Monday 9 December 2013

ASSINGNMENT CHAPTER 10 from Mr. Tri Djoko Wahjono,Ir, M.Sc

ASSINGNMENT CHAPTER 10
Chapter Review Pages 542 – 543
Discovering Computer (“Living In the Digital World 2011”)
Lecture       :         Mr. Tri Djoko Wahjono,Ir, M.Sc
Student      :        Williem [1701309721]

1.      What Is a Database, and How Does a database interact with Data and Information?
A database is a collection of information organized in such a way that a computer program can quickly select desired pieces of data. You can think of a database as an electronic filing system or data base is a collection of data organized in a manner that allows access, retrieval, and use of that data.
To access information from a database, you need a database management system (DBMS). This is a collection of programs that enables you to enter, organize, and select data in a database. Database management system (DBMS) is a software system designed to allow the definition, creation, querying, update, and administration of databases. Database software, often called a database management system (DBMS), allows users to create a computerized database; add, modify, and delete the data; sort and retrieve the data; and create forms and reports from the data. Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video. Computers process data into information. Information is processed data; that is, it is organized, meaningful, and useful. In addition to documents, information can be in the form of audio, images, and video.

2.      What Is Data Integrity, and What Are the Qualities of Valuable Information?
Data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes or retrieves data. Data integrity identifies the quality of data. Data integrity is important because computers and people use information to make decisions and take actions. For a computer to produce correct information, the data that is entered in a database must have integrity.
For information to be valuable, it should be:
·         Accurate information
Accurate information is error free. Inaccurate information can lead to incorrect decisions.
·         Verifiable information
Verifiable information can be proven as correct or incorrect.
·         Timely
                       Timely information has an age suited to its use.
·         Organize
Organized information is arranged to suit the needs and requirements of the decision maker.
·         Accessible
 Accessible information is available when the decision maker needs it.
·         Useful
Useful information has meaning to the person who receives it.
·         Cost-effective
      Cost-effective information should give more value than it costs to produce.

3.       What Is Meant by Character, Field, Record, and File?
·         Character
A bit is the smallest unit of data the computer can process. Eight bits grouped together in a unit comprise a byte. In the ASCII coding scheme, each byte represents a single character, which can be a number (4), letter (R), space, punctuation mark (?), or other symbol (&). The Unicode coding scheme, by contrast, uses one or two bytes to represent a character
·         Field is combination of one or more characters, field is the basic data entry in a record. A field is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses
·         Record is a row of data added to this table. A record is a group of related fields.
·         A data file is a collection of related records stored on a storage medium such as hard disk or optical disc.

4.      What Are File Maintenance Techniques and Validation Techniques?
·         File Maintenance
Refers to the procedures that keep data current. File maintenance procedures include adding records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed
·         Validation
Validation is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes data, either as you enter it or after you enter it, to help ensure that it is correct. Types of validity checks include an alphabetic check, a numeric check, a range check, a consistency check, a completeness check, and a check digit.

5.      How Is a File Processing Approach Different from the Database Approach?
·         In simple term, a file processing system coordinates only physical access to data. A database organizes and coordinate both physical and logical data access.
·         In file processing data redundancy—same fields stored in multiple file but in Database Approach Reduced data redundancy.
·         In isolated data—data stored in separate files so it is difficult to access but in Database Approach not difficult to access.
·         A database specifically reduces the amount of duplication of data in a system. Additionally, since a database is designed to allow access queries where a file system only allows pre-determined data access, database queries can be far more refined and flexible, as well as granting user access privileges data.
·         Databases, unlike file processing systems, allow multiple protect stored users to access the same data simultaneously. File processing systems are far more restricted on this level.
·         The database's far easier to enforce uniform standards over the data because data can be formatted to fit a particular screen, allowing a single type of data file to be created across the system for example.
·         Database applications are quicker and easier to develop due to standardized components.
·         Due to design, databases are far more flexible as well. They can be adapted far more easily to cope with changing situations than a file processing system.
·         The economy of implementing a database across a huge network is greater than implementing a full file processing system.
·         Databases are essentially easy to install, and are far more user friendly.
·         In a file processing system, each department or area within an organization has its own set of data files. The records in one file may not relate to the records in any other file. Two major weak- nesses of fi le processing systems are redundant data (duplicated data) and isolated data.
·         With a database approach, many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time. A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power than file processing systems.
·         Data in a database also can be more vulnerable than data in file processing systems.

6.      What Functions Are Common to Most Database Management Systems?
a.      The ability to update and retrieve data
This is a fundamental component of a DBMS and essential to database management. Without the ability to view or manipulate data, there would be no point to using a database system.
Updating data in a database includes adding new records, deleting existing records and changing information within a record. The user does not need to be aware of how DBMS structures this data, all the user needs to be aware of is the availability of updating and/or pulling up information, the DBMS handles the processes and the structure of the data on a disk.
b.      Support Concurrent Updates
Concurrent updates occur when multiple users make updates to the database simultaneously. Supporting concurrent updates is also crucial to database management as this component ensures that updates are made correctly and the end result is accurate. Without DBMS intervention, important data could be lost and/or inaccurate data stored.
DBMS uses features to support concurrent updates such as batch processing, locking, two-phase locking, and time stamping to help make certain that updates are done accurately. Again, the user is not aware all this is happening as it is the database management system’s responsibility to make sure all updates are stored properly.
c.       Recovery of Data
In the event a catastrophe occurs, DBMS must provide ways to recover a database so that data is not permanently lost. There are times computers may crash, a fire or other natural disaster may occur, or a user may enter incorrect information invalidating or making records inconsistent.
If the database is destroyed or damaged in any way, the DBMS must be able to recover the correct state of the database, and this process is called Recovery. The easiest way to do this is to make regular backups of information. This can be done at a set structured time so in the event a disaster occurs, the database can be restored to the state that it was last at prior to backup. Backup and recovery is brought to mind whenever there is potential outside threats to a database. For example if there is a power outage, recovery management is how long it takes to recover the database after the outage. Backup management refers to the data safety and integrity; for example backing up all your mp3 files on a disk.
A disadvantage to this is any data or changes entered after the backup would be lost. A way to counteract this is to set the DBMS to provide a feature called Journaling. This involves keeping a log of all updates made to the database, it is maintained in a file separate from the database and can be obtained to re-update the database after it is recovered from the backup.
d.      Security
Security is the prevention of unauthorized users accessing the database. DBMS uses features such as encryption, authentication, authorization and views to provide security to the database. Encryption is when DBMS converts the data in a database to an indecipherable format. No unauthorized person trying to access this information will be able to read it. Authorized users will be able to see it in normal form.
Authentication is a technique in which the database administrator can identify the person accessing the database. Authorized users are given passwords and successful entry of a valid password will allow the user entry into the database, if a password is not successfully entered, the user will be denied access. Authorization is a set of rules that the database administrator (DBA) sets up to specify levels of usage that individuals or groups are allowed to have. Some users may only be allowed viewing options, while others may be allowed to both view/make changes.
In some circumstances, users may only be allowed to access certain pieces of the database, and be denied access to areas that does not relate to their specific needs. In these cases, the DBA will assign workgroups, and these workgroups will be assigned levels of access and permissions. Views are when DBA allows certain users the ability to view the tables or fields that pertain to them, any other view does not exist for them in the database, DBMS does this behind the scenes and to the user it appears that the information they see are the only existing data.
e.       Data Integrity
Data integrity is an important function in database management. This is a set of rules that DBMS provides to see that data integrity is enforced, thus avoiding incorrect or inconsistent data. Types of integrity that DBMS provides are data type, legal values and format. Key integrity also falls into this function of DBMS. This enforces that the primary key of a record remains unique.

7.      What Are Characteristics of Relational, Object-Oriented, and Multidimensional Databases?
A.    Relational Data Base
a.       Stores data in tables that consist of rows and columns
b.      Each row has primary key
c.       Each column has unique name
d.      Stores data relationships
e.       Uses specialized terminologyFig10-19
to a file as a table, a record as a row, and a field as a column. A relationship is a link within the data in a relational database. Structured Query Language (SQL) allows users to manage, update, and retrieve data in a relational database.

B.     An Object-Oriented Database (OODB)
a.       Stores data in objects. An object is an item that contains data, as well as the actions that read or process the data.
b.      Advantages
c.       Can store more types of data
d.      Can access data faster
e.       Often uses object query language (OQL)
f.       Object-oriented databases often use an object query language (OQL) to manipulate and retrieve data.
g.      Applications appropriate for an object-oriented database include a multimedia database, a groupware database, a computer-aided design (CAD) database, a hypertext database, and a hypermedia database.
C.    A Multidimensional Database
a.       Stores data in dimensions.
b.      These multiple dimensions, sometimes known as a hypercube, allow users to access and analyze any view of the database data.
c.       No standard query language exists for multidimensional databases.
d.      One application that uses multidimensional databases is a data warehouse, which is a huge database that stores and manages the data required to analyze historical and current transactions.
e.       A smaller version of a data warehouse is the data mart, which contains a database that helps a specific group or department make decisions.
f.       Multiple dimensions, also called hypercube, allow users to analyze any view of data
g.      Can consolidate data much faster than relational database

8.      How Are Web Databases Accessed?
Database you access through the Web by filling in a form on a Web page usually resides on a database server, a computer that stores and provides access to a database. To access data in a Web database, you fill in a form or enter search text on a Web page, which is the front end to the database. A Web database usually resides on a database server, which is a computer that stores and provides access to a database. One type of program that manages the sending and receiving of data between the front end and the database server is a CGI (Common Gateway Interface) script.

9.      What Are the Responsibilities of Database Analysts and Administrators?
·         A database analyst (DA), or data modeler,
a.       Focuses on the meaning and usage of data.
b.      The DA decides on the placement of fields, defines data relationships, and identifies users’ access privileges.
·          A database administrator (DBA) requires a more technical inside view of the data. In small companies, one person often is both the DA and DBA. In larger companies, the responsibilities of the DA and DBA are split among two or more people.
The DBA is an IT Professional that take care about
A.    Installation
To install a program to the company computer.
B.     Configuration
C.     Upgrade
Checks backup and recovery procedures.
D.    Administration
E.     Monitoring
Monitors database performance
F.      Maintenance
The DBA creates and maintains the data dictionary
G.    Securing

Manages database security

No comments:

Post a Comment