Professional Documents
Culture Documents
SSS2 DP
SSS2 DP
1
DATA MANAGEMENT
Data management is the development, execution and supervision of plans,
policies, programs and practices that control, protect, deliver and enhance the value of
data and information assets. Data management comprises of all the disciplines related
to managing data as a valuable resource. It’s an administrative process that includes
acquiring, validating, storing, protecting, and processing data to ensure the
accessibility, reliability and timeliness of data for its users.
IMPORTANCE OF DBMS
Assignment
DATA MODEL
A data model can be defined as a simple representation of a more complex real-
world data structures. In general terms, a model is a simple abstraction of a more
complex real-world object or event. Data model can also be defined as the technique
for organizing and documenting a system’s data. Data model depicts what data items
are required and how such data must look.
If the model created is not logically sound, then the database derived from the model
will also not be efficient. Good modeling yields a good database.
1. Hierarchical Model
This is a data model in which data is organized into a tree-like structure. The structure
allows representing information using parent/child relationship. A record (parent) can
have many children but each child can have only one parent. (1-to-many relationship).
However, a child record could itself be a parent to other records. Each element in the
structure is called a NODE and the starting node is called ROOTNODE.
PRINCIPAL
2. NETWORK MODEL
This model was created to represent complex data relationship more efficiently
than the hierarchical model, to improve database performance, and to impose a
database standard. Though the network model is generally not in use again, it stands as
the basis for all modern data models. Unlike hierarchical model, network model allows
a child record to have more than one parent. An example is students to subject and
subject to student relationship.
3. RELATIONAL MODEL
This is a model that focuses on the logical representation of data and its
relationships rather than the physical storage details. It uses tables to show the
relationship between various data.
Relational database has to do with data that share the same attributes to form an
entity.
Evaluation
DATA MODELLING
Practical
Data types
6
Relationships
Keys
CREATING TABLES
A table is a database object that is used to store data about a particular subject
(e.g. students, employee or product). A table consists of records and fields.
A field contains data about one aspect of the table subject, such as first name or
e-mail address. A field is also commonly called a column or attribute.
A record contains data about one instance of the table subject, such as a
particular employee. A record is also called a row, tuple or an instance. A record
consists of field values.
For example, the information clients fit into a single table and product on another table.
However, a single table would not handle both clients and product. You wouldn’t put
the records for your car’s repairs in the folder where you keep your Christmas cookie
recipes, right?
Table properties are attributes of a table that affect the appearance or behavior of
the tables as a whole. Table properties are set in the table’s property sheet in Design
View OR in the Table Properties option in the Table tab of Datasheet View.
Field property applies to a single field in a table and defines one of the field’s
7
characteristics or an aspect of the field’s behaviour. Field property can be set using
Fields tab in the Datasheet View or by using Field Property pane in the Design view.
DATA TYPES
A field data type indicates the kind of data that the field stores, such as text,
number, attached files etc. Every field has a data type. Data type is a field property that
determines what other properties the field has.
Data type denotes the type of information the field name will contain, if the field
name holds a numeric value, the data type will be number.
TABLE RELATIONSHIPS
A relationship is a logical connection between two tables that specifies fields that
the tables have in common. Although each table stores data about different subjects,
tables in a database usually stores data about subjects that are related to each other.
For example, a database might contain;
KEY
Fields that are part of a table relationship are called keys. In order to connect two
8
or more tables together, you would need a KEY. The key is like a real world key, that
gives you access to the right row. A key is unique i.e. a key value cannot occur twice in
one table. There are two types of keys;
1. Primary key
2. Foreign key
PRIMARY KEY
A unique key or primary key is a key that uniquely identify each record in a table.
The primary key consist of characteristics that cannot collectively be duplicated by any
other row. For example, when creating a customer’s table where each customer has a
unique ID number. The customer ID field is the primary key of the customers table.
FOREIGN KEY
A foreign key contains values that correspond to values in the primary key of
another table. Foreign key is a common field between two tables.
Access is a relational database package but can also work as a flat file. The difference
between a relational database and a flat file is that flat file has only one table and saves
all its data on a table which can cause data redundancy (repetition). An example is a
phonebook which can save a person’s name more than once as long as the person has
more than one phone number. A relational database will create different tables for
different data about an entity and create a key that could be used to link tables of
related data together. A relational database is more complex than a flat file.
10
1. Conceptual approach
2. Enterprise approach
3. Logical approach
4. Physical approach
5.
1. Conceptual data modeling gives a high-level view of the data structure, such as how data
interacts across an organization. For example, a conceptual data model may be used to define the
business requirements for a new database. A conceptual data model doesn't contain technical
details.
2. Logical data modeling focuses on the technical details of a database such as relationships,
11
attributes, and entities. For example, a logical data model defines how individual records are
uniquely identified in a database. But it doesn't spell out actual names of database tables. That's the
job of a physical data model.
3. Physical data modeling depicts how a database operates. A physical data model defines all
entities and attributes used; for example, it includes table names, column names, and data types for
the database.
NORMALIZATION
12
Without Normalization, it becomes difficult to handle and update the database, without
facing data loss. Insert, Update and Delete Anomalies are very frequent if Database is
not normalized. To understand these anomalies let us take an example of Student
table.
13
Update Anomaly: To update address of a student who occurs twice or more than
twice in a table, we will have to update S_Address column in all the rows, else
data will become inconsistent.
Insert Anomaly: Suppose for a new admission, we have a Student id(S_id), name
and address of a student but if student has not opted for any subjects yet then we
have to insert NULL there, leading to Insertion Anomaly.
Delete Anomaly: If (S_id) 401 has only one subject and temporarily he drops it,
when we delete that row, entire student record will be deleted along with it.
Normalization Rule
4. BCNF
14
In First Normal Form, no two Rows of data must contain repeating group of
information i.e each set of column must have a unique value, such that multiple
columns cannot be used to fetch the same row. Each table should be organized into
rows, and each row should have a primary key that distinguishes it as unique.
The Primary key is usually a single column, but sometimes more than one column can
be combined to create a single primary key. For example consider a table which is not
in First normal form
Student Table :
Alex 14 Maths
Stuart 17 Maths
In First Normal Form, any row must not have a column in which more than one value is
saved, like separated with commas. Rather than that, we must separate such data into
multiple rows.
Adam 15 Biology
15
Adam 15 Maths
Alex 14 Maths
Stuart 17 Maths
Using the First Normal Form, data redundancy increases, as there will be many
columns with same data in multiple rows but each row as a whole will be unique.
As per the Second Normal Form there must not be any partial dependency of any
column on primary key. It means that for a table that has concatenated primary key,
each column in the table that is not part of the primary key must depend upon the
entire concatenated key for its existence. If any column depends only on one part of the
concatenated key, then the table fails Second normal form.
In example of First Normal Form there are two rows for Adam, to include multiple
subjects that he has opted for. While this is searchable, and follows First normal form, it
is an inefficient use of space. Also in the above Table in First Normal Form, while the
candidate key is {Student, Subject}, Age of Student only depends on Student column,
which is incorrect as per Second Normal Form. To achieve second normal form, it
would be helpful to split out the subjects into an independent table, and match them up
using the student names as foreign keys.
Student Age
Adam 15
Alex 14 16
Stuart 17
In Student Table the candidate key will be Student column, because all other column i.e
Age is dependent on it.
Student Subject
Adam Biology
Adam Maths
Alex Maths
Stuart Maths
In Subject Table the candidate key will be {Student, Subject} column. Now, both the
above tables qualify for Second Normal Form and will never suffer from Update
Anomalies. Although there are a few complex cases in which table in Second Normal
Form suffers Update Anomalies, and to handle those scenarios Third Normal Form is
there.
Third Normal form applies that every non-prime attribute of table must be dependent
on primary key, or we can say that, there should not be the case that a non-prime
attribute is determined by another non-prime attribute. So this transitive functional
dependency should be removed from the table and also the table must be in Second
17
Normal form. For example, consider a table with following fields.
Student_Detail Table:
In this table Student_id is Primary key, but street, city and state depends upon Zip. The
dependency between zip and other fields is called transitive dependency. Hence to
apply 3NF, we need to move the street, city and state to new table, with Zip as primary
key.
Address Table :
Boyce and Codd Normal Form is a higher version of the Third Normal form. This form
deals with certain type of anomaly that is not handled by 3NF.
Class Work
18
this table to 3NF
sNum Class
1022 101-07
1022 143-01
1022 159-02
4123 201-01
4123 211-02
4123 214-01
Adv AdvRoom
Jones 412
Smith 216
File Organization
File Organization is the physical arrangement of data in a file into records and/or
a secondary storage device.
Types of File Organization
1. Heap (unordered/random) File Organization: is the simplest type of file
organization. Records are placed in file in the same order as they are inserted. A
new record is inserted in the last page of the file; if there is insufficient space in
the last page, a new page is added to the file. This makes insertion very efficient.
However, as a heap file has no particular ordering with respect to field values, a
linear search must be performed to access a record. A linear search involves
reading pages from the file until the required is found. This makes retrievals from
heap files that have more than a few pages relatively slow, unless the retrieval
involves a large proportion of the records in the file.
To delete a record, the required page first has to be retrieved, the record
marked as deleted, and the page written back to disk. The space with deleted
records is not reused. Consequently, performance progressively deteriorates as
deletion occurs. This means that heap files have to be periodically reorganized by
the Database Administrator (DBA) to reclaim the unused space of deleted
records.
Distributed Database
A Distributed Database (DDB) is a collection of multiple logically interrelated
databases distributed over a computer network. A distributed database management
system (DDBMS) is software that manages the DDB and provides an access mechanism
that makes this distribution transparent to the users.
Distributed Database Management System are of two types;
1. Homogeneous Distributed Database management systems
2. Heterogeneous Distributed Database management systems
Characteristic of DDB
1. All sites are interconnected
2. Logically related shared data can be collected
3. Fragments can be replicated
4. Data at each site is controlled by a DBMS
Advantages of DDB
1. Continuous operation, even if some nodes go offline
2. Distributed query processing can improve performance
3. Modularity — systems can be modified, added and removed from the distributed
23
database without affecting other modules (systems)
4. Protection of valuable data (security)
5. Increase reliability and availability
6. Easier expansion
7. Keeping track of data
8. Local autonomy or site autonomy — a department can control the data about
them
9. A DDB spreads out the system workload by processing data at several sites.
Disadvantages of DDB
1. Increased Complexity
2. Increased storage and infrastructure requirements
3. Difficult to maintain integrity — but in a distributed database, enforcing integrity
over a network may require too much of the network's resources to be feasible
4. Inexperience — distributed databases are difficult to work with, it requires high
level of technical know-how
5. Its more expensive
6. Probability of security lapses increases when data are located at multiple sites.
Parallel Database
A parallel database system seeks to improve performance through parallelization of
various operations, such as loading data, building indexes and evaluating queries.
Parallel databases improve processing ofinput/output speeds by using multiple CPUs
and disks in parallel. In parallel processing, many operations are performed
simultaneously, as opposed to serial processing, in which the computational steps are
performed sequentially.
24
Networking
Computer network is the connection of two or more computers through a
communication media for the purpose of sharing information and resources.
Components of a Network
1. Server: server is the computer that provides services to the other computers on
the network.
2. Node: each computer on the network is called a node
3. Client: client computer is the one that uses the services that a server provides
4. Media/communication channel: is the physical connection between the devices
on a network e.g. wi-fi, wires, Bluetooth etc.
5. Resources: are the services that are available to a client on the network e.g.
printers, modem, data etc.
6. User: is any person who uses a client to access resources on the network
7. Protocols: these are rules used for communications
Network Topology
Network Topology is the physical arrangement of computers and other network
devices on the network.
Types of Network Topology
1. Bus Topology: bus topology consists of single cable with a terminator at each
26
end. All the computers and devices in the network are connected to the single
cable called Backbone. Bus topology is the easiest to setup and it works best
because of its numerous connections and the cost of setting it up is high (because
27
of the additional cabling).
4. Ring Topology: all computers are connected via a cable that loops in a ring or
circle. A ring topology has no start, no end and no central connecting point. The
biggest problem with this topology is that if one computer or cable fails, the
entire network could go down, but in newer technology, the computer will be
disconnected (dropped out) and the entire network wouldn’t be affected.
5. Hybrid Topology: this type of topology is always provided when two different
basic network topologies are connected. Two common examples of hybrid
network are: star-ring topology and star-bus topology.
28
Network Devices
Network devices are the components for connecting computers in order to share
resources on the network. These devices include:
1. Hub: this is a central connection point device used to connect multiple computers
together in a network. It has ports where network cables can be plugged into. The
number of ports determines the number of computers or devices it can
networked.
5. Network Interface Card (NIC): this is a circuit board in the computer that
29
provides physical connection between the computers and the network. NIC
determines the speed and performance of a network.
6. Network Cables: this is a medium through which data or information passes from
one network device to another. E.g. twisted pair cable, coaxial cable and fiber
optic cable.
7. Network Connector: this is a part of network cable that allows two devices to be
connected to each other. E.g. RJ-11 connector, RJ-45 connector and BNC
connector.
INTERNET
This is a global system of interconnected computer networks that uses the Standard
Internet Protocol (IP) Suite to serve several billion users worldwide. It’s a network of
networks.
INTERNET BROWSERS
These are software’s that allow a person to explore the internet in an easy to use way. A
browser is a Graphical User Interface (GUI) application program that retrieves and
displays documents from websites. Examples include Opera, Netscape Navigator,
firefox, etc.
COMPUTER SECURITY
Computer security is the protection of computer systems from the theft and damage to
their hardware, software or information, as well as from disruption or misdirection of
the services they provide.
COMPUTERSECURITY TERMS
(CIA)
1. Confidentiality: Ensuring that information is not accessed by unauthorized
persons.
2. Integrity: ensuring that information is not altered by unauthorized persons in a
way that is not detectable by authorized users
Advantages of Internet
1. E-mail
2. information
3. online chat
4. Services e.g. E-banking, hotel reservation, job searching etc.
5. E-commerce
6. Downloads
Disadvantages of Internet
1. Theft of personal information
2. Negative effects on family communication
3. Internet addiction
4. Virus threat
5. Spamming
WEB DESIGN
A design is the art and process of combining individual elements of design (lines,
shapes, texture, colour) into a pleasing arrangement.
Examples of web designing software are Adobe Dreamweaver, Komodo Edit, iWeb,
WebPlus X4, Sandox, AllWebMenus PRO 5 etc.
Graphic Applications
1. Business
2. Advertising
3. Politics
4. Education
5. Movie and Animation
1. Menu bar:
The menu bar can be used to activate commands of graphic packages and operations.
Depending on the graphic package you are using, some packages contain the following.
File, edit, view, text, tools, window, help, etc.
2. Toolbar:
The tool bar is a bar that contains short cuts to menu and other command. For example
32
you can use the “open” icon o open an existing document by clicking on it. Others are
save, print, cut, copy, paste, alignment, bold italics, underline etc
3. Toolbox:
A toolbox is a bar with tools for creating, filling and modifying objects in the drawing
4. Printable area:
Printable area can be referred to as the work space inside the drawing window, which
you can plan your work on.
5. Colour palette:
It is a bar that allows you to fill desired objects or texts with any colour you want.
Other features specific to CorelDraw: The rule, Drawing window, Status bar, Document
Navigator etc