Preview

PT2520

Satisfactory Essays
Open Document
Open Document
1600 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PT2520
PT2520 Unit 1:
Database Concepts
Who Needs a Database?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.1

Database Overview
• A database is a set of related data.
• An old-style library catalog, a Rolodex or an address book are all databases.
• Usually we use the term “database” to refer to electronic databases.

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.2

Flat File Databases
• The simplest electronic database structures are flat file structure.
• Flat file means that the data is stored in a single file.
• These files can be
– Delimited
– Fixed length
– In a spreadsheet application
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.3

Delimited
• In a delimited file, each piece of data is separated from the others by a delimiter such as a comma or a semicolon.
• Delimited files are commonly used to transfer data from one data source to another. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.4

Example: Comma Delimited File

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.5

Fixed Length Files
• In fixed length, each piece of data is allotted a particular length in characters.
• All fields have the same length.

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.6

Spreadsheets
• Spreadsheets such as Microsoft’s Excel provide a more sophisticated form of flat file database.
• Spreadsheets often contain additional database tools to help sort and filter data.

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.7

Spreadsheet Example

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1.8

Disadvantages of Flat File Databases
• Difficult to query and find information
• Data redundancy – information is repeated and can be inconsistent
• Difficult to compare data across files

Copyright © 2012 Pearson Education,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    PLa2763

    • 262 Words
    • 1 Page

    A party seeking on annulment for fraud under NRS 125.340(1) must prove fraud by clear and convincing evidence. The district court abused its discretion in ordering the parties marriage to be annulled since the record contains no substantial evidence of fraud.…

    • 262 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    select LisenceTypeName, sum(licenseTypeEnd) from LicenseType Where LicenseTypeEnd < date> Order by LicenseTypeNameselect Price from licenseType order by count…

    • 164 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    PT2520

    • 1263 Words
    • 7 Pages

    The course project is based on the Westlake Research Hospital scenario that you have been studying throughout the course and uses the Westlake database you used for the Group A labs. To complete the project, you will need to use your copy of the SQL2008ExpVM virtual machine, as it existed at the end of the last unit (Unit 9). Your instructor will provide you with a script file named ProjectLoadData.sql, which you will use to populate the database. You will receive instructions on how to use this file in Step 10 of the Technical Steps section of this lab.…

    • 1263 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    When a client connects to the MySQL server, the server uses the username provided by the client and the client host to select the appropriate account row from the mysql.user table. It then uses this row to authenticate the client. Before MySQL 5.5.7, the server authenticates the password provided by the client against the Password column of the account row. As of MySQL 5.5.7, the server authenticates clients using plugins. Selection of the proper account row from the mysql.user table is based on the user name and client host, as before, but the server authenticates the client credentials as follows: The server determines from the account row which authentication plugin applies for the client. If the account row specifies no plugin name, the server uses native authentication; that is, authentication against the password stored in the Password column of the account row. This is the same authentication method provided by MySQL servers older than 5.5.7, before pluggable authentication was implemented, but now is implemented using two plugins that are built in and cannot be disabled. If the account row specifies a plugin, the server invokes it to authenticate the user. If the server cannot find the plugin, an error occurs. The plugin returns a status to the server indicating whether the user is permitted to connect.…

    • 287 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    A Database is generally used for storing data in a structured way in an efficient manner for insert, update and retrieval of data in well defined formats. On the other hand, in file system the data stored in unstructured manner with an unrelated data.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Legt2751

    • 1592 Words
    • 6 Pages

    1. You are required to submit an answer to the attached assignment question by the due date and time for lodgement.…

    • 1592 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Pt2520 Sow

    • 79 Words
    • 1 Page

    History: Scope: Constraints: Objectives: Tasks and Timeline: Gathering Data: Add a description of task. Time allotted:…

    • 79 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    SP2750

    • 750 Words
    • 3 Pages

    a) I did not see a clear cut mentor. I read about many influences including Freud…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pa250 Unit 1

    • 783 Words
    • 4 Pages

    One of the basic rights we hold sacred in this country is the freedom to marry whomever we choose. While that seems like a given in the US, because we don’t have the strict class hierarchy of Europe, or the arranged unions found in certain Eastern and African cultures that define who marries whom. We have had, and still do for that matter, rigid restrictions on marriage, when they seem counter-intuitive to social mores. When social feelings begin to shift towards a more progressive outlook, challenges to the status quo are bound to occur, especially when the emotionally charged aspect of marriage is involved. Two perfect examples are the cases of Loving v. Virginia 388 US 1, 87 S Ct1817(1967), and Goodridge v. Department of Public Health 440 Mass 309, 798 NE 2d 941(Mass.2003).…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Psy 250

    • 1251 Words
    • 6 Pages

    Richmond, B.G & Strait, D.S. (2000, march). Nature: Evidence that humans evoled from a knuckle-walking ancestor, Nature volume 404:Retrieved from http://www.nature.com/biology/personality…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    1. Why is it critical to perform a penetration test on a web application prior to production Implementation?…

    • 486 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Psy 250

    • 1102 Words
    • 5 Pages

    Theories of personalities have been studied for many decades. The biological and humanistic approaches to personality have both become infamous in studying the science behind personality. Abraham Maslow developed the hierarchy of needs because he did not believe that the conditioning theories adequately portrayed the complexity of human behavior. In analyzing both the biological and humanistic theories, one can see where Maslow may have been right in that assumption.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Ptlls Cu3049

    • 2010 Words
    • 9 Pages

    The five key concepts and principles of the assessor, known as SCARV are defined by, having SUFFICIENT evidence to assess, enusuring the evidence is CURRENT and up to date; it is AUTHENTIC work done by the candidate, is RELIABLE and VALID. This can be obtained in various ways and include documented, audio and visual evidence.…

    • 2010 Words
    • 9 Pages
    Good Essays

Related Topics