Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

CHEATSHEET Information Systems and Databases

5 Types of Information Systems:


1. Transaction Processing Systems URL – Universal Resource Locator – a Magnetic Storage - currently the
2. Decision Support Systems set of standards for accessing nodes Data Dictionary – a table providing a most popular method of
3. Automated Manufacturing Systems (computers/servers) on the internet. It is comprehensive description of each field maintaining large quantities of
4. Office Automation Systems made up of components which allow the in the database. This commonly
includes field name, data type, data
data. Large capacity and, in the
5. Multimedia Systems specific address to be found using an
format, field size, description and case of hard disks (external and
address which is understandable by the
participant rather than a set of numbers example internal) can allow for direct
Examples of Database Information eg 67.15.211.9 is the TCP/IP address access at high speeds .
Systems in Context: for the domain
www.stursulakingsgrove.org. Hard disks – store data
 School Databases containing magnetically on precision
information on teachers, subjects, aluminium or glass platters. Each
URL composition:
classes and students
 The RTA containing information on
http://www.w3.org/Protocols/index.htm platter has a layer of hard
vehicles, drivers and roads. magnetic material onto which data
 Video stores containing information Protocol Domain name Sub-directory file name is stored. Each platter is arranged
on suppliers, borrowers , videos into tracks and sectors.
and rentals. Entity Relationship Diagrams (also
Storyboards – design tools use to plan
called Schemas) – a diagram used to RAID – Redundant array of
a hypermedia product. Each screen is
represented as a frame. On each frame
describe the entities in a relational Independent Disks – uses multiple
database and the relationships between hard disks together with a RAID
are the elements (media) which are
them. controller to ensure minimal data
displayed and can link to other
elements on different pages. loss. Usually a feature of most
The main types of storyboard layouts domain controllers and DBMS
include: servers, where data loss could be
 Linear storyboards
catastrophic.
 Non-Linear storyboards
 Hierarchical storyboards Cartridge and Tape – mainly used
 Hybrid/Composite storyboards
as backup tools, tape cartridges
are sequential storage devices
Orgainisation which can be conveniently
Logical layout of a Flat File Normalisation – the process of reducing
Non-Computer Methods of Organising: database or eliminating data redundancy from removed off site to ensure minimal
your database via the use of efficient data loss.
 Telephone books entity relationship diagrams.
 Card-based systems Optical Storage - examples
 ADV: portable, limited training Types of Normalisation Processes include CD’s, DVD’s and Blu-Ray.
required, most participants are Each disk contains spiral tracks
comfortable with the systems  1NF (or First Normal Form) – this
deals with the removal of repeating and an intense laser beam is
 DISADV: durability, can result in
redundant data, requires manual attributes across horizontal rows and shone over the disk to read the
processes to query, sort etc. ensures each field holds single data disk; a more high powered beam is
items. Generally results in creating shone over the disk to store or
Computer based methods File- A block of data that may be written multiple tables from one initial table. write to the disk.
Flat File system - A Flat file database to a storage device. May be made up of  2NF (or Second Normal Form) –
management system allows you to use records, fields, words, bytes, removes redundant data within Securing Data in a DBMS
only one database file or data table at characters, bits etc. vertical columns or fields. This step
any one time. For the majority of seeks to find common ground Data security – aims to ensure
business tasks, flat file systems are Records – A collection of facts about an between tables so they can be data is not lost or corrupted. It is
ideal eg (address books, electronic entity in a database which may be related. also to ensure that data is kept
diaries, recording marks etc) They are composed of one or more related fields.  3NF (or Third Normal Form) – secure by minimising unauthorised
also relatively easy to operate and A record is an entire entry (horizontal removes all remaining redundant
learn. access to data
row) in a table. Also known as Tuples. data within vertical columns.
Methods include:
The main limitation of a flat file Relational Databases Storage and Retrieval in a DBMS
database is that they often result in Regular backups – Grandfather, Father
data redundancy. Storage and retrieval is particularly
Relational Databases – is a collection of Son, Incremental, Differential
important in maintain data stores in a
two dimensional tables, which generally
Data Redundancy - refers to the large DBMS . Physical Security Measures – server is
are linked together, in order to
unnecessary duplication of data reduce/eliminate data redundancy. kept in a locked room, checkout
Storage hardware:
within a database. operator needs a key to void a
Table – the basic building block of a Direct access – refers to the ability to transaction
Database Management Systems – database. A table is simply as set of go to any data item in any order. Eg. Usernames and Passwords – to access
contain multiple tables and many rows(records) and columns (fields). CD rom the system and different levels of the
utilities, They are used for a large Also known as an entity. Sequential access – means data system. Some participants, when
database to enable large amounts of must be stored and retrieved in a logged into the system may only have
information to be stored and retrieved. Field – A subdivision of a record linear sequence eg. An archive tape read access,
containing a specified piece of data. Offline storage – refers to data which
Each is identified by its field name. is stored on drives which need to be Encryption/Decryption – alters raw data
Hypermedia-a combination of media
mounted to access eg. Tape, USB in such a way that the
containing information which can create Key – Any field in a database that storage drives, CD’s DVD’s. transmitted/received, or stored/retrieved
sequential or non-sequential access to facilitates the retrieval of information. Online Storage – is available data is virtually impossible to read. SSL
various pages.
immediately to connected computers (secure socket layer) is an example of
Primary Key – A character or group of eg. Server drives and Online data how encryption can be used to protect
Hypermedia is most often referred to characters used to identify a unique stores like dropbox, drop.io and data.
when looking at the WWW or the record in a database. Primary keys are Skydrive.
Internet. most often unique – i.e Searching, Selecting and Sorting a
drivers_license_number or DBMS
Documents which exist on the WWW student_number.
make extensive use of hyperlinks Search – to look through a
created through the use of HTM L Foreign Key –Fields that contain data collection of data in order to
(Hypertext Markup Language) that must match data from the primary locate required data meeting a
key of another table
HTML uses tags to format the desired criteria example: a
appearance of text and many other query
functions. Many Web 2.0 tools (eg.
MySpace, Blogs and Wikis) enable Sorting - to arrange a collection
users to make changes and embed of data in some specified order.
media via the use of HTML tags. Sorting does not eliminate any
Eg. <body> </body> sets the visable data; rather it changes its order
portion of the page in the web browser. of appearance.
CHEATSHEET Information Systems and Databases
Current and Emerging Trends
Issues related to Information
Querying the DBMS Systems and Databases Data Warehouse – a large
Acknowledgement of data sources
separated combination of
SQL- Structured Query Access, ownership and control of
data databases used by an
Language is used to query the
Accuracy and reliability of data organisation. It includes
relational database. Emerging trends – data historical data, which is used to
The general syntax includes: warehousing, data mining and OLAP analyse (mine) for
(online analytical processing) and
SELECT: (attributes or fields to retrieve) OLTP (online transaction processing trends/patterns.
FROM: (list of table/entity names)
WHERE: (search criteria) Acknowledgement of data Data Mining – is the process of
ORDER BY: (display the result in Many data collection forms are sources – the Copyright Act discovering non-obvious
desired order..eg. Ascending A-Z) now web-based, where (1968) states that the patterns within large
information entered by the database which collects all the collections of data. Eg. Fly
Relational Operators
USER is directly fed into the information together (the Buys was set up to discover
TERM SQL information system of the expense and time taken to do the shopping trends of users;
EQUALS =
organisation. this) is covered by copyright; the allocation of flights was
NOT EQUAL TO Example. Transaction not the information itself. merely a way to get people to
<>
Processing Systems like eBay, Copyright is breached if the sign up.
GREATER THAN >
Jetstar etc. database is copied without
GREATER THAN, >= permission.
EQUAL TO
Online Analytical Processing
LESS THAN < Access, Ownership and (OLAP) – is a technique for
LESS THAN, <= Control of Data - Access and providing business decision
EQUAL TO
Control are interrelated in the makers with statistical
operation of a DBMS. Access evidence, largely based on
Logical Operators Data Validation – a check refers to the Participants and past trends, upon which they
AND – when both expressions conducted during data the scope of information they can make intelligent decisions.
are True collection to ensure that can access within the system. Whilst this is the primary aim of
OR – When one expression is reasonable data is entered. The Freedom of Information data mining, OLAP aims to
True Data validation helps to Act (1989) states that an provide the information
NOT- Opposite improve the integrity or individual is entitled to request visually, online and as quickly
correctness of the data, to access any personal or non- as possible. Eg. When there is
however it cannot ensure that personal information held by a Federal Election, one of the
QBE (Query by example)- A
the data is totally correct. government departments and major Television networks will
visual method for specifying a
their statutory authorities. Eg. initiate a debate between the
query. In Microsoft Access, a Data integrity – a term used to
You could request from the Prime Minister and the
Filter is an example of a QBE. describe the reliability of the
RTA how many demerit points Opposition Leader. In recent
data. It incorporates a
Tools for Hypermedia you’ve accrued on your years, they have displayed a
statement about accuracy,
Searching and Retrieval license. This does not extend graphical summary (a line
correct entry and currency of
to commercial organisations. graph) of whether the audience
Search Engine – a program the data.
members are liking or disliking
that builds an index of website Displaying Data in a Database what the speaker is saying at
Control of data is
content, Users cam search the time. This was termed the
accomplished through the
indexed content to locate Once queried, data is often “Worm” by Channel 9 a few
setting up of usernames and
relevant website material. years back.
need to be presented in an passwords allowing different
Search engines collect and aesthetically pleasing way for access levels and permissions
search data through: participants or users. to the data stored on the Online Transaction Processing
1. Crawling the web to locate system. For example: In a (OLTP) – those systems which
and retrieve web pages Reports- generated from hospital database, there would allow transactions to be
queries or tables which present be access control in relation to
2. Indexing and ranking each processed by remote users. A
the data in an aesthetically what a doctor can see in
web page found transaction is a business
pleasing way. Eg. Overdue comparison to a cleaner. event , which must be
3. Analysing search criteria loans in a library, absentees in
completed in its entirety in
entered by users a school day, Telstra phone Accuracy and Reliability of order for it to be a valid
bills for post. Data – there is a rule with transaction. Many banks now
4. Retrieving suitably ranked regard to Databases; Garbage
web page results, allow for OLTP via the use of
in, Garbage out. This means internet banking – the
Collecting and Displaying for that the entering of the transferral of funds from one
Database Systems information is important to get account to another is an
the correct results when example of OLTP. It is
Collecting - the information information is searched or
process that gathers data from the important to note that the
queried. Of equal importance transaction occurs in real time
environment,
is that the information is kept (almost instantaneously).
Displaying – The information up to date on a regular basis.
process which outputs information You would be aware that
from an information system. schools send home
Collecting and Displaying are the information sheets at the
only information processes that commencement of the
directly interact with the users, academic year to ensure that
the data the school has stored
Collecting is primarily done in a
in their DBMS is current,
DBMS via a FORM
accurate and reliable.

You might also like