Anda di halaman 1dari 41

PRODUCE BY GBENU IYELORO

gimcada@gmail.com
for ATIB BUSINESS AND COMPUTER COLLEGE

DATA AND INFORMATION


Data is a collection of items such as words, numbers, images, and sounds that
are not organized and have little meaning individually. Data is processed into
information. Information is data that is organized, has meaning, and, therefore,
is useful. A student grade report (information), for example, contain
several data items, including student last name, student first name, student
identification (ID) number, course numbers, course titles, credit hours, and
course grades.
Database is a collection of data organized in a manner that allows access,
retrieval, and use of that data. Database software, also called a database
management system (DBMS), allows you to create a computerized database;
add, change, and delete data; sort and receive data from the database; and
create forms and reports using the data.
Most organizations realize that data is among their more valuable assets.
Without data and information, an organization could not complete many business
activities. Information accumulated on sales trends, competitors’ products and
services, production processes, and even employee skills, for example, allow a
company to make decisions and develop, create, and distribute products and
services. This information is a valuable resource that would be difficult, if not
impossible, to replace. Because information cannot be generated without data,
an organization must manage, maintain, and protect its data resources just as it
would any other resource. Two critically important aspects of this include
ensuring that data has integrity and is kept secure
Data Integrity
For a computer to output accurate information, the data used to create the
information must have integrity. Data integrity is the degree to which data is
accurate. If your name is misspelled in a student database, for example, the data
is inaccurate and is considered a violation of data integrity.
Although accurate data does not guarantee accurate information, it is
impossible to produce accurate information from erroneous data. This computing
principle, often referred to as garbage in, garbage out (GIGO), means that, if
you enter erroneous data into a computer (garbage in), the computer will produce
inaccurate information (garbage out). Data integrity is critical because computers
and individuals use information generated from data to make decisions and take
actions. When you place an order with a mail-order company, for example, a
sales representative enters the product number for each item you order. If he or
she enters an incorrect product number, the warehouse likely will package and
ship an item you did not intend to order.

Data Security

Data security involves protecting data so it is not misused or lost. Most


schools, for example, have procedures that allow only authorized personnel to
access confidential student data. The school also performs backup procedures to
protect against the loss of data. Backup refers to making duplicate copies of
data, files, programs, or disks, which can be used if the originals are lost,
damaged, or destroyed. Making backup copies ensures that you can recover
data in a timely manner and that processing can continue.

THE HIERARCHY OF DATA


Data is organized in a hierarchy in which each higher level consists of one or
more elements from the lower level preceding it. Depending on the application
and the user, different terms describe the various levels of the hierarchy.
Commonly used terms are character, field, record, file and database. A database
contains files, a file contains records, and a record contains fields. Each field is
defined by a variety of characteristics, one of which is the field size, or number of
characters (bytes) it contains.
A bit represents the smallest unit of data the computer can handle. Eight bits
group data in a unit comprise a byte. Each byte represents an individual
character, such as a number (8), letter (M), punctuation mark (!), or other symbol
(@).
A field is a combination of one or more characters and is the smallest unit of
data you can access. Typical fields in a database containing data about people
include First Name, Last Name, Address, City, State, and Zip. A field often is
defined by its data type and field length. The data type specifies the kind of data
a field can contain. Common data types include:
Text: letters numbers or special characters
. Numeric: numbers only
. Currency: dollar and cent amounts or numbers containing decimal values
. Date: month, day and year information
. Memo: longer text entries
. Hyperlink: web address that leads to web page
. Object: pictures, audio, video, or documents created in other applications such
as word processing or spreadsheet
The field length is the maximum number or characters a field can contain.
The state field, for example, stores text and can contain a total of two characters
(for the state abbreviation); a Date field contains a date/time value and can store
up to eight characters (for the format, mm/dd/yyyy).
A record is a group of related fields. A student record, for example, is a
collection of fields about one student. The record might contain fields such as
student ID, First Name, Last Name, Address, City, State, Zip, Birthdate, Email
Address, HS (high school) GPA, HS Graduation Date, and Major.
A key field, or primary key, is a field that differentiates the record in a file.
The data stored in a key field contains data that is unique to a specific record. A
student record, for example, would use student ID as a key field because it
uniquely identifies each student.
A data file, also called a file, is a collection of related records stored on a
disk such as floppy disk, hard disk, or CD-ROM. A school student file, for
example, would consist of thousands of individual student records. Each student
record in the file would contain the same field.
File also refers to word processing, spreadsheet, or other application files.
These types of files sometimes called program files contain programs,
instructions, or documents.
A database is a group of related data files. A school’s database, for
example, might have many individual files related to class scheduling and
registration, such as a student file, a course file, and a scheduling file. The data
files in a database are organized so that a particular database management
system can access them.
MAINTAINING DATA

Data maintenance, sometimes called file maintenance, refers to the


procedures used to keep data current. Data maintenance procedures include
adding records to, changing records in, or deleting records from a file.

Adding Records
Records are added to a file when additional data is required to make it current. If
a school admits a new student, for example, the admissions department would
need to add a record containing the data for the new student to the school’s
student file the process required to add this record to the file includes the
following steps: 1. An admission counselor in the admission department starts
a student maintenance program that gives him or her access to the database.
The admission counselor then clicks the New Record button, which begin a
process of adding a record to the student file. 2. The admissions counselor
assigns a student ID to the new student. This number serves as the primary key
for the student record.
3. The counselor enters data to fill in the fields in the student record. (For
purposes of this example, the data entered is kept to a minimum)
4. Once the admissions counselor verifies the data on the screen, he or she
clicks the New Record button to add the new student record to the student file.
The program that manages the disk determines where to write the record on the
disk. In some cases, the new record is written between existing records in the
file. In other cases, it writes the new record to the end of the file.
Changing Records
Generally, you change a record in a file for two primary reasons: (1) to
correct inaccurate data or (2) to update older data with newer data.
As an example of the first type of change, assume that an
administrative assistant entered a new student’s name as Anita Jonson instead
of Anita Johnson. When the student receives her schedule for classes, she
notices the error, contacts the registration department, and requests that the
department correct the spelling of her name.
To do, an administrative assistant in the registration department retrieves the
record and changes the last name field from Jonson to Johnson. The change
thus corrects the inaccurate data and replaces it with accurate data.
A more common reason to change a record is to update older data with
newer data. Suppose, for example, that Anita Johnson moves from 423 Western
Avenue to 45 Francis Boulevard. The process required to change the address
and update Anita Johnson record includes the following steps:
1 The registration administrative assistant starts the student
maintenance program
2 The registration administrative assistant enters Anita Johnson’s
Student ID of 998-69-2286 to display Anita Johnson record on the screen. If the
assistant did not have the Student ID available, he or she could enter the
student’s last name, which would retrieve all students with the same last name.
3 The program displays data about Anita Johnson. By reviewing this
data on the screen, the assistant can confirm that the correct Student ID was
entered
4 the administrative assistant enters the new street address of 45
Francis Boulevard.
5 Once the administrative assistant verifies the data on the screen,
she clicks the save button to change the record in the Student file. The program
changes the record on the disk.
Deleting Records
When a record no longer is needed, it deleted from a file. In this example, a
student name Brandon Cloak has requested a transfer to another school. The
process required to delete a record from a file includes the following steps:
1 The registration administrative assistance starts the Student
Maintenance program.
2 The assistance enters Brandon Cloak’s Student ID of 997-23-1928
to the display his record on the screen.
3 The program displays Brandon Cloaks name and personal data on
the screen.
4 Once the assistant verifies that this is the record to be deleted, he
or she clicks the Delete Record button to delete the record from the
Student file. The actual processing that occurs to delete a record
from the file depends on the application. Sometime, the record is
removed from the file immediately. Other times, as in this example,
the record is not removed from the file. Instead, the record is
flagged, or marked, in some manner so the program will not
process it again. In this case, an asterisks (*) is placed at the
beginning of the record.

Although the record still physically is stored on the disk, it effectively is deleted
because the program will not retrieve it for processing again. Flagged records
commonly are used in applications where inactive data must be maintained for
some period. A bank for example might flag closed account and remove them
after one year. Periodically, you should run a utility program that removes flagged
records and reorganize current records. Deleting unneeded records reduces the
size of file and creates additional storage space.
Data validation
Validation is the process of comparing the data to a set of rules or values to
determine if the data is accurate. Many programs perform a validity check that
analyzes entered data to help ensure that the data is current and accurate. For
instance, when an assistant adds or changes data in a record, the database
management system performs a validity test to check the entered data.
A range check is an example of a validity check. For example, if you were
entering high school grade point averages, you would expect values in the range
of 0.0 to 4.0. A value of -10 or 85 clearly is outside of the valid range. If the
entered data does not pass a validity check, the computer usually display an
error message and asks you to re-enter the data. Validity check, also called
validation rules, minimize data entry errors and thus enhance the integrity of the
data before the data is stored.
Various types of validity checks include alphabetic checks, numeric checks,
completeness check, range checks, consistency checks and check digit.
ALPHABETIC/NUMERIC CHECKS
An alphabetic check ensures that only alphabetic data is entered into an
alphabetic field and a numeric check ensures that only numeric data is entered
into a numeric field. For example, data in a city field should contain only
alphabetic characters and data in a HS GPA (grade point average) field should
contain only numbers.
COMPLETENESS CHECK
A completeness check verifies that all required data is present. In many
application programs, you can not leave the last name field blank. A
completeness check on this field ensures data exists in it.
RANGE CHECK
A range check determines whether a number is within a specified range. When
data in the HS GPA field must be between 0.0 and 4.0, any number outside this
range is invalid.
CONSISTENCY CHECK
A consistency check test the data entered in two or more field to determine
whether a known relationship between the fields is reasonable. For example, a
High School Graduation Date can not occur before a Birthdate.
CHECK DIGIT
A check digit verifies the accuracy of a primary key. Bank account numbers,
credit card number, an identification number often include a check digit. A check
digit is a number(s) or character(s) that appended to or inserted into a primary
key value.
The value of a check digit is determined by applying a formula to the numbers in
the primary key. For example, if the primary key is 4359, you could do the
following:
(1)Multiply every other digit beginning with rightmost digit by two and then add
together the product and the even digit (4+6+5+1+8=24); (2) subtract the result
from the next highest number ending in zero to generate the check digit (30-
24=6). The primary key then would be 43596 (the primary key value, 4359, with
the check digit, 6, appended).
When the data entry clack enters the primary key, 43596, the program applies
the formula to the fist four digit of the primary key to test if its check digit is valid.
If the computed check digit is the same as the entered check digit (6, in this
case), the program assumes the entered primary key is valid. If the program
compute any other number as the check digit, it displays an error message.

FILE PROCESSING VERSUS DATABASES


Almost all application programs used data that is store in either file or databases.
These two approaches to storing data are discussed in the following session.
File Processing Systems
In the past many organisation store data in file on tape or disk and managed the
data using file processing systems. In atypical file processing system, each
department within an organisation has its own set of files, design specifically for
their own application and the record in one file are not related to the record in any
other file. For example, a school might use a file processing system. The
admission department has its own files to admit a student into the school and the
registration department has its own set of files to register student for classes.
Although organizations have used file processing system for many years, these
systems do have major disadvantages. Two of these disadvantages are data
redundancy and isolated data.
Data Redundancy. Because each department has its own files in a file
processing system, the file often must store the same (redundant) data. Both the
admission department file and the registration department files, for example,
must store a student name and address. Data redundancy wastes resources
such as storage space and employee time. Storing the same data in more than
one file requires increased storage capacity. When data is added or change, data
maintenance takes more time because employees must update more that one
file. Data redundancy also compromises data integrity. If a student relocate, for
example, the school must update the students address fields in the admission
and registration files, as well as any other department that contain the student
address field throughout the school. If the field is not change in all the files, then
discrepancies among the files will exist.
Isolated Data when data is stored in multiple files in multiple departments, often
it is difficult to access the data. For example, to generate a report listing the
major of a particular class of students, you would need to access and use data in
the admission department files and the registration department files because the
admission file store the students’ major and the registration files store the class
rosters. Sharing data from multiple, separate file to generate such a list often is a
complication procedure and typically required expertise of an experience
computer programmer.
To overcome these and other problems associated with file processing system,
many company use the database approach for managing data
The
Database Approach
A database is a shared collection of data. With the database approach, many
application programs in an organization could use the data in this single, shared
database. A schools database for example, would contain data about students
and courses. Users access the data in the database using database software,
which often is called a database management system (DBMS). A database
management system (DBMS) is a software program designed to control access
to the database and manage the data resources efficiently. While a user is
working with the database, the DBMS resides in the memory of the computer.
The next section presents the features of a DBMS in detail.
The database approach overcomes many of the limitations of file
processing systems by reducing data redundancy and allowing for sharing
of data. These and other advantages of the database approach are
presented next.
Reduced Data Redundancy. Using the database approach, all data is
stored together, which greatly reduces data redundancy. A school
database, for example, would store a student’s name and address only
once. When student data is entered or changed, one employee makes the
change once.
Improved Data Integrity. Because most data is stored in only one
location, the database approach increases the data’s integrity by reducing
the likelihood of introducing inconsistencies. When data in the database is
changed, all applications have access to the same updated data.
Share Data. Whereas each application in a file processing environment has its
own set of files, the data in a database environment belongs to and is share by
the entire organisation. Organisation using databases typically set up controls to
define who can access, add, change, and delete the data in a database.
Reduce Development Time. A database organizes data more efficiently than a
file processing system, thus it often is easier and faster to develop programs that
use this data. Many database management systems also provide several tools to
assist in program development, thus further reducing the development time.
Easier Reporting. The database approach allows nontechnical users to access
and manipulate data. Although computer professionals typically develop larger
database and their associated programs, many computers users are developing
smaller database themselves, without professional assistance.
While it has many advantages, the database approach does have
The disadvantages of cost and vulnerability, for one, the initial investment
in the hardware and software require for a database usually is high. A large
database can also can be more complex than a file processing system and thus
require trained individuals to develop these application. These large databases
also required more memory, storage, and processing power than file processing
system.
A second disadvantage of the database approach is its increased
vulnerability .because all data is stored in a single location and share by
application program, many users depend on the data in the database. If the
database is not operating properly or is damage or destroy, many users will not
be able to perform their jobs. In some cases, certain application program may
cease to operate. To protect their valuable database resources, individual and
organisation should establish and follow security procedures.
Despite this limitation, many business and home users work with database
because of their tremendous advantages.

DATABASE MANAGEMENT SYSTEM


A database management system (DBMS) is a software program or set
of program design to control access to the database and manage the data
recourses efficiently. The DBMS resides in the memory of the computer.
Database management system is available for many sizes and type of
computer. Whether designed for a mainframe or a personnel computer, every
database system management has a number or common features. These
features include a data maintenance and retrieval, data security, and backup and
recovery. The following pages discuss these features of a DBMS.

Data dictionary
A data dictionary stores data about each file in the database and each
field within those files. For each file, a data dictionary stores data including the
file name, description, and the files relationship to other file, For each field, a data
dictionary stores data including the field name, field size, description, type of data
(e.g., text, numeric, or date/time), default value, validation rule, and the field
relationship to other field,.
A DBMS uses the data dictionary to perform validation check and maintain
the integrity of the data. When you enter data, the data dictionary verifies that the
entered data matches the field data type. The HS graduation data field, for
example, must contain a number. A data dictionary also allows you to specify a
default value for certain field. A default value is a value that the DBMS
automatically display in a field. Fr example, if most student that attend a school
live in Indiana. Then the DBMS could display a default value minimize the
possibility of errors, because commonly used data items are entered for you.
Usually, you can override a default value if it does not apply for a certain record.
For example, you can change the value, IN, to MI if you need to add a student
that lives in Michigan.

Data Maintenance and Retrieval


A DBMS provides several facilities to enable users and programs to
maintain data in and retrieve data from the database. Data maintenance involves
adding new records, changing data in existing records, and removing unwanted
records from the database. To retrieve data from the database, a process called
a query, involves extracting specific data from the database and displaying,
printing, or storing it. The capability of retrieving (selecting) database information
based on an instruction, called criteria, specified by the user is one of the more
powerful features of a database.
Often, a variety of users, from experience professionals to nontechnical users,
need to maintain and retrieve the data in a database. A DBMS thus provides
several methods of accessing data each, of which requires varying levels of
database. A DBMS thus provides several methods of accessing data, each of
which requires varying levels of database expertise. Of these, query language,
forms, and report generators provide a user-friendly means to maintain and
retrieve data from the database. Each of these methods is described in the
following paragraphs.
A query language consists of simple, English-like statements that allow you
to specify the data you want to display, print, or store. Although each query
tongue has its own grammar and vocabulary, a person without a programming
background usually can learn these languages in a short time.
Although you can maintain data with a query language, most users utilize a
query language only to retrieve data. To simplify the process, many DBMS
provide wizard to guard a user through the steps of building a query.
Most database management systems also include a feature called
query-by-example. Instead of learning the grammar and vocabulary associated
with a query language, you can use a query-by-example (QBE) to extract data
from the database. QBEs have a graphical data interface that assists you with
retrieving data.
A form, sometimes called a data entry form is a window on the screen that
provides areas for entering or changing data in a database. You use forms to
retrieve and maintain the data in a database. Forms usually provide a mean for
validating data so as to reduce data entry errors. When designing a form using a
DBMS, you can make the form attractive and easy to use by incorporating color,
shading, lines, and boxes; varying the fonts and font styles; and using other
formatting features.
A report generator, also called a report writer, allows you to design or
layout a report on the screen, extract data into the report layout, and then display
or print the report. Unlike a form a report generator is used only to retrieve data.
Report generator usually allows you to format report page numbers and dates;
report titles and column headings; subtotals and totals; and fonts, font sizes,
color and shading.
Data Security
To ensure that the data in a database is not misused, a DBMS provides
mechanisms so that only authorized users can access data at permitted times. In
addition, most database management systems allow you to specify different
levels of access privileges for each field in the database. These access privileges
define the activities allowed by a specific user or group of users.
Access privileges for data involve establishing who can enter new data,
change existing data, delete unwanted data, and retrieve data. In a school
database for example, a faculty advisor might have read-only privileges for
student transcripts; that is, the advisor could retrieve only transcript data, but
cannot change it. The schools registrar, by contrast, would have full update
privileges to transcript data, meaning that the registrar can retrieve and change
data. Finally, a student would have no access privileges to the transcript data and
can neither retrieve nor change the data.
Backup and Recovery
Occasionally, a database is damage or destroyed because of hardware failure, a
problem with the software, human error, or a catastrophe such as fire or flood. A
DBMS provide a variety of techniques to restore the database to a usable form in
case it is damaged or destroyed.
 On regular basis, you should make a backup, or copy, of the entire
database. Some DBMS include backup utilities, while others rely on the
backup utilities included with operating systems or those purchase
separately.
 More sophisticated DBMS maintain a log, or listing, of activities that have
affected the database. If you change a student address, for example, the
change appears in the log. In this situation, the DBMS places the following
in the log: a copy of the student record prior to the change, called the
before image; the actual change of address data; and a copy of the
student record after the change, called the after image.
 A DBMS that maintain a log often also provides a recovery utility that uses
the logs to restore a database on the event it is damage or destroyed.
Depending on the type of failure, the recovery utility restores the database
using rollback or rollforward techniques. In a rollback, also called
backward recovery, the log is used to reverse or undo any changes
made to the database during a certain period of time, such as an hour.
Once the database is restored, you must re-enter the transaction entered
during this period of time. In a rollforward, also called forward recovery,
the log is used to re-enter changes automatically since the last database
or backup. Some database recovery utilities use a combination of both
techniques.
RELATIONAL AND OBJECT ORIENTED DATABASES
Every database and database management system is base on a particular
data model. A data model consists of rules and standards that define how
data is organized in a database. Five data model are hierarchical, network,
relational, object oriented and object relational.
In the past, databases are often organized according to the
hierarchical or network data model. In a hierarchical database, data is
organized in a series like family tree or organisation chart. A with a family tree,
the hierarchical database has braches made up of parent and child records.
Each parent records can have multiple child records. Each child record
however can have only one parent. A network database is similar to a
hierarchical database except that each child record can have more that one
parent
Because hierarchical and network databases offer only limited data
access and lack flexibility, database developers prefers the other database
models: relational and object-oriented. A newer data model, the object
relational data model, combines features of the relational and object-
oriented data models. The following session discuss the features of relational
and object-oriented data models and the databases base on them
Relational Databases
Today most commonly used database, relational database is based on the
relational data model. A relational database store data in table that consist of
rows and columns. Each row has a primary key and each column has a
unique name.
A rational database uses terminology different from a file processing
environment to represent data. A relational database developer, for example,
refers to a file as a relation, a record as a tuple, and a field as an attribute. A
user of a relational database, however, refers to a file as a table, a record as
a row, and a field as a column.
In addition to storing data, a relational database also stores any
association among the data, which are called relationships.
With a relational database, you can establish a relationship between tables at
any time, provided the tables have a common column (field). You will relate the
student table and the schedule table, for example, using the student ID column.
In a relational database, the only data redundancy exists in the common columns
(fields) that establish relationships.
RELATIONAL ALGEBRA Relational database often use relational algebra to
manipulate data. Relational algebra uses variables and operations to build a
new relation. Three commonly used relational operations are projection,
selection, and join operations.
To understand the function of the three operations, consider a query
that uses these three operations to retrieve a list of student enrolled in ENGL
104. First, the projection operation extracts columns (field) from a relation, that
is, a vertical subset of a table. The projection operation retrieves the Student ID,
First Name, and Last Name columns from the Student table. The selection
operation retrieves certain rows (records) based on the criteria you specify, that
is, a horizontal subset of a table. The selection retrieves all rows containing
students in ENGL 104 in the schedule table. The join operation then combines
the data from the two queries based on a common column. The join operation
uses the Student ID to combine the data retrieved from the Student and the
Schedule tables.
STRUCTURED QUERY LANGUAGE
Relational databases use a query language called Structured Query Language
(SQL) to manipulate and retrieve data. SQL includes key words and rules used to
implement relational algebra operations.
Most relational database product for minicomputers and mainframe
support Structured Query Language (SQL). Many personal computer database
system vendors also have developed or modified existing packages to support
SQL.
Object-Oriented Databases
An object oriented database is based on an object –oriented data model and,
thus maintain objects. An object is an item that can contain both data and the
activities that read or manipulate the data. A student object, for example, might
contain data about a student (Student ID, First Name, Last Name, Address, and
so on) and instructions on how to print a student record or the formula required to
calculate a student’s tuition rates. A record in a relational database, by contrast,
would only contain data about a student.
Two advantages of object of objected-oriented databases, relative to
relational databases, are that they can store more types of data and access the
data faster. With an object-oriented database, you can store unstructured data
such as photographs, video clips, and document more efficiently than in a
relational database. Examples of applications appropriate for an object-oriented
database include the following:

.A multimedia databases that store images, audio clips, and video clips. A
geographic information system (GIS) database, for example, stores map (Figure
10-25); a voice mail system stores audio messages; and a television broadcast
database stores audio and video clips.

.A groupware database that stores documents such as schedules, calendars,


manuals, memos, and reports. Users can perform queries to search the
document contents. One query, for example, might search the schedules for
available meeting time.

.A computer-aided design (CAD) database tat stores data about engineering,


architectural, and scientific designs. This data in the database includes a list of
components of the item being designed, the relationship among the components,
and archived versions of the design drafts.

.A hypertext database contains text links to other documents, and a


hypermedia database also contains graphics, video, and sound. A variety of
hypertext and hypermedia databases are accessible via the web. You can search
one of these databases for items such as documents, graphics, audio and video
clips, and links to web pages.
Some companies also are developing object-relational databases to take advantage of
features of both the rational and object-oriented data model.
OBJECT QUERY LANGUAGE
object-oriented and object-relational databases often use a query language called object query
language (OQL) to manipulate and retrieve data. OQL is similar to SQL in that it uses many of
the same rules, grammar, and vocabulary. Because OQL is a relatively new standard query
language, however, not all object databases support it. DATABASE
ADMINISTRATION keeping an organization’s data centralized in a database requires a great
deal of cooperation and coordination on the part of the database users. In file processing
systems, if you wanted to track and store data, typically you would just create another file, often
duplicating data already stored by someone else, in another file. In a database environment, if
you want to track or store data, first you check to see if some or all of the data already is in the
database or, if not, how you can add the data to the database. The role of coordinating the use of
the database belongs to the data and the database administrators.
Role of the Data and Database Administrators
The data and database administrators are responsible for managing and coordinating all
database activities. The data administrator (DA) is responsible for designing the database; that
is, the DA determines the proper placement of fields, defines relationships among data, and
outline users’ access privileges. The database administrator (DBA) is responsible for creating and
maintaining the data dictionary, establishing and monitoring security of the database, and
implementing and testing backup and recovery procedures.
In a small organisation, one person often serves as both the data administrator. In larger
organizations, the responsibility of the data and database administrators are split among two or
more persons.
Role of the User
One of the user’s first responsibilities is to familiarize himself or herself with the data in the
existing database. First-time database users often are amazed at the wealth of information
available to help them perform their jobs more effectively.
Another responsibility of the user is to take an active role in specifying additions to the database.
The maintenance of an organization’s database is an ongoing task that organization should
measure constantly against their overall goals. Users thus should participate in designing the
database that will help them achieve their goals.
Database Design Guidelines
A carefully designed database makes it easier for a user to quarry the database, modify the data,
and create reports. The following guidelines apply to database of all sorts

Database guide lines


1 determine the purpose of the database
2 design the tables
 Design table on the paper first
 Each table should contain data about one subject. The student table, for example
, contain data about students.
 Design the fields for each table

WHAT IS SYSTEM DEVELOPMENT LIFE CYCLE?


The system development life cycle (SDLC) is an organized set of
activities that guides those involved through the development of an
information system. The SDLC guides people through system
development. Some activities in the SDLC may be performs at the
same time, while other activities are perform sequentially. Depending
on the type and complexity of the information system being
developed. The duration of the specific activities varies from system
to the next; in some case, an activity may be skipped entirely. The
many activities of the SDLC may be grouped into five larger
categories called phases.
Phases in the SDLC
The system development life cycle can be group into the following
five major phases:
1. Planning
2. Analysis
3. Design
4. Implementation
5. Support
The phase in the SDLC form a loop; that is information system
development is a ongoing process for an organization. In the loop the
support phase point to the planning phase. This connection occurs
when the information system requires changing, which may happen
for a variety of reasons such as a report generate an incorrect total,
information requirement of users change, a new version of software
released, hardware becomes obsolete, thus the planning for a new or
modified system begins and the system development life cycle start
again.

Guidelines for System Development


The development of an information system should follow three main
guidelines: (1) use a phase approach, (2) involves the users and (3)
develop standards.
First, the system development life cycle should be grouped into
phases, each of which contains activities or tasks. Using a phased
approach involves defining the phases of the SDLC and determines
what activities and task will occur in each phase. Many SDLCs
contains the five major phases outline above, while others have more
or fewer phases. Regardless, all life cycle perform the same activities
and task
Second, System developers must involve users throughout the
entire system development process. Users include anyone for whom
the system is being built. Customers, data entry clerks, accountants,
sales manager, and owners are all examples of users; system
developer must remember that they ultimately deliver the system to
the user. If the system is to be successful, the users must contribute
in all stages of development
Third, standard for the development of the information system
should be defined and written. Standards are sets of rules and
procedures that an organization expects employee to accept and
follow. Having standards helps multiple people working on the same
development project produce consistence results. For example, one
developer might refer to a part number in a database as a part ID,
while another calls it a part number, and still others call it a part
number, part #, part code, and so on. A system created in this way
would be so confusing that it could never function correctly, if a
standard is defined and agreed upon, then everyone involve uses
one term, such as part number.
Who Participate In the System Development Life Cycle?
Any one who will be affected by the proposed information
system should participate in its development. Participant can be
categorized as users and information system personnel, which
includes system analyst and programmers. A system analyst is
responsible for designing and developing an information system. A
programmer uses a programming language to write the instruction
necessary to direct the computer to process data into information
System analysts are the liaison between the users and the
programmers; that is, they convert user requests into technical
specifications. Throughout the entire life cycle, system analyst
prepares many reports, drawings and diagrams. They also meet with
users, management, other analysts, data and database
administrators, network administrators, programmers, vendors, and
the steering committee to discuss various aspect of the system
development project.
Steering committee is a decision-making body of an
organization, not only must the system analyst be familiar with
business operations and computer programming techniques, they
must also have excellent communication and interpersonal skills.
For each system development project, the organization usually
established a project team to work on the project from beginning to
the end. The project team consists of both users and information
system personnel usually include a system analyst. One member of
the team, designated as project leader. Manages and control the
budget and schedule of the project.
Project Management
Project management is the process of planning, scheduling, and
then controlling the activities during the system that development life
cycle. The goal of project management is to deliver an acceptable
system to the user in an agreed-upon time frame. While maintaining
costs.
To plan and schedule a project effectively, the project leader
must identify the following components of the project:
. The scope; that is, the goal, objectives, and expectations of the
project.
. Activities to be completed
. Time estimates for each activity
. Cost estimates for each activity
. The order in which activities must occur
. Activities that may be performed concurrently
Once identified, the project leader usually records these items in a
project plan. A popular tool used to plan and schedule the time
relationships among project activities is called a Gantt chart. A Gantt
chart, develop by Henry L. Gantt, is a bar chat that uses horizontal
bars to represent project phases or activities. The left side, or vertical
axis, displays the list of activities to be completed; and a horizontal
axis across the top or bottom of the chart depicts time.
Time estimates assigned to activities should be realistic; otherwise,
the success of a project is in jeopardy from the beginning. If project
member do not believe the schedule is reasonable, they may not
participate to the full extent of their abilities, which could lead to
missed deadline and delivery dates.
Once a project begins, the project leader monitors and controls the
project. Some activities will take less time than originally planned and
others will take longer. It is possible the project leader may realize
that due to excessive time devoted to a particular activity, the original
expected completion date of a project will not be met, in these case,
the schedule completion date may be extended or the scope of the
system development may be reduced, which result in a less
comprehensive system being deliver at the original scheduled
completion date. In either case, the project leader revises the first
project plan and presents the new plan to the users for approval.
One aspect of managing projects is making sure each deliverable is
transmitted on time and according to plan. A deliverable is any
tangible item, such as a chart, diagram, report, or program file.
Project management software, such as Microsoft project, enables
project leaders to plan, schedule, and control system development
project effectively and efficiently.

Feasibility Assessment
Feasibility is a measure of hoe suitable the development of a system
will be to the organization. A project determined feasible at one point
might become infeasible at a later point in life cycle, thus systems
analysts reassess feasibility frequently during the SDLC.
System analysts use four criteria to test feasibility of a project:
operational feasibility, schedule feasibility, technical feasibility, and
economic feasibility. Operational feasibility measures how well the
proposed information system will work in the organization. In other
words, operational feasibility addresses these questions; will the user
like the new system? Will they use it? Will it meet their requirements?
Will it cause any changes to their environment?
Schedule feasibility measures whether the established deadlines for
the project are reasonable. If a deadline is not reasonable, a new
schedule might be developed. If a deadline is mandatory and can not
be extended, then the scope of the project might be reduced so the
mandatory deadline can be met.
Technical feasibility measures whether the organization has or can
obtain the hardware, software, networks and people needed to
deliver and then support the proposed information system. For most
system projects, the technology exists; the challenge is obtaining
fund to pay for such resources, which is address in economic
feasibility.
Economic feasibility, also called cost/benefit feasibility, measures
whether the lifetime benefits of the proposed information system will
exceed its lifetime costs. Many financial techniques, such as return
on investment and payback analysis, are used to perform this
cost/benefit analysis. Often, the system analyst is unfamiliar with
these financial techniques so he or she requests the assistance of a
financial analyst to access economic feasibility.
Documentation
During the entire system development life cycle, project team
members produce much documentation. Documentation is the
compilation and summarization of data and information; it includes
reports, diagrams, programs, or any other deliverable generated
during the SDLC. The entire collection of documentation for a single
project is stored in a project notebook. The project notebook might
be a single one, such as a large three ring binder, or it may be more
sophisticated such as automated project notebook that can be
created and stored using a computerized analysis and design
software package, a project dictionary or repository.
Well-written, thorough documentation makes easier for everyone
involved to understand all aspect of the life cycle, from economic
decisions to system features to security considerations.
Documentation should be an ongoing part of the system development
life cycle. Too often, documentation is put off because project team
members consider it an unimportant or unproductive part of the
system development. In this case, documentation is pushed to the
end of life cycle or not done at all. Without complete and accurate
documentation, users and information system personnel may not
know how to use, operate or support the system. Having quality
documentation also makes it easier to modify the system to meet
changing information requirements.
Data Information Gathering Techniques
Throughout the SDLC, the project team gathers data and information.
System developers need accurate and timely data and information for
many reasons, such as to keep a project on schedule, to access
feasibility, and to ensure the system is meeting requirements. Analyst
and other system developer use several techniques during the
system development life cycle to gather data and information:
reviewing system documentation, observing, sending questionnaires,
interviewing, conducting JAD sessions, and researching.
Reviewing current system documentation
By reviewing system documentation such as a company’s
organization chart, memos, and meeting minutes, you learn the
history of a project and aspect of the business such as its operation,
weaknesses, and strengths.
Observing, Observing an employee or machine can help you
understand exactly how a system functions or task is performed.
Sending questionnaires, To obtain data and information from a
large number of people, you could send questionnaires
Interview, the interview is the most important data and information
gathering techniques because it enables you to clarify responses and
probe from user face to face. An interview can be unstructured or
structured. An unstructured interview relies on the interviewee (the
user) to direct the conversation based on general subject. In a
structured interview, the interviewer (the system analyst) directs the
conversation by following a specific set of topics and asking
predefined questions. Structured interviews tend to be more
successful for the system analyst.
Conducting JAD sessions, As an alternative to the one-on-one
interview, some companies use joint-application design sessions. A
joint-application design (JAD) session is a lengthy, structured,
group work session where all involved in the SDLC, including users
and information system personnel; discuss an aspect of the project.
The goal of the JAD session is to obtain group agreement on an
issue, such as problems associated with an existing system or
information requirements of a new system.
Researching, Computer magazines, trade journals, reference books,
and the world wide web are excellence sources of information. These
resources can provide you information such as the latest hardware,
software, and networking products; and explanations of new
processes and procedures.
WHAT INTIATES THE SYSTEM DEVELOPMENT LIFE CYCLE?
A user may request a new or modified information for variety of
reasons, some external and some internal. An external reason would
be that management or some other governing body mandate that you
make a change to a system. For example, a nation wide bank might
require all offices to use the same e-mail software. Competition is
another external reason for system development. For example, once
one bank offers internet access to account information, others will
have to allow suit, or run the risk of losing customers.
One internal reason for changing an information system is to improve
or enhance it. For example, if a school wants to provide students with
the ability to register for classes via the telephone, the school would
have to modify the registration system to include this enhancement.
The most obvious internal reason for changing an information system
is to correct a problem. For example, the stock-on-hand listed on a
report may not match the actual stock-on-hand in the storehouse.
The initial request for a new or modified information system may be
communicated verbally or written as a memo or E-mail message but
eventually should be written on a standard form. This form called a
request for system service or project request becomes the first
item of documentation in the project notebook. It is important that this
request be completed so that all requests are organized in a similar
format for the first phase of the system development life cycle:
planning.

OPERATING SYSTEM MODEL

APPLICATION LAYER
• Is the OSI layer that is closest to the
user; it provides network services to
the user’s applications.
– File transfer
– Electronic mail
– Terminal access
– Word processing
– Intended communication partners
PRESENTATION
Ensures that the information that the
application layer of one system sends
out is readable by the application layer
of another system.
– Format of data
– Data structure
– Data conversion
– Data compression
– Data encryption

SESSION
• Establishes, manages, and terminates
sessions between two communicating
hosts.
– Sessions
– Dialog
– Conversations
– Data exchange

TRANSPORT
• Provides reliable, transparent transfer
of data over networks.
– Segments, data stream, datagram
– Connection oriented and
connectionless
– End-to-end flow control
– Error detection and recovery
– Segmentation & reassembly

NETWORK
• Provides connectivity and path
selection between two host
systems that may be located on
geographically separated
networks.
– Packets
– Virtual circuits
– Route, routing table, routing
protocol
– Logical address
– Fragmentation

DATA LINK

• Provides for the reliable transfer of data


cross a physical link.
– Frames
– Physical address
– Network topology
– Line discipline
– Synchronization
– Error control
– Flow control

PHYSICAL
• Transmission of an unstructured
bit stream over a physical link
between end systems.
– Electrical, mechanical,
procedural and functional
specifications
– Physical data rate
– Distances
– Physical connector

INFORMATION
SYSTEMS AND
TECHNOLOGY
Topics discussed would include:
Information Systems
Internet and E-Business
IT Trends
What is Information Technology?
Information Technology is the hardware, software and telecommunications used interchangeably.
These technologies provide the means to transmit, store and retrieve data, voice and video to
anyplace in the world in real time. Information Systems is the collection of hardware, software,
data, people and procedures that are designed to generate information that supports the day-to-
day, operations. Information Systems are generally classified into the following categories:

1. Office Information Systems (OIS)


2. Transaction Processing Systems (TPS)
3. Management Information Systems (MIS)
4. Decision Support Systems (DSS)
5. Executive Information Systems (ESS)
6. Expert Systems (ES)

Office Information Systems (OIS)


OIS is an information system that uses computer based systems to enhance and support work
low and facilitate day-to-day operations among employees. Example: The registration process of
a school.

Transaction Processing
Systems (TPS)
TPS is an information system that capture and process data generated during the dayto-
day transactions of an organization. Example: Deposits, payments, orders or reservations.
Decision Support Systems (DSS)
DSS is an information system designed to help the
user reach a decision when a decision making situation arises. DSS uses data from internal /
External sources.

Internal sources -sales, manufacturing, inventory, or financial for an organizations database.


External sources - interest rates, population trends, cost of new housing construction / raw
material pricing.

Management Information
Systems (MIS) is an information system that generates accurate, timely and organized
information so that managers can make decisions, solve problems, supervise activities and track
progress. However, employees are wired into the systems and technology is pushed downwards
and becomes widely accessible.

Executive Information Systems(EIS)


EIS is designed to support the information needs of executive managers. Information in an EIS
are presented in charts and tables that show trends, ratios and other managerial statistics and is
stored in data warehouses.

Expert Systems (ES)


ES is an information system that captures and stores the knowledge of human experts and then
imitates human reasoning and decision making processes for those who have less expertise.
Example: Artificial Intelligence (AI) the application of human intelligence to computers. (Speech
recognition and creative responses) The Internet and E-Business
Internet is the global collection of computer
networks linked together for the exchange
of data and information.
E-business (electronic business), is the conduct of business on the Internet, not only
buying and selling, also servicing for customers and collaborating with business partners.
Internet Usage
The Internet is playing an increasingly large part of the world’s daily functions.
Internet users has grown significantly, among the world’s current population of 6.45 billion
people. It is estimated that the daily internet users are 0.6 billion, typically this shows that
on an average 9.4% of the globe use the internet on a daily basis.
The Internet
The Internet was originally developed for use by the U.S. Military but has been transformed
into a worldwide link, where individuals can trade, educate and entertain themselves.

E-Business
The Internet provided a link to the customer and company by means of E-Business.
E-Business provides customers with worldwide and continuous access to the
global markets.
Common Benefits of E-Business
Speedy Communications
Reduced business cost (travel, marketing, location)
24 Hour access
Major advantages of EBusiness to an organization
Reach new markets
Receive electronic orders
Provide after-sales service
Order and pay for business supplies
Monitor competitors activities
Undertake market research
Network with allied businesses

Components of E-Business
To effectively and efficiently manage an EBusiness,
organizations introduced the following systems:
Enterprise Resource Planning (ERP)
Customer Relationship Management (CRM)
Knowledge Management (KM)
Enterprise Resource Planning (ERP)
Enterprise Resource Planning is a major factor in EBusiness.

Enterprise Resource Planning (ERP) Systems provide strategic planning capabilities, even to the
smallest of organizations. It is a comprehensive tool for integrating
accounting, strategic planning, sales order management, quality control, manufacturing,
logistics and warehousing.
Enterprise Resource Planning (ERP) Enterprise resource planning as a term, derives from
material resource planning. ERP are management information systems that integrate and
automate many of the business practices associated with the operations or production aspects of
a company.
Enterprise Resource Planning (ERP)
These typically include manufacturing, logistics, distribution, inventory, shipping,
invoicing and accounting. ERP software can aid in the control of
many business activities, like sales, deliveries, billing, production, inventory
management, and Human Resource Management.
Advantages of ERP
The benefits from enterprise resource planning
are claimed to include:
lower inventory carrying costs
lower ordering costs
lower production costs
Disadvantages of ERP
The limitations and pitfalls of the enterprise resource planning are claimed to be:
Systems can be very expensive to install and
maintain
Difficult to use
A problem in one department or at one of the
partners will affect all the other participants
They are often called back office systems indicating that customers and
the general public are not directly involved. This is contrasted with front
office systems like Customer Relationship Management (CRM)
systems that deal directly with the customer.

Customer Relationship Management (CRM) CRM stands for Customer Relationship


Management. It is a strategy used to learn more about customers' needs and behaviours in order
to develop stronger relationships with them. The more useful way to think about CRM is as a
process that will help bring together lots of pieces of information about customers, sales,
marketing effectiveness, responsiveness and market trends.
The goal of CRM
Provide better customer service
Make call centers more efficient
Cross sell products more effectively
Help sales staff close deals faster
Simplify marketing and sales processes
Discover new customers
Increase customer revenues
Types of data CRM collects
Responses to campaigns
Shipping and fulfillment dates
Sales and purchase data
Account information
Web registration data
Service and support records
Demographic data
Web sales data
CRM update
Currently Microsoft is the leading dealer of CRM software and technologies and have
been integrated with Microsoft Outlook and certain phones systems. As a result of the
integration, users can benefit from on screen pop-up when a customer calls, update
calendar appointments and provide visual aid of the customer’s information.

Knowledge Management (KM)


Knowledge management (KM), is the process through which organizations
generate value from their intellectual and knowledge-based assets. Most often,
generating value from such assets involves codifying what employees, partners and
customers know, and sharing that information among employees, departments and even
with other companies in an effort to devise best practices. Knowledge Management (KM)
It's important to note that the definition says nothing about technology; while KM is
often facilitated by IT, technology by itself is not KM. Not all information is valuable. Therefore, it's
up to individual companies to determine what information qualifies as intellectual and
knowledge-based assets. In general, however, intellectual and knowledge-based
assets fall into one of two categories:
explicit or tacit.
Explicit Or Tacit - KM
Generally, explicit knowledge consists of anything that can be documented, archived
and codified, often with the help of IT.
The concept of tacit knowledge, or the know-how contained in people's heads.
Benefits from KM?
Foster innovation by encouraging the free flow of ideas
Improve customer service by streamlining response time
Boost revenues by getting products and services to market faster
Enhance employee retention rates by recognizing the value of employees' knowledge
and rewarding them for it
Streamline operations and reduce costs by eliminating redundant or unnecessary
Processes

KM Issues
Getting Employees on Board – companies ignore the people and cultural issues
KM Requires Ongoing Maintenance - at any given time changes occur, as do the skills of
Employees
Dealing with a Data Deluge – information overload
Management Implications of IT
As the technological environment grows, managers are now provided with greater
returns. These include, a better connection with employees, the environment, and each
other.
Implications of IT
Increased Efficiency
Empowered Employees
Information Overload
Enhanced Collaboration
Increased Productivity
New information technology offers significant promise for speeding up the work
process, cutting costs and increasing efficiency. Increased Productivity
An example of this is at IBM they helped reduce the number of call centre employees
and saved $750 million in one year alone! Companies just like IBM are slashing costs
and wiring deeper discounts from suppliers. Sweeping away administrative paperwork
and automating mundane tasks is yet another advantage of new technology.
Empowered Employees
Lower-level employees are increasingly challenged with more information and are
expected to make decisions previously made by supervisors. Nurses, janitors, truck
drivers, utility repair workers, and warehouse staffers all need easy access to information
that would better enable them to complete their tasks to the best of their abilities.
Empowered Employees
These changes support the objectives of knowledge management by enabling decisions to be
made by the employees that are in the best position to do so and in the end see the results of
their work. An example is that of the U.S. Army, they began to use new information technology
that relays information about battle fields conditions, the latest intelligence on the enemy down to
the troops. Armed with better data and trained to see patterns in the barrage of
information, lieutenants in the field will be able to decipher better how to launch their attacks.

Information Overload One problem associated with the advances of technology, the company can
become a quagmire of information, which means that it can find itself in an extremely dangerous
situation and will find great difficulty in finding their way out of that situation. Employees
can become vastly overwhelmed with information and are likely not able to sort the
valuable from the useless. More than ever, the ability to produce data and information is
outstripping employees' ability to process it. One British psychologist claims that
this may cause a mental disorder in employees known as Fatigue Syndrome. Thankfully,
managers have been able to alleviate the problem by ensuring that suppliers of information
technology and CIO work hand in hand with employees to identify the kinds of data and
information they really need . Secondly, top executives set limits by focusing on the organisation
key strategies and on the critical questions that must be answered. Enhanced Collaboration
Information technology undoubtedly has brought about collaboration within the work
environment, customers, suppliers and partners. In businesses, one of the most
effective uses of information technology for collaboration has been in the area of
product development such as division of labour.
IT Trends
As the world evolved and is faced with new challenges and the endless data, man saw
the need to transform his environment to meet his ever demanding workforce.
Many inventions were created to assist man in this fast paced world. Some of which would
be discussed here. Some of the modern trends are as follows:
Wireless Internet
VoIP – Voice Over Internet Protocol
Blogs and Wikis

Wireless Internet You can connect computers anywhere in your


home or office without the need for wires. The computers connect to the network using
radio signals or infrared signals, and computers can be several feet apart.
Voice over IP (VoIP) Voice is translated into digital data packets
that are then sent over the Internet based Local Area Network (LAN) or trunk lines to
another networked system. The network system, then routes your call to an appropriate
destination determined by the phone number you have dialled. At the destination the packets are
then reassembled and converted into voice again. VoIP (Voice over Internet Protocol) allows
you to make and receive phone calls through your high-speed Internet connection using a
standard phone or a headset with a USB adapter.
How VoIP works? Voice is translated into digital data packets that are then sent over the Internet
based Local Area Network (LAN) or trunk lines to another networked system. The network
system, then routes your call to an appropriate destination determined by the
phone number you have dialled. At the destination the packets are then reassembled
and converted into voice again. Common Service Providers of VoIP
Vonage
Verizon
VoicePulse
DialPad
Skype (Free)
Yahoo Messenger with
Voice (Free)
Just to name a few Benefits of VoIP
Much cheaper long distance/international call rates
Portability: wherever you have a net connection, your phone number can follow
Frees up your standard phone line.
Increase value-added technology opportunities, including IP multicast conferencing, telephony
distance learning applications, voice web browsing, speech recognition, and more.
Lower operation costs — a VoIP exchange is based on software for your existing computer
rather than hardware, making it easier to alter and maintain. VoIP Solutions. A Softphone is a
screen-based interface that works just like your telephone keypad. It appears right on you
computer screen and lets you make and receive calls, pick up your voicemails, call transfer, and
more using your mouse or keyboard.

Weblog
According to Andy Warhol’s prediction that, in the future, everyone will be famous
for 15 minutes. Weblogs also known as Blogs, has enabled an individual to publish a daily
commentary or idea electronically. Some view blogs as an electronic version of word-of-mouth
Weblogs (or Blogs) Blogs enabled communication at all levels, where in times past an individual
could not air their opinions on a Website unless it was spam. In more recent times, management
has embraced to the ideas of blogs as it provides marketing information and is opening lines of
communication to the corporate world.

Blogs and Wiki’s Unlike blogs, wiki allows the user’s not just a forum to air their views but visitors
also can edit the website or add content. Wiki basically is a web-enabled, integrated
system based on the principle that any user can obtain full read/write access to all or most
pages in the Wiki. Wiki For example, to create a hyperlink to another page within a Wiki, the user
need only type the page name as a compound without spaces (eg. WelcomeToWiki).
This system is widely gaining users within large and complex organization, but some
are available to the public.

Anda mungkin juga menyukai