This preview shows page 1. Sign up to view the full content.
Unformatted text preview: n from Figure 16.14, the two are related activities and can reinforce
each other. Usually, they are used in conjunction with each other. A data
warehouse sets the stage for effective data mining. Data mining can be done where
there is no data warehouse, but the data warehouse greatly improves the chances
of success in data mining.
Data mining is also different from OLAP, in that the latter is used to verify more
complex human-generated hypotheses involving multiple dimensions, produces
information summaries, and does not look for patterns. Thus OLAP is knowledge verification, while data mining is knowledge discovery. Furthermore, OLAP is
multidimensional analysis and data mining is multi-variable, single-dimensional
analysis. For example, while OLAP answers the questions of what is the average
credit granted to customers who pay their monthly bills in full versus those who
choose to take financing, data mining gives the attributes associated with
customers who will take up financing.
OTHER RELATED CONCEPTS
The data stored in a database is often confidential and should not be accessed by
unauthorized individuals. To prevent data stored in a database from being accessed
by unauthorized individuals, database management systems commonly support the
following security features:
1. From the point of view of access control, a database management system
normally supports two types of database users - database administrator (having
administrative access) and database user (having normal user access). A database
administrator has privileges to add new users to the database, delete one or more
users of a database, decide and enforce the various access rights of different users,
make changes to the schema, and so on. On the other hand, a normal user can only
view, modify, delete or add records; can enter data; can search for desired
information; and can create and generate reports.
2. All database management systems have password-based user authentication
mechanism. That is, all database users must enter their valid password to
View Full Document
- Spring '14