The document discusses business data processing and database systems. It describes how data is converted into useful information through data processing. It then explains the data storage hierarchy from bits to databases. Different methods for organizing data are covered, including file-oriented and database-oriented approaches. Key concepts in database systems like models, languages and components are also summarized.
This document discusses different types of application software packages. It covers word processing packages, which are used to create, edit, and format documents. Spreadsheet packages allow for numerical analysis and are useful for accounting, budgets, and grading. Graphics packages enable the creation of drawings, pictures, and other visual content. Personal assistance packages help individuals manage schedules, contacts, and finances. The document provides examples and definitions of features for each type of package.
The document discusses business data processing and databases. It defines data and information, and explains how data processing converts raw data into useful information. It then describes the data storage hierarchy and common methods for organizing data, such as the file-oriented and database-oriented approaches. Finally, it discusses database models and management systems.
The document discusses key aspects of system implementation and operation including testing and debugging programs, documenting the system, transitioning to the new system, and ongoing system evaluation and maintenance. Specifically, it covers debugging syntax versus logic errors, different types of testing, methods for changeover to a new system, factors considered in system evaluation, and importance of ongoing system maintenance.
The document discusses different types of computer software. It defines software and describes the relationship between software and hardware. There are two major types of software: system software, which controls computer operations, and application software, which performs specific tasks. The document outlines how software is developed and acquired, including buying pre-written software, customizing software, and downloading public domain software. It also discusses firmware, middleware, and the steps involved in software development.
The document discusses secondary storage devices. It begins by explaining the limitations of primary storage like limited capacity and volatility. Secondary storage is then introduced as a way to overcome these limitations by having virtually unlimited capacity and storing data permanently. The document classifies common secondary storage devices as either sequential access or direct access, and provides magnetic tape as an example of sequential access and magnetic disks as an example of direct access. Specific details are then given about magnetic tapes, including their physical format and how data is stored on tracks in frames. Examples are provided to illustrate tape storage organization and blocking of records.
The document discusses different types of computers based on their mode of use. It describes notebook computers, personal computers, workstations, mainframe systems, supercomputers, client and server computers, and handheld computers. For each type, it provides details on their key characteristics, components, uses, and differences between types. The document concludes with a comparison table of the different computer types.
The document discusses computer languages and programming. It describes three categories of programming languages: machine languages, assembly languages, and high-level languages. It also discusses common programming language tools like assemblers, compilers, linkers, and interpreters. Popular programming languages like FORTRAN, COBOL, BASIC, Pascal, C, C++, C#, Java, RPG, LISP and SNOBOL are also mentioned. The key characteristics and uses of machine languages, assembly languages, high-level languages, compilers, linkers and interpreters are summarized.
The document discusses planning computer programs through algorithms, flowcharts, and pseudocode. It provides examples of algorithms to calculate the number of students who passed with first division and to calculate total bonus amounts for employees. It also describes how algorithms can be represented as programs, flowcharts, or pseudocode. Flowcharts use standardized symbols connected by arrows to show the sequence of instructions, and examples of decision symbols are shown. Finally, an example problem is provided to draw a flowchart to calculate and print a student's percentage marks based on input data.
This document discusses different types of application software packages. It covers word processing packages, which are used to create, edit, and format documents. Spreadsheet packages allow for numerical analysis and are useful for accounting, budgets, and grading. Graphics packages enable the creation of drawings, pictures, and other visual content. Personal assistance packages help individuals manage schedules, contacts, and finances. The document provides examples and definitions of features for each type of package.
The document discusses business data processing and databases. It defines data and information, and explains how data processing converts raw data into useful information. It then describes the data storage hierarchy and common methods for organizing data, such as the file-oriented and database-oriented approaches. Finally, it discusses database models and management systems.
The document discusses key aspects of system implementation and operation including testing and debugging programs, documenting the system, transitioning to the new system, and ongoing system evaluation and maintenance. Specifically, it covers debugging syntax versus logic errors, different types of testing, methods for changeover to a new system, factors considered in system evaluation, and importance of ongoing system maintenance.
The document discusses different types of computer software. It defines software and describes the relationship between software and hardware. There are two major types of software: system software, which controls computer operations, and application software, which performs specific tasks. The document outlines how software is developed and acquired, including buying pre-written software, customizing software, and downloading public domain software. It also discusses firmware, middleware, and the steps involved in software development.
The document discusses secondary storage devices. It begins by explaining the limitations of primary storage like limited capacity and volatility. Secondary storage is then introduced as a way to overcome these limitations by having virtually unlimited capacity and storing data permanently. The document classifies common secondary storage devices as either sequential access or direct access, and provides magnetic tape as an example of sequential access and magnetic disks as an example of direct access. Specific details are then given about magnetic tapes, including their physical format and how data is stored on tracks in frames. Examples are provided to illustrate tape storage organization and blocking of records.
The document discusses different types of computers based on their mode of use. It describes notebook computers, personal computers, workstations, mainframe systems, supercomputers, client and server computers, and handheld computers. For each type, it provides details on their key characteristics, components, uses, and differences between types. The document concludes with a comparison table of the different computer types.
The document discusses computer languages and programming. It describes three categories of programming languages: machine languages, assembly languages, and high-level languages. It also discusses common programming language tools like assemblers, compilers, linkers, and interpreters. Popular programming languages like FORTRAN, COBOL, BASIC, Pascal, C, C++, C#, Java, RPG, LISP and SNOBOL are also mentioned. The key characteristics and uses of machine languages, assembly languages, high-level languages, compilers, linkers and interpreters are summarized.
The document discusses planning computer programs through algorithms, flowcharts, and pseudocode. It provides examples of algorithms to calculate the number of students who passed with first division and to calculate total bonus amounts for employees. It also describes how algorithms can be represented as programs, flowcharts, or pseudocode. Flowcharts use standardized symbols connected by arrows to show the sequence of instructions, and examples of decision symbols are shown. Finally, an example problem is provided to draw a flowchart to calculate and print a student's percentage marks based on input data.
The document discusses the internal structure and components of a computer's processor and memory. It describes the central processing unit (CPU) as having two main components - the control unit and arithmetic logic unit. The CPU contains registers for storing instructions and data temporarily during processing. Memory is classified as either volatile random access memory (RAM) or non-volatile read-only memory (ROM). Caches provide extremely fast temporary storage between the CPU and main memory to minimize processing speed differences. Different types of processors, memory technologies, and capacities are also outlined.
The document discusses the processor and memory architecture of a computer system. It covers the internal structure of the processor including the central processing unit (CPU), control unit, arithmetic logic unit, registers, and instruction set. It also discusses main memory, different types of processors like RISC, CISC, EPIC and multi-core, and memory concepts like word length, organization, and types of fixed and variable word-length memory. The goal is to explain the key components and concepts related to how the processor and memory work together in a computer system.
The document discusses multimedia and its components. It defines multimedia as the use of more than one media such as text, graphics, animation, audio, and video to present information. A multimedia computer system requires components like large storage, memory, and display to integrate different media types. Common multimedia applications include presentations, education, games, and virtual reality. The document outlines the key technologies used for each media type and features important for multimedia computers.
This document discusses the processor and memory components of a computer system. It covers the internal structure of the processor including the central processing unit (CPU) which contains the control unit and arithmetic logic unit. It describes the functions of commonly used registers and factors that determine processor speed. Different types of processors and memory are outlined, including RAM, ROM, and their uses. Memory capacity, organization, and evaluation criteria are also summarized.
The document discusses various input and output devices used in computer systems. It begins by defining input/output devices and their roles in facilitating communication between computers and the external world. It then describes several commonly used input devices such as keyboards, pointing devices, scanners, and microphones for speech recognition. The document provides examples and diagrams to illustrate how these devices function. It aims to help readers understand the basic concepts and purposes of the different I/O devices used in computer systems.
This document provides an overview of operating systems and some key concepts:
- An operating system manages computer resources and provides an interface between users and hardware. Its main functions include process management, memory management, file management, and security.
- Multiprogramming allows interleaved execution of multiple processes by using memory partitions and context switching between processes. Process states include ready, running, blocked, and completed.
- Memory management involves allocating and deallocating memory to processes as needed. Early systems used fixed-sized memory partitions while more advanced systems use variable partitions that dynamically change in size and location.
The document is the first chapter of a textbook on computer fundamentals. It introduces computers by defining them as electronic devices that can perform high-speed calculations and process data. It describes the characteristics of computers and how they have evolved over several generations from early mechanical calculators and vacuum tube-based machines to today's personal computers, servers and supercomputers. The chapter also outlines the key hardware and software technologies of each generation of computers.
This document discusses the basic organization and functions of a computer system. It describes the five basic operations of inputting, storing, processing, outputting, and controlling. It explains the roles of the main components including the input and output units, storage units, arithmetic logic unit, control unit, and central processing unit. Primary and secondary storage are also defined. The document presents the computer as a system made up of interconnected parts that work together to perform programmed instructions.
This document discusses different computer codes used to represent data internally in computers. It describes Binary Coded Decimal (BCD), Extended Binary Coded Decimal Interchange Code (EBCDIC), and American Standard Code for Information Interchange (ASCII). BCD uses 6 bits per character and can represent 64 characters. EBCDIC uses 8 bits and can represent 256 characters. It describes how numbers are represented in zoned and packed decimal format in EBCDIC. ASCII also uses 7 or 8 bits per character and can represent 128 or 256 characters respectively. Examples are provided to demonstrate how data is encoded in these different computer codes.
The document discusses different number systems including binary, decimal, octal and hexadecimal. It provides examples of how to represent numbers in these systems and convert between them. The key methods covered are using place values to convert between bases and a division-remainder approach to change from decimal to another base. The goal is to understand how computers use binary numbering and how to work with different bases.
The document discusses computer arithmetic and binary numbers. It begins by explaining why computers use the binary number system instead of decimal. The key reasons are that electronic components can only represent two states, binary is simpler for circuit design, and arithmetic is possible with binary. The document then covers the basic arithmetic operations of addition, subtraction, multiplication, and division in binary. It provides rules for each operation and examples to illustrate how to perform the calculations in binary. Finally, it discusses complementary subtraction and the additive method for multiplication and division.
The document discusses Boolean algebra and logic circuits. It covers Boolean algebra, Boolean functions, logic gates, and logic circuits. Boolean algebra uses binary numbers and logic operators like AND, OR, and NOT. Boolean functions can be represented as algebraic expressions or truth tables. Minimizing Boolean functions reduces the number of literals and terms to simplify logic circuits. The document also provides examples of theorems and proofs in Boolean algebra.
The document discusses various input and output devices used in computer systems. It begins by defining input/output devices and their roles in facilitating communication between computers and the external world. It then describes several commonly used input devices such as keyboards, pointing devices, scanners, and microphones for speech recognition. The document provides examples and diagrams to illustrate how these devices function. It aims to help readers understand the basic concepts and purposes of the different I/O devices used in computer systems.
The document discusses the Internet and its basic services. It describes how the Internet evolved from ARPANET and initially connected research organizations. It grew rapidly in the late 1980s and now interconnects over 30,000 networks worldwide. The Internet provides services like email, file transfer, telnet, and usenet news. It also discusses the World Wide Web, how web pages use HTML, and how browsers allow users to access and navigate web pages through URLs. Common uses of the Internet mentioned include online communication, software sharing, product promotion, and e-commerce.
The document discusses different types of computers based on their mode of use. It describes notebook computers, personal computers, workstations, mainframe systems, supercomputers, clients and servers, and handheld computers. For each type, it provides details on their typical uses, characteristics, operating systems, vendors, and how they differ from each other.
The document discusses secondary storage devices. It provides learning objectives about secondary storage devices, their classification, differences between sequential and direct access storage, and operation of popular devices like magnetic tapes, disks, and optical disks. Specific topics covered include limitations of primary storage, definitions of secondary storage, sequential vs direct access devices, magnetic tape organization, storage capacity and transfer rates, tape drives and controllers, and examples of different tape formats.
This document discusses different numeral systems including binary, decimal, and hexadecimal. It provides details on:
- How each system represents numbers using different bases and numerals
- Converting between the numeral systems by multiplying digits by their place value or dividing and taking remainders
- How computers internally represent integer and floating-point numbers, including sign representation and IEEE 754 standard
- How text is encoded using character codes like ASCII and stored as strings with null terminators
This document provides an overview of computer fundamentals and hardware components. It defines a computer as a machine that processes data under a program's instructions. Key hardware components include the processor for carrying out instructions, memory for storing programs and data, and storage devices like hard drives, flash drives, and cloud storage. Input devices discussed are keyboards, mice, touchscreens, and scanners. Output devices covered are monitors in the forms of CRT and flat panels, and printers like inkjet, laser, and dot matrix. The document also distinguishes between data, information, and software applications.
The document discusses secondary storage devices. It provides learning objectives about secondary storage devices, their classification, differences between sequential and direct access storage, and operation of popular devices like magnetic tapes, disks, and optical disks. Specific topics covered include limitations of primary storage, definitions of secondary storage, sequential vs direct access devices, magnetic tape organization, storage capacity and transfer rates, tape drives and controllers, and examples of different tape formats.
The document discusses operating systems and their key functions. It covers topics like process management, memory management, file management, and security. Process management involves scheduling processes to minimize idle processor time. Memory management involves tracking used and unused memory and allocating it to processes. Multiprogramming allows interleaved execution of multiple processes by dividing memory into partitions. Time-sharing systems allow interactive use by many users simultaneously through quick process switching.
The document discusses the Internet and its basic services. It describes how the Internet evolved from ARPANET and initially connected research organizations. It grew rapidly in the late 1980s and now interconnects over 30,000 networks worldwide. The Internet provides services like email, file transfer, telnet, and usenet news. It also discusses the World Wide Web, how web pages use HTML, and how browsers allow users to access and navigate web pages through URLs. Common uses of the Internet mentioned include online communication, software sharing, product promotion, and e-commerce.
The document describes the binary search algorithm for searching a sorted array. It has a time complexity of O(Logn) compared to linear search which is O(n). Binary search works by comparing the target value to the middle element of the array and recursively searching either the left or right half depending on if the target is less than or greater than the middle element. Implementations of both recursive and iterative binary search in C are provided.
The document discusses the internal structure and components of a computer's processor and memory. It describes the central processing unit (CPU) as having two main components - the control unit and arithmetic logic unit. The CPU contains registers for storing instructions and data temporarily during processing. Memory is classified as either volatile random access memory (RAM) or non-volatile read-only memory (ROM). Caches provide extremely fast temporary storage between the CPU and main memory to minimize processing speed differences. Different types of processors, memory technologies, and capacities are also outlined.
The document discusses the processor and memory architecture of a computer system. It covers the internal structure of the processor including the central processing unit (CPU), control unit, arithmetic logic unit, registers, and instruction set. It also discusses main memory, different types of processors like RISC, CISC, EPIC and multi-core, and memory concepts like word length, organization, and types of fixed and variable word-length memory. The goal is to explain the key components and concepts related to how the processor and memory work together in a computer system.
The document discusses multimedia and its components. It defines multimedia as the use of more than one media such as text, graphics, animation, audio, and video to present information. A multimedia computer system requires components like large storage, memory, and display to integrate different media types. Common multimedia applications include presentations, education, games, and virtual reality. The document outlines the key technologies used for each media type and features important for multimedia computers.
This document discusses the processor and memory components of a computer system. It covers the internal structure of the processor including the central processing unit (CPU) which contains the control unit and arithmetic logic unit. It describes the functions of commonly used registers and factors that determine processor speed. Different types of processors and memory are outlined, including RAM, ROM, and their uses. Memory capacity, organization, and evaluation criteria are also summarized.
The document discusses various input and output devices used in computer systems. It begins by defining input/output devices and their roles in facilitating communication between computers and the external world. It then describes several commonly used input devices such as keyboards, pointing devices, scanners, and microphones for speech recognition. The document provides examples and diagrams to illustrate how these devices function. It aims to help readers understand the basic concepts and purposes of the different I/O devices used in computer systems.
This document provides an overview of operating systems and some key concepts:
- An operating system manages computer resources and provides an interface between users and hardware. Its main functions include process management, memory management, file management, and security.
- Multiprogramming allows interleaved execution of multiple processes by using memory partitions and context switching between processes. Process states include ready, running, blocked, and completed.
- Memory management involves allocating and deallocating memory to processes as needed. Early systems used fixed-sized memory partitions while more advanced systems use variable partitions that dynamically change in size and location.
The document is the first chapter of a textbook on computer fundamentals. It introduces computers by defining them as electronic devices that can perform high-speed calculations and process data. It describes the characteristics of computers and how they have evolved over several generations from early mechanical calculators and vacuum tube-based machines to today's personal computers, servers and supercomputers. The chapter also outlines the key hardware and software technologies of each generation of computers.
This document discusses the basic organization and functions of a computer system. It describes the five basic operations of inputting, storing, processing, outputting, and controlling. It explains the roles of the main components including the input and output units, storage units, arithmetic logic unit, control unit, and central processing unit. Primary and secondary storage are also defined. The document presents the computer as a system made up of interconnected parts that work together to perform programmed instructions.
This document discusses different computer codes used to represent data internally in computers. It describes Binary Coded Decimal (BCD), Extended Binary Coded Decimal Interchange Code (EBCDIC), and American Standard Code for Information Interchange (ASCII). BCD uses 6 bits per character and can represent 64 characters. EBCDIC uses 8 bits and can represent 256 characters. It describes how numbers are represented in zoned and packed decimal format in EBCDIC. ASCII also uses 7 or 8 bits per character and can represent 128 or 256 characters respectively. Examples are provided to demonstrate how data is encoded in these different computer codes.
The document discusses different number systems including binary, decimal, octal and hexadecimal. It provides examples of how to represent numbers in these systems and convert between them. The key methods covered are using place values to convert between bases and a division-remainder approach to change from decimal to another base. The goal is to understand how computers use binary numbering and how to work with different bases.
The document discusses computer arithmetic and binary numbers. It begins by explaining why computers use the binary number system instead of decimal. The key reasons are that electronic components can only represent two states, binary is simpler for circuit design, and arithmetic is possible with binary. The document then covers the basic arithmetic operations of addition, subtraction, multiplication, and division in binary. It provides rules for each operation and examples to illustrate how to perform the calculations in binary. Finally, it discusses complementary subtraction and the additive method for multiplication and division.
The document discusses Boolean algebra and logic circuits. It covers Boolean algebra, Boolean functions, logic gates, and logic circuits. Boolean algebra uses binary numbers and logic operators like AND, OR, and NOT. Boolean functions can be represented as algebraic expressions or truth tables. Minimizing Boolean functions reduces the number of literals and terms to simplify logic circuits. The document also provides examples of theorems and proofs in Boolean algebra.
The document discusses various input and output devices used in computer systems. It begins by defining input/output devices and their roles in facilitating communication between computers and the external world. It then describes several commonly used input devices such as keyboards, pointing devices, scanners, and microphones for speech recognition. The document provides examples and diagrams to illustrate how these devices function. It aims to help readers understand the basic concepts and purposes of the different I/O devices used in computer systems.
The document discusses the Internet and its basic services. It describes how the Internet evolved from ARPANET and initially connected research organizations. It grew rapidly in the late 1980s and now interconnects over 30,000 networks worldwide. The Internet provides services like email, file transfer, telnet, and usenet news. It also discusses the World Wide Web, how web pages use HTML, and how browsers allow users to access and navigate web pages through URLs. Common uses of the Internet mentioned include online communication, software sharing, product promotion, and e-commerce.
The document discusses different types of computers based on their mode of use. It describes notebook computers, personal computers, workstations, mainframe systems, supercomputers, clients and servers, and handheld computers. For each type, it provides details on their typical uses, characteristics, operating systems, vendors, and how they differ from each other.
The document discusses secondary storage devices. It provides learning objectives about secondary storage devices, their classification, differences between sequential and direct access storage, and operation of popular devices like magnetic tapes, disks, and optical disks. Specific topics covered include limitations of primary storage, definitions of secondary storage, sequential vs direct access devices, magnetic tape organization, storage capacity and transfer rates, tape drives and controllers, and examples of different tape formats.
This document discusses different numeral systems including binary, decimal, and hexadecimal. It provides details on:
- How each system represents numbers using different bases and numerals
- Converting between the numeral systems by multiplying digits by their place value or dividing and taking remainders
- How computers internally represent integer and floating-point numbers, including sign representation and IEEE 754 standard
- How text is encoded using character codes like ASCII and stored as strings with null terminators
This document provides an overview of computer fundamentals and hardware components. It defines a computer as a machine that processes data under a program's instructions. Key hardware components include the processor for carrying out instructions, memory for storing programs and data, and storage devices like hard drives, flash drives, and cloud storage. Input devices discussed are keyboards, mice, touchscreens, and scanners. Output devices covered are monitors in the forms of CRT and flat panels, and printers like inkjet, laser, and dot matrix. The document also distinguishes between data, information, and software applications.
The document discusses secondary storage devices. It provides learning objectives about secondary storage devices, their classification, differences between sequential and direct access storage, and operation of popular devices like magnetic tapes, disks, and optical disks. Specific topics covered include limitations of primary storage, definitions of secondary storage, sequential vs direct access devices, magnetic tape organization, storage capacity and transfer rates, tape drives and controllers, and examples of different tape formats.
The document discusses operating systems and their key functions. It covers topics like process management, memory management, file management, and security. Process management involves scheduling processes to minimize idle processor time. Memory management involves tracking used and unused memory and allocating it to processes. Multiprogramming allows interleaved execution of multiple processes by dividing memory into partitions. Time-sharing systems allow interactive use by many users simultaneously through quick process switching.
The document discusses the Internet and its basic services. It describes how the Internet evolved from ARPANET and initially connected research organizations. It grew rapidly in the late 1980s and now interconnects over 30,000 networks worldwide. The Internet provides services like email, file transfer, telnet, and usenet news. It also discusses the World Wide Web, how web pages use HTML, and how browsers allow users to access and navigate web pages through URLs. Common uses of the Internet mentioned include online communication, software sharing, product promotion, and e-commerce.
The document describes the binary search algorithm for searching a sorted array. It has a time complexity of O(Logn) compared to linear search which is O(n). Binary search works by comparing the target value to the middle element of the array and recursively searching either the left or right half depending on if the target is less than or greater than the middle element. Implementations of both recursive and iterative binary search in C are provided.
Sequential and binary search algorithms are used to search for items in a collection. Sequential search scans the entire collection sequentially to find a match, while binary search works by repeatedly dividing the search interval in half and focusing on only one subdivision, making it faster for sorted data. The document then provides pseudocode for an unordered sequential search and walks through an example of searching for a number using binary search on a sorted array.
Binary Search - Design & Analysis of AlgorithmsDrishti Bhalla
Binary search is an efficient algorithm for finding a target value within a sorted array. It works by repeatedly dividing the search range in half and checking the value at the midpoint. This eliminates about half of the remaining candidates in each step. The maximum number of comparisons needed is log n, where n is the number of elements. This makes binary search faster than linear search, which requires checking every element. The algorithm works by first finding the middle element, then checking if it matches the target. If not, it recursively searches either the lower or upper half depending on if the target is less than or greater than the middle element.
Minterms and maxterms are ways to represent Boolean functions. Minterms are AND terms with all variable combinations, while maxterms are OR terms. There are 2^n minterms and maxterms for n variables. Minterms and maxterms are related, with each minterm being the complement of a corresponding maxterm. Boolean functions can be expressed as the sum of minterms or product of maxterms. The minterms/maxterms used correspond to the 1s/0s in the function table.
This document discusses different types of computer software. It defines software and differentiates it from hardware. There are two main types of software: system software, which controls computer operations, and application software, which performs specific tasks. Software is developed through a process including analysis, coding, testing, implementation, and maintenance. Other topics covered include the relationships between hardware, software and users, and ways of acquiring software such as buying pre-written programs or developing customized solutions.
The document discusses different types of computer software. It defines software and differentiates it from hardware. There are two main types of software: system software and application software. System software makes the computer system more efficient and provides support for application software, while application software is designed to perform specific tasks. The document also outlines how software is developed, acquired, and the roles of firmware and middleware.
The document discusses different types of computer software. It defines software and differentiates it from hardware. There are two main types of software: system software and application software. System software makes the computer system more efficient and provides support for application software, while application software is designed to perform specific tasks. The document also outlines how software is developed, acquired, and the roles of firmware and middleware.
Complete DBMS notes..with special attention to SQL commands and advanced SQL commands, Transaction management. The below post is notes prepared by me by studying the book "Database Systems Design, Implementation and Management" by Peter Rob and Carlos Coronel
Content, examples and diagrams are taken from that book.
This document provides an introduction to data management. It discusses the importance of data management for making informed decisions and gaining a competitive advantage. It also outlines some key benefits of good data management, such as improved data quality and decision making, and costs of poor data management like wasted time and money. Additionally, it describes different approaches to data management like file-based and database management systems, and covers concepts such as data modeling, databases, and different database models.
The document discusses system analysis and recording information. It describes the PARIS model for system analysis, which includes planning, asking questions, recording information, interpreting information, and specifying requirements. It also discusses using data flow diagrams and entity models to record information about current and required systems, including the components of DFDs and how they are used to hierarchically represent a system. Entity models represent relationships between types of data.
This document provides an outline for a course on electronic data processing and databases. It covers topics such as managing files, database management systems, database models like relational and hierarchical, features of DBMS including data dictionaries and security. It also discusses databases and the new economy including e-commerce and data mining. The last section discusses ethics around manipulating media and ensuring accuracy and privacy of databases.
The document provides an introduction to database management systems. It defines key terms like data, information, database, and record. It describes the differences between manual and computerized data processing. It explains that a database management system (DBMS) is software that manages databases and allows data to be easily accessed, managed, and updated. It then discusses the history of DBMS, common applications of databases, the data processing cycle, features of databases, types of database users, concepts of data abstraction, and database system architectures.
The document provides an introduction to database management systems and related concepts. It defines key terms like data, information, database, and record. It describes the differences between manual and computerized data processing. It then discusses traditional file-based data storage approaches and their limitations. The document introduces database management systems and their applications. It provides a brief history of DBMS and discusses the data processing cycle and the roles of different database users. Finally, it covers various database models including hierarchical, network, relational, object-oriented, and object-relational models.
This document describes a bank management system project developed by Nikhil K Phalke. The project aims to automate manual bank processes using Visual Basic and SQL Server. It allows users to open new accounts, make deposits, withdrawals, check credit and apply for loans. The system improves efficiency over the existing manual system by reducing errors, storing customer records efficiently and providing faster retrieval of information. The system requirements, data flow diagram, entity relationship diagram, forms, and advantages are outlined. The project aims to provide a structured, secure and presentable way to manage all bank activities and documentation.
This document provides an introduction to relational database management systems and their components. It discusses the evolution of databases from traditional file processing systems to relational database models. The key components of a database system are described as hardware, software, data, and users. Database management aims to facilitate data sharing across functional units, user levels, and locations through centralized data control and definition. The roles of database administrators are outlined as designing databases, training users, and ensuring security and integrity.
This document provides an introduction to database management systems and Microsoft Access. It discusses who needs a database and the differences between data and information. Key database concepts are explained, including data processing activities, database terminology, database management systems, relational database management systems and their applications. Different types of databases are also outlined.
This document provides an overview of operating systems and some key concepts:
- An operating system manages computer resources and provides an interface between users and hardware. Its main functions include process management, memory management, file management, and security.
- Multiprogramming allows interleaved execution of multiple processes by using memory partitions and context switching between processes. Process states include ready, running, blocked, and completed.
- Memory management involves allocating and deallocating memory to processes as needed. Early systems used fixed-sized memory partitions while more advanced systems use variable partitions that dynamically change in size and location.
This document discusses operating systems and provides an overview of key concepts. It defines an operating system as an integrated set of programs that controls computer resources to make the system convenient to use and manage resources. The main functions of an operating system are listed as process management, memory management, file management, security, and command interpretation. Process management mechanisms in early systems like manual loading, batch processing, and job control languages are described. Multiprogramming, its types, and process states are also summarized.
This chapter discusses database management and describes key concepts. It explains that data must be organized and processed to become useful information. Various techniques are presented for maintaining high quality data, including adding, changing, deleting records, and validating data. The chapter differentiates between a file processing system and database approach, describing how databases reduce redundancy and improve access. It also outlines the functions of database management systems and characteristics of different database types like relational, object-oriented and multidimensional. Finally, the roles of database analysts, administrators and users are discussed.
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISSukanya Ben
This document discusses databases and database management systems. It begins by outlining some of the problems with managing data in traditional file environments, including data redundancy, inconsistency, and lack of flexibility. It then describes how database management systems (DBMS) address these issues by providing a centralized data repository and controlling access. The document focuses on relational DBMS and how they represent data through tables with rows and columns. It also describes basic relational operations like select, join, and project that allow users to extract useful information from these databases.
The document discusses different types of computer software. It defines software and distinguishes between system software and application software. System software makes the computer system work efficiently and enables development of application software. Application software performs specific tasks like word processing. The document also covers topics like acquiring software through various methods, the software development process, firmware, and middleware.
This document discusses computer software, including:
- The relationship between software and hardware and different types of software like system software and application software.
- The logical system architecture showing the relationship between hardware, system software, application software, and users.
- Different ways of acquiring software like buying pre-written software or developing customized software.
- The advantages and limitations of each acquisition method.
- The typical steps involved in software development like problem analysis, coding, testing, and maintenance.
- What firmware is and its use in computer systems.
This document discusses data and information. It defines data as raw facts and figures that have not been processed, while information is processed data that is more meaningful. Different types of data are described such as numeric, alphabetic, alphanumeric, image, audio and video data. File processing systems are also discussed, noting their disadvantages including data redundancy, inconsistency, isolation, integrity problems, program dependency, lack of atomicity, security issues, and difficulty of program maintenance.
The basic concept for the data structure.
It covers these topics
System Life Cycle
Algorithm Specification
Data Abstraction
Performance Analysis
Space Complexity
Time Complexity
Asymptotic Notation
Text Book: Fundamentals of Data Structures in C++
E. Horowitz, et al.
This document contains exercises related to inverse functions and their properties. It includes 53 multi-part exercises involving determining if functions are inverses, composing functions, finding inverse functions, and evaluating derivatives of inverse functions. The exercises involve algebraic manipulation and graphical analysis of functions and their inverses.
Solution Manual : Chapter - 06 Application of the Definite Integral in Geomet...Hareem Aslam
This document contains exercises involving calculating areas and volumes using definite integrals. There are 23 exercises finding the area under curves or between curves over given intervals using integrals, and 13 exercises finding volumes of solids of revolution using integrals. The integrals require setting up antiderivatives and evaluating between limits.
1. The document presents an exercise set involving the integration and differentiation of various functions. It contains problems involving the calculation of areas under curves, derivatives, integrals, and finding functions given their derivatives or known points.
2. The exercise set contains over 40 problems involving concepts like derivatives, integrals, areas under curves, finding functions from known derivatives or points, and applying integration techniques to solve problems across different domains.
3. The problems progress from simpler integrals and derivatives to more complex problems integrating and differentiating composite functions, trigonometric functions, and applying integration to find functions and solve applied problems.
Solution Manual : Chapter - 02 Limits and ContinuityHareem Aslam
This document contains solutions to exercise sets on limits and continuity from a textbook. Exercise Set 2.1 contains solutions to 23 problems evaluating limits of functions as the input values approach certain numbers. Exercise Set 2.2 contains solutions to 38 similar problems evaluating limits. Exercise Set 2.3 contains solutions to 23 additional limit evaluation problems. The document provides the step-by-step workings and conclusions for each problem.
This document contains exercises involving functions and graphs. There are multiple choice and free response questions testing understanding of properties of functions including domain, range, intercepts, maxima/minima, and graphing functions. Solutions are provided for checking work.
The document discusses personality development and defines personality as a blend of temperament, emotion, principles, and behavior that starts developing in childhood. It notes that personality can be molded by life experiences and improved over time. Important features of personality include cleanliness, honesty, unselfishness, courtesy, respect, kindness, confidence, and open-mindedness. One's personality is impacted by relationships with family, friends, and colleagues. Body language can provide clues about personality traits like confidence, shyness, and comfort levels. Grooming, avoiding gossip, self-acceptance, public speaking practice, and self-love can help develop a good personality.
This document discusses multimedia and multimedia computer systems. It defines multimedia as using more than one type of media (text, graphics, audio, video, etc.) to present information. A multimedia computer system is able to integrate different media types and requires components like large storage, memory, and I/O devices to handle multimedia files. Common media types are described along with their uses and associated hardware. Examples of multimedia applications and a media center computer are also outlined.
This document discusses computer languages and provides an overview of the different categories of computer languages:
- Machine languages are directly understood by computers but are difficult for humans to read and program in.
- Assembly languages use mnemonic codes to provide a level of abstraction over machine language.
- High-level languages allow programming at a higher level of abstraction and are machine independent.
It also describes common language tools like assemblers, compilers, and interpreters used to translate between low and high-level languages. Popular programming languages in different categories are also listed.
The document discusses planning computer programs through algorithms, flowcharts, and pseudocode. It provides examples of algorithms for calculating exam results and employee bonuses. It also shows flowcharts representing the algorithm examples and basic flowchart symbols used like processing, decision, input/output, and flow line connectors. Planning helps ensure a program's instructions are appropriate, in the correct sequence, and will terminate with the desired results.
The document discusses input and output devices used in computer systems. It describes how input devices such as keyboards, mice, and scanners are used to enter data into a computer, while output devices like monitors display processed data to users. The document outlines various common input devices including keyboards, pointing devices, scanners, and speech recognition tools. It also provides examples of these devices and how they function.
The document discusses secondary storage devices and focuses on magnetic tape. It defines secondary storage and its advantages over primary storage. It classifies common secondary storage devices as sequential or direct access. The document then describes the basic components, storage organization, capacity, transfer rate, and operation of magnetic tapes. Magnetic tape is presented as a sequential access storage device that stores data in the form of magnetic spots on a tape ribbon.
The document discusses the processor, memory, and their basic architecture in a computer system. It covers the internal structure of the processor including the central processing unit (CPU) and its two components - the control unit and arithmetic logic unit. It describes the main memory, different types of processors like RISC, CISC, EPIC and multi-core, and characteristics of the memory like volatile nature, random access, and organization. Types of registers and factors affecting processor speed are also summarized.
The document provides an overview of computer fundamentals and the evolution of computers through different generations. It discusses how computers can perform high-speed calculations and process data. The key characteristics of computers are described such as their automatic, speedy, accurate, and versatile nature. The evolution of early mechanical calculators and computers is summarized, followed by the defining features of the five generations of computers including the technologies and applications that emerged with each generation from the 1940s to the present.
Digital Logic & Computer Design (2th Ed.)
By Morris Mano
Contents Ch 7 - Ch 12
Published By: Muhammad Hassan Riaz Yousufi
for video Lectures :
http://sh.st/Qsql9
The document repeatedly provides information about downloading and reading books online at WWW.ISSUU.COM/SHEIKHUHASSAN, which is presented as a site for the works of Muhammad Hassan Riaz Yousufi. It includes passages in Arabic and references to God and the Prophet Muhammad. The same few lines of text are repeated many times throughout the document.
The chapter Lifelines of National Economy in Class 10 Geography focuses on the various modes of transportation and communication that play a vital role in the economic development of a country. These lifelines are crucial for the movement of goods, services, and people, thereby connecting different regions and promoting economic activities.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Chapter 16 bdp
1. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 1/32Chapter 16: Business Data ProcessingRef. Page
2. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 2/32Chapter 16: Business Data ProcessingRef. Page
In this chapter you will learn about:
§ Difference between data and information
§ Data processing converts raw data into useful information
§ Data storage hierarchy commonly used to facilitate data
processing
§ Standard methods of organizing data
§ Basic concepts of database systems
Learning ObjectivesLearning Objectives
295
3. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 3/32Chapter 16: Business Data ProcessingRef. Page
§ Data is a collection of facts – unorganized but able to
be organized into useful information
§ Information is data arranged in an order and form that
is useful to the people who receive it
§ Data processing is a series of actions or operations
that converts data into useful information
§ A data processing system includes resources such as
people, procedures, and devices used to process input
data for producing desirable output
Data ProcessingData Processing
295
4. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 4/32Chapter 16: Business Data ProcessingRef. Page
Character
Field
Record
File
Database
Level 0
Level 1
Level 2
Level 3
Level 4
Level 5
Bit A single binary digit (0 or 1)
Multiple related bits are combined to
form a character (byte)
Multiple related characters are combined to
form a field
Multiple related fields are combined to
form a record
Multiple related records are combined to
form a file
Multiple related files are integrated to
form a database
Data Storage HierarchyData Storage Hierarchy
296
5. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 5/32Chapter 16: Business Data ProcessingRef. Page
0001
Employee CodeFirst NameLast NameHours workedHourly rateTax rate
Pradeep Sinha 45 12.00 0.08
Fields
0002
Employee CodeFirst NameLast NameHours workedHourly rateTax rate
Ravi Patel 42 10.00 0.07
0003
Employee CodeFirst NameLast NameHours workedHourly rateTax rate
Pratap Singh 43 15.00 0.10
0004
Employee CodeFirst NameLast NameHours workedHourly rateTax rate
Kumar Rana 40 14.00 0.09
Arecord
A field having
4 characters
Records
of a file
Relationship Among
Character, Field, Record, and File
Relationship Among
Character, Field, Record, and File
297
6. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 6/32Chapter 16: Business Data ProcessingRef. Page
§ File-oriented approach: Application’s data is organized
into one or more files and application program processes
them to generate the desired output
§ Database-oriented approach: Data from multiple
related files are integrated together to form a database:
§ Provides greater query flexibility
§ Reduces data redundancy
§ Solves data integrity (inconsistency) problem
§ Makes data independent of the application programs
§ Includes data security features at database level,
record level, and field level
(Continued on next slide)
Standard Methods of Organizing DataStandard Methods of Organizing Data
297
7. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 7/32Chapter 16: Business Data ProcessingRef. Page
§ In file-oriented approach of organizing data, an
application’s data is organized into one or more files
§ Application program processes the data stored in these
files to generate the desired output
§ Set of programs is provided to facilitate the users in
organizing, creating, deleting, updating, and
manipulating their files
§ All these programs together form a File Management
System (FMS)
File Management SystemFile Management System
299
8. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 8/32Chapter 16: Business Data ProcessingRef. Page
A file management system supports following file types:
§ Transaction file: Stores input data until it can be
processed
§ Master file: Contains all current data relevant to an
application
§ Output file: Stores output produced by one program
that is used as input to another program
§ Report file: Holds a copy of a report generated by an
application
§ Backup file: Copy of a file, created as a safety
precaution against loss of data
File TypesFile Types
299
9. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 9/32Chapter 16: Business Data ProcessingRef. Page
§ File organization is the physical organization of the
records of a file for convenience of storage and retrieval
of data records
§ Three commonly used file organizations are:
§ Sequential: Records are stored one after another in
ascending or descending order determined by the
value of the key field of the records
§ Direct/random: Desired record pertaining to current
transaction can be directly located by its key field
value without having to navigate through sequence of
other records
(Continued on next slide)
File OrganizationsFile Organizations
300
10. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 10/32Chapter 16: Business Data ProcessingRef. Page
§ Indexed sequential: There are two files for every
data file – the data file which contains the records
stored in the file, and the smaller index file which
contains the key and disk address of each record
stored in the data file
(Continued from previous slide)
File OrganizationsFile Organizations
300
11. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 11/32Chapter 16: Business Data ProcessingRef. Page
0001
Employee
Code (key)
Address
Location
1003
1001
1004
0002
0003
0004 1002
Address
Location
Employee Record
1001 0002 R. S. Patel …
1002
1003
1004
0004 R. K. Rana …
0001 K. P. Sinha …
0003 N. P. Singh …
Index file Data file
Organization of An Indexed
Sequential File
Organization of An Indexed
Sequential File
302
12. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 12/32Chapter 16: Business Data ProcessingRef. Page
§ Routines to perform a variety of generalized operations
on data files
§ Operations performed by some commonly used file
utilities are Sorting, Searching, Merging, Copying,
Printing, and Maintenance
File UtilitiesFile Utilities
303
13. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 13/32Chapter 16: Business Data ProcessingRef. Page
---1213
---3202
---1178
---2176
---1124
---3123
---2101
Other fields (Name,
Address, Qualification,
Basic Salary, etc.)
Department
Code
Employee
Code
Sorting on ascending employee code sequence
Sorting On One KeySorting On One Key
303
14. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 14/32Chapter 16: Business Data ProcessingRef. Page
---3202
---3123
---2176
---2101
---1213
---1178
---1124
Other fields (Name, Address,
Qualification, Basic Salary,
etc.)
Department
Code
Employee
Code
Sorting on a ascending employee code (secondary
key) within ascending department code (primary key)
Sorting On Two KeySorting On Two Key
303
15. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 15/32Chapter 16: Business Data ProcessingRef. Page
Merging of files A and B to produce file C
File C
Employee
code
Other
fields
Input file
125
127
137
146
159
…
…
…
…
…
Employee
code
Other
fields
Output file
…
112
119
125
127
129
…
…
…
…
Employee
code
Other
fields
Input file
112
119
129
150
152
…
…
…
…
…
137
139
146
150
152
…
…
…
…
159
…
File A
File B
139
…
…
Merging of Two FilesMerging of Two Files
304
16. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 16/32Chapter 16: Business Data ProcessingRef. Page
§ In database-oriented approach of organizing data, a
set of programs is provided to facilitate users in
organizing, creating, deleting, updating, and
manipulating data in a database
§ All these programs together form a Database
Management System (DBMS)
Database Management SystemDatabase Management System
305
17. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 17/32Chapter 16: Business Data ProcessingRef. Page
§ Database model defines the manner in which the
various files of a database are linked together.
§ Four commonly used database models are:
§ Hierarchical
§ Network
§ Relational
§ Object-oriented
Database ModelsDatabase Models
305
18. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 18/32Chapter 16: Business Data ProcessingRef. Page
Organization
Personnel
Department
Finance
Department
Technical
Department
Managers Support
Staff
Managers Engineers Technicians
Support
Staff
Managers
Support
Staff
A parent element
A child element
HierarchicalDatabaseHierarchicalDatabase
306
19. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 19/32Chapter 16: Business Data ProcessingRef. Page
College
English Hindi Maths Computer
Science
Seeta Geeta Ram Mohan Sohan Raju
A child element can have more
than one parent element
This child element has no
parent element
Network DatabaseNetwork Database
307
20. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 20/32Chapter 16: Business Data ProcessingRef. Page
A-11, Vrindavan, Pune-7T. N. Murli16185
B-16, Anand Park, Pune-5P. K. Sen11348
B-05, Royal Villa, Pune-3S. K. Ray23466
A-12, Nandanvan, Pune-2R. S. Gupta32228
D-18, Vrindavan, Pune-7R. Pandey12859
A-22, Anand Park, Pune-5D. P. Singh62853
C-15, Sarita Vihar, Pune-7K. N. Raina83569
Member’s AddressMember’s
name
Membership
No.
(a) Members data table.
12-11-200718-23614-111348
15-11-200713-48049-862853
06-11-200771606-214-012859
05-12-200722-68111-716185
10-11-200713-201702-532228
08-11-200789303-530-011348
10-12-200727-21675-212859
Due Date
(DD-MM-YYYY)
Book No.
(ISBN)
Borrower
(Membership No.)
(b) Borrowed books data table
P. N. DixitDatabase Systems89303-530-0
A. N. RaiComputer Networks71606-214-0
R. P. RajanC++ Programming27-21675-2
K. RameshFundamentals of Computers22-68111-7
N. K. SharmaAstrology for You18-23614-1
S. S. DubeyConcepts of Chemistry13-48049-8
H. C. VermaConcepts of Physics13-201702-5
AuthorBook TitleBook No. (ISBN)
(c) Books data table
Relational DatabaseRelational Database
308
21. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 21/32Chapter 16: Business Data ProcessingRef. Page
A report of overdue books as of 10-11-2007 from the
sample database of previous slide
List of overdue books as on 10-11-2007
A. N. RaiComputer
Networks
71606-214-006-11D-18,
Vrindavan,
Pune-7
R. Pandey12859
H. C. VermaConcepts of
Physics
13-201702-510-11A-12,
Nandanvan,
Pune-2
R. S. Gupta32228
P. N. DixitDatabase
Systems
89303-530-008-11B-16,
Anand Park,
Pune-5
P. K. Sen11348
Book
Author
Book TitleBook No.Due
Date
Member’s
Address
Member’s
Name
Membership
No.
Sample ReportSample Report
308
22. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 22/32Chapter 16: Business Data ProcessingRef. Page
Object-Oriented DatabaseObject-Oriented Database
Id
Color
Specifications
Manufacturer
Length
Width
Height
Engine Type
Fuel Type
Fuel Tank Capacity
No. of Wheels
Vehicle VehicleSpecs
Other details
of the vehicle
like with/
without gear,
seating
capacity, etc.
TwoWheeler FourWheeler
Other details
of the vehicle
like no. of
doors, seating
capacity, etc.
Name
Location
President
Company
Id
Name
Age
Employee
Other details of
the company
DomesticCompany
Other details of
the company
ForeignCompany
Class/subclass link
Attribute/domain link
309
23. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 23/32Chapter 16: Business Data ProcessingRef. Page
§ DBMS allows users to organize, process and retrieve
selected data from a database without knowing about
the underlying database structure
§ Four major components of a DBMS that enable this
are:
§ Data Definition Language (DDL): Used to define the
structure (schema) of a database
§ Data Manipulation Language (DML): Provides
commands to enable the users to enter and
manipulate the data
(Continued on next slide)
Main Components of a DBMSMain Components of a DBMS
310
24. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 24/32Chapter 16: Business Data ProcessingRef. Page
§ Query Language: Enables users to define their
requirements for extracting the desired information
from the database in the form of queries
§ Report generator: Enables the users of a database
to design the layout of a report so that it can be
presented in the desired format
(Continued from previous slide)
Main Components of a DBMSMain Components of a DBMS
310
25. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 25/32Chapter 16: Business Data ProcessingRef. Page
Creation of a database is a three step process:
§ Defining its structure (schema)
§ Designing forms (custom screens) for displaying and
entering data
§ Entering the data into it
Creating a DatabaseCreating a Database
312
26. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 26/32Chapter 16: Business Data ProcessingRef. Page
EMPLOYEE DATABASE DATA ENTRY FORM
EMPLOYEE ID: 856392 SEX: M AGE: 42
LAST NAME:
FIRST NAME:
MIDDLE NAME:
SINHAEMPLOYEE NAME:
PRADEEP
KUMAR
ADDRESS 1:
ADDRESS 2:
CITY:
STATE:
POSTAL CODE:
F/8, ANAND PARKCONTACT ADDRESS:
SOCIETY, AUNDH
PUNE
MH
411007
TELEPHONE NO.: (020) 5680-489
ANY OTHER INFORMATION: IS FLUENT IN JAPANESE LANGUAGE
Sample Database FormSample Database Form
313
27. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 27/32Chapter 16: Business Data ProcessingRef. Page
§ All database systems provide commands to view,
modify, delete, or add records of an already
established database
§ Many database systems also provide a facility to set up
a filter allowing user to browse through and view only
those records that meet some criterion
Viewing, Modifying, Deleting, and
Adding Records
Viewing, Modifying, Deleting, and
Adding Records
314
28. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 28/32Chapter 16: Business Data ProcessingRef. Page
Commonly supported features for enabling a user to
search for desired information in a database are:
§ Find command: Used for simple database queries
§ Query language: Used for more complex database
queries
§ Query By Example (QBE): Provides a simple user
interface for specifying search criteria
Searching a DatabaseSearching a Database
315
29. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 29/32Chapter 16: Business Data ProcessingRef. Page
§ Reports are generated by using report generator of a
database system to assemble the output of a database
query in desired format
§ Report generator enables user to specify layout of the
report, titles & subtitles for the report, column
headings for various fields, and other elements to
make the report appear more presentable
Creating ReportsCreating Reports
316
30. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 30/32Chapter 16: Business Data ProcessingRef. Page
The report is sorted to present the list in alphabetical order of their last
name
5728-6287Aundh RoadA-22, Anand ParkDeepakSingh
5762-3333Aundh RoadB-16, Anand ParkPrakashSen
4685-6356M. G. RoadB-05, Royal VillaSuhasRay
5755-8328Aundh RoadC-15, Sarita ViharPushpaRaina
5865-3236Pashan RoadD-18, VrindanaRupaPandey
5863-4905Pashan RoadA-11, VrindavanTapanMurli
4623-4892M. G. RoadA-12, NandanvanRajivGupta
TELEPHONE
NUMBER
ADDRESS-2ADDRESS-1FIRST
NAME
LAST
NAME
LIST OF EMPLOYEES WHO BELONG TO PUNE
DATE: DECEMBER 15, 2007
Sample Output of ReportSample Output of Report
316
31. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 31/32Chapter 16: Business Data ProcessingRef. Page
§ Activity ratio
§ Backup file
§ Collision
§ Copying
§ Data
§ Data Definition Language (DDL)
§ Data dependence
§ Data dictionary
§ Data file
§ Data integrity
§ Data Manipulation Language
(DML)
§ Data processing
§ Data redundancy
§ Data storage hierarchy
§ Database
§ Database administrator
§ Database Management System
(DBMS)
§ Database model
§ Direct file
§ Field
§ File
§ File Management System (FMS)
§ File utilities
§ Filter
§ Hashing
§ Hashing algorithm
§ Hierarchical database
§ Index file
§ Indexed sequential file
§ Information
§ Master file
§ Merging
§ Network database
§ Output file
§ Peripheral Interchange Program
§ Primary key
(Continued on next slide)
Key Words/PhrasesKey Words/Phrases
317
32. Computer Fundamentals: Pradeep K. Sinha & Priti SinhaComputer Fundamentals: Pradeep K. Sinha & Priti Sinha
Slide 32/32Chapter 16: Business Data ProcessingRef. Page
(Continued from previous slide)
§ Query By Example
§ Query language
§ Record
§ Relational database
§ Report file
§ Report Generator
§ Schema
§ Searching
§ Secondary key
§ Secondary key
§ Sequential file
§ Sorting
§ Transaction file
§ Tuple
Key Words/PhrasesKey Words/Phrases
317