database access authorizes access to sections of the

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: , etc.) • Database Access - authorizes access to sections of the All database database languages are implemented by using Structured Structured Query Language (SQL) Copyright © 2009-10 Y.M. Cheung, William Tan and Carson Woo 17 BUSI 335 Jane Morris Zipcode Copyright © 2009-10 Y.M. Cheung, William Tan and Carson Woo 18 Database dictionaries are used both alone dictio used bot and with DBMS to centralize, document, control, and coordinate the use of data within an organization. Query by Example (QBE) (QBE) State • Data Manipulation Language (DML) Database Administration Administration High-Level Query Languages Query Languages Name – Defines data elements as it appears in the database, i.e. the logical structure of the database database (schema). Example: Create Table student ( STDNUM CHAR(8) NOT NULL, FIRSTNAME CHAR(20), LASTNAME CHAR(20)); – Add, update, delete, and retrieve data Example: Select * from student; Select database and deny unauthorized requests of data. BUSI 335 • Data Definition Language (DDL) AccountNumber 33301 Th The data dictionary is simply a repository of di information information about a database, or metadata. metadata SELECT FROM Customers SELECT * FROM Customers WHERE WHERE Name = ‘Jane Morris’ AND ZipCode AND ZipCode =‘33301’ BUSI 335 Copyright © 2009-10 Y.M. Cheung, William Tan and Carson Woo The data dictionary is defined and controlled by the Database Administrator (DBA). by the Database Administrator 19 BUSI 335 Copyright © 2009-10 Y.M. Cheung, William Tan and Carson Woo 20 Data Dictionary Format Data Dictionary Format Advantages of DBMS of DBMS • Data independent from applications – Data elements stored in database are defined once and used for all applications Specifications Name Name Definition Definition Aliases Aliases BUSI 335 Characteristics Utilization Size Size Owner Owner Range Range of values Where used Where Encodin Securit Encoding Security code Editing Editing data Last Last update Copyright © 2009-10 Y.M. Cheung, William Tan and Carson Woo 21 • Data redundancy and inconsistency reduced • Easier access and sharing of data • Increased productivity of application development • Flexibility BUSI 33...
View Full Document

This document was uploaded on 03/04/2014 for the course COMM 335 at The University of British Columbia.

Ask a homework question - tutors are online