Chapter 5



Chapter 544:

Software: Systems and Application SoftwareOrganizing Data and InformationThe FileSystemObject Object

|At a Glance |

Instructor’s Manual Table of Contents

□ Chapter Overview

□ Chapter Outline

□ Chapter Principles and Objectives

□ Teacher Notes

□ Quick Quizzes

□ Teaching Tips

□ Further Readings or Resources

□ Discussion Questions

□ Projects to Assign

□ Key Terms

□ Chapter Overview

□ Chapter Objectives

□ Teacher Notes

□ Quick Quizzes

□ Discussion Questions

□ Extra Cases

□ Teaching Tips

□ Further Readings or Resources

□ Team/Group Activities

□ Projects to Assign

□ Key Terms

Solutions

□ Problem Solving Exercises

□ Cases

Instructor’s Notes

Chapter Overview

Chapter Outline

Chapter Objectives

Lecture Notes

Discussion Topics

Extra Cases

Teaching Tips

Further Readings or Resources

Team/Group Activities

Solutions

Review Questions

Discussion Questions

Problem Solving Exercises

Team Activities

Web Exercises

Cases

|At a Glance |

Instructor’s Notes

Chapter Overview

Chapter Outline

Chapter Objectives

Lecture Notes

Discussion Topics

Key Terms

|Instructor’s Notes |

CChapter Overview

CHAPTER OVERVIEW

This chapter serves as a reviews of drives, directories, folders, and files. Also discussed in this section is the FileSystemObject object. The chapter consists ofincludes several very useful tables that, which are reproduced in this manual for a quick referenceChapter 5 gives the business student key insights into how an organization uses data and transforms it into meaningful information. Most businesses suffer from too much data rather than not enough and a. A typical manager will encounter a flurry of numbers, statistics, and reports. A database helps extract significance from these numbers. The database can contribute to organizational success in a number of other ways too including providing managers and decision makers with timely, accurate, and relevant information. Traditionally, data was maintained in separate files which were. These files were created by separate applications and were characterized by program-data dependence. These problems were addressed with the database approach to data management, which . Using this approach yieyielded benefits such as reduced data dependency, easier update and modification, reduced redundancy, standardization of data access, and more efficient program development. Use of the database approach has required computer specialists to give extra special care to content and access, logical structure, and physical organization of data. The result can be a well-designed and well-managed database that is an extremely valuable tool in supporting decision making. Most frequently, this is done through the use of a database management system (or DBMS).

in business settings. The DBMS acts as an interface between the data and application programs. The data is generally accessed through the use of a data manipulation language like SQL. In recent years, the functionality and power of DBMSs and other database systems has improved through the use of the Internet, telecommunications, distributed databases, and other support tools. Multidimensional databases and on-line analytical processing systems are being used to explore data and allow users to extract more information. Data mining allows for the automated discovery of new information from large data warehouses. Object-relational database management systems provides a new set of capabilities compatible with today’s object-oriented technology. Applications in business intelligence, competitive intelligence, and knowledge management are also furthering the use of collected data in business settings. 4 provides insight into the processes and methods for instructing information systems to perform value-adding tasks in ways desired by organizational users. This is accomplished through the use of software. Two types of software are important to information system users. The first type is systems software. This software provides an interface between the other category of software, application software, and computer hardware. Systems software coordinates the activities of the hardware and various application programs. Systems software is hardware specific. Application software consists of programs that help users solve particular computing problems. Accounting packages, decision support software, wordprocessors, and graphic software are all examples of applications. Operating systems are selected by organization with consideration for current and expected needs within the context of the hardware environment. Application software is either custom developed, purchased off-the-self, or developed through the customization of off-the-shelf software. Propriety software should not be developed, in general, unless doing so will meet a compelling business need that can provide competitive advantage. Software development requires the use of a programming language. The selection of an appropriate language must consider the skill levels of the staff together with the task at hand. Most organizations develop software using third or fourth generation software. Other viable alternatives include object-oriented languages and visual programming languages. .

CHAPTER OUTLINE

|Lecture Topics |Page # |

|Review of Drives, Folders, and FilesData ManagementAn |5-388 |

|Overview of Software | |

|Data Modeling and Database ModelsApplication Software |5-4 |

|Database Management Systems (DBMSs)Programming Languages |5-5 |

|Database DevelopmentsSoftware Issues and |5-589 |

|TrendsFileSystemObject Object Overview | |

Chapter Outline

|Lecture Topics |Page # |

|Data Management |5-3 |

|Data Modeling and Database Models |5-4 |

|Database Management Systems (DBMSs) |5-4 |

|Database Applications |5-5 |

Chapter Principles and Objectives

|Principles |Learning Objectives |

| | |

|The database approach to data management provides significant |Define general data management concepts and terms, highlighting |

|advantages over the traditional file-based approach. |the advantages and disadvantages of the database approach to data|

| |management. |

| |Name three database models and outline their basic features, |

| |advantages, and disadvantages. |

| | |

|A well-designed and well-managed database is an extremely |Identify the common functions performed by all database |

|valuable tool in supporting decision making. |management systems and identify three popular end-user database |

| |management systems. |

| | |

|The number and types of database applications will continue to |Identify and briefly discuss current database applications. |

|evolve and yield real business benefits. | |

CHAPTER OBJECTIVES

After completing this chapter, students should be able to:

1. Define general data management concepts and terms, highlighting the advantages and disadvantages of the database approach to data management.

2. Name three database models and outline their basic features, advantages, and disadvantages.

3. Identify the common functions performed by all database management systems and discuss the key features of three popular end user database management systems.

4. Identify and briefly discuss recent database developments.

Teacher Notes

Identify and briefly describe the functions of the two basic kinds of software.

Outline the role of the operating system and identify the features of several popular operating systems.

Discuss how application software can support personal, workgroup, and enterprise business objectives.

Identify three basic approaches to developing application software and discuss the pros and cons of each.

5. Outline the overall evolution of programming languages and clearly differentiate between the five generations of programming languages.

Describe a drive, a folder, and a file

Describe and use the different objects in the FileSystemObject object

Describe the properties and methods of the FileSystemObject object

Use the FileSystemObject object to save data on the server

Understand the code that required with the use of the FileSystemObject object dictates

Use the SiteGalaxy Upload component to upload files from a client to a server

LECTURE NOTES

Data ManagementAn Overview of Software

The critical function of software is to direct the workings of the computer hardware. Software consists of computer programs that are sequences of instructions used by the central processing unit to control its actions. Software can be classified in two main categories: systems software and application software. System software is a collection of programs that form a link between application software and hardware. Application software enables people to solve problems and perform specific tasks. All software programs are written with coding schemes called programming languages.

An operating system (OS) receives an instruction from an application program and translates it into a set of instructions meaningful to the hardware. The OS serves as an intermediary, allowing for hardware independence. A key function of the OS is memory management. This involves controlling storage access by converting logical requests into physical locations. Another key function of the OS is task management. The OS allocates computer resources through multitasking and time-sharing. This enables multiple applications to be used by multiple users simultaneously. The OS also provides a user interface. Command-based and graphical user interfaces (GUI) are available. Popular operating systems include the early command-based MS-DOS for PCs and GUIs such as Windows 98, Windows NT, and Mac OS. Unix is another popular operating system and is used on many different computer types and systems. A popular, free version of Unix is Linux.

Information systems operate within an organization according to a sphere of influence. Software must also consider the scope within which it must operate. Personal productivity software works within a personal sphere of influence. Organizational teams and subunits often need software that operates within a workgroup sphere of influence. Organization-wide systems often need an enterprise sphere of influence support. The sphere of influence often determines the appropriate operating system to be used by an organization.

The following table illustrates popular operating system choices:

One of the firm’s most valuable resources is data. The following table shows how data is organized in a hierarchical sequence from the smallest to largest element:

At the top of the hierarchy is the database. The database stores information about things important to business. These things are called entities. Each entity is a generalized class of objects for which data is collected, stored, and maintained. An attribute is a characteristic of an entity. Specific values of attributes, called data items, can be found in the fields of the record describing the entity. A data key is a field within the record that Entities, attributes, and keys are important database concepts. An entity is a generalized class of people, places, or things (objects) for which data is collected, stored, and maintained. Examples of entities include employees, inventory, and customers. An attribute is a characteristic of an entity. For example, employee number, last name, first name, hire date, and department number are attributes for an employee. The specific value of an attribute, called a data item, can be found in the fields of the record describing an entity.is used to identify the record.

The traditional approach to data management has been from a file perspective. Files were created by separate applications and were characterized by program-data dependence. Data duplication becomes common in this scenario and businesses experience a variety of data management problems. In a database approach, a pool of related data is shared by multiple application programs and rather than having separate data files, each application uses a collection of data that is either joined or related in the database. This approach offers significant advantages These problems are were addressed in many businesses with the database approach to data management. Using this approach yielded benefits such as reduced data dependency, easier update and modification, reduced redundancy, standardization of data access, and more efficient program development. Disadvantages awerre also experienced. include These included the expense of a database management system, needing a specialized computer system, and increased vulnerability. Use of the database approach has required computer specialists to give special care to content and access, logical structure, and physical organization of data. The result can be a well-designed and well-managed database that is an extremely valuable tool in business decision making.

Review of Drives, Folders, and Files

This section discusses file and directory structures and serves as a refresher. On most PC’s, folders and files can be stored on either a hard drive, (usually given the drive designation of “C:,”), or a floppy disk drive, (usually denoted by “A:”). Drive letters can also be used for CD-ROM drives and network drives. A network drive, also called a share, is acts as a pointer to a folder stored on another computer. The storage area on a hard drive or floppy drive is divided into directories (folders) that can be used to organize files.

|Technical Tip | |

| |The top of the folder hierarchy is referred to as the “root folder” or just the “root.” In Windows, it is which are |

| |referred to by “a:\” and “c:\” in Windows for the floppy drive and hard drive, respectively. |

File extensions are used to separate different types of computer files. A file or folder can have one or more of the following attributes:

Normal: A regular file that can be opened, modified, and saved

Read only: A file that can be read, but not altered

Hidden: A file that is hidden from the user; usually a system file

System: A special file used by the operating system

Directory: A file that is a folder

Archive: A file that has been changed and needs to be backed up

Alias: A file that is serves as a shortcut to another file

Compressed: A file that has been compressed by the operating system

There are tThree types of files exist: binary files, which contain data stored in the form of 1’s and 0’s;, ASCII files, which stores data as a series of characters (text);, and Unicode files, which also store data as a series of characters (text), but allows special characters from different languages.

QUICK QUIZQuick Quiz

What is a term for the top level of the folder hierarchyThe heart of an operating system is called a(n) ______. The smallest element in the data hierarchy is the ____.

referred to as? ANSWER: bitKernelThe root folder or root.

By what other term isWhat is used to compose a characterWhat is the element of the operating system that allows individuals to access and command the computer systemWhat is another name for a network drive known by?

Which type of file allows special characters from different languages? ANSWER: A Unicode file.

What Whatich is the term used to describe a collection of recordsthe interface that allows applications to make use of the operating systemfiles are usually hidden?

ANSWER: FileApplication program interface (API)System files.

What WhWhat term is used to describe the degree of accuracy of to which the data in any file is accurateis the ability of a computer to handle an increasing number of concurrent users smoothly?

ich type of file contains data stored in the form of 1’s and 0’s? ANSWER: Data integrityScalability.

What was one of the first widely installed microcomputer operating systemsWhat was developed because of problems with the traditional approach to data management?

A(n) _____ is a characteristic of an entity.

ANSWER: Database approachMS-DOS. attribute

A binary file.

Data Modeling and Database ModelsApplication Software

Modern business data is very complicated. Much of this complexity has been addressed with the database approach to data management. Using this approach yielded benefits such as reduced data dependency, easier update and modification, reduced redundancy, standardization of data access, and more efficient program development. Use of the database approach has required computer specialists to give special care to the items listed in the following table:e. Application software enables an individual, workgroup, or enterprise to use the power of a computer to perform a variety of organizational tasks. A company can either develop its own software for a specific application (called proprietary software) or purchase an existing program called off-the-self software. Some companies combine the two approaches and customize off-the-self software.

Software can be built either in house or by contracting out. The advantages of doing this include the items listed in the following table:

| | |

|Advantages of Custom |Software more closely matches needsContent |

|DevelopmentDatabase |Development results are more controllableAccess |

|Items for |More flexibility in making changesLogical Structure |

|Consideration: |Physical Structure |

One of the tools database designers use to show the relationships among the data is a data model. A data model is a map showing the relationships between various data entities. The following table summarizes the primary types of relationships between data entities.:

| | |

|Database Relationship|1:1 one-to-one |

|Types: |1:N one-to-many |

| |N:1 many-to-one |

| |N:M many-to-many |

Databases typically use one of the common database models. These are summarized in the following table:.

| | |

|Common Data Models: |Hierarchical (tree) |

| |Network |

| |Relational |

The hierarchical model has one main record type at the top called a parent. Each parent may have several children but a child can only have a single parent. This creates a top-down arrangement. The network model expands the hierarchical by providing an owner-member structure in which each member may have more than one owner. The relational data model is the most commonly used modelone today and provides a great deal of flexibility. In this arrangement, the data is represented as tables with rows and columns linked through common data elements. Basic data manipulations include selecting, projecting, and joining. The relational model is more flexible and intuitive.

There are several disadvantages too. These include:

| | |

|Disadvantages of |Development is generally longer |

|Custom Development: |In-house staff requirements are greater |

| |Greater risk of performance problems |

| |Maintain and support activities are increased |

Purchasing off-the-self software offers several advantages. Among these are:

| | |

|Advantages of |Lower costs |

|Off-the-Shelf |Lower risks |

|Software Purchase: |Higher quality |

Disadvantages include the following:

| | |

|Disadvantages of |Organization may be paying for features it doesn’t require. |

|Off-the-Shelf |Software may lack important features |

|Software Purchase: |Work processes may need to be changed to match software |

A growing class of software falls into the personal application software category. Wordprocessors, spreadsheet programs, personal database programs, and graphics programs are often included. Software suites are a collection of these personal application packages intended to enhance office productivity. They generally allow movement of data between packages through techniques called object linking and embedding.

Another class of application software is aimed at the workgroup sphere of influence. Packages such as Lotus Notes are developed to facilitate collaborative computing. This software is often called groupware. Enterprise applications are also available. Enterprise resource planning software (ERP) is a set of integrated programs that manage a company’s vital business operations. FileSystemObject Object Overview

This section covers the FileSystemObject object and describes what it is and what it does. ASP applications usually have to be ableneed to manipulate drives, folders, and files on a Web server. The FileSystemObject object provides this functionality. The FileSystemObjectThis object is appears at the top of a hierarchy provided by child objects. Once a FileSystemObject object is created, it can be incorporated into VBScript or JavaScript.

The FileSystemObject object has several useful properties and methods highlighted in the table below:

|Property/Method |Name |Description |

|Property |Drives |Stores a collection of all Drive objects on the Web server |

|Method |CopyFile |Copies files |

|Method |CreateTextFile |Creates a text file on a server |

|Method |DeleteFile |Deletes a file |

|Method |FileExists |Determines whether a file exists |

|Method |MoveFile |Moves a file from one location to another |

|Method |OpenTextFile |Opens an existing file on the server |

|Method |CopyFolder |Copies a folder |

|Method |CreateFolder |Creates a folder |

|Method |DeleteFolder |Deletes a folder |

|Method |FolderExists |Determines whether a folder exists |

|Method |MoveFolder |Moves a folder from one location to another |

|Method |BuildPath |Manipulates a path |

|Method |GetDrive |Gets a Drive object |

|Method |GetFile |Gets a File object |

|Method |GetParentFolderName |Gets the parent folder’s name |

|Method |GetFolder |Gets a Folder object |

|Method |OpenAsTextStream |Returns a TextStream object from a current file |

A Drive object provides properties and methods to interact with a certain drive. It and also has several important properties as highlighted below:

|Name |Description |

|Available Space {{Author: |Returns the number of bytes available on the current drive. |

|OK? or close up as | |

|AvailableSpace?}} | |

|DriveLetter |Returns the drive letter of the current drive. |

|DriveType |Returns the type of drive as follows: |

| |0 for Unknown |

| |1 for Removable (such as a Zip drive or floppy drive) |

| |2 for Fixed (such as a hard drive) |

| |3 for Network (such as a network share) |

| |4 for CD-ROM |

| |5 for RAM disk (such as a virtual disk drive stored in RAM) |

|FileSystem |Returns the type of file system for the current drive. Types include NTFT, a special file system used by|

| |Windows NT; FAT, a special file system used on Windows 95/98/NT/2000; and CDFS, a special file system |

| |used on CD-ROM drives. |

|FreeSpace |Returns the free space available on the current drive. |

|IsReady |Returns true if a drive is ready or false if it is not ready. |

|Path |Returns the path for the current drive. |

|RootFolder |Returns the root folder of the current drive. |

|SerialNumber |Returns the serial number of the drive. |

|ShareName |Returns the network name of the network drive. |

|TotalSize |Returns the total space (in bytes) of on the current drive. |

|VolumeName |Returns the name of the volume of the current drive. |

A Folder object provides the properties and methods to interact with a folder on a computer, as shown in the table below:

|Property/Method |Name |Description |

|Property |Attributes |Contains the attribute of the folder; attributes can be a combination of |

| | |several of the following values: |

| | |0 for Normal |

| | |1 for Read- Oonly |

| | |2 for Hidden |

| | |4 for System |

| | |5 for Volume |

| | |16 for Directory |

| | |32 for Archive |

| | |64 for Alias |

| | |128 for Compressed |

|Property |DateCreated |Contains the date and time the folder was created |

|Property |DateLastAccessed |Contains the date and time the folder was last accessed |

|Property |DateLastModified |Contains the date and time the folder was last modified |

|Property |Drive |Contains the letter of the drive in which the folder is located |

|Property |IsRootFolder |Contains information indicatingIndicates whether the folder is the root |

| | |folder |

|Property |Name |Contains the name of the folder |

|Property |ParentFolder |Contains a Folder object of the parent folder |

|Property |Path |Contains the path of the folder |

|Property |ShortName |Contains the 8.3 DOS name |

|Property |ShortPath |Contains the 8.3 DOS version of the path |

|Property |Size |Contains the size of all files and subfolders in this folder |

|Property |SubFolders |Contains the Folder collection of all SubFolders in this folder |

|Method |Copy |Copies the specified folder from one location to another location |

|Method |Delete |Deletes a specified folder |

|Method |Move |Moves a specified folder from one location to another |

|Property |Files |Contains a file collection in the current folder |

|Property |Folders |Contains a collection of all folders within a folder; contains aincludes |

| | |count and item properties as well as an AddFolders method |

A File object contains the information and attributes for one file on a server. It has the followingThe properties and methods of the File object are listed in the table below:

|Property/Method |Name |Description |

|Property |Attributes |Contains the attribute of a file in the form of one or more of the |

| | |following values: |

| | |0 for Normal |

| | |1 for Read- only |

| | |2 for Hidden |

| | |4 for System |

| | |5 for Volume |

| | |16 for Directory |

| | |32 for Archive |

| | |64 for Alias |

| | |128 for Compressed |

|Property |DateCreated |Contains the date and time the file was created |

|Property |DateLastAccessed |Contains the date and time the file was last accessed |

|Property |DateLastModified |Contains the date and time the file was last modified |

|Property |Drive |Contains the letter of the drive where the file is located |

|Property |Name |Contains the name of the file |

|Property |ParentFolder |Contains a fFolder object of the parent folder |

|Property |Path |Contains the path of the file |

|Property |ShortName |Contains the 8.3 DOS name |

|Property |ShortPath |Contains the 8.3 DOS version of the path |

|Property |Size |Returns the size, (in bytes), of the specified file |

|Property |Type |Contains information about the type of file |

|Method |Copy |Copies the specified file from one location to another location |

|Method |Delete |Deletes a specified file |

|Method |Move |Moves a specified file from one location to another |

|Method |OpenAsTextStream |Opens a file and returns a TextStream object, a special object that |

| | |allows an application to read, write, and append to a file |

After creating the FileSystemObject object, you must learn how to open new files and existing files. Being able to open new and existing files allows you to manipulate files them to suit your needs. In order to manipulate the contents of files, tThe TextStream object can be used to open, read, write, and close a file on a server. The most valuable of the properties and methods of the TextStream object are shown in the following table below:

|Property/Method |Name |Description |

|Property |AtEndOfLine |Contains true if at the end of a line, and false if nototherwise; the |

| | |tTextsStream object must be in read mode |

|Property |AtEndOfStream |Contains true at the end of a file, and false if nototherwise; if not at |

| | |the end of the file, the tTextsStream object must be in read-only mode |

|Method |Close |Closes an open TextStream object |

|Method |Read (numchars) |Reads a number of characters in a file |

|Method |ReadAll |Reads all characters in a file in a string |

|Method |ReadLine |Reads an entire line of a file |

|Method |Skip (numchars) |Skips a number of characters in a file |

|Method |SkipLine |Skips an entire line of a file |

|Method |Write (string) |Writes a string to a file |

|Method |WriteLine ([string]) |Writes an optional string to a file and a new line character |

|Method |WriteBlankLine (n) |Writes a number of (n) newline characters to a file |

Data Modeling and Database Models

The structure of the relationships in most databases follows one of three logical database models: hierarchical, network, or relational. The hierarchical model has one main record type at the top called a parent. Each parent may have several children but a child can only have a single parent, which creates a top-down arrangement. The network model is an expansion of the hierarchical model, however, instead of having various levels of one-to-many relationships, an owner-member structure is used which allows each member to have more than one owners. Databases structured according to either the hierarchical model or the network model, suffer from the same deficiency: once the relationships are established, it is difficult to modify them or to create new ones.

Relational models have become the most popular database types and describe data using a standard tabular format. In a database structured according to the relational model, all data elements are placed in two-dimensional tables, called relations, which are the logical equivalent of files. These tables organize data in rows and columns, simplifying data access and manipulation. Once data has been placed into a relational database, users can make inquiries and analyze data. Basic data manipulations include selecting, projecting, and joining. Selecting involves eliminating rows according to certain criteria while projecting refers to the elimination of columns in a table. Joining involves combining two or more tables.

QUICK QUIZQuick Quiz

What is one-of-a-kind software for a specific application calledWhich data model uses a parent-child is arranged in a parent-child cstructureonstruction?

ANSWER: Proprietary software: Hierarchical.

What is software developed for a particular company calledWhich data model is the most flexible?

ANSWER: RelationalContract software.

What is a company that provides both end user support and the computer on which to run the software from the user's facilitiesare the relational data model’s basic data manipulations?

ANSWER: Application service provider (ASP).Select, project, and join.

What software is best suited to writing a memois the most common data modeling technique called?

ANSWER: Entity-Relationship (ER) diagramsWord processing program.

Columns of the tables in relational databases are called? ANSWER: Attributes.

Database Management Systems (DBMSs)Programming Languages

A database management system or DBMS acts as an interface between data and application programs. A database management system (DBMS) is a group of programs used as the interface between a database and application programs or a database and the user. DBMSs are classified by the type of database model they support. For example, a relational database management system follows the relational model.

All DBMSs share the following common functions:

When an application program requests data from the database, it follows a logical access path or LAP. The actual data retrieval occurs through the physical access path (PAP). Schemas are used to describe the entire database, its record types, and their relationship to the DBMS. The DBMS provides several general functions that are shown in the following table.

| | |

|Basic DBMS Functions:|Creating and modifying the databases |

| |Providing user views |

| |Storing and retrieving data |

| |Manipulating data |

| |Generating reports |

Subschemas in a DBMS are used to provide user views and restrict data access as desired by an organization. The data definition language or DDL is used to develop schemas and subschemas. The data dictionary is used to provide detailed descriptions of all data in the database. Once a DBMS has been installed, the database may be accessed, modified, and queried via a data manipulation language such as structured query language or SQL. Several popular DBMSs are developed by Oracle, IBM, and Microsoft. When selecting a DBMS, characteristics such as size of the database, number of concurrent users, performance, integration issues, features, vendor, and costs need to be considered.

Both systems and applications programs are written in coding schemes called programming languages. The primary function of a programming language is to provide instructions to the computer system so that it can perform a processing activity. Programming involves translating what a user wants to accomplish into a code that a computer can understand and execute. Programming languages use a set of rules called a syntax and allow its code to be developed with particular symbols and words. There are several classes of programming languages. These classes developed over time and are typically discussed as generations of languages. The first generation of programming languages is machine language. Machine language is a low level language where all instructions consist of 1's and 0's. Second generation languages replaced binary digits with symbols that could be more easily understood by human programmers. These languages were called assembly language. Assembly language uses system programs called assemblers to translate the programmers' code into machine language. Third generation languages continued the trend of toward moving greater use of symbolic representation. BASIC, C, COBOL, and FORTRAN are examples of third generation languages that use Englishlike statements and commands, making it easier for programmers to construct complex code. Third generation languages take the programmer one step further from the directing the actual operation of the computer and are relatively independent of the system hardware. Fourth generation languages (4GLs) are less procedural and even more Englishlike. They emphasize output and what results are desired rather than how software is to be written. Examples include Visual Basic, Visual C++, Powerbuilder, SQL and Delphi. Another new class of programming language is called object oriented programming languages. This approach to programming relies on developing code that combines data and code into objects. Smalltalk and java are examples. Another trend among current languages is the addition of a visual programming element. This element makes programming more intuitive through the use of the mouse, icons, and symbols on the screen and pull-down menus. Visual Basic and Visual C++ are examples. Selecting the best language to use in development involves balancing the functional characteristics of the language with cost, control, and complexity issues. Once the software is developed, it must be translated into machine language. This is done through the use of systems software called a translator. An interpreter translates one line of source code into machine language at a time. A compiled translates the entire program at once.

Reviewing the Student Contacts Application

There are sSeveral items of note are discussed in this section. First and foremost is the query string, which is a collection of variable and value pairs t The latest generation of database management systems makes it possible for end users to build their own database applications. End users are using these tools to address everyday problems such as how to manage a mounting pile of information on employees, customers, inventory, or sales. These database management systems are an important personal productivity tool along with word processing, spreadsheet, and graphics software.

A key to making DBMSs more usable for some databases is the incorporation of “wizards” that walk you through how to build customized databases, modify ready-to-run applications, use existing record templates, and quickly locate the data you want. These applications also include powerful new features such as help systems and Web-publishing capabilities. For example, users can create a complete inventory system and then instantly post it to the Web, where it does double duty as an electronic catalog. Some of the more popular DBMSs for end users include Corel’s Paradox, FileMaker’s FileMaker Pro, Microsoft’s Access, and Lotus’s Approach.

hat allow an application to pass data between Web pages. It is important to note that according to Under HTML standards, query strings can be only about 1000 or so characters long. You can create aA query string can be createdin either of two ways: (1) by either placing a question mark right immediately after the URL, followed by one or more control items, or (2) by creating a form that contains a GET method, which then stores data in the QueryString collection.

|Technical Tip | |

| |The GET method can be used for an HTML form for data that does not need to be stored in a database or file and that is |

| |only needed for only short periods of time. The POST method can be used for data that must be stored in a database or a|

| |file. |

Quick Quiz

Also discussed in this section are two types of paths. Pphysical paths, which specify the precise location of a file, including the drive letter and all the relevant folders and subfolders., and lLogical paths, which are the URLs that the user types in a browser that doesbut that not point to the physical location of a file; instead, they, but rather provides a path from the virtual directory to the file.QUICK QUIZ

(True or False:) Programming languages are only used to write application programs, not systems softwareOracle is the leading provider of database systems.

ANSWER: TrueFalse.

What is a set of rules associated with a programming languageused to provide user views in a DBMS?

ANSWER: SubschemasSyntax.

A What is another name for the first generation of programming languageWhat is a popular DML is _____. ?

ANSWER: SQL

Machine language.

(T or F) Machine language and assembly language are the same thing. ANSWER: False.

What is a standardized language often used to perform database queries? Answer: Structured query language (SQL).

Database Applications DevelopmentsSoftware Issues and Trends

In recent years, the functionality and power of DBMSs and other database systems has been improved through the use of the Internet, distributed databases, ODBC, and other support tools. The increased use of telecommunications and networks has allowed multiple users and different sites to access data that might be stored in different physical locations using various database software packages. To reduce the strain on telecommunications lines, some organizations arehave created replicated databases, which hold a duplicate set of frequently used data.

Organizations are also using multidimensional databases and on-line analytical processing systems to explore data and allow users to extract more information. Data mining allows for the automated discovery of new information from large data warehouses. This has increased the capability of decision support systems. Data mining has been used to explore anomalies in data. The findings can be used to predict the future outcomes of business decisions. Other new technologies include object-relational database management systems, which provide a new set of capabilities compatible with today’s object-oriented technology. New data types such as audio, video, images, and unstructured text have become more important to many organizations.

Applications in business intelligence, competitive intelligence, and knowledge management are also furthering the use of collected data in business settings. Business intelligence is related to getting the correct information to the correct users in a timely fashion. Competitive intelligence involves collecting data regarding the competition, in legal ways. Knowledge management is concerned with storing an organization’s collective expertise in a variety of formats. The types of data and information that managers need change at the same time that business processes do. As a result, a number of effective database applications can help managers meet their needs. Among them is the idea of linking the company databases to the Internet. In doing so however, it is important that any software installation required at the user end be extremely simple and that only authorized users are able to access the databases. To this end, organizations are adopting the use of application servers. Application servers manage the process of connecting users to data by setting up an application session, checking each user’s identification and password, fetching requested information from the appropriate database, and building the data into a Web page for display to the users.

A data warehouse is a database that holds business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers. Data warehouses provide business users with a multidimensional view of the data they need to analyze business conditions. It is designed specifically to support management decision making, not to meet the needs of transaction processing systems. A data mart, which is a subset of a data warehouse, brings the data warehouse concept to small and medium-sized businesses and to departments within larger companies. Rather than store all enterprise data in one monolithic database, data marts contain a subset of the data for a single aspect of a company’s business.

Data mining is an information analysis tool that involves the automated discovery of patterns and relationships in a data warehouse. Data mining represents the next step in the evolution of decision support systems. It makes use of advanced statistical techniques and machine learning to discover facts in a large database, including databases on the Internet.

Quick QuizSoftware is a very important part of the computer system and therefore many issues regarding this aspect of information systems have arisen. One issue is that of software bugs. Bugs are defects in programs that keep it performing in the manner intended. It is estimated that in 1000 lines of code, about 5-15 bugs exist. Because of intense pressure to release new software, manufacturers often release software prior to conducting enough quality tests. Another software issue is called open source software. This is software that is freely available to anyone and it is in a form that can be modified easily. Open source promotes collaborative development but poses control issues for organizations wishing to use it. The use of the Internet has created the concept of opensourcing whereby software development is extended beyond a single organization by finding others wishing to work in single development efforts. Software that is not open source is often protected by licensing. This means that users must comply with stipulated conditions prior to using software. Software companies revise their programs and sell new versions periodically. This is called software upgrades. Organizations must decide whether to buy the new version or to stick with the older one. A number of tradeoffs exist for each option. Global software support also becomes an issue for software providers. Sometimes a third-party is contracted to handle overseas support. Other times the Internet is used more extensively.

Uploading Files to the Server— – How It’s Really Done

QUICK QUIZ

About how many bugs are in 1,000 lines of computer codeWhat term is used to describe the automated discovery of patterns in data collected in data warehouses?

ANSWER: Data mining5-15.

What is a revised program called when soldtype of database might be used to store audio data? A(n) _____ provides business users with a multidimensional view of the data they need to analyze business conditions.

ANSWER: Software upgradedata warehouseORDBMS

.

_____ areWhat protects software from illegal useWhat term is used to describe the process of collecting data about an organization’s competitors? software packages that connect end users to the databases that hold the information they need to access.

Software licensing and copyright lawANSWER: Competitive intelligencApplication serverse.

(T or F) Competitive intelligence is illegal. ANSWER: False.

This section covers SiteGalaxy and how to upload files to a server. The SiteGalaxy Upload component uses a special MIME type, multipart/form, to allow the SiteGalaxythis component to upload files from a client to the server. The SiteGalaxy Upload component contains two separate objects: the Form, which is a collection of form elements returned by a client, and the FileField, which is an object that supplies information about a file passed to the server from a client.

The most important properties and methods of the Form object are shown below:

|Property/Method |Name |Description |

|Property |Item or Item (element) |Contains the collection of form elements submitted by the user. If an |

| | |element (that is, a form element) is supplied in the parentheses, this |

| | |property returns a FileField object. |

|Property |ContentDisposition |Contains a “form-data” string form from “multipart/form-data” type HTML |

| | |forms. You can use this property in your code to verify the correct mime |

| | |type. Read- only. |

|Property |Count |Contains the number of form elements in the collection., Read -only. |

|Property |MimeType |Contains the Mime MIME type property of the file field. Read -only. |

|Property |MimeSubtype |Contains the Mime MIME subtype property of the file field. Read- only. |

|Property |Size |Contains the Size property of the file field. Read- only. |

The most valuable properties and methods of the FileField Object are listed below:

|Property/Method |Name |Description |

|Property |FilePath |Contains the filename that the client is sending in the body of the |

| | |request. Default value is rRead -only. |

|Property |MimeType |Contains the MIME type of the file (e.g., “image”). Read -only. |

|Property |MimeSubtype |Contains the MIME subtype of the file (e.g., “gif”). Read -only. |

|Property |Size |Contains the size (in bytes) of the file’s data. Read- only. |

|Property |SaveAs (filename) |Saves the file on the server under the filename. |

|Property |SaveAsBlob (object) |Saves the file data in a database. |

QUICK QUIZ

Which object provides properties and methods to interact with a particular drive? ANSWER: The Drive object.

One File object represents how many files on a computer? ANSWER: One.

What is a collection of variable and value pairs that allow an application to pass data between Web pages? ANSWER: A query string.

Which method of an HTML form for data must be you used to store data in a database or file? ANSWER: The POST method.

Which file path specifies the precise location of a file, including the drive letter and all the relevant folders and subfolders? ANSWER: The physical path.

Discussion Questions

Some interesting topics of discussion in this chapter include the following:

➢ Discuss the different commercial database packages available for handheld devices such as Palm Pilots.

➢ What are the potential problems of poor database design?

What would make a database usable by managers as opposed to programmers?

Extra Cases

Visible Systems Corporation: Data Warehouse Development

Visible Systems Corporation is a full-service information technology and management-consulting firm. Its goal is to improve software development effectiveness and efficiency worldwide. Many of Visible's clients are engaging in software development as part of various strategic initiatives. One of Visible's specialties falling into this category is data warehousing. As organizations become more aware of the importance of understanding their history to predict their future, data warehousing becomes more valuable. Visible takes great pride in its ability to transfer its data warehousing skills to its clients. According to Visible, the most important skills for an organization to learn include the acquisition, interpretation and representation of all the details that make up a model of an enterprise and transform the model into a Data Warehouse architecture. Visible's clients obtain the necessary expertise through facilitation, training, education, and consulting. According to Visible, this necessitates going through three complete data mart development cycles. These cycles are:

Visible consultants help the enterprise complete a prototype data mart (or exploration warehouse) while training enterprise personnel on a Data Warehouse "Action Team."

Visible consultants closely monitor and coach enterprise personnel as the Action Team completes the next Data Warehouse element.

Internal enterprise personnel perform a complete Data Warehouse development cycle with minimal assistance from Visible, typically in the form of progress and quality assurance reviews.

After the third cycle, enterprise personnel are fully capable of developing Data Warehouse components on their own. This means that organizational learning has occurred and the enterprise is able to develop a superior Data Warehouse.

Questions:

What is the importance of having three cycles in learning to develop data warehouses?

How could business intelligence result from a data warehouse?

Why do you think businesses would rather learn to do their own data warehousing instead of outsourcing the development?

Solution:

The three cycle approach enables a higher level of learning than would a single cycle. Each step places more responsibility on the enterprise. Visible Systems Corporation continues to monitor the activity to ensure quality and that the enterprise is doing the development correctly.

Business intelligence is the process of getting enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive impact on business strategy, tactics, or operations. Having a data warehouse does not ensure that business intelligence will be present but it makes it easier to acquire business intelligence.

Most businesses may not want their private data being investigated outside their firm. By developing the ability to create a data warehouse, privacy is better protected and changes, modifications, and new applications can be deployed more readily.

Case material derived from:

Business Intelligence and Cognos

Cognos specializes in business intelligence. It operates in more than 100 countries and has over 2,500 people. Currently, its software is licensed by more than 2 million clients in over 15,000 organizations. It is estimated that Cognos is the market leader in business intelligence, holding 33 percent of the market. Cognos solutions are designed to run with leading databases such as IBM DB2, Microsoft SQL Server, and NCR Teradata. In addition, they provide software for enterprise application vendors such as Baan, SAP, J.D. Edwards, Oracle, and PeopleSoft. Cognos develops breadth and depth of business intelligence functionality to ensure that the most appropriate information is delivered to the right people in the right way at the right time—over the Web, as an Excel file, even to a cell phone or wireless PDA. They focus on the end-users' needs both inside and outside the organization while delivering the data infrastructure needed to run a modern business. Cognos provides data marts, pre-built e-applications, sophisticated reporting tools, analysis tools, and visualization software.

Questions:

What exactly is Cognos providing?

Why do you think the business intelligence market is growing so rapidly?

Why is it important to provide information to devices such as cellular phones and PDAs?

Solution:

Cognos is providing infrastructure software that is essentially customized business templates that run on a database platform. It is used to provide business decision makers with useful information from the mountains of data that are generated within a firm.

Businesses are becoming more reliant on 'smart' decision-making to remain competitive.

Business executives and decision makers need immediate access to information when making important choices. This makes it important to access the data in convenient ways. Cell phones and PDAs are important due to their portability.

Case material derived from: http:\\

Teaching Tips

• Spend a classroom day in the lab demonstrating database software.

• Demonstrate how Visual Basic programs can be used with MS-Access. Develop a schema and perform queries on it using software.

Invite a database administrator to the classroom as a guest lecturer. If one that works with data mining or warehousing can be found, all the better!

• Demonstrate a hypermedia Web-based database in the class. Use the View Source option on your browser to demonstrate how hyperlinks are constructed and how this is really an unstructured database.

• Perform a normalization exercise to demonstrate database design concepts.

• Have students use an ER-diagramming tool in the lab.

Further Readings or Resources

Database

Buyens, J. 2000. Web Database Development : Step by Step. Microsoft Press.

General Software

Kaner, Cem, Hung Quoc Nguyen, and Jack Falk, Testing Computer Software, 2nd Edition, (April 12, 1999) John Wiley & Sons.

McConnell, S. Software Project Survival Guide, (November 1997) Microsoft Press

Discussion Questions

Some interesting topics of discussion in this chapter include the following:

➢ Discuss the different commercial database packages available for handheld devices such as Palm Pilots.

➢ What are the potential problems of poor database design?

➢ What would make a database usable by managers as opposed to programmers?

TEAM/GROUP ACTIVITIES

Roundtable Topics:

Microsoft Access

FoxPro

Microsoft SQLServer

ObjectStore

Versant ODBMS

GemStone

Poet

ODBC Standards

Database Development:

Assign a database development project to a team of students. Require them to select an area about which data can be stored then 1) list the entities; 2) develop an ER-diagram; 3) construct the database using MS-Access or another software package.

Problem Solving Exercises

For appliances, consider the following attributes: brand, model, and serial number (unique key).

The following MS-Access table provides an example of the table students may construct. Pull down boxes can be added to the user screen to enable specific categories for Movie Types and Rating to be incorporated.

Case

VNU, International Media and Information Company

The issues involved in collecting, editing, cleaning, and storing the ACNielsen data include: accuracy, reliability, verifiability, and security.

One concern may be the unauthorized use of the information provided.

Providing marketing data, tools, and services to two major multinational companies that are competitors may be perceived as a conflict of interest.

The accuracy of the data provided should be very to the VNU customers. A 4 percent error rate may not sound like much, but a multibillion-dollar corporation could lose millions of dollars if bad information caused the firm to bill all but 4 percent of its orders.

Wells Fargo Bank Uses Predictive Analysis to Improve Profits

One benefit was that they were able to save $250,000 per month on expenses.

Predictive analysis combines historical data with assumptions about future conditions to predict outcomes of events such as future product sales.

Data is critical to an organization’s success, therefore the characteristics that make it valuable include: accuracy, completeness, flexibility, reliability, and relevance.

Business intelligence could also be considered.

Projects to Assign

1. Assign Review Questions: 2, 7, 8, 13 and 14.

2. Assign Problem Solving Exercise 3.

3. Assign Team Activity 3 or Web Exercise 2 or Case 3.

Key Terms

➢ Application servers – software packages that connect end users to the databases holding the information they need to access.

➢ Data dictionary – a detailed description of all data used in the database.

➢ Data mart - a subset of a data warehouse.

➢ Data mining - an information analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.

➢ Data model - a data model is a diagram of entities and their relationships.

➢ Data warehouse - a database that holds business information from many sources in the enterprise.

➢ Database management system - a group of programs that manipulate the database and provide an interface between the database and the user of the database and other application programs.

➢ Projecting – eliminating columns in a table.

➢ Schema – a description of the entire database.

➢ Selecting – eliminating rows according to certain criteria.

DISCUSSION TOPICS

Some interesting topics of discussion in this cChapter Four 4 include the following:

➢ A review of files, folders, and drivesDiscuss the hierarchy of data.

➢ Different commercial database packages available.

➢ Database packages available on handheld devices such as Palm Pilots. File attributes

➢ Potential problems of poor database design.

➢ What would make a database usable by managers as opposed to programmers?How Ways to open, modify, and close new and existing files

➢ The proper use of the query string

➢ When to useObject-oriented databases and how these are more important in an Internet-enabled business environment. Use of the GET method for forms and when to useversus use of the POST method

➢ Careers related to database.An in-depth look at the use of the SiteGalaxy Upload component to upload files to the server

EXTRA CASES

Visible Systems Corporation: Data Warehouse Development

Visible Systems Corporation is a full-service information technology and management-consulting firm. Its goal is to improve software development effectiveness and efficiency worldwide. Many of Visible's clients are engaging in software development as part of various strategic initiatives. One of Visible's specialties falling into this category is data warehousing. As organizations become more aware of the importance of understanding their history to predict their future, data warehousing becomes more valuable. Visible takes great pride in its ability to transfer its data warehousing skills to its clients. According to Visible, the most important skills for an organization to learn include the acquisition, interpretation and representation of all the details that make up a model of an enterprise and transform the model into a Data Warehouse architecture. Visible's clients obtain the necessary expertise through facilitation, training, education, and consulting. According to Visible, this necessitates going through three complete data mart development cycles. These cycles are:

Visible consultants help the enterprise complete a prototype data mart (or exploration warehouse) while training enterprise personnel on a Data Warehouse "Action Team."

Visible consultants closely monitor and coach enterprise personnel as the Action Team completes the next Data Warehouse element.

Internal enterprise personnel perform a complete Data Warehouse development cycle with minimal assistance from Visible, typically in the form of progress and quality assurance reviews.

After the third cycle, enterprise personnel are fully capable of developing Data Warehouse components on their own. This means that organizational learning has occurred and the enterprise is able to develop a superior Data Warehouse.

Questions:

What is the importance of having three cycles in learning to develop data warehouses?

How could business intelligence result from a data warehouse?

Why do you think businesses would rather learn to do their own data warehousing instead of outsourcing the development?

Solution:

The three cycle approach enables a higher level of learning than would a single cycle. Each step places more responsibility on the enterprise. Visible Systems Corporation continues to monitor the activity to ensure quality and that the enterprise is doing the development correctly.

Business intelligence is the process of getting enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive impact on business strategy, tactics, or operations. Having a data warehouse does not ensure that business intelligence will be present but it makes it easier to acquire business intelligence.

Most businesses may not want their private data being investigated outside their firm. By developing the ability to create a data warehouse, privacy is better protected and changes, modifications, and new applications can be deployed more readily.

Case material derived from:

Business Intelligence and Cognos

Cognos specializes in business intelligence. It operates in more than 100 countries and has over 2,500 people. Currently, its software is licensed by more than 2 million clients in over 15,000 organizations. It is estimated that Cognos is the market leader in business intelligence, holding 33 percent of the market. Cognos solutions are designed to run with leading databases such as IBM DB2, Microsoft SQL Server, and NCR Teradata. In addition, they provide software for enterprise application vendors such as Baan, SAP, J.D. Edwards, Oracle, and PeopleSoft. Cognos develops breadth and depth of business intelligence functionality to ensure that the most appropriate information is delivered to the right people in the right way at the right time—over the Web, as an Excel file, even to a cell phone or wireless PDA. They focus on the end-users' needs both inside and outside the organization while delivering the data infrastructure needed to run a modern business. Cognos provides data marts, pre-built e-applications, sophisticated reporting tools, analysis tools, and visualization software.

Questions:

What exactly is Cognos providing?

Why do you think the business intelligence market is growing so rapidly?

Why is it important to provide information to devices such as cellular phones and PDAs?

Solution:

Cognos is providing infrastructure software that is essentially customized business templates that run on a database platform. It is used to provide business decision makers with useful information from the mountains of data that are generated within a firm.

Businesses are becoming more reliant on 'smart' decision-making to remain competitive.

Business executives and decision makers need immediate access to information when making important choices. This makes it important to access the data in convenient ways. Cell phones and PDAs are important due to their portability.

Case material derived from: http:\\

TEACHING TIPS

• Spend a classroom day in the lab demonstrating database software.

• Demonstrate how Visual Basic programs can be used with MS-Access. Develop a schema and perform queries on it using software.

Invite a database administrator to the classroom as a guest lecturer. If one that works with data mining or warehousing can be found, all the better!

• Demonstrate a hypermedia Web-based database in the class. Use the View Source option on your browser to demonstrate how hyperlinks are constructed and how this is really an unstructured database.

• Perform a normalization exercise to demonstrate database design concepts.

• Have students use an ER-diagramming tool in the lab.

FURTHER READINGS OR RESOURCES

Database

Buyens, J. 2000. Web Database Development : Step by Step. Microsoft Press.

General Software

Kaner, Cem, Hung Quoc Nguyen, and Jack Falk, Testing Computer Software, 2nd Edition, (April 12, 1999) John Wiley & Sons.

McConnell, S. Software Project Survival Guide, (November 1997) Microsoft Press

TEAM/GROUP ACTIVITIES

Roundtable Topics:

Chapter 1, page 1-8 of this instructor’s manual describes implementation of the roundtable session. Additional roundtable sessions might include:

Microsoft Access

FoxPro

Microsoft SQLServer

ObjectStore

Versant ODBMS

GemStone

Poet

ODBC Standards

Database Development:

Assign a database development project to a team of students. Require them to select an area about which data can be stored then 1) list the entities; 2) develop an ER-diagram; 3) construct the database using MS-Access or another software package.

SOLUTIONS

Review Questions

Solutions to Review Questions and Projects are provided on the Instructor Resource Kit CD-ROM and at

KEY TERMS

□ Alias – A file that is serves as a shortcut to another file.

□ Archive – A file that has been changed and needs to be backed up.

□ ASCII File – A file that stores data as a series of characters (text).

□ Binary File – A file that contains data that is stored in the form of 1’s and 0’s.

□ colFormElements – A collection that stores the information to be displayed on a form.

□ Compressed – A file that has been compressed by the operating system.

□ Directory – A divider for a storage area on a hard or floppy drive. Also, a file that is a folder. See also Folder.

□ FileField – An object that supplies information about a file passed to the server by a client.

□ Folder – A divider for a storage area on a hard or floppy drive. See also Directory.

□ Form – A collection of form elements returned by a client.

□ Hidden File – A file that is hidden from the user; usually a system file.

□ Logical Path – The URL that a user types in a browser and that provides a path from the virtual directory to a file.

□ Normal File – A regular file that can be opened, modified, and saved.

□ Physical Path – The precise location of a file, including the drive letter and all the relevant folders and subfolders.

□ Query String – A collection of variable and value pairs that allow an application to pass data between Web pages.

□ Read -only File – A file that can be read, but not altered.

□ Share – A pointer to a folder stored on another computer.

□ strMode – Specifies A string specifying the state of a form.

□ strServerFilePath – The path to the physical location where a file is stored.

□ System File – A special file used by the operating system.

□ TextStream – An object that allows an application to open, read, write, and close a file on a server.

□ Unicode File – A file that stores data as a series of characters (text). A Unicode file differs from an ASCII file because in that it can store special characters from different languages.

followuseding

The hierarchy of data refers to the way in which data is organized, ranging from the smallest piece used by a computer (a bit) to an entire database. The hierarchy is summarized in the following table:

| | |

|Hierarchy Component |Definition |

| | |

|Bit |A single binary digit with either a one or zero state |

| | |

|Character |A byte, which is the basic building block of information |

| | |

|Field |A name, number or combination of characters that describes an aspect |

| |of a business object or activity |

| | |

|Record |A collection of related fields |

| | |

|Files or Tables |A collection of related records |

| | |

|Database |A collection of related files or tables |

Databases are collections of integrated and related files. The DBMS is the software used to manipulate the database and provide an interface between the database and the user or application programs. A database management system is systems software that helps organize data for effective access and storage by multiple applications. A DBMS provides different users different views of the data (subschemas), avoids redundancy, encourages program independence, offers flexible access and provides centralized control.

Data cleanup is the process of looking for and fixing inconsistencies to ensure that data is accurate and complete. Often, duplicate or inconsistent records are located and fixed.

The database approach to data management offers many advantages. Among these are improved strategic use of corporate data; reduced data redundancy; improved data integrity; easier modification and update; data and program independence; better access to data and information; standardization of data access; a framework for program development; greater data security and control; and the ability to share data and information resources with ease.

The following table provides a summary of the different data models:

| | |

|Database Model |Characteristics |

| | |

|Hierarchical |Data is organized in a top-down or inverted tree |

| |structure |

| | |

|Network |An extension of the hierarchical model in which a member |

| |may have many owners |

| | |

|Relational |A model that organizes data in tabular format with rows |

| |and columns |

A database schema is a description of the entire database. It can be part of the database or a separate file. The DBMS can reference a schema to find where to access a particular piece of data in relation to another.

The important characteristics that should influence the selection of a database management system include: 1) database size – how large does the database need to be? 2) number of concurrent users – how many simultaneous users will access the database at any one time?; 3) performance issues – how fast does the database need to perform various operations?; 4) integration – does the database need to interact with other systems?; 5) features – what wizards, security, documentation systems and other pertinent tools come with the database?; 6) vendor – does the software supplier have a reliable history and a current stability?; and 7) cost – how much will the system cost in terms of purchase and operation?

6. The data definition language is a collection of instructions and commands which enables the database’s creator to describe the data and data relationships that are to be contained in schemas and subschemas (user views of the data). A data manipulation language includes the set of commands used to manipulate the data in a database. SQL is an example.

7. A distributed database is one in which the physical data may be spread across several smaller databases connected via networks or telecommunication devices. Although in separate locations, the data may appear in a single unified schema.

8. ODBC-compliance offers the ability to export, import, or link tables between different applications. ODBC is a set of standards that ensures compliant software will work with a variety of databases. In distributed environments, this means database tables from a variety of sources can be used together.

9. A data warehouse is a relational database management system designed to specifically support management decision making. An on-line transaction processing (OLTP) system collects business data as it is generated. This data, while efficiently collected, is not ready for meaningful analysis. Instead, it must be rendered into a steady state before it can be used for decision making. The data in a warehouse is derived from the on-line transaction processing system data but only after it has been ‘cleaned up’. The data warehouse then manages the flow of this data to end user applications.

10. On-line analytical processing (OLAP) programs are used to store and deliver data warehouse information. The OLAP allows users to explore corporate data in new and innovative ways using multiple dimensions such as products, salespeople, or time. OLAP programs include spreadsheets, reporting and analysis tools, and custom applications. Recently, a group of software suppliers has developed a set of OLAP programs based on storing their data in relational databases. These tools are referred to as relational OLAPs or ROLAPs.

Data mining is the automated discovery of patterns and relationships in data warehouses. OLAP tools can tell users what happened in their business. Data mining searches the data for statistical ‘whys’ by seeking patterns in the data and then developing hypotheses to predict future behavior.

ORDBMS stands for object-relational database management system. ORDBMSs provide all the advantages of relational database management systems plus add the capabilities required to manipulate and store user-defined data types such as audio, video, graphics and image. The data is stored together with instructions for decoding and using the data.

Business intelligence is related to getting the correct information to the correct users in a timely fashion. The information must be in a usable form so that it can be incorporated into business strategy, tactics, or operations. It is used to guide decision making.

Competitive intelligence involves collecting data regarding the competition, in legal and ethical ways. It also involves the controlled dissemination of this information to decision makers.

Discussion Questions

When discussing this question, the instructor should guide the students to consider the important aspects of database design. This includes meeting with users to discuss their data needs, creating a data model using an ERD, refinement of the data model, and actual construction using database software. Aspects of prototyping and testing can also be brought into the discussion.

Counterintelligence involves collecting information about the competition. This means that prior to building this new facility and introducing a new product line, information about what the competition is doing is required. Will they introduce similar new products? What pay does their production receive? What aspects of their operation need to be better understood to provide maximum advantage to corporate decision-makers?

A data model is a map of entities and their relationships. This discussion will reinforce ideas that only the simplest databases can be constructed in an ad hoc fashion. The complexities associated with corporate databases must be modeled and analyzed to develop an appropriate representation. The data model aids in the conceptualization and logical structuring of data so application programs can be developed appropriately. While the data model promotes this development process, it also serves a broader purpose. Data models developed at the level of the entire organization, called enterprise data modeling, can be used for strategic planning and to provide a better understanding of the specific data and information needs within various functional and departmental areas. Data modeling yields the strategic planner both a view of the current data resources and a working pallet from which future plans can be visualized and designed.

The important characteristics that would influence the selection of a database management system include: 1) database size – the wine tasting database would not need to be too large; 2) number of concurrent users – an end user package could be used without requiring concurrent users; 3) performance issues – reasonable speed would be fine; 4) integration – no need to interact with other database systems, although ability to post to a Web site could be desirable; 5) features – easy-to-use and understand for non-programmers; may also want the ability to store scanned images of wine bottle labels; 6) vendor – mainstream vendor desired; and 7) cost – under two hundred dollars would be great. Microsoft Access 2000 or an ORDBMS would probably be the best selection.

A data mart is a subset of the data warehouse. Often data marts are used to support a particular area of an organization. The data mart provides only the required information and reduces the amount of processing and complexity of the data for an individual group or effort. Whether to use the data mart or data warehouse approach is often a matter of corporate policy and is determined by assessing user needs and the level of data analysis.

1. The following list represents the types of responses students may provide during the course of this discussion:

| | | | | |

|Database |How Data Captured? |Who Updates? |How Often Updated? |Can Request |

| | | | |Printout? |

| | | | | |

|Department of Motor |License applications/ |DMV employee/ Police |Yearly/After traffic |Yes |

|Vehicles |Citations |department employee |incidents | |

| | | | | |

|Health |Medical forms filled out|Medical staff |After appointments or |Yes, if you know |

| |by doctor/Insurance |member/Insurance company |visits/Whenever |who to ask |

| |application forms |staff member |applications are filled out| |

| | | | | |

|Credit |If a payment is late or |Institutions receiving your|Nearly every billing cycle |Yes, with payment|

| |missed, forms are filled|business | | |

| |out and submitted | | | |

| | | | | |

|IRS |Tax forms |IRS employee |Yearly |Not known for |

| | | | |sure but may be |

| | | | |possible |

| | | | | |

|University/Grades |Instructors fill out |Student services employee |Every semester courses are |Yes |

| |course grade sheets | |taken | |

The following table summarizes potential points that might develop in this discussion:

| | |

|OLAP Approach Used |Data Mining Approach Used |

| | |

|Determining if sales have increased in a particular product |Understanding cause/effect relationships in customer |

|line over the past year |purchasing decisions |

| | |

|Developing graphic depictions of yearly sales by salesperson |Statistical analysis of relationship between various data |

|and territory |items used for predictions |

| | |

|Representation of historic data in a variety of ways |Development of regression models |

| | |

|Summarization of yearly activities |Factor analysis to determine underlying components |

| |influencing behaviors |

A key point in favor of this argument would be improvements in decision-making capabilities for the bank. Customer data could be analyzed and reviewed in new ways. These new insights could provide ideas on how to target marketing campaigns more effectively, reduce costs and improve customer loyalty. With a data warehouse in place, data mining could be implemented. Patterns of customer behavior could be identified with these analysis techniques. Things like market segmentation, customer churn, fraud detection, direct marketing, market basket analysis and trend analysis would all be possible. Some of the downsides might include need for specialized staff, cost of software, hardware and backups.

Problem Solving Exercises

This exercise is meant to introduce students to the complexities of creating unique key fields. If it could be assumed that all serial or registration numbers would be unique, this could become the key field. If not, a combination key may need to be created. Perhaps it could be the serial/registration number and date of purchase. Another possibility is to create a unique ID number for each item. This adds an extra data item to the tables and doesn't really add value to the database.

The following MS-Access table provides an example of the table students may construct. Pull down boxes can be added to the user screen to enable specific categories for Movie Types and Rating to be incorporated.

The following table summarizes expected responses:

| | | |

|Proposed Changes |Database Modifications |Rationale |

| | | |

|Adding first available date of movie |Adding additional field |This is an attribute of the movie |

| | | |

|Adding director’s name |Adding additional field |This is an attribute of the movie |

| | | |

|Adding the names of three stars in movie|Adding additional 3 fields or adding a star |This is an attribute of the movie but could |

| |table which uses the movie ID as a foreign |be a separate table to reduce redundancy |

| |key | |

| | | |

|Adding a critic’s rating of one, two, |Adding additional field |This is an attribute of the movie |

|three or four stars | | |

| | | |

|Adding the number of Academy Award |Adding additional field |This is an attribute of the movie |

|nominations | | |

An entry screen might look like this:

Team Activities

The following Websites provide information about the leading providers of DBMS software:

Microsoft SQLServer:

IBM DB/2: search on DB2

Oracle:

Some of the required data would include items such as Student Info (name, date of birth, address, phone #, e-mail, other demographic information); Student Accomplishments (club memberships, activities, honor, awards, affiliations); Student Testing Data (SAT, ACT, PSAT); and Student School Information (GPA, Class Rank, Degree Area). A preliminary look at the information might appear like this:

Web Exercise

Some good starting points for this exercise include:



Data mining:



Data Warehousing:



OLAP:





The following Web search provides a starting point for this Web exercise.

Cases

Case 1: Lockheed Martin Implements OLAP System

The OLAP system provides a single, consolidated view of business data that can be explored from a variety of perspectives. The ability to readily analyze the data is not present in more traditional database software systems.

By tracking past performance data, projections concerning future labor demand can be developed.

The data being developed and collected in the OLAP is sensitive because it provides competitive advantage. Other competitors could use the information to improve their capabilities.

Other divisions needing to forecast manpower requirements, purchasing strategies, as well as having other needs could also use this capability.

Case 2: Allina Health System Implements a Data Warehouse

Depending on the student's background, they may select either the data management group, the tools group, or the business analyst group.

1. The three tier architecture and the wide array of users in a variety of locations has made this project very difficult in terms of technology and integration.

2. The data model will have four entities: people, locations, items, and events. These will need to have key attributes such as SS# for people, location ID, Item number, and event ID.

3. As long as corporate data was not released along with the technology, it could be considered. The management team would also have to decide if they wanted competitors from within the same region to have access to the same level of technology. Would it result in business loss? Could the funds generated be leveraged into an even greater technological advantage? Is this really the organization's strength?

Case 3: Fifth Third Bank Investing in Internet Systems

1. Initiatives that attract new customers and sales, like the mortgage officers being at open houses, and a sales force armed with laptops will increase revenues. Initiatives that encourage customers to avoid faxing and obtain information on line will reduce expenses.

The following table summarizes several issues regarding database type, size, and contents:

| | | | |

|Service |Technology |Size |Contents |

|Credit card information over |Relational database with high |May be large depending on |Personal customer information; |

|the Internet |security |customer base |sensitive information |

|Mobile workers |Replicated relational |Smaller; fit on laptop or PDA|Relevant to services being sold |

| |databases | | |

|401 K planning site |Hypermedia database |Large application linked to |Information desired by clients |

| | |account information |using planning services; must be|

| | | |linked to their account |

| | | |information |

|On-line access to manuals |Hypermedia / hypertext |Requires space on Web server |Large text-based files. |

| |database | | |

Until more people become comfortable with online banking, the mobile sales force will probably yield the most visible, immediate success. In the long term, the movement to the Internet will become not only successful but necessary to stay in business.

They will find the investment necessary as the Internet becomes more embedded in everyday life.

|

-----------------------

[pic]

[pic]

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download