• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23

The Data Management Structure: Components and the data structure

Extracts from this document...


The Data Management Structure: COMPONENTS OF THE DATA STRUCTURE. * DEVICE and DATA FILES: Data sets are objects too. The data base(s) on the AS/400 are divided into so called physical FILES, for want of a better word. Data FILES can be broken MEMBERS for management purposes, but this is not necessary. Typically, if u have more than one type of record in a dataset, you put one type in one file member and another in the other file member in order to keep track of them. "Physical" here means real, live data. This definition is important, because in the AS/400 literature the word FILE is used for many different things. It is a generic word meaning format: The description on the fields of data in a recorder is called a record format, but the congregation of this records-not the data, but the type of format for it-is called a PHYSICAL FILE. Then is the LOGICAL FILE, which takes an entire chapter to describe. Logical file is just a view of data. The AS/400 describes database formats as files. It also calls the devise tables that define how data should be input or output as DEVICE FILES. The editing, sequencing, data checking, and so forth, that needs to be done, says to display output to make it presentable to the terminal operator, and is called a Device Files (presentation management). DEVICE DESCRIPTION is the AS/400 term used to define the fixed, hardware-oriented information the system will use to physically control the device. The Device Files uses the Device description to get the data to and from the hardware device. Another file is the remote system file, called the DISTRIBUTED DATA FILE (DDM). In summary, the AS/400 thinks of databases, devices, and other system as FILES. You define to your system Files that become the doorways to whatever resources you need to talk to or see. You define this file to your system, not to your program, using DDS, a special data definition language. ...read more.


For one, DBMSs improves the availability of data by making the same information easily available to a large number of different users. In the corporate organization example above, all three departments (HR, finance and clinic) would share some common data regarding their members, such as names and identity card numbers. DBMSs also help minimized data redundancy because; generally the information in it appears just once. This can therefore significantly reduce the cost of storing information. DBMSs foster data integrity by allowing updates and changes to the data to be done from one place. The chances of making a mistake are higher if you are required to change the same data in several different places than if you only have to make the change in one place. In our corporate example, when a new employee joins the organization, the HR department might key in his/her particulars in their system and automatically it appears in the finance and clinic databases as well. This reduces repetitive work and increases an organization's efficiency and productivity. We live in any increasing paranoid world. Some types of information in databases are just not meant for any Ali, Ah Kong or Muthu. As such, this information are classified "sensitive" and should be protected or secured and only viewed by select individuals. Through the use of passwords, DBMSs can restrict data access or show only relevant data to those who should see it. Every time you access an ATM facility and punch in your pin number, only information regarding your account is made visible to you - although the ATM might be accessing the same database that has the prime minister's account information in it. This helps improves security and reduces the likelihood of confidential information being view by an unauthorized party. But perhaps the most important advantage of DBMSs is the simplest: it makes using databases a lot easier. Many of today's' DBMSs come with graphical user interface (GUI) ...read more.


Lets see how this can happen. Thousands of web pages these days require you to enter some sort of personal information before you can access their information or services. Among the information most popularly requested is your name and e-mail address. All these names and e-mails are then stored on the web page owner's databases which they use to periodically alert members about new features and services. Although all of the owners of these web pages make solemn promises never to divulge or sell your private information to anyone, more then one dot com has admitted or been caught trying to "share" their members' confidential information with third parties. So as you can see, the issues of privacy and security are real and the legal fraternities of the world are still struggling to address it while at the same time, technology is progressing by leaps and bounds ahead of them. Who should have access to what? With great tools come great risks. As powerful as DBMSs are, they have downsides to their use as well. As a knowledge worker, it is important that you understand the strengths and weaknesses of DBMSs. This will allow you to make better decisions on how to organize and use data and DBMSs. Lets look at some of the risk factors associated with the use of DBMSs. The dollar issue Besides privacy and security, there is also another aspect in using database that's of immediate concern to the user; and that's the cost. Implementing database, especially so in a large environment involves a lot of planning and investment. The cost of training the appropriate personnel itself can be a huge burden to the organization. Often entire network systems need to be set-up just for the database. It is no surprise that many smaller companies are reluctant to implement database on a large scale, preferring to stick to their old "cost-friendly" approach. In time to come, these companies will find it increasing difficult to compete with others that use database technology to deliver products and services to customers. 3 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    This is all done in a notebook. 1.3. Describe the problems The current system has a lot of forms, some containing the same data or information. These have to be hand written by Luki which can take a long time to complete fully.

  2. Marked by a teacher

    Case Study. LEGAL ISSUES-: Data Protection Act. Whiteman Leisure must ensure that the information ...

    WLC should have a system in which they ask specific security questions at hand to make sure and confirm that the individual that is querying about their details is the right person. LEGAL ISSUES-: Freedom of Information Act. Whiteman Leisure must provide information that the customer would wish to see about their details if they inquire about it.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Examples of files stored on CDROM are software for import to a system and large reference files like encyclopedias. Data Transfer using buffers and interrupts When two devices working at different speeds try to communicate, they have to do so at the speed of the slowest device.

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    You enter them in the Additional Payments (0015) infotype. Benefits Integration to Payroll Purpose Users of the R/3 Benefits component can use Benefits Integration to streamline the payroll calculation process for their employees.

  1. Explain sequence, selection and iteration as used in computer programming; outline the benefits of ...

    described by the if keyword, it will commence executing the commands in the first subroutine. If it hasn't, it will execute the commands proceeded by else in the second subroutine. In order to show how this flow works in practicality, the following is a program I have written in Visual

  2. Review of the article "Supply Chain Analysis at Volkswagen of America".

    The complexity and scope of the system made static analysis of limited value. So, the team of the study identified simulation as a potentially effective way to test the model and various scenarios of implementation. By the new potential model, the vehicles for sale would first be shipped to five US ports that would act like distribution centers.

  1. System I designed in order to produce a promotion package for her newly formed ...

    It is also widely available and widely used and is pretty simple to setup and manage. Microsoft Access is a relational database. This means that its structure is made up of tables, or entities. Each of these tables holds rows and columns of data.

  2. Logic and Logic Gates

    The truth table is on the side as always. You can only get the output as 0 if all the inputs are 0 and if either of the two inputs are 0 or 1 then the output will always be 1.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work