Professional Documents
Culture Documents
214 Lecture 2
214 Lecture 2
214 Lecture 2
ng
Information Capture
Information capture is the process of collecting data in form of paper documents,
forms and e-documents, transforming them into accurate, retrievable information,
and delivering the information into business applications and databases for immediate
action.
Information Organization
Information organization refers to methods of rendering large amounts of information
into a form that can be stored, retrieved and manipulated by users or computer system
Information Management
Information management depicts a comprehensive approach to managing the flow of
an information system's data from creation and initial storage to the time when it
becomes obsolete and is deleted.
Information Utilization
Proper utilization involves two interrelated functions: search and navigation.
Searching is based on the metadata associated with the repository materials; index
design based on the expected search categories dramatically speeds discovery of
properly labeled materials. Navigation is the ability to rapidly move around the
information space to locate related information.
Information presentation is also a key factor in utilization.
Information Archiving
The goal of archiving is preservation rather than ready access.
Question
Efficiency in general, describes the extent to which time, effort or cost is well used
for the intended task or purpose.
Effectiveness is the capability of producing a desired result.
– When something is deemed effective, it means it has an intended or expected
outcome, or produces a deep, vivid impression
What is Information Efficiency?
What is Information Effectiveness?
The Information System
Provides for data collection, storage, and retrieval
Composed of:
– People, hardware, software
– Database(s), application programs, procedures
Systems analysis
– Process that establishes need for and extent of information system
Systems development
– Process of creating information system
10
The Information System (cont’d.)
13
Planning
15
Detailed Systems Design
16
Implementation
17
Maintenance
18
The Database Life Cycle
Six phases:
– Database initial study
– Database design
– Implementation and loading
– Testing and evaluation
– Operation
– Maintenance and evolution
19
Database Life Cycle
20
Internet Database Environment
The figure depicts the basic environment needed to set up both Intranet/Internet database enabled-connectivity
8/20/2018
Internet Database Environment cont.
Webserver:
– Used to process client requests and return HTML pages to the
client.
Database-enabled services:
– Database access through the webserver and database server provided
File Transfer Protocol:
– Provides the capability to copy files between computers in the
intranet, extranet or internet.
23
Web to Database Tools
25
Knowledge-Based Systems
Knowledge Base
– A store of factual and heuristic knowledge.
– No single knowledge representation system is optimal for all
applications.
– Knowledge can be represented using the IF-THEN rules,
Semantic networks, and Frames and so on.
26
Object-Based Systems
An object is an instance of a class (e.g. a particular person, place or thing) that encapsulates
the data and behaviour we need to maintain about the object.
All objects have a persistent identity.
– The state of an object encompasses its properties (attributes and relationships) and the values
those properties have,
– its behaviour represents how an object acts and reacts.
– An object's state is determined by its attribute values and links to other objects.
– An object's behaviour depends on its state and the operation being performed.
A class of object shares a common set of attributes and behaviours.
Object Based Systems are based on the object oriented concept.
27
Data warehousing
28
Data mining concepts
Data mining is the process of sorting through large data sets to identify
patterns and establish relationships to solve problems
through data analysis. Data mining tools allow enterprises to predict
future trends.
29
Database Security
Data is a valuable resource that must be strictly controlled and managed as with
any corporate resource.
Security refers to the protection of database against unauthorised access, either
intentional or accidental.
Database security:
The mechanisms that protect the database against intentional or accidental threats.
It encompasses hardware, software, people and data.
Database security aims to minimize losses caused by anticipated events in a cost
effective manner without unduly constraining the users.
8/20/2018 31
• THREATS
– Any situation or event, whether intentional or accidental, that may adversely affect a
system and subsequently the organisation.
• Countermeasures-Computer-Based controls
– Authorization
– access control
– view
– backup and recovery
– integrity
– encryption
– Raid Technology. (Redundant array of independent disk)
Database management and Design
8/20/2018 32O.O. (Mrs)
Oladipupo
AUTHORIZATION
The granting of a right or privilege that enables a subject to have legitimate access
to a system or a system’s object.
This involves authentication of subjects requesting access to objects.
Authentication is a mechanism that determines whether a user is who he or she
claims to be.
A VIEW
– Dynamic result of one or more relational operations operating on base relations
to produce another relation.
Deadlock
An impasse that may result when two (or more0 transactions are each waiting for locks to be released
that are held by the other.
• Timestamping Methods
– A concurrency protocol that orders transactions in such way that older transactions,
transactions with smaller timestamps, get priority in the even of conflict
– Timestamp : a unique identifier created by the DBMS that indicates the relative
starting time of a transaction.
Database management and Design
8/20/2018 40O.O. (Mrs)
Oladipupo
Timestamping Methods
– A concurrency protocol that orders transactions in such way that older transactions,
transactions with smaller timestamps, get priority in the even of conflict
– Timestamp : a unique identifier created by the DBMS that indicates the relative starting
time of a transaction.