Databases

67 downloads 215 Views 1MB Size Report
file, metode akses dan penyimpanan data; pengertian dan keuntungan sistem manajemen basisdata, dan jenis-jenis akses basisdata yg utama(C2).
Basisdata (Databases) Sumber: Chapter 8. Databases & Information Systems: Digital engines for today’s economy, p.407

Williams, B.K, Stacy C. Sawyer (2007). Using Information Technology: A Practical Introduction to Computers & Communications. Seventh Edition, McGraw-Hill, New York. ISBN-13: 978-007-110768-6

1

Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu :

• menjelaskan: hierarkhi data, key-filed, tipe file, metode akses dan penyimpanan data; pengertian dan keuntungan sistem manajemen basisdata, dan jenis-jenis akses basisdata yg utama(C2) • menjelaskan: jenis-jenis model basisdata, manfaat dan cara kerja data mining; etika dalam penggunaan basisdata (C2) 2

Outline Materi

• • • • •

Managing Files: Basic Concepts Database Management Systems Database Models Data Mining The Ethics of Using Databases

3

Managing Files: Basic Concepts • A database is a logically organized collection of related data designed and built for a specific purpose • Data is stored hierarchically for easier storage and retrieval • Files: collections of related records • Records: collections of related fields • •

Field: unit of data containing 1 or more characters Character: a letter number or special character made of bits



Bit: a 0 or 1 8-4

Managing Files: Basic Concepts • Key Field – the field that identifies a record – Often an identifying number, such as social security number – Primary keys must be unique • Keys are used to pick records out of a database • Unique keys make records stand out from each other • If two records had the same key, then you might not pick the correct one – Nonprimary keys are used to sort records in different ways – Foreign keys are fields that appear in two different tables and are used to relate one table to another

8-5

Managing Files: Basic Concepts

8-6

This example shows a sample database in Microsoft Access. Products is a table. ProductID is the primary key of the Product table. ProductID is also a foreign key in the Orders table

Managing Files: Basic Concepts • Program files are files containing software instructions – Source program files are written by the software developer in the programming language • Double-clicking on them won’t run them • They have file extensions like .cpp, .jav, .bas

– Executable files are program files translated so they can be executed on the computer • Double-clicking on them will cause them to run • They have file extensions like .exe or .com 8-7

Managing Files: Basic Concepts • Data files are files that contain data such as words, numbers, pictures, or sounds – These are the files that are used in databases – They have extensions such as .txt .mdb, and .xls – Graphics files have extensions like .tiff, .jpeg, and .png – Audio files have extensions such as .mp3, .wav, and .mid – Animation/video files have extensions such as .qt, .mpg, .avi, and .rm

• Data files are often compressed to save space and transmit them faster – Compression removes repetitive elements from a file 8-8

Database Management Systems • Software written specifically to control the structure of a database and access to the data – Reduced data redundancy • Redundant data is stored in multiple places, which causes problems keeping all the copies current

– Improved data integrity • Means the data is accurate, consistent, and up to date

– Increased security • Limits who can create, read, update, and delete the data

– Ease of data maintenance • Offer validation checks, backup utilities, and procedures for data inserting, updating, and deletion

8-9

Database Management Systems 3 Principal Components

• Data Dictionary – A repository that stores the data definitions and descriptions of the structure of the data and the database

• DBMS Utilities – Programs that allow you to maintain the database by creating, editing, deleting data, records, and files – Also include automated backup and recovery

• Report Generator – Program for producing an on-screen or printed document form all or part of a database 8-10

Database Management Systems Database Administrator

• Database Administrator (DBA) – A high-paid, responsible position within an organization – Coordinates all related activities and needs for an organization’s database – Ensures the database’s • • • • • •

Discussion Question: Did you know that 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within a year?

Recoverability Integrity Security Availability Reliability Performance 8-11

Database Models • Fields or records are arranged in a family tree, with child records subordinate to parent or higher-level records • Like a hierarchical database, but each child • Network database record can have more than one parent record • Relates, or connects, data in different files • Relational database through the use of a key, or common data element • Uses objects (software written in small, • Object-oriented reusable chunks) as elements within database database files • Models data as facts, dimensions, or • Multidimensional numerical measures for use in the interactive analysis of large amounts of data database

• Hierarchical database

8-12

Database Models • Hierarchical Databases – Fields or records are arranged in related groups resembling a family tree with child (low-level) records subordinate to parent (high-level) records – Root record is the parent record at the top of the database, and data is accessed through the hierarchy – Oldest and simplest; used in mainframes

8-13

Database Models • Network Database – Similar to a hierarchical database, but each child record can have more than one parent record – Used principally with mainframe computers – Requires the database structure to be defined in advance

8-14

Database Models • Relational Database – Relates or connects data in different files through the use of a key, or common data element – Examples are Oracle, Informix, Sybase – Data exists independently of how it is physically stored – Users don’t need to know data structure to use the database – Uses SQL (structured query language) to create, modify, maintain, and query the data – Query by Example uses sample records or forms to allow users to define the qualifications for choosing records 8-15

Database Models • Object-oriented Databases – Use “objects”, software written in small, manageable chunks, as elements within data files – An object consists of • Data in any form, including audio, graphics, and video • Instructions on the action to be taken with the data

– Examples include FastObjects, GemStone, Objectivity DB, Jasmine Object Database, and KE Express – Types include • Web database • Hypermedia database

8-16

Database Models • Multidimensional Database – Models data as facts, dimensions, or numerical answers for use in the interactive analysis of large amounts of data for decisionmaking purposes – Allows users to ask questions in colloquial English – Use OLAP (Online Analytical Processing) software to provide answers to complex database queries 8-17

Data Mining • Is the computer-assisted process of sifting through and analyzing vast amounts of data to extract hidden patterns and meaning and to discover new knowledge • Data is fed into a Data Warehouse through the following steps – – – –

Identify and connect to data sources Perform data fusion and data cleansing Obtain both data and meta-data (data about the data) Transport data and meta-data to the Data Warehouse

• Data Warehouse is a special database that shows detailed and summary data from multiple sources 8-18

Data Mining • Methods for searching for patterns in the data and interpreting the results – Regression analysis • Develops a formula to fit patterns in the data that has been extracted • Formula is applied to other data sets to predict future trends

– Classification analysis • A statistical pattern recognition process that is applied to data sets with more than just numerical data 8-19

Data Mining • Applications include – A phone company identifying customers with large bills, who were really small businesses trying to pay the cheaper residential rate – A coach in the Gymnastics Federation used it to discover what long-term factors contributed to athletes’ performance – Retail stores use it to predict future purchase patterns to help them choose which products to stock for the future 8-20

The Ethics of Using Databases • Identity Theft concerns – A crime in which thieves hijack your identity and use your good credit rating to get cash, take out loans, order credit cards, and buy things in your name

• Privacy concerns – Name migration: getting endless junk mail and telemarketing calls – Résumé rustling and online snooping – Government prying and spying Discussion Question: Has any one had their identity stolen? How long did it take you to get it straightened out? 8-21

Kesimpulan

22