You are on page 1of 67

Group members:-

ABDULBASIT
MUHAMMAD IQRASH
MUHAMMAD IRFAN
MUHAMMAD RASHID
MUHAMMAD MUDASSAR
Building
solutions.
By abdul basit
BUILDING SLUTIONS:
• DATA BASE
• FILE PROCESSING SYSTEM
• DATA BASE MANEGEMENT SYSTEM
• SYSTEM DEVELOPMENT
• APPLICATION DEVELOPMENT LANGUAGE AND TOOLS
Data
Base
what is data base ?
Data base is the collection of data organized in a manner
that allows acces , retrieval and uses of that data.
• Data is bascically the collection of the unprocess Items
which include the text ,numbers ,images,audio and vedio. In
process form it is known as information,.
The hierarchy of data:

Data is organized in layers. In the computer profession, data is classified


in a Hierarchy. Each higher level of data consists of one or more items
from the lower level. For example, a member has an address, and an
address consists of letters and numbers. Depending on the application
and the user, different terms describe the various levels of the hierarchy
as
Data types:
• Text (also called alphanumeric) — letters, numbers,
or special characters

• Numeric — numbers only

• AutoNumber — unique number automatically


assigned by the DBMS to each added

record

• Currency — dollar and cent amounts or numbers


containing decimal values

• Date — month, day, year, and sometimes time


information

• Memo — lengthy text entries

• Yes/No — only the values Yes or No (or True or


False)

• Hyperlink — Web address that links to a document


or a Web page

• Object — photograph, audio, video, or a document


created in other programs
Characters:-
A bit is the smallest unit of data the computer can process. Eight bits grouped
together in a unit comprise a byte. In the ASCII and EBCDIC coding schemes, each byte
represents a
single character, which can be a number (4), letter (R), punctuation mark (?), or other
symbol (&).

Fields:-
A field is a combination of one or more realted characters or bytes and its smallest unit of
data auser acccess.
A Field name is used to identify each field. We can use the field name to access the data.
Records:-
A record is a group of related fields. For example, a member record includes a set of fields
about one member. A key field, or primary key, is a field that uniquely identifies each record
in a file. The data in a key field is unique to a specific record. For example, the Member ID field
uniquely identifies each member because no two members can have the same Member ID.

Data files (File):-


A data file is a collection of related records
stored on a storage medium such as a hard disk,CD, or DVD. A Member file at a discount
ware house might consist of hundreds of individualmember records. Each member record
in the file contains the same fields. Each field, however contains different data.
File mantenance:-
File mantenance is refers to the procudure that keeps data
current. File maintenance include ADDING record ,
MODIFYING record and DELETING record from a file . User
add a new records to a file when user obtain the additional data
that should be stored then we can modify the DATA FILE .
Validating bata:-
Validating is the process of comparing data with a set of rules or values to find out
if the data is correct. Many programs perform a validity check that analyzes entered data to help
ensure that it is correct. For instance, when a membership services associate adds or changes
data in a member record, the DBMS tests the entered data

There are some process which used to chk the data to cheak that data is valid or not valid.
Various types of validity checks
• include alphabetic checks,
• numeric checks,
• range checks,
• consistency checks
• completeness checks.
• Check digit
ALPHABETIC/NUMBERIC CHECK:-
An alphabetic check ensures that users enter only alphabetic data
into a field. A numeric check ensures that users enter only numeric data into a field. For
example,
data in a First Name field should contain only characters from the alphabet. Data in a postal
code
field should contain numbers (with the exception of the special characters such as a hyphen).
RANGE CHEAK:-
A range check determines whether a number is within a specified range. Assume
the lowest annual membership fee at the discount warehouse is $25.00 and the highest is
$90.00.
A range check on the Annual Fee field ensures it is a value between $25.00 and $90.00.
CONSISTENCY CHEAK:-
A consistency check tests the data in two or more associated fields to ensure
that the relationship is logical.
EXAMLE:-
the value in a Date Joined field cannot occur earlier in time than a value in a Birth Date field.
COMPLETENESS CHECK:-
A completeness check verifies that a required field contains data.
EXAMPLE
some fields cannot be left blank; others require a minimum number of characters. One
completeness check can ensure that data exists in a Last Name field. Another can ensure that a
day, month, and year are included in a Birth Date field.
CHECK DIGIT:-
A check digit is a number(s) or character(s) that is appended to or inserted in
a primary key value. A check digit often confirms the accuracy of a primary key value. Bank
account, credit card, and other identification numbers often include one or more check digits.
File processing
system
File processing system
• In past many organization stored data in files on tape disk.

• Each department in organization has its own set of file.

• Record in one file not rotate with other file


Disadvantages
 Data redundancy and inconsistancy
• In file processing system same data duplicate several files .This is
called redundancy.
• Data of one student appear in two files called redundancy
• Higher storage cause
 Inconsistancy
• Address change, It must be change in both files.
• Possibility data “student” file change not “library”
• In this case, data inconsistance.
 Data isolation
• Various file data store file processing system
• But difficult to write new application
• Programme to retrive the appropriate data

Suppose
 If we send email message of fee student
 Stand data from both files
 Difficult to generate such type of list.
 Integrity problems
• Realibilty and accuracy of data.
• Roll no, marks, numeric value.
• It is difficult file using file processing system .
 Programme Data Dependency

• Data store in file.


• Specific programme require to up date
• Format file change, application of need to be change.

Atomicity Problems

Operation perform on data


Necessary to complete all steps of work
If all steps not complete Atomicity problems
• Example
Money trasfer account A to B
o Money reduced account A
o Add money account B
When 1st operation perform light off it means you perform 1st and not 2nd
.It make your data inconsistance.
Security Problems

File processing system adequate security not provide


For example:-
o A data entry operator allowed enter data
o Chairman organization should be able to deflect or access data
completely.
o Such security not provide file processing system.
Maintenance

• Programme develope in file processing system difficult to maintain


• Lot budget spent maintenance
• New programme develope difficult
• Database approach
• Database means the collection of data while the database management
system (D.B.M.S) is basically computer record base system so , The
database approach is a collection of interrelated data store together to
serve multiple application
• Database approach provide the facility of sharing data by the use of data
management system.
• The purpose of database that if you keep data in it . It use for many
purpose
• Advantage of database approach
• Redundancy control
• In database approach data is not duplicate by the use of primary key
concept so, redundancy control

• Consistency
• In database approach when we change data for example roll no of a
student . The program made by this data automatically change the roll
no of student by the use of F. key concept which connect two table
• Data security
• Security is the protection of database from unauthorized access
• In database approach security is provide by the use of password
• In database approach data entry operator only enter the data. While the
chairman of organization are able to access and delete the data so, in database
approach well security is provide
• Data atomicity
• In data base approach atomicity problem is removed
• In database approach it is not possible that the process has five step and
execute one or two step but it is possible that all step of process execute at
once or does not execute any step . so, in this way atomicity problem is
removed.
• Disadvantage
• Data in database more complex then file processing system
• DBMS is complicated and required additional memory , processing power
,powerful hardware
• DBMS is very large and sophisticated so , it has high cast
• Data in database more vulnerable then file processing system because
many users and program share this data . If this data is damage , many
users are not be able to perform their jobs
• Types of database
• Relational database
• In relational database both data and relation of data are store in the form
of table which contains rows and columns
• In relational database rows are called tuples
• While the columns are called attributes .
Object Oriented Database
• OODB store data in objects
• Object is an item which contain data as well as action process the data
• Example
• In OODB include media data base which store image , audio clips ,
video clips
• CAD(computer aided design) database that store data about
engineering and architecture
• Multidimensional database
• Data store in dimensions is called multidimensional data base(MDDB)
• RDB store data in two dimensions
• MDDB store data in more then two dimensions
• The advantage of multi dimensional database is that it consolidate data
much faster then relational database
• In MDDB data store in data warehouses
• The MDDB is also known as hypercube
Big data
• Big data is Extremely large data especially relating with human behavior

• When we talk about big data there are three factor of big data

Factors of Big data


• Volume
• Volume is data at rest means how many is data
• Velocity
• The rate at which big data produce is called velocity of big data
• Variety
• Means how many type of big data
• There are three type of big data
• Use Big data
• 1)Banking sector
• 2)Government sector
• 3)Manufacturing sector
• 4)Health care
• 5)Education sector
Data base
manegement
system
:DATABASE MANAGEMENT SYSTEM:
A database management system (DBMS), or database program, is software that allows
you to create, access, and manage a database. DBMSs are available for many sizes and
types of computers . Whether designed for a small or large computer, most DBMSs
perform common functions.
There are some famous DBMS manufactures which are as following
• Oracle
• IBM
• Microsft
• Teradata
• Sybase
DATA DICTIONARY:-
A DATA DICTIONARY contains data about each file in the database and each
field within those files. For each file, it stores details such as the file name, description, the file’s
relationship to other files, and the number of records in the file.
For each field, it stores details such as
the field name, description, field type,
field size, default value, validation rules,
and the field’s relationship to other fields.
File Retrieval and Maintenance:
A DBMS provides several tools that allow users and programs to retrieve and maintain data
in the database. To retrieve or select data in a database, you query it. A query is a request for
specific data from the database. Users can instruct the DBMS to display, print, or store the
results of a query. The capability of querying a database is one of the more powerful database
features.

A DBMS offers several methods to retrieve and maintain its data. The four more commonly
used are query languages, query by example, forms, and report generators. The following
paragraphs describe each of these methods.
QUERY LANGUAGE
• . A query language
consists of simple,
English-like statements
that allow users to
specify the data to
display, print, or store.
• Each query language
has its own grammar
and vocabulary.
• A person without a
programming
background usually
can learn a query
language in a short
time.
FORM:-
A form, sometimes called a data entry form, is a window on the screen that provides areas for
entering or changing data in a database. You use forms (such as the Member Maintenance form in
to retrieve and maintain the data in a database.
To reduce data entry errors, well-designed forms should validate data as it is entered. When
designing a form using a DBMS, you can make the form attractive and easy to use by incorporating
color, shading, lines, boxes, and graphics; varying the fonts and font styles; and using other
formatting features.

REPORT GENERATOR :-
A report generator, also called a report writer, allows users to design a
report on the screen, retrieve data into the report design, and then display or print the report.
Report generators usually allow you to format page numbers and dates; titles and
column headings; subtotals and totals; and fonts, font sizes, color, and shading.
Backup and Recovery:-
Occasionally a database is damaged or destroyed because of hardware failure, a
problem with the software, human error, or a catastrophe such as fire or flood. A DBMS
provides a variety of techniques to restore the database to a usable form in case it is
damaged or destroyed.

• A backup, or copy, of the entire database should be made on a regular basis. Some
DBMSs have their own built-in backup utilities. Others require users to purchase a
separate backup utility, or use one included with the operating system.
• More complex DBMSs maintain a log, which is a listing of activities that change the
contents of the database.
• A DBMS that creates a log usually provides a recovery utility. A recovery utility
uses the logs and/or backups to restore a database when it becomes damaged or
destroyed.
• Continuous backup is a backup plan in which all data is backed up whenever a
change is made.
Data Security:-
A DBMS provides means to ensure that only authorized users
access data at permitted times. In addition, most DBMSs allow different
levels of access privileges to be identified for each field in the database.
These access privileges define the actions that a specific user or group of
users can perform. Access privileges for data involve establishing who can
enter new data, change existing data, delete unwanted data, and view data.
System
development
System development:-
A system is a set of components that interact to achieve a common goal.
Businesses use many types of systems. A billing system allows a company
to send invoices and receive payments from customers. Through a payroll
system, employees receive paychecks. A manufacturing system produces
the goods that customers order. An inventory system keeps track of the
items in a warehouse. Very often, these systems also are information
systems
System development cycle:-
The system development cycle is a set of activities used to build an information system.
System development cycles often organize activities by grouping them into larger categories
called phases. Most system development cycles contain five phases:

1. Planning
2. Analysis
3. Design
4. Implementation
5. Operation, Support, and Security
A systems
analyst is
responsible
for designing
and
developing an
information
system. The
systems
analyst is the
users’
primary
contact
person.
Project Management:-
Project management is the process of planning, scheduling, and then controlling the activities
during the system development cycle. The goal of project management is to deliver an acceptable
system to the user in an agreed-upon time frame, while maintaining costs.
To plan and schedule a project effectively, the project leader identifies the following elements
for the project:
• Goal, objectives, and expectations of the project, collectively called the scope
• Required activities
• Time estimates for each activity
• Cost estimates for each activity
• Order of activities
• Activities that can take place at the same time
Documentation:-
During the entire system development cycle, project members produce much documentation.
Documentation is the collection and summarization of data and information. It includes reports,
diagrams, programs, or any other information generated during the system development cycle.

It is important that all documentation be well written, thorough, consistent, and


understandable.
The final information system should be reflected accurately and completely in
documentation
developed throughout the development cycle. Maintaining up-to-date documentation
should be an ongoing part of system development.
Planning phase:
The planning phase for a project begins when the steering committee
receives a project request. This committee usually consists of five to nine
people. It typically includes a mix of vice presidents, managers,
nonmanagement users, and IT personnel. During the planning phase, four
major activities are performed:
(1) review and approve the project requests;
(2) prioritize the project requests;
(3) allocate resources
(4) form a project development team for each approved
project.
Analysis Phase
The analysis phase consists of two major activities:
(1) conduct a preliminary investigation
(2) perform detailed analysis.
THE PRELIMINARY INVESTIGATION:-
The main purpose of the preliminary investigation, sometimes called the
feasibility study, is to determine the exact nature of the problem or
improvement and decide whether it is worth pursuing.
The first activity in the preliminary investigation is to interview the user who
submitted the project request. Depending on the nature of the request, project
team members may interview other users, too.
DETAILED ANALYSIS
Detailed analysis involves three major activities:
(1) study how the current system works;
(2) determine the users’ wants, needs, and requirements;
(3) recommend a solution.

Detailed analysis sometimes is called logical design because the systems analysts
develop the proposed solution without regard to any specific hardware or software. That is,
they make no attempt to identify the procedures that should be automated and those that
should be manual.
Design Phase
The design phase consists of two major activities

(1) if necessary, acquire hardware and software


(2) develop all of the details of the new or modifiedinformation system.
The Systems analyst often performs these two activities at the same time instead of
sequentially.
Implementation Phase:-
The purpose of the implementation phase is to construct, or build, the
new or modified system and then deliver it to the users. Members of the system
development team perform four major activities in this phase:
(1) develop programs,
(2) install and test the new system,
(3) train users,
(4) convert to the new system.
Operation, Support, and Security Phase
The purpose of the operation, support, and security phase is to provide
ongoing assistance for an information system and its users after the system is
implemented. The support phase consists of three major activities:

(1) perform maintenance activities,


(2) monitor system performance, and
(3) assess system security.
PROGRAMMING
LANGUAGE
What is the programming language?
• A programme language is a notation for writing
programs,which are specification of a computation or
algorithm.
• A programming language is a special language
programmers use to develope applications, script, or
other set of instructions for computers to execute.
Types of progamming language
There are two types of programming languages:
• Low level languages
• High level languages
Low level languages
• A low level languages is a programming language that
provides little or no abstraction of programming concepts,
and is very close to writing actual machine instructions.

Two good examples


Two good examples of low level languages are assembly
and machine code.
• Programms written in low-level languages can be crafted
to run very fast and with a very small memory footprint.
Low-level languages are considered more difficult to use,
however, because they require a deeper knowledge of the
computer’s inner workings.
First generation programming
languages(Machine code)
• Machine code or machine language is the name for command.
They can directly be executed by a processor. Usually, they are 1s
and 0s. Their order tells the computer what to do. This code is the
lowest level of software. All other kinds of software need to be
translated into machine code before they can be used.
• Each processor has its own machine code.
• Each instruction is made up of an operation code and
operand(mathematical operation).An instruction tells the
computer to do one thing. The operands are usually memory
addresses. An instruction set is a list of the opcodes used in a
computer. Machine code is what assembly code and other
programming languages are compiled to or interpreted as.
• Program builders turn code into another language or machine
code. Machine code is sometimes called native code. This is used
when talking about things that work on only some computers.
Second generation
programming
languages(Assembly languages)
• Sometimes refferd to as assembly or ASL, assembly
language is a low-level programming language used
to interface with computer hardware. Assembly
language used structured commands as substitutions
for numbers allowing humans to more easily read the
code versus looking at binary. Although easier to read
than binary, assembly language is a difficult language
and is usually substituted for a higher language such
as C. Below is an example of assembly language in a
debug routine.
High level languages

• A high-level language is a computer programming language that isn’t


limited by the computer, designed for a specific job, and is easier to
understand. It is more like human language and less like machine
language. However , in order for a computer to understand and run a
pragram created with a high level language, it must be compiled into
machine language.
Thank you for
listining

You might also like