Professional Documents
Culture Documents
UIT 10e ch08 PPT
UIT 10e ch08 PPT
UIT 10e ch08 PPT
2
Using Information Technology,
3
Using Information Technology,
5
Using Information Technology,
7
Using Information Technology,
DBMS Utilities
Programs that allow you to maintain the database
by creating, editing, deleting data, records, and files
Also include automated backup and recovery
Report Generator
Program for producing on-screen or printed readable
documents from all or part of a database
10
Using Information Technology,
Recoverability
Integrity
Security
Availability
Reliability
Performance
11
12
Using Information Technology,
Hierarchical Database
Fields or records are arranged in related
groups resembling a family tree with child
(low-level) records subordinate to parent
(high-level) records
Root record is the parent record at the top of
the database, and data is accessed topdown, through the hierarchy
Oldest and simplest; used in mainframes in
1970s
Still used in some reservation systems
Is rigid in structure and difficult to update
13
Using Information Technology,
14
Using Information Technology,
Network Database
Similar to a hierarchical database but
more flexible-- each child record can have
more than one parent record
Used principally with mainframe
computers
Requires the database structure to be
defined in advance; flexibility still lacking
15
Using Information Technology,
16
Using Information Technology,
Relational Database
Relates or connects data in different files through
the use of a key, or common data element
Data stored in tables (relations, or files) of rows
(tuples, or records) and columns (attributes, or
fields)
More flexible than previous models; built with SQL
Examples for large systems are Oracle, Informix,
Sybase
Examples for microcomputers are Paradox and
Microsoft Access
Users dont need to know data structure to use the
database
17
Using Information Technology,
18
Using Information Technology,
19
Using Information Technology,
Object-Oriented Database
Uses objects, software written in small,
reusable chunks, as elements within data files
An object consists of:
Data in any form, including audio, graphics, and
video
Instructions on the action to be taken with the
data
Multidimensional Database
Models data as facts, dimensions, or
numerical answers for use in the
interactive analysis of large amounts of
data for decision-making purposes
Allows users to ask questions in colloquial
language
Use OLAP (online analytical processing)
software to provide answers to complex
database queries
21
Using Information Technology,
Database Type
Description
Hierarchical database
Network database
Relational database
Object-oriented
database
Multidimensional
database
23
Using Information Technology,
24
25
Using Information Technology,
Classification analysis
Statistical pattern-recognition process that is
applied to data sets with more than just
numerical data
26
Using Information Technology,
DM applications include:
Cancer detection
Sports
Marketing
Health
Science
Counterterrorism
Sentiment analysis
Exploring the deep web
27
28
Using Information Technology,
Order tracking
Bar codes are assigned to items being shipped
that allow customers to track shipping progress
via the internet
Shop bots
Programs that help users search for a particular
product or service and then provide price
comparisons
Using Information Technology,
30
Types of E-Commerce
Business-to-Business (B2B)
A business sells to other businesses using the
internet or a private network to cut transaction
costs and increase efficiencies
Business-to-Consumer (B2C)
A business sells goods or services directly to
consumers
Consumer-to-Consumer (C2C)
Consumers sell goods or services directly to other
consumers with the help of a third party, such as
eBay; rsum sites are also C2C exchanges, as
are dating sites and online communities
31
Using Information Technology,
32
Using Information Technology,
33
Using Information Technology,
Information Systems
What are the qualities of good
information?
34
Using Information Technology,
35
Using Information Technology,
Tactical-level management
Middle level managers who make tactical decisions to
implement the strategic goals set for the organizati on
Operational-level management
Low-level supervisors who make daily operational
decisions
36
Using Information Technology,
38
Using Information Technology,
40
Using Information Technology,
42
45
Using Information Technology,
6. Expert System
Also called knowledge-based system
Set of interactive computer programs that helps
users to solve problems that would otherwise
require the assistance of a human expert.
Used by both management and
nonmanagement personnel to solve specific
problems
One of the most useful applications of artificial
intelligence (AI)
46
Using Information Technology,
47
Using Information Technology,
Expert systems
Natural language processing
Intelligent agents
Pattern recognition
Fuzzy logic
Virtual reality and simulation devices
Robotics
48
Expert Systems
Built by knowledge engineers
Include surface knowledge and deep
knowledge
Three components of an expert system:
Knowledge base: an expert systems database
of knowledge about a particular subject
Inference engine: the software that controls the
search of the expert systems knowledge base
and produces conclusions
User interface: the display screen for the user
to interact with the expert system
49
Using Information Technology,
50
Using Information Technology,
Intelligent agents
Pattern recognition
51
Fuzzy logic
A method of dealing with imprecise data and
uncertainty, with problems that have many
answers rather than one
Has been applied in running elevators to
determine optimum times for elevators to wait;
used in many appliances
Virtual reality
A computer-generated artificial reality that
projects a person into a sensation of 3-D space
Often used as simulators to represent the
behavior of physical or abstract systemse.g.,
for pilot training
52
Using Information Technology,
Robotics
The development and study of machines
that can perform work that is normally done
by people
Commonly found in manufacturing plants
and also in situations where people would
be in danger
Nuclear inspections
Assembly lines, especially paint lines
Checking for land mines and bombs
Fighting oil-well fires
Mars expedition
53
Strong AI
Computers can think on a level that is equal to
or better than humans and can also achieve
consciousness
54
Using Information Technology,
Turing Test
In 1950 Allen Turing predicted computers
would eventually be able to mimic human
thinking
Turing test determines whether the computer
is human
Judge is in another location and doesnt see the
computer
Judge converses via a computer terminal with two
entities: one a person and one a computer
Judge must determine who is the person and who is
the computer
If the computer can fool the judge, it is said to be
intelligent
No computer system has yet passed the Turing test
Using Information Technology,
55
Smarter-Than-Human Computers
The Singularity
A moment when humans would have created
self-aware, smarter-than-human machines
capable of designing computers and robots
that are better than humans can design today
Also may involve transferring the contents of
human brains and thought processes into a
computing environment
56
Using Information Technology,
Ethics in A.I.
Computer software is subtly shaped by
the ethical judgments and assumptions of
its creators; there is no human-values-free
/ bias-free software.
Will AI cause humans to lose control of
computer systems?
57
Using Information Technology,
58
Using Information Technology,
Privacy concerns
Privacy is the right of people not to reveal
information about themselves
Name migration: your name can migrate to
many other databasesyoull get endless junk
mail and telemarketing calls, and targeted ads
online
Rsum rustling and online snooping
Government prying and spying
Privacy laws have been enacted, but tension
continues between supporters of privacy and
supporters of security
Is a national ID card necessary?
59
Using Information Technology,
60
Using Information Technology,