Professional Documents
Culture Documents
ABDULBASIT
MUHAMMAD IQRASH
MUHAMMAD IRFAN
MUHAMMAD RASHID
MUHAMMAD MUDASSAR
Building
solutions.
By abdul basit
BUILDING SLUTIONS:
• DATA BASE
• FILE PROCESSING SYSTEM
• DATA BASE MANEGEMENT SYSTEM
• SYSTEM DEVELOPMENT
• APPLICATION DEVELOPMENT LANGUAGE AND TOOLS
Data
Base
what is data base ?
Data base is the collection of data organized in a manner
that allows acces , retrieval and uses of that data.
• Data is bascically the collection of the unprocess Items
which include the text ,numbers ,images,audio and vedio. In
process form it is known as information,.
The hierarchy of data:
record
Fields:-
A field is a combination of one or more realted characters or bytes and its smallest unit of
data auser acccess.
A Field name is used to identify each field. We can use the field name to access the data.
Records:-
A record is a group of related fields. For example, a member record includes a set of fields
about one member. A key field, or primary key, is a field that uniquely identifies each record
in a file. The data in a key field is unique to a specific record. For example, the Member ID field
uniquely identifies each member because no two members can have the same Member ID.
There are some process which used to chk the data to cheak that data is valid or not valid.
Various types of validity checks
• include alphabetic checks,
• numeric checks,
• range checks,
• consistency checks
• completeness checks.
• Check digit
ALPHABETIC/NUMBERIC CHECK:-
An alphabetic check ensures that users enter only alphabetic data
into a field. A numeric check ensures that users enter only numeric data into a field. For
example,
data in a First Name field should contain only characters from the alphabet. Data in a postal
code
field should contain numbers (with the exception of the special characters such as a hyphen).
RANGE CHEAK:-
A range check determines whether a number is within a specified range. Assume
the lowest annual membership fee at the discount warehouse is $25.00 and the highest is
$90.00.
A range check on the Annual Fee field ensures it is a value between $25.00 and $90.00.
CONSISTENCY CHEAK:-
A consistency check tests the data in two or more associated fields to ensure
that the relationship is logical.
EXAMLE:-
the value in a Date Joined field cannot occur earlier in time than a value in a Birth Date field.
COMPLETENESS CHECK:-
A completeness check verifies that a required field contains data.
EXAMPLE
some fields cannot be left blank; others require a minimum number of characters. One
completeness check can ensure that data exists in a Last Name field. Another can ensure that a
day, month, and year are included in a Birth Date field.
CHECK DIGIT:-
A check digit is a number(s) or character(s) that is appended to or inserted in
a primary key value. A check digit often confirms the accuracy of a primary key value. Bank
account, credit card, and other identification numbers often include one or more check digits.
File processing
system
File processing system
• In past many organization stored data in files on tape disk.
Suppose
If we send email message of fee student
Stand data from both files
Difficult to generate such type of list.
Integrity problems
• Realibilty and accuracy of data.
• Roll no, marks, numeric value.
• It is difficult file using file processing system .
Programme Data Dependency
Atomicity Problems
• Consistency
• In database approach when we change data for example roll no of a
student . The program made by this data automatically change the roll
no of student by the use of F. key concept which connect two table
• Data security
• Security is the protection of database from unauthorized access
• In database approach security is provide by the use of password
• In database approach data entry operator only enter the data. While the
chairman of organization are able to access and delete the data so, in database
approach well security is provide
• Data atomicity
• In data base approach atomicity problem is removed
• In database approach it is not possible that the process has five step and
execute one or two step but it is possible that all step of process execute at
once or does not execute any step . so, in this way atomicity problem is
removed.
• Disadvantage
• Data in database more complex then file processing system
• DBMS is complicated and required additional memory , processing power
,powerful hardware
• DBMS is very large and sophisticated so , it has high cast
• Data in database more vulnerable then file processing system because
many users and program share this data . If this data is damage , many
users are not be able to perform their jobs
• Types of database
• Relational database
• In relational database both data and relation of data are store in the form
of table which contains rows and columns
• In relational database rows are called tuples
• While the columns are called attributes .
Object Oriented Database
• OODB store data in objects
• Object is an item which contain data as well as action process the data
• Example
• In OODB include media data base which store image , audio clips ,
video clips
• CAD(computer aided design) database that store data about
engineering and architecture
• Multidimensional database
• Data store in dimensions is called multidimensional data base(MDDB)
• RDB store data in two dimensions
• MDDB store data in more then two dimensions
• The advantage of multi dimensional database is that it consolidate data
much faster then relational database
• In MDDB data store in data warehouses
• The MDDB is also known as hypercube
Big data
• Big data is Extremely large data especially relating with human behavior
• When we talk about big data there are three factor of big data
A DBMS offers several methods to retrieve and maintain its data. The four more commonly
used are query languages, query by example, forms, and report generators. The following
paragraphs describe each of these methods.
QUERY LANGUAGE
• . A query language
consists of simple,
English-like statements
that allow users to
specify the data to
display, print, or store.
• Each query language
has its own grammar
and vocabulary.
• A person without a
programming
background usually
can learn a query
language in a short
time.
FORM:-
A form, sometimes called a data entry form, is a window on the screen that provides areas for
entering or changing data in a database. You use forms (such as the Member Maintenance form in
to retrieve and maintain the data in a database.
To reduce data entry errors, well-designed forms should validate data as it is entered. When
designing a form using a DBMS, you can make the form attractive and easy to use by incorporating
color, shading, lines, boxes, and graphics; varying the fonts and font styles; and using other
formatting features.
REPORT GENERATOR :-
A report generator, also called a report writer, allows users to design a
report on the screen, retrieve data into the report design, and then display or print the report.
Report generators usually allow you to format page numbers and dates; titles and
column headings; subtotals and totals; and fonts, font sizes, color, and shading.
Backup and Recovery:-
Occasionally a database is damaged or destroyed because of hardware failure, a
problem with the software, human error, or a catastrophe such as fire or flood. A DBMS
provides a variety of techniques to restore the database to a usable form in case it is
damaged or destroyed.
• A backup, or copy, of the entire database should be made on a regular basis. Some
DBMSs have their own built-in backup utilities. Others require users to purchase a
separate backup utility, or use one included with the operating system.
• More complex DBMSs maintain a log, which is a listing of activities that change the
contents of the database.
• A DBMS that creates a log usually provides a recovery utility. A recovery utility
uses the logs and/or backups to restore a database when it becomes damaged or
destroyed.
• Continuous backup is a backup plan in which all data is backed up whenever a
change is made.
Data Security:-
A DBMS provides means to ensure that only authorized users
access data at permitted times. In addition, most DBMSs allow different
levels of access privileges to be identified for each field in the database.
These access privileges define the actions that a specific user or group of
users can perform. Access privileges for data involve establishing who can
enter new data, change existing data, delete unwanted data, and view data.
System
development
System development:-
A system is a set of components that interact to achieve a common goal.
Businesses use many types of systems. A billing system allows a company
to send invoices and receive payments from customers. Through a payroll
system, employees receive paychecks. A manufacturing system produces
the goods that customers order. An inventory system keeps track of the
items in a warehouse. Very often, these systems also are information
systems
System development cycle:-
The system development cycle is a set of activities used to build an information system.
System development cycles often organize activities by grouping them into larger categories
called phases. Most system development cycles contain five phases:
1. Planning
2. Analysis
3. Design
4. Implementation
5. Operation, Support, and Security
A systems
analyst is
responsible
for designing
and
developing an
information
system. The
systems
analyst is the
users’
primary
contact
person.
Project Management:-
Project management is the process of planning, scheduling, and then controlling the activities
during the system development cycle. The goal of project management is to deliver an acceptable
system to the user in an agreed-upon time frame, while maintaining costs.
To plan and schedule a project effectively, the project leader identifies the following elements
for the project:
• Goal, objectives, and expectations of the project, collectively called the scope
• Required activities
• Time estimates for each activity
• Cost estimates for each activity
• Order of activities
• Activities that can take place at the same time
Documentation:-
During the entire system development cycle, project members produce much documentation.
Documentation is the collection and summarization of data and information. It includes reports,
diagrams, programs, or any other information generated during the system development cycle.
Detailed analysis sometimes is called logical design because the systems analysts
develop the proposed solution without regard to any specific hardware or software. That is,
they make no attempt to identify the procedures that should be automated and those that
should be manual.
Design Phase
The design phase consists of two major activities