This chapter discusses database management and discusses key concepts such as:
1. The functions of database management systems including adding, changing, deleting, sorting and retrieving data.
2. The differences between file processing systems and database approaches, with databases allowing for shared data access and reduced data redundancy.
3. Popular database models including relational, object-oriented and multidimensional databases and how each organizes and stores data differently.
A Relational Database Management System (RDBMS) is a server that manages data for you. The data is structured into tables, where each table has some number of columns, each of which has a name and a type. For example, to keep track of James Bond movies, we might have a “movies” table that records the title (a string), year of release (a number), and the actor who played Bond in each movie (an index into a table of Bond actors).
A Relational Database Management System (RDBMS) is a server that manages data for you. The data is structured into tables, where each table has some number of columns, each of which has a name and a type. For example, to keep track of James Bond movies, we might have a “movies” table that records the title (a string), year of release (a number), and the actor who played Bond in each movie (an index into a table of Bond actors).
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2. Chapter 10 Objectives
Discuss the functions
common to most DBMSs
Identify the qualities
of valuable information
Explain why data is important
to an organization
Discuss the terms character,
field, record, and file
Identify file maintenance techniques
Differentiate between a file processing
system approach and the database approach
Describe characteristics of
relational, object-oriented, and
multidimensional databases
Explain how to interact with Web databases
Discuss the responsibilities of
database analysts and administrators
Next
Define the term, database
4. Data and Information
How are data and information related?
p. 514 - 515 Fig. 10-1 Next
Data is a collection of unprocessed items
Information is data that is organized and meaningful
Computers process data into information
5. Data and Information
What is data integrity?
p. 516 Next
Degree to which data is
correct
Garbage in, garbage
out (GIGO)—computer
phrase that means you
cannot create correct
information from
incorrect data
Garbage out
Garbage in
Data integrity
is lost
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Data Security below Chapter 10
6. Data and Information
What are the qualities of valuable information?
p. 516 - 517 Next
Accurate
Verifiable
Timely
Organized
Accessible
Useful
Cost-effective
7. The Hierarchy of Data
What is a hierarchy?
p. 517 Fig. 10-2 Next
Database contains files, file contains records, record
contains fields, field contains characters
8. The Hierarchy of Data
What is a field?
p. 518 Fig. 10-3 Next
Combination of one or more
characters
Smallest unit of data user accesses
Field name uniquely identifies each
field
Field size defines the maximum
number of characters a field can
contain
Data type specifies kind of data field
contains
9. Yes/No
(also called
Boolean)—only the
values Yes or No (or
True or False)
Hyperlink
Web address that links to
document or Web page
Object
(also called BLOB for binary large
object)—photograph, audio, video,
or document created in other
application such as word
processing or spreadsheet
The Hierarchy of Data
What are common data types?
p. 518 Next
Currency
dollar and cent amounts or
numbers containing decimal
values
Date
month, day, year, and
sometimes time
Memo
lengthy text entries
Text
(also called
alphanumeric)—letters,
numbers, or special
characters
Numeric
numbers
only
AutoNumber
unique number automatically
assigned to each new record
10. The Hierarchy of Data
What is a record?
p. 519 Next
Group of
related fields
Key field, or primary key,
uniquely identifies each record
11. The Hierarchy of Data
What is a data file?
p. 518 Next
Collection of related records stored on disk
12. Maintaining Data
What is file maintenance?
p. 520 Next
Changing recordsAdding records
Deleting records
Procedures that keep data current
13. Maintaining Data
Why do you add records?
p. 520 Fig. 10-5 Next
Add new record when you obtain new data
14. Maintaining Data
Why do you change records?
p. 521 Fig. 10-6 Next
Correct inaccurate data
Update old data
15. Maintaining Data
Why do you delete records?
p. 522 Fig. 10-7 Next
When record no longer is needed
Some programs remove record immediately,
others flag record
16. Maintaining Data
What is validation?
p. 522 - 523 Fig. 10-8 Next
Process of comparing data with a set of rules
to find out if data is correct
Reduce data entry errors and enhance data
integrity before program writes data on disk
17. Consistency
Check
tests for logical
relationship
between two or
more fields
Maintaining Data
p. 523 Next
What are the types of validity checks?
Range Check
determines
whether number is
within specified
range
Completeness
Check
verifies that a
required field
contains data
Check Digit
number(s) or
character(s)
appended to or
inserted into a
primary key value
to confirm
accuracy of
primary key value
Alphabetic/
Numeric Check
ensures correct
type of data
entered
18. Isolated
data—data
stored in
separate files
so it is
difficult to
access
File Processing Versus Databases
What is a file processing system?
p. 524 Next
Data
redundancy—
same fields
stored in
multiple files
Each
department or
area within
organization
has own set of
files
May have
weaknesses
Records in one
file may not
relate to
records in any
other file
19. File Processing Versus Databases
What is the database approach?
p. 524 - 525 Fig. 10-9 Next
Many programs and users can share data in database
Secures data so only authorized users can access
certain data
20. File Processing Versus Databases
What are the strengths of the database approach?
p. 525 Next
Reduced
data
redundancy Improved
data
integrity
Shared
data
Easier
access
Reduced
development
time
21. File Processing Versus Databases
How do a database
application and a
file processing
application differ
in the way they
store data?
p. 525 Fig. 10-10 Next
22. Database Management Systems
What are popular database management systems (DBMSs)?
p. 526 Fig. 10-11 Next
Click to view Web
Link, click Chapter 10,
Click Web Link from left
navigation, then click
Teradata below Chapter 10
23. Database Management Systems
What is a data dictionary?
p. 527 Fig. 10-12 Next
Contains data about each file in database and each
field within those files
24. Database Management Systems
What is a query?
p. 528 - 529 Fig. 10-13 Next
Request for specific
data from a
database
Query language
consists of simple,
English-like
statements that
allow users to
specify data to
display, print, or
store
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Query below Chapter 10
25. Database Management Systems
What is a query by example (QBE)?
p. 528 - 529 Fig. 10-14 Next
Program retrieves records that match criteria
entered in form fields
Has a graphical user interface that assists users
with retrieving data
26. Database Management Systems
What is a form?
p. 530 Fig. 10-15 Next
Window on screen that provides areas for entering or
changing data in database
Used to retrieve and
maintain data in a
database
Form that sends
data across network
or Internet is called
e-form, short for
electronic form
27. Database Management Systems
What is a report generator?
p. 530 Fig. 10-16 Next
Allows user to design a report on screen, retrieve
data into report design, then display or print
reports
Also called
report writer
28. Database Management Systems
What is data security?
p. 530 - 531 Next
Read-only
privileges -
user can
view data,
but cannot
change it
DBMS provides
means to ensure
only authorized
users can access
data
Access privileges
define activities
that specific user
or group of users
can perform
Full-update
privileges -
user can
view and
change data
29. Database Management Systems
What are backup and log?
p. 531 Fig. 10-17 Next
Backup is a copy of the
entire database
Log is a listing of activities
that change database
contents
DBMS places three items
in log: before image,
actual change, and after
image
31. Database Management Systems
What is a recovery utility?
p. 531 - 532 Next
Uses logs and/or
backups to restore
database when it is
damaged or destroyed
Rollforward—DBMS
uses log to re-enter
changes made to data-
base since last save or
backup
Also called forward
recovery
Rollback—DBMS uses
log to undo any changes
made to database during a
certain period of time
Also called backward
recoveryClick to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Continuous Backup
below Chapter 10
32. Relational, Object-Oriented, and Multidimensional Databases
What is a data model?
p. 532 Fig. 10-18 Next
Rules and standards that
define how database
organizes data
Defines how users view
organization of data
Four popular data models
Relational
Object-oriented
Object-relational
Multidimensional
33. Relational, Object-Oriented, and Multidimensional Databases
What is a relational database?
p. 533 Fig. 10-19 Next
Stores data in tables that consist of rows and columns
Each row has primary key
Each column has unique name
Stores data relationships
Uses specialized terminology
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Relational Databases below
Chapter 10
34. Relational, Object-Oriented, and Multidimensional Databases
What is a relationship?
p. 533 Fig. 10-20 Next
Connection within
data
35. Relational, Object-Oriented, and Multidimensional Databases
What is Structured Query Language (SQL)?
p. 534 Fig. 10-21 Next
Allows you to manage, update, and retrieve data
Has special keywords and rules included in SQL
statements
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
SQL below Chapter 10
36. Relational, Object-Oriented, and Multidimensional Databases
What is an object-oriented database (OODB)?
p. 534 - 535 Next
Advantages
Often uses object query language (OQL)
Stores data in objects
Object is item that contains data,
as well as actions that read or
process data
Can store more types of data
Can access data faster
Programmers can reuse objects
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Object-Oriented Databases
below Chapter 10
37. Relational, Object-Oriented, and Multidimensional Databases
What are examples of applications appropriate for an
object-oriented database?
p. 534 Next
Multimedia databases
Store images, audio clips,
and/or video clips
Groupware databases
Store documents such as
schedules, calendars, manuals,
memos, and reports
Computer-aided design
(CAD) databases
Store data about
engineering, architectural,
and scientific designs
Hypertext databases
Contain text links
to other documents
Web databases
Link to e-form on Web page
38. What is a multidimensional database?
Relational, Object-Oriented, and Multidimensional Databases
p. 535 Next
Stores data in
dimensions
Multiple dimensions, also
called hypercube, allow users
to analyze any view of data
Can consolidate data much
faster than relational database
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Multidimensional Databases
below Chapter 10
39. Relational, Object-Oriented, and Multidimensional Databases
What is a data warehouse?
p. 536 Next
Data mart is smaller
version of data warehouse
Uses multidimensional
databases
Often uses a process called data
mining to find patterns and
relationships among data
Huge database system that stores and manages data
required to analyze historical and current transactions
Quick and efficient
way to access large
amounts of data
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Data Warehouses
below Chapter 10
40. Web Databases
What is a Web database?
p. 536 - 537 Fig. 10-23 Next
Database you access through the Web by filling in a form
on a Web page
Usually resides on
a database server, a
computer that
stores and provides
access to a
database
41. 3. Design the records and fields
for each table
2. Design the tables
1. Determine the purpose of the database
4. Determine the
relationships among
the tables or files
Design tables on paper first
Each table should contain
data about one subject
Database Administration
What are guidelines for developing a database?
p. 537 Fig. 10-24 Next
Be sure every record has a unique
primary key
Use separate fields for logically
distinct items
Do not create fields for information
that can be derived from entries in
other fields
Allow enough space for each field
Set default values for frequently
entered data
Click to view Web
Link, click Chapter
10, Click Web Link
from left navigation,
then click Database Design
Guidelines below Chapter 10
42. Database Administration
What is the role of the database analyst and
administrator?
p. 538 Next
Database analyst (DA) Database administrator
(DBA) Focuses on meaning and
usage of data
Decides proper placement
of fields, defines
relationships, and
identifies users’ access
privileges
Creates and maintains data
dictionary, manages
database security,
monitors database
performance, and checks
backup and recovery
procedures
Click to view Web Link, click
Chapter 10,
Click Web Link from left
navigation, then click Database
Administrators below
Chapter 10
43. Summary of Database Management
Chapter 10 Complete
How data and information are
valuable assets to an organization
Methods for maintaining
high-quality data
Assessing the quality of
valuable information
Advantages of organizing
data in a database
Various types of databases
Role of the database
analysts and administrators