Professional Documents
Culture Documents
What is IT?
Information technology (IT) is the use of any computers, storage, networking and
other physical devices, infrastructure and processes to create, process, store,
secure and exchange all forms of electronic data. Typically, IT is used in the
context of business operations, whereas technology is used for personal or
entertainment purpose.
Data processing plays a significant role in these core business practices, among
others, including:
regulatory compliance.
Electronic storage systems are being created to hold the information that is
being shared over the internet and internal intranets. Secure maintenance
of customer and company files is vital to the integrity of the company.
Virtual vaults keep information safe by limiting access to a select few.
Security systems are put in place to protect your electronic information and
keep it from being wiped out or damaged during a system breakdown.
Hackers are also kept at bay with intense securities.
2. Automated Processes
The ability to find ways to complete more work in a shorter amount of time
is essential to the success of a company. Information technology improves
a company’s efficiency by implementing automated processes to make
employees more capable of handling a larger work load. Reports, queries
and monitoring financials can be completed by the computer programs,
leaving employees free to complete other tasks.
3. Communication
Communication in every aspect of human interaction is essential. In the
business world, communication is imperative to the success of the
company. Emailing, video conferencing and chat rooms allow for easier
communicating between employees and supervisors as well as employees
and clients.
Computer science
The DBMS accepts the request for data from an application and instructs the
operating system to provide the specific data. In large systems, a DBMS helps
users and other third-party software to store and retrieve data.
DBMS allows users to create their own databases as per their requirement. The
term “DBMS” includes the user of the database and other application programs.
It provides an interface between the data and the software application.
Difficult Data Access: A user should know the exact location of file to
access data, so the process is very cumbersome and tedious. If user wants to
No Backup and Recovery: File system does not incorporate any backup and
recovery of data if a file is lost or corrupted.
These are the main reasons which made a shift from file system to DBMS.
Therefore, the ACID property of DBMS plays a vital role in maintaining the
consistency and availability of data in the database.
The most common model, the relational model sorts data into tables, also known
as relations, each of which consists of columns and rows. Each column lists an
attribute of the entity in question, such as price, zip code, or birth date. Together,
the attributes in a relation are called a domain.
Each row, also called a tuple, includes data about a specific instance of the entity
in question, such as a particular employee.
Hierarchical model
The hierarchical model organizes data into a tree-like structure, where each
record has a single parent or root. Sibling records are sorted in a particular order.
That order is used as the physical order for storing the database. This model is
good for describing many real-world relationships.
Dr. Jyoti Upadhyay
Dept of Computer Science
GDRCST Bhilai,CG
Network model
A hypertext database allows any object to link to any other object. It’s useful
for organizing lots of disparate data, but it’s not ideal for numerical analysis.
Entity-relationship Model
In this database model, relationships are created by dividing object of interest into
entity and its characteristics into attributes.
E-R Models are defined to represent the relationships into pictorial form to make
it easier for different stakeholders to understand.
This model is good to design a database, which can then be turned into tables in
relational model(explained below).
Let's take an example, If we have to design a School Database, then Student will
be an entity with attributes name, age, address etc. As Address is generally
complex, it can be another entity with attributes street name, pincode, city etc,
and there will be a relationship between them.
A Database stores critical information and helps access data quickly and
securely. Therefore, selecting the correct Architecture of DBMS helps in easy
and efficient data management.
o 1-Tier Architecture
o 2-Tier Architecture
Dr. Jyoti Upadhyay
Dept of Computer Science
GDRCST Bhilai,CG
o 3-Tier Architecture
2-Tier Architecture
The Application layer resides between the user and the DBMS, which is
responsible for communicating the user's request to the DBMS system and send
the response from the DBMS to the user. The application layer(business logic
layer) also processes functional logic, constraint, and rules before passing data
to the user or down to the DBMS.
Systems analysis
Systems design
Systems Analysis
System analysis is conducted for the purpose of studying a system or its parts in
order to identify its objectives. It is a problem solving technique that improves
the system and ensures that all the components of the system work efficiently to
accomplish their purpose.
Systems Design
Systems
Processes
Technology
What is a System?
The word System is derived from Greek word Systema, which means an
organized relationship between any set of components to achieve some common
cause or objective.
Constraints of a System
Organization
Interaction
It is defined by the manner in which the components operate with each other.
For example, in an organization, purchasing department must interact with
production department and payroll with personnel department.
Interdependence
Integration
Central Objective
requirements
design
implementation
Dr. Jyoti Upadhyay
Dept of Computer Science
GDRCST Bhilai,CG
testing
deployment
operations
maintenance
Phases of SDLC
Systems Development Life Cycle is a systematic approach which explicitly
breaks down the work into phases that are required to implement either new or
modified Information System.
System Design
Review the proposed design. Ensure that the final design must meet the
requirements stated in SRS document.
Finally, prepare a design document which will be used during next phases.
Implementation
Maintenance/Support
The following diagram shows the complete life cycle of the system during
analysis and design phase.
The waterfall is a widely accepted SDLC model. In this approach, the whole
process of the software development is divided into various phases of SDLC. In
this SDLC model, the outcome of one phase acts as the input for the next phase.
In this incremental model, the whole requirement is divided into various builds.
During each iteration, the development module goes through the requirements,
design, implementation and testing phases. Each subsequent release of the
module adds function to the previous release. The process continues till the
complete system is ready as per the requirement.
The advantage of this model is that there is a working model of the system at a
very early stage of development, which makes it easier to find functional or
design flaws. Finding issues at an early stage of development enables to take
corrective measures in a limited budget.
The disadvantage with this SDLC model is that it is applicable only to large and
bulky software development projects. This is because it is hard to break a small
software system into further small serviceable increments/modules.
The advantages of the Iterative and Incremental SDLC Model are as follows −
Some working functionality can be developed quickly and early in the life
cycle.
Results are obtained early and periodically.
Parallel development can be planned.
Progress can be measured.
Less costly to change the scope/requirements.
Testing and debugging during smaller iteration is easy.
Risks are identified and resolved during iteration; and each iteration is an
easily managed milestone.
Easier to manage risk - High risk part is done first.
Identification
This phase starts with gathering the business requirements in the baseline spiral.
In the subsequent spirals as the product matures, identification of system
requirements, subsystem requirements and unit requirements are all done in this
phase.
This phase also includes understanding the system requirements by continuous
communication between the customer and the system analyst. At the end of the
spiral, the product is deployed in the identified market.
Design
The Design phase starts with the conceptual design in the baseline spiral and
involves architectural design, logical design of modules, physical product design
and the final design in the subsequent spirals.
Construct or Build
The Construct phase refers to production of the actual software product at every
spiral. In the baseline spiral, when the product is just thought of and the design
is being developed a POC (Proof of Concept) is developed in this phase to get
customer feedback.
Then in the subsequent spirals with higher clarity on requirements and design
details a working model of the software called build is produced with a version
number. These builds are sent to the customer for feedback.