Professional Documents
Culture Documents
KSS PG DEPARTMENT OF
COMMERECE
UNIT-3
1
Data R esource Management
Character
The most basic logical data element is the
character, which consists of a single alphabetic,
numeric, or other symbol. One might argue that the
bit or byte is a more elementary data element, but
remember that those terms refer to the physical
storage elements provided by the computer
hardware, discussed in Chapter 3. From a user's
point of view (that is, from a logical as opposed to
a physical or hardware view of data), a character is
the most basic element of data that can be observed
and manipulated.
Field
The next higher level of data is the field, or data
item. A field consists of a grouping of characters.
For example, the grouping of alphabetic characters
4
Data R esource Management
6
Data R esource Management
Database
A database is an integrated collection of logically
related records or objects. An object consists of
data values describing the attributes of an entity,
plus the operations that can be performed upon the
data.
A database consolidates records previously stored
in separate files into a common pool of data
records that provides data for many applications.
The data stored in a database are independent of
the application programs using them and of the
type of secondary storage devices on which they
are stored. For example, a personnel database
consolidates data formerly segregated in separate
files such as payroll files, personnel action files,
7
Data R esource Management
Database Development
Database management packages like Microsoft
Access or Lotus Approach allow end users to
easily develop the databases they need. However,
large organizations with client/server or
mainframe-based systems usually place control
of enterprisewide database development in the
hands of database
10
Data R esource Management
12
Data R esource Management
Database Interrogation
The database interrogation capability is a major
benefit of a database management system. End
users can use a DBMS by asking for information
from a database using a query language or a report
generator. They can receive an immediate
response in the form of video displays or printed
reports. No difficult programming is required. The
query language feature lets you easily obtain
immediate responses to ad hoc data requests: you
merely key in a few short inquiries. The report
generator feature allows you to quickly specify a
report format for information you want presented
as a report.
SQL Queries
SQL, or Structured Query Language, is a query
language found in many database management
packages. The basic form of an SQL query is:
SELECT. . . FROM. . . WHERE. . .
After SELECT you list the data fields you want
retrieved. After FROM you list the files or tables
13
Data R esource Management
Database Maintenance
The databases of an organization need to be
updated continually to reflect new business
transactions and other events. Other miscellaneous
changes must also be made to ensure accuracy of
the data in the databases. This
14
Data R esource Management
Application Development
DBMS packages play a major role in application
development. End users, systems analysts, and
other application developers can use the
internal4GL programming language and built-in
software development tools provided by many
DBMS packages to develop custom application
programs. For example, you can use a DBMS to
easily develop the data entry screens, forms,
reports, or web pages of a business application. A
DBMS also makes the job of application
programmers easier, since they do not have to
develop detailed data-handling procedures using a
conventional programming language every time
they write a program. Instead, they can include
data manipulation language (DML) statements in
15
Data R esource Management
Types of Databases
Continuing developments in information
technology and its business applications have
resulted in the evolution of several major types of
database.
Operational Databases
These databases .store detailed data needed to
support the business processes and operations of
the E-business enterprise. They are also called
subject area databases (SAD B), transaction
databases, and production databases. Examples
are a customer database, human resource database,
inventory database, and other data bases containing
data generated by business operations. This
includes databases of Internet and electronic
commerce activity, such as click stream data
describing the online behaviour of customers or
visitors to a company's website.
16
Data R esource Management
Distributed Databases
Many organizations replicate and distribute copies
or parts of databases to network servers at a variety
of sites. These distributed databases can reside on
network servers on the World Wide Web, on
corporate intranets or extranets, or on other
company networks. Distributed databases may be
copies of operational or analytical databases,
hypermedia or discussion databases, or any other
type of database. Replication and distribution of
databases is done to improve database performance
and security. Ensuring that all of the data in an
organization's distributed databases are
consistently and concurrently updated is a major
challenge of distributed database management.
External Databases
Access to Data Warehouses and Data Mining
A data warehouse stores data that have been
extracted from the various operational external and
17
Data R esource Management
19
Data R esource Management
Data Mining
Data mining is a major use of data warehouse
databases. In data mining, the data in a data
warehouse are analyzed to reveal hidden patterns
and trends in historical business activity. This can
be used to help managers make decisions about
strategic changes in business operations to gain
competitive advantages in the marketplace.
23
Data R esource Management
arrangements.
Technical Foundations of
Database Management
Database Management
Just imagine how difficult it would be to get any
26
Data R esource Management
Database structures
The relationships among the many individual
records stored in data bases are based on one of
several logical data structures, or models. Database
management system packages are designed to use
a specific data structure to provide end users with
quick, easy access to information stored in
databases. Five fundamental database structures
are the hierarchical, network, relational, object-
oriented, and multidimensional models
28
Data R esource Management
.
Hierarchical Structure
Early mainframe DBMS packages used the
hierarchical structure, in which the relationships
between records form a hierarchy or treelike
structure. In the traditional hierarchical model, all
records are dependent and arranged in multilevel
structures, consisting of one root record and any
number of subordinate levels. Thus, all of the
relationships among records are one-to-many,
since each data element is related to only one
element above it. The data element or record at the
highest level of the hierarchy (the department data
element in this illustration) is called the root
element. Any data element can be accessed by
moving progressively downward from a root and
along the branches of the tree until the desired
record (for example, the employee data element) is
located.
29
Data R esource Management
Network Structure
The network structure can represent more complex
logical relationships, and is still used by some
mainframe DBMS packages. It allows many-to-
many relationships among records; that is, the
network model can access a data element by
following one of several paths, because any data
element or record can be related to any number of
other data elements. For example departmental
records can be related to more than one employee
record, and employee records can be related to
more than one project record. Thus, one could
locate all employee records for a particular
department, or all project records related to a
particular employee.
Relational Structure
The relational model has become the most popular
of the three database structures. It is used by most
microcomputer DBMS packages, as well as by
many midrange and mainframe systems. In the
relational model, all data elements within the
database are viewed as being stored in the form of
30
Data R esource Management
31
Data R esource Management
Multidimensional Structure
The multidimensional database structure is a
variation of the relational model that uses
multidimensional structures to organize data and
express the relationships between data. You can
visualize multidimensional structures as cubes of
data and cubes within cubes of data. Each side of
the cube is considered a dimension of the data.
Each dimension can represent a different category,
such as product type, region, sales channel, and
time.
Each cell within a multidimensional structure
contains aggregated data related to elements along
each of its dimensions. For example, a single cell
may contain the total sales for a product in a region
for a specific sales channel in a single month. A
major benefit of multidimensional databases is that
they are a compact and easy-to- understand way to
visualize and manipulate data elements that have
many interrelationship' So multidimensional
32
Data R esource Management
Key Fields
That's why all data records usually contain one or
more identification fields, or keys, that identify the
record so it can be located. For example, the Social
Security number of a person is often used as a
primary key field that uniquely identifies the data
records of individuals in student, employee, and
customer files and databases. Other methods also
identify and link data records stored in several
different database files. For example, hierarchical
and network databases may use pointer fields.
These are fields within a record that indicate (point
to) the location of another record that is related to
it in the same file, or in another file. Hierarchical
and network database management systems use
this method to link records so they can retrieve
information from several different database files.
Relational database management packages use
primary keys to link records. Each table (file) in a
relational database must contain a primary key.
This field (or fields) uniquely identifies each
record in a file and must also be found in other
related files. For example, department number can
38
Data R esource Management
updating or responses.
Direct Access
When using direct access methods, records do not
have to be arranged in any particular sequence on
storage media. However, the computer must keep
track of the storage location of each record using a
variety of direct organization methods so that data
can be retrieved when needed. New transactions
data do not have to be sorted, and processing that
requires immediate responses or updating is easily
handled. There are a number of ways to directly
access records in the direct organization method.
Let's take a brief look at three widely used methods
to accomplish such direct access processing.
40
Data R esource Management
45
RDBMS (relational database management
system)
SQL Commands
The standard SQL commands to interact with
relational databases are CREATE, SELECT,
INSERT, UPDATE, DELETE and DROP.
These commands can be classified into the
following groups based on their nature −
47
By Smita.Shet
CREATE
1
Creates a new table, a view of a
table, or other object in the database.
ALTER
2 Modifies an existing database object,
such as a table.
DROP
3 Deletes an entire table, a view of a
table or other objects in the database.
48
By Smita.Shet
SELECT
1
Retrieves certain records from one or
more tables.
2 INSERT
Creates a record.
3 UPDATE
Modifies records.
4 DELETE
Deletes records.
49
By Smita.Shet
1 GRANT
Gives a privilege to user.
2 REVOKE
Takes back privileges granted from user.
50
By Smita.Shet
Physical Security
A small business should safeguard its computer
systems against losses and theft. Keep systems and
servers in a safe place not exposed to the elements.
Usually accounting equipment is kept inside offices
where doors can be locked, limiting unauthorized
access. Make sure cables connecting accounting
equipment are safe and away from people tripping
on them or rodents destroying them. Keep cables
and switches in a locked environment.
If you're using wireless connections for network or
Internet access, follow security protocols; it is
relatively easy to hack into wireless systems.
If you use laptop computers, consider purchasing
software that tracks the whereabouts of the
computer. In 2008, a laptop computer was stolen
every 53 seconds from restaurants, airport lounges
and hotel rooms, according to the Gartner Group. To
manage this risk, many businesses use a LoJack for
computers that can be downloaded from the Internet.
51
By Smita.Shet
Authentication
52
By Smita.Shet
What is Cryptography?
54