





Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An introduction to the concepts and techniques of database systems, including data models, data normalization, SQL, database design, database administration, data security and backup, big data and NoSQL. It covers the basic concepts and principles of databases and their systems, and it is typically offered to students in a BSIT or computer science program. The document also explains the importance of data security and backup, as well as the emergence of big data and NoSQL.
Typology: Study Guides, Projects, Research
1 / 9
This page cannot be seen from the preview
Don't miss anything!
Bachelor of Science Information Technology (BSIT) Fundamentals of Database Systems Study Guide, Definitions & Notes Abstract: Fundamentals of Database Systems is a course that provides an introduction to the concepts and techniques of database systems, including data models, data normalization, SQL, database design, database administration, data security and backup, big data and NoSQL. The course is typically taken by students pursuing a Bachelor of Science in Information Technology (BSIT) degree, and it is designed to give them a solid foundation in the field of database systems and prepare them for more advanced coursework and professional careers. Definition: Fundamentals of Database Systems BSIT is a course that covers the basic concepts and principles of databases and their systems. It provides an overview of the different types of data models, data normalization, SQL, database design, and administration. It also covers the importance of data security and backup, as well as the emergence of big data and NoSQL. This course is typically offered to students in a BSIT or computer science program. Introduction to Database Systems : Understanding the basics of database management systems and the role they play in storing and organizing data. Data Models: Learning about different types of data models, including relational, hierarchical, and network models. Data Normalization: Understanding the importance of data normalization and how it helps to reduce data redundancy and improve data integrity. SQL: Learning the basics of the Structured Query Language (SQL) used to interact with and manipulate databases.
Database Design: Understanding the process of designing and creating a database, including entity-relationship modeling and data warehousing. Database Administration : Learning about the responsibilities of a database administrator and the tools and techniques used to manage and maintain a database. Data Security and Backup : Understanding the importance of data security and backup in protecting a database from unauthorized access and data loss. Data Mining: Learning about the techniques used to extract useful information from large sets of data. Big Data and NoSQL : Understanding the challenges and opportunities presented by big data and non-relational databases, including NoSQL and other emerging technologies. Data Model: A data model is a way of defining and representing data in a database. The most common types of data models include: Relational Model : This model organizes data into a collection of tables, with each table consisting of rows and columns. The columns represent the attributes of the data, while the rows represent the individual records. Hierarchical Model : This model organizes data into a tree-like structure, with each record having one parent and many children. The parent-child relationship forms the basis for the hierarchy. Network Model : This model organizes data into a collection of records and relationships. The relationships can be one-to-one, one-to-many, or many-to-many.
There are other normal forms like Boyce-Codd Normal Form (BCNF) and Fourth Normal Form (4NF) but 3NF is considered sufficient for most databases. It's important to note that normalization is not always the best solution for every database, and it's possible to over-normalize a database, which can lead to performance issues. So, it's important to find the right balance between normalization and performance when designing a database. SQL: Learning the basics of the Structured Query Language (SQL): SQL, or Structured Query Language, is a programming language used to manage and manipulate relational databases. It is used to create, modify, and query databases. Some of the basic SQL commands include: SELECT: used to retrieve data from a database table INSERT: used to add new data to a table UPDATE: used to modify existing data in a table DELETE: used to delete data from a table CREATE: used to create a new table or database ALTER: used to modify the structure of a table DROP: used to delete a table or database In addition to these basic commands, SQL also includes more advanced features such as subqueries, joins, and views. It is important to understand the basics of SQL in order to effectively work with databases in a professional setting. Database Design: Database design is the process of creating a structured plan for a database. It involves determining the data that needs to be stored, the relationships between different data elements, and the overall architecture of the database. This process is critical for ensuring that a database is efficient, accurate, and easy to use.
Some key considerations in database design include: Identifying the entities and attributes that need to be stored in the database. This includes determining what data needs to be tracked, such as customer information, sales data, and inventory levels. Establishing relationships between different entities. This involves determining how data elements are related to one another, such as how customers are related to orders, or how products are related to suppliers. Defining the primary key, which is a unique identifier for each record in a table. This is used to ensure that each record can be easily identified and retrieved. Setting up indexes to improve the performance of queries. Indexes are used to create a fast look-up mechanism for specific columns in a table. Choosing an appropriate data model, such as relational, hierarchical, or network. Each model has its own strengths and weaknesses, and the choice of model will depend on the specific requirements of the database. Designing the physical schema, which includes determining the placement of files and the specific storage structure for the data. Testing the design for errors and making any necessary adjustments before implementing the database. Database Administration: Database administration is the process of managing, maintaining, and optimizing a database system to ensure its smooth and efficient operation. It includes tasks such as backup and recovery, performance tuning, security management, and capacity planning.
Data Security and Backup: Data security and backup is an important aspect of database systems and is critical to protecting sensitive information from unauthorized access, breaches, and other forms of cyber- attacks. Access Control: This refers to the process of restricting access to data and the database management system to authorized users only. This can be achieved through various methods such as user authentication, role-based access control, and data encryption. Data Encryption: This is the process of converting data into a code or cipher that can only be read by authorized users who have the necessary decryption key. This is particularly important for sensitive data such as financial transactions, personal information, and other confidential data. Firewall: A firewall is a software or hardware-based security system that controls access to a computer or a network. Firewalls can be configured to block unauthorized access to the database management system and restrict access to specific IP addresses. Backup: Regularly creating backups of the database is important in case of data loss due to system failure, natural disasters, or other unforeseen events. Backups can be created by exporting the data to a separate location or by creating a physical copy of the data. Recovery: The process of restoring the database to a previous state in case of data loss. This can be done by restoring the data from a backup or by using a disaster recovery plan. Encryption: Encryption is the process of converting plain text into an encoded format that can only be deciphered by authorized users. This is an effective way to protect sensitive data from unauthorized access. Access Control : Access control is the process of controlling who has access to the data stored in the database. This can be done by implementing user authentication and authorization mechanisms such as usernames and passwords.
Firewalls: Firewalls are security systems that control network access and are used to protect the database system from unauthorized access. Regular Backups: Regular backups of the database are essential to ensure that data can be restored in the event of a system failure or data loss. Backups should be stored in a separate location to ensure they are not compromised in the event of a disaster. Disaster Recovery: A disaster recovery plan should be in place to ensure that data can be restored in the event of a disaster. This may include having a backup site or using cloud-based services for data storage and backup. Security Auditing: Regular security audits should be conducted to identify and address any vulnerabilities in the database system. This may include monitoring for suspicious activity and reviewing system logs. Physical Security: Physical security measures such as controlled access to the data center and server room can help protect the database system from unauthorized access. Training: Regular training for employees on data security best practices and procedures can help ensure that everyone in the organization is aware of the importance of data security and is able to take the necessary steps to protect it.