0% found this document useful (0 votes)
14 views14 pages

Data Structure Work Unesr

This document presents an introduction to data structures and databases. It explains key concepts such as data, fields, records, and tables. It also describes the main types of databases, including hierarchical, relational, and those using the Internet. Additionally, it highlights the importance of protecting and auditing databases to ensure security. The document provides a basic guide on how to organize and manage information effectively in databases.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views14 pages

Data Structure Work Unesr

This document presents an introduction to data structures and databases. It explains key concepts such as data, fields, records, and tables. It also describes the main types of databases, including hierarchical, relational, and those using the Internet. Additionally, it highlights the importance of protecting and auditing databases to ensure security. The document provides a basic guide on how to organize and manage information effectively in databases.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Bolivarian Republic of Venezuela

Ministry of People's Power for University Education


Simón Rodríguez National Experimental University
Nucleus: Maturín
Course: Introduction to Data Processing

DATA STRUCTURE

Prof.: José Mundarain Participants:


Section: 'B' Lourdes Liccién, C.I 30.316.617

Valentina Gascón, C.I 29.879.121

Hector Rodriguez, ID 30.410.206

Michelle Ferrer, C.I 29.700.40

Jhoan Farias, ID 28.429.924

Daniela Baute, ID 25.601.454

Maturín, 27 de Agosto del 2019


INDEX

1. INTRODUCTION ________________________________________ PAGE 3


2. BASIC CONCEPTS ___________________________________PAGE 4
3. BASIC OPERATIONS OF A DATABASE ________ PAGE 6
4. HIERARCHICAL DATABASE ___________________________ PAGE 6
5. RELATIONAL DATABASE __________________________ PAGE 7
6. DATABASE WITH THE USE OF THE INTERNET ______________ PAGE 7
7. IMPORTANCE OF A DATABASE __________________ PAGE 8
8. CHARACTERISTICS OF A DATABASE _____________ PAGE 8
9. STRUCTURE OF A DATABASE ___________________ PAGE 9
10. DATABASE MANAGEMENT SYSTEM ____________PAGE 9
11. EXAMPLE OF DATABASE MANAGEMENT SYSTEM ____ PAGE 9
12. DATABASE SECURITY ________________________ PAGE 10
13. ACCESS PROTECTION _______________________________ PAGE 11
14. USER ACCOUNTS _________________________________ PAGE 11
15. DATABASE AUDIT ____________________ PAGE 12
16. CONCLUSION __________________________________________ PAGE 13
17. BIBLIOGRAPHY _________________________________________ PAGE 14
18.
INTRODUCTION
The purpose of this work is to make a brief study on the structure.
of data considering that one of these is nothing more than a particular form of
organize data on a computer so that it can be used effectively
efficient and productive for the people who handle this modality. Likewise
way, during the present work, the importance will also be studied,
characteristics of a database, the protection of networks and accounts for a
organization.
1. Basic concepts:

Data: Data is the symbolic representation, either through numbers or letters.


from a collection of information that can be qualitative or quantitative, which
they facilitate the deduction of an investigation or a fact. In computer science, it is very

used and valued this term, due to the information that is entered in the
computers receive information in the form of data and it is manipulated so that
different solutions can be developed for the different problems, for example, in
computer programming, a datum is generally an expression that indicates the
qualities of the different commands on which aalgorithmcan work.

Field: Incomputer sciencea storage space for adatein


particular. In thedatabasesa field is the minimum unit of information to the
that can be accessed; a field or a set of them form aregistration, where
there may be blank fields, this being an error of thesistema operativoThat one
field that has a unique value for an entity repetition, can serve for the
search for a specific entity.

Register: Incomputer science, or specifically in the context of adatabase


relational, an unrecord (also called filaotuple) represents aobjectunique of
dataimplicitly structured in atableIn simple terms, a table of
A database can be imagined as made up of rows and [Link] row
from a table represents a set of related data, and all the rows of the
the same table has the same structure. A record is a set offieldswhat
they contain the data that belongs to the same entity repetition. It is assigned
automatically a consecutive number (registration number) that is sometimes
used as an index although it is normal and practical to assign each record a field
key for your search.
Table: Table in thedatabases, refers to the type ofdata modelingwhere is it
they store the data collected by a program. Its general structure resembles that of
overview of a program ofspreadsheetThe tables consist of two
structures:

FieldIt corresponds to the name of the column. It must be unique and in addition to
to have an associated data type.
RegistrationCorresponds to each row that makes up the table. There are composed the
data and records. They can eventually be null in their storage.

In the definition of each field, there must be a unique name, along with its data type.
corresponding. This is useful when handling several fields in the table, since
each field name must be distinct from one another. Fields can be assigned,
In addition, special properties that affect the inserted records. The field
can be defined as an index or auto-incrementable, which allows the data of
that field changes alone or is the main one to indicate when sorting the data
content. Each table created must have a unique name in each database,
making it accessible by its name or its pseudonym (alias) (depending on the
type of database chosen). The structure of the tables is given by the way of
a flat file, which initially consisted of a similar way.

Database: a database is a set of data belonging to the same


context and stored systematically for later use. In this sense; a
A library can be considered a database composed mostly of
documents and texts printed on paper and indexed for consultation. Currently, and
due to the technological development in fields such as thecomputer scienceand theelectronics, the
most of the databases are in digital format, being this a component
electronic, therefore a wide range of solutions has been developed and is offered to
problem of thedata storage.
Computer file: A computer file (or data file) is an entity
logic made up of a finite sequence of bytes, stored in a system of
files located in the secondary memory of a computer (hard drive, drive
removable, CD ROM, etc.) or Collection of related information to which it is
assign a name and is stored on a disk. The files are grouped in
directories within the file system and are identified by a name of
file and an extension. The name forms the unique identification in relation to the
other files in the same directory.

2. Basic operations of a data table

There are four basic operations of a database:

[Link]: This command creates an object within the database, it can be a


table, view, index, trigger, function, procedure or any other object that the
database support engine.
[Link]: This command allows modifying the structure of an object. You can
add/remove fields to a table, modify the type of a field. Add/remove
indices to a table, modify a trigger.
[Link]: This command removes an object from the database. It can be a table,
view, index, trigger, function, procedure or any other object that the engine
from the support database. It can be combined with the statement.
[Link]: This command truncates all the content of a table. The advantage over
The Drop command is that if you want to delete all the content of the table, it is a lot.
faster, especially if the table is very large. The disadvantage is that
Truncate only serves when you want to absolutely delete all records, already
that the Where clause is not allowed. Although, at first, this statement
It would seem to be DML (data manipulation language), it is actually a DDL.
since internally, the Truncate command deletes the table and recreates it and not
do not execute any transaction.

3. Hierarchical database.
A hierarchical database is a type ofdatabase management system
which, as its name indicates, stores information in a structure
hierarchical that links the records in the form oftree structure(similar to a
tree seen upside down), where a parent node of information can have several
nodoshijo, and so on. This hierarchical relationship is not strictly
mandatory, so that relationships can be established between sibling nodes,
and in this case, the tree-shaped structure becomes a structure in
form ofgraphdirected (this variant is callednetwork databases).

4. Relational database

A relational database is a collection of data elements organized in


a set of tables formally described from which data can be accessed
or to reassemble them in many different ways without having to reorganize the
tables of the database. The relational database was invented by E.F. Codd at IBM in
1970. The standard interface for user programs and applications to adatabase
relational is thestructured query language (SQL)The SQL commands are
they are used both for interactive queries to obtain information from a database
relational data and for data collection for reports. In addition to being
relatively easy to create and access, a relational database has the
important advantage of being easy to extend. After the original creation of a
database, a new category of data can be added without the need for
all existing applications be modified. A relational database is a
set of tables that contain data provided in predefined categories. Each
table (sometimes called 'relation') contains one or more categories of data in
columns. Each row contains a unique instance of data for the categories
defined by the columns. For example, a typical input database of
business requests would include a table describing a customer with columns
for the name, address, phone number, and so on. Another table
I would identify the order: product, customer, date, selling price, and so on.
A database user could obtain a view of the database that is
adjust to their needs. For example, a branch manager might prefer a view
the report on all customers who have purchased products after a date
determined. A financial services manager in the same company could, since
the same tables, obtain a report on the accounts that must be paid.

5. Database with internet usage.

The Web is a means to locate/send/receive information of various types, even


with databases. In the competitive field, it is essential to see the advantages that this
electronic means provides to present information, reducing costs and the
storage of information, and increasing the speed of its dissemination.
The internet provides a dynamic presentation format to offer campaigns and
improve businesses, in addition to allowing access to every site around the world,
which increases the number of people who receive the information.

6. Importance of the database.

Databases facilitate not only the recording of a large amount of data but also
their access, which allows saving physical space as well as time when
consult information about them in the current world. A database is a
collection of information organized in such a way that a computer program can
quickly select the data fragments you need. A database is
an electronic file system.

7. Characteristics of a database

A database is composed of several tables, called relations. They cannot


There are two tables with the same name or record. Each table is, in turn, a set.
of fields (columns) and records (rows). The relationship between a parent table and a child
is carried out through primary keys and foreign keys (or external). The
Primary keys are the main key of a record within a table and these
they must comply with data integrity. Foreign keys are placed in the table
daughter, contain the same value as the primary key of the parent record; through
these are made into relational forms.

8. Database structure.

The database and database structure are defined in the process of


installation. A database that can be perceived as a set of tables and is
it can be manipulated according to the relational model of data. Each database includes:
set of system catalog tables that describe the logical and physical structure of
the configuration file data that contains the assigned parameter values to
the recovery record database with ongoing transactions and transactions
archivables.

9. Database management system.

Management systems are programs designed to handle policies and the


procedures of an organization effectively. This management mechanism
document each of the processes of the company. Although each industry has its
own needs, generally all management systems must have the
following specifications: Organization, Corporate quality policies,
Objetivos de la empresa, Procedimientos contables, Movimientos financieros, Detalle
of the products and/or services Customer registration.

10. Example of a data management system.

Strategies: Define policies, objectives, and guidelines for achieving quality and
customer satisfaction. These policies and objectives must be aligned with the
results that the organization wishes to obtain.

Processes: The processes, activities and must be determined, analyzed and implemented
required procedures for the production of the product or service, and in turn, that
are aligned with the achievement of the established objectives. They must also
define the monitoring and control activities for the effective operation of the
processes.

Resources: Define clear assignments of personnel, equipment, and/or machinery


necessary for the production or provision of the service, the work environment and the
financial resources needed to support quality activities.

Structure: Define and establish a structure of responsibilities, authorities and


of communication flow within the organization.

Documents: Establish the procedures for documents, forms, records, and


any other documentation for the effective and efficient operation of the processes and
therefore of the organization.

11. Database security.

Information security deals with protecting confidentiality,


availability and integrity in the database of all knowledge assets of
the organization. The way to achieve it is related to:

Confidentiality: it is the most important aspect of database security.


data. This objective is achieved through encryption applied to data in
rest, but also to the data that, for one reason or another, are in transit.

Database integrity: seeks to ensure that only authorized individuals can access
They will be able to access privileged information of the company. The integrity of a
database is applied through authentication protocols, internal policies
(like those that drive password security) and a control system of
user access that defines the permissions that determine who can access what
data. It should not be forgotten to take measures that help to achieve the
unused accounts remain blocked or are deleted.
Availability: refers to the need for databases and all
information contained is ready for use. On one hand, it must be ensured
its functionality and reliability while, on the other hand, it is advisable to plan.
downtime outside of working hours.

Ensure integrity in databases, as well as their availability and reliability


it is critical for the proper functioning of the business. However, the threat
no respite and, to this day, attacks are multiplying, both in frequency and in
Objective. Hackers no longer covet just the informational assets of
the large multinational corporations, but rather have their sights set on everything
types of companies, regardless of their size, purpose, or industry.

12. Access protection.

In the context of computing, a user is a person who uses a system.


computer scientist. So that users can obtain security, access to the system,
resource management, etc., these users must identify themselves. For one
to be identified, the user needs an account (a user account) and a
user, in most cases associated with apasswordUsers use
oneuser interfaceto access the systems, the identification process is
known as user identification or user access to the system (from English:
"login"). Users are characterized by being the type of people who use a
system without the extensive experience necessary to understand the system
in contrast to the technician, hacker, or other profile that is assumed to know this
system In the contexthackerthey are referred to as real users. The users of
computer science is very similar to telecommunications users, but with
small semantic differences. The difference is comparable to the difference that
exists between aend userand consumers in the economy. For example, one
it can be a user (and have an account) of acomputer systemanetwork of
computersor to have an account ofemail

13. User accounts.


In the context of computing, a user is a person who uses a system.
IT professional. So that users can obtain security, access to the system,
resource management, etc., those users must identify themselves. So that one
to be identified, the user needs an account (a user account) and a
user, in most cases associated with apassword. Users use
auser interfaceto access the systems, the identification process is
known as user identification or user access to the system (from English:
"login"). Users are characterized by being the type of people who use a
system without the broad experience necessary to understand the system
in contrast to the technician, hacker, or other profile that is assumed to know this
system In the contexthackerthey are called real users. The users of
computer science is very similar to users in telecommunications, but with
small semantic differences. The difference is comparable to the difference that
exists between aend userand consumers in the economy. For example, one
can be a user (and have an account) of acomputer system, anetwork of
computersor to have an account ofemail.

14. Database audit

The database audit is a process implemented by the auditors of


systems in order to audit data access, generally following well
a methodology based on a checklist that includes the points that are desired
check or through the evaluation of potential risks. Specifically, a
examination of access to stored data in databases for the purpose of
to be able to measure, monitor and maintain records of access to information
stored in them. Although the objective may vary depending on the
In all cases, the ultimate goal seeks, in one way or another, security.
corporate. A database audit, therefore, provides tools
effective in knowing exactly what the users' relationship is when
access the databases, including actions that result in a
generation, modification or deletion of data.
CONCLUSION.

Thanks to the research and study conducted, it is concluded that a database is


a tool of great importance as it facilitates the collection of
information to be quick and easily accessible when needed
information. We were also able to learn about the management system whose purpose is to create

procedures efficiently in an organization, likewise the


access protection and user accounts are a fundamental part of a
organization to maintain the privacy of the data entered in a system.
We can conclude by stating that having knowledge about data structure
it must provide us with future opportunities in organizations that employ these
working methods.
BIBLIOGRAPHY

[Link]
[Link]/configur/r_ctr_db_structures.html
[Link]
[Link]
[Link]
[Link]
the-current-affairs/
[Link]
[Link]
database audit
ttps://[Link]/wiki/Sistema_de_gesti%C3%B3n_de_la_calidad

You might also like