Escolar Documentos
Profissional Documentos
Cultura Documentos
COMPETENCE
1.Distinguish between the Physical and Logical view of
data.
2.Describe how data is organized: characters, fields,
records, files and databases.
3.Describe database, data issues and database
management systems (DBMS)
4.Describe five data models: hierarchical, network,
relational, multidimensional, and object-oriented
5.Distinguish among individual, company, distributed,
proprietary and Web Database
6.Recognize Strategic database uses and security
concerns.
INTRODUCTION
Secondary storage (libraries, files, folders etc) are
designed to store information thus to be a competent user
of information in this information age, you have to know
how to find information, and so you need to understand
how it is stored via the recent arrival of very powerful
microcomputers and their connectivity to
communications network and the internet.
Competent end users need to understand data, fields,
records, files and databases.
The need to know different ways in which data can be
structured and the types of databases and
The most important database uses and issues.
DATA
Information systems consist of people, procedures, software,
hardware and data.
Data is a raw facts or observations about people, places, things
and events.
Types of Data includes audios, music, photographs, videos,
numbers, symbols, letters etc.
There are two ways or perspectives to view data. These views are
the Physical and Logical View.
Physical view focuses on the actual format and location of the
data. Data is recorded as digital bit and grouped together in bytes
representing characters using a coding scheme such as ASCII;
very specialized computer professionals are concerned with this
view.
Logical view focuses on the meaning and content of the data. It
involves using application programs; end users and most
computer professionals are concerned with this view.
DATA ORGANIZATION
Data is organized by the following groups
Character: the most basic logical element e.g. single
letter, number etc.
Field: is the next level consisting of related characters
e.g. a person’s last name (Baker). A data field represents
an attribute(description or character) of some
entity(person, place, thing or object)
Record: a collection of related fields e.g. a payroll file
consists of all the employee records ie first and last
name, social security number and salary.
File: a collection of related records e.g. a payroll file
consisting of all the employee records.
Database: an integrated collection of related files e.g.
personnel database includes all related employee files
including payroll file and benefit file.
KEY FIELD
A key field (primary field) is the field in a record that
uniquely identifies each record.
STRATEGIC USES
Databases help uses to keep up to date and plan for the future,
to support managers and other business professions;
organizations collect data from variety of internal and external
databases.
Data Warehouse is a new type of database that supports data
mining.
Data mining is a technique for searching and exploring for
related information and patterns in data.
Databases available for general and specific business
purposes include:
Business directories provides addresses, financial and
marketing information, product and trade and brand names.
Demographic data such as county and city statistics,
estimates on population and income, census data etc.
Business statistics information such as financial
information on publicly trade companies, market potentials
of certain retail stores etc.
Text databases provides articles from business
publications, press releases, reviews on companies etc.
Web databases covers a wide range of topics including
all of the above. Web search sites like Yahoo! Maintain
databases of available Web sites.
SECURITY
Precisely because database are so valuable, their security has
become a vital issue.
Some security concerns
One concern is that personal and private information about
people store in databases may be used for the wrong
purposes.
Unauthorized users gaining access to a databases e.g.
computer viruses launched into a database or network.
Security may require putting guards and checking the
identification of everyone admitted. Some systems
electronically check fingerprints.