SlideShare a Scribd company logo
1 of 37
INFORMATION AND COMMUNICATION TECHNOLOGIES
Database systems
Lecture content
1. Concept of DBMS
2. Database System
3. Database classification
4. Normalization
5. Data integrity
6. Optimizing Queries and their processing
7. Fundamentals of SQL
8. The parallel databases
9. Technology of programming of ORM
10. Control questions
Concept of DBMS
The database refers to a named set of structured data related to a certain
subject area.
The DB is stored and
processed on a computer
system.
The data in the database is
well structured, i.e. it
highlights the main elements
of the types and relationships
between the elements, as
well as the restrictions on the
permitted operations.
It provides data search and
data processing.
Database System
The Database System is a computerized system of structured data. Its main
purpose is to store information and provide it on demand.
Data Hardware
Software Users
Database
A database is a set of data that has a regular
structure and that is organized in such a way that
a computer can easily find the desired
information.
Well-known DBMSs include MySQL,
PostgreSQL, EnterpriseDB, MongoDB, MariaDB,
Microsoft SQL Server, Oracle, Sybase, SAP HANA,
MemSQL, SQLite and IBM DB2.
What Is Database Architecture?
Database architecture focuses on the design,
development, implementation and maintenance of
computer programs that store and organize information
for businesses, agencies and institutions. A database
architect develops and implements software to meet the
needs of users.
Data models
A data model is an abstract model that organizes
elements of data and standardizes how they relate to
one another and to properties of the real world entities.
Database System
The hierarchical data model.
Director
Head of Sales
Department
Head of PR
Department
Head of Service
Department
Employee Employee Employee Employee Employee
Benefits:
- simplicity;
- minimum memory
consumption.
Disadvantages:
- lack of flexibility ;
- an exceptional
navigation principle
of access to the data;
- access to the data
through the root
member only.
Database System
Network data model
Benefits:
- universality;
- ability to access
the data through
multiple values
relations.
-
Disadvantages:
- complexity;
- validity only for
the navigational
principle of
accessing the data.
Employee 1 Employee 2 Employee 3 Employee 4
Project 1 Project 2 Project 3
Customer 2 Customer 3 Customer 4
Customer 1
Database System
Relational data model Benefits:
- simplicity.
- theoretical
justification.
- data independence.
Disadvantages:
- low speed.
- large memory
consumption.
StudentID LastName FirstName MiddleName GroupID
1 Kazakov Petr Vladimirovich 1
2 Vasilyev Ivan Arkadievich 2
4 Shishkina Daria Sergeevna 1
GroupID Supervisor
1 Tsarev S.M.
2 Pestov D.N.
Database classification
The
processing
technology
Centralized Distributed
Database classification
The method
of access to
the data
Local access
Remote
access
Database classification
The
architecture
File server
Client-
server
Data integrity is the maintenance of, and the assurance of the
accuracy and consistency of, data over its entire life-cycle, and is a critical
aspect to the design, implementation and usage of any system which stores,
processes, or retrieves data.
4 Types of Data Integrity
• Entity integrity
• Referential integrity
• Domain integrity
• User-defined integrity
Optimizing Queries and their processing
To prepare queries using various DBMS, two main languages for query
description are most often used:
• The QBE (QueryByExample);
• SQL (StructuredQueryLanguage);
Data processing includes a set of various functions and operations that can be
divided into sodium groups:
• search, filter and sort data;
• queries to the database;
• mechanism for implementing events, rules (triggers), and procedures in the
database.
The Structured Query Language is one of the fundamental
building blocks of modern database architecture. SQL defines the
methods used to create and manipulate relational databases on all
major platforms.
Fundamentals of SQL
The Data Definition Language (DDL) contains the commands used to create and
destroy databases and database objects. After the database structure is defined
with DDL, database administrators and users can use the Data Manipulation
Language (DML) to insert, retrieve and modify the data contained within it.
DDL AND DML
CREATE. Installing a database management system on
a computer allows you to create and manage many
independent databases.
DATA DEFINITION LANGUAGE COMMANDS
USE. The USE command allows you to specify the database you want to work with
within your DBMS.
ALTER. Once you've created a table within a database, you may want to modify its
definition. The ALTER command allows you to make changes to the structure of a
table without deleting and recreating it.
DROP. DROP allows us to remove entire database objects from
our DBMS.
INSERT. The INSERT command in SQL is used to add records to an
existing table.
SELECT. It allows database users to retrieve the specific information they
desire from an operational database.
DATA MANIPULATION
LANGUAGE COMMANDS
UPDATE. The UPDATE command can be used to modify the
information contained within a table, either in bulk or individually.
DELETE. You'll find that the syntax of this command is similar
to that of the other DML commands.
A parallel DBMS can be defined as a DBMS implementation for a
multiprocessor computer.
In the database software, there can be three types of parallelism
inherent in data intensive applications:
• Inter-request parallelism;
• intra-query parallelism;
• intra-operation parallelism.
The parallel databases
Inter-request concurrency assumes simultaneous execution of multiple requests related to different
transactions
The parallel databases
SQL compilation
+
implementation
By intra-query parallelism is meant simultaneous execution of several
operations (for example, sampling operations) related to the same request
The parallel databases
SQL compilation
+
implementation
Operation 1
…
Operation n
The concept of intra-operative parallelism means the parallel execution of one operation as a set
of sub-operations, in addition to fragmentation of data, also fragmentation of functions
The parallel databases
Sub-operation 1
…
Sub-operation n
Operation k
SQL compilation
+
implementation
Design of databases — process of creation of the database
scheme and determination of necessary integrity constraints.
Development of database is a proven way to automate the
organization process in order to achieve maximum efficiency and
profitability of activities.
Design and development of databases
Object-relational mapping (ORM) in computer science is a
programming technique for converting data between incompatible type
systems using object-oriented programming languages.
Technology of programming of ORM
A distributed database (DDB) is a collection of a set of interrelated
databases distributed in a computer network.
The distributed database
Horizontal fragmentation is realized with the help of selection
operations, which directs each tuple of the relation to one of the
sections, guided by the fragmentation predicate.
The distributed database
Tuple 1
Tuple 2
…
Tuple n
Tuple k
…
With vertical fragmentation, the ratio is divided into sections using the
projection operation.
The distributed database
Tuple
A heterogeneous database
• A heterogeneous database is an automated (or semi-automated)
system for the integration of heterogeneous, disparate database
management systems to present a user with a single, unified query
interface.
• A parallel database system seeks to improve performance through
parallelization of various operations, such as loading data, building
indexes and evaluating queries.
Control Questions
What is meant by the database? What is the difference
between a database and a simple set of data?
What is the database system? What are its components?
What are the main elements of the database?
What is the data model? Name the existing data models.
What are the differences between them?
References
• Information and Communication Technologies Part 1: Textbook/
D.Shynybekov. - Almaty: IITU, 2017. - 588 p.
• Information and Communication Technologies Part 2: Textbook/
D.Shynybekov. - Almaty: IITU, 2017. - 624 p
• Sheth, Amit P.; James A. Larson (September 1990). "Federated Database
Systems for Managing Distributed, Heterogeneous, and Autonomous
Databases" (PDF). ACM Computing Surveys. 22 (3): 183–236.
• Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski
(University of Illinois at Chicago, IL, USA) Communication and
Technology, 576 pages.
• Craig Van Slyke Information Communication Technologies: Concepts,
Methodologies, Tools, and Applications (6 Volumes). ISBN13:
9781599049496, 2008, Pages: 4288
• Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline
“Computer science”, Shimkent 2008, 84 pages.

More Related Content

Similar to ICT L5+.pptx

Database and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsDatabase and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsZulfiquer Ahmed Amin
 
Complete first chapter rdbm 17332
Complete first chapter rdbm 17332Complete first chapter rdbm 17332
Complete first chapter rdbm 17332Tushar Wagh
 
01-database-management.pptx
01-database-management.pptx01-database-management.pptx
01-database-management.pptxdhanajimirajkar1
 

Similar to ICT L5+.pptx (20)

Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Database systems Handbook dbms.pdf
Database systems Handbook dbms.pdfDatabase systems Handbook dbms.pdf
Database systems Handbook dbms.pdf
 
Database systems Handbook dbms.pdf
Database systems Handbook dbms.pdfDatabase systems Handbook dbms.pdf
Database systems Handbook dbms.pdf
 
Database systems Handbook dbms.pdf
Database systems Handbook dbms.pdfDatabase systems Handbook dbms.pdf
Database systems Handbook dbms.pdf
 
RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.RDBMS to NoSQL. An overview.
RDBMS to NoSQL. An overview.
 
Database and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health InformaticsDatabase and Database Management (DBM): Health Informatics
Database and Database Management (DBM): Health Informatics
 
Complete first chapter rdbm 17332
Complete first chapter rdbm 17332Complete first chapter rdbm 17332
Complete first chapter rdbm 17332
 
Dbms module i
Dbms module iDbms module i
Dbms module i
 
01-database-management.pptx
01-database-management.pptx01-database-management.pptx
01-database-management.pptx
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Muhammad Sharif Database systems Handbook.pdf
Muhammad Sharif  Database systems Handbook.pdfMuhammad Sharif  Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 
Muhammad Sharif Database systems Handbook.pdf
Muhammad Sharif  Database systems Handbook.pdfMuhammad Sharif  Database systems Handbook.pdf
Muhammad Sharif Database systems Handbook.pdf
 
Database systems Handbook database systems muhammad sharif.pdf
Database systems Handbook database systems muhammad sharif.pdfDatabase systems Handbook database systems muhammad sharif.pdf
Database systems Handbook database systems muhammad sharif.pdf
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
 
Database systems Handbook by Muhammad Sharif dba.pdf
Database systems Handbook by Muhammad Sharif dba.pdfDatabase systems Handbook by Muhammad Sharif dba.pdf
Database systems Handbook by Muhammad Sharif dba.pdf
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
 
Database system Handbook.pdf
Database system Handbook.pdfDatabase system Handbook.pdf
Database system Handbook.pdf
 
Database systems Handbook.pdf
Database systems Handbook.pdfDatabase systems Handbook.pdf
Database systems Handbook.pdf
 

More from AssemNazirova2

ICT L13 — копия.pptx
ICT L13 — копия.pptxICT L13 — копия.pptx
ICT L13 — копия.pptxAssemNazirova2
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.pptAssemNazirova2
 
SDT_L8 — копия.ppt
SDT_L8 — копия.pptSDT_L8 — копия.ppt
SDT_L8 — копия.pptAssemNazirova2
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.pptAssemNazirova2
 
Лекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptxЛекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptxAssemNazirova2
 
CN L5 — копия.pptx
CN L5 — копия.pptxCN L5 — копия.pptx
CN L5 — копия.pptxAssemNazirova2
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.pptAssemNazirova2
 
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptxvlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptxAssemNazirova2
 

More from AssemNazirova2 (18)

IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 
ICT L13 — копия.pptx
ICT L13 — копия.pptxICT L13 — копия.pptx
ICT L13 — копия.pptx
 
CN L8 — копия.ppt
CN L8 — копия.pptCN L8 — копия.ppt
CN L8 — копия.ppt
 
SDT_L8 — копия.ppt
SDT_L8 — копия.pptSDT_L8 — копия.ppt
SDT_L8 — копия.ppt
 
Cloud technology
Cloud technologyCloud technology
Cloud technology
 
CN L7 — копия.ppt
CN L7 — копия.pptCN L7 — копия.ppt
CN L7 — копия.ppt
 
Лекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptxЛекция 1_ РЭС_Презентация — копия.pptx
Лекция 1_ РЭС_Презентация — копия.pptx
 
CN L5 — копия.pptx
CN L5 — копия.pptxCN L5 — копия.pptx
CN L5 — копия.pptx
 
physical_layer.pptx
physical_layer.pptxphysical_layer.pptx
physical_layer.pptx
 
Physical.pptx
Physical.pptxPhysical.pptx
Physical.pptx
 
CN L5.pptx
CN L5.pptxCN L5.pptx
CN L5.pptx
 
CN L1 — копия.ppt
CN L1 — копия.pptCN L1 — копия.ppt
CN L1 — копия.ppt
 
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptxvlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
vlsisubsystemdesignprocessesandillustration-131101063110-phpapp02.pptx
 
ICT L4.pptx
ICT L4.pptxICT L4.pptx
ICT L4.pptx
 
ICT L2.pptx
ICT L2.pptxICT L2.pptx
ICT L2.pptx
 
HCI.pptx
HCI.pptxHCI.pptx
HCI.pptx
 
E-technology.pptx
E-technology.pptxE-technology.pptx
E-technology.pptx
 
ICT L1 .pptx
ICT L1  .pptxICT L1  .pptx
ICT L1 .pptx
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

ICT L5+.pptx

  • 1. INFORMATION AND COMMUNICATION TECHNOLOGIES Database systems
  • 2. Lecture content 1. Concept of DBMS 2. Database System 3. Database classification 4. Normalization 5. Data integrity 6. Optimizing Queries and their processing 7. Fundamentals of SQL 8. The parallel databases 9. Technology of programming of ORM 10. Control questions
  • 3. Concept of DBMS The database refers to a named set of structured data related to a certain subject area. The DB is stored and processed on a computer system. The data in the database is well structured, i.e. it highlights the main elements of the types and relationships between the elements, as well as the restrictions on the permitted operations. It provides data search and data processing.
  • 4. Database System The Database System is a computerized system of structured data. Its main purpose is to store information and provide it on demand. Data Hardware Software Users Database
  • 5. A database is a set of data that has a regular structure and that is organized in such a way that a computer can easily find the desired information. Well-known DBMSs include MySQL, PostgreSQL, EnterpriseDB, MongoDB, MariaDB, Microsoft SQL Server, Oracle, Sybase, SAP HANA, MemSQL, SQLite and IBM DB2.
  • 6. What Is Database Architecture? Database architecture focuses on the design, development, implementation and maintenance of computer programs that store and organize information for businesses, agencies and institutions. A database architect develops and implements software to meet the needs of users.
  • 7. Data models A data model is an abstract model that organizes elements of data and standardizes how they relate to one another and to properties of the real world entities.
  • 8. Database System The hierarchical data model. Director Head of Sales Department Head of PR Department Head of Service Department Employee Employee Employee Employee Employee Benefits: - simplicity; - minimum memory consumption. Disadvantages: - lack of flexibility ; - an exceptional navigation principle of access to the data; - access to the data through the root member only.
  • 9. Database System Network data model Benefits: - universality; - ability to access the data through multiple values relations. - Disadvantages: - complexity; - validity only for the navigational principle of accessing the data. Employee 1 Employee 2 Employee 3 Employee 4 Project 1 Project 2 Project 3 Customer 2 Customer 3 Customer 4 Customer 1
  • 10. Database System Relational data model Benefits: - simplicity. - theoretical justification. - data independence. Disadvantages: - low speed. - large memory consumption. StudentID LastName FirstName MiddleName GroupID 1 Kazakov Petr Vladimirovich 1 2 Vasilyev Ivan Arkadievich 2 4 Shishkina Daria Sergeevna 1 GroupID Supervisor 1 Tsarev S.M. 2 Pestov D.N.
  • 12. Database classification The method of access to the data Local access Remote access
  • 14.
  • 15. Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.
  • 16. 4 Types of Data Integrity • Entity integrity • Referential integrity • Domain integrity • User-defined integrity
  • 17. Optimizing Queries and their processing To prepare queries using various DBMS, two main languages for query description are most often used: • The QBE (QueryByExample); • SQL (StructuredQueryLanguage); Data processing includes a set of various functions and operations that can be divided into sodium groups: • search, filter and sort data; • queries to the database; • mechanism for implementing events, rules (triggers), and procedures in the database.
  • 18. The Structured Query Language is one of the fundamental building blocks of modern database architecture. SQL defines the methods used to create and manipulate relational databases on all major platforms. Fundamentals of SQL
  • 19. The Data Definition Language (DDL) contains the commands used to create and destroy databases and database objects. After the database structure is defined with DDL, database administrators and users can use the Data Manipulation Language (DML) to insert, retrieve and modify the data contained within it. DDL AND DML
  • 20. CREATE. Installing a database management system on a computer allows you to create and manage many independent databases. DATA DEFINITION LANGUAGE COMMANDS
  • 21. USE. The USE command allows you to specify the database you want to work with within your DBMS. ALTER. Once you've created a table within a database, you may want to modify its definition. The ALTER command allows you to make changes to the structure of a table without deleting and recreating it.
  • 22. DROP. DROP allows us to remove entire database objects from our DBMS.
  • 23. INSERT. The INSERT command in SQL is used to add records to an existing table. SELECT. It allows database users to retrieve the specific information they desire from an operational database. DATA MANIPULATION LANGUAGE COMMANDS
  • 24. UPDATE. The UPDATE command can be used to modify the information contained within a table, either in bulk or individually.
  • 25. DELETE. You'll find that the syntax of this command is similar to that of the other DML commands.
  • 26. A parallel DBMS can be defined as a DBMS implementation for a multiprocessor computer. In the database software, there can be three types of parallelism inherent in data intensive applications: • Inter-request parallelism; • intra-query parallelism; • intra-operation parallelism. The parallel databases
  • 27. Inter-request concurrency assumes simultaneous execution of multiple requests related to different transactions The parallel databases SQL compilation + implementation
  • 28. By intra-query parallelism is meant simultaneous execution of several operations (for example, sampling operations) related to the same request The parallel databases SQL compilation + implementation Operation 1 … Operation n
  • 29. The concept of intra-operative parallelism means the parallel execution of one operation as a set of sub-operations, in addition to fragmentation of data, also fragmentation of functions The parallel databases Sub-operation 1 … Sub-operation n Operation k SQL compilation + implementation
  • 30. Design of databases — process of creation of the database scheme and determination of necessary integrity constraints. Development of database is a proven way to automate the organization process in order to achieve maximum efficiency and profitability of activities. Design and development of databases
  • 31. Object-relational mapping (ORM) in computer science is a programming technique for converting data between incompatible type systems using object-oriented programming languages. Technology of programming of ORM
  • 32. A distributed database (DDB) is a collection of a set of interrelated databases distributed in a computer network. The distributed database
  • 33. Horizontal fragmentation is realized with the help of selection operations, which directs each tuple of the relation to one of the sections, guided by the fragmentation predicate. The distributed database Tuple 1 Tuple 2 … Tuple n Tuple k …
  • 34. With vertical fragmentation, the ratio is divided into sections using the projection operation. The distributed database Tuple
  • 35. A heterogeneous database • A heterogeneous database is an automated (or semi-automated) system for the integration of heterogeneous, disparate database management systems to present a user with a single, unified query interface. • A parallel database system seeks to improve performance through parallelization of various operations, such as loading data, building indexes and evaluating queries.
  • 36. Control Questions What is meant by the database? What is the difference between a database and a simple set of data? What is the database system? What are its components? What are the main elements of the database? What is the data model? Name the existing data models. What are the differences between them?
  • 37. References • Information and Communication Technologies Part 1: Textbook/ D.Shynybekov. - Almaty: IITU, 2017. - 588 p. • Information and Communication Technologies Part 2: Textbook/ D.Shynybekov. - Almaty: IITU, 2017. - 624 p • Sheth, Amit P.; James A. Larson (September 1990). "Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases" (PDF). ACM Computing Surveys. 22 (3): 183–236. • Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages. • Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288 • Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer science”, Shimkent 2008, 84 pages.