SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Introduction to Database Concepts
Ucc - Mwanza.
May 2006
Database Definition
A database can be defined as collection
of information organized in such a way
that it can be accessed easily.
Examples are
 Tracking customer orders
 Maintaining Employees Records.
 Maintaining Students Information
Terminologies
In studying Databases the following Terminologies
must be clear
Data
 This is the fact or facts about specific entity (person, place or thing).
Information
 This is the processed facts perceived to be useful by the user.
Field
 This is a single item of information or data in entity. E.g. employee
Name
Record
 This can be defined as data or group of fields about an
entity. E.g. employee particulars 
Subject (relation or table)
 This can be defined as a collection of records that are related
to a particular entity. For example, Records for all employees
will make up one subject.
History of Databases
Manual systems
File Processing Systems (FPS)
Database Management systems
(DBMS)
Manual systems
Structure
Information can be stored in dedicated room or in separate offices.
Room or office will be furnished with shelves;
Different shelves will hold Records for different subjects.
Records will be stored in hard flat files, each file will carry one record
Each file will have a specific number to identify it.
A person will use the file number to retrieve the specific file (record).
Manual systems
User
File keeper
Files Cabinet
File Processing Systems (FPS)
Information stored as groups of records in separate
files
File processing systems consisted of a few data files
and many application programs
Each file called a soft flat file
Flat file contain processed information for one specific
function
Use of programming languages to write applications
Little flexibility
High maintenance
Many limitations
Limitations of File Processing Systems
Separate and isolated data
Data redundancy
Program - data interdependence
involving file formats and access
techniques
Difficulty in representing data from the
user’s view
Data inflexibility
Database Management systems (DBMS)
A program that allows users to define, create, manipulate,
store, maintain, retrieve, and process the data in a
database in order to produce meaningful information.
Focus on information representation
Data stored as records in various database files that can
be combined to produce meaningful information for users
DBMS controls all functions of capturing, processing,
storing, retrieving data and generates various forms of
data output
Manages access by multiple users and multiple programs
to a common store of data
DBMS overcomes all Limitations of FPS.
Eliminates separation and isolation of data
Reduces data redundancy
Eliminates dependence between programs
and data
Allows for representation of data from user’s
view
Increases data flexibility
Superior flexibility and security over
spreadsheet applications
Characteristics of a DBMS
 Computerized record-keeping system
 Contains facilities that allow the user to:
o Add, delete files
o Insert, retrieve, update, delete data
 Collection of databases; each can be
used for separate purposes or
combined
Functions and Uses of a DBMS
To store data
To organize data
To control access to data
To protect data
To provide decision support
To provide transaction processing
Advantages and Disadvantages of a DBMS
• Advantages:
 Centralized data reduces management problems
 Data redundancy and consistency are controllable
 Program - data interdependency is diminished
 Flexibility of data is increased
• Disadvantages:
 Reduction in speed of data access time
 Requires special knowledge
 Possible dependency of application programs to specific
DBMS versions
Database Administrator
A database administrator (DBA) controls and
manages the database.
Function of a DBA
Make decisions concerning the content of the
database
Plan storage structures and access strategies.
Provides support to users
Defines security and integrity checks
Interprets backup and recovery strategies.
Types of Databases
Flat Databases
Hierarchical Database
Network Database
Relational Database
Flat databases
A single kind of record with a fixed number
of fields.
a way of organizing all information in a
single table.
suitable for extremely simple
databases.
inherit data redundancy
Flat databases
Hierarchical Database
Fields or records structured in nodes
Viewed as branches of an upside-down tree
Each item is subordinate to its parent node
Only one parent per node
The subordinate item is the child node to the parent
If parent node is deleted, all the child nodes are as well
deleted
New parent node must be created before adding a new child
node
Limited by rigid structure
No direct relationships between child nodes
Hierarchical Database
Network Database
Also has hierarchical node arrangement
But here child nodes may have more than
one parent node, or a many-to-many
relationship
The interconnected design allows for access
via multiple pathways
Network Database
Relational Database
No pre-determined access paths
Data stored in a collection of columns and
rows called a table, or a relation
Tables may be electronically linked via a
key field containing common data
Easy to add, delete and modify the data and
the table structures
Relational Database
Relational Terminologies
Table or Relation
Null values
Duplicate Values
Changeable Values
Primary Keys
Foreign Keys
Table or Relation
Table will store information for a
particular entity
Table name must be unique
 The Table name should be descriptive
Column Name must be unique within
the Table
Rows must be unique
Null values
missing or unknown value in a column
of a table
Nulls are not the same as zeros
Most arithmetic operations can be
performed on zero values
nulls must be excluded from
mathematical manipulations
Duplicate values
A duplicate value is a value in a column
of a table that exactly matches some
other values within the same column.
Changeable values
value in a table that may vary over time.
Most values in most tables are
Changeable
You can prevent changes when it is
desirable to prevent changes in a given
column of a table
Primary keys
Uniquely identify each row of that table.
Every table must have only one
Primary key
Rules for Primary key
Must always have a value (null values
are not allowed)
Value should be unique (duplicate
values are not allowed)
Value should not change over time
Foreign keys
key which relates the rows of the Table
to other Tables
value can be null,
value can change
value can be duplicated
Rule for Foreign keys
Value must refer to the existing primary
key.

Weitere ähnliche Inhalte

Was ist angesagt?

Relational Database Management System
Relational Database Management SystemRelational Database Management System
Relational Database Management SystemMian Abdul Raheem
 
Basic Concept of Database
Basic Concept of DatabaseBasic Concept of Database
Basic Concept of DatabaseMarlon Jamera
 
File system vs database
File system vs databaseFile system vs database
File system vs databaseSanthiNivas
 
Abap data dictionary
Abap data dictionaryAbap data dictionary
Abap data dictionarySmartGokul4
 
old file system/traditional file sysytem
old file system/traditional file sysytemold file system/traditional file sysytem
old file system/traditional file sysytemjizaka
 
Types of databases
Types of databasesTypes of databases
Types of databasesPAQUIAAIZEL
 
overview of database concept
overview of database conceptoverview of database concept
overview of database conceptgourav kottawar
 
08 sip database
08 sip database08 sip database
08 sip databaseIkhsan Bz
 
DATABASE PRESENTATION
DATABASE PRESENTATIONDATABASE PRESENTATION
DATABASE PRESENTATIONSunnyRajput34
 
Database management system
Database management systemDatabase management system
Database management systemSabinDhakal13
 
Key database terms
Key database termsKey database terms
Key database termslistergc
 
computer fund-database presentation
 computer fund-database presentation computer fund-database presentation
computer fund-database presentationRakibul islam
 

Was ist angesagt? (20)

Relational Database Management System
Relational Database Management SystemRelational Database Management System
Relational Database Management System
 
Basic Concept of Database
Basic Concept of DatabaseBasic Concept of Database
Basic Concept of Database
 
database
databasedatabase
database
 
RDBMS
RDBMSRDBMS
RDBMS
 
DBMS introduction
DBMS introductionDBMS introduction
DBMS introduction
 
File system vs database
File system vs databaseFile system vs database
File system vs database
 
Abap data dictionary
Abap data dictionaryAbap data dictionary
Abap data dictionary
 
Data independence
Data independenceData independence
Data independence
 
old file system/traditional file sysytem
old file system/traditional file sysytemold file system/traditional file sysytem
old file system/traditional file sysytem
 
Types of databases
Types of databasesTypes of databases
Types of databases
 
Database management systems
Database management systemsDatabase management systems
Database management systems
 
overview of database concept
overview of database conceptoverview of database concept
overview of database concept
 
Introduction to Database
Introduction to DatabaseIntroduction to Database
Introduction to Database
 
08 sip database
08 sip database08 sip database
08 sip database
 
DATABASE PRESENTATION
DATABASE PRESENTATIONDATABASE PRESENTATION
DATABASE PRESENTATION
 
rdbms-notes
rdbms-notesrdbms-notes
rdbms-notes
 
Database management system
Database management systemDatabase management system
Database management system
 
File system vs DBMS
File system vs DBMSFile system vs DBMS
File system vs DBMS
 
Key database terms
Key database termsKey database terms
Key database terms
 
computer fund-database presentation
 computer fund-database presentation computer fund-database presentation
computer fund-database presentation
 

Andere mochten auch

User Manual Joomla2006
User Manual Joomla2006User Manual Joomla2006
User Manual Joomla2006 defg gf
 
Test Tech 2011 Overview
Test Tech 2011 OverviewTest Tech 2011 Overview
Test Tech 2011 Overviewjamono
 
Relational Database Access with Python ‘sans’ ORM
Relational Database Access with Python ‘sans’ ORM  Relational Database Access with Python ‘sans’ ORM
Relational Database Access with Python ‘sans’ ORM Mark Rees
 
Lesson Two Exploring An Access Database
Lesson Two   Exploring An Access DatabaseLesson Two   Exploring An Access Database
Lesson Two Exploring An Access Databaseguevarra_2000
 
Heightworks IRATA Training Manual Version 2 - Rope Access Training Manual
Heightworks IRATA Training Manual Version 2 - Rope Access Training ManualHeightworks IRATA Training Manual Version 2 - Rope Access Training Manual
Heightworks IRATA Training Manual Version 2 - Rope Access Training ManualHeightworks Ltd
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 
Best practice strategies to clean up and maintain your database with Hether G...
Best practice strategies to clean up and maintain your database with Hether G...Best practice strategies to clean up and maintain your database with Hether G...
Best practice strategies to clean up and maintain your database with Hether G...Blackbaud Pacific
 

Andere mochten auch (13)

User Manual Joomla2006
User Manual Joomla2006User Manual Joomla2006
User Manual Joomla2006
 
Test Tech 2011 Overview
Test Tech 2011 OverviewTest Tech 2011 Overview
Test Tech 2011 Overview
 
Presentation latin american_librarians
Presentation latin american_librariansPresentation latin american_librarians
Presentation latin american_librarians
 
Relational Database Access with Python ‘sans’ ORM
Relational Database Access with Python ‘sans’ ORM  Relational Database Access with Python ‘sans’ ORM
Relational Database Access with Python ‘sans’ ORM
 
Lesson Two Exploring An Access Database
Lesson Two   Exploring An Access DatabaseLesson Two   Exploring An Access Database
Lesson Two Exploring An Access Database
 
MS Access Training
MS Access TrainingMS Access Training
MS Access Training
 
Sample training manual
Sample training manualSample training manual
Sample training manual
 
Heightworks IRATA Training Manual Version 2 - Rope Access Training Manual
Heightworks IRATA Training Manual Version 2 - Rope Access Training ManualHeightworks IRATA Training Manual Version 2 - Rope Access Training Manual
Heightworks IRATA Training Manual Version 2 - Rope Access Training Manual
 
Database security
Database securityDatabase security
Database security
 
Database security
Database securityDatabase security
Database security
 
Farmeron
FarmeronFarmeron
Farmeron
 
Database Security
Database SecurityDatabase Security
Database Security
 
Best practice strategies to clean up and maintain your database with Hether G...
Best practice strategies to clean up and maintain your database with Hether G...Best practice strategies to clean up and maintain your database with Hether G...
Best practice strategies to clean up and maintain your database with Hether G...
 

Ähnlich wie Database concepts

Ähnlich wie Database concepts (20)

Introduction to Database (Lecture 1).ppt
Introduction to Database (Lecture 1).pptIntroduction to Database (Lecture 1).ppt
Introduction to Database (Lecture 1).ppt
 
Database Management System Part-1.pptx
Database Management System Part-1.pptxDatabase Management System Part-1.pptx
Database Management System Part-1.pptx
 
Dbms mca-section a
Dbms mca-section aDbms mca-section a
Dbms mca-section a
 
database concepts.pptx
database concepts.pptxdatabase concepts.pptx
database concepts.pptx
 
data and information
data and informationdata and information
data and information
 
Ch-1-Introduction-to-Database.pdf
Ch-1-Introduction-to-Database.pdfCh-1-Introduction-to-Database.pdf
Ch-1-Introduction-to-Database.pdf
 
Database management system
Database management systemDatabase management system
Database management system
 
Data base management system
Data base management systemData base management system
Data base management system
 
database1.pdf
database1.pdfdatabase1.pdf
database1.pdf
 
Database management system
Database management systemDatabase management system
Database management system
 
Dbms
DbmsDbms
Dbms
 
Dbms
DbmsDbms
Dbms
 
Lecture 01 overview of dbms
Lecture 01 overview of dbmsLecture 01 overview of dbms
Lecture 01 overview of dbms
 
English database management_system
English database management_systemEnglish database management_system
English database management_system
 
Database Systems - introduction
Database Systems - introductionDatabase Systems - introduction
Database Systems - introduction
 
6.2 software
6.2 software6.2 software
6.2 software
 
Dbms
Dbms Dbms
Dbms
 
Dbms
DbmsDbms
Dbms
 
Dbms9
Dbms9Dbms9
Dbms9
 
Info systems databases
Info systems databasesInfo systems databases
Info systems databases
 

Mehr von FLYMAN TECHNOLOGY LIMITED

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFLYMAN TECHNOLOGY LIMITED
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)FLYMAN TECHNOLOGY LIMITED
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5FLYMAN TECHNOLOGY LIMITED
 

Mehr von FLYMAN TECHNOLOGY LIMITED (20)

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction Presentation
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)
 
Flyman Technology Limited Tanzania
Flyman Technology Limited TanzaniaFlyman Technology Limited Tanzania
Flyman Technology Limited Tanzania
 
Saadani national park 2015
Saadani national park 2015Saadani national park 2015
Saadani national park 2015
 
Uuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asiliUuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asili
 
Entrepreneurship manual BIT
Entrepreneurship manual BITEntrepreneurship manual BIT
Entrepreneurship manual BIT
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
 
Dhtml chapter2
Dhtml chapter2Dhtml chapter2
Dhtml chapter2
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Marketing management
Marketing managementMarketing management
Marketing management
 
Marketing communications
Marketing communicationsMarketing communications
Marketing communications
 
Marketing analysis
Marketing analysisMarketing analysis
Marketing analysis
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Consumer markets
Consumer marketsConsumer markets
Consumer markets
 
ENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUALENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUAL
 
THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!
 
TAXATION CONCEPTS
TAXATION CONCEPTSTAXATION CONCEPTS
TAXATION CONCEPTS
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Database concepts

  • 1. Introduction to Database Concepts Ucc - Mwanza. May 2006
  • 2. Database Definition A database can be defined as collection of information organized in such a way that it can be accessed easily. Examples are  Tracking customer orders  Maintaining Employees Records.  Maintaining Students Information
  • 3. Terminologies In studying Databases the following Terminologies must be clear Data  This is the fact or facts about specific entity (person, place or thing). Information  This is the processed facts perceived to be useful by the user. Field  This is a single item of information or data in entity. E.g. employee Name Record  This can be defined as data or group of fields about an entity. E.g. employee particulars  Subject (relation or table)  This can be defined as a collection of records that are related to a particular entity. For example, Records for all employees will make up one subject.
  • 4. History of Databases Manual systems File Processing Systems (FPS) Database Management systems (DBMS)
  • 5. Manual systems Structure Information can be stored in dedicated room or in separate offices. Room or office will be furnished with shelves; Different shelves will hold Records for different subjects. Records will be stored in hard flat files, each file will carry one record Each file will have a specific number to identify it. A person will use the file number to retrieve the specific file (record).
  • 7. File Processing Systems (FPS) Information stored as groups of records in separate files File processing systems consisted of a few data files and many application programs Each file called a soft flat file Flat file contain processed information for one specific function Use of programming languages to write applications Little flexibility High maintenance Many limitations
  • 8.
  • 9. Limitations of File Processing Systems Separate and isolated data Data redundancy Program - data interdependence involving file formats and access techniques Difficulty in representing data from the user’s view Data inflexibility
  • 10. Database Management systems (DBMS) A program that allows users to define, create, manipulate, store, maintain, retrieve, and process the data in a database in order to produce meaningful information. Focus on information representation Data stored as records in various database files that can be combined to produce meaningful information for users DBMS controls all functions of capturing, processing, storing, retrieving data and generates various forms of data output Manages access by multiple users and multiple programs to a common store of data
  • 11.
  • 12. DBMS overcomes all Limitations of FPS. Eliminates separation and isolation of data Reduces data redundancy Eliminates dependence between programs and data Allows for representation of data from user’s view Increases data flexibility Superior flexibility and security over spreadsheet applications
  • 13. Characteristics of a DBMS  Computerized record-keeping system  Contains facilities that allow the user to: o Add, delete files o Insert, retrieve, update, delete data  Collection of databases; each can be used for separate purposes or combined
  • 14. Functions and Uses of a DBMS To store data To organize data To control access to data To protect data To provide decision support To provide transaction processing
  • 15. Advantages and Disadvantages of a DBMS • Advantages:  Centralized data reduces management problems  Data redundancy and consistency are controllable  Program - data interdependency is diminished  Flexibility of data is increased • Disadvantages:  Reduction in speed of data access time  Requires special knowledge  Possible dependency of application programs to specific DBMS versions
  • 16. Database Administrator A database administrator (DBA) controls and manages the database. Function of a DBA Make decisions concerning the content of the database Plan storage structures and access strategies. Provides support to users Defines security and integrity checks Interprets backup and recovery strategies.
  • 17. Types of Databases Flat Databases Hierarchical Database Network Database Relational Database
  • 18. Flat databases A single kind of record with a fixed number of fields. a way of organizing all information in a single table. suitable for extremely simple databases. inherit data redundancy
  • 20. Hierarchical Database Fields or records structured in nodes Viewed as branches of an upside-down tree Each item is subordinate to its parent node Only one parent per node The subordinate item is the child node to the parent If parent node is deleted, all the child nodes are as well deleted New parent node must be created before adding a new child node Limited by rigid structure No direct relationships between child nodes
  • 22. Network Database Also has hierarchical node arrangement But here child nodes may have more than one parent node, or a many-to-many relationship The interconnected design allows for access via multiple pathways
  • 24. Relational Database No pre-determined access paths Data stored in a collection of columns and rows called a table, or a relation Tables may be electronically linked via a key field containing common data Easy to add, delete and modify the data and the table structures
  • 26. Relational Terminologies Table or Relation Null values Duplicate Values Changeable Values Primary Keys Foreign Keys
  • 27. Table or Relation Table will store information for a particular entity Table name must be unique  The Table name should be descriptive Column Name must be unique within the Table Rows must be unique
  • 28. Null values missing or unknown value in a column of a table Nulls are not the same as zeros Most arithmetic operations can be performed on zero values nulls must be excluded from mathematical manipulations
  • 29. Duplicate values A duplicate value is a value in a column of a table that exactly matches some other values within the same column.
  • 30. Changeable values value in a table that may vary over time. Most values in most tables are Changeable You can prevent changes when it is desirable to prevent changes in a given column of a table
  • 31. Primary keys Uniquely identify each row of that table. Every table must have only one Primary key
  • 32. Rules for Primary key Must always have a value (null values are not allowed) Value should be unique (duplicate values are not allowed) Value should not change over time
  • 33. Foreign keys key which relates the rows of the Table to other Tables value can be null, value can change value can be duplicated
  • 34. Rule for Foreign keys Value must refer to the existing primary key.