Module 11: Building Solutions: Database, System, and Application Development Tools
Data type
Specifies the kind of data a field in a database can contain and how the field is used.
Multidimensional database
Stores data in dimensions.
Object-oriented database (OODB)
Stores data in objects.
Phases
System development activities often are grouped into larger categories called this.
1. Group activities into phases. 2. Involve users. 3. Define standards.
System development should follow what 3 general guidelines?
File processing system
System used to store and manage data in which each department or area within an organization has its own set of files.
Consistency check
Tests the data in two or more associated fields to ensure that the relationship is logical and their data is in the correct format. For example, the value in a Date Admitted field cannot occur earlier in time than a value in a Birth Date field. Field(s) Being Checked: Date Admitted, Birth Date. Valid Data: 9/19/2019 8/27/2000. Invalid Data: 9/19/2019 8/27/2020. (Sample Valid and Invalid Data)
Roll-forward (forward recovery)
The DBMS uses the log to undo any changes made to the database during a certain period.
Project team
The _____ _____ consists of users, the systems analyst, and other IT professionals.
Digital forensics
The collection and analysis of biometric and other data used in criminal investigations is called this.
Documentation
The collection and summarization of data, information, and deliverables.
Distributed database
The data exists in many separate locations throughout a network or the Internet.
Variety
The different formats in which data can appear.
Validation
The process of comparing data with a set of rules or values to determine if the data meets certain criteria.
Project management
The process of planning, scheduling, and then controlling the activities during system development.
Change management
The process of recognizing when a change in the project has occurred, taking actions to react to the change, and planning for opportunities because of the change.
Velocity
The rate at which data is generated.
Secure the Database
- Each person accessing the database should have a profile that includes a user name, a strong password that must be changed frequently, and limits on database system-level access. - Only administrators should have access to create and delete tables. - Consider allowing typical users only to view or modify records. - Restrict users to accessing only database tables and records that are necessary to perform their job function(s). - Limit the number of unsuccessful sign-in attempts in a specified period, and record when users access the database.
Maintain the Database
- If the database contains a table that you do not need (and you do not foresee a future need for the data in that table), remove the table from the database. - Evaluate the fields in all remaining tables and make sure they are assigned the proper data type. Make any necessary adjustments. - Remove fields you no longer need from the tables in your database. - If the database contains a large number of records, consider deleting records you no longer need. - Navigate to and then click the command to compact and repair the database (if available). - If you want to protect the data in the database, consider selecting the option to encrypt the database.
Advantages of a database approach
- Reduced data redundancy. - Improved data integrity. - Shared data. - Easier access. - Reduced development time.
Recovering from identity theft
- Request a fraud alert. - Order credit reports. - Obtain and FTC affidavit and file it with law enforcement agencies. - Report Internet crime to the Internet Crime Complaint Center. - Keep records of your actions. - Review financial accounts. - Enroll in a credit monitoring service.
Oversee a project using project management software
1. Make sure you understand the project in its entirety, as well as the steps you must take to bring the project to completion. 2. Determine the date by which the project must be completed. 3. Verify you have the appropriate resources (people and materials) to complete the project. If you do not have the necessary resources, obtain them, if possible. 4. Determine the order of the steps that must be taken to bring the project to completion. Identify steps that must be taken before other steps, as well as steps that can be completed at the same time as other steps. 5. Verify the feasibility of the plan. 6. During the project, it will be necessary to update the progress and possibly adjust dates. Changes to the project and its dates should be communicated to the entire project team.
Data dictionary (repository)
A DBMS element that contains data about each file in a database and each field in those files.
Recovery utility
A DBMS recovery utility uses logs and/or backups, and either a roll-forward or a rollback technique, to restore a database when it becomes damaged or destroyed.
Continuous backup
A backup plan in which changes are backed up as they are made.
Database
A collection of data organized in a manner that allows access, retrieval, and use of that data.
Information system
A collection of hardware, software, data, people, and procedures that work together to produce information.
Data file (file)
A collection of related records stored on a storage medium such as a hard drive or on cloud storage; often simply called a file.
Field
A combination of one or more related characters or bytes and is the smallest unit of data a user accesses.
Database server
A computer that stores and provides access to a database.
Relational database
A database that stores data in tables that consist of rows and columns.
Steering committee
A decision-making body in an organization.
Query by example (QBE)
A feature that has a graphical user interface to assist users with retrieving data.
Primary key
A field that uniquely identifies each record in a file.
e-form
A form that sends entered data across a network or the Internet is called this.
Record
A group of related fields.
Data warehouse
A huge database that stores and manages the data required to analyze historical and current transactions.
Log
A listing of activities that modify the contents of the database.
Feasibility
A measure of how suitable the development of a system will be to the organization.
Check digit
A number(s) or character(s) that is appended to or inserted in a primary key value. A _____ _____ often confirms the accuracy of a primary key value. Bank account, credit card, and other identification numbers often include one or more check digits.
Character
A number, letter, punctuation mark, or other symbol that is represented by a single byte in the ASCII coding scheme.
Structured Query Language (SQL pronounced S-Q-L or sequel)
A popular query language that allows users to manage, update, and retrieve data.
Front end
A program that generally has a more user-friendly interface than the DBMS.
Query
A request for specific data from a database.
System development
A set of activities used to build an information system.
Gantt chart
Developed by Henry L. Gantt. It is a bar chart that uses horizontal bars to show project phases or activities. The left side, or vertical axis, displays the list of required activities. A horizontal axis across the top or bottom of the chart represents time.
Form (data entry form)
A window on the screen that provides areas for entering or modifying data in a database.
Back end
An application that supports a front-end program by interacting directly with the database sometimes is called this.
Object
An item that contains data, as well as the actions that read or process the data.
1. Volume. 2. Velocity. 3. Variety.
Analysts often refer to the three V's when describing characteristics of Big Data, what are they?
Deliverable
Any tangible item, such as a chart, diagram, report, or program file.
Project management software
Assists project leaders in planning, scheduling, and controlling development projects.
Redundant data
Because each department or area in an organization has its own files in a file processing system, the same fields are stored in multiple files. If a file processing system is used at a school, for example, the Student file and the Student Schedule file both might store the same students' names and addresses.
Metadata
Because the data dictionary contains details about data some call it this.
System development life cycle (SDLC)
Collection of phases in system development.
Project manager
Controls the activities during system development.
Report writer (report generator)
DBMS feature that allows users to design a report on the screen, retrieve data into the report design, and then display or print the report.
Range check
Determines whether a number is within a specified range. Assume the lowest per credit hour fee at the school is $75.00 and the highest is $370.75. A ______ ______ for the Credit Hour Fee field ensures it is a value between $75.00 and $370.75. Field(s) Being Checked: Per Credit Hour Fee. Valid Data: $220.25. Invalid Data: $2,120.00 (Sample Valid and Invalid Data)
PERT chart (network diagrams)
Developed by the U.S. Department of Defense, a _____ _____ short for Program Evaluation and Review Technique chart, analyzes the time required to complete a task and identifies the minimum time required for an entire project.
Attachment
Document or image that is attached to the field, which can be opened in the program that created the document or image (functions similarly to email attachments).
Currency
Dollar and cent amounts or numbers containing decimal values.
Hyperlink
Email address or web address that links to a webpage on the Internet or document on a network.
Numeric check
Ensures that users enter only alphabetic data into a field. Field(s) Being Checked: Current Enrollment. Valid Data: 24. Invalid Data: S8q. (Sample Valid and Invalid Data)
Alphabetic check
Ensures that users enter only alphabetic data into a field. Field(s) Being Checked: First Name. Valid Data: Karen. Invalid Data: Ka24n. (Sample Valid and Invalid Data)
Other check
Field(s) Being Checked: Email Address. Valid Data: [email protected]. Invalid Data: egearth.net. (Sample Valid and Invalid Data)
Scope
Goals, objectives, and expectations of the project, collectively called this.
Volume
How much data is generated.
Composite key
In some files, the primary key consists of multiple fields, called this.
Conferencing software
Includes tools that enable users to share documents via online meetings and communicate with other connected users.
Isolated data
It often is difficult to access data that is stored in separate files in different departments. Assume, for example, that the student email addresses exist in the Student files and class room numbers (locations) are in the Schedule of Classes file. To send an email message informing students about a room change, data is needed from both the Student file and the Schedule of Classes file. Sharing data from multiple, separate files to generate such a list in a file processing system often is a complicated procedure and usually requires an experienced programmer.
Query language
Language used with databases that consists of simple, English-like statements that allows users to specify the data they want to display, print, store, update, or delete.
Memo (also called long text)
Lengthy text entries, which may or may not include separate paragraphs.
Text
Letters, numeric characters, or special characters
Project leader
Manages and controls the budget and schedule of the project.
Group activities into phases
Many SDLCs contain the same phases. Others have more or fewer phases. Regardless, all system development cycles have similar activities and tasks.
1. Redundant data. 2. Isolated data.
Many file processing systems have what two major weaknesses?
1. Planning. 2. Analysis. 3. Design. 4. Implementation. 5. Support and Security.
Many traditional SDLCs contain what five phases?
Operational feasibility
Measures how well the proposed information system will work. Will the users like the new system? Will they use it? Will it meet their requirements? Will it cause any changes in their work environment? Is it secure?
Schedule feasibility
Measures whether the established deadlines for the project are reasonable. If a deadline is not reasonable, the project leader might make a new schedule. If a deadline cannot be extended, then the scope of the project might be reduced to meet a mandatory deadline.
Economic feasibility (Cost/benefit feasibility)
Measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs. A systems analyst often consults the advice of a business analyst, who uses many financial techniques, such as return on investment (ROI) and payback analysis, to perform a cost/benefit analysis.
Technical feasibility
Measures whether the organization has or can obtain the computing resources, software services, and qualified people needed to develop, deliver, and then support the proposed information system. For most information system projects, hardware, software, and people typically are available to support an information system. An organization's choice for using computing resources and software services in-house or on the cloud may impact a system's _____.
Date (also called date/time)
Month, day, year, and sometimes time.
Field name
Name that uniquely identifies each field in a database.
Function creep
Occurs when a company uses the technology intended for one purpose for an entirely different purpose.
Scope creep (feature creep)
Occurs when one activity has led to another that was not planned originally.
Yes/No (also called Boolean)
Only the values Yes or No (or True or False).
Systems analyst
Person responsible for designing and developing an information system.
Object (BLOB / binary large object)
Photo, audio, video, or a document created in other programs or apps, such as word processing or spreadsheet, stored as a sequence of bytes in the database.
Number (also called numeric values)
Positive or negative ______, and the _____ zero, with or without decimal points.
File maintenance
Procedures that keep data current.
Big Data
Refers to large-scale data sets that require advanced technologies beyond the capabilities of typical database software to gather, store, process, retrieve, or analyze.
Data model
Rules and standards that define how users view the organization of the data in a database.
Standards
Sets of rules and procedures an organization expects employees to accept and follow. _____ help people working on the same project produce consistent results.
Database management system (DBMS)
Software that allows users to create a computerized database; add, modify, and delete data in the database; sort and retrieve data from the database; and create forms and reports from the data in the database.
Database administrator (DBA)
The person in the organization who is responsible for managing and coordinating all database activities, including development, maintenance, and permissions.
AutoNumber
Unique number automatically assigned by the DBMS to each added record, which provides a value that identifies the record (such as a student ID).
Involve users
Users include anyone for whom the system is being built. Customers, employees, students, data entry specialists, accountants, sales managers, and owners all are examples of users. Users are more apt to accept a new system if they contribute to its design.
Principle of least privilege policy
Users' access privileges are limited to the lowest level necessary to perform required tasks to prevent accidental or intentional misuse of the data.
Completeness check
Verifies that a required field contains data. For example, some fields cannot be left blank; others require a minimum number of characters. One _____ _____ can ensure that data exists in a Last Name field. Another can ensure that a day, month, and year are included in a Birth Date field. Field(s) Being Checked: Last Name. Valid Data: Gupta. Invalid Data: (No name). (Sample Valid and Invalid Data)
Collaborative databases
Where users store and share photos, videos, recordings, and other personal media with other registered users.