Professional Documents
Culture Documents
Data Management System is a complex set of software programs that control the organization,
storage and retrieval of data in a database. It also controls the security and integrity of the
database.
FLAT FILE.A flat file is a data file that does not contain links to other files or is a non-relational
database.
Separate data sets for each user leads to data redundancy which causes problems with:
• Data storage: Commonly used data duplicated multiple times within the organization.
• Data updating: Changes must be made separately for each user. If updating fails problem of
currency of information with users having outdated information.
• Task-data dependency: Users cannot obtain additional information as needs change.
DATABASE APPROACH
Access to the data resource is controlled by a database management system (DBMS). It is a set
of formally described tables from which data can be accessed or reassembled in many different
ways without having to reorganize the database tables.
- deals with descriptions of the database schema and is used to create and modify the
structure of database objects in the database.
Physical View- The physical view deals with the actual, physical arrangement and
location of data in the direct access storage devices. Database specialists use the
physical view to make efficient use of storage and processing resources.
It is used for the detailed programming of the database.
Logical View- used to make the users life easier; each user can decide what they want
to view and how they want to view items on a database. Not only can each individual
chose what logical view they would like, but also they can set that view up as the
default.All users do not need to view all areas of the database, only the areas that
pertain to their job. This eliminates the extra information that the specific user will not
need.
For example:
A bookkeeping firm will keep Accounts Receivable Records and Accounts Payable
Records. The business keeps the checks and balance system in place they will have
one employee for the Accounts Receivables (AR) and another employee for the
Accounts Payable (AP). The accounts receivable clerk does not need to see the checks
that are being cut by the accounts payables clerk because it does not pertain to the
accounts receivable clerks’ job. The accounts receivable clerk will set their logical view
to show the Customer Number and maybe the customers balance due. This helps the
accounts receivable clerk view only what he/she needs and makes the database less
complicated. The accounts payables clerk does not need to view which customers owe
and what their balances due are. The accounts payables clerk only needs to know the
bank balance and the invoices that need to be paid. So the accounts payables clerk at
this time will set their logical view to only view the tables they need.
- The query capability permits end users and professional programmers to access data in
the database without the need for conventional programs.
o Can be an internal control issue since users may be making an ‘end run’ around
the controls built into the conventional programs
- Used to retrieve the data from database
- Example: SELECT: used to retrieve data from the database
-
Structured Query Language (SQL)
- primary job is to ensure that data is available, protected from loss and corruption, and
easily accessible as needed
- The TOP responsibility of DBA professional is to maintain data integrity.
- The sharing of a common database by, multiple users requires organization
coordination, rules and guidelines to protect the integrity of the database.
Hierarchical Database
o In a Hierarchical database, model data is organized in a tree-like structure. Data
is Stored Hierarchically (top down or bottom up) format. Data is represented
using a parent-child relationship. In Hierarchical DBMS parent may have many
children, but children have only one parent.
Network Model
o The network database model allows each child to have multiple parents. It helps
you to address the need to model more complex relationships like as the
orders/parts many-to-many relationship. In this model, entities are organized in a
graph which can be accessed through several paths.
Relational Model
o Relational DBMS is the most widely used DBMS model because it is one of the
easiest. This model is based on normalizing data in the rows and columns of the
tables. Relational model stored in fixed structures and manipulated using SQL.
A physical database is both the actual device housing the information files and the
search paths used to access information between each source.
A physical database is technically a smaller unit of storage referred to as either a
company, field, record or table, depending on how much information the physical
storage device contains
a. Data Structures
b. Data Organization
o The way records are physically arranged on the secondary storage device
o Either sequential or random
DATABASE TERMINOLOGY
Data Attribute/Field: a single item of data, such as customer’s name, account balance,
or address
Entity: is a database representation of an individual resource, event, or agent about
which we choose to collect data.
Record Type: table or file
Database:set of record types that an organization needs to support its business
processes.
Associations:Record types that constitute a database exist in relation to other types.
Cardinality – the degree of association between two entities
o The number of possible occurrences in one table that are associated with a
single occurrence in a related table
o Used to determine primary keys and foreign keys
ADVANTAGES DISADVANTAGES
Cost reductions Loss of control
Improved cost control responsibility Mismanagement of resources
Improve users satisfactions Hardware and software incompatibility
Redundant task and data consolidating
Back up of data can be improved
incompatible tasks
Difficulty attracting qualified personnel
Lack of standards
DATA CURRENCY
Database lockout procedures are necessary to keep IPU’s from reading inconsistent
data and from writing over a transaction being written by another IPU.
During data processing account balances pass through as state of temporary
inconsistency where their values are incorrectly stated. This occurs during the execution
of a transaction.
DISTRIBUTED DATABASES
a) Partitioning
o Splits the central database into segments or partitions that are distributed to their
primary users
o Works best for the organizations that requires minimal data sharing among
distributed IT units.
Deadlock Phenomenon
o Multiply sites to lock out each other from the database thus preventing each from
processing each transaction.
Deadlock resolution
o Usually involves terminating one or more transactions to complete processing of
the other transactions in the deadlock.
oFactors to be considered:
Resources currently invested in the transaction
Transactions stage of completion
The number of deadlocks associated with the transaction
b) Replication
o Effective in companies where there exists a high degree of data sharing but no
primary users.
o Since, common data are replicated at each IT unit site, the data traffic between
sites is reduced considerably.
Concurrency Control
o Database concurrency is the presence of complete and accurate data at all users
site.
o Concurrency method is a serialize transactions which involves labeling each
transactions by two criteria.
Special software group transactions into classes to identify potential
conflicts.
Time-stamp each transaction. Each time-stamp is made by incorporating
the sites ID number.
Questions to be addressed:
Should the organization’s data be centralized or distributed?
If data distribution id desirable, should the databases be replicated or portioned?
If replicated, should the database be totally be replicated or partially replicated?
If the database is to be portioned, how should the data segments be allocated
among the sites?
Controls over data management systems fall into two general categories: access controlsand
backup controls. Access controls are designed to prevent unauthorized individualsfrom viewing,
retrieving, corrupting, or destroying the entity’s data. Backup controlsensure that in the event of
data loss due to unauthorized access, equipment failure, orphysical disaster the organization
can recover its database.
1. Access Controls- Users of flat files maintain exclusive ownership of their data. In spite
of the data integrationproblems associated with this model, it creates an environment in
which unauthorizedaccess to data can be effectively controlled. When not in use by the
owner, a flatfile is closed to other users and may be taken off-line and physically secured
in the datalibrary. In contrast, the need to integrate and share data in the database
environmentmeans that databases must remain on-line and open to all potential users.
a. User Views- The user view or subschema is a subset of the total database
that defines the user’s datadomain and provides access to the database.
b. Database Authorization Table- The database authorization table contains
rules that limit the actions a user can take. Thistechnique is similar to the
access control list used in the operating system. Each user isgranted certain
privileges that are coded in the authority table, which is used to verify
theuser’s action requests.
c. User-Defined Procedures- A user-defined procedure allows the user to create
a personal security program or routineto provide more positive user
identification than a single password. Thus, in additionto a password, the
security procedure asks a series of personal questions (such as theuser’s
mother’s maiden name), which only the legitimate user should know.
d. Data Encryption- the use of encryption for protecting data that are transmitted
over communications lines. Database systems also use encryption
procedures to protect highlysensitive stored data, such as product formulas,
personnel pay rates, password files, andcertain financial data thus making it
unreadable to an intruder “browsing” the database.
e. Biometric Devices- The ultimate in user authentication procedures is the use
of biometric devices, whichmeasure various personal characteristics, such as
fingerprints, voice prints, retina prints,or signature characteristics. These user
characteristics are digitized and stored permanentlyin a database security file
or on an identification card that the user carries.
Backup Controls in the Database Environment- Since data sharing is a fundamental objective of
the database approach, this environment isparticularly vulnerable to damage from individual
users. One unauthorized procedure, onemalicious act, or one program error can deprive an
entire user community of its information
resource. Also, because of data centralization, even minor disasters such as a disk failure
canaffect many or all users. When such events occur, the organization needs to reconstruct
thedatabase to pre-failure status. This can be done only if the database was properly backed up
inthe first place.
1. Backup. The backup feature makes a periodic backup of the entire database. This isan
automatic procedure that should be performed at least once a day. The backup
copyshould then be stored in a secure remote area.
2. Transaction Log (Journal). The transaction log feature provides an audit trail ofall
processed transactions. It lists transactions in a transaction log file and records
theresulting changes to the database in a separate database change log.
3. Checkpoint Feature. The checkpoint facility suspends all data processing while
thesystem reconciles the transaction log and the database change log against the
database. Atthis point, the system is in a quiet state. Checkpoints occur automatically
several times anhour. If a failure occurs, it is usually possible to restart the processing
from the last checkpoint.Thus, only a few minutes of transaction processing must be
repeated.
4. Recovery Module. The recovery module uses the logs and backup files to restart
thesystem after a failure.