Ny Ogee code: 317/22/M03
Nicosia iit DATABASE CONCEPTS
0 DESCRIBE BUSINESS INFORMATION sysTEMS
Per ene oOo OUS cS
Fone ONTOS (oS) RSE Me ce corm ear components that work
together t0 collect, store, process, and disseminate information to support decision-makin:
pusiness processes, and overall business operations
Features of business information systems
|, Data Management: One of the primary functions of a BIS is to efficiently manage and store
jarge volumes of data generated by the organization. This includes collecting, organizing,
sioring, and retrieving data from various sources such as databases, spreadsheets, and external
systems, Data management ensures that accurate and relevant information is available for
Pues eu ONO LSna
Dee Onsen CEN RIeee eS)
een Cone ome Uny
Reese Cae!
Fi COC Ore ceoee ean SECM eee ec MCR ca
Fil ins CAV Coleen Re Ca SSS nice meu RG
decisions, identify opportunities for improvement, and monitor key performance indicators
ate with other
3 Integration and Automation: Business informa
PS Cues orm
Byslemeland applications within the organization to streamline workflows, eliminate manual
Teskyand improve efficiency. Integration capabilities enable data shari PoC UU
Aion ete eee CCA aaa
4 Security and Compliance: Security is @ er itical feature of a BIS to protect sensitive business
“in tin ana RISERS CaN SASS uaa al aaa
MORMON
11s US Eee Sas
Ee
«0 20 COREE SA ea aa PN
TSF COE Ney (ee IT
Pe Roecy
TST NTERSC ES eral
boration
Peri et Rea
sa
PC eee
Peer ererstens
fant messaging, video conferencing
Pounce eto n eStore
ee and shared workspaces. Collaboration features
RO ae Sones es eet
Deca nee: Rieu
ec oe ote
ee ene neko
> Data Collection and Stor
GIA Uiesae Soon emo ernest e ee ree eS ces
(@g, Sales databases, inventory records), external sources (e.g., market research,
competitor data), and user input (e.g., customer feedback).
Soe Onese tora
Dae Teen Me ace eee MT Ti
Foran ue ea eee Te
ais stored in databa
Siroretst:
Ieee nieces
and retrieval.
Saturna PAN
+ Data Transformation: The system processes raw data to make it meaningful and
relevant f0 users. This can include cleaning, form
EUR rures rege tcd
* Data Analysis: BIS tools enable users to analyze data, identify trends,
insights, which can s
ae Con ren ans
EVE AC as eect
Scans PI Rete nee
Ete a
Eraphs, dashboards) to present data in a clear and understandable manner
> Communication and Information Sharing
Information Distribution: The system delivers processed information to users through
Watiotis channels, such as reports, dashboards, emails, and mobile apps.
*Collaboration Tools: BIS may incorpora
ST stereo eer Tener Reema to
PIONS neler
Drees
ments, messaging platforms, and video conferencing
Control: The system can restrict access to sensitive data ba:
Soe
Westen
2 Una aelcecy Ueno
OSS iTesme: irae Ue aM eS rue NET CO emcee TENCAC SET Maceo
Aiea Tea eee i
DET
LN aX eyes ie)Sr Oe OE Na eee eee Te
Si ee SE
sinegration with Other Systems: A BIS can integrate with of!
iy the business, such as CRM
ficiency and productivity
ocean
Canton Ree es Cnet
Colones
Sen eon aS Us
Veco intey teckel on earentes
Accessibility: The BIS should be desi
ed to be user-friendly and accessible to all
eso Riciree ne ees
Suni AEC LUNGS ene eee
find and access the information
nomen
* Customization: The system may offer customization options to tailor the user
Bean Ieee eee
> Seourity and Reliability
+ Data Protection: The system should protect sensitive data from unauthorize
Use, oF disclosure. This includes measures such as encryption, access control, and data
few
* System Reliability: The BIS should be reliable and available when needed. This
Fe tino eS ECR a ee See ose eT ee
rien
> System Maintenance and Updates
OUST Blea ooe Se eRe RUT ecaeL emCoeTECont
Tens NOHO Ce aT
eee NiTe
EER end
alability: The system should be able to handle increasing data yolumes and user
Cnr ae seers tenet
TSRTSCS SS SMUT TURTCaNY
ra
lon-Making: Provides relevant information for informed and dat
Een
Ceoscony
> Biisiness Process Improvement: Streamlines and automates business processes,
Aes STs Hieae eae RS Hee NCS
acct oiaa Cree nae
TION SC UCR Mn prercomst Conte
Felationships through data analysis and in
ts,
SDT ot Yozeeeae Sciey
iit
iv
vi
viii
Gpaneial Management: Tracks and manages fi
eee Ks and manages financial data, enabling better financial
planning and reporting
(Operations Management: Monitors and controls key business operations, such as
jpventory. production, and distribution
Oat}
TL CCAS OS ESCORTS NSS EET Te eee eee et
on
Aron Sos caaessa
PS TOI RENCE ona tt
Tee
Management Information Systems (MIS); Provide summarized reports and dashboards
fo managers, enabling them to monitor performance and m
Eee esceas
PES NCR ST SoReSEoUEKID SSE
Chair
ON Cees oe USE WRLC
Rreseeeonunneny
OER EUAN ee Te eT
ecutive Information Systems (EIS): Provide top executives with h
aval
Summaries and insights into business performance, en:
POI Cm ort
CeaNtony
ier CCS)
SO CCM eT ICE
recommendations, often in specialize
Office Automation S;
ms (OAS) + Focus: St
mlining daily tasks and workflows
Roun eiCerteca ieee eg ON se OS Se ee ea
Microsoft Word or Gos a
Peete cmeS acca
Programs like Excel or Google Sheets for calculations, data a
Neer acene
SOs ee)
s like PowerPoint or Google Slides for creating visual
presentations. * Email and Communication: Systems like Outlook or Gmail for email,
Ea ecolean
Ciera
IVSSO en eoReretiea
Wire
jon. * Database Manag
Cae Neem Coc
data.
RS Cn IS NOMS TaN Dr enc
Rinne race nome ToD
Peet ee Soe een MO Tne
performance. - Key Components: * Data Collection: Gathering data from various
Eo NHS eos mae Dee preeeMECUNORe NCO LAL
regation,
Uomo lysis, and reporting, * Reportin
Creat
Seid
andidashboards that present key performance indicators (KPIs) and trends
Leta aS ee gS ye
OO Nem aectems nse tee sue Toa ocd
Business processes across an entire org
ATCT COC ee aa CT
(eT eT Eee ea PeerSe Oe OS nc oa te eee eee SC a Tn Sou a
Feo
Goren
Peontent
SCM SLU Tam a
Cru en KGS LZ ce
jata in a single, integ
system. * Workflow Automation
SOU SUM ne iiss een snes
a
Pec eno
Data
Testes eaten aT
Te oouel
Pe oe Se See cco Se eee
computers, servers, and network
foie
Ry eau eset sa Teetenee ete
Ered
People: The individuals who use and manage the system
Procedures: The processes and workflows used to collect, pro
BOOT NUT nore)
1.3 Bthical and legal implications of inforn
ion systems
sm ethics
Information sy
Mons SSC MMOS M Rae Rn eee ie eet tT
ino) TRS eM ete SOS eMC ae
software, databases, networks, and the information they pros
Importance of Information System Ethies
Party
Individuals: Ensuring individuals’ privacy and safety in the digital age.
> Promoting Trust: Building trust in information syste ¢ institutions that use
Ten
A Sogn COO O eR eres eS eee ne eee NCO
® Fostering Social Responsibility: Encouraging the use of technology for the benefit of
Rose
Intellectual property protection
retary
Mare aa e ed atsSi Cannas arash
Phrase, word, or symbol that denotes a specific
product and legally differentiates it from all others of its kind,
Fee Meee CORT an
> Itis legally or PEON eee Rete rae
eons
Se teren ROC CNA Cee ee
Tester
Ronen urea
Pea a eon Ce Te ee
ene ROSAS Lec re eee eRe
ites
nee
Seen Soe
Sante Wekancuenec OM Reet ety
Sree HA CO SCT ene
SS EPS eane tT NOt ROC eee nee
} Eg Mercedes Benz, Toyota, Chicken Inn, Surrey
Copyright
ede
STO eee meme
works of authorship,
including literary, dramatic, musical, and certain other intellectual works. It protects the
i CRON SOR et enone
Pe ee seen eae nen ee eee eee Nr
OC Meee nee eome cree ene eet
} Inother words, copyright is the right to copy
Only the creator of the work can authorize anyone to reproduce the work
cpa cee eer
>) Oa Tse og ese
MOOR me role
} Fixation: The work must be in a tangible form, like @ written manuscript, recording, or
Caren
Ca rio ea SES Siena
tne
ene eee EO cs eee un ns:
Be one ee eae> ASTI SESOL oa ec eee et eee
product, industrial commodity or handier:
etic
a
aR Stir Rees
n tights protect the visual appearanc
TE ee ene
SCO eeO MCT Nee
Teco eres
0 ESTABLISH DATABASE USER REQUIREMENTS
Ps coleman
Pups wale
Saeco OCC Rat ETN
Create Tirean ery
data.
database users can acce
STC RU TEM USM elec ULC Le
Management System (DBMS) applications and interfaces
Dyer euler
poe eee (etetts
rized based on their interaction with the database. There are
Seven types of database users in DBMS. below mentioned are the types of database
users:
1, Database Administrator (DBA)
© ADatabase Administra
DBA) is a person/team who defines the schema and also
Controls the 3 levels of the database
~
The DBA will then cre: aan
Renae Cenne em SCE
to access the database.
o
DBA is also responsible for providing security to the database and he allows only
ETT 4a Ue Cece OER
e
DBA is responsible for problems such as security breaches and poor system response
time.
5 10):) RoR nee ea me Meee SUM UC Neat encco mie oo
bo Te DEIN SPUD AU econ RICE SOIC Ameren eS Cuma Una
Eucornt
eter
y
caused due to hardware and/or softwai
DBA repairs dama
cr eee ae Poco?> (iS SNe en ene ecco as
COE CaaS een
ars)in exchange for a comprehensive
eee
} Government agencies typically handle and appre
Pale nae cnS
SS Cnay
DS ae me Reena ren eC
PSUS rR eee
ono
TCO ko ce oN
v
ETS a eee TCM TET
compositions of matter, and improvements to existing inventions.
pont) RCN LL so Me me OO
Commercially
pe Ver CN OUEST
CE NON ao uCE Nn ens
Th UREN ae SENS COMET ere MTree
Weep reotO ne ae Ne
Mseoniee eens cc
Tetsu
Ne ROR Ss ae eC eon a cece mC Nana
nerally not known
COC M en eum CET meen sree
Pees eae meee
Een cree en eR RCO eee RO Loe ee sera eae see
and development
> Trade secrets protect confidential information tha
ives a business a competitive
Echa
} Thiscan include formulas, processes, customer lists, marketing strategi
} Trade secrets may differ across jurisdictions but have thre
Ronettes
public, offerir
SUS TSH UC Choa asc!
Industrial design rights
Poe unninnset es
n right is an int
Secsen eh
design of objects that are purely utilitarian.
oe Mnnernststa
ONO ec CLC Me omc
€omposition of pattem or color, or combination of pattern and color in three
dimensional form containing aesthetic value.
be eT eer
feu)oF SOT
Sto perform DCL (Data
(eu eu eke art
NAO CORTON sua!
(Ooi nuerenes
oie So CS snes Se
CLP CE Metre e
(once CUS etc
Teeny nulti-user business environments, They are knowled
ble of
he organization’s IT infrastructure, business policies, and database design guidelines.
DS SASS Yon aOR ENERO eS aR eM Es eee a
oth operation of databases, they man
Crate Seeing
> Cine aes conn NCS ae
Cee u eesti mente un!
SHOT CRON eR ae ese te eae UC
nee Onsen
Eee Re eee eon Ly
Gomueicn ny
these responsibilities may diffe
Dye terse or ero
ERGO LOCOS Ree Ieee Or CME NE TES UN TIS
Dil they frequently use the database applications in their daily life to get the desired
Tet ee meget MCT ASUS cao ara
v
Glerks in any bank is a naive user because they don’t have any DBMS knowledge but
they still use the database and perform their given task
} Other employees who indirectly connect to da
Doeegtice
Se eens
onsidered end-users. These users input and maintain data. Business users
Tarceva
Oke et cenit eminent econ
They provide business requirements for da
se designers, analysts, and programmers
eee een le neiece yale teneet Ue ORS TS co
NS cnr hts
© Asystem Analyst is a user who analyzes the requirements of parametric end users.
tt
They check whether all the requirements of end users are satisf
CaS MCE OCU ne eran ican Reo acu soc
bbisiness data in databases. Screens and forms in these applications allow end-users to
view, ent
Se OCR ees er cnn eRe us um au
Tanguages such as C#, Java, Python, and web development stacks.
urls eee eet Peer)ne data, they also use proprietary implementations of SQL (Structured
ieee
«ES Rte ODegCOoE ME De MSODeT CO
rca
a
Aurea
gineers, scientists, business analyst, who are familiar
histicated users can be eng
p their own database applications according to their requirement.
eeu
0 ene Reese cCRC
SESE aOR
Pe roue eas
een
Teen) he structure of dat
> DAEEECSLE
Sasteisy
stored procedures and constraints which
Oe commen
TOSS Se een tere kone nuns
Bee/she controls what data must be stored and how the data items to be related
Secuencia cco
© fe eu eoRS SUIT esis Da TEL Ds
Ue eee eee CSC uN SECC RR a
eae
Pe etc
DA database designer defines the details ofthe database desig
es oe eee me GLN OLE
Er ec ee MCER es
Cyrene eo
Pec CURA SSCL Sao
> Application Progr
“Fete Ore ee een ne ROR SRL a a a
Desens
aaa raters
1S eae RCM SCRUM CU a NNT As
Developer, C, FORTRAN, COBOL etc. Application programmers design, debug
oi one) PIE U IS LRU RG Un LS SR
(Parametric) users in order to interact with database,
CST Tiree Ren ete meee
co)
*y CeO ree
(Loess_ o HIO SESS Uses oy
Sec en ears id
Oke Se ee nee eee CRT SUI!
pete ero
po
OS Seccilranlts
POS User te SN NCR cs
emer era)
(fac sues envenuenis
IODC ce ees Tens
© era Ieee Tp a Ren Conse UeRec eT Ste
ese caru!
Senses
Re einen cena
Personne
{CAE SOS ME Secs een eS Rese ca aon
Joyo AN SRST en NE EE Se COTO
mus
MFestures: They need tools for querying, reporting, and data visualization to extract insights
Fan eee a our Cee NOTE ee en eee eR Se cae
Sree meen
reports are es
Been Eu
aN
cone tess meme eel
Sey
Eee geen
interactions, and forecast future
Se Un eee eee CR Cea NT eSne LOL BCCI CONTAC
Oplimize sales strategies. Features like CRM integration, sales forecasting tools, and
Bestia arorgeeany En
SNCs Un COS Cen eRe ok CORLL Sean MORO TOS Lg
DOs Sin eee Tenens
~ Features
SOOO RCC TOS Om STONE 3 Slanted
Valuations, and compliance information. Features like HRIS integration, self-service portals
OT) Oe ee eae
Drone Nt
ROR ana
aoe ee
Con
lL ar eeneestyin naa
s rely on the da
Toto ects ae Uy
ery SMe
eT
rs
(aS anor an een Ose SU oe
(oa
Aon ucui
sment. Features like barcode scanning,
ENC ON USE
systems are essential for their day-to-day
Ros
Boor eas cae Cen
_Need: Customer se
Se eee ner te
cess customer profiles,
He. eo ee OE Wenn cea
- Features
TON eee ean TC meu eeu as om L IL
View order history, and resolve inquiries efficiently
eres een
eae
ranagement tools, and customer communication log if
Poster ones iho
merry]
Proc snies
2.2 Hardware Specifications
fennel enone
Coca eh een eC
Coes cm aU
{orate el Cece eS Ce eS ECR Rector CLAUS ay
(RAM), storage devices (hard drives, solid-state drives), input/output devices (keyboard
mouse, Monitor), and peripherals (printers, scanners). Computer hardware is essent
Eeatis
Operation and functioning of a computer system.
Dice ee ROR
Secu
SIU a ga z/ yy aELD ER cnr Oa
store data on spinning disks. They
offer large storage capacities at a relatively low cost but are slower than other stor
types.
= Solid-State Drive (SSD): SSDs use flash memory to store data and provide faster read and
Write Speeds compared to HDDs, They are more durable and ei
Sian
Dror een
Cee 5
Toe ae Oce eyes DesertOe a SOE SEO AUS NC eMC G UNCUT!
ster
petwork a
oo
storage (NAS) devices provide ad
OOOO ne Dane nitrite Mme Ny
HOO OES ee Ce cee eo
Dee MM Merrow OS ee NM eget eens Pun
Per cua
Foch
reek
Per mua
(ors such as the size of the database, the number of concurrent users, the
ind the performance expectations. Key hardware requirements for @
database system may include
ies efficie
eet
GPU: A powerful processor is essential for processin
> Memory (RAM): Sufficient RAM is needed to store data in memory for quick access and
pecs
} Gorage: Fast and reliable storage, such as SSDs, is important for storing database files
and ensuring quick data retrieval
Bronson
Sere ee OMCs
ii ae eee
ReneS
database server and ensuri
Seen OS
} Backup and Recovery: Hardware components for b
are crucial for d
PROCS CRUSE Se Causeany
FS CULFITA OR eae eee SILOM COL MSN oS SG
PO GREAT
oes STS eT oSO
Dens ecrre tng enna
Doerr tee eee URS ee US
Ttesgep sees
5 cores Renee eo cet UTR S TUuSsL
Crone ccs
system should do from the perspective of the
Creme ie a inte cats
Geese tienen Ten einen
eC ds
Cores Siem ee eon UL an
Put te Seat are
Oa e eee hee anna
MOSUL U LES CU
Coie oie ene mone ae
Compite
led by Nyc sereTTT
Bee resuirements are gathered through inter es teeathen ts
Pelee nee eestor
survey
sag
eee
Oe an eres usenet
Penna
a basis for designing and developing the software system
Se
Shs also known as non-functional requirements, define
Scone
FORO ORG aE no TS
pecification EOI an eS Nema con
oo eee ea
She eee ReR eee ee aac eRe
stem shou
d perform to meet operational and functional needs
i. Security:
une aCe Ee ca Le
Aico Cen EMSAs on ce Raa
= ae AEE RSS LR cea
confidentiality
~Enerypt sensitive data in transit and at rest 10 prot
“lone cS Ae Ce LLL
sit Scripting, and buffer overflows.
nee
ENUM REECE ACSC cae aa POAT Itsy
oT
pled by Nyoni 9 0773097216 Decores
es enchmarks for processing transactions, generating reports, and handling
Pe
ncaa! Cee eee eee MOON NCS
Pec ia
| yo uie Ee MUN MCSA OM UC nos
os OES a acs
Pena
Pin
Reet a eC One Oem
[pene the maximum number of re
oftime.
(OCR eeRee aRenccn ne caS e Sa oe
cis
2) oe OSes
Mrplement Toad balancing mechanisms to distribute incoming requests evenly across
Areas
Mmfer throushput metrics to ensure that the system can handle increasing workloads
Rion) Onreneste cere
Pte os ean
Fire Oa oe ace Mies oC I SCL
Secu
—ostie CH AGREES eon eee occ ce ERO
egilafory requirements.
= nj ort Ce SR Ree NR eet es ONE EU a wu
Sree
Ren orin auc mento)
= Monitor disk usa
Eoin
PN cr cream
Seon eet
A eee
DEiiterecarel)
Ree eee custo
99:5 Ge Ree ee eee Sa
LTD eanyy ieeee)
er
=i
Ree cas
Bee teat
aa
nd optimize
Pete nearer
requir i
eccrine
ce
Pe ecm ri sie!
en
Peg cise fee
PO Cee SMR eT
Pe eon!
egret ieneeeecl
Ceo een ee Cee ence te f
ere Nea eet i
Tay coon i
Pee Sey t .
Acceptance criteria: What a NERC
Peron as
3.0 CONFIGURE DATABASE ENVIRONMENT
SSB US Ie non Nore NERO
Pa CU ea OTST
eater eet
ae eo e On ones roa a
a a eaeeey
PeersSome may be involved in designing t
E PTOI DEM TaN TT coe CEC
Cees Cee
a
[SRN Te ery
also be there t SEU eee CS
no} WTS on res eee
Pees rnrece Rut aes
: 4 eee LOTR er eon acT
oo 2 EE eMac
ee este ae ms titte ts
latabase administrator.
eid
reno
ST RORRUCM na eee ee
Pees teehee
DBMS.
SECC Couns eM LMM gE oa
> Standards and procedures ensure the consistency and effectiveness of the database
Caio
eee oe ON NEC MTT ene
o
TRO C Tae rae i r=
Siri Repetto MET
ntaining your DBMS will be difficult in the absence of
Ree cent nyse
The following are some examples of DBMS procedures and standards.
i Database Naming Conventions
Ti ino e- RTO e nO ORE Le oe Sco RrS ATS)
aN
fi Data Administration Standards
i
e standards define how data is created, captured, and maintained in your organization
BUTTS ney
ROU Cine were Roce ROR)
De Gete t eeenon a OTSy
CE eee Peter}aoe
ECan tet
no Sooner ee eee
h ROL is
These ares people, hardware, software, data, and proced
ena
> inoftides the actual computer itself and any sort of networking components needed.
pO arco RS ree ee eee ee ee
devices, processors, input and output devices, printers, network devices and many
at
ee nce eccrine te eee ence es
SIRE ca
SC Nee RTC nee
system PSEC Eee ene ter et
Raine
» The software component of the database environment includes all the software that we
eo Cee So eRe eee ee ee ee ar eT
any sort of programs needed to build and administer the database
a Sincere Seat eeu eee eres
Pee ic Co pee se UO Ue Re ec UR ete TN UN TCC
Romans
PaO erie Cum CO CR Rem MRO Cais CnC A
tabase and if required you ean even
STMT Ete ace oN!
application pro:
Io sue ont one te ae
Cremorne
> Hardware provides the infrastructure for storing and accessin
Secret
Sacre cree teonartnes
People/Users
TITS te ents eon
Sates ee ea
POI Caen a ORR uSn enon cats
ES Soa ORSON ST
> There may be a group of people who will access
PS Non eo vCM ULE CRON ATe CL
ere)
queries i.e. end-use
Cite la arom Vea eos ois
ae) PY eteet Pee)Pee euee tte
ree tae
Database Administration Standards
Peer ore ene ostoner era Recet
se Baeeee neti
Par Daas
Eee ese oni
Pee ecco che ent aneete e
iroould be asimple RACI chart or a detailed matrix. The goal is to clarify who handles data
Possess
Ea ern
Nee ESS Sea Ceo nes
These guidelines explain how to manage database s
nization because of security standards
Peet Sani
Pease Cece
Deere scone once neLU Cy fee DS en tT
Cree en ee eee oon ety
connecting to external applications and dat
Preeuieetirgcn rome
> Procedures define how users interact with the database system, including data entry
See OR eM TCT
Pros uEO eee nse nea eer eeeece rsa
tasks, They ensure consistency, accuracy, and security of data within the database
environment.
Data
> facts or items of information about an object. This structured information has the
potential to be transformed into something useful
birthday, contact details,
aon een Oconee aU
Position, hired date, and reporting manager. By looking at this data, you can determine
OSE Ne er Nemo
ST aa eee ea Peni|: (ee eee eee ee
Ts eS CeCe et ete
Ce ae trieve, update, and analyze information stored
pes
Prous
> Database models are conceptual representations of how data is organized and structured
ees
Cones tse er eC eee rear:
Poona
famework for storing, retrieving, and managing data efficiently
> Different database models offer various ways to organize and access data, each with its
own strengths and limitations
peer eC UESOYO
eee MOS nec nee eee eee eT
with parent-child relationships. Each parent record can have multiple child records, but
each child record has only one paren
Pr eas me Mee OM OMe ee resent
pod for data with a fixed and predictable structure
to-many relationships.
Mtn eee ea)
> = Disadvantages: Lack of flexibility in querying
Tee pA eaten aaa er oenTos amie data relationships
Peony
2, Network Dat
TS MRCS
Sniromercwon
Pensa hee EMC ener
sructure than hierarchical, with records connected through multiple paths. Records can
Reece UNaeeeS
Tea oie nen oem aE
= Advantages: More flexible than hierarchical model, supports complex relationships,
allows for efficient retrieval of interconnected data,
erent ect
net monroe eee
Se ete Reon aoe
enone
Rate meni RR
Cire eranesc
EC rico ELC
PPAR NEC Ren CONSE A
ae are ue No ene
entity and relationships are established throt
Columns, where each table represents
en ogee esy Page 20(oe De oea Pe ee CuO Con Ce ae en eee
integrity
Rn sete eet cen eter ea te ee
aS
aren
stegrity constraints, widely adopted and supported in various database
Poeun
ecu
datasets, normalization can lead
vantages: Performance may degrade with larg
aes
Peele eg eu ace Mitre nike eS Rete
cones
Roncned
Peery eee ee
ented database model, data is represented as objects with
Ree ee anus
atributes and methods, similar to object-oriented programming concepts. Objects can
inherit properties from other objects and relationships are established through object
eee
ocean nC LCS ae
encapsulation and inheritance, better suited for managing complex data types and
ees
nand implement, lack of standardization compared
ete eom Ca
to relational databases, may require specialized skills and tools
PCr eee OnE Sore Reema
1. Simplicity and Flexibility: One of the main advantages of the relational database
model is its simplicity and flexibility. In a relational database, data is organized into
it easy to understand and query. The relatio
tables with rows and columns, making
model allows for complex relationships between data entities to be represented using
simple constructs such as primary and foreign keys. This simplicity and flexibility make
Conran)
it easier to design, implement, and modify the database structure
hierarchical or network models.
De ew Cease RecN terta eee CEU ec
Fea Sc S EeTAe Oo Coe One
Constraints, and check constraints. These constraints help maintain data consistency by
ae TOT RES)
ensuring that only valid data is stored in the datal
Benne
ST OMe eco nr MS MTEC mce T
anomalies, leading to better data quality and integrity
Compiled by Nyoni 0 0773097216 page21 of 48Tne een cr
GL) as a standard language for querying and manipulating datm SQL provides a
CORO intr rn
imple queries. ‘The relational model allows for complex quertes Invelving mulliple
ce Ea Reh ere eee nner
Uae
Reet SOR et ee
LOMO een eer nT
eXen ne en
SNCS ener eee
OR eee Te
nearer!
> Database testing is a erucial aspect of software development that focuses on verifying
Cae nc ee tht
Ee ee
> Testing is a crucial aspect of software development that ensures the quality, reliability
Pee eee
OMe tt eee
a ee Re a cm Re men en
erence
Pee mC ome oe POLO CCG TTT oe
Loom Neo er
eee ORCC Te eC Ton RCT ne
information received and stored in the database is valid or not
dh NRC Me ae RON Me Re een tte
Page 22 of aPen oe
re & ‘ (
Pues involves testing individual components or units of code in
isolation to ensure they function correctly, It helps identify bugs at an early stage and facilitates
Rees
2. Integration T
AL SOULS on a eee ee ene ea
cor components of the system. It ensures that integrated units work together seamlessly and that
Peet skese ance ey
en
System testing evaluates the entire system as a whole to validate that it
meets the specified requirements and performs as intended. It tests the system's functionality,
performance, security, and reliability
CS eM Nn een sors
it meets their needs and expectations. Users perform real-world scenarios to validate the
systems usability and functionality
Peery
ay
the software is released to external users. It focuses on identifying defects and improving the
onducted by internal testers within the organization before
Perrree oes
Ro ee rN
2, Beta Testing: Beta testing involves releasing the software to a limited group of external
users to gather feedback and identify issues before the official release. It helps validate the
software in a real-world environment,
3. Stress Testing: Stress testing evaluates the system's performance under extreme conditions,
such as high loads or resource constraints. It assesses how the system handles stress and
identifies potential bottlenecks.
the system's functionality without
4. Black Box Testing: Black box testing focuses on testin
knowledge of its internal structure or code. Testers evaluate inputs and outputs to ensure the
SCO eet
5. Glass Box Testing: Glass box testing, also known as white box testing, involves testing the
., code, and logic of the software. Testers examine the system's internal
muta
Ree Oren g SERS a een
a Peer Peeryia and Test Cases
Peers
se RUS So ease enc tee Lae
Paes
Tet
one Oke
mased on requirements, user stories, and use cases to)
> Test cases should be designed bi
SOS CL CLA at eae nee eee ee
SO
STOO ana RO ae acu
Rca Nt
Pee Reno
simultaneously for a period to ensure a smooth transition. It allows users to compare results
cou
Pee a eer
2. Direct Conversion: Direct conversion involves switching from the old system to the new
system abruptly. It is a quick but risky approach that requires thorough testing and preparation
Pea ene
Dee Ree eNO ee ee Su a
3. Phased Conversio
or modules over time. It reduces risks by allowing gradual adoption and testing of each
Roast Rear
eau M acy
4, Pilot Conversion: Pilot conversion involves implement
or department before rolling it out across the organization, It allows for testing in a controlled
Sree seer esac
Justifying User Tr
eee en oe)
boca ee Uno
Ere
Een
ert ACM OM RSTn eo
Tee
> Training helps users un
Mee eee SnD
Pn ee eT
Se ee Sc UMLcceme ee
alities, enabling them to perfo
eum o nme me ee ts
m tasks effici
functio
ae areca
eee ee ues une
eee}
et eee eadPLU CCT D
4,1 Organise and prepare data for inclusion in the database
Methods of Data Collection
1, Surveys: Surveys involve collecting data from a sample of respondents through structured
questionnaires or interviews. Surveys can be condueted in person, over the phone, through
Pe ae
2, Interviews: Interviews involve collecting data through face-to-face or virtual conversations
with individuals or groups. Interviews can be structured, semi-structured, or unstructured,
depending on the research objectives.
3. Observations: Observations involve collecting data by watching and recording behaviors,
interactions, or events in a natural or controlled setting. Observations can be participant or non-
participant, depending on the researcher's involvement,
data by manipulating variables and observing
xperiments: Experiments involve colle
the effects on outcomes. Experiments are conducted in controlled settings to establish causal
relationships between variables.
SSO er ee ee ee ee oes ory
Ome ce Come CT eT
Eee cer ee a ae
perceptions on specific topics.
Coe Ce ee OR ete Ce Rama eT
sourees, such as reports, articles, records, and archives. Document analysis helps researchers
gather historical or secondary data.
OCA e ECC Meet Cny
Data verification involves checking the accuracy and consistency of
Teer iret
COS Ree eae ere em Creo SOO eae ett
cross-teferencing with extemal sources, and data comparison.
2. Data Validation: Data validation involves checking the completeness, correctness, and
Con ee Ce re concen CIC me ene
include range checks, format checks, consistency checks, and logic checks,
SL a Leaeeeaea Cd LeerFOS a eee
pDL (Data Definition Language)
or Data Defini
D eer
Pana € actually consists of the SQL commands that can
be used to define the database schema. It simply deals with descriptions of the
CO UC kOe CLS a ere ee ey ese eT
Preece
uo ae ae ae Re eee ete ee
but not data. These commands are normally not used by a general user, who should
eee eee Smt ee ae
Peta Rect
Here are all the main DDL (Data Definition Language) commands along with their syntax:
OT Dye rt Syntax
Som ema
CoO UUORESTE Peay
Cece?
COM Ny OT
Cire OSC
Cems ee
ree ee Un)
DS ems ccm em
PO) DROP TABLE table_name;
Cre
a PN Me LUO OR UPD
AVOuci
Creed COLUMN column_name data_type;
Fen rerae cse cu?
ble, including all spaces i
TRUNCATE pe i TRUNCATE TABLE table_name;
Pen Cm Sc
Pn
maT Races Peeeee) Derry 5
fe.) ck cat Syntax
‘Add comments to the data COMMENT ‘comment text’ ON
tay TABLE table_name;
Rename an object existing RENAME TABLE old_table_name
TUR
KOR me omy
DOTY
To
on Language)
> The SQL commands that deal with the manipulation of data present in the database
belong to DML or Data Manipulation Language and this includes most of the SQL
Serer
> It is the component of the SQL statement that controls access to data and to the
Ceo ee Ee hee e See a RUNS
rm NV RC
Here are all the main DML (Data Manipulation Language) commands along with their
Bae
oor ma ETE Sachs
Insert data into a INSERT INTO table_name (column!, column2,
rr BNO TORR oon 9
Se DOU
ry a
ee Cee ean Le a
Compiled by Nyoni D 0773097216 reCommand Description Sree’
conn
hee ees
DELETE FROM table_name WHERE condition;
Pelt
ir aT
LOCK ae LOCK TABLE table_name IN lock_mode;
cect moe. Ne) ary
CALL
CALL procedure_name(arguments):
EXPLAIN Describe the access. EXPLAINPLANFOR SELECT * FROM
Day) Rey Cees
DCL (Data Control La
ro}
> DCL includes commands such as GRANT and REVOKE which mainly deal with th
TSS UCR geo uo Rn en eS ee oy
List of DCL commands:
One ae Re enn
TT Deed rd
See tery
eo : CN eer
eee ee Ts
pe (column_list)]_ ON [object type]
Coen SO era
a
aU Ome mT
GRANT OPTION};
Pet ad
Firetras
PYaeeies
Poertagycommand eT ty ee.
ETN Pere
OMe eve lay
ST aT eee en
privilege type [(column.
REVOKE Peon ee
Oe Seer
Prego
CC oS TY
CECE coer
TEES
tere
Pee CR ence CoE
ATS
9
aD Sees
PEO ee
TALI VNR ea?
Somme a
ee MELO
DDL Commands for Table Creation:
erat y oe Tamora
CO ny
Cea
SUTTER ETN
De EIS COT ec
ALTER TABLE table_name ADD column_name datatyp
SE aeDee tty Syntax
Ree PT
REVOKE [GRANT OPTION FOR}
Oma eee
5
privilege type [(colu is re)
PCLT panda sce a WETS
bject_ type] object_name FROM
eee eared BS oom
user [CASCADE];
Cece eee Le,
ree
MCE ok eget
Oyo OP YUN Rem
Renee en
Pe en Sa Coe CD
LD
database_name SET new options,
ere w Ea
Keone Oa ELDERS
(oor ow ee en
Taya
CO ea
Do enna i eT eta
EO So Tay eee
Laer eatezzsCd CoCo)ae
AOC
ee ce
Coe Oe
ToC oe
Pree
Recon
rary
com Le oe
oa
NCO RUE Oe
Sera oR eS eC Reed oe
erin ean
Free MUNS oR CeIU a MEN ec
GRANT privilege type ON object name TO username
Pon ancy
Nemec nC Ce ame
BO one ave oe
Ome
Nee
re mC aCe
em ea
eros
Dy
® DDL is an abbreviation for Data Definition Language
Seen Ree Ce Ce CUM EUCLA
SCC eee aR een ae CeO
ec
immediately made to the database and cannot be rolled back
These commands enable database administrators and developers to manag
ey
Ona Se RR secon
om P
LT aera ceeenter nr rts
Deena
eT eee es
NC STU ane TRSte eee et
Lo ee Oe One eee
eR UN CRUE RU SOR eee eerie Tt
performance.
Creates a view, a virtual table based on one or more existing tables.
aN PROCEDURE Creates a stored procedure, a precompiled SQL statement that can be run
multiple times with different parameters,
(REATEFUNCTION Creates a custom user-defined function that can be utilized in SQL
eee
(REATE TRIGGER Creates a trigger, a type of stored procedure that is automatically executed
See Sem a eRe Ck mS
friars
si
> DML stands for Data Manipulation La
ee UO)
el Pre
irene the ess eon
Poon
ECT, INSERT, UPDATE, DELETE, ete
DN Rene eRe RCT CM URW CRU
Peay
necessary. By mastering these DML. commands, you can efficiently mani
MySQL databases.
Srey Retrieves data from a table
INSERT ee eos
wid Updates existing data in a table.
goo eee csc
cae o ee
Ceo Nr eae
Aes
‘ er red ees cos
co Pree
wl Logeae DS Se Se on ope
Ni
: Roe nnn et
fede 4 @ table to prevent other users from modifying it while a transaction
Deed
ra
Scere nen
It includes commands such as GRANT and is
primarily concerned with ight, permission
and other controls of the database system.
DOL statements are also auto-committed.
Pat SO Sune ct tea ss
ra
> TCL stands for Transaction Control Language. It dea
SECC
Cree aes
tent
COMMIT Ne eee en nay
ROLLBACK Rolls back a transaction, undoing all the
STS.O Ni Creates a savepoint within a transaction so that the transaction can be rolled
back to that point iffnecessary
SETTRANSACTION Specifies the characteristics of a transaction, such as its isolation level.
De
> Database security refers to the protection of a database from unauthorized access, data
CO een Re eat een eRe SS LS
Availability of the data stored within i
UST eee
4) Unauthorized access: When individuals or entities gain access to a database without
Proper authorization.
Saree
Cees
Attackers can inject malicious SQL code into input fields to manipulate
ca eee
TnL Lezereacted asa| pat Se
SO ERR tec
Pen One
fu
Pea
“an infect a database system and cause damage.
SRE SSeS eR ees
Pee Rom Cen et
Penn Une nnT
ETE
Fe Seater
cue a rere
SCS ROR ear re
CO UOn eT ee f
ci RU CO crs
ee ecai
ue eee : :
Re ; he data Ste eet
enemas
eee etree ical device and infrastructure that stores,
Pcs
Pe ao cae Sa
pment room Sta isd
Se eRe oe ee
cs i r ntication or
eee
econ
i OE Seo cone Eee eee ee eee
CORE aUra
a COE
See ery
network control
cae Lorie
ESCO mine ET
b,
Teac Cet Ran acne
Seen eee
CRC On een ny
Seana
* Monitoring user behaviour and detectin;
malies that could indicate a security threat
cae ranre
SUC nan nee Srna ce
deel Ivene
7 Cerny
iTees
Tene
cS Ce
POU eas
Te
Policies and guidelines
BC LENCO rae Natt
Pouca eee
Paco
} Database recovery is the process
Seat
rr
Cece)
failure or data loss even
PUL ioc San en er
COCO mts
downtime and protecting va
oe
Paces OL eae ta
TSO eM eae Geert etry
deletion, corrupted files, or malic
SOREL ess
Cee eee
Business Assets: Data
RSS an
ianeial records, intellectua
are all essential for business
CS eS eT e
e: Data often
SIS eae Seen Rent
ned
nce and competitive ed
SLUR cece eee eae
nize Downtime: Database
eae eet
SE CO TS ane
SUS SUSY nr eae vity and
Ona
Mainizin Customer Trust: Downtime can d SEU aa Cat
‘nonsfates reliability and fosters trust in the
SMe
SCO oe eee ene ee Recovery helps
WS ea eee ne or
abling rapid restora
Sea
Seen enea
curacy and Reliability + Restore Dat
Mssseney: Data corruption or inconsistencies can lead to incorrect business decisions and
net
tT ame Se EURO COS
and reliable state. * Mee
ial ue eeeLL ean
egulations, Recovery
CS
a : i mR Tay
SS tee
eros ‘ peacoat er te
CORO LCS ae
ea ‘nta loss and protecting sensitive information
ALL
ne _
"the Curve + Increased Confidence: Hi
OY ea ee Sess
EO es
and partners,
pac
rosin
an
protected and operations
aes
an n focus on innovation and growth, know ee
Caled eae an to consistent and accurate
CT ee ee antages and faster growth,
Pe ceca
Se ee ee Een La ee pee ee ee
a La Sc re a Te Reet
pee Sar en eee
SCROLL Cte wren
ere Cee cate eee
SSS eee
ST Ocoee eT USMS om eee ats
oR PS lo protect sensitive data from
ST Seek eee eee
SO Eon Ia at ee ae ae tras
tng the database back online as quickly as possible, This means streamlined
eeovery procedures and resou:
CO irrrernn ten
res Oey
Bie omer service and business operations, The plan should aim to minimize disruptions
solmaintain agreed-upon service levels for critical applications, « Re
Coase pe
LU ae ae aS
CLL eC Rien eee
‘soviated with dat
a loss and service disruptions.
ney & Resilience: + Streamline Recov
Salo S Unt See
casa)
Donny
nsibilities for recovery actions, ensurin;
smooth and efficient
LSS CSN ue ea ea a etn nee eg
DECENT ROR na
“elveness and identify potential bottlenec
TCR OSS ECTTe Tocoae W
Sa oem
cee
“Stected events and maintaining operational stability
[ i i TRS CMB CUM str
cea oT NRC Core ee CCST CInmSeT Nee
en POT Re Smee MeO Mm ERS IU Recut ett
el aefance with these standards, « p,
amplinee with : CET eae
Deen
Se Ee
Perc Leer ee
ey eemec ie
Pec
Pee
Pee
CE enna
ORC nary
fae Le
4 Coe ce
ccs eet ea ea cca Ty
goonstesretability and commitment data seo se Sa ea
ee ce a ee imi RNa
e 4 *S and a more resilient IT infrastructure can
aii oe ee See ee
ee LLU oe eee
Seen tae
CTOs
tinued operations and accelerat
ee ee on Cen ena
pata Backup Strategy: Defines the methe
Mice mere ty
locations for backups
Pees nee
full backup stored offsite
Dea oon
Py ie Tee ei Pas.
Lo) SE LS a ee Sra
Poetic
Recovery Procedures: Detailed SCC
Set
a
Seca
Example: A step-by-step guide for restoring a SQL Server dat
Sy
Sia ee
TE So Meer oce eet
Eker etree ee ae
ieee cue SI eee
e the recovery plan works as expected.
of the disaster recovery plan to ensure all systems and
Sener eae
euler!
Berit
ined roles for everyone involved in the recov
Cite ete e oe
Peace
cree
EU URtea
Y Coordinator to oversee the entire process, with
ators and IT support handlin
Cini
MCC ees cette ate
SCC Orie
To cme eC SCONCE ett
re
hal ee ae
aa
SEO CRT
ce Page 36 of 4
eel OT eee eeDUS en ee
Pee Cun ccm ONY
reece
aS uae eee
t uring the recovery process, such as server
rs k reconfiguration, and troub ahaa
eer cece een
Pre 8
scovery Coordinator: Responsible
rea & i SRS et ee
Ge Se eer eee
(| SS Selnetdibepelt cece renee tater en
ee ene
Pec eee TEENA Otten eer
ee eee enone
fraluate different types of backup media
Peon
Par eee ety
age medium. They are known for
Peg nia
Se ee ee
term storage. However, th
Peer ne Re tet
ternal Hard Drives: External hard dri
Teen Or
SO a RON Rumen ere eee
estas
nas
STOR es
Silid State Drives (SSDs): SSDs SSC CRS a See i eee
ST ca)
SO rea)
rae
‘Network Attached Storage (NAS): NAS devi
eet eet
Macteied overa network, They offer centralized storage for multiple devices and can be i
forbackups and file shari
SATIN Cette
loud storage services store data on
SSS Sone ty
SORTS
essibility from anywhere,
STO eS eee
Sena eee
Se een nS
STS
S: Optical dises like CDs, DVDs, and Blu
ROE aCe ey
Sere
cers
Ca teenie
Daren)
aso eae
eee