Chapter 12: Information Chapter 12: Information Systems Systems Chapter 12 Chapter 12 Information Information Systems Systems Page Page 1 Information systems are Information systems are software applications software applications that facilitate the that facilitate the organization and organization and analysis of data. analysis of data. Example: Spreadsheet Example: Spreadsheet software allows users to software allows users to place raw data in tables place raw data in tables and then utilize formulas and then utilize formulas and basic graphical and basic graphical mechanisms to generate mechanisms to generate
12
Embed
Chapter 12: Information Systems Chapter 12 Information Systems Page 127 Information systems are software applications that facilitate the organization.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Chapter 12: Information Chapter 12: Information SystemsSystems
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 11
Information systems are Information systems are software applications software applications that facilitate the that facilitate the organization and analysis organization and analysis of data.of data.Example: Spreadsheet Example: Spreadsheet software allows users to software allows users to place raw data in tables and place raw data in tables and then utilize formulas and then utilize formulas and basic graphical mechanisms basic graphical mechanisms to generate calculations and to generate calculations and illustrations from it.illustrations from it.
Database StructuresDatabase Structures
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 22
An alternative to a distributed information An alternative to a distributed information system based upon files is a centralized system based upon files is a centralized system based upon the concept of system based upon the concept of databasesdatabases..
File-OrientedFile-OrientedSystemSystem
Database-Database-OrientedOrientedSystemSystem
Video Video Rental Rental FilesFiles
RentRental al
DeptDept..
VideoVideoSalesSalesFilesFiles
SaleSales s
DeptDept..
Video Video PurchaPurcha
se se FilesFiles
PurcPurch-h-
asinasing g
DeptDept..
AdvertAdvertise-ise-
mentmentFilesFiles
MarkeMarket-ing t-ing Dept.Dept.
Store Store UpkeeUpkeep Filesp Files
MainMaint-t-
enanenance ce
DeptDept..
Store Store PersonPerson
nel nel FilesFiles
PayrPayroll oll
DeptDept..
RentaRental l
Dept.Dept.
Sales Sales Dept.Dept. PurchPurch
--asing asing Dept.Dept.
MarketMarket-ing -ing
Dept.Dept.
IntegrateIntegrated d
DatabaseDatabase
MaintMaint--
enancenance e
Dept.Dept.
PayroPayroll ll
Dept.Dept.DISADVANTAGES OF EACH DISADVANTAGES OF EACH SYSTEMSYSTEM
A Modular View of a Database A Modular View of a Database SystemSystem
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 33
The DBMS uses The DBMS uses schemaschema and and
subschemasubschema to to ensure data ensure data
security.security.
A schema A schema describes the describes the way the entire way the entire
database is database is organized.organized.
A subschema A subschema describes the describes the
organization of organization of the portion of the the portion of the database that is database that is accessible to a accessible to a
particular type of particular type of user.user.
The Relational Database ModelThe Relational Database Model
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 44
The simplest conceptual arrangement of a The simplest conceptual arrangement of a database uses a table of rows (called database uses a table of rows (called tuplestuples) ) and columns (called and columns (called attributesattributes).).Last Name
First Name
M.I.
SID Hrs
Class
GPA
Major
DOB Image
MooseBullwinkl
eJ
900626977
112
Sr3.24
CHEM
03/21/76
Bear Yogi D900129
87548 So
2.17
BIOL02/16/
79
Coyote Wile E900705
54854 So
3.16
MATH
11/05/81
HoundHucklebe
rryH
900339227
75 Jr3.05
MKTG
09/12/83
Gorilla Magilla B900187
014102
Sr3.76
ELED12/12/
80
Pig Porky P900882
63566 Jr
2.38
ECON
05/02/82
The major The major advantage of this advantage of this model is its logical model is its logical conceptualization.conceptualization.
The major disadvantage is the The major disadvantage is the substantial amount of software substantial amount of software
and hardware overhead required and hardware overhead required to maintain and access the table.to maintain and access the table.
The PROJECT operation limits the scope The PROJECT operation limits the scope of the database to specific attributes.of the database to specific attributes.
ORIGINAL TABLEORIGINAL TABLE
CodeCode DescriptionDescription PricPricee
213342133455
9v Battery9v Battery 1.921.92
311453114522
Power DrillPower Drill 34.934.999
254462544677
60W Bulb60W Bulb 1.471.47
309773097722
Mini-Ratchet Mini-Ratchet SetSet
6.506.50
256562565688
Halogen Halogen LightLight
12.912.999
290032900311
Flat Flat ScrewdriverScrewdriver
8.458.45
NEW NEW TABLETABLE
CodeCode PricPricee
213342133455
1.921.92
311453114522
34.934.999
254462544677
1.471.47
309773097722
6.506.50
256562565688
12.912.999
290032900311
8.458.45
Apply Apply PROJECT PROJECT
withwithCode & Code & PricePrice
Relational Operator JOINRelational Operator JOIN
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 77
The JOIN operation combines multiple The JOIN operation combines multiple tables that have common attributes.tables that have common attributes.
A potential problem with database A potential problem with database systems that allow multiple access points systems that allow multiple access points is the loss of data integrity.is the loss of data integrity.
At ATM #1: At ATM #1: Deposit $400Deposit $400
At ATM #2: At ATM #2: Withdraw $200Withdraw $200Get Balance... Get Balance...
$500$500Get Balance... Get Balance... $500$500Add $400 to Add $400 to
Balance... Balance... $900$900Subtract $200 from Subtract $200 from Balance... Balance... $300$300Store new Balance... Store new Balance...
$900$900Store new Balance... Store new Balance... $300$300
Either balance that’s stored would be Either balance that’s stored would be incorrect, since the correct balance is incorrect, since the correct balance is $700$700!!
Databases and PrivacyDatabases and Privacy
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 99
The proliferation of information on The proliferation of information on database systems poses a potential threat database systems poses a potential threat to the privacy of people about whom the to the privacy of people about whom the data refers.data refers.
Example: Medical DatabasesExample: Medical Databases
Advantages:Advantages:•Reduction of paperworkReduction of paperwork•Fewer false insurance Fewer false insurance claimsclaims•Facilitates disease Facilitates disease trackingtracking•Immediate access in Immediate access in emergencyemergency•Cost-effective ID of Cost-effective ID of treatmenttreatment•Safer than paper Safer than paper recordsrecords
Disadvantages:Disadvantages:•Employer access might Employer access might cost jobscost jobs•““High risk” insurance High risk” insurance increasesincreases•Unsolicited Unsolicited advertisementsadvertisements•Fear inhibits candid Fear inhibits candid disclosuredisclosure•Inaccuracies are spread Inaccuracies are spread easilyeasily•Dr./patient Dr./patient confidentiality lossconfidentiality loss
CryptographyCryptography
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 1010
Networks are set up to send messages Networks are set up to send messages right past stations that aren’t right past stations that aren’t authorized to read them, but what’s to authorized to read them, but what’s to preventprevent such unauthorized viewing? such unauthorized viewing?
The most common solution to this The most common solution to this problem is problem is encryptionencryption, where the , where the message is coded in such a way that message is coded in such a way that only the receiving station can decode only the receiving station can decode it.it.
Message
Message
Public-Key EncryptionPublic-Key Encryption
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 1111
1.1.Create Create
MessageMessage
I have affixed I have affixed to me the dirt to me the dirt and dust of and dust of countless countless ages!ages!
5.5.Decrypt Message Decrypt Message With Recipient’s With Recipient’s
Private KeyPrivate Key
I have affixed I have affixed to me the dirt to me the dirt and dust of and dust of countless countless ages!ages!
Key-Based AuthenticationKey-Based Authentication
Chapter 12Chapter 12Information Information
SystemsSystemsPage Page 1212
When a message is received, how can you be sure When a message is received, how can you be sure who it came from?who it came from?
1.1.Create Create
MessageMessage
I’m going to recruit I’m going to recruit that funny-looking kid that funny-looking kid who plays shortstop who plays shortstop on Chuck’s team!on Chuck’s team!
2.2.Encrypt Message Encrypt Message
With Sender’s With Sender’s Private KeyPrivate Key
I’m going to recruit I’m going to recruit that funny-looking kid that funny-looking kid who plays shortstop who plays shortstop on Chuck’s team!on Chuck’s team!