Fundamentals of Database system Chapter one: Introduction to database system Prepared by: Misganaw Abeje University of Gondar College Of Informatics Department of computer science Misganaw.Abeje13@gmail.com
Outline  What is data  What is database and DBMS  Characteristics of database  Data base system and file system  Advantages of DB approach and its characteristics  Actors on Scene  Database Terminology BY: MA
Data  Data are the raw (unorganized) facts about things like people, places, events or concept that have inherent meaning, which is useless By themselves ).  The decision maker really needs is information,  Databases and database technology are having a major impact on the growing use of computers.  Databases play a critical role in almost all areas where computers are used, including business, engineering, medicine, law, education, and library BY: MA
What is database?  database is a collection of related data. E.g. Address book .An address book mainly contains the name, telephone number and address.  A database is a well organized, logically related and shared collection of data that is designed to meet the information needs of various users in an organization.  The database is an integrated collection of facts about an organization. – Organization can be a University, Insurance companies, Banks, Airlines, Governmental and Non-governmental Organizations etc.  The database is used as a central data source for other applications BY: MA
Implicit properties of database:  A database represents some aspect of the real world  Database is a logically coherent collection of data with some inherent meaning  A database is designed, built, and populated with data for a specific purpose.  In other words, the interaction with events in the real world. BY: MA
What is database management system (DBMS)  It is a collection of programs that enables users to create and maintain a database.  The DBMS is hence a general-purpose software system that facilitates the processes: – Defining a database: involves specifying the data types, structures, and constraints for the data to be stored in the database. – Constructing the database: is the process of storing the data itself on some storage medium that is controlled by the DBMS. – Manipulating a database includes such functions as querying the database to retrieve specific data, updating the database to reflect the mini-world, and generating reports from the data. BY: MA
Data base system and file system  Data management passes through the different levels of development.  These levels could best be described by categorizing the levels into three levels of development. Even though there is an advantage and a problem overcome at each new level.  The major three levels are; 1. Manual Approach 2. Traditional File Based Approach 3. Database Approach BY: MA
Manual File Handling Systems  In this approach, data storage and retrieval follows the primitive and traditional way of information handling where cards and paper are used for the purpose performed using human labor.  Each of the files containing various kinds of information is labeled and stored in one or more cabinets.  The cabinets could be kept in safe places for security purpose based on the sensitivity of the information contained in it.  Insertion and retrieval is done by searching first for the right cabinet then for the right file then the information.  Some Examples Personal Calendar, personal profile BY: MA
Limitations of the Manual approach – Prone to error – Difficult to update, retrieve, integrate – You have the data but it is difficult to compile the information – Limited to small size information – Cross referencing is difficult  An alternative approach of data handling is a computerized way of dealing with the information.  Two computerized approaches evolved: – – File based approach → decentralized – – Database approach→ centralized BY: MA
File-Based Approach  File based systems were an early attempt to computerize the manual filing system by use of computer system.  This approach is the decentralized computerized data handling method.  A collection of application programs perform services for the end-users. In such systems, every application program that provides service to end users define and manage its own data BY: MA
 Such systems have number of programs for each of the different applications in the organization.  Since every application defines and manages its own data, the system is subjected to serious data duplication.  File, in traditional file based approach, is a collection of records which contains logically related data.  This approach is to develop a number of programs for each different application BY: MA
Limitations of the Traditional File Based approach  Data Redundancy (Duplication of data) – Same data is held by different programs and Wasted space  Separation or Isolation of Data: Available information in one application may not be known.  Limited data sharing  Lengthy development and maintenance time  Data dependency on the application – Each application program must have its own processing routines  Incompatible file formats (Lack of Data Sharing and Availability) BY: MA
Cont…  Data Inconsistency and confusion  Poor Security and administration  The limitations for the traditional file based data handling approach arise from two basic reasons. 1. Definition of the data is embedded in the application program which makes it difficult to modify the database definition easily. 2. No control over the access and manipulation of the data beyond that imposed by the application programs. The most significant problem experienced by the traditional file based approach of data handling is the “update anomalies” BY: MA
Cont… We have three types of update anomalies; 1. Modification Anomalies: a problem experienced when one or more data value is modified on one application program but not on others containing the same data set. 2. Deletion Anomalies: a problem encountered where one record set is deleted from one application but remain untouched in other application programs. 3. Insertion Anomalies: a problem experienced whenever there is new data item to be recorded, and the recording is not made in all the applications. And when same data item is inserted at different applications, there could be errors in encoding which makes the new data item to be considered as a totally different object. BY: MA
Database Approach  To become more effective, database approach is required.  A Database Approach is shared collection of logically related data, designed to meet the information needs of an organization. (Centralized System). – Shared collection – can be used simultaneously by many departments and users. – Logically related - comprises the important objects and the relationships between these objects. – Description of the data – the system catalog (data dictionary or meta-data) provides description of data to enable data independence (program–data independence). BY: MA
Cont..  Database is a collection of logically related data where these logically related data comprises entities, attributes, relationships, and business rules of an organization's info.  Database is just a computerized record keeping system  In addition to containing data required by an organization, database also contains a description of the data which called as “Metadata” or “Data Dictionary” or “Data about Data”. Since it is called a self descriptive collection on integrated records.  The purpose of a database is to store information and to allow users to retrieve and update that information on demand.  Database is designed once and used simultaneously by many users. BY: MA
Characteristics of database approach  A number of characteristics distinguish the database approach from the traditional approach of programming with files.  Self-Describing Nature of a Database System  Insulation between Programs and Data, and Data Abstraction  Support of Multiple Views of the Data  Sharing of Data and Multiuser Transaction Processing BY: MA
Advantages of Using the DBMS Approach  Controlling Redundancy  Restricting Unauthorized Access  Providing Backup and Recovery  Data Abstraction  Data Independence  Support Multiple view for different Users BY: MA
Actors on the Scene  Database Administrators: – The DBA is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed. – The DBA is accountable for problems such as breach of security or poor system response time. BY: MA
 Database Designers: – Database designers are responsible for identifying the data to be stored in the database and for choosing appropriate structures to represent and store this data. – These tasks are mostly undertaken before the database is actually implemented and populated with data. – It is the responsibility of database designers to communicate with all prospective database users, in order to understand their requirements. BY: MA
 End Users: – End users are the people whose jobs require access to the database for querying, updating, and generating reports. BY: MA
 System Analysts and Application Programmers (Software Engineers) – determine the requirements of end users, especially naive and parametric end users, and develop specifications for canned transactions that meet these requirements. – Application programmers implement these specifications as programs; then they test, debug, document, and maintain these canned transactions. – Such analysts and programmers (nowadays called software engineers) . BY: MA
Basic Database Terminologies  Enterprise – an organization : A library, a bank, a university, etc.  Entity – Person, place, thing, or event (property of an entity) – An "object" in the real world that we are interested in: – The object student is an entity  Attribute (Field) – A character or group of characters (alphabetic or numeric), that has a specific meaning. Eg. Name, age, telephone, grade, sex, etc. BY: MA
 Record – A logically connected set of one or more Attributes that describe a person, place or thing. (Logically related data)  File – A collection of related records. For example, a file might contain data about customers; or students of a certain department in a university.  Database – Collection of Files BY: MA
Different database models  Hierarchical data model – Organize data in a tree structure – There is a hierarchy of parent and child – Data modeling to be one-to-many  Network data model – The same as hierarchical, but network model permits the modeling of many-to-many relationship – A child can have more than one parent BY: MA
 Relational data model – Stores data in the form of tables – A table is a collection of records – Each table corresponds to an entity – Allows the definition of data and integrity constraints  Object-oriented data model – Faster than relational database model – Applications require less code – Add database functionality to object programming language BY: MA
 Thank you? BY: MA

chapter 1-Introduction Fundamentals of database system.pdf

  • 1.
    Fundamentals of Database system Chapterone: Introduction to database system Prepared by: Misganaw Abeje University of Gondar College Of Informatics Department of computer science Misganaw.Abeje13@gmail.com
  • 2.
    Outline  What isdata  What is database and DBMS  Characteristics of database  Data base system and file system  Advantages of DB approach and its characteristics  Actors on Scene  Database Terminology BY: MA
  • 3.
    Data  Data arethe raw (unorganized) facts about things like people, places, events or concept that have inherent meaning, which is useless By themselves ).  The decision maker really needs is information,  Databases and database technology are having a major impact on the growing use of computers.  Databases play a critical role in almost all areas where computers are used, including business, engineering, medicine, law, education, and library BY: MA
  • 4.
    What is database? database is a collection of related data. E.g. Address book .An address book mainly contains the name, telephone number and address.  A database is a well organized, logically related and shared collection of data that is designed to meet the information needs of various users in an organization.  The database is an integrated collection of facts about an organization. – Organization can be a University, Insurance companies, Banks, Airlines, Governmental and Non-governmental Organizations etc.  The database is used as a central data source for other applications BY: MA
  • 5.
    Implicit properties ofdatabase:  A database represents some aspect of the real world  Database is a logically coherent collection of data with some inherent meaning  A database is designed, built, and populated with data for a specific purpose.  In other words, the interaction with events in the real world. BY: MA
  • 6.
    What is databasemanagement system (DBMS)  It is a collection of programs that enables users to create and maintain a database.  The DBMS is hence a general-purpose software system that facilitates the processes: – Defining a database: involves specifying the data types, structures, and constraints for the data to be stored in the database. – Constructing the database: is the process of storing the data itself on some storage medium that is controlled by the DBMS. – Manipulating a database includes such functions as querying the database to retrieve specific data, updating the database to reflect the mini-world, and generating reports from the data. BY: MA
  • 7.
    Data base systemand file system  Data management passes through the different levels of development.  These levels could best be described by categorizing the levels into three levels of development. Even though there is an advantage and a problem overcome at each new level.  The major three levels are; 1. Manual Approach 2. Traditional File Based Approach 3. Database Approach BY: MA
  • 8.
    Manual File HandlingSystems  In this approach, data storage and retrieval follows the primitive and traditional way of information handling where cards and paper are used for the purpose performed using human labor.  Each of the files containing various kinds of information is labeled and stored in one or more cabinets.  The cabinets could be kept in safe places for security purpose based on the sensitivity of the information contained in it.  Insertion and retrieval is done by searching first for the right cabinet then for the right file then the information.  Some Examples Personal Calendar, personal profile BY: MA
  • 9.
    Limitations of theManual approach – Prone to error – Difficult to update, retrieve, integrate – You have the data but it is difficult to compile the information – Limited to small size information – Cross referencing is difficult  An alternative approach of data handling is a computerized way of dealing with the information.  Two computerized approaches evolved: – – File based approach → decentralized – – Database approach→ centralized BY: MA
  • 10.
    File-Based Approach  Filebased systems were an early attempt to computerize the manual filing system by use of computer system.  This approach is the decentralized computerized data handling method.  A collection of application programs perform services for the end-users. In such systems, every application program that provides service to end users define and manage its own data BY: MA
  • 11.
     Such systemshave number of programs for each of the different applications in the organization.  Since every application defines and manages its own data, the system is subjected to serious data duplication.  File, in traditional file based approach, is a collection of records which contains logically related data.  This approach is to develop a number of programs for each different application BY: MA
  • 12.
    Limitations of theTraditional File Based approach  Data Redundancy (Duplication of data) – Same data is held by different programs and Wasted space  Separation or Isolation of Data: Available information in one application may not be known.  Limited data sharing  Lengthy development and maintenance time  Data dependency on the application – Each application program must have its own processing routines  Incompatible file formats (Lack of Data Sharing and Availability) BY: MA
  • 13.
    Cont…  Data Inconsistencyand confusion  Poor Security and administration  The limitations for the traditional file based data handling approach arise from two basic reasons. 1. Definition of the data is embedded in the application program which makes it difficult to modify the database definition easily. 2. No control over the access and manipulation of the data beyond that imposed by the application programs. The most significant problem experienced by the traditional file based approach of data handling is the “update anomalies” BY: MA
  • 14.
    Cont… We have threetypes of update anomalies; 1. Modification Anomalies: a problem experienced when one or more data value is modified on one application program but not on others containing the same data set. 2. Deletion Anomalies: a problem encountered where one record set is deleted from one application but remain untouched in other application programs. 3. Insertion Anomalies: a problem experienced whenever there is new data item to be recorded, and the recording is not made in all the applications. And when same data item is inserted at different applications, there could be errors in encoding which makes the new data item to be considered as a totally different object. BY: MA
  • 15.
    Database Approach  Tobecome more effective, database approach is required.  A Database Approach is shared collection of logically related data, designed to meet the information needs of an organization. (Centralized System). – Shared collection – can be used simultaneously by many departments and users. – Logically related - comprises the important objects and the relationships between these objects. – Description of the data – the system catalog (data dictionary or meta-data) provides description of data to enable data independence (program–data independence). BY: MA
  • 16.
    Cont..  Database isa collection of logically related data where these logically related data comprises entities, attributes, relationships, and business rules of an organization's info.  Database is just a computerized record keeping system  In addition to containing data required by an organization, database also contains a description of the data which called as “Metadata” or “Data Dictionary” or “Data about Data”. Since it is called a self descriptive collection on integrated records.  The purpose of a database is to store information and to allow users to retrieve and update that information on demand.  Database is designed once and used simultaneously by many users. BY: MA
  • 17.
    Characteristics of databaseapproach  A number of characteristics distinguish the database approach from the traditional approach of programming with files.  Self-Describing Nature of a Database System  Insulation between Programs and Data, and Data Abstraction  Support of Multiple Views of the Data  Sharing of Data and Multiuser Transaction Processing BY: MA
  • 18.
    Advantages of Usingthe DBMS Approach  Controlling Redundancy  Restricting Unauthorized Access  Providing Backup and Recovery  Data Abstraction  Data Independence  Support Multiple view for different Users BY: MA
  • 19.
    Actors on theScene  Database Administrators: – The DBA is responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring software and hardware resources as needed. – The DBA is accountable for problems such as breach of security or poor system response time. BY: MA
  • 20.
     Database Designers: –Database designers are responsible for identifying the data to be stored in the database and for choosing appropriate structures to represent and store this data. – These tasks are mostly undertaken before the database is actually implemented and populated with data. – It is the responsibility of database designers to communicate with all prospective database users, in order to understand their requirements. BY: MA
  • 21.
     End Users: –End users are the people whose jobs require access to the database for querying, updating, and generating reports. BY: MA
  • 22.
     System Analystsand Application Programmers (Software Engineers) – determine the requirements of end users, especially naive and parametric end users, and develop specifications for canned transactions that meet these requirements. – Application programmers implement these specifications as programs; then they test, debug, document, and maintain these canned transactions. – Such analysts and programmers (nowadays called software engineers) . BY: MA
  • 23.
    Basic Database Terminologies Enterprise – an organization : A library, a bank, a university, etc.  Entity – Person, place, thing, or event (property of an entity) – An "object" in the real world that we are interested in: – The object student is an entity  Attribute (Field) – A character or group of characters (alphabetic or numeric), that has a specific meaning. Eg. Name, age, telephone, grade, sex, etc. BY: MA
  • 24.
     Record – Alogically connected set of one or more Attributes that describe a person, place or thing. (Logically related data)  File – A collection of related records. For example, a file might contain data about customers; or students of a certain department in a university.  Database – Collection of Files BY: MA
  • 25.
    Different database models Hierarchical data model – Organize data in a tree structure – There is a hierarchy of parent and child – Data modeling to be one-to-many  Network data model – The same as hierarchical, but network model permits the modeling of many-to-many relationship – A child can have more than one parent BY: MA
  • 26.
     Relational datamodel – Stores data in the form of tables – A table is a collection of records – Each table corresponds to an entity – Allows the definition of data and integrity constraints  Object-oriented data model – Faster than relational database model – Applications require less code – Add database functionality to object programming language BY: MA
  • 27.