SlideShare a Scribd company logo
1 of 30
Chapter 10
Database
Management
Chapter 10 Objectives
Identify the qualities of valuable informationIdentify the qualities of valuable information
Explain why data is important to an
organization
Explain why data is important to an
organization
Discuss the terms character, field, record,
and file
Discuss the terms character, field, record,
and file
Identify file maintenance techniquesIdentify file maintenance techniques
Differentiate between a file processing system
approach and the database approach
Differentiate between a file processing system
approach and the database approach
Discuss the functions common to most
DBMSs
Discuss the functions common to most
DBMSs
Describe characteristics of relational, object-
oriented, and multidimensional databases
Describe characteristics of relational, object-
oriented, and multidimensional databases
Explain how Web databases workExplain how Web databases work
Discuss the responsibilities of databases
analysts and administrators
Discuss the responsibilities of databases
analysts and administrators
Next
Data and Information
What is data ?
p. Fig. 10-1 Next
 Collection of unprocessed items, which can
include text, numbers, images, audio, and video
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Computer Emergency
Response Team Coordination
Center below Chapter 10
Data and Information
What is Information ?
p. Fig. 10-3 Next
 Processed data; that is, it is organized, meaningful, and
useful
 The processes this new
member data and
payment data
Data and Information
How a fitness center might
process data into
information ?
p. Fig. 10-2 Next
Step 1. The member data,
including a photograph, is
entered and stored on a
hard disk
Step 2. A computer
extracts the member
data from the disk and
obtains the amount due
based on the type of
membership plan
Step 3. When the amount
due of $39.50 is paid, the
receipt is created and
printed. (The Weekender
plan is $39.50 per month.)
Web server for
www.company.com
Data and Information
What is Database and Database Software ?
p. Fig. 10-4 Next
 Collection of data
organized in a manner
that allows access,
retrieval, and use of that
data
 Often called a databases
management system
(DBMS), users create a
computerized databases
Data and Information
What is Data Integrity ?
p. Fig. 10-5 Next
 Data is one of their more
valuable assets
 Data is used to generate
information
 Data Integrity identifies the
quality of the data
 Garbage in, garbage out (GIGO)
is a computer phrase that means
you cannot create correct
information from data that is
incorrect
 A
Data and Information
What are Qualities of Valuable Information?
p. Next
Cost-effective
information should give
more value than it costs
to produce
Cost-effective
information should give
more value than it costs
to produce
Accessible information
is available when the
decision maker needs it
Accessible information
is available when the
decision maker needs it
Timely information has
an age suited to its use
Timely information has
an age suited to its use
Organized information
is arranged to suit the
needs and
requirements of the
decision maker
Organized information
is arranged to suit the
needs and
requirements of the
decision maker
Useful information has
meaning to the person
who receives it
Useful information has
meaning to the person
who receives it
Verifiable information
can File Processing
Versus Databases oven
as correct or incorrect
Verifiable information
can File Processing
Versus Databases oven
as correct or incorrect
Accurate information is free errorAccurate information is free error
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Intellectual Property Rights
below Chapter 10
The Hierarchy Of Data
What is Characters ?
p. Fig. 10-7 Next
 The smallest unit of data
the computer can process
The Hierarchy Of Data
What is Fields ?
p. Fig. 10-8 Next
 Combination of one or more related
characters
The Hierarchy Of Data
What is records ?
p. Fig. 10-9 Next
 Group of related fields
 Key field
 Primary field
The Hierarchy Of Data
What is Files ?
p. Fig. 10-10 Next
 Collection of related records stored on disk such as a
hard disk, CD, or DVD
Maintaining Data
What is Adding Records ?
p. Fig. 10-11 Next
 Users add new records to a file when they
obtain new data
Maintaining Data
What is Changing Records?
p. Fig. 10-12 Next
 Correct inaccurate data or
 Update old data with new data
Maintaining Data
What is Deleting Records ?
p. Fig. 10-13 Next
 A record no longer is
needed, a user deletes it
from file
Maintaining Data
What is validating data ?
p. Fig. 10-14 Next
 Process of comparing data with a
set of rules or values to find out if
the data is correct
 Alphabetic/numeric check
 Range check
 Consistency check
 Completeness check
 Check digit
File Processing Versus Databases
What is File Processing System ?
p. Fig. 10-15 Next
 Each department or area within and organization has its
own set of files
 Have two major weaknesses
 Data redundancy
 Isolated data
File Processing Versus Databases
What is Database approach ?
 Many programs and users share the data in the
database
p. Fig. 10-16 Next
Reduced data
redundancy
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Encryption below Chapter 10
Improved data
integrity Shared data
Easier access
Reduced
development
time
Database Management Systems
What is Data dictionary ?
p. Fig. 10-18 Next
 Contains data about each
file in the database and
each field within those file
 Sometimes called a
repository
Database Management Systems
What is a Query and Query Language ?
p. Fig. 10-19 Next
 A query is a request for specific data from the
database
 A query language consists of simple, English-like
statements that allow users to specify the data to
display, print, or store
Database Management Systems
p. Fig. 10-2 Next
.
How to use the simple query wizardHow to use the simple query wizard
Step 1: select the
fields from
the available
fields list that
you want to be
displayed
Step 2: assign a name
to the query, so you
can open it later
Step 3: view the query
results on the screen
Database Management Systems
What is Data security ?
p. Fig. 10-22 Next
 A DBMS provides means to ensure that only
authorized users access data at permitted times
 Define the actions that a specific user or group of users
can perform
Database Management Systems
What is Backup and Recovery ?
p. Figs. 10-20–10-21 Next
 A backup, or copy, of the entire
database
 Which is listing of activities that
change the contents of the
database
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Uninterruptible Power Supply
below Chapter 10
Relational, Object-Oriented, and
Multidimensional Databases
What is Relational Database ?
p. Fig. 10-25 Next
 A database that store data in
tables that consist of rows and
columns
 A relationship is a
connection within the
data
Relational, Object-Oriented, and
Multidimensional Databases
What is Object-Oriented Database (OODB) ?
 Stores data in objects
 Examples of OODB :
p. Fig. 10-16 Next
Multimedia
Database
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Encryption below Chapter 10
Groupware
Database
Computer-aided
design database
stores
Hypertext
database Web database
Relational, Object-Oriented, and
Multidimensional Databases
What is Multidimensional Databases ?
p. Fig. 10-27 Next
 Stores data in dimensions
 Sometimes known as hypercube
Web Databases and Database
Administration
What is Database Design Guidelines ?
p. Fig. 10-29 Next
 A carefully designed database
makes it easier for a user to query
the database, modify the data,
and create reports
Web Databases and Database
Administration
What is Role of the Database Analysts and Administrators ?
p. Fig. 10-31 Next
 Responsible for managing and coordinating all
database activities
Click to view Web
Link, click Chapter 10, Click
Web Link from left
navigation, then click
Internet Content Rating
Association below Chapter 10
Web Databases and Database
Administration
What is Role of the Employee as a User ?
p. Fig. 10-32 Next
 Should learn how to use the data in the database
effectively
Summary of Database Management
Discussed how data and information are
valuable assets to an organization
Discussed how data and information are
valuable assets to an organization
Presented methods for maintaining high-
quality data and assessing the quality of
valuable information
Presented methods for maintaining high-
quality data and assessing the quality of
valuable information
Discussed the advantages of organizing data
in a database and described various types of
database
Discussed the advantages of organizing data
in a database and described various types of
database
Presented the roles of the database analysts
and administrators
Presented the roles of the database analysts
and administrators
Chapter 10 Complete

More Related Content

What's hot (20)

DATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MININGDATA WAREHOUSING AND DATA MINING
DATA WAREHOUSING AND DATA MINING
 
Data Warehousing and Data Mining
Data Warehousing and Data MiningData Warehousing and Data Mining
Data Warehousing and Data Mining
 
RDBMS
RDBMSRDBMS
RDBMS
 
Database systems - Chapter 2
Database systems - Chapter 2Database systems - Chapter 2
Database systems - Chapter 2
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 
Database basics
Database basicsDatabase basics
Database basics
 
Relational database
Relational database Relational database
Relational database
 
DBMS
DBMSDBMS
DBMS
 
Data Modeling PPT
Data Modeling PPTData Modeling PPT
Data Modeling PPT
 
Data warehouse architecture
Data warehouse architectureData warehouse architecture
Data warehouse architecture
 
Database Management System Introduction
Database Management System IntroductionDatabase Management System Introduction
Database Management System Introduction
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
 
Database, Lecture-1.ppt
Database, Lecture-1.pptDatabase, Lecture-1.ppt
Database, Lecture-1.ppt
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
Dbms slides
Dbms slidesDbms slides
Dbms slides
 
Basic DBMS ppt
Basic DBMS pptBasic DBMS ppt
Basic DBMS ppt
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 
Database Management System ppt
Database Management System pptDatabase Management System ppt
Database Management System ppt
 
Database and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsDatabase and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health Informatics
 
DbMs
DbMsDbMs
DbMs
 

Viewers also liked

Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04Beni Krisbiantoro
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityDhani Ahmad
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Beni Krisbiantoro
 
Database connectivity and web technologies
Database connectivity and web technologiesDatabase connectivity and web technologies
Database connectivity and web technologiesDhani Ahmad
 
Database Design and Implementation
Database Design and ImplementationDatabase Design and Implementation
Database Design and ImplementationChristian Reina
 
Database Design Process
Database Design ProcessDatabase Design Process
Database Design Processmussawir20
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Database design process
Database design processDatabase design process
Database design processTayyab Hameed
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityMohd Arif
 
Wiimproject(uupg&kml)
Wiimproject(uupg&kml)Wiimproject(uupg&kml)
Wiimproject(uupg&kml)wiim
 
Application software
Application softwareApplication software
Application softwareDhani Ahmad
 
9780538469685 ppt ch12 1er exa
9780538469685 ppt ch12 1er exa9780538469685 ppt ch12 1er exa
9780538469685 ppt ch12 1er exacarldevsco63
 

Viewers also liked (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Information system
Information systemInformation system
Information system
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04Database design, implementation, and management -chapter04
Database design, implementation, and management -chapter04
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02
 
Database design
Database designDatabase design
Database design
 
Database connectivity and web technologies
Database connectivity and web technologiesDatabase connectivity and web technologies
Database connectivity and web technologies
 
Database Design and Implementation
Database Design and ImplementationDatabase Design and Implementation
Database Design and Implementation
 
Database Design Process
Database Design ProcessDatabase Design Process
Database Design Process
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Database design process
Database design processDatabase design process
Database design process
 
Database - Design & Implementation - 1
Database - Design & Implementation - 1Database - Design & Implementation - 1
Database - Design & Implementation - 1
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Wiimproject(uupg&kml)
Wiimproject(uupg&kml)Wiimproject(uupg&kml)
Wiimproject(uupg&kml)
 
Application software
Application softwareApplication software
Application software
 
Hacking Mediawiki
Hacking MediawikiHacking Mediawiki
Hacking Mediawiki
 
9780538469685 ppt ch12 1er exa
9780538469685 ppt ch12 1er exa9780538469685 ppt ch12 1er exa
9780538469685 ppt ch12 1er exa
 

Similar to Database Chapter 10 Objectives

Chapter10
Chapter10Chapter10
Chapter10Izaham
 
Chapter1.0 database management system
Chapter1.0 database management systemChapter1.0 database management system
Chapter1.0 database management systembluejayjunior
 
TID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To DatabaseTID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To DatabaseWanBK Leo
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database managementhaider ali
 
CH10-Managing a Database
CH10-Managing a DatabaseCH10-Managing a Database
CH10-Managing a DatabaseSukanya Ben
 
Computer science 2nd year short questions notes (1)
Computer science 2nd year short questions notes (1)Computer science 2nd year short questions notes (1)
Computer science 2nd year short questions notes (1)umarsajjad18
 
DATABASE MANAGEMENT
DATABASE MANAGEMENTDATABASE MANAGEMENT
DATABASE MANAGEMENTMiXvideos
 
Relational database management systems
Relational database management systemsRelational database management systems
Relational database management systemsDatasoft Consulting
 
data base management system (DBMS)
data base management system (DBMS)data base management system (DBMS)
data base management system (DBMS)Varish Bajaj
 
Types Of Database For Flat File Database
Types Of Database For Flat File DatabaseTypes Of Database For Flat File Database
Types Of Database For Flat File DatabaseChristina Valadez
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databasessharing notes123
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesSharing Slides Training
 

Similar to Database Chapter 10 Objectives (20)

Chapter10
Chapter10Chapter10
Chapter10
 
Chapter10
Chapter10Chapter10
Chapter10
 
Chapter1.0 database management system
Chapter1.0 database management systemChapter1.0 database management system
Chapter1.0 database management system
 
Chapter10
Chapter10Chapter10
Chapter10
 
TID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To DatabaseTID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To Database
 
Chapter 10 database management
Chapter 10   database managementChapter 10   database management
Chapter 10 database management
 
CH10-Managing a Database
CH10-Managing a DatabaseCH10-Managing a Database
CH10-Managing a Database
 
Database
DatabaseDatabase
Database
 
Database Management
Database ManagementDatabase Management
Database Management
 
Dbms
DbmsDbms
Dbms
 
Computer science 2nd year short questions notes (1)
Computer science 2nd year short questions notes (1)Computer science 2nd year short questions notes (1)
Computer science 2nd year short questions notes (1)
 
DATABASE MANAGEMENT
DATABASE MANAGEMENTDATABASE MANAGEMENT
DATABASE MANAGEMENT
 
Relational database management systems
Relational database management systemsRelational database management systems
Relational database management systems
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
data base management system (DBMS)
data base management system (DBMS)data base management system (DBMS)
data base management system (DBMS)
 
Dbms
DbmsDbms
Dbms
 
Types Of Database For Flat File Database
Types Of Database For Flat File DatabaseTypes Of Database For Flat File Database
Types Of Database For Flat File Database
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 
Ais Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational DatabasesAis Romney 2006 Slides 04 Relational Databases
Ais Romney 2006 Slides 04 Relational Databases
 

More from Dhani Ahmad

Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effortDhani Ahmad
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentationsDhani Ahmad
 

More from Dhani Ahmad (20)

Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentations
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Database Chapter 10 Objectives

  • 2. Chapter 10 Objectives Identify the qualities of valuable informationIdentify the qualities of valuable information Explain why data is important to an organization Explain why data is important to an organization Discuss the terms character, field, record, and file Discuss the terms character, field, record, and file Identify file maintenance techniquesIdentify file maintenance techniques Differentiate between a file processing system approach and the database approach Differentiate between a file processing system approach and the database approach Discuss the functions common to most DBMSs Discuss the functions common to most DBMSs Describe characteristics of relational, object- oriented, and multidimensional databases Describe characteristics of relational, object- oriented, and multidimensional databases Explain how Web databases workExplain how Web databases work Discuss the responsibilities of databases analysts and administrators Discuss the responsibilities of databases analysts and administrators Next
  • 3. Data and Information What is data ? p. Fig. 10-1 Next  Collection of unprocessed items, which can include text, numbers, images, audio, and video Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 10
  • 4. Data and Information What is Information ? p. Fig. 10-3 Next  Processed data; that is, it is organized, meaningful, and useful  The processes this new member data and payment data
  • 5. Data and Information How a fitness center might process data into information ? p. Fig. 10-2 Next Step 1. The member data, including a photograph, is entered and stored on a hard disk Step 2. A computer extracts the member data from the disk and obtains the amount due based on the type of membership plan Step 3. When the amount due of $39.50 is paid, the receipt is created and printed. (The Weekender plan is $39.50 per month.) Web server for www.company.com
  • 6. Data and Information What is Database and Database Software ? p. Fig. 10-4 Next  Collection of data organized in a manner that allows access, retrieval, and use of that data  Often called a databases management system (DBMS), users create a computerized databases
  • 7. Data and Information What is Data Integrity ? p. Fig. 10-5 Next  Data is one of their more valuable assets  Data is used to generate information  Data Integrity identifies the quality of the data  Garbage in, garbage out (GIGO) is a computer phrase that means you cannot create correct information from data that is incorrect  A
  • 8. Data and Information What are Qualities of Valuable Information? p. Next Cost-effective information should give more value than it costs to produce Cost-effective information should give more value than it costs to produce Accessible information is available when the decision maker needs it Accessible information is available when the decision maker needs it Timely information has an age suited to its use Timely information has an age suited to its use Organized information is arranged to suit the needs and requirements of the decision maker Organized information is arranged to suit the needs and requirements of the decision maker Useful information has meaning to the person who receives it Useful information has meaning to the person who receives it Verifiable information can File Processing Versus Databases oven as correct or incorrect Verifiable information can File Processing Versus Databases oven as correct or incorrect Accurate information is free errorAccurate information is free error Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Intellectual Property Rights below Chapter 10
  • 9. The Hierarchy Of Data What is Characters ? p. Fig. 10-7 Next  The smallest unit of data the computer can process
  • 10. The Hierarchy Of Data What is Fields ? p. Fig. 10-8 Next  Combination of one or more related characters
  • 11. The Hierarchy Of Data What is records ? p. Fig. 10-9 Next  Group of related fields  Key field  Primary field
  • 12. The Hierarchy Of Data What is Files ? p. Fig. 10-10 Next  Collection of related records stored on disk such as a hard disk, CD, or DVD
  • 13. Maintaining Data What is Adding Records ? p. Fig. 10-11 Next  Users add new records to a file when they obtain new data
  • 14. Maintaining Data What is Changing Records? p. Fig. 10-12 Next  Correct inaccurate data or  Update old data with new data
  • 15. Maintaining Data What is Deleting Records ? p. Fig. 10-13 Next  A record no longer is needed, a user deletes it from file
  • 16. Maintaining Data What is validating data ? p. Fig. 10-14 Next  Process of comparing data with a set of rules or values to find out if the data is correct  Alphabetic/numeric check  Range check  Consistency check  Completeness check  Check digit
  • 17. File Processing Versus Databases What is File Processing System ? p. Fig. 10-15 Next  Each department or area within and organization has its own set of files  Have two major weaknesses  Data redundancy  Isolated data
  • 18. File Processing Versus Databases What is Database approach ?  Many programs and users share the data in the database p. Fig. 10-16 Next Reduced data redundancy Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Encryption below Chapter 10 Improved data integrity Shared data Easier access Reduced development time
  • 19. Database Management Systems What is Data dictionary ? p. Fig. 10-18 Next  Contains data about each file in the database and each field within those file  Sometimes called a repository
  • 20. Database Management Systems What is a Query and Query Language ? p. Fig. 10-19 Next  A query is a request for specific data from the database  A query language consists of simple, English-like statements that allow users to specify the data to display, print, or store
  • 21. Database Management Systems p. Fig. 10-2 Next . How to use the simple query wizardHow to use the simple query wizard Step 1: select the fields from the available fields list that you want to be displayed Step 2: assign a name to the query, so you can open it later Step 3: view the query results on the screen
  • 22. Database Management Systems What is Data security ? p. Fig. 10-22 Next  A DBMS provides means to ensure that only authorized users access data at permitted times  Define the actions that a specific user or group of users can perform
  • 23. Database Management Systems What is Backup and Recovery ? p. Figs. 10-20–10-21 Next  A backup, or copy, of the entire database  Which is listing of activities that change the contents of the database Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Uninterruptible Power Supply below Chapter 10
  • 24. Relational, Object-Oriented, and Multidimensional Databases What is Relational Database ? p. Fig. 10-25 Next  A database that store data in tables that consist of rows and columns  A relationship is a connection within the data
  • 25. Relational, Object-Oriented, and Multidimensional Databases What is Object-Oriented Database (OODB) ?  Stores data in objects  Examples of OODB : p. Fig. 10-16 Next Multimedia Database Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Encryption below Chapter 10 Groupware Database Computer-aided design database stores Hypertext database Web database
  • 26. Relational, Object-Oriented, and Multidimensional Databases What is Multidimensional Databases ? p. Fig. 10-27 Next  Stores data in dimensions  Sometimes known as hypercube
  • 27. Web Databases and Database Administration What is Database Design Guidelines ? p. Fig. 10-29 Next  A carefully designed database makes it easier for a user to query the database, modify the data, and create reports
  • 28. Web Databases and Database Administration What is Role of the Database Analysts and Administrators ? p. Fig. 10-31 Next  Responsible for managing and coordinating all database activities Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Internet Content Rating Association below Chapter 10
  • 29. Web Databases and Database Administration What is Role of the Employee as a User ? p. Fig. 10-32 Next  Should learn how to use the data in the database effectively
  • 30. Summary of Database Management Discussed how data and information are valuable assets to an organization Discussed how data and information are valuable assets to an organization Presented methods for maintaining high- quality data and assessing the quality of valuable information Presented methods for maintaining high- quality data and assessing the quality of valuable information Discussed the advantages of organizing data in a database and described various types of database Discussed the advantages of organizing data in a database and described various types of database Presented the roles of the database analysts and administrators Presented the roles of the database analysts and administrators Chapter 10 Complete