The document discusses the relational data model and databases. It introduces the relational data model, which describes data as interrelated tables. It describes key concepts in relational databases including tables, rows, columns, fields/attributes, records, domains, and degrees. It also discusses database design principles, data warehouses for analysis, and approaches to data warehouse design.
The document discusses database system architecture and data models. It introduces the three schema architecture which separates the conceptual, logical and internal schemas. This provides logical data independence where the conceptual schema can change without affecting external schemas or applications. It also discusses various data models like hierarchical, network, relational and object-oriented models. Key aspects of each model like structure, relationships and operations are summarized.
A DBMS is a collection of programs that store and retrieve database information. It allows multiple users to access and modify data concurrently. A DBMS provides data independence, security, integrity and concurrency control. It uses data models like relational, object-oriented and hierarchical to structure data and relationships. Database languages allow defining, querying and updating data. Users interact through interfaces while an administrator manages the database.
This document provides an overview of database management systems (DBMS). It discusses the history and purpose of DBMS, different data models including relational, entity-relationship and object-oriented models. It also describes database languages, data storage and querying, transaction management, and database architecture. Key topics covered include the three levels of data abstraction, database schemas and instances, storage managers, query processors, and ensuring integrity through constraints defined in the data definition language.
The document provides an overview of database management systems (DBMS). It discusses the need for DBMS, different database architectures including centralized, client-server and distributed. It also covers data models, ER diagrams, relational models, and SQL. Key advantages of DBMS over file systems include reducing data redundancy, improving data integrity and security, and enabling concurrent access.
This document provides an overview of the topics that will be covered in a database systems textbook. It introduces the major parts of the book, including relational databases, database design, data storage and querying, transaction management, and database architectures. Each chapter is briefly described to give the reader an understanding of what concepts will be discussed in more depth throughout the textbook.
The document discusses database system architecture and data models. It introduces the three schema architecture which separates the conceptual, logical and internal schemas. This provides logical data independence where the conceptual schema can change without affecting external schemas or applications. It also discusses various data models like hierarchical, network, relational and object-oriented models. Key aspects of each model like structure, relationships and operations are summarized.
A DBMS is a collection of programs that store and retrieve database information. It allows multiple users to access and modify data concurrently. A DBMS provides data independence, security, integrity and concurrency control. It uses data models like relational, object-oriented and hierarchical to structure data and relationships. Database languages allow defining, querying and updating data. Users interact through interfaces while an administrator manages the database.
This document provides an overview of database management systems (DBMS). It discusses the history and purpose of DBMS, different data models including relational, entity-relationship and object-oriented models. It also describes database languages, data storage and querying, transaction management, and database architecture. Key topics covered include the three levels of data abstraction, database schemas and instances, storage managers, query processors, and ensuring integrity through constraints defined in the data definition language.
The document provides an overview of database management systems (DBMS). It discusses the need for DBMS, different database architectures including centralized, client-server and distributed. It also covers data models, ER diagrams, relational models, and SQL. Key advantages of DBMS over file systems include reducing data redundancy, improving data integrity and security, and enabling concurrent access.
This document provides an overview of the topics that will be covered in a database systems textbook. It introduces the major parts of the book, including relational databases, database design, data storage and querying, transaction management, and database architectures. Each chapter is briefly described to give the reader an understanding of what concepts will be discussed in more depth throughout the textbook.
The document provides an overview of database systems and their components. It discusses the purpose of database systems in addressing issues with file-based data storage like data redundancy, integrity problems, and concurrent access. It also describes the major components of a database system including the data models, data definition and manipulation languages, transaction management, storage management, database administrators, and users. The relational and entity-relationship models are explained as examples of common data models.
Databases have become important for organizing data in modern organizations. A database contains tables with records and fields to store related data. Database management systems allow users to create, access, and modify this data. Emerging trends include client/server systems that split databases onto servers and client computers, object-oriented databases that treat database components as reusable objects, data mining that analyzes stored data to understand customers and business, and linking web applications to organizational databases.
The document defines conceptual, logical, and physical data models and compares their key features. A conceptual model shows entities and relationships without attributes or keys. A logical model adds attributes, primary keys, and foreign keys. A physical model specifies tables, columns, data types, and other implementation details.
The document provides an overview of information systems and databases as covered in the HSC course. It discusses different types of information systems and focuses on organizing, storing, and retrieving data with database systems. It describes skills needed to analyze database information systems and provides examples to practice these skills. Finally, it covers topics like database design, data storage and retrieval methods, and some social and ethical issues related to information systems.
1. The document discusses how data is organized in a database system using a hierarchy from the bit level up to files, records, fields, and databases.
2. It describes some problems with traditional file-based data storage like redundancy, inconsistency, and lack of flexibility. A database addresses these issues through centralization of data.
3. The key components of a database system are described as people, hardware, software, and data. The database management system (DBMS) acts as an interface between users, applications, and the stored data.
This presentation introduces database management systems (DBMS) and discusses their architecture and different data models. It describes the three levels of DBMS architecture - external level, conceptual level, and internal level. It then explains the benefits of three-tier architecture with clients, application servers, and a database server. The presentation concludes by covering three common data models - hierarchical, network, and relational - and providing examples of each.
This document outlines the syllabus for a Database Management Systems course. It includes 5 units that cover database concepts, the relational model, SQL, normalization, transaction management, recovery, and query processing. The objectives are to understand basic database concepts, master SQL, understand relational design principles, and become familiar with transaction processing, storage structures, and query optimization techniques. Key topics include the entity-relationship model, relational algebra, normalization, concurrency control, crash recovery, and query processing and optimization.
DATABASE MANAGEMENT SYSTEMS university course materials useful for students ...SakkaravarthiS1
This document provides information about a database management systems (DBMS) course syllabus. It includes the course objectives, which are to understand basic database concepts, master SQL, understand relational database design principles, and become familiar with transaction processing and concurrency control. The syllabus outlines 5 units that will be covered: data models and languages, the relational model and SQL, normalization, transaction management and recovery, and query processing. Required textbooks and references are also listed.
Database concepts such as data, information, fields, records, files and database models including flat, hierarchical and network models were discussed. Database architecture including schemas, instances, languages and interfaces were also covered.
A DVD rental database was provided as a real-life example to demonstrate database concepts and architecture.
A short quiz concluded the summary to test understanding of key terms introduced in the document.
The document discusses database normalization and provides examples to illustrate the concepts of first, second, and third normal forms. It explains that normalization is the process of evaluating and correcting database tables to minimize data redundancy and anomalies. The key steps in normalization include identifying attributes, dependencies between attributes, and creating normalized tables based on those dependencies. An example database for a college will be used to demonstrate converting tables into first, second, and third normal form. Additionally, an example will show when denormalization of a table may be acceptable.
Week 1 Before the Advent of Database Systems & Fundamental Conceptsoudesign
This document provides an introduction to databases. It begins by defining a database as a self-describing collection of integrated tables that store data and relationships. It then contrasts database systems with earlier file-based systems, noting advantages like reduced data redundancy and improved data integrity in database systems. The document proceeds to define key database concepts like tables, rows, columns and indexing.
This document provides an overview of data modeling concepts. It discusses the importance of data modeling, the basic building blocks of data models including entities, attributes, and relationships. It also covers different types of data models such as conceptual, logical, and physical models. The document discusses relational and non-relational data models as well as emerging models like object-oriented, XML, and big data models. Business rules and their role in database design are also summarized.
This document provides an overview of database management systems. It defines key concepts like what is a database, database system components, and why databases are used. It describes drawbacks of using file systems to store data that databases address. It also explains the three architecture levels (external, conceptual, internal), database users and administrators, and classifications of DBMSs.
This document provides an introduction to database management systems (DBMS). It discusses what a DBMS is, common database applications, and drawbacks of using file systems to store data that DBMS aim to address, such as data redundancy, integrity issues, and concurrent access problems. It also summarizes key components of a DBMS, including its logical and physical levels of abstraction, data models, data definition and manipulation languages, storage management, query processing, transaction management, and common database architectures.
A relational model of data for large shared data banksSammy Alvarez
This document introduces the relational model of data organization for large shared databases. It discusses inadequacies of existing tree-structured and network models, including ordering, indexing, and access path dependencies that impair data independence. The relational model represents data as mathematical n-ary relations and relationships between domains, providing independence from representation changes. It allows a clearer evaluation of existing systems and competing internal representations. The relational view forms a basis for treating issues like derivability, redundancy, and consistency in a sound way.
Purpose of the data base system, data abstraction, data model, data independence, data definition
language, data manipulation language, data base manager, data base administrator, data base users,
overall structure.
ER Models, entities, mapping constrains, keys, E-R diagram, reduction E-R diagrams to tables,
generatio, aggregation, design of an E-R data base scheme.
Oracle RDBMS, architecture, kernel, system global area (SGA), data base writer, log writer, process
monitor, archiver, database files, control files, redo log files, oracle utilities.
SQL: commands and data types, data definition language commands, data manipulation commands,
data query language commands, transaction language control commands, data control language
commands.
Joins, equi-joins, non-equi-joins, self joins, other joins, aggregate functions, math functions, string
functions, group by clause, data function and concepts of null values, sub-querries, views.
PL/SQL, basics of pl/sql, data types, control structures, database access with PL/SQL, data base
connections, transaction management, data base locking, cursor management.
The document provides an introduction to database management systems. It discusses key concepts such as the purpose of DBMSs, data models, database languages, database design, storage and query processing. It also describes common DBMS components like the data dictionary and different types of database users. Overall, the document serves as a high-level overview of database management systems and lays the foundation for further exploration of topics within this domain.
The document discusses key concepts related to databases including:
1) It defines data as representations of facts, concepts or instructions that are suitable for communication, interpretation or processing.
2) A database is defined as a structured set of non-redundant information organized based on a data model, consisting of files, records and fields.
3) A database management system (DBMS) provides an interface between users and the database, allowing for data definition, manipulation and control.
The document discusses different managerial roles in information systems. A Chief Information Officer (CIO) heads the information systems function and aligns technology with organizational goals. Functional managers oversee specific functions that report to the CIO, such as systems analysis. An ERP manager maintains and implements changes to enterprise resource planning systems. Project managers are responsible for keeping IT projects on schedule and on budget. An Information Security Officer sets and enforces information security policies to protect organizational data from internal and external threats.
The document provides an overview of database systems and their components. It discusses the purpose of database systems in addressing issues with file-based data storage like data redundancy, integrity problems, and concurrent access. It also describes the major components of a database system including the data models, data definition and manipulation languages, transaction management, storage management, database administrators, and users. The relational and entity-relationship models are explained as examples of common data models.
Databases have become important for organizing data in modern organizations. A database contains tables with records and fields to store related data. Database management systems allow users to create, access, and modify this data. Emerging trends include client/server systems that split databases onto servers and client computers, object-oriented databases that treat database components as reusable objects, data mining that analyzes stored data to understand customers and business, and linking web applications to organizational databases.
The document defines conceptual, logical, and physical data models and compares their key features. A conceptual model shows entities and relationships without attributes or keys. A logical model adds attributes, primary keys, and foreign keys. A physical model specifies tables, columns, data types, and other implementation details.
The document provides an overview of information systems and databases as covered in the HSC course. It discusses different types of information systems and focuses on organizing, storing, and retrieving data with database systems. It describes skills needed to analyze database information systems and provides examples to practice these skills. Finally, it covers topics like database design, data storage and retrieval methods, and some social and ethical issues related to information systems.
1. The document discusses how data is organized in a database system using a hierarchy from the bit level up to files, records, fields, and databases.
2. It describes some problems with traditional file-based data storage like redundancy, inconsistency, and lack of flexibility. A database addresses these issues through centralization of data.
3. The key components of a database system are described as people, hardware, software, and data. The database management system (DBMS) acts as an interface between users, applications, and the stored data.
This presentation introduces database management systems (DBMS) and discusses their architecture and different data models. It describes the three levels of DBMS architecture - external level, conceptual level, and internal level. It then explains the benefits of three-tier architecture with clients, application servers, and a database server. The presentation concludes by covering three common data models - hierarchical, network, and relational - and providing examples of each.
This document outlines the syllabus for a Database Management Systems course. It includes 5 units that cover database concepts, the relational model, SQL, normalization, transaction management, recovery, and query processing. The objectives are to understand basic database concepts, master SQL, understand relational design principles, and become familiar with transaction processing, storage structures, and query optimization techniques. Key topics include the entity-relationship model, relational algebra, normalization, concurrency control, crash recovery, and query processing and optimization.
DATABASE MANAGEMENT SYSTEMS university course materials useful for students ...SakkaravarthiS1
This document provides information about a database management systems (DBMS) course syllabus. It includes the course objectives, which are to understand basic database concepts, master SQL, understand relational database design principles, and become familiar with transaction processing and concurrency control. The syllabus outlines 5 units that will be covered: data models and languages, the relational model and SQL, normalization, transaction management and recovery, and query processing. Required textbooks and references are also listed.
Database concepts such as data, information, fields, records, files and database models including flat, hierarchical and network models were discussed. Database architecture including schemas, instances, languages and interfaces were also covered.
A DVD rental database was provided as a real-life example to demonstrate database concepts and architecture.
A short quiz concluded the summary to test understanding of key terms introduced in the document.
The document discusses database normalization and provides examples to illustrate the concepts of first, second, and third normal forms. It explains that normalization is the process of evaluating and correcting database tables to minimize data redundancy and anomalies. The key steps in normalization include identifying attributes, dependencies between attributes, and creating normalized tables based on those dependencies. An example database for a college will be used to demonstrate converting tables into first, second, and third normal form. Additionally, an example will show when denormalization of a table may be acceptable.
Week 1 Before the Advent of Database Systems & Fundamental Conceptsoudesign
This document provides an introduction to databases. It begins by defining a database as a self-describing collection of integrated tables that store data and relationships. It then contrasts database systems with earlier file-based systems, noting advantages like reduced data redundancy and improved data integrity in database systems. The document proceeds to define key database concepts like tables, rows, columns and indexing.
This document provides an overview of data modeling concepts. It discusses the importance of data modeling, the basic building blocks of data models including entities, attributes, and relationships. It also covers different types of data models such as conceptual, logical, and physical models. The document discusses relational and non-relational data models as well as emerging models like object-oriented, XML, and big data models. Business rules and their role in database design are also summarized.
This document provides an overview of database management systems. It defines key concepts like what is a database, database system components, and why databases are used. It describes drawbacks of using file systems to store data that databases address. It also explains the three architecture levels (external, conceptual, internal), database users and administrators, and classifications of DBMSs.
This document provides an introduction to database management systems (DBMS). It discusses what a DBMS is, common database applications, and drawbacks of using file systems to store data that DBMS aim to address, such as data redundancy, integrity issues, and concurrent access problems. It also summarizes key components of a DBMS, including its logical and physical levels of abstraction, data models, data definition and manipulation languages, storage management, query processing, transaction management, and common database architectures.
A relational model of data for large shared data banksSammy Alvarez
This document introduces the relational model of data organization for large shared databases. It discusses inadequacies of existing tree-structured and network models, including ordering, indexing, and access path dependencies that impair data independence. The relational model represents data as mathematical n-ary relations and relationships between domains, providing independence from representation changes. It allows a clearer evaluation of existing systems and competing internal representations. The relational view forms a basis for treating issues like derivability, redundancy, and consistency in a sound way.
Purpose of the data base system, data abstraction, data model, data independence, data definition
language, data manipulation language, data base manager, data base administrator, data base users,
overall structure.
ER Models, entities, mapping constrains, keys, E-R diagram, reduction E-R diagrams to tables,
generatio, aggregation, design of an E-R data base scheme.
Oracle RDBMS, architecture, kernel, system global area (SGA), data base writer, log writer, process
monitor, archiver, database files, control files, redo log files, oracle utilities.
SQL: commands and data types, data definition language commands, data manipulation commands,
data query language commands, transaction language control commands, data control language
commands.
Joins, equi-joins, non-equi-joins, self joins, other joins, aggregate functions, math functions, string
functions, group by clause, data function and concepts of null values, sub-querries, views.
PL/SQL, basics of pl/sql, data types, control structures, database access with PL/SQL, data base
connections, transaction management, data base locking, cursor management.
The document provides an introduction to database management systems. It discusses key concepts such as the purpose of DBMSs, data models, database languages, database design, storage and query processing. It also describes common DBMS components like the data dictionary and different types of database users. Overall, the document serves as a high-level overview of database management systems and lays the foundation for further exploration of topics within this domain.
The document discusses key concepts related to databases including:
1) It defines data as representations of facts, concepts or instructions that are suitable for communication, interpretation or processing.
2) A database is defined as a structured set of non-redundant information organized based on a data model, consisting of files, records and fields.
3) A database management system (DBMS) provides an interface between users and the database, allowing for data definition, manipulation and control.
The document discusses different managerial roles in information systems. A Chief Information Officer (CIO) heads the information systems function and aligns technology with organizational goals. Functional managers oversee specific functions that report to the CIO, such as systems analysis. An ERP manager maintains and implements changes to enterprise resource planning systems. Project managers are responsible for keeping IT projects on schedule and on budget. An Information Security Officer sets and enforces information security policies to protect organizational data from internal and external threats.
This document discusses different roles that people play in creating information systems. It describes systems analysts as identifying business needs and designing systems to address them. Programmers then write the code to build the systems based on designs. Computer engineers design the underlying hardware and software technologies, with roles in hardware, software, systems integration, and networking. Creators generally have technical backgrounds in fields like computer science and mathematics.
The document discusses operating systems and their functions. It describes how operating systems manage computer hardware and software resources, provide common services to programs, and how the most common operating systems are Windows and MacOS. It provides several methods to identify the specific Windows or MacOS version running on a computer. The document also discusses the history and versions of Windows, MacOS, and Android operating systems.
This document discusses file systems and how they provide an abstraction of data storage on hardware. It defines a file system as a mapping from file names to file contents, with files being sequences of bytes. It also notes that different operating systems commonly use different file systems like FAT, NTFS, ext2/3/4, and HFS+. Hard drives and solid state drives actually store data in more complex ways at the physical level.
This document discusses computer software, including system software and application software. It describes how operating systems are a key type of system software that provides essential functions like managing hardware resources and providing a platform for applications. Popular desktop operating systems today include Windows, MacOS, Chrome OS, and Linux, while mobile operating systems include Android and iOS. The document also discusses how operating systems have evolved over time to take advantage of improvements in processing power and memory.
This document discusses downloading files from the internet. It explains that links can point to files that can be downloaded to a computer. To download a file, you can right-click the link and select "Save link as" or "Save target as." Files are often downloaded to the downloads folder by default. The document also notes that downloading files carries security risks and that one should only download files from trusted sources. It defines downloading as copying data from the internet or external storage to one's computer, while uploading is the reverse of copying to the internet or external storage.
The document discusses file management in Windows operating systems. It describes how to use the Windows File Explorer to organize and manage files and folders on a computer. Key functions covered include copying, moving, and deleting files using tools on the ribbon toolbar like Home, Share, and View tabs. It also explains how to cut, copy, and paste files between locations, and use keyboard shortcuts to perform common file management tasks.
This document discusses different types of computer hardware. It describes personal computers, laptops, mobile phones, tablets, and wearable devices. It explains how these systems have evolved over time as technology has advanced, with smartphones and mobile devices now dominating the market. The document also discusses integrated computing and how technology is being built into everyday products like homes, vehicles and appliances.
This document provides an overview of information systems and their evolution. It begins by defining key terms like data, information, and information systems. It then describes how information systems have evolved over time, starting from the mainframe era where only large organizations could afford room-sized computers, to the PC revolution bringing computers to businesses and individuals with the launch of the IBM PC. The document traces this evolution through additional stages like client-server systems and the modern Internet-connected world. It provides examples and context throughout to illustrate how information systems have transformed and taken on new roles within organizations over decades of technological advancement.
This document provides an introduction to an introductory information technology course. It outlines the course topics which include different types of computing devices, computer applications and software, data analysis, programming, ethics in technology, and information security. It describes the student learning outcomes and evaluations methods which include discussions, quizzes, assignments, exams and a presentation. Guidelines and expectations are provided around assignments, grading, attendance and communication policies.
This document discusses internet privacy, security, and netiquette. It begins by defining internet privacy and noting that privacy concerns have existed since the beginnings of computer sharing. It describes personally identifying information and how privacy relates to information collection. The document outlines risks to internet privacy like cookies and photos online. It emphasizes being careful about what personal information is submitted or posted online so as to avoid issues like identity theft, spam, or information being used by companies for targeted advertising.
The document discusses internet privacy, security, and netiquette. It provides 10 tips for staying safe online, including keeping software updated, being wary of emails from unknown sources, avoiding clicking suspicious links, realizing that free software can still pose risks, not revealing private information on social media, using unique passwords for all accounts, and enabling two-factor authentication. Following basic netiquette rules and safety tips can help users avoid threats like phishing and malware infections.
The document discusses various topics relating to internet privacy, security, and netiquette. It covers computer security and the importance of protecting systems from harm. Examples are given of different systems that are at risk of attacks, including financial systems, utilities, aviation, consumer devices, large corporations, and automobiles. Specific security issues and past attacks are described for each one.
This document provides an introduction to web development. It discusses the brief history of the internet and how it started in the 1960s between government researchers and universities. It also covers website design, including considerations like the fold and landing pages. Finally, it discusses HTML, CSS, fonts, and site maps as important aspects of web development.
The document provides an introduction to HTML and web development. It discusses what HTML is, the different versions of HTML, HTML elements and tags, how to structure an HTML document with the doctype, head, body and other tags. It also covers creating HTML files, adding images, links, and navigation to pages. The goal is to teach the basics of HTML to create simple websites and web pages.
This document discusses several roles involved in the day-to-day operations and administration of information systems, including computer operators who oversee mainframe computers and data centers, database administrators who manage organizational databases, help desk analysts who are the first line of support for computer users, and trainers who conduct classes to teach users specific computer skills. These roles work to ensure technology systems run effectively and that users can make the most of available resources.
The document discusses database security and common threats. It notes that database breaches exposing personally identifiable information increased significantly in 2013, with over 822 million records exposed. Common causes of database breaches included hacking, which accounted for over 59% of reported incidents and 72% of exposed records. Specific large breaches discussed included those affecting Adobe, Target, and the US National Security Agency. The document stresses that database security presents ongoing challenges given the emergence of new threats and no database is completely secure.
This document discusses databases and their importance in information systems. It begins by defining data, information, and knowledge, explaining how data is transformed into useful information and knowledge through organization and context. It then describes different types of databases, focusing on flat file databases and relational databases. Flat file databases store all data in one file but have limitations around data duplication, searchability, and concurrent access. Relational databases break data into normalized tables with relationships between them, addressing those limitations through their structure and use of queries. The document provides examples to illustrate key differences between the two database types.
The document discusses the design of a database for a university to track student club participation. A design team determined that tables were needed to track clubs, students, club memberships, and club events. The team defined the fields for each table, including primary keys. Examples of normalized database tables are also provided, along with explanations of 1st, 2nd, and 3rd normal forms. Additional database topics like data types, file-based systems, and database security are also briefly covered.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
INT 1010 07-3.pdf
1. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
07.3
Databases:
Relational Data Model and others
2. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
2
Data and
Databases
Before
Databases
Relational
Model
Databases and
security
Database
concepts
Database
design
3. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
3
Relational Model Data Warehouse Data Mining
Relational
Model
Business
Intelligence
and Analytics
4. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
4
Relational
Model
Databases
5. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
5
The relational data model was introduced
by E. F. Codd in 1970. Currently, it is the
most widely used data model.
The relational model has provided the
basis for:
• Research on the theory of
data/relationship/constraint
• Numerous database design methodologies
• The standard database access language called
structured query language (SQL)
• Almost all modern commercial database
management systems
The relational data model describes the
world as “a collection of inter-related
relations (or tables).”
6. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
6
Relation
A relation, also known as a table or file,
is a subset of the Cartesian product of a
list of domains characterized by a name.
And within a table, each row represents
a group of related data values.
A row, or record, is also known as a
tuple.
students
Row
The columns in a table are fields and
they are also referred to as attributes.
You can also think of it this way: an
attribute is used to define the record
and a record contains a set of attributes.
Field
7. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
7
Table
A database is composed of multiple tables and each table holds the data. Here is
shown a database that contains three tables.
8. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
8
Column
A database stores pieces of information
or facts in an organized way.
Understanding how to use and get the
most out of databases requires us to
understand that method of
organization.
The principal storage units are called
columns or fields or attributes.
These house the basic components of
data into which your content can be
broken down.
Field
9. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
9
Now, let’s look at the example of an ID
card in the left figure to see the
relationship between fields and their
data.
First Name Fam Name Nationality Salary DoB Marital Sta Shift Place Issue Valid until
Let’s take a look at the following table:
10. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
10
Domain
A domain is the original set of atomic values
used to model data.
By atomic value, we mean that each value in
the domain is indivisible as far as the
relational model is concerned.
For example:
The domain of Marital Status has a set of
possibilities: Married, Single, Divorced.
The domain of Shift has the set of all possible
days: {Mon, Tue, Wed…}.
11. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
11
The domain of Salary is the set of all
floating-point numbers greater than 0
and less than 200,000.
The domain of First Name is the set of
character strings that represents
names of people.
In summary, a domain is a set of
acceptable values that a column is
allowed to contain.
This is based on various properties and
the data type for the column.
12. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
12
Records
Just as the content of any one
document or item needs to be broken
down into its constituent bits of data
for storage in the fields, the link
between them also needs to be
available so that they can be
reconstituted into their whole form.
Records allow us to do this.
Records contain fields that are related,
such as a customer or an employee.
As noted earlier, a tuple is another
term used for record.
13. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
13
Records and fields form the basis of all databases.
A simple table gives us the clearest picture of how records and fields work
together in a database storage project.
Attribute values
Rows
Attribute name
14. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
14
The simple table example in the figure shows us how fields can hold a range of
different sorts of data.
This one has:
• A Record ID field: this is an ordinal number; its data type is an integer.
• A PubDate field: this is displayed as month/day/year; its data type is date.
• An Author field: this is displayed as Initial. Surname; its data type is text.
• A Title field text: free text can be entered here.
15. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
15
You can command the database to sift through its
data and organize it in a particular way.
For example, you can request that a selection of
records be limited by date:
1. all before a given date,
2. all after a given date or
3. all between two given dates.
Similarly, you can choose to have records sorted
by date.
Because the field, or record, containing the data is
set up as a Date field, the database reads the
information in the Date field not just as numbers
separated by slashes, but rather, as dates that
must be ordered according to a calendar system.
Other date formats:
DD/MM/YYYY
YYYY/MM/DD
16. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
16
Degree
The degree is the number of attributes in a table.
In our example the figure we have been working with, has a 4 degree.
17. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
17
Table Properties
• A table has a name that is distinct from all other
tables in the database.
• There are no duplicate rows; each row is distinct.
• Entries in columns are atomic. The table does not
contain repeating groups or multivalued attributes.
• Entries from columns are from the same domain
based on their data type including:
• number (numeric, integer, float, smallint,…)
• character (string)
• date
• logical (true or false)
• Operations combining different data types are
disallowed.
• Each attribute has a distinct name.
• The sequence of columns is insignificant.
• The sequence of rows is insignificant.
record
field
18. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
18
Relational Model Data Warehouse Data Mining
Relational
Model
Business
Intelligence
and Analytics
19. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
19
Data Warehouse
Databases
20. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
20
As organizations have begun to utilize
databases as the centerpiece of their
operations, the need to fully understand and
leverage the data they are collecting has
become more and more apparent.
However, directly analyzing the data that is
needed for day-to-day operations is not a good
idea; we do not want to tax the operations of
the company more than we need to.
Further, organizations also want to analyze
data in a historical sense: How does the data
we have today compare with the same set of
data this time last month, or last year?
21. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
21
From these needs arose the concept of
the data warehouse.
The concept of the data warehouse is
simple: extract data from one or more
of the organization’s databases and
load it into the data warehouse (which
is itself another database) for storage
and analysis.
However, the execution of this concept
is not that simple.
22. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
22
A data warehouse should be designed
so that it meets the following criteria:
• It uses non-operational data. This means
that the data warehouse is using a copy of
data from the active databases that the
company uses in its day-to-day operations,
so the data warehouse must pull data from
the existing databases on a regular,
scheduled basis.
• The data is time-variant. This means that
whenever data is loaded into the data
warehouse, it receives a time stamp, which
allows for comparisons between different
time periods.
23. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
23
• The data is standardized. Because the data
in a data warehouse usually comes from
several different sources, it is possible that
the data does not use the same definitions
or units. For example, our Events table in
our Student Clubs database lists the event
dates using the mm/dd/yyyy format (e.g.,
01/10/2013). A table in another database
might use the format yy/mm/dd (e.g.,
13/01/10) for dates. In order for the data
warehouse to match up dates, a standard
date format would have to be agreed upon
and all data loaded into the data warehouse
would have to be converted to use this
standard format. This process is called
extraction-transformation-load (ETL).
24. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
24
There are two primary schools of thought
when designing a data warehouse:
bottom-up and top-down.
• The bottom-up approach starts by creating
small data warehouses, called data marts, to
solve specific business problems. As these data
marts are created, they can be combined into a
larger data warehouse.
• The top-down approach suggests that we
should start by creating an enterprise-wide data
warehouse and then, as specific business needs
are identified, create smaller data marts from
the data warehouse.
25. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
25
Benefits of Data Warehouses
Organizations find data warehouses
quite beneficial for a number of
reasons:
• The process of developing a data warehouse
forces an organization to better understand
the data that it is currently collecting and,
equally important, what data is not being
collected.
• A data warehouse provides a centralized
view of all data being collected across the
enterprise and provides a means for
determining data that is inconsistent.
26. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
26
• Once all data is identified as consistent, an
organization can generate one version of the
truth. This is important when the company
wants to report consistent statistics about
itself, such as revenue or number of
employees.
• By having a data warehouse, snapshots of
data can be taken over time. This creates a
historical record of data, which allows for
an analysis of trends.
• A data warehouse provides tools to combine
data, which can provide new information
and analysis.
27. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
27
Relational Model Data Warehouse Data Mining
Relational
Model
Business
Intelligence
and Analytics
28. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
28
Data Mining
Databases
29. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
29
Data mining
Data mining is the process of analyzing data to find
previously unknown trends, patterns, and associations in
order to make decisions. Generally, data mining is
accomplished through automated means against
extremely large data sets, such as a data warehouse. Some
examples of data mining include:
• An analysis of sales from a large grocery chain might determine
that milk is purchased more frequently the day after it rains in
cities with a population of less than 50,000.
• A bank may find that loan applicants whose bank accounts show
particular deposit and withdrawal patterns are not good credit
risks.
• A baseball team may find that collegiate baseball players with
specific statistics in hitting, pitching, and fielding make for more
successful major league players.
30. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
30
In some cases, a data-mining project is
begun with a hypothetical result in
mind.
For example, a grocery chain may
already have some idea that buying
patterns change after it rains and want
to get a deeper understanding of
exactly what is happening.
In other cases, there are no
presuppositions and a data-mining
program is run against large data sets
in order to find patterns and
associations.
32. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
32
Privacy Concerns
The increasing power of data mining has
caused concerns for many, especially in the
area of privacy.
In today’s digital world, it is becoming easier
than ever to take data from disparate sources
and combine them to do new forms of analysis.
In fact, a whole industry has sprung up around
this technology: data brokers.
These firms combine publicly accessible data
with information obtained from the
government and other sources to create vast
warehouses of data about people and
companies that they can then sell.
33. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
33
Relational Model Data Warehouse Data Mining
Relational
Model
Business
Intelligence
and Analytics
34. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
34
Business
Intelligence and
Analytics
Databases
35. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
35
Business Intelligence and
Business Analytics
With tools such as data warehousing
and data mining at their disposal,
businesses are learning how to use
information to their advantage.
The term business intelligence is
used to describe the process that
organizations use to take data they are
collecting and analyze it in the hopes of
obtaining a competitive advantage.
36. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
36
Besides using data from their internal
databases, firms often purchase
information from data brokers to get a
big-picture understanding of their
industries.
Business analytics is the term used
to describe the use of internal company
data to improve business processes
and practices.
38. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
38
Knowledge Management
All companies accumulate knowledge over
the course of their existence.
Some of this knowledge is written down or
saved, but not in an organized fashion.
Much of this knowledge is not written down;
instead, it is stored inside the heads of its
employees.
Knowledge management is the process of
formalizing the capture, indexing, and storing
of the company’s knowledge in order to
benefit from the experiences and insights that
the company has captured during its
existence.
42. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
42
What is a relational data
model?
1. has its schema viewed as a graph in
which object types are nodes and
relationship types are arcs
2. stores data as records which are
connected to one another through links
3. describes the world as “a collection of
inter-related relations (or tables).”
4. both data and their relationships are
contained in a single structure known as
an object
43. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
43
True or False?
In the relational model, the columns
are known as fields or attributes, and
rows are known as records.
True False
44. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
44
What is a data warehouse?
1. extracts data from one or more of the
organization’s DBs and loads it into
another DB for storage and analysis
2. data transfer is initiated by the server
rather than the client so he can store data
3. process of finding anomalies, patterns
and correlations in large data sets to
predict outcomes
4. graphical representation of information
and data
45. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
45
What is a data mining?
1. process of extracting data from the own
database
2. extracts data from one or more database
into another database
3. process of analyzing data to find
previously unknown trends, patterns, and
associations
4. harvest data that can be sold to a third
party
48. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
Textbook
49
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
49. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
Professor C
50
castellr@pgcc.edu
eLearning Expert
BS & MS in Systems Engineering
BS & MS in Military Science and Arts
HC Dr in Education
IT Professor | Spanish Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022.
Slides last updated on 03/2023
50. Introduction to Information Technology
7.3. Databases: Relational Data Model and others
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
51
07.3
Databases:
Relational Data Model and others