DOC PREVIEW
Chapter 9 Database Management

This preview shows page 1-2-3-4-5-6 out of 18 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 18 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Chapter 9 Database ManagementTodayDefinitions:Think about itDatabases, Data and InformationThe Hierarchy of DataSlide 7Slide 8Consider the following DB examples:Slide 10Name the unique identifiers…Slide 12Maintaining DataDatabase Management SystemsAccess specificsAccess exampleDiscussSlide 18Chapter 9 Database ManagementTodayReview 6 parts of the IT modelUnderstand what a database isDemonstrate a database example using AccessDefinitions:oData – a collection of unprocessed items which can include text, numbers, images, audio, and video.oDatabase – a collection of related data organized in a manner that allows users to keep track of that data.oDatabase software (DBMS) – software that allows users to create a digital database.Think about it Name the data that would need to be kept track of in… A telephone directory, College course offerings, Members of Congress, Movie listing,Party guest list?Add, change, and delete dataAdd, change, and delete dataCreatedatabaseCreatedatabaseSort and retrieve dataSort and retrieve dataCreateforms and reportsCreateforms and reportsDatabases, Data and InformationWhat is a database?p. 332NextDatabase software allows you toDatabase software allows you toCollection of data organized so you can access, retrieve, and use itCollection of data organized so you can access, retrieve, and use itDatabase software also called database management system (DBMS)Database software also called database management system (DBMS)The Hierarchy of DataBit=smallest unit of data a computer can understandCharacter = 1 Byte or 8 bitsField = a collection of related charactersRecords = a collection of related fieldsData Files (Tables) = a collection of related recordsDatabase = a collection of related filesbitbytefieldrecordfileDBThe Hierarchy of DataWhat is a field?p. 335 Fig. 9-3NextCombination of one or more charactersSmallest unit of data user accessesField size defines the maximum number of characters a field can containField name uniquely identifies each fieldData type specifies kind of data field containsYes/NoYes/Noonly the values Yes or No (or True or False)HyperlinkHyperlinkWeb address that links to document or Web pageObjectObjectphotograph, audio, video, or document created in other application such as word processing or spreadsheetThe Hierarchy of DataWhat are common data (field) types?p. 335NextCurrencyCurrencydollar and cent amounts or numbers containing decimal valuesDateDatemonth, day, year, and sometimes timeMemoMemolengthy text entriesTextText(also called alphanumeric)—letters, numbers, or special charactersNumericNumericnumbers onlyAutoNumberAutoNumberunique number automatically assigned to each new recordConsider the following DB examples:Personnel filesCustomer purchasesStudent recordsCourse offeringsCookbookParty guest listWhat field names would you expect to find in each DB?The Hierarchy of DataWhat is a record?p. 336NextGroup of related fieldsKey field, or primary key, uniquely identifies each recordName the unique identifiers…•United states citizen•Mercer student•Person using computer•Cell phone•Email user•Web site•Web page•Computer connected to the Internet•Social security number•Student ID•User name•Phone number•Email address•Domain name•URL•IP addressThe Hierarchy of DataWhat is a data file?p. 336NextCollection of related records stored on diskkey fieldrecords fields22 Fifth AvenueP.O. Box 4515 Duluth Street33099 Clark Street1029 Wolf AvenueAddressAuburnClantonPrattvilleMontgomeryMontgomeryCityALWeinbergJonah392 8ALMarcus487 2ALValesquezAdrian337 6ALMurrayShannon2928ALVandenbergDonna2295StateLast NameFirst NameMember IDGreenMaintaining DataWhat is file maintenance?p. 336NextChanging recordsAdding recordsDeleting recordsProcedures that keep data currentThe DBMS makes file maintenance possibleDatabase Management SystemsWhat are popular database management systems (DBMSs)?p. 343NextAccess specificsThere are 4 DB objects that are used by Access:1. Tables – all of the data is stored in tables. Tables are arranged in rows and columns.2. Forms – provide an easy-to-use data entry screen.3. Reports – used to create professional reports4. Queries – allow users to select a subset of fields and records from one or more tables rather than having to navigate many fields and records from large DB’s.Access exampleExample DBDiscussCalifornia was the first state to employ a controversial database. Based on Megan’s Law — the statute named for a seven-year-old girl who was violated and killed by paroled felon — the database listed the names and addresses of people convicted of crimes against children. Today, many states employ similar databases. In some communities, when a paroled offender moves in the police inform the local school system, which in turn sends parents a notification that includes a history, address, and picture of the wrongdoer. Touted as a valuable tool in crime prevention, some feel that publishing this information makes it impossible for an offender to lead a normal life and can result in vigilantism — one paroled lawbreaker’s car was firebombed only days after his name was released.  Should a database of people paroled or released for crimes against children be shared? Who should have access to the database? Should such a database include accused, but not convicted, offenders?DiscussFor many students, the cost of college is even more depressing than the quality of dining hall food. A free Web service can help students find scholarships that match their qualifications, plans, and chosen schools. When a student registers, the service queries a database of more than 180,000 records in search of suitable scholarships and then returns the results. Ironically, those least likely to benefit from the scholarship search may be those who need it most. Because students from poorer backgrounds usually have less computer experience, they may be unaware of, or unable to access, the scholarship search service. Who should assume the leading role in extending access to the service? How can the Web service be made more universally


Chapter 9 Database Management

Download Chapter 9 Database Management
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 9 Database Management and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 9 Database Management 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?