You are on page 1of 31

Introduction to Information

Technology
2nd Edition
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.

Chapter 5:
Managing Organizational Data and
Information

Prepared by:
Roberta M. Roth, Ph.D.
University of Northern Iowa

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-1
© 2003 John Wiley & Sons, Inc.
Chapter Preview
In this chapter, we will study:
Basic data management terminology
Storing data in traditional files and
problems with this approach
The data base approach to storing
data
How data is organized to create a
data base
Components of a DBMS
How companies utilize their stored
Introduction to Information Technology, 2nd Edition
5-2
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Basics of Data Arrangement
and Access
 The Data Hierarchy
Recall…8 bits => 1 byte => 1
character
Field - a logical grouping of characters
into a word, a small group of words, or
a complete number
Record - a logical grouping of related
fields
File - a logical grouping of related
records
Database - a logical grouping of
Introduction to Information Technology, 2nd Edition
5-3

related files
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Data Management Terminology
 Entity - a person, place, thing, or event
about which information is maintained
 Records describe entities
 Attribute - each characteristic or quality
describing a particular entity
 Fields describe attributes
 Primary Key - field that uniquely
identifies the record
 Secondary Key - field does not identify
the records uniquely, but can be used to
form logical groups of records
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-4
© 2003 John Wiley & Sons, Inc.
Storing and Accessing Records
 Sequential media (tape) stores records
sequentially based on key values
 Direct (or random) media (disks) use other
techniques:
 Indexed Sequential Access Method (ISAM)
• Uses an index to locate individual records
• Index - lists the key field of each record and where
that record is physically located
 Direct File Access Method
• Uses the key field to locate the physical address of
a record
• Transform algorithm - translates the key field value
directly into the record’s storage location

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-5
© 2003 John Wiley & Sons, Inc.
Traditional File Environment
 The organization has multiple
applications with related data files
Each application has a
specific data file related
to it, containing all the
data records needed by
the application

Each application comes


with an associated
application-specific data
file
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-6
© 2003 John Wiley & Sons, Inc.
Traditional File Environment
(continued)

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-7
© 2003 John Wiley & Sons, Inc.
Problems: Traditional File
Environment
 Data redundancy – same piece of data
found in several places.
 Data inconsistency – various copies of data
no longer agree.
 Data isolation – data in several application
data files is hard to access and integrate.
 Security – may be difficult to limit access to
various data items in applications.
 Data integrity – data must be accurate and
correct.
 Application/data dependence –
applications are developed based on the way
Introduction to Information Technology, 2nd Edition
5-8
data is stored.
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
Database : The Modern Approach
The database management system provides
access to the data

Database Management System (DBMS)

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-9
© 2003 John Wiley & Sons, Inc.
Locating Data in Databases
 Two choices: Centralized or Distributed
 Choice will affect user accessibility, query
response time, data entry, security, and cost
 Option 1: Centralized database
 All the related files are in one physical location
 Provides database administrators with the ability to
work on a database as a whole at one location
 Data consistency is improved and security is easier
 Files are only accessible via the centralized host
computer
 Recovery from disasters is easier
 Vulnerable to a single point of failure
 Speed problem due to transmission delays
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-10
© 2003 John Wiley & Sons, Inc.
Locating Data in Databases
(continued)
 Option 2: Distributed database
 Complete copies of a database, or portions of
a database, are in more than one location,
close to the user
 Type 1: Replicated database
• Copies of database in many locations
• Reduced single-point-of-failure problems
• Increased user access responsiveness
 Type 2: Partitioned databases
• A portion of the database in each location
• Each location responsible for its own data

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-11
© 2003 John Wiley & Sons, Inc.
Locating Data in Databases
(continued)

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-12
© 2003 John Wiley & Sons, Inc.
Database Development
 First, develop a Conceptual design - an
abstract model of the database from the
user or business perspective
 Second, organize with Entity-
Relationship (ER) modeling
process of planning the database
design
Entity classes  Instance 
Identifiers  Relationships
Professor
Course
Course Number ID Number
1:M 1:1 Name
Course Name can have
Course Time Department
Course Place

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-13
© 2003 John Wiley & Sons, Inc.
Entity-relationship model
 Types of
relationships:
 One-to-one: a student
has one schedule; a
schedule belongs to one
student
 One-to-many: a course
has one professor; a
professor has one or
more courses
 Many-to-many: a
student has one or more
courses; a course has
one or more students

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-14
© 2003 John Wiley & Sons, Inc.
Database Development
Third, analyze the data structure by
applying the Normalization process
method that reduces a relational
database to its most streamlined form
Helps achieve
• minimum redundancy
• maximum data integrity
• best processing performance

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-15
© 2003 John Wiley & Sons, Inc.
Non-normalized table and its
problems

* If an order contains many parts, you will have many


repeating groups of part information. How will you know
how much space to set aside for all the groups of part
information?

* The customer number, name, address, etc. must be


repeated in every order. If the customer moves, how will
you make sure that all occurrences of the address get
updated correctly in all the order
records?
Introduction to Information Technology, 2 Edition
Turban, Rainer & Potter
nd
5-16
© 2003 John Wiley & Sons, Inc.
Normalized Relation

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-17
© 2003 John Wiley & Sons, Inc.
Database Development
Fourth, physically implement the
data structure in the database
management system software
Create tables
Define fields and field properties
Establish primary keys
Define table relationships
Add actual data (records) to tables

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-18
© 2003 John Wiley & Sons, Inc.
Database Management Systems
 A set of software programs that provide
access to a database
 Data is stored in one location, from
which it can be updated and retrieved
 Application programs are given access to
the stored data by various mechanisms
 Maintaining the integrity of stored
information
 Managing security and user access
 Recovering information when the system
fails
 Accessing various database functions from
Introduction to Information Technology, 2 Edition
nd

within
Turban, Rainer & Potter an
© 2003 John Wiley & Sons, Inc.
application 5-19
DBMS: Logical versus Physical
View
 Logical view - represents data in a
format that is meaningful to a user
(e.g., tables with fields and records)
 Physical view - deals with the
actual, physical arrangement and
location of data in the direct access
storage devices (DASD)
 DBMSs shield the user from
having to know about the
physical location of the data;
user only has to know the logical
way it’s organized
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-20
© 2003 John Wiley & Sons, Inc.
DBMS Components
 Data Model
 Defines the way data are conceptually
structured
 Data Definition Language (DDL)
 Used to define the content and structure of
the data base
 Users define their logical view (schema) of
the database using the DDL
 Physical characteristics of records and fields
are defined
 Relationships, primary keys, and security can
be established
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-21
© 2003 John Wiley & Sons, Inc.
More DBMS Components
Data Manipulation Language (DML)
Used to query the contents of the
database, store or update information
in the database, and develop database
applications
Structured query language (SQL) -
most popular relational database
language
Data Dictionary
stores definitions of data elements and
data characteristics
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-22
© 2003 John Wiley & Sons, Inc.
DBMS Benefits
 Improved strategic use of corporate data
 Reduced complexity of IS environment
 Reduced data redundancy and
inconsistency
 Enhanced data integrity
 Application/data independence
 Improved security
 Reduced development and maintenance
costs
 Improved IS flexibility
Introduction to Information Technology, 2nd Edition
 Increased data access
Turban, Rainer & Potter
© 2003 John Wiley & Sons, Inc.
5-23
Logical Data Models
 A manager’s ability to use a database depends
on how the database is structured logically and
physically.
 In a logically structuring database, consider the
characteristics of the data and how the data will
be accessed.
 Three common data models : hierarchical,
network, and relational
 Using these models, database designer can
build logical or conceptual view of data that can
then be physically implemented into virtually
any database with any DBMS.

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-24
© 2003 John Wiley & Sons, Inc.
Logical Data Models (continued)
 Relational model is common in PC environment
because it is simple to understand.
 Relational model provides high flexibility and
ease of use.
 Relational model provides slower search and
access times; a problem in high-volume
business settings.
 Hierarchical data model gives best processing
speeds, but poor query flexibility.
 Network data model gives pretty good
processing speeds and pretty good query
flexibility, but is very complex.

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-25
© 2003 John Wiley & Sons, Inc.
Emerging and Specialized Data
Models
 Multidimensional
 Object-oriented data model
 Hypermedia

 Geographic information system database


 Knowledge database
 Multimedia database
 Small-footprint database

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-26
© 2003 John Wiley & Sons, Inc.
Using the Stored Data
 Access to accurate and timely
information is critical in today’s business
environment.
 Much information is collected by TPS, but
access to and insight from that data may
be limited.
 Many organizations are working to
improve information access and
availability.

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-27
© 2003 John Wiley & Sons, Inc.
Using the Stored Data (continued)
 Data warehouse:
 a database system designed to support management
decision making.
 Emphasis is on organizing data in convenient,
meaningful ways so that users can get their queries
answered.
 Current and historical, detail and summarized data are
included.
 Metadata (data about data) is included to help keep
track of the data warehouse content.
 Data mart: small scale, simpler data
warehouse. Easier to implement. Targets
smaller business segments.

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-28
© 2003 John Wiley & Sons, Inc.
Using the Stored Data (continued)
 Data mining:
 Extracting new insights from data warehouse
 Sophisticated tools employ algorithms to
discover hidden patterns, correlations, and
relationships.
• Classifying
• Clustering
• Associating
• Sequencing
• Forecasting
 What can we learn (examples)?
• Market segments and customer characteristics
• Customer buying patterns
• Fraudulent behavior
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-29
© 2003 John Wiley & Sons, Inc.
Chapter Summary
 Traditional file structures lead to
numerous data management problems
 DBMS help resolve many of those
problems
 Users are concerned with the logical
view of data.
 When organizations have created well
structured databases, decision making
and insight will improve through data
warehouses and the use of data mining
tools.
Introduction to Information Technology, 2nd Edition
Turban, Rainer & Potter 5-30
© 2003 John Wiley & Sons, Inc.
Copyright © 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction
or translation of this work beyond that permitted in Section 117 of the 1976
United Stated Copyright Act without the express written permission of the
copyright owner is unlawful. Request for further information should be
addressed to the Permissions Department, John Wiley & Sons, Inc. The
purchaser may make back-up copies for his/her own use only and not for
distribution or resale. The Publisher assumes no responsibility for errors,
omissions, or damages, caused by the use of these programs or from the
use of the information herein.

Introduction to Information Technology, 2nd Edition


Turban, Rainer & Potter 5-31
© 2003 John Wiley & Sons, Inc.

You might also like