Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Big data wikipedia , lookup

Entity–attribute–value model wikipedia , lookup

Extensible Storage Engine wikipedia , lookup

Database wikipedia , lookup

Clusterpoint wikipedia , lookup

Relational model wikipedia , lookup

Functional Database Model wikipedia , lookup

Database model wikipedia , lookup

Transcript
Comp 105
SSU
Topic 9: Databases and Information Management
I.
Databases and Information Management
A. Data vs Information
1. Recall that a computer system processes data to produce information.
a. Data is a collection of pieces with no individual meaning.
b. Information is data that has been organized into useful groups that give
it meaning.
2. Fig. 13-1
B. Aspects of Data Management
1. Data Integrity
a. The degree of accuracy of data used by a computer system
b. Accurate information cannot be retrieved from inaccurate data
2. Data Security
a. The protection of data to prevent loss or misuse
C. The Data Hierarchy
1. Database
2. Files
3. Records
4. Fields
5. Characters
6. Fig. 13-2
D. Types of Data
1. Text
2. Numeric
3. Currency
4. Data
5. Memo
6. Hyperlink
E. Data Maintenance
1. Procedures used to keep data current
a. Adding Records
b. Changing Records
Comp 105
SSU
c. Deleting Records
d. Data Validation
2. Changes are made to a copy of the data file called a transaction file. The
master file is updated only after the transaction file is validated.
F. Data Validation Procedures
1. Validation is the process of comparing data to a set of rules or values to
determine accuracy.
2. Types of validity checks
a. Alphabetic / Numeric Check - verifies data type
b. Completeness Check - verifies the presence of data
c. Range Check - verifies data has appropriate values
d. Consistency Check - verifies data relationships
e. Fig. 13-7
G. Primary Key
1. A primary key is a set of fields that differentiate the records in a data file.
2. Often the primary key is a single key field that is present solely for the purpose
of identifying records.
a. E.g. A customer account number.
3. The validity of a key field can be checked with the use of a check digit.
a. Acct. # 52347  5 + 2 +3 + 4 + 7 = 21  2 + 1 = 3
b. Acct. # with check digit becomes 523473
H. File Processing Approach
1. Each department in a organization keeps its own files
a. Example: Separate student files stored byRegistrar, Health Center,
Business Office and University Relations
2. Problems with this approach
a. Data Redundancy
b. Data Isolation
c. Fig. 13-9
I. Database Approach
1. Single centralized data storage of related files where different departments
have specific programs for accessing the data (Fig. 10-10)
2. Advantages
a. Reduced Data Redundancy
Comp 105
SSU
b. Improved Data Integrity
c. Shared Data
d. Reduced Development Time
e. Easier Reporting
II.
Database Management Systems
A. A database management system (DBMS) is a piece of software to control access to a
database.
B. A DBMS contains the following component features
1. Data dictionary
2. Data maintenance and retrieval
3. Data security
4. Backup and Recovery
C. Data Dictionary
1. A data dictionary stores stores information about each file in the database and
each field within those files.
2. The DBMS uses the data dictionary to perform validation checks and maintain
the integrity of data.
D. Data Maintenance and Retrieval
1. Data maintenance is the updating or adding of records as already discussed.
2. To retrieve data and organizing it into information the user forms a query
based on specific criteria.
a. E.g. List all students with GPA over 3.0.
3. A query language is used to formulate the query.
4. Query languages often use notation very similar to mathematical logic.
E. Data Security
1. A DBMS provides security by allowing the database administrator to assign
access privileges for a file.
2. The access privileges define what operations a particular user may perform on
the file.
a. A faculty may read a students file
b. Only the registrar may update the file
F. Backup and Recovery
1. Backup utilities can be included in the DBMS to allow for easy copying of
data files
Comp 105
SSU
2. Some more sophisticated systems keep a transaction log of every operation
performed on the database file
a. The log can be used to reconstruct the database in case of damage
G. Data Models
1. There are many types of data models used
a. Relational
b. Object-oriented
c. Hierarchical
d. Network
e. Object-relational
2. Relational and object-relational are the most common and the most popular.
H. Relational Database Model
1. Data is stored in tables that consist of rows and columns similar to a
spreadsheet.
2. Each row represents a record and thus has a primary key.
3. Each column in a row represents a field of that row’s record.
4. Fig. 13-22
5. A popular query language for relational databases called Structured Query
Language (SQL) is based on relational algebra.
6. Fig. 13-26
I. Object-Oriented Database Model
1. Objects are program entities that model items in the problem domain.
a. E.g. Students, Courses, Faculty, Schedules, etc.
2. An object oriented database is built around these objects and their
relationships with each other.
3. An object-relational database combines the ideas of the relational model and
the object model.
III.
Information
A. The purpose of a DBMS is to manage data in a way that it can be organized and
retrieved as information.
B. Information is an organization’s most valuable asset.
C. Valuable information should be:
1. Accurate
2. Verifiable
Comp 105
SSU
3. Timely
4. Organized
5. Meaningful
6. Cost effective
D. Using Information
1. Management requires information to make decisions
E. The use of information depends on the management level
F. Information Systems
1. An information system is a collection of hardware, software, data, people and
procedures designed to generate information.
2. We will study information systems and their development next time.