A database allows for the structured storage and organization of large amounts of data. Data is stored in tables which contain records made up of fields. Records are uniquely identified by a primary key field. Databases make data easy to manage, access, update, search, and sort. Common database management systems include MySQL, Access, Oracle, and others which allow users to create, modify, query and generate reports from database tables.
This document outlines a 7-lesson course on introducing Microsoft Access 2007. The lessons cover exploring the Access environment and user interface, designing and building a database, managing data and tables, querying databases, designing forms and reports, and customizing Access.
This document discusses key concepts about databases and Microsoft Access. It defines what a database is and describes the main data types in MS Access. It explains what a table is and how to create tables. It also defines primary keys and foreign keys and how to create relationships between tables. Finally, it discusses how to write queries to display and extract data from tables.
The Documentation Phase is the fifth phase of system development. In this phase, system developers produce documentation for the database program. Some key documentation includes user manuals that describe how to use the system, training guides for teaching users, and system technical documentation describing how the system was designed and implemented. Proper documentation is important as it allows users and future developers to understand how to operate, maintain and enhance the system.
A database is a collection of related tables or information that can be organized in many ways.
It is like keeping a set of file folder or record that contains any number of separate categories or entries which are called fields.
There are terminologies that are important to know when working with databases. They relate to the way data is organized in a table.
This document provides an overview of building a database in Microsoft Access 2007. It discusses planning the database structure, deciding on a purpose, listing the data to store, and the main parts of database design like fields, tables, primary keys, and data types. It also covers creating relationships between tables, using queries to extract data, and includes self-assessment quizzes to test the reader's understanding.
Access is a relational database management system that stores data in tables and allows for complex querying of data across related tables. It stores data in tables rather than worksheets like Excel. Access allows users to create forms and reports, run queries, and connect to external data sources. Key features include building queries visually through a graphical query designer interface without needing SQL knowledge, setting relationships between tables, and updating records through queries.
This is a slide presentation on Database Management System.
Note: All this slide are design by me and licensed under the school I'm currently teaching "Good Shepherd Schools"
This document provides a training overview on creating and populating a table in Microsoft Access by entering data. It discusses creating a new blank database and table, entering data into the table's fields, setting field names and data types, and changing data types. Care is needed when changing data types to avoid losing existing data. The document includes practice suggestions and test questions.
This document outlines a 7-lesson course on introducing Microsoft Access 2007. The lessons cover exploring the Access environment and user interface, designing and building a database, managing data and tables, querying databases, designing forms and reports, and customizing Access.
This document discusses key concepts about databases and Microsoft Access. It defines what a database is and describes the main data types in MS Access. It explains what a table is and how to create tables. It also defines primary keys and foreign keys and how to create relationships between tables. Finally, it discusses how to write queries to display and extract data from tables.
The Documentation Phase is the fifth phase of system development. In this phase, system developers produce documentation for the database program. Some key documentation includes user manuals that describe how to use the system, training guides for teaching users, and system technical documentation describing how the system was designed and implemented. Proper documentation is important as it allows users and future developers to understand how to operate, maintain and enhance the system.
A database is a collection of related tables or information that can be organized in many ways.
It is like keeping a set of file folder or record that contains any number of separate categories or entries which are called fields.
There are terminologies that are important to know when working with databases. They relate to the way data is organized in a table.
This document provides an overview of building a database in Microsoft Access 2007. It discusses planning the database structure, deciding on a purpose, listing the data to store, and the main parts of database design like fields, tables, primary keys, and data types. It also covers creating relationships between tables, using queries to extract data, and includes self-assessment quizzes to test the reader's understanding.
Access is a relational database management system that stores data in tables and allows for complex querying of data across related tables. It stores data in tables rather than worksheets like Excel. Access allows users to create forms and reports, run queries, and connect to external data sources. Key features include building queries visually through a graphical query designer interface without needing SQL knowledge, setting relationships between tables, and updating records through queries.
This is a slide presentation on Database Management System.
Note: All this slide are design by me and licensed under the school I'm currently teaching "Good Shepherd Schools"
This document provides a training overview on creating and populating a table in Microsoft Access by entering data. It discusses creating a new blank database and table, entering data into the table's fields, setting field names and data types, and changing data types. Care is needed when changing data types to avoid losing existing data. The document includes practice suggestions and test questions.
The group presentation provided an overview of Microsoft Access, including its history, versions, supported operating systems, and office suite integrations. Key points included:
- Access started in 1992 and has continued evolving, with the latest version being Access 2013.
- It integrates with the Microsoft Office suite and supports Windows operating systems from Windows 3.0 to current versions.
- Access allows users to create databases, tables, queries, forms and reports to enter and connect data. It can import/export data to other formats and link to external data sources.
- The presentation covered features of Access like macros, parameterized queries, and the ability to reference Access objects from other programs. It also discussed some differences between
This document discusses creating and designing an Access database and tables. It describes creating a blank database, adding and designing tables in Datasheet and Design views, and setting field properties. Key points include: creating a database using a template that can include pre-built tables, queries, forms and reports; setting a field's data type; adding fields in Design view; and using properties like Description, Field Size, Format, Default Value and Required to further define fields.
An entity represents an object in a system that has associated data. Entities can be modeled as tables in a relational database with attributes as fields. A relational database links tables through relationships. Each table contains records about a single entity, with each record as a row containing fields of attribute data. Storing all data in a single flat file leads to problems like data isolation, redundancy, and inconsistency that are avoided through normalization of data across related tables in a relational database. This allows for more efficient querying, data sharing and consistency, security, and productivity across an organization.
This document summarizes the process of data mining Excel data using Microsoft Access and loading it into a MySQL database. It involves extracting data from an Excel sheet, transforming it by filtering, cleaning, and standardizing the data in Access, and then loading the transformed data into a MySQL database using various tools. Screenshots are provided to demonstrate each step of the ETL (extraction, transformation, loading) process, including importing the Excel data into an Access database, sorting and cleaning the data, and ultimately exporting an SQL file to load into a MySQL database hosted on a web server.
A database allows users to store and organize data in a computer system. It is composed of four objects: queries, forms, tables, and reports. Tables store all the data in rows and columns. Forms are used for entering, viewing, and modifying records. Queries allow users to search for and compile data from one or more tables. Reports present data in a printable format.
A relational database organizes data into tables with rows and columns. Each table contains records about a type of entity, with columns representing attributes. Unique identifiers called primary keys are used to link tables together through foreign keys, allowing efficient storage and retrieval of related data. Validation rules can be set on fields to ensure accurate data entry. Relational databases provide benefits like reduced data redundancy, improved data integrity, and easier querying of information.
This document provides an introduction to Microsoft Access 2007, including:
1) Databases are used to organize related information into tables, queries, forms, and reports. Tables store the core data, while queries find and retrieve data, forms provide interfaces to view and edit data, and reports analyze and present data.
2) Proper database design includes determining the database purpose and intended uses, defining relevant tables and their fields, identifying primary keys to connect tables, and determining relationships between tables.
3) The core components of an Access database are tables, which organize data into rows and columns. Fields define the columns and have properties like data type and size that determine how data is stored and displayed.
Here are the steps to create a blank Access database:
1. Click the Blank Database template under New in the starting window.
2. In the File New Database dialog box, type a name for the database (e.g. "MyDatabase") and select a save location.
3. Click Create.
This will create a new blank Access database with the specified name and save it in the selected location.
The document provides an overview of database basics. It defines a database as an organized collection of data, and gives examples like phone books, airline reservation systems, and computer hard drive files. It distinguishes between data, which are raw facts and figures, and information, which is data organized and communicated meaningfully. The document outlines the components of a database, including tables, records, and fields. It describes one-to-one, one-to-many, and many-to-many relationships between tables. It also covers database management systems, models, and some basic SQL statements for creating, inserting, updating, selecting, and deleting records in a database table.
This document provides an introduction to Microsoft Access, including key concepts like databases, tables, fields, and data types. It explains how to get started with Access by creating or opening a database. It describes how to build tables with fields and define primary keys. It also covers manipulating data in tables, creating and working with forms and reports, and switching between views like design view and datasheet view. The document serves as a tutorial for beginners to learn the basic features and functions of Microsoft Access.
Databases are used to store and organize data for fast retrieval. They have several objectives like speedy retrieval, ordering, and conditional grouping of data. Database management systems (DBMS) help manage databases by defining entities, storage architecture, security, backups and more. Relational database management systems (RDBMS) are most common today and follow Codd's rules. Databases can be classified by usage (operational, data warehouse, analytical), processing type (single, distributed), storage type (flat file, indexed, trees), and content scope (legacy, hypermedia). Database contents include tables with rows and columns to store entity attributes and records. Tables have field/column definitions specifying name, data type, size and other properties
Microsoft Access 2010 allows users to create and manage databases. It includes tools like tables, queries, forms, reports, and a backstage view. The ribbon replaces menus and toolbars for navigating database objects stored in the file. Users can import data from Excel or text files into new or existing tables, and export data and tables to other formats like Excel.
This document provides an overview of Microsoft Access and how to create and modify Access databases. It discusses what Access is used for, how to open Access, create a new database using templates, and make common edits like renaming fields and adding new fields to tables and forms. The key steps are selecting an appropriate template, downloading it to create a database, and using Access tools to easily modify database structures and fields as needs change.
The document discusses various data types in Microsoft Access including text, number, auto number, date/time, yes/no, currency, memo, OLE object, hyperlink, and lookup wizard. It provides descriptions of each data type, what kind of data they can store, and their storage capacities. For example, it notes that text can store up to 255 characters in 2 bytes, numbers can store values between -32768 to 32767 in 4 bytes, and auto number automatically generates numbers.
The document provides an overview of database management systems and Microsoft Access. It defines a DBMS as software that defines, manipulates, retrieves and manages data in a database. It discusses the key concepts of tables, queries, forms and reports. It explains how Access is used to create, open and manage database objects like tables and queries. It provides guidance on setting up a new blank Access database and creating tables by defining fields and setting field properties.
This document provides an introduction to Microsoft Access and relational databases. It discusses importing data, establishing relationships between tables, and using queries to analyze the data. The summary is:
1) Access allows users to create, manage and query relational databases. It demonstrates importing data from CSV and Excel files into tables and linking tables using primary and foreign keys.
2) Queries in Access allow users to analyze data across related tables. The document demonstrates simple and advanced queries using the Query Wizard and Query Design tools.
3) Relationships must be established between tables before running queries. Primary and foreign keys are used to link tables and ensure referential integrity when data is updated.
This document outlines topics for working with data in an Access database, including searching for and replacing text, entering data accurately using AutoCorrect, editing text, and arranging columns. Specific techniques are described such as finding and refining searches, enabling AutoCorrect, selecting, deleting and inserting text, and checking spelling options. The document provides an outline for a training course on working with data in an Access database.
The document discusses key concepts related to databases including:
1) It defines a database as an organized collection of data and provides examples like phone books and student records.
2) It explains the difference between data and information, with data being unprocessed and information being data organized and communicated meaningfully.
3) The ultimate purpose of a database management system is to transform data into information and knowledge to enable action.
4) Fundamental database components include tables, with columns representing fields and rows representing individual records.
Datatypes, Field Properties, Validation and Maskingstarsmileygirl34
The document discusses various data types, field properties, validation rules, and input masks in Microsoft Access. It provides descriptions and examples of commonly used data types like text, number, currency, and date/time. It also explains properties for fields including field size, format, default value, validation rules, and required fields. Input masks are discussed as a way to enforce data formatting and prevent invalid entries. Validation rules and required fields are presented as methods to enforce data quality. Examples are given for different validation rule expressions and common input mask formats.
The document provides an overview of using SQL to query relational databases, logical modeling to create relational databases, and querying multitable databases. It also discusses using XML for data transfer.
Specifically, it covers: using SQL to query single and multitable databases; logical modeling using entity-relationship diagrams; converting entity-relationship diagrams into relational data models; and performing JOIN operations to query relationships across multiple tables.
Databases have become important for organizing data in modern organizations. A database contains tables with records and fields to store related data. Database management systems allow users to create, access, and modify this data. Emerging trends include client/server systems that split databases onto servers and client computers, object-oriented databases that treat database components as reusable objects, data mining that analyzes stored data to understand customers and business, and linking web applications to organizational databases.
The document discusses database normalization and provides examples to illustrate the concepts of first, second, and third normal forms. It explains that normalization is the process of evaluating and correcting database tables to minimize data redundancy and anomalies. The key steps in normalization include identifying attributes, dependencies between attributes, and creating normalized tables based on those dependencies. An example database for a college will be used to demonstrate converting tables into first, second, and third normal form. Additionally, an example will show when denormalization of a table may be acceptable.
The group presentation provided an overview of Microsoft Access, including its history, versions, supported operating systems, and office suite integrations. Key points included:
- Access started in 1992 and has continued evolving, with the latest version being Access 2013.
- It integrates with the Microsoft Office suite and supports Windows operating systems from Windows 3.0 to current versions.
- Access allows users to create databases, tables, queries, forms and reports to enter and connect data. It can import/export data to other formats and link to external data sources.
- The presentation covered features of Access like macros, parameterized queries, and the ability to reference Access objects from other programs. It also discussed some differences between
This document discusses creating and designing an Access database and tables. It describes creating a blank database, adding and designing tables in Datasheet and Design views, and setting field properties. Key points include: creating a database using a template that can include pre-built tables, queries, forms and reports; setting a field's data type; adding fields in Design view; and using properties like Description, Field Size, Format, Default Value and Required to further define fields.
An entity represents an object in a system that has associated data. Entities can be modeled as tables in a relational database with attributes as fields. A relational database links tables through relationships. Each table contains records about a single entity, with each record as a row containing fields of attribute data. Storing all data in a single flat file leads to problems like data isolation, redundancy, and inconsistency that are avoided through normalization of data across related tables in a relational database. This allows for more efficient querying, data sharing and consistency, security, and productivity across an organization.
This document summarizes the process of data mining Excel data using Microsoft Access and loading it into a MySQL database. It involves extracting data from an Excel sheet, transforming it by filtering, cleaning, and standardizing the data in Access, and then loading the transformed data into a MySQL database using various tools. Screenshots are provided to demonstrate each step of the ETL (extraction, transformation, loading) process, including importing the Excel data into an Access database, sorting and cleaning the data, and ultimately exporting an SQL file to load into a MySQL database hosted on a web server.
A database allows users to store and organize data in a computer system. It is composed of four objects: queries, forms, tables, and reports. Tables store all the data in rows and columns. Forms are used for entering, viewing, and modifying records. Queries allow users to search for and compile data from one or more tables. Reports present data in a printable format.
A relational database organizes data into tables with rows and columns. Each table contains records about a type of entity, with columns representing attributes. Unique identifiers called primary keys are used to link tables together through foreign keys, allowing efficient storage and retrieval of related data. Validation rules can be set on fields to ensure accurate data entry. Relational databases provide benefits like reduced data redundancy, improved data integrity, and easier querying of information.
This document provides an introduction to Microsoft Access 2007, including:
1) Databases are used to organize related information into tables, queries, forms, and reports. Tables store the core data, while queries find and retrieve data, forms provide interfaces to view and edit data, and reports analyze and present data.
2) Proper database design includes determining the database purpose and intended uses, defining relevant tables and their fields, identifying primary keys to connect tables, and determining relationships between tables.
3) The core components of an Access database are tables, which organize data into rows and columns. Fields define the columns and have properties like data type and size that determine how data is stored and displayed.
Here are the steps to create a blank Access database:
1. Click the Blank Database template under New in the starting window.
2. In the File New Database dialog box, type a name for the database (e.g. "MyDatabase") and select a save location.
3. Click Create.
This will create a new blank Access database with the specified name and save it in the selected location.
The document provides an overview of database basics. It defines a database as an organized collection of data, and gives examples like phone books, airline reservation systems, and computer hard drive files. It distinguishes between data, which are raw facts and figures, and information, which is data organized and communicated meaningfully. The document outlines the components of a database, including tables, records, and fields. It describes one-to-one, one-to-many, and many-to-many relationships between tables. It also covers database management systems, models, and some basic SQL statements for creating, inserting, updating, selecting, and deleting records in a database table.
This document provides an introduction to Microsoft Access, including key concepts like databases, tables, fields, and data types. It explains how to get started with Access by creating or opening a database. It describes how to build tables with fields and define primary keys. It also covers manipulating data in tables, creating and working with forms and reports, and switching between views like design view and datasheet view. The document serves as a tutorial for beginners to learn the basic features and functions of Microsoft Access.
Databases are used to store and organize data for fast retrieval. They have several objectives like speedy retrieval, ordering, and conditional grouping of data. Database management systems (DBMS) help manage databases by defining entities, storage architecture, security, backups and more. Relational database management systems (RDBMS) are most common today and follow Codd's rules. Databases can be classified by usage (operational, data warehouse, analytical), processing type (single, distributed), storage type (flat file, indexed, trees), and content scope (legacy, hypermedia). Database contents include tables with rows and columns to store entity attributes and records. Tables have field/column definitions specifying name, data type, size and other properties
Microsoft Access 2010 allows users to create and manage databases. It includes tools like tables, queries, forms, reports, and a backstage view. The ribbon replaces menus and toolbars for navigating database objects stored in the file. Users can import data from Excel or text files into new or existing tables, and export data and tables to other formats like Excel.
This document provides an overview of Microsoft Access and how to create and modify Access databases. It discusses what Access is used for, how to open Access, create a new database using templates, and make common edits like renaming fields and adding new fields to tables and forms. The key steps are selecting an appropriate template, downloading it to create a database, and using Access tools to easily modify database structures and fields as needs change.
The document discusses various data types in Microsoft Access including text, number, auto number, date/time, yes/no, currency, memo, OLE object, hyperlink, and lookup wizard. It provides descriptions of each data type, what kind of data they can store, and their storage capacities. For example, it notes that text can store up to 255 characters in 2 bytes, numbers can store values between -32768 to 32767 in 4 bytes, and auto number automatically generates numbers.
The document provides an overview of database management systems and Microsoft Access. It defines a DBMS as software that defines, manipulates, retrieves and manages data in a database. It discusses the key concepts of tables, queries, forms and reports. It explains how Access is used to create, open and manage database objects like tables and queries. It provides guidance on setting up a new blank Access database and creating tables by defining fields and setting field properties.
This document provides an introduction to Microsoft Access and relational databases. It discusses importing data, establishing relationships between tables, and using queries to analyze the data. The summary is:
1) Access allows users to create, manage and query relational databases. It demonstrates importing data from CSV and Excel files into tables and linking tables using primary and foreign keys.
2) Queries in Access allow users to analyze data across related tables. The document demonstrates simple and advanced queries using the Query Wizard and Query Design tools.
3) Relationships must be established between tables before running queries. Primary and foreign keys are used to link tables and ensure referential integrity when data is updated.
This document outlines topics for working with data in an Access database, including searching for and replacing text, entering data accurately using AutoCorrect, editing text, and arranging columns. Specific techniques are described such as finding and refining searches, enabling AutoCorrect, selecting, deleting and inserting text, and checking spelling options. The document provides an outline for a training course on working with data in an Access database.
The document discusses key concepts related to databases including:
1) It defines a database as an organized collection of data and provides examples like phone books and student records.
2) It explains the difference between data and information, with data being unprocessed and information being data organized and communicated meaningfully.
3) The ultimate purpose of a database management system is to transform data into information and knowledge to enable action.
4) Fundamental database components include tables, with columns representing fields and rows representing individual records.
Datatypes, Field Properties, Validation and Maskingstarsmileygirl34
The document discusses various data types, field properties, validation rules, and input masks in Microsoft Access. It provides descriptions and examples of commonly used data types like text, number, currency, and date/time. It also explains properties for fields including field size, format, default value, validation rules, and required fields. Input masks are discussed as a way to enforce data formatting and prevent invalid entries. Validation rules and required fields are presented as methods to enforce data quality. Examples are given for different validation rule expressions and common input mask formats.
The document provides an overview of using SQL to query relational databases, logical modeling to create relational databases, and querying multitable databases. It also discusses using XML for data transfer.
Specifically, it covers: using SQL to query single and multitable databases; logical modeling using entity-relationship diagrams; converting entity-relationship diagrams into relational data models; and performing JOIN operations to query relationships across multiple tables.
Databases have become important for organizing data in modern organizations. A database contains tables with records and fields to store related data. Database management systems allow users to create, access, and modify this data. Emerging trends include client/server systems that split databases onto servers and client computers, object-oriented databases that treat database components as reusable objects, data mining that analyzes stored data to understand customers and business, and linking web applications to organizational databases.
The document discusses database normalization and provides examples to illustrate the concepts of first, second, and third normal forms. It explains that normalization is the process of evaluating and correcting database tables to minimize data redundancy and anomalies. The key steps in normalization include identifying attributes, dependencies between attributes, and creating normalized tables based on those dependencies. An example database for a college will be used to demonstrate converting tables into first, second, and third normal form. Additionally, an example will show when denormalization of a table may be acceptable.
This document provides revision materials for an exam on database basics. It includes sections on database fundamentals, normalization, data validation, naming conventions, example questions, exam tips, and exam technique. The document covers key database concepts like entities, attributes, relationships, normalization forms, field data types, and validation rules. It also provides examples of database objects like tables, queries, forms, and reports. Overall, the document offers a comprehensive review of common database topics that may appear on the exam.
An introduction to database architecture, design and development, its relation to Object Oriented Analysis & Design in software, Illustration with examples to database normalization and finally, a basic SQL guide and best practices
It 302 computerized accounting (week 2) - sharifahalish sha
Here are some potential ways to represent relational databases other than using tables and relationships:
- Graph databases: Represent data as nodes, edges, and properties. Nodes represent entities, edges represent relationships between entities. Good for highly connected data.
- Document databases: Store data in flexible, JSON-like documents rather than rigid tables. Good for semi-structured or unstructured data.
- Multidimensional databases (OLAP cubes): Represent data in cubes with dimensions and measures. Good for analytical queries involving aggregation and slicing/dicing of data.
- Network/graph databases: Similar to graph databases but focus more on network properties like paths, connectivity etc. Good for social networks, recommendation systems.
-
This document discusses the basics of database management systems (DBMS). It begins by explaining the data storage hierarchy from the bit level up to the database level. It then covers different database models including hierarchical, network, relational, and object-oriented. Key components of a DBMS like DDL, DML, query language, and report generators are defined. Commercial DBMS examples are provided. The document concludes with an overview of creating and using a database, including defining the structure, entering data, and searching for information.
The document provides an overview of fundamentals of database design including definitions of key concepts like data, information, and databases. It discusses the purpose of databases and database management systems. It also covers topics like selecting a database system, database development best practices, and data entry considerations.
1. A database is a collection of data organized in a structured format. Examples of databases include attendance registers, bank accounts, shopping lists, resume collections, contact lists, and notes.
2. A database management system (DBMS) is software that allows users to create, access, manage and control databases. Common DBMS functions include database creation, querying, manipulation, and controlling access.
3. The main differences between a database and a DBMS are that a database refers to the collection of data itself, while a DBMS is the software that manages the database and allows users to perform tasks like querying and updating the data.
This document introduces key concepts related to database systems including:
1. Data is raw facts that are organized into meaningful information by computers. Data integrity ensures data is correct to create accurate information.
2. A database contains files with records made of fields that store characters of data. Common data types include text, numbers, dates. Validation checks help ensure data integrity.
3. A database management system (DBMS) allows users to add, retrieve, and manage shared data across programs more easily compared to file systems. It addresses issues like data redundancy, inconsistent data, and concurrent access.
Database management systems (DBMS) help organize data across departments to provide timely, accurate information for better decision-making. A DBMS includes database software, users, and practitioners who design database structures and applications. It defines data through a data dictionary for clear understanding and prevents errors. A DBMS also secures data and maintains integrity through backup and recovery.
Running Head PROJECT DELIVERABLE 31PROJECT DELIVERABLE 310.docxtodd581
Running Head: PROJECT DELIVERABLE 31
PROJECT DELIVERABLE 310
Project Deliverable 3: Database and Programming Design
Leo Austin
Professor Joe Scott
CIS498 – Information Technology Capstone
08/22/2018
Introduction
Bicycle Trader being a constantly growing internet-based company requires the collection of an abundance of data to analyze for continued operations. Whether customers signup for services or browse through the website, data is gathered to allow the website to adapt to demands and cater to the customers’ needs and determine what will make using the site more user-friendly. Most importantly is the need to gather data in order to facilitate the entry and archiving of customer input data and use by other entities or departments within the business. Various database models can be taken into consideration for the needs of this business, and the relational database model is the most applicable due to the data sorting requirements for the website.
Not only is the rational database model the ideal database solution, but because they primarily consist of tables used to manage and store data, they are relatively easy to create and maintain. Many organizations choose this approach as it facilitates access to understandable data assets. Separating data by implementing tables also allows for the ability to adequately secure data by distinguishing each with their own classifications. Sorting data into tables also means that data can be added or withdrawn without having to overhaul the entire database.
Implementing data warehousing alongside relational databases provides further practicality and presents many advantages. By doing so, we can take advantage of its ability to “store large quantities of historical data and enable fast, complex queries across all the data, typically using Online Analytical Processing (OLAP)” (Panoply, n.d.). Data warehouses are essentially a collection of data from various sources that can be used by organizations for reporting and analysis. Because of the nature of Bicycle Trader and the abundance of like items that will be sold be by users on the website, a data warehouse will be the most practical solution for archiving data, because unlike most databases which normalize data in order to eliminate redundant data, a data warehouse uses a denormalized data structure. This means that fewer data tables with more grouping are used and redundancies aren’t excluded.
This combination of relational data systems, the data warehouse and relational database, can be hosted internally by the organization on its’ mainframe, and stored in their cloud. Using a cloud yields more advantages as it is the easiest and most cost-effective approach. By using this method, data can easily be accessed from several locations. Additionally, this allows for fewer physical resources as it eliminates some of the costs associated with expensive systems and equipment, expert staff, and energy consumption by alternatively utilizing the .
Introduction to database with ms access(DBMS)07HetviBhagat
A database is an organized collection of structured data stored electronically in a computer system. The document discusses database components including hardware, software, data, procedures, and access languages. It provides examples of database systems like MS Access and how it can be used to create tables, enter and query data, and perform other operations. Key database terms are defined such as entities, attributes, relationships, and database administrators' roles and responsibilities. Advantages and disadvantages of database management systems are also outlined.
Introduction to database with ms access.hetvii07HetviBhagat
A database is usually controlled by a database management system (DBMS). MS Access is a popular DBMS that allows users to create and manage databases. The document discusses various components of a database such as tables, queries, forms and reports. It provides information on how to create an MS Access database, add tables, enter data, create relationships between tables, write queries to extract data, and build forms and reports. The key aspects covered are data modeling using entity relationship diagrams, normalizing data to reduce redundancy, and performing common database operations like importing, exporting and analyzing data in MS Access.
The document discusses key concepts related to databases including:
1) It defines data as representations of facts, concepts or instructions that are suitable for communication, interpretation or processing.
2) A database is defined as a structured set of non-redundant information organized based on a data model, consisting of files, records and fields.
3) A database management system (DBMS) provides an interface between users and the database, allowing for data definition, manipulation and control.
The document provides an introduction to databases and SQL. It defines what a database is as a collection of related data containing information relevant to an enterprise. It then discusses the properties of databases, what a database management system (DBMS) is, the typical functionality of a DBMS including defining, constructing, manipulating databases, and providing security. It also summarizes the components of a database system including fields, records, queries, and reports. The document then introduces SQL and its uses for data manipulation, definition, and administration. It provides examples of SQL statements for creating tables, inserting, querying, updating, and deleting data.
Data is raw facts that become information when given context. Databases and spreadsheets are used to store and process different types of data, like numeric, text, dates, and objects. Databases allow large amounts of data to be stored and accessed efficiently. Data is organized into records containing fields, and multiple records make up a database file. Database programs use tables to store field data, forms for user interfaces, queries to search and manipulate data, and reports to output formatted information. Relational databases connect tables through common fields to avoid data redundancy.
Introduction of Physical Database Design Process
Designing Fields
Choosing Data Types
Controlling Data Integrity
Denormalizing and Partitioning Data
Designing Physical Database Files
File Organizations
Clustering Files
Indexes
Optimizing Queries
The document discusses the shift from file-based data management systems to database management systems (DBMS). It outlines some key issues with file systems like data redundancy, inconsistency, difficult data access and lack of backup/recovery. It then introduces basic DBMS concepts like database, tables, records, fields, keys and benefits like reduced redundancy, data sharing and integrity. It also covers SQL components like DDL, DML, data types and basic CREATE TABLE syntax.
The document discusses database concepts including:
- What a database is and its components like data, hardware, software, and users.
- Database management systems (DBMS) that enable users to define, create and maintain databases.
- Data models like hierarchical, network, and relational models. Relational databases using SQL are now most common.
- Database design including logical design, physical implementation, and application development.
- Key concepts like data abstraction, instances and schemas, normalization, and integrity rules.
DATABASES NOTES FOR STUDENTS TAKING MICROSOFT PACKAGESWesleyWenceslaus
A database is a collection of structured data organized for easy access, retrieval and manipulation. Database management systems, like Microsoft Access, allow users to create, organize and maintain databases. These systems provide features to add, delete, update and query data organized in tables. Proper data organization and field properties are important for effective data storage and retrieval. Relationships between tables also help connect related information across multiple tables.
The document contains password and configuration information for Windows 2012 and Windows 8 systems on an internal network, including the administrator password for Windows 2012 being "Win2012 W upper case", RAM sizes of 2048 for Server 2012 and 1024 for Windows 8, and IP addresses, subnet masks, default gateways and DNS servers for Server 2012 being 192.168.1.1 and for Windows 8 being 192.168.1.2 with the default gateway and DNS server of Server 2012 being 192.168.1.1. It also provides instructions for ping testing connectivity between the server and client by disabling the Windows firewall temporarily.
How to train cortana to respond to your voiceTabsheer Hasan
Cortana can be trained to only respond to a specific user's voice by having the user say six sentences out loud to Cortana in a quiet place, which allows Cortana to learn and recognize that individual's voice so that only they can activate Cortana with voice commands and not others passing by.
This document provides instructions for turning on "Hey Cortana" on Windows 10. It instructs users to press the Windows key and S simultaneously to open Cortana, then click the Notebook button and Settings to access the On/Off switch for "Hey Cortana", which allows users to activate Cortana with voice commands like "Hey, Cortana" followed by a question.
Cortana does not always appear in the Windows 10 taskbar by default. The document provides instructions for pinning Cortana to the taskbar so it is always visible, including right-clicking the taskbar, selecting Cortana, and choosing whether to show Cortana's icon, hide it, or show its search box in the taskbar for quick access.
The document discusses the five generations of computers from 1946 to present. The first generation used vacuum tubes and were very large, expensive, and generated a lot of heat. The second generation introduced transistors, making computers smaller and more reliable. The third generation used integrated circuits to make computers even smaller and faster. The fourth generation used microchips and VLSI circuits, leading to the development of personal computers. The fifth generation continues advancing computer technology through parallel processing and artificial intelligence.
Cortana lives in the Windows taskbar and must be launched for the first time by opening the Start Menu, clicking All Apps, and then clicking Cortana. After launching, users are prompted to click the Cortana button in the taskbar and either enable speech, inking, and typing personalization to help Cortana perform tasks tailored to the user or decline personalized features.
This document is a 14-page exam for the Cambridge International Examinations Computer Science 2210/12 exam from May/June 2015. The exam covers topics such as cookies, security issues, mobile phone touch screen technologies, logic gates, sensors, and computing terms. Candidates are required to answer multiple choice and written response questions testing their knowledge of these topics in computer science.
An array is a data structure that stores a collection of data items of the same type in a contiguous block of memory. It allows efficient access of elements using an index. One-dimensional arrays represent data as a linear list using a single index. Arrays simplify processing similar data by allowing batch operations. Pseudocode is provided to input student names and marks into arrays, calculate totals and averages, find the highest scoring student, calculate the average of user-input numbers using a loop, swap the first and last elements of an array, and find the largest and smallest elements in an array.
This document discusses programming concepts such as variables, constants, data types, and program structure. It defines key terms like:
- Variables which store changing data in memory and are assigned a data type. Constants store fixed values.
- Data types include integers, reals, Booleans, strings, characters which determine how data is stored and processed.
- Programs use statements, selection (if/else), and repetition (loops). Procedures and functions are subroutines that can optionally return values.
- Parameters pass values to subroutines to influence their behavior. Variables can be global or local in scope, influencing where they are accessible.
The document provides information on pseudocode, including:
1. Pseudocode avoids specifying a particular programming language and uses generic terms to describe programming concepts like loops, branching, and input/output.
2. Common pseudocode terms are described, like counting, totaling, and input/output.
3. Examples of writing algorithms in pseudocode are given, such as calculating property taxes based on property value or repeatedly calculating a formula until a condition is met.
This document discusses algorithm design and problem solving. It covers topics like top-down modular design, structure diagrams, stepwise refinement, pseudocode, flowcharts, and validation checks. An example flowchart is provided that squares the first 5 numbers. Pseudocode is also demonstrated for an ATM algorithm. Key aspects of algorithm evaluation like efficiency, correctness, and appropriateness are defined. Various programming constructs like assignment statements, arithmetic and relational operators, and Boolean logic are also explained.
This document discusses ethics as it relates to computer use and technology. It defines ethics and discusses areas of ethics such as meta ethics, normative ethics, and applied ethics. It then discusses computer ethics specifically and issues like copyright, plagiarism, piracy, and free versus proprietary software. Computer ethics aims to ensure technology is used without harming others or violating moral values. Copyright protects original works from being copied or distributed without permission. Plagiarism involves taking credit for another's work. Piracy and illegal downloading violate copyright laws. Free software respects users' freedom to use, copy, distribute, and modify the software.
This document discusses data security and integrity. It covers various threats to data such as system crashes, corruption, hacking, and human errors. It recommends measures to secure data like backups, antivirus software, passwords, access controls, and encryption. The importance of regular backups, firewalls, and strong passwords is emphasized to prevent data loss and unauthorized access. Biometric security methods like fingerprints and voice recognition are also introduced.
The operating system controls the computer's hardware and software, acting as an interface between applications and hardware. It loads itself into RAM during startup through a bootstrapping process. The operating system manages user accounts, runs programs, allocates memory, controls devices, and performs housekeeping tasks. It uses various interfaces like graphical user interfaces and command line interfaces. Utility programs perform important system tasks like formatting disks, managing files, compressing files, and scanning for viruses. The operating system also manages buffers for temporary data storage, uses interrupts to communicate with devices, performs handshaking for connections, and calculates checksums to check data integrity. It is responsible for file creation, deletion, directories, and mapping files to storage.
This document discusses different types of computer storage, including primary storage (e.g. RAM, ROM), secondary storage (e.g. hard drives, flash drives, optical discs), and offline storage (e.g. CDs, DVDs, external hard drives). It describes the characteristics of different storage types, such as volatility, access methods, capacity and performance. A variety of specific storage devices are also outlined, such as hard drives, solid state drives, USB flash drives, optical discs, smart cards and external storage devices.
Input devices transfer data into a computer system for processing. There are manual input devices like keyboards and mice that require user entry, and direct data entry devices like smart cards that can automatically transfer information. Scanners use charge-coupled devices to register light reflected from documents and build images pixel by pixel. Barcode readers use lasers or cameras to scan barcodes and convert the spacing patterns to identifying numbers or letters. 3D scanners use various technologies like lasers or structured light to capture dense point clouds or meshes representing physical object geometries.
1.3.2 computer architecture and the fetch execute cycle By ZAKTabsheer Hasan
The document describes the Von Neumann architecture and the fetch-execute cycle of a CPU. It explains that Von Neumann introduced the concept of storing both instructions and data in memory. This allowed programs to be changed by modifying memory rather than rewiring the computer. It then outlines the registers involved in the fetch-execute cycle, including the program counter, instruction register, and accumulator. The cycle fetches an instruction from memory, decodes it, executes it, and then resets to fetch the next instruction, repeating continuously. The cycle provides the fundamental operation of a CPU.
computer architecture and the fetch execute cycle By ZAKTabsheer Hasan
The document describes the Von Neumann architecture and the fetch-execute cycle of a CPU. It explains that Von Neumann introduced the concept of storing both instructions and data in memory. This allowed programs to be changed by modifying memory rather than rewiring the computer. It then outlines the registers involved in the fetch-execute cycle, including the program counter, instruction register, and accumulator. The cycle fetches an instruction from memory, decodes it, executes it, and then resets to fetch the next instruction, repeating continuously. The cycle provides the fundamental processing model for modern CPU design.
The document discusses logic gates and their use in digital circuits. It describes the six main logic gates - NOT, AND, OR, NAND, NOR, and XOR - and explains their functions and truth tables. Logic gates can be combined to form more complex logic networks. Truth tables listing all possible input-output combinations are used to test the functionality of logic networks. Examples are given of designing logic networks to solve problems expressed in terms of logic gate operations and testing the solutions using truth tables.
The document discusses several key topics regarding how the internet works:
1) It describes how requests are routed from a user's computer to servers and back again using TCP/IP protocols and domain name servers to direct the request to the correct target server.
2) It explains the basic functions of web browsers in translating HTML code to display web pages and content, and some common web browsers like Chrome, Firefox, and Internet Explorer.
3) It provides an overview of how internet servers work, distinguishing between servers that provide services and client computers that connect to those services. Requests from clients are directed to specific server software like web, email, or FTP servers running on the overall server machine.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
Databases By ZAK
1. Page 1 of 28
2.3 Databases
Introduction to Databases
A database is a way of storing information in a structured, logical way. They are used to collect and
organize information such as customer details for a business, medical records at a surgery, or stock items at a
warehouse.
Database content is easy to manage and information can be accessed and updated quickly and efficiently. A
database can store and handle vast amounts of data. A user can sort and search a database to find any desired
data.
Most databases have the following properties:
1. Tables
Data is stored in rows and columns (similar to a spreadsheet – the main difference is HOW the data is
organized). Each row in a table is called a record which is made up of a number of fields (columns in the
table). The data type in the fields is usually either text, numeric or date/time. Most databases contain a number
of tables which are usually linked together in some way.
2. Records
A record is a collection of fields that contains data about a single object – it is a row within a table.
3. Fields
A field is a single category of data within a database, which appears in all the records of a table – it is a
column within a table.
Key fields
A key field is used to identify the records within a database. There are two types of keys:
Primary key;
Secondary key.
Primary key
The Primary key is a unique field that identifies a single record. This prevents any records from having
the same value.
Some ‘natural’ primary keys are:
CarRegistrationNumber;
ISBN – a 10-digit code that uniquely identifies a book;
MAC number – a 6-part number that uniquely identifies a network card
National Insurance Number – can uniquely identify employees of a company (not usable for under
16s or for non-British nationalists!)
Secondary key
A Secondary key is a non-unique field, used in a search that does not always produce only one matching
record.
Some typical secondary keys are:
LastName;
PostCode;
DateOfBirth;
2. Page 2 of 28
2.3 Databases
The following terms are used to describe parts of a database:
Record structure
Before setting up a database, the record structure must be decided to make better use of the memory and
backing store, and to make searching and report creation easier.
For example, a car showroom wants to record details of the cars it sells. Before setting up the database, the
following attributes need to be decided:
Field Name
Field type
Field size
Format
Input Mask
Validation Rule
Key
Field
3. Page 3 of 28
2.3 Databases
Record structure
Field name Field type Format
Registration number Alphanumeric Up to 7 characters - the key field
Make Alphanumeric Up to 15 characters
Model Alphanumeric Up to 15 characters
Date first registered Date DDMMYY
Price Currency Up to 5 numbers
Taxed Yes/No (Boolean) 1 character Y/N
Etc…
When designing a database it is important to choose the correct field type. This ensures that the data stored is
usable and it makes validation easier. For example, if the price paid for goods was stored in a text field, then
the database wouldn’t be able to add each individual figure to produce a total.
4. Page 4 of 28
2.3 Databases
Following is the list of common data types:
5. Page 5 of 28
2.3 Databases
Coding of data:
Any system will need to have data collected, entered and stored.
One method of storing data is to assign codes to it. This usually means shortening the original data in an
agreed manner. The agreement is between the users of the system. This coding scheme could be part of the
training of how to use the system, and it could also be documented within the system for new users.
If the coding is completely obvious then there is no such need for formal documentation. For example if a
field called 'Gender' has only two values 'M' and 'F'. It should be obvious from the field name that this refers
to Male and Female.
Example 1
Original data: Monday; Tuesday; Wednesday; Thursday; Friday
Coded data: Mon; Tues; Wed; Thurs; Fri
Example 2
Original data: Extra Large; Large; Medium; Small
Coded data: XL; L; M; S
6. Page 6 of 28
2.3 Databases
Advantages of coding Disadvantages of coding
Data entry can be faster Coarsening of data
Data entry can be more accurate Meaning of data can be obscured
Validation can further improve accuracy Value judgments are difficult to code
Less storage space required
If people don't know the code it can slow down data
entry
Faster searching for data
If codes are complicated they might be entered
incorrectly
Coded data can be more secure if people don't know what
it means
Might run out of code combinations
Estimate the size of a file from its structure and the number of records
7. Page 7 of 28
2.3 Databases
The basic formula for estimating the size of a file is:
If we consider a file with 200 records, which stores the details of an organisation’s customers:
CUSTOMER(RefCode, Name, PostCode, Telephone, DoB, Age)
We can estimate the size of the record as follows:
Thus 200 records would require:
Note that to determine the maximum field length, an extreme case was considered and several bytes added to
play safe.
8. Page 8 of 28
2.3 Databases
Database Management System:
We have discussed the structure of a database as consisting of one or more tables, each of which contains
records and fields of various data types.
The next requirement is to have a system in place that can act upon that data as well as creating and
maintaining the database itself.
This is the role of the 'database management system' usually referred to as a DBMS.
A DBMS is an application designed to control all aspects of a database.
The DBMS will have a command language. This includes command statements for:
Creating an empty database
Deleting an entire database
Creating and deleting tables
Inserting new records into tables
Updating and deleting records
Being able to extract data sets
Being able to produce reports that summarizes the data
Being able to process the data to create new data
There are many database management systems that are either commercial products or free open source
applications.
Examples include
Name Comment
MySQL A very popular, free open source system, widely used on web sites
Access Included in some versions of the Microsoft Office suite
Base Part of the free Open Office suite
Oracle
A multi-user enterprise level database management system. Widely used in
industry
9. Page 9 of 28
2.3 Databases
Queries
Queries most commonly allow information to be retrieved from tables. Since the information is often spread
across several tables, queries allow it to be viewed as one single datasheet. They also allow filtering so only
the records required are seen. Queries can be either results seen directly on the screen or the output to another
form or report. Example of a query: (house > 200 000) OR (no_of_rooms < 4).
Points to note: (1) there are 10 records in this section of the database
(2) Each record has 4 fields
(3) Sample queries:
(Smallest size (microns) < 1) OR (Toxic = “yes”)
Would output records 4, 7, 8 and 9
(Largest size (microns) > 99) AND (Toxic = “no”)
Would output records 1, 2, 3, 6 and 10
The query should match up with the field titles to ensure a correct search is carried out. Search engines on the
Internet work in a similar way; the clever part is how the information is stored on the databases so that the
time to do the search (based on key words) and the effectiveness of the search itself results in a very powerful
and very useful tool.
10. Page 10 of 28
2.3 Databases
SELECT STATEMENT
The SELECT statement is a SQL query to retrieve records from database.
SELECT SYNTAX
The syntax for the SQL SELECT statement is:
SELECT expressions
FROM tables
WHERE conditions;
Expressions are the columns or calculations that you wish to retrieve.
Tables are the tables that you wish to retrieve records from. There must be at least one table listed in the
FROM clause.
Conditions are conditions that must be met for the records to be selected.
SQL SELECT EXAMPLE - SELECT ALL FIELDS FROM ONE TABLE
Let's look at how to use a SQL SELECT query to select all fields from a table.
SELECT *
FROM suppliers
WHERE city = 'Newark'
ORDER BY city DESC;
In this SQL SELECT statement example, we've used “*” to signify that we wish to view all fields from the
suppliers table where the supplier resides in Newark. The result set is sorted by city in descending order.
11. Page 11 of 28
2.3 Databases
SQL SELECT EXAMPLE - SELECTING INDIVIDUAL FIELDS FROM ONE TABLE
You can also use the SQL SELECT statement to select individual fields from the table, as opposed to all fields
from the table.
For example:
SELECT supplier_name, city, state
FROM suppliers
WHERE supplier_id > 1000
ORDER BY name ASC, city DESC;
This SQL SELECT example would return only the supplier_name, city, and state fields from
the suppliers table where the supplier_id value is greater than 1000. The results are sorted by
supplier_name in ascending order and then city in descending order.
SELECT Column Example
Below is a selection from the "Customers" table:
CustomerID CustomerName ContactName Address City PostalCode Country
1 Alfreds Futterkiste Maria Anders Obere Str. 57 Berlin 12209 Germany
2 Ana Trujillo
Emparedados y
helados
Ana Trujillo Avda. de la
Constitución 2222
México
D.F.
05021 Mexico
3 Antonio Moreno
Taquería
Antonio
Moreno
Mataderos 2312 México
D.F.
05023 Mexico
4 Around the Horn Thomas Hardy 120 Hanover Sq. London WA1 1DP UK
5 Berglunds snabbköp Christina
Berglund
Berguvsvägen 8 Luleå S-958 22 Sweden
12. Page 12 of 28
2.3 Databases
SELECT Column Example
The following SQL statement selects the "CustomerName" and "City" columns from the "Customers" table:
Example
SELECT CustomerName,City FROM Customers;
SELECT * Example
The following SQL statement selects all the columns from the "Customers" table:
Example
SELECT * FROM Customers;
The SQL WHERE Clause
The WHERE clause is used to extract only those records that fulfill a specified criterion.
SQL WHERE Syntax:
SELECT column_name,column_name
FROM table_name
WHERE column_name operator value;
WHERE Clause Example
The following SQL statement selects all the customers from the country "Mexico", in the "Customers" table:
Example
SELECT * FROM Customers
WHERE Country='Mexico';
Text Fields vs. Numeric Fields
SQL requires single quotes around text values (most database systems will also allow double quotes).
However, numeric fields should not be enclosed in quotes:
Example
SELECT * FROM Customers
WHERE CustomerID=1;
Operators in the WHERE Clause
The following operators can be used in the WHERE clause:
13. Page 13 of 28
2.3 Databases
The SQL AND & OR Operators
The AND operator displays a record if both the first condition AND the second condition are true.
The OR operator displays a record if either the first condition OR the second condition is true.
Combining AND & OR
You can also combine AND & OR (use parenthesis to form complex expressions).
The following SQL statement selects all customers from the country "Germany" AND the city must be equal
to "Berlin" OR "München", in the "Customers" table:
Example
SELECT * FROM Customers
WHERE Country='Germany'
AND (City='Berlin' OR City='München');
Operator Description
= Equal
<> Not equal. Note: In some versions of SQL this operator may be written as !=
> Greater than
< Less than
>= Greater than or equal
<= Less than or equal
BETWEEN Between an inclusive range
LIKE Search for a pattern
IN To specify multiple possible values for a column
14. Page 14 of 28
2.3 Databases
Database Questions:
Oct/Nov 2006:
A car dealer uses a database to keep details of cars in stock. Part of the stock file is shown below.
(a) (i) State the fieldname that should be used as the key field.
(ii) Explain the purpose of a key field.
(b) The following search condition is input:
(Price($) < 5000) AND (Model = Golf)
Write down the records that match the above search condition using only RegNo.
(c) Write down a search condition to find cars with an Engine greater than 1400cc or which have less than 5
Doors.
(d) When a car is sold, the sale needs to be linked to a customer file. Suggest a new field which could be used
to link the stock file to the customer file.
May/June 2007:
A hospital has decided to computerise its administration system.
(a) Give three ways this could affect the hospital workers.
The hospital will be using a database which holds confidential personal data.
(b) State two precautions that the hospital should take to prevent unauthorised access to the data.
(c) Describe how the database could be recovered if it became corrupted.
(d) Give one example, in each case, of when it would be necessary to amend data, delete data and insert data
into the patient database.
15. Page 15 of 28
2.3 Databases
Oct/Nov 2007:
A school Science department is going to use a database to record details about its equipment.
(a) Give two advantages of using a computer system rather than a manual filing system.
(b) Part of the database is shown below:
(i) As data is entered it needs to be verified. Describe one way this could be done.
(ii) Data also needs to be validated. Using fields from the database as examples, describe two different
validation checks which could be performed on the data.
Oct/Nov 2008:
To gain access to a database, a user must first type in a user ID and then a password which needs to be
verified.
(a) How is a password usually verified?
(b) In spite of these safeguards, unauthorised access to the database is still possible.
What could be done:
(i) to prevent data being used by unauthorised people?
(ii) to prevent loss of data once the database has been illegally accessed?
(c) Personal data is protected to some extent by a Data Protection Act. Give two requirements of a Data
Protection Act.
16. Page 16 of 28
2.3 Databases
Oct/Nov 2008:
15) A database has been produced showing solar system statistics.
(a) How many records are there in this database?
(b) The following search condition was typed in:
(Number of moons > 0) AND (Diameter (km) < 15000)
Using Name of planet, write down the results of this search:
(c) Write down a search condition to find out which planets have rings or have a diameter more than 50000
km.
(d) Name a different validation check for each of the following fields.
(i) Maximum surface temperature (0C)
(ii) Name of planet
(e) The data in the database was sorted in descending order using the Number of moons field. Using Name of
planet only, write down the results of this sort.
17. Page 17 of 28
2.3 Databases
Oct/Nov 2009:
A radio station keeps a database of all its music CDs. Here is part of this database:
(a) How many records are there in the database section?
(b) If the following query was input:
(CD length (mins) < 60) AND (number of hit tracks > 1)
using Reference Number only, write down which data items would be output.
(c) Write down a query to select which CDs are special edition or have more than 10 tracks.
(d) The database is sorted in descending order on CD length (mins). Using Reference
Number only, write down the order of the records following this sort.
(e) The radio station has a phone-in service where a listener texts the title of the CD on their mobile phone.
The popularity of each CD is then known and which CDs the radio station should play.
(i) How would this information be stored?
(ii) How could this information be linked to the database?
May/June 2009:
Explain, using examples where appropriate, the meaning of these computer terms.
(b) relational database
18. Page 18 of 28
2.3 Databases
May/June 2009:
17) A car sales company uses a database.
Here are three tables from the database:
(a) How many records are shown in the Customer Details table?
(b) (i) Which field connects the New Car Sales table with the Customer Details table?
(ii) Which field connects the New Car Sales table with the Car Manufacturer table?
(c) Give two reasons why List of Extras in the Car Manufacturer table is stored in code form.
(d) A customer goes into the showroom and the salesperson keys in 162154. What fields and information
would be shown on the output screen?
(e) Give one advantage to the car sales company of holding customer information on a database.
19. Page 19 of 28
2.3 Databases
May/June 2010:
A database has been set up to bring together information about the world’s tallest buildings.
A section of the database is shown below.
(a) How many records are in the section of the database shown?
(b) (b) Using Ref No. only, which records would be output if the following search condition was entered:
(Year < 1990) AND (Height (m) > 375)?
(c) Write down a search condition to find out how many buildings are in China or how many buildings have
more than 80 floors.
(d) For each of the following fields give a different validation check.
Year
Ref No.
(e) The database was sorted in descending order of Year. Using Ref No. only, write down the results of the
sort:
20. Page 20 of 28
2.3 Databases
May/June 2010:
11) A database has been set up showing information about cars:
(a) Using Car ref only, write down which cars would be output if the following search condition was used:
(No of doors = 4) AND (Fuel used (km/litre) > 15)
(b) Write down a search condition to find out which cars have engines larger than 1.8 litres OR have CO2
emissions higher than 150 g/km.
(c) The database is sorted in ascending order on Fuel used (km/litre). Using Car ref only, write down the
results of the sort.
Oct/Nov 2010:
10) A database has been set up to store information about aircraft. A section is shown below.
(a) How many fields are in each record?
(b) Using Ref No only, what records would be output if the following search condition was entered:
(Max Weight(kg) > 350 000) AND (Wing Span(m) < 66)?
(c) Write down the search condition to find out which aircraft have a length greater than 74 metres or have a
maximum speed less than 900 kph.
21. Page 21 of 28
2.3 Databases
May/June 2011:
A database showing the population of world cities has been produced. A section of the database is shown
below.
(a) How many records are shown above?
(b) Using Ref No only, which records would be found if the following search condition was typed in
(Country = “India” OR Area = “America”) AND (Capital = “No”)
(c) Write a search condition to find the cities in Asia with a city population greater than 17 million OR an
urban population greater than 20 million.
(d) Give one advantage of using Y or N rather than Yes or No in the Capital column.
Oct/Nov 2011:
An airport has a number of hotels nearby. A database has been set up to give customer’s information to allow
them to select a hotel.
(a) How many records are shown in the database?
(b) Which field in each record must be unique?
(c) The following search condition was typed in:
(No. of stars > 3) OR (Hotel parking = Y)
Using Hotel Ref only, which records would be found?
(d) Write down the search condition to find which hotels were less than 10 km from the airport and charged
under $100 per person.
(e) The database was sorted into descending order using No. of rooms.
Using Hotel Ref only, write down the sorted order of records.
22. Page 22 of 28
2.3 Databases
Oct/Nov 2011:
A database has been set up to show details about countries. Part of the database is shown below.
(a) How many fields are in each record?
(b) Using Country code only, what would be output if the following search condition was used?
(Population (millions) > 1000) OR (Continent = “Asia”)
(c) Write down a search condition to find which countries have a land area less than 3 million square km and
also have a coastline.
(d) If the database was sorted in descending order of population size, using Country code only, what would be
the order of countries in the database?
23. Page 23 of 28
2.3 Databases
May/June 2012:
A database was set up to show the properties of certain chemical elements. Part of the
database is shown below.
(a) How many fields are in each record?
(b) The following search condition was entered:
(Melting Point (C) < 40) AND (Atomic Weight > 100)
Using Element Symbol only, which records would be output?
(c) We need to know which elements have an atomic number greater than 50 and are solid at room
temperature.
Write down the search condition to find out these elements.
(d) The data are to be sorted in descending order of Boiling Point (C).
Write down the new order of records using the Element Symbol only.
24. Page 24 of 28
2.3 Databases
Oct/Nov 2012:
A database was set up showing the largest ocean-going liners. Part of the database is
shown below.
(a) How many records are shown in the above part?
(b) Using Liner ID only, what would be output if the following search condition was typed in:
(Year built < 2000) AND (Country of Registration = Country of Construction)?
(c) Write the search condition to find out which liners have a gross tonnage larger than 80 000 or are
registered in the UK.
25. Page 25 of 28
2.3 Databases
May/June 2013:
A database was set up to compare oil companies. A section of the database is shown
below:
(a) How many fields are there in each record?
(b) The following search condition was entered:
(No of countries < 30) AND (Head office = “Americas”)
Using Code only, which records would be output?
(c) What search condition is needed to find out which oil companies have a share price
less than $50 or whose profits were greater than 8 billion dollars?
26. Page 26 of 28
2.3 Databases
May/June 2013:
A survey of motorways was carried out and a database was produced. A section of the
database is shown below.
(a) How many fields and how many records are shown?
(i) number of fields
(ii) number of records
(b) Using Motorway ID only, what would be output if the following search condition was used?
(Length (km) > 100) AND (Number of lanes > 3)
(c) What search condition is needed to find the motorways where the number of cars per day exceeds 50 000
or the toll charge per kilometre is greater than $0.50?
27. Page 27 of 28
2.3 Databases
Oct/Nov 2013 P12:
3) A motor car manufacturers offer various combinations of
Seat colors
Seat materials
Car paint colors
A database was set up to help customers choose which seat and paint combinations were possible.
(NOTE: N = no, not a possible combination, Y = yes, combination is possible)
(a) How many records are shown in the database? [1]
(b) The following search condition was entered:
(cloth = “Y”) AND (blue = “Y”)
Using code only, which records will be found? [2]
(c) A customer wanted to know the possible combinations for a car with leather seats and either silver or grey
paint colour.
What search condition would need to be input? [2]
(d) A customer decided to buy a green car. He wanted to know which seat colours and seat materials were not
a possible combination with green paint.
What search condition would he need to enter? [1]
(e) Give one advantage of using the codes Y and N in the database rather than using Yes and No.
[1]
28. Page 28 of 28
2.3 Databases
Oct/Nov 2013 P13:
9 A database was set up to keep track of goods in a shop. A section of the database is shown below.
(a) How many records are shown in this section of database? [1]
(b) (i) Using Item code only, what would be output if the following search was carried
out:
(Number in stock < Re-order level) AND (Items ordered = “No”) [2]
(ii) What useful information does this search produce? [1]
(c) Write a search condition to locate items costing more than $2.00 or have a stock value exceeding $300.00.
[2]