0% found this document useful (0 votes)
168 views38 pages

CSC 221 - Comp Appreciation

This document provides an overview of the CSC 221 course on computer appreciation and database management. It discusses the outline of topics for the course, which includes database management using DBASE or MS Access and desktop publishing using Corel Draw or Harvard Graphics. It also provides a high-level introduction to database systems, including the benefits of moving from a file-based system to a database management system and some key terms related to relational databases and DBMS components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
168 views38 pages

CSC 221 - Comp Appreciation

This document provides an overview of the CSC 221 course on computer appreciation and database management. It discusses the outline of topics for the course, which includes database management using DBASE or MS Access and desktop publishing using Corel Draw or Harvard Graphics. It also provides a high-level introduction to database systems, including the benefits of moving from a file-based system to a database management system and some key terms related to relational databases and DBMS components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

CSC 221

Computer Appreciation (2-0-0)

T. F. Sholanke (Mrs.)
Department of Computer Science and Engineering
Outline
 Database Management (DBASE or MS Access)
 Desktop Publishing (Corel Draw/ Harvard graphics)

CSC221: Introduction to Database Management System 2


File System to Database
  File System manages data using files on a hard disk. Users are allowed to create, delete,
and update the files according to their requirements. Let us consider the example of file-
based University Management System. Data of students is available to their respective
Departments, Academics Section, Result Section, Accounts Section, Hostel Office, etc.
Some of the data is common for all sections like Roll No, Name, Father Name, Address,
and Phone number of students but some data is available to a particular section only like
Hostel allotment number which is a part of the hostel office. Let us discuss the issues
with this system:
 Data Redundancy: Data is said to be redundant if the same data is copied at many places.
If a student wants to change their Phone number, he or has to get it updated in various
sections. Similarly, old records must be deleted from all sections representing that
student.
 Data Inconsistency: Data is said to be inconsistent if multiple copies of the same data do
not match each other. If the Phone number is different in Accounts Section and
Academics Section, it will be inconsistent. Inconsistency may be because of typing errors
or not updating all copies of the same data.
CSC221: Introduction to Database Management System 3
Database Prehistory

Data entry
Storage and retrieval

Query processing
Sorting
CSC221: Introduction to Database Management System 4
File System to Database
Difficult Data Access: A user should know the exact location of the file to access data, so the
process is very cumbersome and tedious. If the user wants to search the student hostel
allotment number of a student from 10000 unsorted students’ records, how difficult it can be.
Unauthorized Access: File Systems may lead to unauthorized access to data. If a student
gets access to a file having his marks, he can change it in an unauthorized way.
No Concurrent Access: The access of the same data by multiple users at the same time is
known as concurrency. The file system does not allow concurrency as data can be accessed
by only one user at a time.
No Backup and Recovery: The file system does not incorporate any backup and recovery of
data if a file is lost or corrupted.

Note:
The above points are the main reasons which made a shift from file system to DBMS.

CSC221: Introduction to Database Management System 5


Database
 Data: it is the unorganised facts which need to be compiled to form meaningful
information
 Information: Once the data is processed and made into a structured context, it is called
information. 
 Database: it is a collection of interrelated data which helps in the efficient retrieval,
insertion, and deletion of data from the database and organizes the data in the form of
tables, views, schemas, reports, etc. Examples includes MongoDB, Cassandra, OracleSQL,
or MySQL.
 Database Management System (DBMS): A software package which can be used to
manipulate, validate and retrieve this database. These programs enable you to save data,
retrieve it, and conduct searches against databases.

CSC221: Introduction to Database Management System 6


Database (ContD.)
 Example of a Database is Database of Faculty of Technology, OAU.
It organizes the data about the admin, staff, students and faculty etc.
 Using the database, you can easily retrieve, insert, and delete the information.

 Database Management System


Database management system is a software which is used to manage the database. Example
includes MySQL, Oracle, etc. These are popular commercial database which is used in different
applications.
Database Management System (DBMS) provides an interface to perform various operations like
database creation, data storage, data update, creating a table in the database and lots more.
It provides protection and security to the database. In the case of multiple users, it also maintains
data consistency.

CSC221: Introduction to Database Management System 7


Today, Database Systems are Ubiquitous
Database system design from the European Bioinformatics Institute (Hinxton UK)

Other archives

Database
design

Service Tools

End Users
Da
ta
ex Development
ch DB
an
ge
Submission tools
Submitters

Production DB Service DB
Da
ta
Di
Add value st
ri b. Releases
(computation) Releases
Q/C etc &&
Add value (review etc.) Updates
Updates 8
CSC221: Introduction to Database Management System
Exercise I
 Who is Edgar F. "Ted" Codd?

CSC221: Introduction to Database Management System 9


DBMS Terms
 Structured Query Language (SQL) – A programming language generally
used for the relational database management system, which comprises
tables. 
 Primary Key – Each file has a unique key. Using the Primary Key, a specific
file can be identified
 Foreign Key – The relation between a field in one table and component
identified by a primary key can be detected using a Foreign Key

CSC221: Introduction to Database Management System 10


DBMS and its Types
 A collection of information which is managed such that it can be updated and easily
accessed is called a database. A software package which can be used to manipulate,
validate and retrieve this database is called a Database Management System. For
example, Airlines use this software package to book tickets and confirm reservations
which are then managed to keep a track of the schedule.
 There are majorly four types of database:
Network Database: When the details of multiple members can be linked to the files of multiple
owners and vice versa, it is called a network database. 
Hierarchical Database: When the data stored in the form of records and is connected to each
other through links is called hierarchical database. Each record comprises fields and each field
comprises only one value.
Relational Database: When the data is organised as a set of tables comprising rows and
columns with a pre-defined relationship with one another, it is called a relational database.
Object-oriented Database – the information is represented as objects, with different types of
relationships possible between two or more objects. Such databases use an object-oriented
programming language for development.

CSC221: Introduction to Database Management System 11


Components of DBMS
 There four main components on which the working of a DBMS depends. This includes:
1. Data: The main component is the data. The entire database is set based on the data and
the information processed based on it. This data acts as a bridge between the software
and hardware components of DBMS. This can further be divided into three varieties:
 User Data – The actual data based on which the work is done
 Metadata – This is the data of the data, i.e., managing the data required to enter the
information
 Application MetaData – This is the structure and format of the queries
 To simplify it, in a table, the information given in each table is the User Data, the number of tables, rows and columns is the MetaData the structure we choose is
the Application MetaData.

2. Hardware: These are the general hardware devices which help us save and enter the
data like hard disks, magnetic tapes, etc.

CSC221: Introduction to Database Management System 12


Components of DBMS (ContD.)
3. Software: The software acts as a medium of communication between the
user and the database. Based on the user’s requirement, the database can be
modified and updated. To perform operations on the data, query languages
like SQL are used.
4. Users: No function can be performed without the Users. Thus, they form
the fourth most important component of DBMS. The information entered into
a database is used by the User or the administrator to perform their business
operations and responsibilities.

CSC221: Introduction to Database Management System 13


DBMS allows users the following:
 Data Definition: It is used for creation, modification, and removal of
definition that defines the organization of data in the database.
 Data Update: It is used for insertion, modification, and deletion of the
actual data in the database.
 Data Retrieval: It is used to retrieve the data from the database which can
be used by applications for various purposes.
 User Administration: It is used for registering and monitoring users,
maintain data integrity, enforcing data security, dealing with concurrency
control, monitoring performance and recovering information corrupted by
unexpected failure.

CSC221: Introduction to Database Management System 14


Characteristics of DBMS
 It uses a digital repository established on a server to store and manage the
information.
 It can provide a clear and logical view of the process that manipulates
data.
 DBMS contains automatic backup and recovery procedures.
 It contains Atomicity, Consistency, Isolation and Durability (ACID)
properties which maintain data in a healthy state in case of failure.
 It can reduce the complex relationship between data.
 It is used to support manipulation and processing of data.
 It is used to provide security of data.
 It can view the database from different viewpoints according to the
requirements of the user.
CSC221: Introduction to Database Management System 15
Advantages of DBMS
 Data sharing: In DBMS, the authorized users of an organization can share the
data among multiple users.
 Easily Maintenance: It can be easily maintainable due to the centralized
nature of the database system.
 Reduce time: It reduces development time and maintenance need.
 Multiple user interface: It provides different types of user interfaces like
graphical user interfaces and application program interfaces.
 Minimized redundancy and data inconsistency: Data is normalized in DBMS to
minimize the redundancy which helps in keeping data consistent. It can
control data redundancy because it stores all the data in one single
databasFor Example, student information can be kept at one place in DBMS
and accessed by different users. This minimized redundancy is due to primary
key and foreign keys
 Simplified Data Access: A user need only name of the relation not exact
location to access data, so the process is very simple.
CSC221: Introduction to Database Management System 16
Advantages of DBMS (ContD.)
 Multiple data views: Different views of same data can be created to cater
the needs of different users. For Example, faculty salary information can
be hidden from student view of data but shown in admin view.
 Data Security: Only authorized users are allowed to access the data in
DBMS. Also, data can be encrypted by DBMS which makes it secure.
 Concurrent access to data: Data can be accessed concurrently by
different users at same time in DBMS.
 Backup and Recovery mechanism: DBMS backup and recovery
mechanism helps to avoid data loss and data inconsistency in case of
catastrophic failures.  It provides backup and recovery subsystems which
create automatic backup of data from hardware and software failures and
restores the data if required.

CSC221: Introduction to Database Management System 17


Disadvantages of DBMS
 Cost of Hardware and Software: It requires a high speed of data
processor and large memory size to run DBMS software. Its equally
costly to convert.
 Size: It occupies a large space of disks and large memory to run
them efficiently.
 Complexity: Database system creates additional complexity and
requirements.
 Higher impact of failure: Failure is highly impacted in databases
because in most of the organization, all the data stored in a single
database and if the database is damaged due to electric failure or
database corruption then the data may be lost forever.

CSC221: Introduction to Database Management System 18


Types of Data Languages (SQL Commands)
 SQL commands are a set of guidelines used to exchange information with databases.
Aside from that, it is also used to conduct certain activities, procedures, and data
searches. The most used SQL commands are explained below:

1. Data Definition Language (DDL):  Data Definition Language deals with database
schemas and descriptions, of how the data should reside in the database.
 CREATE: to create a database and its objects like (table, index, views, store
procedure, function, and triggers)
 ALTER: alters the structure of the existing database
 DROP: delete objects from the database
 TRUNCATE: remove all records from a table, including all spaces allocated for the
records are removed
 COMMENT: add comments to the data dictionary
 RENAME: rename an object.

CSC221: Introduction to Database Management System 19


SQL Commands (ContD.)
2. Data Manipulation Language(DML): Data Manipulation Language deals with data
manipulation and includes most common SQL statements such SELECT, INSERT, UPDATE,
DELETE, etc., and it is used to store, modify, retrieve, delete and update data in a
database.

 SELECT: retrieve data from a database


 INSERT: insert data into a table
 UPDATE: updates existing data within a table
 DELETE: Delete all records from a database table
 MERGE: UPSERT operation (insert or update)
 CALL: call a PL/SQL or Java subprogram
 EXPLAIN PLAN: interpretation of the data access path
 LOCK TABLE: concurrency Control

CSC221: Introduction to Database Management System 20


SQL Commands (ContD.)
3. Data Control Language(DCL): Data Control Language acts as an access specifier to the
database.(basically to grant and revoke permissions to users in the database. DCL
determines how users may access information stored in a database. For example, if a
database has 50 users working on it, the Database Administrator may give or revoke
access to certain areas of the database to the engineers.
 GRANT: grant permissions to the user for running DML(SELECT, INSERT, DELETE,…)
commands on the table. Access rights provide user access to a database using the
‘GRANT’ command.

 REVOKE: revoke permissions to the user for running DML(SELECT, INSERT, DELETE,…)
command on the specified table. It is basically the opposite of the ‘GRANT’ command.
It removes a user’s permissions from one or more schemas or tables.

CSC221: Introduction to Database Management System 21


SQL Commands (ContD.)
4. Transactional Control Language(TCL): Transactional Control Language acts as an
manager for all types of transactional data and all transactions. TCL is used to ensure that
the database remains consistent and to handle the transactions that are initiated by
commands of the Data Manipulation Language(DML).
Some of the command of TCL are:
 Role Back: Used to cancel  or Undo changes made in the database. This command is
used to return to the point of all unsaved changes in the schema. 
 Commit: It is used to apply or save changes in the database
 Save Point: It is used to save the data on the temporary basis in the database. This
command is used to roll back to a certain point in time without having to roll back the
whole transaction in its entirety.

CSC221: Introduction to Database Management System 22


DBMS 3-tier Architecture
DBMS 3-tier architecture divides the complete system into three inter-
related but independent modules as shown below:

CSC221: Introduction to Database Management System 23


DBMS 3-Tier Architecture (ContD.)
1.Physical Level: at this level, the information about the location of database objects in
the data store is kept. Various users of DBMS are unaware of the locations of these
objects. In simple terms, physical level of a database describes how the data is being
stored in secondary storage devices like disks and tapes and also gives insights on
additional storage details.
2.Conceptual Level: at this level, data is represented in the form of various database
tables. For Example, STUDENT database may contain STUDENT and COURSE tables
which will be visible to users but users are unaware of their storage. Also referred as
logical schema, it describes what kind of data is to be stored in the database.
3.External Level: the external level specifies a view of the data in terms of conceptual
level tables.  Each external level view is used to cater to the needs of a particular
category of users. For Example, FACULTY of a university is interested in looking course
details of students, STUDENTS are interested in looking at all details related to
academics, accounts, courses and hostel details as well. So, different views can be
generated for different users. The main focus of external level is data abstraction.

CSC221: Introduction to Database Management System 24


DBMS 3-Tier Architecture (ContD.)
External External External

Schema 1 Schema 2 Schema n

External
level
Conceptual Conceptual
level Schema

Physical Internal
level Schema

CSC221: Introduction to Database Management System 25 25


Data Independence
 Data independence means a change of data at one level should not affect another
level. Two types of data independence are present in this architecture:

1. Physical Data Independence: Any change in the physical location of tables and


indexes should not affect the conceptual level or external view of data. This data
independence is easy to achieve and implemented by most of the DBMS.
2. Conceptual Data Independence: The data at conceptual level schema and
external level schema must be independent. This means a change in conceptual
schema should not affect external schema. e.g.; Adding or deleting attributes of a
table should not affect the user’s view of the table. But this type of independence
is difficult to achieve as compared to physical data independence because the
changes in conceptual schema are reflected in the user’s view.

CSC221: Introduction to Database Management System 26


Phases of Database Design
Database designing for a real-world application starts from capturing
the requirements to physical implementation using DBMS software
which consists of steps below:

CSC221: Introduction to Database Management System 27


Phases of Database Design (ContD.)
 Conceptual Design: The requirements of database are captured using high
level conceptual data model. For Example, the ER model is used for the
conceptual design of the database.
 Logical Design: Logical Design represents data in the form of relational
model. ER diagram produced in the conceptual design phase is used to
convert the data into the Relational Model.
 Physical Design: In physical design, data in relational model is
implemented using commercial DBMS like Oracle, DB2.

CSC221: Introduction to Database Management System 28


DBMS Keys
 Keys are used to uniquely identify individual records or rows of data in the table.
They also aid in the establishment and identification of links between table rows.
 Types of Keys:
Primary Key: This key is used to identify a single instance of an object. Each schema has
only one primary key. This key can be a value or a string that is not repeated more than
once in the entire table. For example, an employee ID is the Primary Key for salary table or
schema of employees. The employee ID is unique, and no two employees will have the
same employee ID.
Foreign Key: Foreign keys are columns in a table used to refer to another table’s Primary
key. A foreign key may also serve as the Primary key for another table.
Composite Key: When a Primary key has many attributes(more than one), it is referred to
as a Composite key.
Candidate Key: Except the primary key, all other properties are considered candidate keys.
Super Key: A super key is a collection of attributes used to identify a tuple uniquely.

CSC221: Introduction to Database Management System 29


Desktop Publishing
 Desktop Publishing refers to the process of using the computer to produce
documents such as newsletters, brochures, books, etc. Desktop Publishing
is also referred to as DTP. It is the software used to produce professional
looking documents
Microsoft Office Publisher.page maker.

 Desktop Publishing combines three (3) applications namely:


page layout,
word processing and
graphics.

CSC221: Introduction to Database Management System 30


Exercise II
1. Name any FIVE DTP documents that can be produced using
Microsoft Publisher.

•7

CSC221: Introduction to Database Management System 31


Computer Graphics Package
 Graphics packages are important desktop applications used to
create and perform basic operations on images. There are
different graphics packages classified as raster or vector graphics.
 Anyone learning basic computer operations is usually introduced
to computer graphics as part of the curriculum. Also, students
who enrolled in desktop publishing include graphics packages as
part of the applications to obtain a diploma certificate.
 Computer graphics packages are one of the applications required
in basic computer studies for Junior Secondary students. It is the
beginning point for children to learn creativity in school.

CSC221: Introduction to Database Management System 32


Corel Draw as a Graphic Package
  Corel draw as a graphic package is a computer application that
can be used to create and perform basic operations on shapes
and images.

CSC221: Introduction to Database Management System 33


Introduction to Harvard Graphics
 Harvard Graphics was developed in 1986 by Software Publishing
Corporation (SPC) under the name Harvard Presentation Graphics. It was
the first desktop business application software that offered the ability to
mix text and graphics (in the form of vector graphics) to create visually
pleasing slides for commercial purposes. The word Presentation was
dropped from its name after its 2nd version release, giving it the name
most of the world remembers it by, Harvard Graphics. The application
could import and export graphics, and it also provided the functionality of
editing and colour printing, which were considered advanced functions at
the time.

CSC221: Introduction to Database Management System 34


Harvard Graphics
 Harvard Graphics was a graphics and presentation program for IBM PC
compatibles. The first version, titled Harvard Presentation Graphics was
released for MS-DOS in 1986 by Software Publishing Corporation (SPC)
and achieved a high market share. It was taken off the market in 2017.

 An earlier presentation graphics program for DOS and Windows.


Harvard Graphics was developed by Software Publishing Corporation
and introduced for DOS in 1986. In 1991, a Windows version debuted.
The DOS version was very popular throughout the 1980s and was one of
the first business graphics packages to support columnar and free form
charts. From 1996 to 2017, Harvard Graphics was marketed and
supported by Serif (www.serif.com).

CSC221: Introduction to Database Management System 35


Harvard Graphics (ContD.)
 Harvard Graphics is a pioneering graphic presentation program developed
for DOS and later for Microsoft Windows. It allowed users to incorporate
text, information, graphics, and charts into custom slideshow
presentations. The application was the first of its kind in business graphic
packages offering freeform text charts. The program is now considered
obsolete and has been replaced by more advanced graphics applications.

CSC221: Introduction to Database Management System 36


References
 Timothy G.(2008) Lecture 1: Introduction to databases. IB/Dip/IIG
 www.cl.cam.ac.uk/Teaching/current/Databases/

CSC221: Introduction to Database Management System 37


Thank you for your time.

38

You might also like