adm 316 workshop 3 slides
TRANSCRIPT
ADM 316Computers and Information Processing
Workshop 3
Devotion / Prayer
Is Integrity in Business Impossible?
Psalm 119:125 (NASB)
Give me understanding, that I may know Your testimonies.
Chapter 7
Database Applications and Privacy Implications
You are just a number to a computer.
A database is like an address book.
Databases
Make it easier to store large quantities of information
Make it easier to retrieve information quickly and flexibly
Databases
Make it easy to organize and reorganize information
Make it easy to print and distribution information in a variety of ways
Database Anatomy
Database program: a software tool for organizing the storage and retrieval of information
Database: a collection of information stored in an organized form in a computer
Table: a collection of related information
Database Anatomy
Record: the information relating to one person, product, or event
Field: each discrete piece of information in a record
FieldRecord
Table
Database Anatomy
The type of information a field can hold is determined by its data type: Alphanumeric strings Integers Floating-point decimals Currency Date/time Logical (true/false) Limited data types (such as state or country)
Using Databases
Browsing Querying Sorting Reporting Mail Merge
Relational Databases
A relational database allows tables to be related to each other.
Changes in one table are automatically reflected in other tables.
Relational databases are organized by key fields which unlock relevant information when it is needed elsewhere.
Batch vs. Real-Time Processing
Batch processing: transactions accumulate throughout the day and are input into the computer in large batches
Real-time processing: allows instant access to information and instant updates
Client/Server Software
Two-way communications occur between applications running on the client PC and the server PC.
Users can take advantage of the client PC’s convenience while still having access to data stored on large server systems.
Client/Server Software
Data Mining
The discovery and extraction of hidden predictive information from large databases
Locates trends and patterns in data that would have been overlooked by normal database queries
Computers and Privacy
Computers control access to personal and identifying information.
More than 15,000 specialized marketing databases contain 2,000,000,000 names and contain personal characteristics like age, income, and religion.
Computers and Privacy
Cookies Identity theft / “phishing” schemes Workplace monitoring technology Surveillance satellites (Google Earth) Global positioning systems in cell phones Surveillance cameras
Quiz Review
Workshop 2
Next Week’s Homework
Read Chapters 8 and 9 in Tomorrow’s Technology and You and be prepared for this week’s quiz on this reading.
Read Chapter 4 in Microsoft Office Excel 2003.
Next Week’s Homework
Individually, complete the Chapter 8 and 9 questions on pp. 33 and 34 in the Student Guide.
Individually, complete the Chapter 3 Excel Project/Case “PowerPoint Presentations” on p. 158 in Microsoft Office Excel 2003.