SlideShare a Scribd company logo
Your Interactive Guide
to the Digital World
Discovering
Computers 2012
Databases, Data, and Information
Database
• Collection of
data organized
in a manner
that allows
access,
retrieval, and
use of that
data
Data
• Collection of
unprocessed
items
• Text
• Numbers
• Images
• Audio
• Video
Information
• Processed data
• Documents
• Audio
• Images
• Video
Discovering Computers 2012: Chapter 10
2Page 514
Databases, Data, and Information
Discovering Computers 2012: Chapter 10
3Pages 514 – 515
Figure 10-1
Databases, Data, and Information
• Database software, often called a database
management system (DBMS), allows users to:
Discovering Computers 2012: Chapter 10
4Page 515
Create a computerized
database
Add, modify, and
delete data
Sort and retrieve data
Create forms and
reports from the data
Databases, Data, and Information
• Valuable information should have the following
characteristics:
Discovering Computers 2012: Chapter 10
5Pages 516 - 517
Accurate Verifiable Timely Organized
Accessible Useful
Cost-
effective
The Hierarchy of Data
• Data is organized in layers
– Files, records, fields, characters
Discovering Computers 2012: Chapter 10
6Page 517
Figure 10-2
The Hierarchy of Data
• A character is one byte
– Numbers, letters, space,
punctuation marks, or
other symbols
• A field is a combination
of one or more related
characters
– Field name
– Field size
– Data type
Discovering Computers 2012: Chapter 10
7Page 518
Figure 10-3
The Hierarchy of Data
• Common data types include:
Discovering Computers 2012: Chapter 10
8Page 518
Text Numeric AutoNumber Currency
Date Memo Yes/No Hyperlink
Object Attachment
The Hierarchy of Data
Discovering Computers 2012: Chapter 10
9Page 519
Figure 10-4
• A record is a group of related fields
– A primary key uniquely identifies each record
• A data file is a collection of related records
Maintaining Data
• Users modify a record to correct inaccurate data
or update old data
Discovering Computers 2012: Chapter 10
10Page 521
Figure 10-6
Maintaining Data
• When a record no longer is needed, a user deletes
it from a file
Discovering Computers 2012: Chapter 10
11Page 522
Figure 10-7
Maintaining Data
• Validation compares data with a set of rules or
values to find out if the data is correct
Discovering Computers 2012: Chapter 10
12Pages 522 - 524
Alphabetic/Numeric
check
Range check Consistency check
Completeness check Check digit Other checks
File Processing Versus Databases
Discovering Computers 2012: Chapter 10
13Pages 524 - 526
File processing system
• Each department has its
own set of files
• Used for many years
• Have data redundancy
• Isolate data
Database approach
• Programs and users share
data
• Reduce data redundancy
• Improve data integrity
• Share data
• Allows easier access
• Reduces development time
• Can be more vulnerable
Database Management Systems
• A DBMS provides several tools that allow users
and programs to retrieve and maintain data in the
database
Discovering Computers 2012: Chapter 10
14Page 528
Query language
Query by example
Form
Report generator
Database Management Systems
• A query language consists of simple, English-like
statements that allow users to specify the data to
display, print, or store
• Query by example (QBE) provides a GUI to assist
users with retrieving data
Discovering Computers 2012: Chapter 10
15Page 528
Database Management Systems
• A report generator allows users to design a report
on the screen, retrieve data into the report
design, and then display or print the report
Discovering Computers 2012: Chapter 10
16Page 531
Figure 10-16
Database Management Systems
A DBMS provides means to
ensure that only authorized users
access data at permitted times
•Access privileges
•Principle of least privilege
Discovering Computers 2012: Chapter 10
17Page 531
Database Management Systems
• A DMBS provides a variety of techniques to
restore the database to a usable form in case it is
damaged or destroyed
Discovering Computers 2012: Chapter 10
18Pages 531 - 532
Backup Log
Recovery
utility
Continuous
backup
Database Administration
Database analysts and administrators are responsible
for managing and coordinating all database activities
Database Analyst (DA)
Decides on proper field
placement, defines data
relationship, and identifies
users’ access privileges
Database Administrator (DBA)
Creates and maintains the data
dictionary, manages security,
monitors performance, and
checks backup and recovery
procedures
Discovering Computers 2012: Chapter 10
19Page 538

More Related Content

PPTX
CH10-Managing a Database
PPT
Lecture 09 dblc centralized vs decentralized design
PPT
Management information system database management
PPTX
Database design challenges conflicting goals
PPT
Fundamentals of Database ppt ch01
PPT
Database Systems
PPTX
Document management system (dms ) with digitization using share point2013_ sp...
PPTX
Document Management System
CH10-Managing a Database
Lecture 09 dblc centralized vs decentralized design
Management information system database management
Database design challenges conflicting goals
Fundamentals of Database ppt ch01
Database Systems
Document management system (dms ) with digitization using share point2013_ sp...
Document Management System

What's hot (19)

PPT
Databaseadminppt3663
PPT
D I T211 Chapter 1 1
PPT
Document Management System Overview
PPTX
10 key components of a document management system ppt
PPTX
Mobile dbms
PPTX
library management system in SQL
PDF
Finalproject cs
PDF
HitVirtualized Tiered Storage Solution Profile
PPT
Digital content management system
PPT
PDF
TSS03135-USEN-00_HR
PPT
Lesson02 database system architecture
PPTX
Dbms and it infrastructure
DOCX
Document Management System
PPT
Business intelligence databases and information management
PDF
Blue Ocean Electronic Document Control System
PPT
University electronic management system
PPTX
Advantages of an Electronic Document Management System
PPTX
Foundations of business intelligence databases and information management
Databaseadminppt3663
D I T211 Chapter 1 1
Document Management System Overview
10 key components of a document management system ppt
Mobile dbms
library management system in SQL
Finalproject cs
HitVirtualized Tiered Storage Solution Profile
Digital content management system
TSS03135-USEN-00_HR
Lesson02 database system architecture
Dbms and it infrastructure
Document Management System
Business intelligence databases and information management
Blue Ocean Electronic Document Control System
University electronic management system
Advantages of an Electronic Document Management System
Foundations of business intelligence databases and information management
Ad

Similar to Database (20)

PPTX
ICT Basis: Managing a DataBase, Discovering Computer
PPTX
Database Management
PPTX
Chapter 10 database management
PPTX
Database Management.pptxqqwwqwqwqqweqwqw
PDF
Chapter1.0 database management system
PPT
Chapter10
PPT
Chapter10
PPTX
Discovering Computers: Chapter 10
PDF
Week01 Lecture Semester 1 2025 (Extra).pdf
PPTX
data and information
PPT
Database
PPT
Week 1 Before the Advent of Database Systems & Fundamental Concepts
PPT
TID Chapter 10 Introduction To Database
PPTX
CHAPTER-4_RELATIONAL-DATABASE.pptx
PDF
Electronic Data Processing
PPT
Behind The Scenes Databases And Information Systems 6
PPT
DBMS Lec 1 & 2.pptsdfsdfsfsdfsdfsdfsdfsfd
PPT
fundamentals of database and the functions of DBMS
PPT
PPTX
DATABASE MANAGEMENT
ICT Basis: Managing a DataBase, Discovering Computer
Database Management
Chapter 10 database management
Database Management.pptxqqwwqwqwqqweqwqw
Chapter1.0 database management system
Chapter10
Chapter10
Discovering Computers: Chapter 10
Week01 Lecture Semester 1 2025 (Extra).pdf
data and information
Database
Week 1 Before the Advent of Database Systems & Fundamental Concepts
TID Chapter 10 Introduction To Database
CHAPTER-4_RELATIONAL-DATABASE.pptx
Electronic Data Processing
Behind The Scenes Databases And Information Systems 6
DBMS Lec 1 & 2.pptsdfsdfsfsdfsdfsdfsdfsfd
fundamentals of database and the functions of DBMS
DATABASE MANAGEMENT
Ad

More from vicky vicky (20)

PPTX
Electric potential energy in a uniform field
PDF
Chap 04 solutions_ex_4.4_calculus
PDF
Chap 04 solutions_ex_4.3_calculus
PDF
Chap 04 solutions_ex_4.3_calculus
PDF
Chap 04 solutions_ex_4.2
PDF
Chap 04 solutions_ex_4.2
PDF
Chap 04 solutions_ex_4.1
PPTX
Operating systems
PPTX
Network
PPTX
Output OR Output devices
PPTX
Input OR Input devices
PPTX
Transformers basic electrical engineering
PPTX
Biot and savarat law
PPTX
Magnetic fields
PPT
Motors
PPT
Filtration
PPTX
Crystallization
PPT
Mixing
PPT
Separation, screening
PPTX
Nuclear fission
Electric potential energy in a uniform field
Chap 04 solutions_ex_4.4_calculus
Chap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.3_calculus
Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.2
Chap 04 solutions_ex_4.1
Operating systems
Network
Output OR Output devices
Input OR Input devices
Transformers basic electrical engineering
Biot and savarat law
Magnetic fields
Motors
Filtration
Crystallization
Mixing
Separation, screening
Nuclear fission

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.

Database

  • 1. Your Interactive Guide to the Digital World Discovering Computers 2012
  • 2. Databases, Data, and Information Database • Collection of data organized in a manner that allows access, retrieval, and use of that data Data • Collection of unprocessed items • Text • Numbers • Images • Audio • Video Information • Processed data • Documents • Audio • Images • Video Discovering Computers 2012: Chapter 10 2Page 514
  • 3. Databases, Data, and Information Discovering Computers 2012: Chapter 10 3Pages 514 – 515 Figure 10-1
  • 4. Databases, Data, and Information • Database software, often called a database management system (DBMS), allows users to: Discovering Computers 2012: Chapter 10 4Page 515 Create a computerized database Add, modify, and delete data Sort and retrieve data Create forms and reports from the data
  • 5. Databases, Data, and Information • Valuable information should have the following characteristics: Discovering Computers 2012: Chapter 10 5Pages 516 - 517 Accurate Verifiable Timely Organized Accessible Useful Cost- effective
  • 6. The Hierarchy of Data • Data is organized in layers – Files, records, fields, characters Discovering Computers 2012: Chapter 10 6Page 517 Figure 10-2
  • 7. The Hierarchy of Data • A character is one byte – Numbers, letters, space, punctuation marks, or other symbols • A field is a combination of one or more related characters – Field name – Field size – Data type Discovering Computers 2012: Chapter 10 7Page 518 Figure 10-3
  • 8. The Hierarchy of Data • Common data types include: Discovering Computers 2012: Chapter 10 8Page 518 Text Numeric AutoNumber Currency Date Memo Yes/No Hyperlink Object Attachment
  • 9. The Hierarchy of Data Discovering Computers 2012: Chapter 10 9Page 519 Figure 10-4 • A record is a group of related fields – A primary key uniquely identifies each record • A data file is a collection of related records
  • 10. Maintaining Data • Users modify a record to correct inaccurate data or update old data Discovering Computers 2012: Chapter 10 10Page 521 Figure 10-6
  • 11. Maintaining Data • When a record no longer is needed, a user deletes it from a file Discovering Computers 2012: Chapter 10 11Page 522 Figure 10-7
  • 12. Maintaining Data • Validation compares data with a set of rules or values to find out if the data is correct Discovering Computers 2012: Chapter 10 12Pages 522 - 524 Alphabetic/Numeric check Range check Consistency check Completeness check Check digit Other checks
  • 13. File Processing Versus Databases Discovering Computers 2012: Chapter 10 13Pages 524 - 526 File processing system • Each department has its own set of files • Used for many years • Have data redundancy • Isolate data Database approach • Programs and users share data • Reduce data redundancy • Improve data integrity • Share data • Allows easier access • Reduces development time • Can be more vulnerable
  • 14. Database Management Systems • A DBMS provides several tools that allow users and programs to retrieve and maintain data in the database Discovering Computers 2012: Chapter 10 14Page 528 Query language Query by example Form Report generator
  • 15. Database Management Systems • A query language consists of simple, English-like statements that allow users to specify the data to display, print, or store • Query by example (QBE) provides a GUI to assist users with retrieving data Discovering Computers 2012: Chapter 10 15Page 528
  • 16. Database Management Systems • A report generator allows users to design a report on the screen, retrieve data into the report design, and then display or print the report Discovering Computers 2012: Chapter 10 16Page 531 Figure 10-16
  • 17. Database Management Systems A DBMS provides means to ensure that only authorized users access data at permitted times •Access privileges •Principle of least privilege Discovering Computers 2012: Chapter 10 17Page 531
  • 18. Database Management Systems • A DMBS provides a variety of techniques to restore the database to a usable form in case it is damaged or destroyed Discovering Computers 2012: Chapter 10 18Pages 531 - 532 Backup Log Recovery utility Continuous backup
  • 19. Database Administration Database analysts and administrators are responsible for managing and coordinating all database activities Database Analyst (DA) Decides on proper field placement, defines data relationship, and identifies users’ access privileges Database Administrator (DBA) Creates and maintains the data dictionary, manages security, monitors performance, and checks backup and recovery procedures Discovering Computers 2012: Chapter 10 19Page 538