0% found this document useful (0 votes)
28 views35 pages

Chapter 3

Chapter 3 discusses the organization and management of data within database systems, highlighting the hierarchy from bits to databases and the role of database management systems (DBMS). It also introduces concepts like data entities, attributes, keys, and the transition from traditional data management to a database approach. Additionally, the chapter touches on big data characteristics and the importance of data modeling in creating efficient databases.

Uploaded by

Jiru Alemayehu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views35 pages

Chapter 3

Chapter 3 discusses the organization and management of data within database systems, highlighting the hierarchy from bits to databases and the role of database management systems (DBMS). It also introduces concepts like data entities, attributes, keys, and the transition from traditional data management to a database approach. Additionally, the chapter touches on big data characteristics and the importance of data modeling in creating efficient databases.

Uploaded by

Jiru Alemayehu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Chapter 3

DATA BASE SYSTEMS AND BIG DATA


Database Systems and Big Data
 Data are the principal resources of an organization.

 Data stored in computer systems form a hierarchy extending from a single bit to a database, the major

record-keeping entity of a firm.

 Each higher rung of this hierarchy is organized from the components below it.

Data are logically organized into:

1. Bits (characters)

2. Fields

3. Records

4. Files

5. Databases
 Bit (Character) - a bit is the smallest unit of data representation (value of a bit may be a 0 or 1).

 Bits can be organized into units called bytes. A byte is typically eight bits. Each byte represents a character.

 Character: A basic building block of most information, consisting of uppercase letters, lowercase letters, numeric digits, or

special symbols. Characters are put together to form a field.

 Field - a field consists of a grouping of characters. A data field represents an attribute (a characteristic or quality) of some

entity (object, person, place, or event). A field is typically a name, number, or combination of characters that describes an

aspect of a business object.

 Record: A collection of data fields all related to one object, activity, or individual is called a record.

 A record represents a collection of attributes that describe a real-world entity.

 A record consists of fields, with each field describing an attribute of the entity.

 File - A collection of related records or a group of related records. Files are frequently classified by the application for

which they are primarily used.


Database - is an integrated collection of logically related records or files.

The data is managed by systems software called database management systems (DBMS).

The data stored in a database is independent of the application programs using it and of the types of secondary
storage devices on which it is stored.

Data base is defined from three levels of view:


i. Level 1: literal meaning: the place where data is stored
 Database = Data + Base, the actual storage of all the information that are interested
ii. Level 2: Database Management System (DBMS): The software tool package that helps gatekeeper and
manage data storage, access and maintenances.
 It can be either in personal usage scope (MS Access, SQLite) or enterprise level scope (Oracle,
MySQL, MS SQL, etc).
iii. Level 3: Database Application: All the possible applications built upon the data stored in databases (web
site, BI application, ERP etc).
A database administrator (DBA) is a skilled and trained IS professional who directs all
activities related to an organization’s database, including providing security from intruders.

DATA MANAGEMENT

Data consists of raw facts, such as employee numbers and sales figures.
 For data to be transformed into useful information, it must first be organized in a meaningful way.
Data Entities, Attributes, and Keys

 An entity is a general class of people, places, or things (objects) for which data is collected, stored, and maintained.

Examples of entities include employees, inventory, and customers.

 An attribute is a characteristic of an entity.

 Attributes are usually selected to reflect the relevant characteristics of entities such as employees or customers.

 The specific value of an attribute, called a data item, can be found in the fields of the record describing an entity.

 A key is a field or set of fields in a record that identifies the record. A primary key is a field or set of fields that uniquely

identifies the record.


 No other record can have the same primary key.

 The primary key is used to distinguish records so that they can be accessed, organized, and manipulated.

 Primary keys ensure that each record in a file is unique.


 The Database Approach At one time, information systems referenced specific files containing relevant data.

 For example, a payroll system would use a payroll file.

 Each distinct operational system used data files dedicated to that system.

 This approach to data management is called the traditional approach to data management.

 Today, most organizations use the database approach to data management, whereby multiple information systems share a pool

of related data.

 A database offers the ability to share data and information resources.

 To use the database approach to data management, additional software a database management system (DBMS) is required.

 A DBMS consists of a group of programs that can be used as an interface between a database and the user of the database.

 Typically, this software acts as a buffer between the application programs and the database itself.
DATA MODELING AND DATABASE
CHARACTERISTICS
A database should be designed to store all data relevant to the business and provide quick
access and easy modification.

Data Modeling

When organizing a database, key considerations includes determining what data to collect,
who will have access to it, and how they might want to use it.

After determining these details, an organization can create the database.

Building a database requires two different types of designs:


A logical design and

A physical design.
The logical design of a database is an abstract model of how the data should
be structured and arranged to meet an organization’s information needs.
The logical design involves identifying relationships among the data items and grouping
them in an orderly fashion.

The physical design starts from the logical database design and fine-tunes it
for performance and cost considerations.
A data model is a diagram of entities and their relationships.

Data modeling usually involves understanding a specific business problem and analyzing the data and

information needed to deliver a solution.

Entity-relationship (ER) diagrams use basic graphical symbols to show the organization of and relationships

between data.

ER diagrams show data items in tables (entities) and the ways they are related.

ER diagrams help ensure that the relationships among the data entities in a database are correctly structured so

that any application programs developed are consistent with business operations and user needs.

In addition, ER diagrams can serve as reference documents after a database is in use.
• Relational model: A database model that describes data in which all data elements are
placed in two-dimensional tables, called relations, which are the logical equivalent of files.
• Manipulating Data: After entering data into a relational database, users can make inquiries
and analyze the data. Basic data manipulations include selecting, projecting, and joining.
• Selecting involves eliminating rows according to certain criteria.
• Projecting involves eliminating columns in a table.
• Joining involves combining two or more tables.
• Domain: The allowable values for data attributes.
• Selecting: Manipulating data to eliminate rows according to certain criteria.
• Projecting: Manipulating data to eliminate columns in a table.
• Joining: Manipulating data to combine two or more tables.
• Linking: Data manipulation that combines two or more tables using common data attributes
to form a new table with only the unique data attributes
DATABASE MANAGEMENT SYSTEMS
• The functional units responsible for managing the data are:

• Data administrator (DA): The person who has the central responsibility for an

organizations data.

• Database administrator (DBA): is a specialist responsible for maintaining standards for the

development, maintenance, and security of an organization's databases.

• Is expected to have a clear understanding of the fundamental business of the organization, be

proficient in the use of selected database management systems, and stay abreast of emerging

technologies and new design approaches.


• A skilled IS professional who directs all activities related to an organization’s database.

• A DBMS is a group of programs used as an interface between a database and application

programs or a database and the user.

• DBMSs are used to manage all kinds of data for all kinds of purposes.

• Database management system (DBMS): A group of programs that manipulate the database

and provide an interface between the database and the user of the database and other

application programs.
BIGDATA

Big Data: Big data is the term for a collection of data sets so large and complex
that it becomes difficult to process using on-hand database management tools or
traditional data processing applications.
Big data is characterized by:
Volume: large amounts of data Zeta bytes/Massive datasets

Velocity: Data is live streaming or in motion

Variety: data comes in many different forms from diverse sources

Veracity: can we trust the data? How accurate is it? etc.


CHAPTER FOUR

NETWORKS AND CLOUD COMPUTING


Network Fundamentals
A computer network is defined as the interconnection of two or more computers.

It is done to enable the computers to communicate and share available resources.

APPLICATIONS:
 Sharing of resources such as printers

 Sharing of expensive software's and database

 Communication from one computer to another computer

 Exchange of data and information among users via network

 Sharing of information over geographically wide areas.

The network provided to the users can be divided into two categories:

i. Sharing ii. Connectivity


THE BENEFITS OF COMPUTER NETWORK

Increased speed
Reduced cost
Improved security
Centralized software managements
Electronic mail
Flexible access
The Internet and World Wide Web

Internet is global Network of Networks.

The internet is a worldwide public network of computers on which people can join and use multiple
services such as sharing of information.

By internet users at any one computer can get information from any other computer.

HISTORY OF INTERNET

It was developed by the United States Defense Advanced Research Projects Agency in the 1970s and was
initially known as ARPANET.

The Internet was designed to be used by companies and Universities doing military research so that they
could share information.
HISTORY OF INTERNET
It was developed by the United States Defense Advanced Research Projects Agency in the

1970s and was initially known as ARPANET.

The Internet was designed to be used by companies and Universities doing military research so

that they could share information.

To connect to the Internet the following are needed:


 A computer

 Telephone line

 Modem and/or router

 An is (internet service provider)

 Web browser, e.g. internet explorer, firefox, chrome, safari, opera etc
• MODEM: A device which convert analog signals to digital signals and digital signals to analog for
transmitting data over internet.

• WEB BROWSER: Web Browser is Software used to display the Web pages. Examples:

• Internet explorer

• Firefox

• Chrome

• Safari

• Opera
WHAT IS WEB SITE ADDRESS?
 Every web site has a specific address which is also called URL that is Uniform Resource Locator. EXAMPLE:

http://www.paknews.com

 HTTP: Hyper Text Transfer Protocol, is rule to send and receive text on internet

 WWW: World Wide Web, It consists of a large number of web servers that host websites.

 Each website will normally consist of a number of web pages.

 A web page can contain text, images, video, animation and sound.

 Paknews: Domain Name

 Com: type of web site there are many other types of web sites like

 Pak: Pakistan Edu: education

 Mil: military Gov: govt

 Com: commercial
ADVANTAGES OF INTERNET DISADVANTAGES OF INTERNET:
 Email.
Viruses
 Sharing Information.
 Services. Security problem
 Buy or sell products. Immorality
 Communities
 News Many information is not accurate
 Searching jobs Wastage of time
 Advertisement
 Communication
 Entertainment
 Online education and research
EMAIL: Electronic Mail (email) is a system which allows users of a computer
network to send messages to each other. Users can usually:
Send a message to another user, or group of users.
Keep their messages in a mailbox.
Read, print and delete messages from their mailbox.
It is not only typewritten messages that can be sent using Electronic Mail.
Pictures, music, videos, in fact almost any sort of information you can think of, can
also be sent.
There are many email service provider companies which allow any user to send and
receive electronic mail like
Hotmail www.hotmail.com
Yahoo www.yahoo.com/mail
Gmail www.gmail.com
The Internet of Things
• IoT is the networking of smart objects, meaning a huge number of devices
intelligently communicating in the presence of internet protocol that cannot be
directly operated by human beings.

• IoT is the interaction of everyday object’s computing devices through the Internet
that enables the sending and receiving of useful data.

• IoT= Services+ Data+ Networks + Sensors

• The Internet of Things consists of any device with an on/off switch connected to the
Internet.
CLOUD COMPUTING
 The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is
present at remote location.

 Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or
VPN.

 Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud.

 Cloud Computing refers to manipulating, configuring, and accessing the applications online.

 It offers online data storage, infrastructure and application.

 Cloud computing is a means of networking remote servers that are hosted on the Internet.

 Following are the working models for cloud computing:


I. Deployment Models
II. Service Models
DEPLOYMENT MODELS
Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of

the four types of access: Public, Private, Hybrid and Community.

1. Public Cloud: The Public Cloud allows systems and services to be easily accessible to the general public.

Public cloud may be less secure because of its openness, e.g., e-mail.

2. Private Cloud: The Private Cloud allows systems and services to be accessible within an organization. It

offers increased security because of its private nature.

3. Community Cloud: The Community Cloud allows systems and services to be accessible by group of

organizations.

4. Hybrid Cloud: The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are

performed using private cloud while the non-critical activities are performed using public cloud.
SERVICE MODELS
Service Models are the reference models on which the Cloud Computing is
based.
These can be categorized into three basic service models as listed below:

1. Infrastructure As A Service (IAAS): IaaS provides access to fundamental resources such


as physical machines, virtual machines, virtual storage, etc.

2. Platform As A Service (PAAS): PaaS provides the runtime environment for applications,
development & deployment tools, etc.

3. Software As A Service (SAAS): SaaS model allows to use software applications as a


service to end users.
CHAPTER FIVE
Electronic Commerce
and
Enterprise Systems
Electronic commerce
Electronic commerce is the conducting of business activities (e.g., distribution, buying, selling, marketing,

and servicing of products or services) electronically over computer networks.

This includes any business transaction executed electronically between companies, companies and consumers,

consumers and, public sector and business, and the public sector to citizens.

Business activities that are strong candidates for conversion to e-commerce are ones that are
 Paper based,

 Time consuming, and

 Inconvenient for customers.


Business-to-Business (B2B) E-
Commerce
1. Business-to-Business (B2B) E-Commerce

B2B e-commerce is a subset of e-commerce in which all the participants are organizations.

B2B e-commerce is a useful tool for connecting business partners in a virtual supply chain to
cut resupply times and reduce costs.

A B2B market is considerably larger and is growing more rapidly.

2. Business-to-Consumer (B2C) E-Commerce: is a form of e-commerce in which customers


deal directly with an organization and avoid intermediaries.

Business-to-consumer (B2C) e-commerce organizations sell their products directly to


consumers. The Internet is extremely used.
e-Government

• e-Government is the use of information and communications technology to simplify the


sharing of information, speed formerly paper-based processes, and improve the relationship
between citizens and government.

• Government-to-citizen (G2C), government-to-business (G2B), and government-to-


government (G2G) are all forms of e-Government, each with different applications.

• Citizens can use G2C applications to submit their state and federal tax returns online, renew
auto licenses, apply for student loans, and make campaign contributions.
• G2B applications support the purchase of materials and services from private industry by government
procurement offices, enable firms to bid on government contracts, and help businesses receive current
government regulations related to their operations.

• G2G applications are designed to improve communications among the various levels of government.

Advantages of Electronic and Mobile Commerce


 Provides global reach
 Reduces costs
 Speeds flow of goods and information
 Increased accuracy
 Improves customer service
• Technology Infrastructure Required to Support E-Commerce and M-Commerce
• Hardware: A Web server hardware platform complete with the appropriate software is a key e-commerce infrastructure ingredient. The
amount of storage capacity and computing power required of the Web server depends primarily on two things:
• The software that must run on the server and
• The volume of e-commerce transactions that must be processed.
• Web Server Software: To perform fundamental services, including security and identification, retrieval and sending of Web pages, Web
site tracking, Web site development, and Web page development. The two most widely used Web server software packages are:
• Apache HTTP Server and
• Microsoft Internet Information Services
• E-Commerce Software: To support five core tasks:
• Catalog management to create and update the product catalog
• Product configuration to help customers select the necessary components and options
• Shopping cart facilities to track the items selected for purchase,
• e-commerce transaction processing
• Web traffic data analysis to provide details to adjust the operations of the web site.
TRANSACTION PROCESSING ACTIVITIES
• The business data goes through a transaction processing cycle that includes data collection, data editing, data correction, data manipulation, data storage, and
document production.
• Data Collection: Capturing and gathering all data necessary to complete the processing of transactions is called data collection. It can be done
• Manually, such as by collecting handwritten sales orders or changes to inventory.
• Automatically via scanners, point-of-sale devices, and terminals.
• Data should be captured at its source and recorded accurately in a timely fashion, with minimal manual effort, and in an electronic or digital form that can be
directly entered into the computer. This approach is called source data automation.
• Data Editing: The process of checking data for validity and completeness.
• An important step in processing transaction data is to perform data editing for validity and completeness to detect any problems.
• Data Correction: The process of reentering data that was not typed or scanned properly.
• It is not enough simply to reject invalid data. The system should also provide error messages that alert those responsible for editing the data. Error messages
must specify the problem so proper corrections can be made. A data correction involves reentering data that was not typed or scanned properly.
• Data Manipulation: The process of performing calculations and other data transformations related to business transactions. Data manipulation can include:
• Classifying data
• Sorting data into categories
• Performing calculations
• Summarizing results
• Storing data in the organization’s database for further processing.
• Data Storage: The process of updating one or more databases with new transactions.
• Data storage involves updating one or more databases with new transactions. After being updated, this data can be further processed and manipulated by
other systems so that it is available for management reporting and decision making.
• Document Production and Reports Document: The process of generating output records and reports.
• Production involves generating output records, documents, and reports. These can be hard-copy paper reports or displays on computer screens.
TRADITIONAL TRANSACTION PROCESSING APPLICATIONS

 A TPS typically includes the following types of systems:


Order processing systems

Accounting systems

Purchasing systems

You might also like