Professional Documents
Culture Documents
CH 5 Turban IT
CH 5 Turban IT
CH 5 Turban IT
2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-1
Chapter Preview
In this chapter, we will study: Basic data management terminology Storing data in traditional files and problems with this approach The data base approach to storing data How data is organized to create a data base Components of a DBMS How companies utilize their stored data
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc. 5-2
Recall8 bits => 1 byte => 1 character Field - a logical grouping of characters into a word, a small group of words, or a complete number Record - a logical grouping of related fields File - a logical grouping of related records Database - a logical grouping of related files
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-3
record Secondary Key - field does not identify the records uniquely, but can be used to form logical groups of records
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc. 5-4
on key values Direct (or random) media (disks) use other techniques:
Indexed Sequential Access Method (ISAM) Uses an index to locate individual records Index - lists the key field of each record and where that record is physically located Direct File Access Method Uses the key field to locate the physical address of a record Transform algorithm - translates the key field value directly into the records storage location
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-5
related data files Each application has a specific data file related to it, containing all the data records needed by the application
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-7
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-12
Database Development
First, develop a Conceptual design - an abstract
model of the database from the user or business perspective Second, organize with Entity-Relationship (ER) modeling process of planning the database design Entity classes Instance Identifiers Relationships
Course Course Number Course Name Course Time Course Place
1:M
can have
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-13
Entity-relationship model
Types of relationships:
One-to-one: a student has
one schedule; a schedule belongs to one student
Many-to-many: a student
has one or more courses; a course has one or more students
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-14
Database Development
Third, analyze the data structure by
method that reduces a relational database to its most streamlined form Helps achieve
minimum redundancy maximum data integrity best processing performance
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-15
* If an order contains many parts, you will have many repeating groups of part information. How will you know how much space to set aside for all the groups of part information? * The customer number, name, address, etc. must be repeated in every order. If the customer moves, how will you make sure that all occurrences of the address get updated correctly in all the order records?
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc. 5-16
Normalized Relation
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-17
Database Development
Fourth, physically implement the data
Create tables Define fields and field properties Establish primary keys Define table relationships Add actual data (records) to tables
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-18
a database Data is stored in one location, from which it can be updated and retrieved Application programs are given access to the stored data by various mechanisms
Maintaining the integrity of stored information Managing security and user access Recovering information when the system fails Accessing various database functions from within an application
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc. 5-19
know about the physical location of the data; user only has to know the logical way its organized
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc. 5-20
DBMS Components
Data Model Defines the way data are conceptually structured Data Definition Language (DDL) Used to define the content and structure of the data base Users define their logical view (schema) of the database using the DDL Physical characteristics of records and fields are defined Relationships, primary keys, and security can be established
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-21
DBMS Benefits
Improved strategic use of corporate data Reduced complexity of IS environment Reduced data redundancy and inconsistency Enhanced data integrity Application/data independence Improved security Reduced development and maintenance costs Improved IS flexibility Increased data access
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc. 5-23
the database is structured logically and physically. In a logically structuring database, consider the characteristics of the data and how the data will be accessed. Three common data models : hierarchical, network, and relational Using these models, database designer can build logical or conceptual view of data that can then be physically implemented into virtually any database with any DBMS.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-24
is simple to understand. Relational model provides high flexibility and ease of use. Relational model provides slower search and access times; a problem in high-volume business settings. Hierarchical data model gives best processing speeds, but poor query flexibility. Network data model gives pretty good processing speeds and pretty good query flexibility, but is very complex.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-25
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-26
critical in todays business environment. Much information is collected by TPS, but access to and insight from that data may be limited. Many organizations are working to improve information access and availability.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-27
Data mart: small scale, simpler data warehouse. Easier to implement. Targets smaller business segments.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-28
Chapter Summary
Traditional file structures lead to numerous data
management problems DBMS help resolve many of those problems Users are concerned with the logical view of data. When organizations have created well structured databases, decision making and insight will improve through data warehouses and the use of data mining tools.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-30
Copyright 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United Stated Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information herein.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter 2003 John Wiley & Sons, Inc.
5-31