Professional Documents
Culture Documents
It Notes
It Notes
DATA INFORMATION
Data is unorganized raw facts that need Information is a processed, organized data
processing without which it is seemingly presented in a given context and is useful to
random and useless to humans humans.
Data is an individual unit that contains raw Information is a group of data that
material which does not carry any specific collectively carry a logical meaning.
meaning.
Data doesn’t depend on information.
Information depends on data.
It is measured in bits and bytes.
Information is measured in meaningful units
like time, quantity, etc.
Data is never suited to the specific needs of Information is specific to the expectations
a designer. and requirements because all the irrelevant
facts and figures are removed, during the
transformation process.
An example of data is a student’s test score The average score of a class is the
information derived from the given data.
Data alone has no significance. Information is significant by itself.
https://www.guru99.com/difference-information-data.html
HARDWARE SOFTWARE
Hardware is a physical parts computer that Software is a set of instruction that tells a
cause processing of data computer exactly what to do.
It is manufactured. It is developed and engineered.
Hardware cannot perform any task Software cannot be executed without
without software hardware.
It has four main categories: input device, It is mainly divided into System software,
output devices, storage, and internal Programming software and Application
components. software.
As Hardware are physical electronic We can see and also use the software but
devices, we can see and touch hardware can’t actually touch them.
Hardware is not affected by computer Software is affected by computer viruses.
viruses.
It cannot be transferred from one place to It can be transferred.
another electrically through network.
If hardware is damaged, it is replaced with If software is damaged, its backup copy
new one. can be reinstalled.
Ex: Keyboard, Mouse, Monitor, Printer, Ex: MS Word, Excel, Power Point,
CPU, Hard disk, RAM, ROM etc. Photoshop, MySQL etc.
https://www.geeksforgeeks.org/difference-between-hardware-and-software/
unstructured and semi-structured decision problems. Decision support systems can be either
fully computerized or human-powered, or a combination of both.
Www.wikipedia.com/decision support system
A decision support system (DSS) is a computerized program used to support determinations,
judgments, and courses of action in an organization or a business. A DSS sifts through and
analyzes massive amounts of data, compiling comprehensive information that can be used to
solve problems and in decision-making.
https://www.investopedia.com/terms/d/decision-support-system
For example, the business owner might want a sales report for a specific product category to
see how well it is selling in a particular location during a given holiday season, or at
a specific price. A manager may want to know how a change in the _price of a product or
service will affect the profitability of that product or service.
written in English will be converted to binary language and thus computers and humans
communicate with each other. Some of the basic examples of digital devices are Personal
computers, Desktops, Laptops, Smartphones, and Mobiles.
3) Minicomputer:
It is a midsize multiprocessing computer. It consists of two or more processors and can
support 4 to 200 users at one time. Miniframe computers are used in institutes and
departments for tasks such as billing, accounting and inventory management. A
minicomputer lies between the mainframe and microcomputer as it is smaller than mainframe
but larger than a microcomputer.
Applications of minicomputers:
A minicomputer is mainly used to perform three primary functions, which are as follows:
o Process control: It was used for process control in manufacturing. It mainly performs
two primary functions that are collecting data and feedback. If any abnormality occurs
in the process, it is detected by the minicomputer and necessary adjustments are made
accordingly.
o Data management: It is an excellent device for small organizations to collect, store and
share data. Local hospitals and hotels can use it to maintain the records of their patients
and customers respectively.
o Communications Portal: It can also play the role of a communication device in larger
systems by serving as a portal between a human operator and a central processor or
computer.
4) Workstation:
Workstation is a single user computer that is designed for technical or scientific applications. It
has a faster microprocessor, a large amount of RAM and high speed graphic adapters. It
generally performs a specific job with great expertise; accordingly, they are of different types
such as graphics workstation, music workstation and engineering design workstation.
Characteristics of workstation computer:
o It is a high-performance computer system designed for a single user for business or
professional use.
o It has larger storage capacity, better graphics, and more powerful CPU than a personal
computer.
o It can handle animation, data analysis, CAD, audio and video creation and editing.
Any computer that has the following five features, can be termed as a workstation or can be
used as a workstation.
o Multiple Processor Cores: It has more processor cores than simple laptops or
computers.
o ECC RAM: It is provided with Error-correcting code memory that can fix memory errors
before they affect the system's performance.
o RAID (Redundant Array of Independent Disks): It refers to multiple internal hard drives
to store or process data. RAID can be of different types, for example, there can be
multiple drives to process data or mirrored drives where if one drive does not work than
other starts functioning.
o SSD: It is better than conventional hard-disk drives. It does not have moving parts, so the
chances of physical failure are very less.
o Optimized, Higher end GPU: It reduces the load on CPU. E.g., CPU has to do less work
while processing the screen output.
5) Microcomputer
Microcomputer is also known as a personal computer. It is a general-purpose computer that is
designed for individual use. It has a microprocessor as a central processing unit, memory,
storage area, input unit and output unit. Laptops and desktop computers are examples of
microcomputers. They are suitable for personal work that may be making an assignment,
watching a movie, or at office for office work.
Characteristics of a microcomputer:
o It is the smallest in size among all types of computers.
o A limited number of software can be used.
o It is designed for personal work and applications. Only one user can work at a time.
o It is less expansive and easy to use.
o It does not require the user to have special skills or training to use it.
LAPTOPS: A portable, compact computer that can run on an electrical wall outlet or a
battery unit. All components (keyboard, mouse, etc.) are in one compact unit. Usually
more expensive than a comparable desktop. Laptop is a small size of the computer
system. Laptop is a more powerful computing device and laptop is a multi-tasking
computer. We can carry very easily because this is lightweight.
TABLETS: Tablet Computer just like a Mobile Device but bigger than Smartphone and
smaller then Notebook Computer. Just like Totally Smartphone feature like Touch
screen display, power full Battery Backup and we can calling and receiving call and click
pictures and anything.
It is called Random Access Memory because any of the data in RAM can be accessed just as fast
as any of the other data. (RAM) is one of the most important components in determining your
system’s performance. RAM gives applications a place to store and access data on a short-term
basis. It stores the information your computer is actively using so that it can be accessed
quickly. There are two types of RAM:
ROM:
This memory is used as the computer begins to boot up. Small programs called firmware are
often stored in ROM chips on hardware devices (like a BIOS chip), and they contain instructions
the computer can use in basic performing some of the most operations required to operate
hardware devices. ROM memory cannot be easily or quickly overwritten or modified.
CACHE:
It is a high-speed access area that can be either a reserved section of main memory or a storage
device. Most computers today come with L3 cache or L2 cache, while older computers included
only L1 cache. Cache memory is sometimes called CPU (central processing unit) memory
because it is typically integrated directly into the CPU chip or placed on a separate chip that has
a separate bus interconnect with the CPU. Therefore, it is more accessible to the processor, and
able to increase efficiency, because it's physically close to the processor.
It is not directly accessible by the CPU. Computer usually uses its input/output channels to
access secondary storage and transfers the desired data using intermediate area in primary
storage. Secondary storage is non-volatile, long-term storage. Without secondary storage all
programs and data would be lost the moment the computer is switched off. E.g. Hard disk.
HARDDISK:
A hard disk drive (HDD) is a non-volatile computer storage device containing magnetic disks or
platters rotating at high speeds. It is a secondary storage device used to store data
permanently. The hard disk drive is the main, and usually largest, data storage device in a
computer. It can store anywhere from 160 gigabytes to 2 terabytes. Hard disk speed is the
speed at which content can be read and written on a hard disk. A hard disk unit comes with a
set rotation speed varying from 4500 to 7200rpm.Disk access time is measured in milliseconds.
Hard disk may be internal or external.
INTERNAL EXTERNAL
PORTABILITY NO YES
PRICE LESS EXPENSIVE MORE EXPENSIVE
SPEED FAST SLOW
SIZE BIG SMALL
3) TERTIARY STORAGE:
Typically it involves a robotic mechanism which will mount (insert) and dismount removable
mass storage media into a storage device. It is a comprehensive computer storage system that
is usually very slow, so it is usually used to archive data that is not accessed frequently. This is
primarily useful for extraordinarily large data stores, accessed without human operators.
Examples are: Magnetic tape & optical disks
Magnetic Tape
A magnetically coated strip of plastic on which data can be encoded.
Tapes for computers are similar to tapes used to store music.
Tape is much less expensive than other storage mediums but commonly a much slower
solution that is commonly used for backup.
Optical Disc
Optical disc is any storage media that holds content in digital format and is read by using
a laser assembly is considered optical media.
The most common types of optical media are
o Blu-ray (BD)
o Compact Disc (CD)
o Digital Versatile Disc (DVD)
CD DVD BD
Capacity 700MB 4.7-17GB 50GB
Wavelength 780nm 650nm 405nm
Read/write speed 1200KB/s 10.5MB/s 36MB/s
Example CR-ROM, DVD-ROM, BD-R,
CD-R, DVD+R/RW, BD-RE
CD-RW DVD-R/RW,
DVD-RAM
4) OFFLINE STORAGE:
Also known as disconnected storage. It is computer data storage on a medium or a device that
is not under the control of a processing unit. It must be inserted or connected by a human
operator before a computer can access it again.
Offline storage is storage that must be physically connected or inserted into a computer system
every time you want to use it. It is not built into the system. Offline storage is a convenient way
of taking your data with you but widespread distributed storage in the form of cloud computing
is expected to reduce the appeal of offline storage.
Devices such as portable hard discs, CDs, DVDs, USB flash drives and SD cards are all examples
of offline storage. These storage mediums are portable and compatible with a range of systems.
Offline storage can also be used to create backups.
Floppy Disk:
A soft magnetic disk.
Floppy disks are portable.
Floppy disks are slower to access than hard disks and have less storage capacity, but
they are much less expensive.
Can store data up to 1.44MB.
Two common sizes: 5¼”and 3½”.
Zip Diskette:
Hardware data storage device developed by lomega that functions like a standard 1.44’’
floppy drive.
Capable to hold up to 100mb of data or 250mb of data on new drives.
Now it is less popular as user needed larger storage capabilities.
Memory card:
An electronic flash memory storage disk commonly used in consumer electronic devices
such as digital cameras, MP3 players, mobile phones, and other small portable devices.
Memory cards are usually read by connecting the device containing the card to your
computer, or by using a USB card reader.
Addressability
A.) DBMS Components: Hardware When we say Hardware, we mean computer, hard
disks, I/O channels for data, and any other physical component involved before any
data is successfully stored into the memory. When we run Oracle or MySQL on our
personal computer, then our computer's Hard Disk, our Keyboard using which we
type in all the commands, our computer's RAM, ROM all become a part of the DBMS
hardware.
DBMS Components: Software This is the main component, as this is the program which
controls everything. The DBMS software is more like a wrapper around the physical database,
which provides us with an easy-to-use interface to store, access and update data. The DBMS
software is capable of understanding the Database Access Language and interprets it into actual
database commands to execute them on the DB.
DBMS Components: Data Data is that resource, for which DBMS was designed. The motive
behind the creation of DBMS was to store and utilize data. In a typical Database, the user saved
Data is present and Meta data is stored. Metadata is data about the data. This is information
stored by the DBMS to better understand the data stored in it. For example: When I store
my Name in a database, the DBMS will store when the name was stored in the database, what
UNOFFICIAL NOTES Page 18
INTRO TO INFORMATION TECHNOLOGY
is the size of the name, is it stored as related data to some other data, or is it independent, all
this information is metadata
2. Conceptual Level
o The conceptual schema describes the design of a database at the conceptual level.
Conceptual level is also known as logical level.
o The conceptual schema describes the structure of the whole database.
o The conceptual level describes what data are to be stored in the database and also
describes what relationship exists among those data.
o In the conceptual level, internal details such as an implementation of the data structure
are hidden.
3. External Level
o At the external level, a database contains several schemas that sometimes called as
subschema. The subschema is used to describe the different view of the database.
o An external schema is also known as view schema.
o Each view schema describes the database part that a particular user group is interested
and hides the remaining database from that user group.
o The view schema describes the end user interaction with database systems.
OR
Internal Level/Schema The internal schema defines the physical storage structure of the
database. The internal schema is a very low-level representation of the entire database. It
contains multiple occurrences of multiple types of internal record. In the ANSI term, it is also
called "stored record'.
Facts about Internal schema:
Conceptual Schema/Level The conceptual schema describes the Database structure of the
whole database for the community of users. This schema hides information about the physical
storage structures and focuses on describing data types, entities, relationships, etc. This logical
level comes between the user level and physical storage view. However, there is only single
conceptual view of a single database.
External Schema/Level An external schema describes the part of the database which specific
user is interested in. It hides the unrelated details of the database from the user. There may be
"n" number of external views for each database. Each external view is defined using an external
schema, which consists of definitions of various types of external record of that specific view.
An external level is only related to the data which is viewed by specific end users.
This level includes some external schemas.
External schema level is nearest to the user
The external schema describes the segment of the database which is needed for a
certain user group and hides the remaining details from the database from the specific
user group.
• Duplication can lead to loss of data integrity; in other words the data is no longer consistent.
For example, consider the duplication of data between the Payroll and Personnel
departments. If a member of staff moves to new house and the change of address is
communicated only to Personnel and not to Payroll, the person’s pay slip will be sent to the
wrong address. A more serious problem occurs if an employee is promoted with an associated
increase in salary. Again, the change is notified to Personnel but the change does not filter
through to Payroll. Now, the employee is receiving the wrong salary. When this error is
detected, it will take time and effort to resolve.
3. Data Dependence: In file processing systems, files and records were described by specific
physical formats that were coded into the application program by programmers. If the format
of a certain record was changed, the code in each file containing that format must be updated.
Furthermore, instructions for data storage and access were written into the application’s code.
Therefore, .changes in storage structure or access methods could greatly affect the processing
or results of an application.
In other words, in file based approach application programs are data dependent. It means
that, with the change in the physical representation (how the data is physically represented in
disk) or access technique (how it is physically accessed) of data, application programs are also
affected and needs modification. In other words application programs are dependent on the
how the data is physically stored and accessed.
4. Difficulty in representing data from the user’s view: To create useful applications for the
user, often data from various files must be combined. In file processing it was difficult to
determine relationships between isolated data in order to meet user requirements.
5. Data Inflexibility: Program-data inter dependency and data isolation, limited the flexibility
of file processing systems in providing users with ad-hoc information requests
6. Incompatible file formats: As the structure of files is embedded in the application programs,
the structures are dependent on the application programming language. For example, the
structure of a file generated by a COBOL program may be different from the structure of a file
generated by a ‘C’ program. The direct incompatibility of such files makes them difficult to
process jointly.
7. Data Security. The security of data is low in file based system because, the data is
maintained in the flat file(s) is easily accessible. For Example: Consider the Banking System.
The Customer Transaction file has details about the total available balance of all customers. A
Customer wants information about his account balance. In a file system it is difficult to give the
Customer access to only his data in the· file. Thus enforcing security constraints for the entire
file or for certain data items are difficult.
8. Transactional Problems. The File based system approach does not satisfy transaction
properties like Atomicity, Consistency, Isolation and Durability properties commonly known as
ACID properties.
9. Concurrency problems. When multiple users access the same piece of data at same interval
of time then it is called as concurrency of the system. When two or more users read the data
simultaneously there is ll( problem, but when they like to update a file simultaneously, it may
result in a problem.
10. Poor data modeling of real world. The file based system is not able to represent the
complex data and interfile relationships, which results poor data modeling properties.
11. Data Redundancy: It is possible that the same information may be duplicated in different
files. This leads to data redundancy results in memory wastage.
12. Data Inconsistency: Because of data redundancy, it is possible that data may not be in
consistent state.
9. In file system there is no concept of tables or relations between tables it just organize
the records row by row. Database system contains table and relation between the
tables.
10. A “File manager” is used to store all relationships in directories in File Systems where as
a data base manager (administrator) stores the relationship in form of structural tables.
Controlled access to database may include:
a security system
an integrity system
a concurrency control system
a recovery control system
a user-accessible catalog.
Advantages:
There are various advantages of introducing database system approach in an application
system. Some of them are discussed below:
Control of data redundancy
In the database approach there is central repository of data that not only helps in avoiding the
wastage of storage space but also helps in controlling the redundancy by data integration. It
helps in avoiding the duplication of data by following techniques like normalization and key
concepts. Thus the data is stored in database table at only one place from where it can be
retrieved when needed, by avoiding redundancy.
Data consistency
This is maintained by following the concept “control of redundancy”. If the data is stored at
one place in a database then while updating any information the changes will be done at only
one place which is reflected at all place where ever it is present in whole database. There is no
need to change at all places where that data is present. For example if an employee has a
change in his address then only in employee table the address will be changed. From there it
will be updated everywhere in database. Thus it ensures all copies of the data are kept
consistent. This helps in maintaining consistency of information throughout the system without
any loss or misleading of information.
More information from the same amount of data
With the integration of the operated data in the database approach, it may be possible to
derive additional information for the same data. All data is stored in a single database, instead
of being stored in various other separate files, making the process of obtaining information
quicker and in an easy way. For example, in the file-based system of a property company, the
Contracts Department does not know who owns a leased property. Similarly, the Sales
Department has no knowledge of lease details. Now when we combine these files, the
Contracts Department has access to owner details and the Sales Department has access to
lease details. Thus more information can be derived now from same available data.
Sharing of data
There is central repository of data in a database system that makes it available to the entire
organization and can be shared by all authorized users.
Improved data integrity
Data integrity mainly refers to ensuring that data is recorded exactly as intended and when
retrieved it’s in the same way as it was when it was recorded. There should not be any data loss
when data is retrieved. It mainly provides the validity and consistency of stored data. The
database application has various Integrity Constraints, which are consistency rules that the
database is not permitted to violate. One of the constraints is specifying data type for every
data item. Another is referential integrity constraint in which a record in one file must be
related to records in other files. These constraints help in maintaining integrity of data.
Improved security
Database approach provides a protection of the data from the unauthorized users. It may take
the term of user names and passwords to identify user type and their access right in the
operation including retrieval, insertion, updating and deletion. Providing the facility of
accessible rights in database system for various levels in an organization makes it secure for
use. For example, the DBA has access to all the data in the database where as a branch
manager may have access to all data that is related to only his branch office. In a similar way a
sales assistant may have access to all data relating to properties but don’t have any access to
sensitive data such as staff salary details.
Enforcement of standards
The integration of the database enforces the necessary standards including data formats,
naming conventions, documentation standards, update procedures and access rules. It helps in
maintaining standards among the user in an organization. The sharing of data within
departments, exchange of information among the users on various projects become easy
following the standard database on a centralized environment.
Economy of scale
Using centralized database helps in combining all organization’s operational data into one
database with applications to work on one source of data. This helps in cost saving as well as
reducing redundancy among the applications. The organizations can invest their money on
buying new tools like good processors, storage space and communications devices. Instead of
each department buying individually, the organization as whole can do this by saving
operational and management time and money.
Balance of conflicting requirements
By having a structural design in the database, the conflicts between users or departments can
be resolved. Decisions will be based on the base use of resources for the organization as a
whole rather that for an individual entity.
Improved data accessibility and responsiveness
By having integration in the database approach, data accessing can be crossed departmental
boundaries. This feature provides more functionality and better services to the users.
Increased productivity
The database approach provides all the low-level file-handling routines. The provision of these
functions allows the programmer to concentrate more on the specific functionality required by
the users. The fourth-generation environment provided by the database can simplify the
database application development.
Improved maintenance
Reduce complexity
Provide a level of security
Provide a mechanism to customize the appearance of the database
Present a consistent, unchanging picture of the structure of the database, even if the
underlying database is changed
Sharing of data and multi-user transaction processing: The database approach allows a set of
concurrent users to retrieve and to update the database. Spreadsheets cannot offer several
users the ability to view and work on the different data in the same file, because once the first
user opens the file it is locked to other users. Other users can read the file, but may not edit
data. For example, when one user is changing data then the database should not allow other
users who query the same data to view the changed, unsaved data. Instead the user should
only view the original data.
4. Transaction Control Language TCL is used to run the changes made by the DML
statement. TCL can be grouped into a logical transaction.
Procedural DML allows user to tell system exactly how to manipulate data (e.g.,
Network and hierarchical DMLs)
Non-Procedural DML (declarative language) allows user to state what data is needed
rather than how it is to be retrieved (e.g., SQL, QBE)
Fourth Generation Languages (4GLs)
o Non-procedural languages: SQL, QBE, etc.
o Application generators, report generators, etc.
Q.) DEFINE SDLC.
A.) Software Development Life Cycle(SDLC) is a process used by the software industry to
design, develop and test high quality software's. The SDLC aims to produce a high-quality
software that meets or exceeds customer expectations, reaches completion within times and
cost estimates.
SDLC is using for developing different kind of software's and also show the flow structure of the
software.
Q.) WHAT ARE THE PHASES OF SDLC?
A.) There are 6 phases of SDLC:
Preliminary Investigation
System Analysis
System Design
System Development
System Implementation
System Operation & Maintenance