2012: Chapter 10 6Page 515 Create a computerized database Add, modify, and delete data Sort and retrieve data Create forms and reports from the data
  • 7. Databases, Data, and Information • Data integrity identifies the quality of the data • Garbage in, garbage out (GIGO) points out the accuracy of a computer’s output depends on the accuracy of the input Discovering Computers 2012: Chapter 10 7Page 516
  • 8. Databases, Data, and Information • Valuable information should have the following characteristics: Discovering Computers 2012: Chapter 10 8Pages 516 - 517 Accurate Verifiable Timely Organized Accessible Useful Cost- effective
  • 9. The Hierarchy of Data • Data is organized in layers – Files, records, fields, characters Discovering Computers 2012: Chapter 10 9Page 517 Figure 10-2
  • 10. The Hierarchy of Data • A character is one byte – Numbers, letters, space, punctuation marks, or other symbols • A field is a combination of one or more related characters – Field name – Field size – Data type Discovering Computers 2012: Chapter 10 10Page 518 Figure 10-3
  • 11. The Hierarchy of Data • Common data types include: Discovering Computers 2012: Chapter 10 11Page 518 Text Numeric AutoNumber Currency Date Memo Yes/No Hyperlink Object Attachment
  • 12. The Hierarchy of Data Discovering Computers 2012: Chapter 10 12Page 519 Figure 10-4 • A record is a group of related fields – A primary key uniquely identifies each record • A data file is a collection of related records
  • 13. Maintaining Data • File maintenance refers to the procedures that keep data current Discovering Computers 2012: Chapter 10 13Page 520 Adding records Modifying records Deleting records
  • 14. Maintaining Data • Users add new records to a file when they obtain new data Discovering Computers 2012: Chapter 10 14Page 520 Figure 10-5
  • 15. Maintaining Data • Users modify a record to correct inaccurate data or update old data Discovering Computers 2012: Chapter 10 15Page 521 Figure 10-6
  • 16. Maintaining Data • When a record no longer is needed, a user deletes it from a file Discovering Computers 2012: Chapter 10 16Page 522 Figure 10-7
  • 17. Maintaining Data • Validation compares data with a set of rules or values to find out if the data is correct Discovering Computers 2012: Chapter 10 17Pages 522 - 524 Alphabetic/Numeric check Range check Consistency check Completeness check Check digit Other checks
  • 18. File Processing Versus Databases Discovering Computers 2012: Chapter 10 18Pages 524 - 526 File processing system • Each department has its own set of files • Used for many years • Have data redundancy • Isolate data Database approach • Programs and users share data • Reduce data redundancy • Improve data integrity • Share data • Allows easier access • Reduces development time • Can be more vulnerable
  • 19. File Processing Versus Databases Discovering Computers 2012: Chapter 10 19Page 525 Figure 10-10
  • 20. Database Management Systems Discovering Computers 2012: Chapter 10 20Page 527 Figure 10-11
  • 21. Database Management Systems • A data dictionary contains data about each file in the database and each field in those files Discovering Computers 2012: Chapter 10 21Pages 527 – 528 Figure 10-12
  • 22. Database Management Systems • A DBMS provides several tools that allow users and programs to retrieve and maintain data in the database Discovering Computers 2012: Chapter 10 22Page 528 Query language Query by example Form Report generator
  • 23. Database Management Systems • A query language consists of simple, English-like statements that allow users to specify the data to display, print, or store • Query by example (QBE) provides a GUI to assist users with retrieving data Discovering Computers 2012: Chapter 10 23Page 528
  • 24. Database Management Systems Discovering Computers 2012: Chapter 10 24Page 529 Figure 10-13
  • 25. Database Management Systems • A form is a window on the screen that provides areas for entering or modifying data in a database Discovering Computers 2012: Chapter 10 25Page 530 Figure 10-15
  • 26. Database Management Systems • A report generator allows users to design a report on the screen, retrieve data into the report design, and then display or print the report Discovering Computers 2012: Chapter 10 26Page 531 Figure 10-16
  • 27. Database Management Systems A DBMS provides means to ensure that only authorized users access data at permitted times •Access privileges •Principle of least privilege Discovering Computers 2012: Chapter 10 27Page 531
  • 28. Database Management Systems • A DMBS provides a variety of techniques to restore the database to a usable form in case it is damaged or destroyed Discovering Computers 2012: Chapter 10 28Pages 531 - 532 Backup Log Recovery utility Continuous backup
  • 29. Database Management Systems Discovering Computers 2012: Chapter 10 29Page 532 Figure 10-17
  • 30. Relational, Object-Oriented, and Multidimensional Databases Discovering Computers 2012: Chapter 10 30Page 533 Figure 10-18 • A data model consists of rules and standards that define how the database organizes data
  • 31. Relational, Object-Oriented, and Multidimensional Databases • A relational database stores data in tables that consist of rows and columns – Each row has a primary key – Each column has a unique name • A relationship is a link within the data Discovering Computers 2012: Chapter 10 31Page 533 Figure 10-20
  • 32. Relational, Object-Oriented, and Multidimensional Databases • Structured Query Language (SQL) is a query language that allows users to manage, update, and retrieve data Discovering Computers 2012: Chapter 10 32Page 534 Figure 10-21
  • 33. Relational, Object-Oriented, and Multidimensional Databases • An object-oriented database (OODB) stores data in objects • Examples of applications appropriate for an object-oriented database include: Discovering Computers 2012: Chapter 10 33Page 534 Multimedia database Groupware database Computer- aided design database Hypertext database
  • 34. Relational, Object-Oriented, and Multidimensional Databases Discovering Computers 2012: Chapter 10 34Page 535 Figure 10-22
  • 35. Relational, Object-Oriented, and Multidimensional Databases • A multidimensional database can store data in more than two dimensions of data – Sometimes known as a hypercube – Can consolidate data much faster than a relational database • A data warehouse is a huge database that stores and manages the data required to analyze historical and current transactions Discovering Computers 2012: Chapter 10 35Pages 535 - 536
  • 36. Web Databases • Databases on the Web allow you to: Discovering Computers 2012: Chapter 10 36Page 536 Shop for products or services Buy or sell stocks Search for a job Make airline reservations Register for college classes Check semester grades
  • 37. Web Databases Discovering Computers 2012: Chapter 10 37Page 536 Figure 10-23
  • 38. Database Administration • It is important to have a carefully designed database Discovering Computers 2012: Chapter 10 38Page 537 Figure 10-24
  • 39. Database Administration Database analysts and administrators are responsible for managing and coordinating all database activities Database Analyst (DA) Decides on proper field placement, defines data relationship, and identifies users’ access privileges Database Administrator (DBA) Creates and maintains the data dictionary, manages security, monitors performance, and checks backup and recovery procedures Discovering Computers 2012: Chapter 10 39Page 538
  • 40. Database Administration • Employees should learn how to use the data in the database effectively – Interact with database – Identify new data for the database – Maintain the database Discovering Computers 2012: Chapter 10 40Page 538 Figure 10-25
  • 41. Summary How data and information are valuable assets to an organization Methods for maintaining high- quality data Assessing the quality of valuable information Advantages of organizing data in a database Various types of databases Roles of the database analysts and administrators Discovering Computers 2012: Chapter 10 41Page 539
  • 42. Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Complete