Professional Documents
Culture Documents
INFORMATION SYSTEM
Data is a precious thing and will last longer than the systems
themselve
Tim Berners
-Lee
1. identify
the six parts of the information system
2. discuss how organizations are structured according to five functions and three
management level
s
3. describe
the information flow
in an organization
1.0 Introduction
1
based information systems, decision support systems, management information
systems, decision support systems and executive support systems.
Discovery Learning:
Study an organisation
close to you and identify the different parts that make up its
information system.
2
Depending on the services or products they provide, most organisations have
departments that perform five basic functions. These are accounting, production,
marketing, human resources and research(see figure 1.1).
Functional Perspective
5. Research department: conducts two tasks (1) Product research. That is,
it does basic research and relates new discoveries to the firms current or
new products. (2) Product development. That is, it develops and tests new
products created by research people. It also monitors and troubleshoots
3
new products as they are being produced. For example, at Viti Group of
Companies the research department identifies and creates new furniture
designs.
Completion
a) Function that plans, prices, promotes, sells and distributes the organizations
goods and services are known as _____________.
a) An information system has six parts which include people, data and
procedures. List the other three parts of an Information System and describe
their roles.
Most people who work in an organisation are not managers, of course. At the
base of the organisational pyramid are the secretaries, receptionists, joiners,
carpenters, messengers and drivers. These people produce goods and services.
Above them however, are various levels of managers, people with titles such as
4
supervisor, director, regional manager and vice president. They are responsible
for planning, organising and controlling, to ensure work is done. In smaller
organisations, these titles are often combined.
Managerial Levels
5
Each level of management has different information needs; top-level managers
need information that is summarised in capsule form to reveal the overall
condition of the business. They also need information from outside the
organisation, because top-level managers need to forecast and plan for long-
range events. Middle-level managers need summarised information, weekly or
monthly reports. They need to develop budget projections as well as to evaluate
the performance of supervisors. Supervisors need detailed, very current day-to-
day information on their units so that they can keep operations running smoothly
(see figure 1.3).
Top managerial
-level information flowvertical,
is horizontal,
and external.
Middle a
mnagerial
-level information flow
is vertical
and horizont
al.
Figure
1.3
Supervisory The
Flow of
- level information flow is vertical.
Information withinorganisation
an
The four most common types of computer based information system used in
an organisation are transaction processing system, management information
system, decision support system, and executive support system(see figure 1.4).
6
2. Management information system (MIS): summarises the detailed data of
the transaction processing system in standard reports. Such reports might
include production schedules and budget summaries.
3. Decision support system (DSS): provides a flexible tool for analysis. The
DSS helps managers make decisions about unstructured problems, such as
the effect of events and trends outside the organisation. Like MIS, the DSS
draws on the detailed data of the transaction processing system.
ESS:use internalata
d from MIS and TPS and
ESS external data to
pport
su top
-level managers.
MIS
MIS: use data from TPS to support
-level
middle
mana
gers.
TPS
TPS:record day
-to-day transactions to support
supervisors.
7
Accounting
General ledger
The sales order processing activity records the customers requests for the
companys product or service. When an order comes in for any product, the
warehouse is alerted to ship the product.
The parts and finished goods that the company has in stock are called
inventory. An inventory control system keeps records of the number of each
kind of part or finished good in the warehouse. Purchasing is buying of
materials and services. Often a purchase order is used. This is a form that
shows the name of the company supplying the materials or service and what
is being purchased.
Accounts payable refers to money the company owes its suppliers for
materials and services it has received.
The general ledger keeps track of all summaries of all the foregoing
transactions. A typical general ledger system can produce income statements
and balance sheets. Income statements show a companys financial
performance, income, expenses and the difference between them for a
specific time period. Balance sheets list the overall financial condition of an
organisation. They include assets (for example, buildings and property
owned), liabilities (debts), and how much of the organisation (the equity) is
owned by the owners.
8
Review Exercise 1.2
Completion
a) The accounting activity that records the customer requests for the companys
products or services is sales order ______________.
b) An information system that records day to day transactions.
__________________
c) The parts and finished goods that a company has in stock. _________________
d) The accounting activity concerned with calculating employee paychecks is
referred to as ___________________.
Accounting
Inventory &
Payroll 1 2 3
purchasing
9
(i) Give a reason for your answer in (i) above.
10
computer programmers. Thus, a DSS must be easy to use, or most likely it will
not be used at all. Commands need to be in language-like English: SEARCH or
FIND, for instance.
How Does A Decision Support System Works?
Essentially, it consists of four parts:
(i) User
(ii) system software
(iii)data
(iv) decision models.
(i) The user: the user could be you. In general, the user is someone who has
to make decisions; a manager, often a top-level manager.
(ii) System software: the system software is essentially the operating system
programs designed to work behind the scenes to handle detailed operating
procedures. In order to give the user a good, comfortable interface, the
software typically is menu or icon driven. That is, the screen presents easily
understood lists of commands or icons, giving the user several options.
(iii) The data: the data in a DSS is stored in a database and is of two kinds.
(iv) The decision models: the decision models give the DSS its analytical
capabilities. There are three basic types of models:
11
organisations databases in meaningful patterns. However, EIS is specifically
designed to be easy to use. This is so that a top executive with little spare time
can obtain essential information without extensive training. Thus, information is
often displayed in very condensed form and in bold graphics.
EISs not only permit a firms top executive to gain more direct access to
information about the companys performance. Some of them also have
electronic mail setups that allow managers to communicate directly with other
executives. Some systems even have structured forms to help managers
streamline their thoughts before sending electronic memos. In addition, EIS may
be organized to retrieve information from database outside the company, such
as business-news services. This enables a firm to watch for stories on
competitors and stay current on relevant news events that could affect its
business.
Information workers use office automation system and knowledge work system.
Information workers create, distribute, and communicate information. They
are the organisations secretaries, clerks, engineers and scientists to name a few.
Some are involved with distribution and communication of information and are
called data workers for example, secretaries and clerks. Others involved with
the creation of information are called knowledge workers for example,
engineers and scientists.
They two systems that support information workers are:
Discovery Learning:
12
Review Exercise 1.3
Completion
d) Flexible tool for analysis that helps managers make decisions about
unstructured problems.
___________________
b) The Decision Support System (DSS) has four parts. Two of them are decision
models and the user. Name and describe the other two parts of the DSS.
Summary
3. Production department makes the product or service using raw materials and
people to turn out finished goods.
4. Human resource department finds and hires people, handles such matters as
sick leave, retirement benefits, evaluation, compensation, and professional
development.
13
5. Research department conducts product research and development, monitors
and troubleshoots new products.
10.Office automation system (OAS) supports data workers who are involved with
distribution and communication of information.
Key Terms
14
2) Within an organisation, the flow of information in the supervisory level is
mainly
A. vertical.
B. diagonal.
C. horizontal.
D. horizontal and vertical.
Additional Readings
15
CHAPTER 2
1. d
escribe the 6 phases of thelife
systems
cycle
2. discuss
the two alternatives to the systems life cycle
2.0 Introduction
16
The last chapter described different types of information system. What exactly is
a system? It can be defined as a collection of activities and elements organised
to accomplish a task. As discussed in chapter 1, an information system is a
collection of hardware, software, people, procedures, data and the internet.
These works together to provide information essential to running an
organisation. This information helps produce a product or service and, for profit
oriented businesses to derive a profit.
From time to time organisations need to change their information systems due to
organisational growth, mergers and acquisitions, new marketing opportunities,
revision in government regulations and availability of new technology.
Chapter 2 will look at the different phases that need to be followed in order to
create or improve an information system.
System analysis and design is a six phase problem- solving procedure for
examining and improving an information
system. The six phases make up the
Phase 1
systems life cycle. (See figure 2.1) Preliminary
investigation
Systems analyst
s
Viti Bank is used as an example of an organisation in this chapter. The six phases
of the systems life cycle are as follows:
As the system analyst of Viti Bank, you have been tasked to examine the current
information system. Viti Bank is a fast growing bank in Fiji. Customers in remote
rural areas are finding difficulty to access the bank services. It takes them days
or even weeks to travel to a location to access the bank services. With the vision
of meeting customers needs, the bank has requested your services to examine
the current system and to come up with solutions or recommendations of how
the current system can be improved to meet its customers needs.
18
2. Suggesting Alternative Solutions
This step is simply to suggest some possible plans as alternatives to the present
arrangement. For example hire more workers, improve on the existing system or
purchase off-the-shelf packaged software.
After examining Viti Bank current system, we have come up with the solution to
have mobile rural banking. The banking services is to be taken to their door
steps, making the service readily available to the customers and banking
services is increased since customers do not have to wait for long to bank.
Therefore the current information system needs to be improved to meet for this
new service. At times there would be no need to design a new system but to
improve the existing system.
For large projects, the systems analyst would write a short report summarizing
the results of the preliminary investigation and suggesting alternative systems.
The report may also include schedules for further development of the project.
This document is presented to higher management, along with a
recommendation to continue or discontinue the project. Management then
decides whether to finance the second phase, the system analysis.
Completion
a) The computer professional who uses the systems life cycle is called a
___________ _________.
a) List two reasons why organisations need to change their information system.
19
b) State the three tasks carried out in phase 1.
1. Gathering Data
Here the system analyst or end user is doing systems analysis, expands on data
gathered during Phase 1. He or she adds details how the current system works.
Data is obtained from observation, review of current system documentations and
interviews. Observe the current system in operation. In addition data may be
obtained from questionnaires given to people using the system. Data can also be
obtained from studying documents that describe the formal lines of authority and
standard operating procedures. For example, an organisational chart shows
levels of management formal lines of authority.
For Viti Bank , questionnaires are given out to customers from rural areas and
employees of the bank. The IT department, employees who use the system and
customers were also interviewed on the current system and how it can be
improved. Documentations and organizational chart of the bank were also
studied to give in depth idea of the banks operations. Observations were also
carried out on the daily operations of the bank. The target customers in this case
are the ones from rural remote areas. Their organizational chart as shown in
figure 2.4 was also studied to give in depth information regarding their
organisation.
20
CEO
Chief
Chief Operating Communications
Development
officer Director
Officer
Traning Quality
Agency services Operations
Assurance
Inventory
In this step, data is analyzed to learn how information currently flows and to
pinpoint why it is not flowing appropriately. The main focus of this step is to
apply logic to the existing arrangement to see how workable it is. Many times the
current system is not operating correctly because prescribed procedures are not
being followed. That is, the system may not really need to be redesigned. Rather,
the people in it may need to be shown how to follow correct procedures.
Many different tools are available to assist systems analyst and end users in the
analysis phase. Some of the principal ones are the top -down analysis method,
grid charts, system flow charts, data flow diagrams, and automated design tools.
22
Data flow diagrams (DFD): show the data or information flow within an
information system. The data is traced from its origination through
processing, storage and output as shown in figure 2.7.
23
Standard data flow diagram symbols
Viti Bank used various tools for analyzing it data gathered in task 1. Checklist
was prepared where a list of questions was asked to customers and employees of
the bank. The system flow and data flow diagrams were drawn to see how data
and information was flowing in the organisation. A system analysis report was
than compiled on the results of the data gathered and analysed for higher
management of the bank.
Discovery learning:
What are the uses of PERT and Gantt charts?
24
2.4 Phase 3: System Design
When choosing the best design, managers must consider these four questions :
Will the system fit in with the organization's overall information system?
Will the system be flexible enough so it can be modified in the future?
Can it be made secure against unauthorized use?
Are the benefits worth the cost?
25
The report is prepared for higher management and describes the alternative
designs. It presents the costs versus the benefits and outlines the effects of
alternative designs on the organization. It usually concludes by recommending
one of the alternatives.
Completion
Short Answer
d) List the four questions that managers must consider when selecting the
best system.
26
2.5 Phase 4: System Development
Application software for the new information system can be obtained in two
ways. It can be purchased as off-the-shelf packaged software and possibly
modified, or it can be custom designed. If any of the software is to be specially
created, six steps in software development are carried out.
2. Acquiring hardware
Some new systems may not require new computer equipment, but others will.
The kinds needed and the places they are to be installed must be determined.
This is a very critical area. Switching or upgrading equipment can be an
immensely expensive proposition.
Questions that may arise when acquiring hardware are:
Will a personal computer system be sufficient as the company grows?
Are networks expandable?
Will people have to undergo costly training?
After the software and equipment have been installed, the system should be
tested. Sample data is fed into the system. The processed information is then
evaluated to see whether results are correct. Testing may take several months if
the new system is complex.
Viti bank custom made its software for its new system , More laptops were
bought to cater for the mobility of the system. Other required hardware were
also obtained to allow for the operation of the new system. Sample data was fed
into the system to see if it works.
27
Discovery learning:
What are the six steps in software development?
1. Conversions
iv. In the pilot approach the new system is tried out in only one part of the
organization. Once the system is working smoothly in that part, it is
implemented throughout the rest of the organization. The pilot approach is
certainly less expensive than parallel approach and is also somewhat riskier.
However, the risks can be controlled because problems will be confirmed to
only certain areas of the organization. Difficulties will not affect the entire
organization.
28
v. In the phased approach, the new system is implemented gradually over a
period of time. The entire implementation process is broken down into parts
or phases. Implementation begins with the first phase and once it is
successfully implemented, the second phase begins. This process continues
until all phases are operating smoothly. This is an expensive proposition
because the implementation is done slowly. However, it is certainly one of the
least risky approaches.
In general, the pilot and phased approaches are the most favored methods. Pilot
is preferred when there are many people in an organization performing similar
operations, for instance, all sales clerks in a department store. Phased is more
appropriate for organisations in which people are performing different
operations. Figure 2.12shows that each conversion method has risks and cost
factors.
Discovery learning:
What are some other names for direct approach?
http://secure.com.sg/courses/PIS/Grab/Ass_03_Final_Exam_Stu
ff/Student_Pr
esentations_to_Study_PDF/Group_09_Member_01_Data_Conver
sion.pdf
2. Training
29
is delivered so that they can adjust more easily. In some cases, a professional
software trainer may be brought in to show people how to operate the system.
Viti bank chose to have a phased conversion. The new system was implemented
in a small part of Naitasiri, where customers were introduced into the rural
banking system while the rest of the customers continued with the old system.
The new system was than gradually introduced in other rural areas. Customers
and employees was also trained on how to use the new system.
After implementation is systems maintenance, the last step in the systems life
cycle. This phase is very important, an ongoing activity. Most organisations
spend more time and money on this phase than in any other. Maintenance has
two parts:
(1) systems audit
(2) periodic
evaluation.
The six phases of the systems life cycle is summarized in the table
below.
Phase Activity
30
Discovery learning:
In Fijis secondary schools, what is the most common method of conversion used when
something new is introduced into schools e.g. bus fare vouchers and why.
It is often necessary to follow every phase of the systems life cycle but often
there is no time to do so. For example, hardware may change so fast that there is
no opportunity for evaluation, design and testing. Two alternative approaches
that require less time are prototyping and rapid applications development (RAD).
Prototyping
Discovery learning:
What are some advantages and disadvantages of prototype?
Completion
31
b) In _________________ conversion the old and the new system is operated side
by side.
c) The two tasks carried out in phase 6 are systems _______________ and ________
____________.
Summary
2. Systems analysis and design is a six phase procedure for examining and
improving an information system. The phases are :
9. System analysts are the computer professionals who typically follow the six
phase systems life cycle.
10.Two alternatives to system analysis life cycle that requires less time are
prototyping and RAD.
32
12.RAD uses powerful development software, small specialized teams and highly
trained personnel.
Key Terms:
B. Systems analysis
33
C. Systems design
D. Systems maintenance
E. Preliminary investigation
A. one . B. two.
C. three.
D. four.
3. Which conversion method begins by trying out a new system in only one part
of the organisation?
A. Pilot
B. Direct
C. Parallel
D. Phased
A. design phase.
B. analysis phase.
C. development phase.
D. implementation phase.
A. CASE
B. Data flow
C. Grid chart
D. System flowchart
A. C.
B. D.
34
Review Exercise Short Answer
1. What is a system?
2. Who is a system analyst?
3. What is an organizational chart?
4. List and explain the six phases of the systems life cycle.
5. Due to time constraints , what are two alternatives to the systems life cycle?
6. Describe each type of system conversion. Which is the most commonly used?
7. Explain the two tasks carried out in systems maintenance.
8. Differentiate between prototyping and RAD.
9. Study the diagram given below and answer the questions that follow.
Old
New
35
2. You have been hired by the University of Southern Paradise to be the Systems
Analyst. After successfully completing the first three phases of the Systems
Analysis and Design, the University decided to develop and convert to the
new computerised student registration system.
Give a detailed explanation of how you will assist the University in the
Systems Development and Implementation phases.
Provide examples to clarify your points.
Recommend which conversion method the University should implement
and state the reason for your recommendation.
3. Once the new system is tested, the next phase is to implement that system.
There are four different conversions used to install the new system in an
organisation.
(i) List and describe the four conversions.
(ii) For each conversion, discuss one advantage and one disadvantage.
(iii) From your discussion in part (ii), arrange the four conversions from
most risky to least risky.
Additional Readings
36
So, what you can do in Microsoft Word is what Bill Gates has decided. What y
do in Oracle Database is what Larry Ellison and his crew have decided.
Ted Nelson
After completing
this chapter, you will be able to:
2. d
iscuss the three types of file
sation
organi
3. explain
the five common database models
4. distinguish between
the four kinds
of databases
5. discuss strategic
database uses and security concerns.
3.0 Introduction
Today data is much richer and includes audio, music, photographs and videos.
There are two ways to view data: physical and logical view. The physical view
focuses on the actual format and location of the data. Specialized computer
professionals are concerned with the physical view. The logical view focuses on
37
meaning, content and context of the data. End users and most computer
professionals are concerned with this view.
Chapter 3 presents the logical view of data and how data is stored in databases.
In the logical view, data is organised into groups or categories as given below.
Each group is more complex than the one before.
Key field also known as a primary key which is a unique field that identifies a
record in a database. Tables can be related or connected to other tables by
common key fields. In figure 3.1, employee id is the key field.
For most students database, the key field is a student identification number. Key
fields in different tables can be used to integrate the data in a database.
38
Figure 3.1 Design view or employees
recordtable
Discovery learning:
Give other examples of batch processing and real time processing in your
community.
39
Two types of files which are commonly used to update data are transaction file
and master file.
The transaction file contains recent changes to records that will be used to
update the master file. An example could be a temporary holding file that
accumulates electricity charges or credit card charges through the present
month. At the end of the month, the transaction file containing all the new
charges is used to update the master file. The result is a new master file that
is current up to the end of the month.
The master file is a complete file containing all records current up to the last
update. An example is the data file used to prepare your last months
electricity bill or credit card bill.
File organisation may be of three types: sequential, direct and index sequential.
This organisation is very efficient whenever all or a large portion of the records
need to be accessed for example when final grades are to be mailed out. There is
also an equipment cost advantage because magnetic tapes and tape drives can
be used. Both are less expensive than disks and disk drives. One disadvantage is
that the records must be ordered in a specific way which can be time consuming.
The major disadvantage is that access to a particular record can be very slow.
For example to find the record of a particular student, you would sequentially
search through the records. It would search them one at a time until the
students number is found. If the number is 4205, the computer will start with
record number 0000, 0001, 0002 until it reaches the students number.
40
Figure 3.2 Sequential file organisation
ii. Direct file organisation is where records are not stored physically one after
the other but are stored on a disk in a particular address or location which
can be determined by their key field. This address is calculated by a
technique known as hashing. Hashing programs use mathematical
operations to convert the key fields numeric value to a particular storage
address. These programs are used to initially store records and later to
relocate them. Figure 3.3 shows direct file organisation.
Unlike sequential access files, which are stored on magnetic tape or disk, direct
files can only be stored on disk. The primary advantage is that direct file
organisation can locate specific records very quickly. If your grades were stored
in a direct file organisation, the registrar could access them quickly using only
your student identification number.
Key field
Hashing
program
R4
41
iii. Index sequential file organisation is a compromise between sequential
and direct file organisations. It stores records in a file in sequential order and
also contains index. The index lists the key to each group of records stored
and the corresponding disk address for that group. When the user seeks a
particular record, the computer starts searching sequentially by looking at
the beginning of the record group.
For example the college registrar could index certain ranges of student
identification numbers, 000199, 200-299 and so on. For the computer to find
student number 415 it would first go to the index. The index would give the
location of the range in which the number appears on the disk ( for example
400-499). The computer would then search that range (A4) sequentially to find it.
Index sequential file organisation requires disks or other direct access storage
devices. It is faster than sequential but not as fast as direct access. It is best
used when large batches of transactions must occasionally be updated, yet users
also want frequent, quick access to data. For example, every month a bank will
update bank statements to send to its customers. However customers and bank
tellers need to be able to have up-to-the-minute information about checking
accounts.
Security: users are given passwords or access only to the kind of information
they need. Thus, the payroll department may have access to employees pay
rates, but other departments would not.
Data integrity: when there are multiple sources of data, each source may have
variations. A customers address may be listed as Main Street in one system
and Main st in another. With discrepancies like these, it is probable that the
customer would be treated as two separate people.
42
Discovery learning:
Name other application software that can be used to create database.
Database Management
Some DBMS such as Microsoft Access are designed specifically for personal
computers. Other DBMS are designed for specialized database servers. DBMS
software is made up of five parts or subsystems: DBMS engine, data definition,
data manipulation, application generation and data administration.
DBMS engine provides a bridge between the logical view of the data and the
physical view of the data.
43
The data administration subsystem helps manage the overall database
including maintaining security, providing disaster recovery support and
monitoring the overall performance of database operations. Larger
organizations normally employ highly trained computer specialists called
database administrators (DBAs) to interact with the data administration
subsystem. They also determine processing rights or determine which people
have access to what kinds of data in the database.
Database administrator
Completion
44
3.3 DBMS Structure
DBMS programs are designed to work with data that is logically structured or
arranged in a particular way. This arrangement is known as the database model.
These models define the rules and standards for all the data in a database. Five
common database models are hierarchal, network, relational, multidimensional
and object-oriented.
1. Hierarchical database
Fields or records are structured in nodes. Nodes are points connected like
branches of an upsidedown tree. Each entry has one parent node, although a
parent node may have several child nodes. This is described as one-to-many
relationships. To find a particular field, you have to start at the top with a parent
and trace down the tree to a child.
The nodes further down the system are subordinates to the ones above, like the
hierarchy of managers in a corporation. An example of a hierarchical database is
shown below (see figure 3.5).
VITI college
School
Commerce
Computer dept Maths
Departments dept dept
Mr
Mrs Mia
Kumar
Teachers
The problem with hierarchical database is that if one parent node is deleted, so
are all the subordinate child nodes. Moreover, a child node cannot be added
unless a parent node is added first. The most significant limitation is the rigid
structure: one parent only per child, and no relationships or connections between
the child nodes themselves.
45
2. Network database
Also has a hierarchical arrangement of nodes. However each child node may
have more than one parent node. It has a many-to-many relationship. There are
additional connections called pointers between parent nodes and child nodes. A
node may be reached through more than one path and may be traced down
through different branches as shown below (see figure 3.6) .
Teachers
Mr Yee Mrs Singh Mr Isoa
Students
Pritika Jese Mary Kunal
If you trace through the logic of this organization, you can see that each student
can have more than one teacher. Each teacher also can teach more than one
course. Students may take more than a single course. This shows how the
network arrangement is more flexible and in many cases more efficient that the
hierarchical arrangement.
3. Relational database
In this structure, there are no access paths down hierarchy. Data elements are
stored in different tables, each of which consists of rows and columns. A table
and its data are called a relation. Tables are connected through a common key
field. An example of a relational database is shown in figure 3.7
4. Multidimensional database
46
three or mode sides and consisting of cells. Each side of the cube is considered a
dimension of the data. In this way, complex relationships between data can be
represented and efficiently analyzed.
5. Object-oriented database
For example a Video shop might use an object-oriented video database. (See
figure 3.9). The database uses a class, Video, to define video objects that are
stored in the database. This definition includes the attributes Screen shot,
Director, Title and the method to play. TV format, DVD and QuickTime are objects
each with specific attribute values.
47
Classes
Video
Objects
TV format DVD QuickTime
Screen shot Movie poster Promo photos
Director Director Director Attributes
Title Title Title
QuickTime Method to
Decoder play
While hierarchical and network database are still widely used, the relational,
multidimensional and object oriented data models are more popular today.
Organization Description
Hierarchical Data structured in nodes organized like an upside down tree,
each parent node can have several children; each child node
can have only one parent.
Network Like hierarchical except that each child can have several
parents.
Relational Data stored in tables consisting of rows and columns.
Multidimensio Data stored in data cubes with three or more dimensions.
nal
Object- Organizes data using classes, objects , attributes and methods.
oriented
48
Databases may be classified into four types: individual, company, distributed and
commercial.
Individual
Company
Companies create database for their own use. The company database may be
stored on a central database server and managed by a database administrator.
Users throughout the company have access to the database through their
personal computers linked to local or wide area networks.
Company database are the foundation for management information system. For
example a department store can record all sales transactions in the database. A
sales manager can use this information to see which sales people are selling the
most products. The manager can then determine year-end sales bonuses or the
stores buyer can learn which products are selling well or not selling and make
adjustments when recording.
Distributed
49
Figure 3.10 Distributed database
Commercial database
Strategic uses
Database helps users to keep up to date and to plan for the future. To support
the needs of managers and other business professionals, many organizations
collect data from a variety of internal and external databases. This data is then
stored in a special type of database called a data warehouse. A technique
called data mining is often used to search these databases to look for related
information and patterns.
There are hundreds of databases available to help users with both general and
specific business purposes.
Security
One concern is that personal and private information about people stored in
databases may be used for wrong purposes. For example, a persons credit
history is used to make hiring or promotion decision. Another concern is
unauthorized users gaining access to a database, for example, launching of virus
into a network or database.
Security may require putting guards in company computer rooms and checking
the identification of everyone admitted. Some security systems electronically
check finger prints, iris scan. Security is particularly important to organizations
using WANs. Violation scans can occur without actually entering secured areas.
Today most organizations use special hardware and software called firewalls to
control access to their internal networks.
Discovery learning:
Identify other security measures that organisations can use to protect their dat
51
3.6 Creating a Relational Database
Address Text
Location Text
5. Enter details of the 15 employees with employee id and start date the same
as the first table.
6. Now the database contains two tables, a relationship needs to be created
between the tables to link the data together. Note: Relationship
Relationship type Description
52
One-to one
An association between two
tables in which each record
in the first table contains a
field value of one record in
the other table.
One to-many
An association between two
tables in which the primary
key field value in each
record in the primary table
(the one side of the
relationship) corresponds to
the value in the matching
field or fields of many
records in the related table.
Once relationships are established, rules can be enforced, called the rules of
referential integrity , to ensure that relationships between tables are valid
and related data is not accidentally changed or deleted/ The rules ensure
that a record in a primary table cannot be deleted if matching records exist
in a related table and a primary key value cannot be changed in the primary
table if that record has related records.
See that both tables are closed and work area is empty.
7. Select Database Tools tab.
8. Select relationships
9. The show table dialog box appears automatically the first time you open the
Relationships window for a database. It displays the names of both tables in
53
the database and is used to select the tables you want displayed in the
Relationships window.
10.As you select each table, a field list box displaying the field names from the
table is added to the Relationships window. Next, you need to establish the
relationship between the tables.
The Edit Relationships dialog box appears and shows how the table will be
related. You also want to enforce referential integrity between the tables.
Selecting this option will make the Cascade Update and Cascade Delete options
available. You will select these options to ensure that if you change a primary key
or delete a record , all fields that reference the primary key of that record are
likewise updated or deleted in both tables. This prevents inconsistent and
orphaned records that do not have a matching primary key record in the
associated table.
11.The two tables now display a relationship line that shows the tables are
related on the Employee id field. They have a one to one relationship as you
can tell from the 1 above each end of the relationship line.
54
12.The relationship and layout are saved. Open the Employee Records table .
There are also expand indicators at the beginning of each row. This
+
indicates there is a sub datasheet linked to + the records in this table.
Summary
Key Terms
data multidimensional
mainatenace database node
data object
attribute manipulation object oriented
batch data mining database onlinbe
processing data processing parent
character reducdancy node real time
child node data processing record
class warehouse relational database
commercial dbms sql
database entity field pointers
company firewall
database data hierarchical
administrators database
data bank data individual
cube data database
dictionary data key field
integrity logical view
56
1. ___________ is a collection of related fields.
A. character
B. record
C. table
D. file
A. Character
B. Column
C.Record
D.Field
A. hybrid database.
B. network database.
C.relational database.
D.hierarchical database.
A. a table.
B. a domain.
C.a relation.
D.an attribute.
A. First name
B. Last name
C. Date of birth
D. Birth registration number
57
A. One to-one
B. One-to-many
C. Many-to-one
D. Many to-many
A. Network
B. Relational
C. Hierarchical
D. Multidimensional
1. Study the database given below and answer the questions that follow.
(b) Name the data type that should be entered in each of the following fields:
I. LastName
II. BirthDate
58
2. Explain the purpose of creating a data dictionary when designing a database.
4. Briefly explain with the aid of a diagram how data is organised using the sequential
file method.
Student id Text
Year Text
Name of Exam Text
59
For Students Data the fields and data type are:
Personnel Data
Field names Data type
Student id Text
Address Text
Allocate a key field. Fill in details of 25 students from years 9 -13. Create a one
to one relationship. Create queries to show:
all fields for female students
Student id , last name , first name and year of students in year 10.
Additional Readings
60
61