Ch 5 Turban IT

Embed Size (px)

Citation preview

  • 8/3/2019 Ch 5 Turban IT

    1/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-1

    Introduction to Information Technology

    2nd Edition

    Turban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    Chapter 5:

    Managing Organizational Data and

    Information

    Prepared by:

    Roberta M. Roth, Ph.D.

    University of Northern Iowa

  • 8/3/2019 Ch 5 Turban IT

    2/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-2

    Chapter Preview

    In this chapter, we will study:

    Basic data management terminology

    Storing data in traditional files and problemswith this approach

    The data base approach to storing data

    How data is organized to create a data base

    Components of a DBMS

    How companies utilize their stored data

  • 8/3/2019 Ch 5 Turban IT

    3/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-3

    Basics of Data Arrangement

    and Access The Data Hierarchy

    Recall8 bits => 1 byte => 1 character

    Field - a logical grouping of characters into a

    word, a small group of words, or a complete

    number

    Record - a logical grouping of related fields

    File -a logical grouping of related records

    Database - a logical grouping of related files

  • 8/3/2019 Ch 5 Turban IT

    4/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-4

    Data Management Terminology

    Entity - a person, place, thing, or event about

    which information is maintained

    Records describe entities

    Attribute - each characteristic or quality

    describing a particular entity

    Fields describe attributes

    Primary Key - field that uniquely identifies the

    record

    Secondary Key - field does not identify the

    records uniquely, but can be used to form logical

    groups of records

  • 8/3/2019 Ch 5 Turban IT

    5/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-5

    Storing and Accessing Records

    Sequential media (tape) stores records sequentially based

    on key values

    Direct (or random) media (disks) use other techniques:

    Indexed Sequential Access Method (ISAM)

    Uses an index to locate individual records

    Index - lists the key field of each record and where that record

    is physically located

    Direct File Access Method

    Uses the key field to locate the physical address of a record

    Transform algorithm - translates the key field value directly

    into the records storage location

  • 8/3/2019 Ch 5 Turban IT

    6/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-6

    Traditional File Environment

    The organization has multiple applications withrelated data files

    Each application has a

    specific data file related to it,containing all the datarecords needed by the

    application

    Each application comes withan associated application-

    specific data file

  • 8/3/2019 Ch 5 Turban IT

    7/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-7

    Traditional File Environment (continued)

  • 8/3/2019 Ch 5 Turban IT

    8/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-8

    Data redundancy same piece of data found inseveral places.

    Data inconsistency various copies of data no longeragree.

    Data isolation data in several application data files ishard to access and integrate.

    Security may be difficult to limit access to various dataitems in applications.

    Data integrity data must be accurate and correct.

    Application/data dependence applications aredeveloped based on the way data is stored.

    Problems: Traditional File Environment

  • 8/3/2019 Ch 5 Turban IT

    9/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-9

    Database Management System (DBMS)

    Database : The Modern Approach

    The database management system provides access tothe data

  • 8/3/2019 Ch 5 Turban IT

    10/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-10

    Two choices: Centralized or Distributed

    Choice will affect user accessibility, query response time,

    data entry, security, and cost

    Option 1: Centralized databaseAll the related files are in one physical location

    Provides database administrators with the ability to work on a

    database as a whole at one location

    Data consistency is improved and security is easier

    Files are only accessible via the centralized host computerRecovery from disasters is easier

    Vulnerable to a single point of failure

    Speed problem due to transmission delays

    Locating Data in Databases

  • 8/3/2019 Ch 5 Turban IT

    11/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-11

    Option 2: Distributed database

    Complete copies of a database, or portions of a

    database, are in more than one location, close to the

    userType 1: Replicated database

    Copies of database in many locations

    Reduced single-point-of-failure problems

    Increased user access responsiveness

    Type 2: Partitioned databases

    A portion of the database in each location

    Each location responsible for its own data

    Locating Data in Databases (continued)

  • 8/3/2019 Ch 5 Turban IT

    12/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-12

    Locating Data in Databases (continued)

  • 8/3/2019 Ch 5 Turban IT

    13/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-13

    First, develop a Conceptual design - an abstractmodel of the database from the user or businessperspective

    Second, organize with Entity-Relationship (ER)

    modelingprocess of planning the database design

    Entity classes Instance Identifiers Relationships

    Database Development

    CourseCourse NumberCourse NameCourse TimeCourse Place

    ProfessorID NumberNameDepartment

    can have1:M 1:1

  • 8/3/2019 Ch 5 Turban IT

    14/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-14

    Entity-relationship model

    Types of relationships:

    One-to-one: a student hasone schedule; a schedule

    belongs to one student

    One-to-many: a course hasone professor; a professor has

    one or more courses

    Many-to-many: a studenthas one or more courses; a

    course has one or more

    students

  • 8/3/2019 Ch 5 Turban IT

    15/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-15

    Third, analyze the data structure byapplying the Normalization processmethod that reduces a relational database to

    its most streamlined formHelps achieve

    minimum redundancy

    maximum data integrity

    best processing performance

    Database Development

  • 8/3/2019 Ch 5 Turban IT

    16/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-16

    Non-normalized table and its problems

    * If an order contains many parts, you will have many repeatinggroups of part information. How will you know how much space toset aside for all the groups of part information?

    *The customer number, name, address, etc. must be repeated inevery order. If the customer moves, how will you make sure thatall occurrences of the address get updated correctly in all the orderrecords?

  • 8/3/2019 Ch 5 Turban IT

    17/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-17

    Normalized Relation

  • 8/3/2019 Ch 5 Turban IT

    18/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-18

    Fourth, physically implement the datastructure in the database managementsystem softwareCreate tables

    Define fields and field properties

    Establish primary keys

    Define table relationships

    Add actual data (records) to tables

    Database Development

  • 8/3/2019 Ch 5 Turban IT

    19/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-19

    Database Management Systems

    A set of software programs that provide access to

    a database

    Data is stored in one location, from which it can

    be updated and retrieved

    Application programs are given access to the

    stored data by various mechanisms

    Maintaining the integrity of stored information

    Managing security and user access

    Recovering information when the system fails

    Accessing various database functions from within an

    application

  • 8/3/2019 Ch 5 Turban IT

    20/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-20

    Logical view - represents data in a formatthat is meaningful to a user (e.g., tables withfields and records)

    Physical view - deals with the actual,physical arrangement and location of data inthe direct access storage devices (DASD)

    DBMSs shield the user from having toknow about the physical location of thedata; user only has to know the logicalway its organized

    DBMS: Logical versus Physical View

  • 8/3/2019 Ch 5 Turban IT

    21/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-21

    Data Model

    Defines the way data are conceptually structured

    Data Definition Language (DDL)

    Used to define the content and structure of the database

    Users define their logical view (schema) of the databaseusing the DDL

    Physical characteristics of records and fields are defined

    Relationships, primary keys, and security can beestablished

    DBMSComponents

  • 8/3/2019 Ch 5 Turban IT

    22/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-22

    Data Manipulation Language (DML)

    Used to query the contents of the database,

    store or update information in the database,

    and develop database applicationsStructured query language (SQL) - most

    popular relational database language

    Data Dictionary

    stores definitions of data elements and data

    characteristics

    More DBMSComponents

  • 8/3/2019 Ch 5 Turban IT

    23/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-23

    Improved strategic use of corporate data

    Reduced complexity of IS environment

    Reduced data redundancy and inconsistency

    Enhanced data integrity

    Application/data independence

    Improved security

    Reduced development and maintenance costs Improved IS flexibility

    Increased data access

    DBMSBenefits

  • 8/3/2019 Ch 5 Turban IT

    24/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-24

    Logical Data Models

    A managers ability to use a database depends on how

    the database is structured logically and physically.

    In a logically structuring database, consider the

    characteristics of the data and how the data will be

    accessed. Three common data models : hierarchical, network, and

    relational

    Using these models, database designer can build logical or

    conceptual view of data that can then be physicallyimplemented into virtually any database with any DBMS.

  • 8/3/2019 Ch 5 Turban IT

    25/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-25

    Logical Data Models (continued) Relational model is common in PC environment because it

    is simple to understand.

    Relational model provides high flexibility and ease of use.

    Relational model provides slower search and access times;

    a problem in high-volume business settings. Hierarchical data model gives best processing speeds, but

    poor query flexibility.

    Network data model gives pretty good processing speeds

    and pretty good query flexibility, but is very complex.

  • 8/3/2019 Ch 5 Turban IT

    26/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-26

    Emerging and Specialized Data Models

    Multidimensional

    Object-oriented data model

    Hypermedia

    Geographic information system database

    Knowledge database

    Multimedia database

    Small-footprint database

  • 8/3/2019 Ch 5 Turban IT

    27/31

    Introduction to Information Technology, 2nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-27

    Using the Stored Data

    Access to accurate and timely information is

    critical in todays business environment.

    Much information is collected by TPS, but access

    to and insight from that data may be limited.

    Many organizations are working to improve

    information access and availability.

  • 8/3/2019 Ch 5 Turban IT

    28/31

    Introduction to Information Technology, 2

    nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-28

    Using the Stored Data (continued)

    Data warehouse:a database system designed to support management decision

    making.

    Emphasis is on organizing data in convenient, meaningful ways so

    that users can get their queries answered.

    Current and historical, detail and summarized data are included.

    Metadata (data about data) is included to help keep track of the

    data warehouse content.

    Data mart: small scale, simpler data warehouse. Easier

    to implement. Targets smaller business segments.

  • 8/3/2019 Ch 5 Turban IT

    29/31

    Introduction to Information Technology, 2

    nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-29

    Using the Stored Data (continued)

    Data mining:Extracting new insights from data warehouse

    Sophisticated tools employ algorithms to discover

    hidden patterns, correlations, and relationships.

    Classifying Clustering

    Associating

    Sequencing

    Forecasting

    What can we learn (examples)?

    Market segments and customer characteristics

    Customer buying patterns

    Fraudulent behavior

  • 8/3/2019 Ch 5 Turban IT

    30/31

    Introduction to Information Technology, 2

    nd

    EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-30

    Chapter Summary

    Traditional file structures lead to numerous data

    management problems

    DBMS help resolve many of those problems

    Users are concerned with the logical view of data.

    When organizations have created well structured

    databases, decision making and insight will

    improve through data warehouses and the use of

    data mining tools.

  • 8/3/2019 Ch 5 Turban IT

    31/31

    Introduction to Information Technology, 2nd EditionTurban, Rainer & Potter

    2003 John Wiley & Sons, Inc.

    5-31

    Copyright 2003 John Wiley & Sons, Inc. All rights reserved. Reproductionor translation of this work beyond that permitted in Section 117 of the 1976

    United Stated Copyright Act without the express written permission of the

    copyright owner is unlawful. Request for further information should be

    addressed to the Permissions Department, John Wiley & Sons, Inc. The

    purchaser may make back-up copies for his/her own use only and not for

    distribution or resale. The Publisher assumes no responsibility for errors,omissions, or damages, caused by the use of these programs or from the

    use of the information herein.