Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
26 views49 pages

Database Full Notes

The document outlines the key concepts and features of Business Information Systems (BIS), emphasizing data management, integration, automation, security, and compliance. It details the roles of various database users, including Database Administrators and end-users, and discusses the ethical and legal implications of information systems. Additionally, it covers the importance of intellectual property protection and the customization and accessibility of database management systems.

Uploaded by

mafaneleginay2k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
26 views49 pages

Database Full Notes

The document outlines the key concepts and features of Business Information Systems (BIS), emphasizing data management, integration, automation, security, and compliance. It details the roles of various database users, including Database Administrators and end-users, and discusses the ethical and legal implications of information systems. Additionally, it covers the importance of intellectual property protection and the customization and accessibility of database management systems.

Uploaded by

mafaneleginay2k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 49
Ny Ogee code: 317/22/M03 Nicosia iit DATABASE CONCEPTS 0 DESCRIBE BUSINESS INFORMATION sysTEMS Per ene oOo OUS cS Fone ONTOS (oS) RSE Me ce corm ear components that work together t0 collect, store, process, and disseminate information to support decision-makin: pusiness processes, and overall business operations Features of business information systems |, Data Management: One of the primary functions of a BIS is to efficiently manage and store jarge volumes of data generated by the organization. This includes collecting, organizing, sioring, and retrieving data from various sources such as databases, spreadsheets, and external systems, Data management ensures that accurate and relevant information is available for Pues eu ONO LSna Dee Onsen CEN RIeee eS) een Cone ome Uny Reese Cae! Fi COC Ore ceoee ean SECM eee ec MCR ca Fil ins CAV Coleen Re Ca SSS nice meu RG decisions, identify opportunities for improvement, and monitor key performance indicators ate with other 3 Integration and Automation: Business informa PS Cues orm Byslemeland applications within the organization to streamline workflows, eliminate manual Teskyand improve efficiency. Integration capabilities enable data shari PoC UU Aion ete eee CCA aaa 4 Security and Compliance: Security is @ er itical feature of a BIS to protect sensitive business “in tin ana RISERS CaN SASS uaa al aaa MORMON 11s US Eee Sas Ee «0 20 COREE SA ea aa PN TSF COE Ney (ee IT Pe Roecy TST NTE RSC ES eral boration Peri et Rea sa PC eee Peer ererstens fant messaging, video conferencing Pounce eto n eStore ee and shared workspaces. Collaboration features RO ae Sones es eet Deca nee: Rieu ec oe ote ee ene neko > Data Collection and Stor GIA Uiesae Soon emo ernest e ee ree eS ces (@g, Sales databases, inventory records), external sources (e.g., market research, competitor data), and user input (e.g., customer feedback). Soe Onese tora Dae Teen Me ace eee MT Ti Foran ue ea eee Te ais stored in databa Siroretst: Ieee nieces and retrieval. Saturna PAN + Data Transformation: The system processes raw data to make it meaningful and relevant f0 users. This can include cleaning, form EUR rures rege tcd * Data Analysis: BIS tools enable users to analyze data, identify trends, insights, which can s ae Con ren ans EVE AC as eect Scans PI Rete nee Ete a Eraphs, dashboards) to present data in a clear and understandable manner > Communication and Information Sharing Information Distribution: The system delivers processed information to users through Watiotis channels, such as reports, dashboards, emails, and mobile apps. *Collaboration Tools: BIS may incorpora ST stereo eer Tener Reema to PIONS neler Drees ments, messaging platforms, and video conferencing Control: The system can restrict access to sensitive data ba: Soe Westen 2 Una aelcecy Ueno OSS iTesme: irae Ue aM eS rue NET CO emcee TENCAC SET Maceo Aiea Tea eee i DET LN aX eyes ie) Sr Oe OE Na eee eee Te Si ee SE sinegration with Other Systems: A BIS can integrate with of! iy the business, such as CRM ficiency and productivity ocean Canton Ree es Cnet Colones Sen eon aS Us Veco intey teckel on earentes Accessibility: The BIS should be desi ed to be user-friendly and accessible to all eso Riciree ne ees Suni AEC LUNGS ene eee find and access the information nomen * Customization: The system may offer customization options to tailor the user Bean Ieee eee > Seourity and Reliability + Data Protection: The system should protect sensitive data from unauthorize Use, oF disclosure. This includes measures such as encryption, access control, and data few * System Reliability: The BIS should be reliable and available when needed. This Fe tino eS ECR a ee See ose eT ee rien > System Maintenance and Updates OUST Blea ooe Se eRe RUT ecaeL emCoeTECont Tens NOHO Ce aT eee NiTe EER end alability: The system should be able to handle increasing data yolumes and user Cnr ae seers tenet TSRTSCS SS SMUT TURTCaNY ra lon-Making: Provides relevant information for informed and dat Een Ceoscony > Biisiness Process Improvement: Streamlines and automates business processes, Aes STs Hieae eae RS Hee NCS acct oiaa Cree nae TION SC UCR Mn prercomst Conte Felationships through data analysis and in ts, SDT ot Yozeeeae Scie y iit iv vi viii Gpaneial Management: Tracks and manages fi eee Ks and manages financial data, enabling better financial planning and reporting (Operations Management: Monitors and controls key business operations, such as jpventory. production, and distribution Oat} TL CCAS OS ESCORTS NSS EET Te eee eee et on Aron Sos caaessa PS TOI RENCE ona tt Tee Management Information Systems (MIS); Provide summarized reports and dashboards fo managers, enabling them to monitor performance and m Eee esceas PES NCR ST SoReSEoUEKID SSE Chair ON Cees oe USE WRLC Rreseeeonunneny OER EUAN ee Te eT ecutive Information Systems (EIS): Provide top executives with h aval Summaries and insights into business performance, en: POI Cm ort CeaNtony ier CCS) SO CCM eT ICE recommendations, often in specialize Office Automation S; ms (OAS) + Focus: St mlining daily tasks and workflows Roun eiCerteca ieee eg ON se OS Se ee ea Microsoft Word or Gos a Peete cmeS acca Programs like Excel or Google Sheets for calculations, data a Neer acene SOs ee) s like PowerPoint or Google Slides for creating visual presentations. * Email and Communication: Systems like Outlook or Gmail for email, Ea ecolean Ciera IVSSO en eoReretiea Wire jon. * Database Manag Cae Neem Coc data. RS Cn IS NOMS TaN Dr enc Rinne race nome ToD Peet ee Soe een MO Tne performance. - Key Components: * Data Collection: Gathering data from various Eo NHS eos mae Dee preeeMECUNORe NCO LAL regation, Uomo lysis, and reporting, * Reportin Creat Seid andidashboards that present key performance indicators (KPIs) and trends Leta aS ee gS ye OO Nem aectems nse tee sue Toa ocd Business processes across an entire org ATCT COC ee aa CT (eT eT Eee ea Peer Se Oe OS nc oa te eee eee SC a Tn Sou a Feo Goren Peontent SCM SLU Tam a Cru en KGS LZ ce jata in a single, integ system. * Workflow Automation SOU SUM ne iiss een snes a Pec eno Data Testes eaten aT Te oouel Pe oe Se See cco Se eee computers, servers, and network foie Ry eau eset sa Teetenee ete Ered People: The individuals who use and manage the system Procedures: The processes and workflows used to collect, pro BOOT NUT nore) 1.3 Bthical and legal implications of inforn ion systems sm ethics Information sy Mons SSC MMOS M Rae Rn eee ie eet tT ino) TRS eM ete SOS eMC ae software, databases, networks, and the information they pros Importance of Information System Ethies Party Individuals: Ensuring individuals’ privacy and safety in the digital age. > Promoting Trust: Building trust in information syste ¢ institutions that use Ten A Sogn COO O eR eres eS eee ne eee NCO ® Fostering Social Responsibility: Encouraging the use of technology for the benefit of Rose Intellectual property protection retary Mare aa e ed ats Si Cannas arash Phrase, word, or symbol that denotes a specific product and legally differentiates it from all others of its kind, Fee Meee CORT an > Itis legally or PEON eee Rete rae eons Se teren ROC CNA Cee ee Tester Ronen urea Pea a eon Ce Te ee ene ROSAS Lec re eee eRe ites nee Seen Soe Sante Wekancuenec OM Reet ety Sree HA CO SCT ene SS EPS eane tT NOt ROC eee nee } Eg Mercedes Benz, Toyota, Chicken Inn, Surrey Copyright ede STO eee meme works of authorship, including literary, dramatic, musical, and certain other intellectual works. It protects the i CRON SOR et enone Pe ee seen eae nen ee eee eee Nr OC Meee nee eome cree ene eet } Inother words, copyright is the right to copy Only the creator of the work can authorize anyone to reproduce the work cpa cee eer >) Oa Tse og ese MOOR me role } Fixation: The work must be in a tangible form, like @ written manuscript, recording, or Caren Ca rio ea SES Siena tne ene eee EO cs eee un ns: Be one ee eae > ASTI SESOL oa ec eee et eee product, industrial commodity or handier: etic a aR Stir Rees n tights protect the visual appearanc TE ee ene SCO eeO MCT Nee Teco eres 0 ESTABLISH DATABASE USER REQUIREMENTS Ps coleman Pups wale Saeco OCC Rat ETN Create Tirean ery data. database users can acce STC RU TEM USM elec ULC Le Management System (DBMS) applications and interfaces Dyer euler poe eee (etetts rized based on their interaction with the database. There are Seven types of database users in DBMS. below mentioned are the types of database users: 1, Database Administrator (DBA) © ADatabase Administra DBA) is a person/team who defines the schema and also Controls the 3 levels of the database ~ The DBA will then cre: aan Renae Cenne em SCE to access the database. o DBA is also responsible for providing security to the database and he allows only ETT 4a Ue Cece OER e DBA is responsible for problems such as security breaches and poor system response time. 5 10):) RoR nee ea me Meee SUM UC Neat encco mie oo bo Te DEIN SPUD AU econ RICE SOIC Ameren eS Cuma Una Eucornt eter y caused due to hardware and/or softwai DBA repairs dama cr eee ae Poco? > (iS SNe en ene ecco as COE CaaS een ars)in exchange for a comprehensive eee } Government agencies typically handle and appre Pale nae cnS SS Cnay DS ae me Reena ren eC PSUS rR eee ono TCO ko ce oN v ETS a eee TCM TET compositions of matter, and improvements to existing inventions. pont) RCN LL so Me me OO Commercially pe Ver CN OUEST CE NON ao uCE Nn ens Th UREN ae SENS COMET ere MTree Weep reotO ne ae Ne Mseoniee eens cc Tetsu Ne ROR Ss ae eC eon a cece mC Nana nerally not known COC M en eum CET meen sree Pees eae meee Een cree en eR RCO eee RO Loe ee sera eae see and development > Trade secrets protect confidential information tha ives a business a competitive Echa } Thiscan include formulas, processes, customer lists, marketing strategi } Trade secrets may differ across jurisdictions but have thre Ronettes public, offerir SUS TSH UC Choa asc! Industrial design rights Poe unninnset es n right is an int Secsen eh design of objects that are purely utilitarian. oe Mnnernststa ONO ec CLC Me omc €omposition of pattem or color, or combination of pattern and color in three dimensional form containing aesthetic value. be eT eer feu) oF SOT Sto perform DCL (Data (eu eu eke art NAO CORTON sua! (Ooi nuerenes oie So CS snes Se CLP CE Metre e (once CUS etc Teeny nulti-user business environments, They are knowled ble of he organization’s IT infrastructure, business policies, and database design guidelines. DS SASS Yon aOR ENERO eS aR eM Es eee a oth operation of databases, they man Crate Seeing > Cine aes conn NCS ae Cee u eesti mente un! SHOT CRON eR ae ese te eae UC nee Onsen Eee Re eee eon Ly Gomueicn ny these responsibilities may diffe Dye terse or ero ERGO LOCOS Ree Ieee Or CME NE TES UN TIS Dil they frequently use the database applications in their daily life to get the desired Tet ee meget MCT ASUS cao ara v Glerks in any bank is a naive user because they don’t have any DBMS knowledge but they still use the database and perform their given task } Other employees who indirectly connect to da Doeegtice Se eens onsidered end-users. These users input and maintain data. Business users Tarceva Oke et cenit eminent econ They provide business requirements for da se designers, analysts, and programmers eee een le neiece yale teneet Ue ORS TS co NS cnr hts © Asystem Analyst is a user who analyzes the requirements of parametric end users. tt They check whether all the requirements of end users are satisf CaS MCE OCU ne eran ican Reo acu soc bbisiness data in databases. Screens and forms in these applications allow end-users to view, ent Se OCR ees er cnn eRe us um au Tanguages such as C#, Java, Python, and web development stacks. urls eee eet Peer) ne data, they also use proprietary implementations of SQL (Structured ieee «ES Rte ODegCOoE ME De MSODeT CO rca a Aurea gineers, scientists, business analyst, who are familiar histicated users can be eng p their own database applications according to their requirement. eeu 0 ene Reese cCRC SESE aOR Pe roue eas een Teen) he structure of dat > DAEEECSLE Sasteisy stored procedures and constraints which Oe commen TOSS Se een tere kone nuns Bee/she controls what data must be stored and how the data items to be related Secuencia cco © fe eu eoRS SUIT esis Da TEL Ds Ue eee eee CSC uN SECC RR a eae Pe etc DA database designer defines the details ofthe database desig es oe eee me GLN OLE Er ec ee MCER es Cyrene eo Pec CURA SSCL Sao > Application Progr “Fete Ore ee een ne ROR SRL a a a Desens aaa raters 1S eae RCM SCRUM CU a NNT As Developer, C, FORTRAN, COBOL etc. Application programmers design, debug oi one) PIE U IS LRU RG Un LS SR (Parametric) users in order to interact with database, CST Tiree Ren ete meee co) *y CeO ree (Loess _ o HIO SESS Uses oy Sec en ears id Oke Se ee nee eee CRT SUI! pete ero po OS Seccilranlts POS User te SN NCR cs emer era) (fac sues envenuenis IODC ce ees Tens © era Ieee Tp a Ren Conse UeRec eT Ste ese caru! Senses Re einen cena Personne {CAE SOS ME Secs een eS Rese ca aon Joyo AN SRST en NE EE Se COTO mus MFestures: They need tools for querying, reporting, and data visualization to extract insights Fan eee a our Cee NOTE ee en eee eR Se cae Sree meen reports are es Been Eu aN cone tess meme eel Sey Eee geen interactions, and forecast future Se Un eee eee CR Cea NT eSne LOL BCCI CONTAC Oplimize sales strategies. Features like CRM integration, sales forecasting tools, and Bestia arorgeeany En SNCs Un COS Cen eRe ok CORLL Sean MORO TOS Lg DOs Sin eee Tenens ~ Features SOOO RCC TOS Om STONE 3 Slanted Valuations, and compliance information. Features like HRIS integration, self-service portals OT) Oe ee eae Drone Nt ROR ana aoe ee Con lL ar eeneest yin naa s rely on the da Toto ects ae Uy ery SMe eT rs (aS anor an een Ose SU oe (oa Aon ucui sment. Features like barcode scanning, ENC ON USE systems are essential for their day-to-day Ros Boor eas cae Cen _Need: Customer se Se eee ner te cess customer profiles, He. eo ee OE Wenn cea - Features TON eee ean TC meu eeu as om L IL View order history, and resolve inquiries efficiently eres een eae ranagement tools, and customer communication log if Poster ones iho merry] Proc snies 2.2 Hardware Specifications fennel enone Coca eh een eC Coes cm aU {orate el Cece eS Ce eS ECR Rector CLAUS ay (RAM), storage devices (hard drives, solid-state drives), input/output devices (keyboard mouse, Monitor), and peripherals (printers, scanners). Computer hardware is essent Eeatis Operation and functioning of a computer system. Dice ee ROR Secu SIU a ga z/ yy aELD ER cnr Oa store data on spinning disks. They offer large storage capacities at a relatively low cost but are slower than other stor types. = Solid-State Drive (SSD): SSDs use flash memory to store data and provide faster read and Write Speeds compared to HDDs, They are more durable and ei Sian Dror een Cee 5 Toe ae Oce eyes Desert Oe a SOE SEO AUS NC eMC G UNCUT! ster petwork a oo storage (NAS) devices provide ad OOOO ne Dane nitrite Mme Ny HOO OES ee Ce cee eo Dee MM Merrow OS ee NM eget eens Pun Per cua Foch reek Per mua (ors such as the size of the database, the number of concurrent users, the ind the performance expectations. Key hardware requirements for @ database system may include ies efficie eet GPU: A powerful processor is essential for processin > Memory (RAM): Sufficient RAM is needed to store data in memory for quick access and pecs } Gorage: Fast and reliable storage, such as SSDs, is important for storing database files and ensuring quick data retrieval Bronson Sere ee OMCs ii ae eee ReneS database server and ensuri Seen OS } Backup and Recovery: Hardware components for b are crucial for d PROCS CRUSE Se Causeany FS CULFITA OR eae eee SILOM COL MSN oS SG PO GREAT oes STS eT oSO Dens ecrre tng enna Doerr tee eee URS ee US Ttesgep sees 5 cores Renee eo cet UTR S TUuSsL Crone ccs system should do from the perspective of the Creme ie a inte cats Geese tienen Ten einen eC ds Cores Siem ee eon UL an Put te Seat are Oa e eee hee anna MOSUL U LES CU Coie oie ene mone ae Compite led by Nyc sere TTT Bee resuirements are gathered through inter es teeathen ts Pelee nee eestor survey sag eee Oe an eres usenet Penna a basis for designing and developing the software system Se Shs also known as non-functional requirements, define Scone FORO ORG aE no TS pecification EOI an eS Nema con oo eee ea She eee ReR eee ee aac eRe stem shou d perform to meet operational and functional needs i. Security: une aCe Ee ca Le Aico Cen EMSAs on ce Raa = ae AEE RSS LR cea confidentiality ~Enerypt sensitive data in transit and at rest 10 prot “lone cS Ae Ce LLL sit Scripting, and buffer overflows. nee ENUM REECE ACSC cae aa POAT Itsy oT pled by Nyoni 9 0773097216 Decor es es enchmarks for processing transactions, generating reports, and handling Pe ncaa! Cee eee eee MOON NCS Pec ia | yo uie Ee MUN MCSA OM UC nos os OES a acs Pena Pin Reet a eC One Oem [pene the maximum number of re oftime. (OCR eeRee aRenccn ne caS e Sa oe cis 2) oe OSes Mrplement Toad balancing mechanisms to distribute incoming requests evenly across Areas Mmfer throushput metrics to ensure that the system can handle increasing workloads Rion) Onreneste cere Pte os ean Fire Oa oe ace Mies oC I SCL Secu —ostie CH AGREES eon eee occ ce ERO egilafory requirements. = nj ort Ce SR Ree NR eet es ONE EU a wu Sree Ren orin auc mento) = Monitor disk usa Eoin PN cr cream Seon eet A eee DEiiterecarel) Ree eee custo 99:5 Ge Ree ee eee Sa LTD eanyy ieeee) er = i Ree cas Bee teat aa nd optimize Pete nearer requir i eccrine ce Pe ecm ri sie! en Peg cise fee PO Cee SMR eT Pe eon! egret ieneeeecl Ceo een ee Cee ence te f ere Nea eet i Tay coon i Pee Sey t . Acceptance criteria: What a NERC Peron as 3.0 CONFIGURE DATABASE ENVIRONMENT SSB US Ie non Nore NERO Pa CU ea OTST eater eet ae eo e On ones roa a a a eaeeey Peers Some may be involved in designing t E PTOI DEM TaN TT coe CEC Cees Cee a [SRN Te ery also be there t SEU eee CS no} WTS on res eee Pees rnrece Rut aes : 4 eee LOTR er eon acT oo 2 EE eMac ee este ae ms titte ts latabase administrator. eid reno ST RORRUCM na eee ee Pees teehee DBMS. SECC Couns eM LMM gE oa > Standards and procedures ensure the consistency and effectiveness of the database Caio eee oe ON NEC MTT ene o TRO C Tae rae i r= Siri Repetto MET ntaining your DBMS will be difficult in the absence of Ree cent nyse The following are some examples of DBMS procedures and standards. i Database Naming Conventions Ti ino e- RTO e nO ORE Le oe Sco RrS ATS) aN fi Data Administration Standards i e standards define how data is created, captured, and maintained in your organization BUTTS ney ROU Cine were Roce ROR) De Gete t eeenon a OTSy CE eee Peter} aoe ECan tet no Sooner ee eee h ROL is These ares people, hardware, software, data, and proced ena > inoftides the actual computer itself and any sort of networking components needed. pO arco RS ree ee eee ee ee devices, processors, input and output devices, printers, network devices and many at ee nce eccrine te eee ence es SIRE ca SC Nee RTC nee system PSEC Eee ene ter et Raine » The software component of the database environment includes all the software that we eo Cee So eRe eee ee ee ee ar eT any sort of programs needed to build and administer the database a Sincere Seat eeu eee eres Pee ic Co pee se UO Ue Re ec UR ete TN UN TCC Romans PaO erie Cum CO CR Rem MRO Cais CnC A tabase and if required you ean even STMT Ete ace oN! application pro: Io sue ont one te ae Cremorne > Hardware provides the infrastructure for storing and accessin Secret Sacre cree teonartnes People/Users TITS te ents eon Sates ee ea POI Caen a ORR uSn enon cats ES Soa ORSON ST > There may be a group of people who will access PS Non eo vCM ULE CRON ATe CL ere) queries i.e. end-use Cite la arom Vea eos ois ae) PY eteet Pee) Pee euee tte ree tae Database Administration Standards Peer ore ene ostoner era Recet se Baeeee neti Par Daas Eee ese oni Pee ecco che ent aneete e iroould be asimple RACI chart or a detailed matrix. The goal is to clarify who handles data Possess Ea ern Nee ESS Sea Ceo nes These guidelines explain how to manage database s nization because of security standards Peet Sani Pease Cece Deere scone once neLU Cy fee DS en tT Cree en ee eee oon ety connecting to external applications and dat Preeuieetirgcn rome > Procedures define how users interact with the database system, including data entry See OR eM TCT Pros uEO eee nse nea eer eeeece rsa tasks, They ensure consistency, accuracy, and security of data within the database environment. Data > facts or items of information about an object. This structured information has the potential to be transformed into something useful birthday, contact details, aon een Oconee aU Position, hired date, and reporting manager. By looking at this data, you can determine OSE Ne er Nemo ST aa eee ea Peni |: (ee eee eee ee Ts eS CeCe et ete Ce ae trieve, update, and analyze information stored pes Prous > Database models are conceptual representations of how data is organized and structured ees Cones tse er eC eee rear: Poona famework for storing, retrieving, and managing data efficiently > Different database models offer various ways to organize and access data, each with its own strengths and limitations peer eC UESOYO eee MOS nec nee eee eee eT with parent-child relationships. Each parent record can have multiple child records, but each child record has only one paren Pr eas me Mee OM OMe ee resent pod for data with a fixed and predictable structure to-many relationships. Mtn eee ea) > = Disadvantages: Lack of flexibility in querying Tee pA eaten aaa er oenTos amie data relationships Peony 2, Network Dat TS MRCS Sniromercwon Pensa hee EMC ener sructure than hierarchical, with records connected through multiple paths. Records can Reece UNaeeeS Tea oie nen oem aE = Advantages: More flexible than hierarchical model, supports complex relationships, allows for efficient retrieval of interconnected data, erent ect net monroe eee Se ete Reon aoe enone Rate meni RR Cire eranesc EC rico ELC PPAR NEC Ren CONSE A ae are ue No ene entity and relationships are established throt Columns, where each table represents en ogee esy Page 20 (oe De oea Pe ee CuO Con Ce ae en eee integrity Rn sete eet cen eter ea te ee aS aren stegrity constraints, widely adopted and supported in various database Poeun ecu datasets, normalization can lead vantages: Performance may degrade with larg aes Peele eg eu ace Mitre nike eS Rete cones Roncned Peery eee ee ented database model, data is represented as objects with Ree ee anus atributes and methods, similar to object-oriented programming concepts. Objects can inherit properties from other objects and relationships are established through object eee ocean nC LCS ae encapsulation and inheritance, better suited for managing complex data types and ees nand implement, lack of standardization compared ete eom Ca to relational databases, may require specialized skills and tools PCr eee OnE Sore Reema 1. Simplicity and Flexibility: One of the main advantages of the relational database model is its simplicity and flexibility. In a relational database, data is organized into it easy to understand and query. The relatio tables with rows and columns, making model allows for complex relationships between data entities to be represented using simple constructs such as primary and foreign keys. This simplicity and flexibility make Conran) it easier to design, implement, and modify the database structure hierarchical or network models. De ew Cease RecN terta eee CEU ec Fea Sc S EeTAe Oo Coe One Constraints, and check constraints. These constraints help maintain data consistency by ae TOT RES) ensuring that only valid data is stored in the datal Benne ST OMe eco nr MS MTEC mce T anomalies, leading to better data quality and integrity Compiled by Nyoni 0 0773097216 page21 of 48 Tne een cr GL) as a standard language for querying and manipulating datm SQL provides a CORO intr rn imple queries. ‘The relational model allows for complex quertes Invelving mulliple ce Ea Reh ere eee nner Uae Reet SOR et ee LOMO een eer nT eXen ne en SNCS ener eee OR eee Te nearer! > Database testing is a erucial aspect of software development that focuses on verifying Cae nc ee tht Ee ee > Testing is a crucial aspect of software development that ensures the quality, reliability Pee eee OMe tt eee a ee Re a cm Re men en erence Pee mC ome oe POLO CCG TTT oe Loom Neo er eee ORCC Te eC Ton RCT ne information received and stored in the database is valid or not dh NRC Me ae RON Me Re een tte Page 22 of a Pen oe re & ‘ ( Pues involves testing individual components or units of code in isolation to ensure they function correctly, It helps identify bugs at an early stage and facilitates Rees 2. Integration T AL SOULS on a eee ee ene ea cor components of the system. It ensures that integrated units work together seamlessly and that Peet skese ance ey en System testing evaluates the entire system as a whole to validate that it meets the specified requirements and performs as intended. It tests the system's functionality, performance, security, and reliability CS eM Nn een sors it meets their needs and expectations. Users perform real-world scenarios to validate the systems usability and functionality Peery ay the software is released to external users. It focuses on identifying defects and improving the onducted by internal testers within the organization before Perrree oes Ro ee rN 2, Beta Testing: Beta testing involves releasing the software to a limited group of external users to gather feedback and identify issues before the official release. It helps validate the software in a real-world environment, 3. Stress Testing: Stress testing evaluates the system's performance under extreme conditions, such as high loads or resource constraints. It assesses how the system handles stress and identifies potential bottlenecks. the system's functionality without 4. Black Box Testing: Black box testing focuses on testin knowledge of its internal structure or code. Testers evaluate inputs and outputs to ensure the SCO eet 5. Glass Box Testing: Glass box testing, also known as white box testing, involves testing the ., code, and logic of the software. Testers examine the system's internal muta Ree Oren g SERS a een a Peer Peery ia and Test Cases Peers se RUS So ease enc tee Lae Paes Tet one Oke mased on requirements, user stories, and use cases to) > Test cases should be designed bi SOS CL CLA at eae nee eee ee SO STOO ana RO ae acu Rca Nt Pee Reno simultaneously for a period to ensure a smooth transition. It allows users to compare results cou Pee a eer 2. Direct Conversion: Direct conversion involves switching from the old system to the new system abruptly. It is a quick but risky approach that requires thorough testing and preparation Pea ene Dee Ree eNO ee ee Su a 3. Phased Conversio or modules over time. It reduces risks by allowing gradual adoption and testing of each Roast Rear eau M acy 4, Pilot Conversion: Pilot conversion involves implement or department before rolling it out across the organization, It allows for testing in a controlled Sree seer esac Justifying User Tr eee en oe) boca ee Uno Ere Een ert ACM OM RSTn eo Tee > Training helps users un Mee eee SnD Pn ee eT Se ee Sc UMLcceme ee alities, enabling them to perfo eum o nme me ee ts m tasks effici functio ae areca eee ee ues une eee} et eee ead PLU CCT D 4,1 Organise and prepare data for inclusion in the database Methods of Data Collection 1, Surveys: Surveys involve collecting data from a sample of respondents through structured questionnaires or interviews. Surveys can be condueted in person, over the phone, through Pe ae 2, Interviews: Interviews involve collecting data through face-to-face or virtual conversations with individuals or groups. Interviews can be structured, semi-structured, or unstructured, depending on the research objectives. 3. Observations: Observations involve collecting data by watching and recording behaviors, interactions, or events in a natural or controlled setting. Observations can be participant or non- participant, depending on the researcher's involvement, data by manipulating variables and observing xperiments: Experiments involve colle the effects on outcomes. Experiments are conducted in controlled settings to establish causal relationships between variables. SSO er ee ee ee ee oes ory Ome ce Come CT eT Eee cer ee a ae perceptions on specific topics. Coe Ce ee OR ete Ce Rama eT sourees, such as reports, articles, records, and archives. Document analysis helps researchers gather historical or secondary data. OCA e ECC Meet Cny Data verification involves checking the accuracy and consistency of Teer iret COS Ree eae ere em Creo SOO eae ett cross-teferencing with extemal sources, and data comparison. 2. Data Validation: Data validation involves checking the completeness, correctness, and Con ee Ce re concen CIC me ene include range checks, format checks, consistency checks, and logic checks, SL a Leaeeeaea Cd Leer FOS a eee pDL (Data Definition Language) or Data Defini D eer Pana € actually consists of the SQL commands that can be used to define the database schema. It simply deals with descriptions of the CO UC kOe CLS a ere ee ey ese eT Preece uo ae ae ae Re eee ete ee but not data. These commands are normally not used by a general user, who should eee eee Smt ee ae Peta Rect Here are all the main DDL (Data Definition Language) commands along with their syntax: OT Dye rt Syntax Som ema CoO UUORESTE Peay Cece? COM Ny OT Cire OSC Cems ee ree ee Un) DS ems ccm em PO) DROP TABLE table_name; Cre a PN Me LUO OR UPD AVOuci Creed COLUMN column_name data_type; Fen rerae cse cu? ble, including all spaces i TRUNCATE pe i TRUNCATE TABLE table_name; Pen Cm Sc Pn maT Races Pee eee) Derry 5 fe.) ck cat Syntax ‘Add comments to the data COMMENT ‘comment text’ ON tay TABLE table_name; Rename an object existing RENAME TABLE old_table_name TUR KOR me omy DOTY To on Language) > The SQL commands that deal with the manipulation of data present in the database belong to DML or Data Manipulation Language and this includes most of the SQL Serer > It is the component of the SQL statement that controls access to data and to the Ceo ee Ee hee e See a RUNS rm NV RC Here are all the main DML (Data Manipulation Language) commands along with their Bae oor ma ETE Sachs Insert data into a INSERT INTO table_name (column!, column2, rr BNO TORR oon 9 Se DOU ry a ee Cee ean Le a Compiled by Nyoni D 0773097216 re Command Description Sree’ conn hee ees DELETE FROM table_name WHERE condition; Pelt ir aT LOCK ae LOCK TABLE table_name IN lock_mode; cect moe. Ne) ary CALL CALL procedure_name(arguments): EXPLAIN Describe the access. EXPLAINPLANFOR SELECT * FROM Day) Rey Cees DCL (Data Control La ro} > DCL includes commands such as GRANT and REVOKE which mainly deal with th TSS UCR geo uo Rn en eS ee oy List of DCL commands: One ae Re enn TT Deed rd See tery eo : CN eer eee ee Ts pe (column_list)]_ ON [object type] Coen SO era a aU Ome mT GRANT OPTION}; Pet ad Firetras PYaeeies Poertagy command eT ty ee. ETN Pere OMe eve lay ST aT eee en privilege type [(column. REVOKE Peon ee Oe Seer Prego CC oS TY CECE coer TEES tere Pee CR ence CoE ATS 9 aD Sees PEO ee TALI VNR ea? Somme a ee MELO DDL Commands for Table Creation: erat y oe Tamora CO ny Cea SUTTER ETN De EIS COT ec ALTER TABLE table_name ADD column_name datatyp SE ae Dee tty Syntax Ree PT REVOKE [GRANT OPTION FOR} Oma eee 5 privilege type [(colu is re) PCLT panda sce a WETS bject_ type] object_name FROM eee eared BS oom user [CASCADE]; Cece eee Le, ree MCE ok eget Oyo OP YUN Rem Renee en Pe en Sa Coe CD LD database_name SET new options, ere w Ea Keone Oa ELDERS (oor ow ee en Taya CO ea Do enna i eT eta EO So Tay eee Laer eatezzsCd CoCo) ae AOC ee ce Coe Oe ToC oe Pree Recon rary com Le oe oa NCO RUE Oe Sera oR eS eC Reed oe erin ean Free MUNS oR CeIU a MEN ec GRANT privilege type ON object name TO username Pon ancy Nemec nC Ce ame BO one ave oe Ome Nee re mC aCe em ea eros Dy ® DDL is an abbreviation for Data Definition Language Seen Ree Ce Ce CUM EUCLA SCC eee aR een ae CeO ec immediately made to the database and cannot be rolled back These commands enable database administrators and developers to manag ey Ona Se RR secon om P LT aera cee enter nr rts Deena eT eee es NC STU ane TRSte eee et Lo ee Oe One eee eR UN CRUE RU SOR eee eerie Tt performance. Creates a view, a virtual table based on one or more existing tables. aN PROCEDURE Creates a stored procedure, a precompiled SQL statement that can be run multiple times with different parameters, (REATEFUNCTION Creates a custom user-defined function that can be utilized in SQL eee (REATE TRIGGER Creates a trigger, a type of stored procedure that is automatically executed See Sem a eRe Ck mS friars si > DML stands for Data Manipulation La ee UO) el Pre irene the ess eon Poon ECT, INSERT, UPDATE, DELETE, ete DN Rene eRe RCT CM URW CRU Peay necessary. By mastering these DML. commands, you can efficiently mani MySQL databases. Srey Retrieves data from a table INSERT ee eos wid Updates existing data in a table. goo eee csc cae o ee Ceo Nr eae Aes ‘ er red ees cos co Pree wl Loge ae DS Se Se on ope Ni : Roe nnn et fede 4 @ table to prevent other users from modifying it while a transaction Deed ra Scere nen It includes commands such as GRANT and is primarily concerned with ight, permission and other controls of the database system. DOL statements are also auto-committed. Pat SO Sune ct tea ss ra > TCL stands for Transaction Control Language. It dea SECC Cree aes tent COMMIT Ne eee en nay ROLLBACK Rolls back a transaction, undoing all the STS.O Ni Creates a savepoint within a transaction so that the transaction can be rolled back to that point iffnecessary SETTRANSACTION Specifies the characteristics of a transaction, such as its isolation level. De > Database security refers to the protection of a database from unauthorized access, data CO een Re eat een eRe SS LS Availability of the data stored within i UST eee 4) Unauthorized access: When individuals or entities gain access to a database without Proper authorization. Saree Cees Attackers can inject malicious SQL code into input fields to manipulate ca eee TnL Lezereacted asa | pat Se SO ERR tec Pen One fu Pea “an infect a database system and cause damage. SRE SSeS eR ees Pee Rom Cen et Penn Une nnT ETE Fe Seater cue a rere SCS ROR ear re CO UOn eT ee f ci RU CO crs ee ecai ue eee : : Re ; he data Ste eet enemas eee etree ical device and infrastructure that stores, Pcs Pe ao cae Sa pment room Sta isd Se eRe oe ee cs i r ntication or eee econ i OE Seo cone Eee eee ee eee CORE aUra a COE See ery network control cae Lorie ESCO mine ET b, Teac Cet Ran acne Seen eee CRC On een ny Seana * Monitoring user behaviour and detectin; malies that could indicate a security threat cae ranre SUC nan nee Srna ce deel Ivene 7 Cerny i Tees Tene cS Ce POU eas Te Policies and guidelines BC LENCO rae Natt Pouca eee Paco } Database recovery is the process Seat rr Cece) failure or data loss even PUL ioc San en er COCO mts downtime and protecting va oe Paces OL eae ta TSO eM eae Geert etry deletion, corrupted files, or malic SOREL ess Cee eee Business Assets: Data RSS an ianeial records, intellectua are all essential for business CS eS eT e e: Data often SIS eae Seen Rent ned nce and competitive ed SLUR cece eee eae nize Downtime: Database eae eet SE CO TS ane SUS SUSY nr eae vity and Ona Mainizin Customer Trust: Downtime can d SEU aa Cat ‘nonsfates reliability and fosters trust in the SMe SCO oe eee ene ee Recovery helps WS ea eee ne or abling rapid restora Sea Seen enea curacy and Reliability + Restore Dat Mssseney: Data corruption or inconsistencies can lead to incorrect business decisions and net tT ame Se EURO COS and reliable state. * Mee ial ue eee LL ean egulations, Recovery CS a : i mR Tay SS tee eros ‘ peacoat er te CORO LCS ae ea ‘nta loss and protecting sensitive information ALL ne _ "the Curve + Increased Confidence: Hi OY ea ee Sess EO es and partners, pac rosin an protected and operations aes an n focus on innovation and growth, know ee Caled eae an to consistent and accurate CT ee ee antages and faster growth, Pe ceca Se ee ee Een La ee pee ee ee a La Sc re a Te Reet pee Sar en eee SCROLL Cte wren ere Cee cate eee SSS eee ST Ocoee eT USMS om eee ats oR PS lo protect sensitive data from ST Seek eee eee SO Eon Ia at ee ae ae tras tng the database back online as quickly as possible, This means streamlined eeovery procedures and resou: CO irrrernn ten res Oey Bie omer service and business operations, The plan should aim to minimize disruptions solmaintain agreed-upon service levels for critical applications, « Re Coase pe LU ae ae aS CLL eC Rien eee ‘soviated with dat a loss and service disruptions. ney & Resilience: + Streamline Recov Salo S Unt See casa) Donny nsibilities for recovery actions, ensurin; smooth and efficient LSS CSN ue ea ea a etn nee eg DECENT ROR na “elveness and identify potential bottlenec TCR OSS ECTTe Tocoae W Sa oem cee “Stected events and maintaining operational stability [ i i TRS CMB CUM str cea oT NRC Core ee CCST CInmSeT Nee en POT Re Smee MeO Mm ERS IU Recut ett el ae fance with these standards, « p, amplinee with : CET eae Deen Se Ee Perc Leer ee ey eemec ie Pec Pee Pee CE enna ORC nary fae Le 4 Coe ce ccs eet ea ea cca Ty goonstesretability and commitment data seo se Sa ea ee ce a ee imi RNa e 4 *S and a more resilient IT infrastructure can aii oe ee See ee ee LLU oe eee Seen tae CTOs tinued operations and accelerat ee ee on Cen ena pata Backup Strategy: Defines the methe Mice mere ty locations for backups Pees nee full backup stored offsite Dea oon Py ie Tee ei Pas. Lo) SE LS a ee Sra Poetic Recovery Procedures: Detailed SCC Set a Seca Example: A step-by-step guide for restoring a SQL Server dat Sy Sia ee TE So Meer oce eet Eker etree ee ae ieee cue SI eee e the recovery plan works as expected. of the disaster recovery plan to ensure all systems and Sener eae euler! Berit ined roles for everyone involved in the recov Cite ete e oe Peace cree EU URtea Y Coordinator to oversee the entire process, with ators and IT support handlin Cini MCC ees cette ate SCC Orie To cme eC SCONCE ett re hal ee ae aa SEO CRT ce Page 36 of 4 eel OT eee ee DUS en ee Pee Cun ccm ONY reece aS uae eee t uring the recovery process, such as server rs k reconfiguration, and troub ahaa eer cece een Pre 8 scovery Coordinator: Responsible rea & i SRS et ee Ge Se eer eee (| SS Selnetdibepelt cece renee tater en ee ene Pec eee TEENA Otten eer ee eee enone fraluate different types of backup media Peon Par eee ety age medium. They are known for Peg nia Se ee ee term storage. However, th Peer ne Re tet ternal Hard Drives: External hard dri Teen Or SO a RON Rumen ere eee estas nas STOR es Silid State Drives (SSDs): SSDs SSC CRS a See i eee ST ca) SO rea) rae ‘Network Attached Storage (NAS): NAS devi eet eet Macteied overa network, They offer centralized storage for multiple devices and can be i forbackups and file shari SATIN Cette loud storage services store data on SSS Sone ty SORTS essibility from anywhere, STO eS eee Sena eee Se een nS STS S: Optical dises like CDs, DVDs, and Blu ROE aCe ey Sere cers Ca teenie Daren) aso eae eee

You might also like