ITE Unit 5
ITE Unit 5
APPLICATION ESSENTIALS
Advantages of DBMS
1. Reduced Data redundancy – The database approach removes the redundancy by integrating the
files. But this approach cannot eliminate redundancy completely but can control the data
redundancy.
2. Data consistency - In this approach all copies of data are kept consistent.
3. Sharing of data - The centralized stored database can be accessed by multiple users or
application programs.
4. Centralized database- Data is stored in a single repository and an authorized access to this data
is allowed. Only the administrator can give appropriate access rights to the authentic users.
5. Data Integrity – This provides validity and consistency of stored data.
6. Improved Security – The database approach prevents unauthorized access to data by means of
user name, password, and access rights.
7. Use of Standards - Certain standards can be enforced to database approach for data formats,
naming conventions, documentation standards, access rules and so on.
8. Backup and Recovery - The Backup and Recovery – The backup and recovery actions can be
taken in its current consistent state from inconsistent state
9. Increased productivity - The database approach allows programmer to concentrate on specific
functionality required by the user.
10. Increased Concurrency- The database approach handles the concurrent data effectively. The
loss of information or integrity is avoided in this approach.
11. Improved Maintenance
Disadvantages of DBMS:
Complexity – Difficult to implement
Size - Large storage space
Cost - The multiuser database management system is very expensive.
Data Models
They describe the logical structure of a database, relationship between the database stored in
database and various constraints on data.
Importance of Data Model
1. End users have different view for data.
2. Data model organizes data for different users.
Types of Data Model:
1. Hierarchical Model:
In this model, each entity has only one parent but can have several children. At the top of the
hierarchy there is only one node called root.
This model represents the relationship in 1:N types.
i.e One university can have multiple courses. One course can have multiple projects and so on.
Advantages:
This model groups the data into tables and defines the relationship between the tables.
Disadvantages
For searching any data, we have to start from the root and move downwards and visit each
child node. Thus traversing through each node is required.
For addition of some information about child node, sometimes the parent information needs
to be modified.
It fails to handle many to many relationships. It causes duplication and data redundancy.
2. Network Model:
This is enhanced version of hierarchical model. It addresses the M:N relationship . i.e No single
parent concept. So, any child in this model can have any number of parents.
Advantages:
Capability to handle more relationships: Since the network model allows many to many
relationship, it helps in modeling real life situations.
Ease of data access
Data Integrity
Disadvantages:
Complex to implement
Complicated Operations
Difficult to change structure
3. Relational Model:
In a relational model, the data is stored in the form of tables. The database systems based on it are
called relational database systems. These tables are related to each other.
Advantages:
The database design is simple to implement and manage.
In this model, the table is an entity which is primarily used. Hence insertion, deletion and
retrieval of data becomes easy.
The data can be easily linked with other table, using the table attributes.
It facilitates the support for SQL languages.
It ensures the structural independence.
Disadvantages:
It has substantial hardware and software overhead.
It can facilitate to poor design and implementation.
It cannot handle the data in the form of images, audio or video.
4. E-R Model:
This model is basically used to design the relational database systems; the primary purpose of
E-R Model is to show the relationship between various data objects. The object relationship pair
can be graphically represented by a diagram called Entity Relationship Diagram (ERD).
Components of ERD:
Entity:
An entity is an object that exists and is distinguishable. It is similar to a record in a programming
language with attributes and entities are represented by rectangle.
Relationship:
An association among several entities. It is represented in diamond. Relationship may have
attributes and have cardinality (e.g. One-to-many).
Attribute:
It is drawn in ellipses. It is similar to record fields in a programming language. Each attribute has a
set of permitted values called domain.
Notations used in ER Diagram:
Entity: It is an object and distinguishable it is similar to record.
Weak Entity: When this entity is dependent upon some another entity then it is called weak entity.
Attribute: The attributes are properties or characteristics of an entity.
Derived attribute:
It is a kind of attribute which is based on another attribute.
Key attributes:
A key attribute is an unique attribute representing distinguishing characteristics of entity. Typically
primary key of record is a key attribute.
Multivalued attribute: A multivalued attribute have more than one value.
Relationship:
When two entities share some information then it is denoted by relationship.
Example: Draw an ER diagram for the relationship of teacher, and courses. Also specify the
association, cardinality and modality.
Association:
In the above ER diagram, a relationship conducts is introduced. “Teacher” is associated with
“Course” by conducting it.
Cardinality:
Many Teachers can conduct the single course.
Modality:
For conduction of a course, there must be a Teacher. There may be a situation that a Teacher is not
conducting any course.
Advantages:
Simple to design.
Visual Representation.
Easy Conversion to tables.
Disadvantages:
Limited Specification.
High level design.
No industry standard.
The database system architecture represents the structure and layout of the data stored in it. The
architecture of database system can be from single tier to multitier. The multi-tiered system divides
the whole system into multiple modules. Each of these individual modules can be independently
altered or modified.
Database Tier:
This is the layer at which the actual database resides. In this layer, all the tables, their mappings and
the actual data present. When you save you details from the front end, it will be inserted into the
respective tables in the database layer, by using the programs in the application layer. When the
user wants to retrieve the data from this database, the database layer fires the queries to get the data
from the tables present in the database.
Application Tier:
This layer sends the requests made by the users of presentation tier to the database tier and returns
the response from database tier to presentation tier. The layer has all the business logics like
validation, calculations and manipulations of data. If this layer sees that the request is invalid, it
sends back the message to presentation layer. Hence, the application layer sits in the middle and
acts as the mediator between the users and the database.
Presentation Tier:
This layer is made up of the users who use the database. These users have no knowledge of
underlying database. At this layer multiple views of the database are provided.
Data Independence:
Definition: Data independence is an ability by which one can change the data at one level without
affecting the data at another level. Here level can be physical, conceptual or external. Data
independence is one of the most important characteristics of database management system.
By this property, the structure of the database can be easily modified by without changing the
application programs. There are two types of independence:
1. Physical Independence:
This is the kind of data independence which allows the modification of physical schema without
requiring any change to the conceptual schema. For example – if there is any change in memory
size of database server then it will not affect the logical structure of any data object.
2. Logical Independence:
This kind of data independence which allows the modification of conceptual schema without
requiring any change to the external schema. For example – Any change in the table structure such
as addition or deletion of some columns does not affect user views.
By these data independence the time and cost acquired by changes in any level can be reduced and
abstract view of data can be provided to the user.
Data Dictionary:
Concept: Data dictionary contains information about database itself. The data dictionary thus
contains the metadata i.e. data about data. Following types of information is stored in data
dictionary.
Definition of database objects such as tables, views, constraints, clusters, procedures,
functions, triggers
Column name
Data type information
Amount of space required to store the data object
Default field values
Access rights
Database usernames – Schema information
Last updated or accessed information
All this information can be stored in tables , XML files or in spreadsheet.The data dictionary is
updated automatically by the database systems when user issues the corresponding queries.
Keys used in Database Applications
Keys are important in relational database in order to establish the relationship between the tables.
The keys are also used to access the records in the database table. Following are the various keys
that are used in database system.
1. Primary Key:
This is the most important key in database which uniquely identifies the record. It can be a single
attribute or combination of attributes. The database designer has to specially assign one of the
candidate keys as primary key so that the record can be uniquely identified with the help of it. For
example – Stud_RollNo is a primary key from the student database.
Stud_RollNo FirstName LastName Address CourseId
1001 AAA BBB Mumbai C101
1002 XXX YYY Pune M201
1003 PPP QQQ Bhopal E303
2. Candidate Key:
A candidate key is a single field or the least combination of fields that uniquely identifies each
record in the table. But the individual attribute cannot identify the record uniquely. For example –
FirstName, LastName, Address in combination can uniquely identify the record, but individually
FirstName, LastName or Address cannot uniquely identify the record.
Stud_RollNo FirstName LastName Address CourseId
1001 AAA BBB Mumbai C101
1002 XXX YYY Pune M201
1003 PPP QQQ Bhopal E303
3. Foreign Key:
A Foreign Key is generally a primary key for one table that appears as a field in another where the
first table has relationship to the second. For example: consider the following student table in
which CourseID is a foreign key.
Stud_RollNo FirstName LastName Address CourseId
1001 AAA BBB Mumbai C101
1002 XXX YYY Pune M201
1003 PPP QQQ Bhopal E303
CourseId Name
C101 Computer Engineering
M201 Mechanical Engineering
E303 Environmental Engineering
V505 Civil Engineering
4. Composite Key:
The key that consists of two or more attributes that uniquely identifies an entity occurrence is
called Composite key. For example to identify the Student taking particular course we can uniquely
identify such type of record by combining two or more columns from the same table. Hence,
Stud_RollNo and CourseId together form a composite key.
Stud_RollNo CourseId
1001 C101
1002 M201
1003 E303
III.MULTIMEDIA APPLICATIONS:
The word multimedia means more than one media for conveying information. The multimedia can
be defined as:
Definition: Computer- based techniques of text, images, audio, video, graphics, animation , and
any other medium where every type of information can be represented, processed, stored,
transmitted, produced and presented digitally.
Examples:
Some of the important programs are listed below in some categories. They are:
Maya, Flash, Blender, comes mainly under graphics category.
Interactivity category basically includes MySQL, AJAX, Flash and Flex and PHP.
Audio category is of sound slides, Pro-tools, Adobe Auditions and more.
Similarly programs in video category are Canopus Edius, i Movie, Flash Video Encoder,
Final Cut Pro.
Text programs are like Word press, InDesign, and Dream Weaver.
Components of Multimedia:
1. Text can be added for giving emphasis.
2. Graphics are added for visual impact. A picture is worth a thousand words. Graphics
enhance presentation.
3. Voice or audio enhance presentation by adding persuasion.
4. The animation is for attracting attention. A chart can be focused more quickly by adding
animation to it.
5. Video is multimedia can be used for providing clear instructions.
Uses of Multimedia:
1. Education:
Multimedia is extensively used in the fields of education and training. Even in conventional
method we use audio visual for imparting education, where charts, model etc. were used. Now a
days the classroom need is not limited to that conventional method rather it needs audio and visual
media. The multimedia integrates all of them in one system. For the use of multimedia as an
education aid the PC contains a high quality display. The software package named computer aided
instruction is available that provides a friendly interactive method of learning.
2. Training:
There are various systems and intelligent tutoring systems available to train the students in many
areas starting from the mathematics of a primary student to a difficult surgical process for a
medical student.
3. Business:
The business application of multimedia includes, product demos, instant messaging. One of the
excellent applications is voice and live conferencing. A multimedia can make audience come live.
It is widely used in programs. The quality og business communication can be enhanced by
multimedia. Product promotion, customer information, communication to employee can be done by
multimedia.
4. Games and Entertainment:
Real life games can be created by multimedia. Developers use sound, animation, graphics of
multimedia to create games. Flight simulator creates real life imaging.
2. Processing:
Processing means converting or transforming data into useful output.
Processing can involve making calculations, comparing data and taking alternatives actions, and
storing data for future use. For example – in tax management system – the tax needs to be
calculated from using the data such as gross salary, insurances, other deductions and so on.
Processing data into useful information is critical in business settings. Processing can be done
manually or with computer assistance. After processing the data results are typically stored in
storage.
3. Output:
Output involves producing useful information in the form of documents or reports.
For example – in online banking system, the report is getting generated on the current transaction
and can be presented to the customer in the form of bank statement. This statement shows the
details of all the transactions and the current available balance in the account.
4. Feedback:
In information system, feedback is information from the system which is used to make changes to
input or processing activities. For example, errors or problems might make it necessary to correct
input data or change a process. Consider a payroll example. Perhaps the number of hours an
employee worked was entered as 400 instead of 40. Feedback is very important to managers or
decision makers in order to modify the system.
Characteristics of Information System:
Accessibility : Information present in the information should be easily accessible by
authorized users.
Accurate: The information must be accurate and error free.
Complete: Information present in the information system must be complete so that it wil
satisfy all the queries of its users.
Relevant: The relevant information is important for the decision maker.
Reliable: This is very important characteristics of the information system. The reliable
information is trusted by its users. The reliability of information depends upon the sources
of data collection for the information systems.
Secure: The information systems must be secure and prevent any unauthorized access to it.
Simple: The information system must be very simple to handle and not very complex. It
should not present the information system with too many details whereby the decision
maker is unable to determine what is really important.
Timely: The information in the information system must be delivered in timely manner
whenever it is required.
Economical: Information must be economical to produce.
Verifiable: The information must be verifiable, that means one can check it to make it sure
that information available in the information system is correct.
Types:
1. Feasibility study:
The aim of a feasibility study is to see whether it is possible to develop a system at a
reasonable cost. At the end of the feasibility study a decision is taken whether to proceed or
not.
A feasibility study contains the general requirements of the proposed systems.It may be that
development of a new system is not needed instead an update of the existing is enough.
2. Requirement Analysis:
This is very important part in the development of an Information System and involves
looking at an organization or system and finding out how information is being handled at
the moment.
The stage where users and IT specialists work together to collect and comprehend the
business requirements. Based on requirements, both will work on the design and discuss the
tasks to be done.
The requirement analysis document is prepared at the end of this stage.
3. Design:
At, this stage the systems blueprint is created.
The technical architecture is designed which includes telecommunications, hardware and
software suited for the system.
The design process include: Outputs, Inputs, File Design, Hardware, Software
The system design should be done for : user interface, data design, process design
4. Development and Testing:
Any new system needs to be thoroughly tested before being introduced.
During this stage the building of the technical architecture, database and programs are
executed.
It is also the stage where the system is tested using the established test scripts and compare
the expected outcomes to actual outcomes.
5. Implementation:
The stage where system is in place and is used by the actual workforce.
User guide manual and training are provided to users.
6. Evaluation:
During this stage system need to be evaluated for any bug from time to time.
7. Maintenance:
This is the stage where system needs to be enhanced or strengthened in order to meet the
goals of the organization.
Exercise: Design simple personal application that gives you reminders for each day. Identify
the inputs to be taken, processing to be done, and the output to be produced . What
multimedia components can be added to this application?
The personal application for reminder is a simple and effective application that can be used in busy
schedule for reminding the day to day activities.
Features of this application:
Users can set / update date / time of particular event.
The history data can be cleared.
Priority of task can be set or changed.
One can feed to-do list to the application.
The meeting schedule can be input to the application. The remaining application will
display the schedule one hour prior to actual schedule.
The birthdays, anniversaries or important dates can be reminded on particular dates by
flashing images, messages and ringing alarm. Users can stop the alarm or press ‘remind me’
after sometime button.
Email data via, name of person, email address, phone number and so on can be used by the
application as input. This feature can be set if user permits to do so.
The day / date / time can be set according to appropriate time zone of the country.
The GUI for simple personal application that gives you reminders is as follows:
Input : Name of the person, birthdate, anniversary date, meeting time, purpose of meeting,
allotted timing for meeting.
Processing: It involves making calculations, matching data against system date, matching
person name, storing data for future use.
Output: Displaying reminding information on the device, displaying date, ringing alarm,
flashing light.
Multimedia Components:
Text: The text is used for typing the input to the system as well for displaying the name of
the event, detailed information about some schedules, to-do list, name of the person and so
on.
Graphics: The attractive graphics flashing as output on matching with date or time of
particular event.
Image: The image / photo of the persons can be displayed on the app while reminding the
birthdays and anniversaries.
Audio: Melodious songs or ringtone will be ringing for the reminding alarm.
Animation: Animated images or text can be displayed on the device for reminding app on
particular event.