SlideShare a Scribd company logo
PRESENTER
OUSMAN FAAL
Database Concept And
Terminology
What is a Database
 Its an organized collection of information which can
easily be retrieve.
 Telephone Book
 Mailing List
 Address List
 Set of data related for a specific purpose or topic.
 It includes tools needed to work with data, such as:
 Sorting
 Filtering
 Extracting
 Summarizing
Database Terminology
 Table
 A list of related information in columns and rows
 Each Row in a table is considered a Record (your information in
the phone book is a record)
 Each Column in the table is a category or a Field (a column of
phone numbers in the phone book would be considered field)
 One item of data, such as your phone number in the phone book is
called a Data value
Query
 A query is a database object that can be used to
extract or show information in Datasheet view.
 You can use a query to show all customers who has ordered a
certain product.
 A query can get its data from one or more tables, from existing
queries, or from a combination of the two. The tables or
queries from which a query gets its data are referred to as its
record source.
Forms
 A form is a database object that you can use to
enter, edit, or display data from a table or a query.
 For example, certain users might need to see only several fields
in a table with many fields. Providing those users with a form
that contains just those fields makes it easier for them to use
the database.
 A visually attractive form makes working with the database
more pleasant and more efficient, and it can also help prevent
incorrect data from being entered.
Report
 A report is another database object which can be
use to summarize information from a table or query.
 Reports can be very useful when you have already create
queries from tables and you want to analyze or summarize
those queries so that they can be ready for printing. And you
can be able to choose which fields you want in your report.
Macros
 A macro can be use to create an action or set of
actions that can be use to automate a task.
 You can create a macro to perform a specific series of actions.
 macros can be contained in macro objects or they can be
embedded into the forms and reports.
Relational Database Concept
 Ms Access is a Relational Database
 Contain multiple Tables
 Each Table pertains a specific topic
 We just need to add fields to each table that will contain data
that will uniquely identifies each record.
Name
Address
City
Phone#
Customers
Account#
Account Type
Date Opened
Balance
Accounts
Primary Keys
 A primary key is a field or set of fields in your
table that provide Ms Access with a unique identifier
for every row.
 In a relational database you divide your information into
separate tables. You then use table relationships and primary
keys to bring the information together.
 Each table in a database must have a primary key before it can
be related to another table.
Primary Keys and Foreign Keys
• For example, a Customer ID field in the Customers
table might also appear in the Accounts table. In the
Customers table, it is the primary key. In the Accounts
table it is called a foreign key. A foreign key, simply
stated, is another table's primary key.
Primary Table Related Table
Customer
ID (*)
Name
Address
City
Phone#
Customers
Customer ID
Account# (*)
Account Type
Date Opened
Balance
Accounts
Types Of Relationship
 One-to-One relationship exist when a primary
record from the primary table has only one related
record in the related table.
 You might use a one-to-one relationship to divide a table with
many fields, to isolate part of a table for security reasons, or to
store information that applies only to a subset of the main
table
 One-to-Many relationship exist when a primary
record from the primary table is related to many
records in the related table.
 One customer can have many accounts
 One customer can order many products
 One person may have many phone numbers
 A person may have multiple e-mail addresses
 A music CD usually has many songs
 Many-to-Many relationship exist when a
primary record from the primary table is related to
many records in the related table AND a related
record in the related table is also related to many
records in the primary table.
 People can have many address; and addresses may have
many people
 A single order can include more than one product. On the
other hand, a single product can appear on many orders.
 A supplier can carry many products; and a single product
may be available from many suppliers
 A student takes many classes; and each class has many
students
Ad

More Related Content

What's hot (20)

DBMS and its Models
DBMS and its ModelsDBMS and its Models
DBMS and its Models
AhmadShah Sultani
 
Database Administrator
Database AdministratorDatabase Administrator
Database Administrator
Dhrumil Panchal
 
database language ppt.pptx
database language ppt.pptxdatabase language ppt.pptx
database language ppt.pptx
Anusha sivakumar
 
Applications of DBMS(Database Management System)
Applications of DBMS(Database Management System)Applications of DBMS(Database Management System)
Applications of DBMS(Database Management System)
chhinder kaur
 
Dbms architecture
Dbms architectureDbms architecture
Dbms architecture
Shubham Dwivedi
 
Entity relationship modelling
Entity relationship modellingEntity relationship modelling
Entity relationship modelling
Dr. C.V. Suresh Babu
 
DbMs
DbMsDbMs
DbMs
amanrock2012
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
Pradnya Saval
 
DBMS Keys
DBMS KeysDBMS Keys
DBMS Keys
Tarun Maheshwari
 
ER-Model-ER Diagram
ER-Model-ER DiagramER-Model-ER Diagram
ER-Model-ER Diagram
Saranya Natarajan
 
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Users
sontumax
 
Database Presentation
Database PresentationDatabase Presentation
Database Presentation
a9oolq8
 
Dbms Introduction and Basics
Dbms Introduction and BasicsDbms Introduction and Basics
Dbms Introduction and Basics
SHIKHA GAUTAM
 
Database architecture
Database architectureDatabase architecture
Database architecture
VENNILAV6
 
Relational model
Relational modelRelational model
Relational model
Dabbal Singh Mahara
 
Data independence
Data independenceData independence
Data independence
Aashima Wadhwa
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
Nishant Munjal
 
Database administrator
Database administratorDatabase administrator
Database administrator
Tech_MX
 
Dbms keys
Dbms keysDbms keys
Dbms keys
RUpaliLohar
 
Dbms ppt
Dbms pptDbms ppt
Dbms ppt
Chinnu Shimna
 
database language ppt.pptx
database language ppt.pptxdatabase language ppt.pptx
database language ppt.pptx
Anusha sivakumar
 
Applications of DBMS(Database Management System)
Applications of DBMS(Database Management System)Applications of DBMS(Database Management System)
Applications of DBMS(Database Management System)
chhinder kaur
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
Pradnya Saval
 
Introduction: Databases and Database Users
Introduction: Databases and Database UsersIntroduction: Databases and Database Users
Introduction: Databases and Database Users
sontumax
 
Database Presentation
Database PresentationDatabase Presentation
Database Presentation
a9oolq8
 
Dbms Introduction and Basics
Dbms Introduction and BasicsDbms Introduction and Basics
Dbms Introduction and Basics
SHIKHA GAUTAM
 
Database architecture
Database architectureDatabase architecture
Database architecture
VENNILAV6
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
Nishant Munjal
 
Database administrator
Database administratorDatabase administrator
Database administrator
Tech_MX
 

Viewers also liked (18)

Introduction To Blogging
Introduction To BloggingIntroduction To Blogging
Introduction To Blogging
Ousman Faal
 
Google Search Techniques
Google Search TechniquesGoogle Search Techniques
Google Search Techniques
Ousman Faal
 
Internet Awareness
Internet AwarenessInternet Awareness
Internet Awareness
Ousman Faal
 
Effective Presentation Using PowerPoint
Effective Presentation Using PowerPointEffective Presentation Using PowerPoint
Effective Presentation Using PowerPoint
Ousman Faal
 
ระบบจัดการหอพัก
ระบบจัดการหอพักระบบจัดการหอพัก
ระบบจัดการหอพัก
meaw_concon
 
ตัวอย่าง DFD level 1
ตัวอย่าง DFD level 1ตัวอย่าง DFD level 1
ตัวอย่าง DFD level 1
rubtumproject.com
 
ระบบจัดการร้านเบเกอรี่
ระบบจัดการร้านเบเกอรี่ระบบจัดการร้านเบเกอรี่
ระบบจัดการร้านเบเกอรี่
Visiene Lssbh
 
การเขียนแผนภาพ DFD
การเขียนแผนภาพ DFDการเขียนแผนภาพ DFD
การเขียนแผนภาพ DFD
skiats
 
Hands on robotics in coimbatore
Hands on robotics in coimbatoreHands on robotics in coimbatore
Hands on robotics in coimbatore
Hands-On Robotics
 
ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS
 ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS
ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS
Raphaëlle Monier
 
Augmenta
AugmentaAugmenta
Augmenta
David-Alexandre CHANEL
 
Joseph george kalure certificates (1)
Joseph george kalure certificates (1)Joseph george kalure certificates (1)
Joseph george kalure certificates (1)
Joseph Kalure
 
Sindhuja updated resume (1) (1) (1)
Sindhuja updated resume (1) (1) (1)Sindhuja updated resume (1) (1) (1)
Sindhuja updated resume (1) (1) (1)
sindhuja d
 
Opovo 6
Opovo 6Opovo 6
Opovo 6
tanjaopovo
 
Cenovnik FLP proizvoda
Cenovnik FLP proizvodaCenovnik FLP proizvoda
Cenovnik FLP proizvoda
Zdravlje i Aloe
 
1 الباب الاول
1 الباب الاول1 الباب الاول
1 الباب الاول
احمد عبده
 
Martinez Polling Company Final Report (1)
Martinez Polling Company Final Report  (1)Martinez Polling Company Final Report  (1)
Martinez Polling Company Final Report (1)
Alexandria Martinez
 
свистушкин
свистушкинсвистушкин
свистушкин
Ксения Емануилова
 
Introduction To Blogging
Introduction To BloggingIntroduction To Blogging
Introduction To Blogging
Ousman Faal
 
Google Search Techniques
Google Search TechniquesGoogle Search Techniques
Google Search Techniques
Ousman Faal
 
Internet Awareness
Internet AwarenessInternet Awareness
Internet Awareness
Ousman Faal
 
Effective Presentation Using PowerPoint
Effective Presentation Using PowerPointEffective Presentation Using PowerPoint
Effective Presentation Using PowerPoint
Ousman Faal
 
ระบบจัดการหอพัก
ระบบจัดการหอพักระบบจัดการหอพัก
ระบบจัดการหอพัก
meaw_concon
 
ตัวอย่าง DFD level 1
ตัวอย่าง DFD level 1ตัวอย่าง DFD level 1
ตัวอย่าง DFD level 1
rubtumproject.com
 
ระบบจัดการร้านเบเกอรี่
ระบบจัดการร้านเบเกอรี่ระบบจัดการร้านเบเกอรี่
ระบบจัดการร้านเบเกอรี่
Visiene Lssbh
 
การเขียนแผนภาพ DFD
การเขียนแผนภาพ DFDการเขียนแผนภาพ DFD
การเขียนแผนภาพ DFD
skiats
 
Hands on robotics in coimbatore
Hands on robotics in coimbatoreHands on robotics in coimbatore
Hands on robotics in coimbatore
Hands-On Robotics
 
ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS
 ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS
ENGAGEMENT SOCIAL DES ETABLISSEMENTS FINANCIERS
Raphaëlle Monier
 
Joseph george kalure certificates (1)
Joseph george kalure certificates (1)Joseph george kalure certificates (1)
Joseph george kalure certificates (1)
Joseph Kalure
 
Sindhuja updated resume (1) (1) (1)
Sindhuja updated resume (1) (1) (1)Sindhuja updated resume (1) (1) (1)
Sindhuja updated resume (1) (1) (1)
sindhuja d
 
Martinez Polling Company Final Report (1)
Martinez Polling Company Final Report  (1)Martinez Polling Company Final Report  (1)
Martinez Polling Company Final Report (1)
Alexandria Martinez
 
Ad

Similar to Database Concepts and Terminologies (20)

18 database features
18 database features18 database features
18 database features
Rebecca Jones
 
Data processing
Data processingData processing
Data processing
Joseph Lagod
 
CIS145 Final Review
CIS145 Final ReviewCIS145 Final Review
CIS145 Final Review
Randy Riness @ South Puget Sound Community College
 
Cis145 Final Review
Cis145 Final ReviewCis145 Final Review
Cis145 Final Review
Randy Riness @ South Puget Sound Community College
 
Access 2010
Access 2010Access 2010
Access 2010
Cikgu Syahidon
 
Cis145 Final Review
Cis145 Final ReviewCis145 Final Review
Cis145 Final Review
Randy Riness @ South Puget Sound Community College
 
Create a table access - office
Create a table   access - officeCreate a table   access - office
Create a table access - office
Pavan Kumar
 
1. access
1. access1. access
1. access
Dr. Shalini Pandey
 
Ms access 2010
Ms access 2010Ms access 2010
Ms access 2010
Alsufaacademy
 
Database
DatabaseDatabase
Database
determinant342
 
Database Fundamentals
Database FundamentalsDatabase Fundamentals
Database Fundamentals
lindy23
 
Databases
DatabasesDatabases
Databases
odalyfer
 
MS ACCESS Tutorials
MS ACCESS TutorialsMS ACCESS Tutorials
MS ACCESS Tutorials
Duj Law
 
MS Office Access Tutorial
MS Office Access TutorialMS Office Access Tutorial
MS Office Access Tutorial
virtualMaryam
 
Database
Database Database
Database
Indrani Chakraborty
 
Database Basics
Database BasicsDatabase Basics
Database Basics
Abdel Moneim Emad
 
Data resource management
Data resource managementData resource management
Data resource management
Nirajan Silwal
 
Operate Database Applicationidentify ntrk handtools.pptx
Operate Database Applicationidentify ntrk handtools.pptxOperate Database Applicationidentify ntrk handtools.pptx
Operate Database Applicationidentify ntrk handtools.pptx
edget1
 
CIS 145 test 1 review
CIS 145 test 1 reviewCIS 145 test 1 review
CIS 145 test 1 review
Randy Riness @ South Puget Sound Community College
 
access1.ppt
access1.pptaccess1.ppt
access1.ppt
mayada34
 
Ad

Recently uploaded (20)

Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
Agentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community MeetupAgentic Automation - Delhi UiPath Community Meetup
Agentic Automation - Delhi UiPath Community Meetup
Manoj Batra (1600 + Connections)
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptxTop 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
Top 5 Benefits of Using Molybdenum Rods in Industrial Applications.pptx
mkubeusa
 
Mastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B LandscapeMastering Testing in the Modern F&B Landscape
Mastering Testing in the Modern F&B Landscape
marketing943205
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
AI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamsonAI-proof your career by Olivier Vroom and David WIlliamson
AI-proof your career by Olivier Vroom and David WIlliamson
UXPA Boston
 
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Optima Cyber - Maritime Cyber Security - MSSP Services - Manolis Sfakianakis ...
Mike Mingos
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Config 2025 presentation recap covering both days
Config 2025 presentation recap covering both daysConfig 2025 presentation recap covering both days
Config 2025 presentation recap covering both days
TrishAntoni1
 
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
On-Device or Remote? On the Energy Efficiency of Fetching LLM-Generated Conte...
Ivano Malavolta
 
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptxDevOpsDays SLC - Platform Engineers are Product Managers.pptx
DevOpsDays SLC - Platform Engineers are Product Managers.pptx
Justin Reock
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 

Database Concepts and Terminologies

  • 2. What is a Database  Its an organized collection of information which can easily be retrieve.  Telephone Book  Mailing List  Address List  Set of data related for a specific purpose or topic.  It includes tools needed to work with data, such as:  Sorting  Filtering  Extracting  Summarizing
  • 3. Database Terminology  Table  A list of related information in columns and rows  Each Row in a table is considered a Record (your information in the phone book is a record)  Each Column in the table is a category or a Field (a column of phone numbers in the phone book would be considered field)  One item of data, such as your phone number in the phone book is called a Data value
  • 4. Query  A query is a database object that can be used to extract or show information in Datasheet view.  You can use a query to show all customers who has ordered a certain product.  A query can get its data from one or more tables, from existing queries, or from a combination of the two. The tables or queries from which a query gets its data are referred to as its record source.
  • 5. Forms  A form is a database object that you can use to enter, edit, or display data from a table or a query.  For example, certain users might need to see only several fields in a table with many fields. Providing those users with a form that contains just those fields makes it easier for them to use the database.  A visually attractive form makes working with the database more pleasant and more efficient, and it can also help prevent incorrect data from being entered.
  • 6. Report  A report is another database object which can be use to summarize information from a table or query.  Reports can be very useful when you have already create queries from tables and you want to analyze or summarize those queries so that they can be ready for printing. And you can be able to choose which fields you want in your report.
  • 7. Macros  A macro can be use to create an action or set of actions that can be use to automate a task.  You can create a macro to perform a specific series of actions.  macros can be contained in macro objects or they can be embedded into the forms and reports.
  • 8. Relational Database Concept  Ms Access is a Relational Database  Contain multiple Tables  Each Table pertains a specific topic  We just need to add fields to each table that will contain data that will uniquely identifies each record. Name Address City Phone# Customers Account# Account Type Date Opened Balance Accounts
  • 9. Primary Keys  A primary key is a field or set of fields in your table that provide Ms Access with a unique identifier for every row.  In a relational database you divide your information into separate tables. You then use table relationships and primary keys to bring the information together.  Each table in a database must have a primary key before it can be related to another table.
  • 10. Primary Keys and Foreign Keys • For example, a Customer ID field in the Customers table might also appear in the Accounts table. In the Customers table, it is the primary key. In the Accounts table it is called a foreign key. A foreign key, simply stated, is another table's primary key. Primary Table Related Table Customer ID (*) Name Address City Phone# Customers Customer ID Account# (*) Account Type Date Opened Balance Accounts
  • 11. Types Of Relationship  One-to-One relationship exist when a primary record from the primary table has only one related record in the related table.  You might use a one-to-one relationship to divide a table with many fields, to isolate part of a table for security reasons, or to store information that applies only to a subset of the main table
  • 12.  One-to-Many relationship exist when a primary record from the primary table is related to many records in the related table.  One customer can have many accounts  One customer can order many products  One person may have many phone numbers  A person may have multiple e-mail addresses  A music CD usually has many songs
  • 13.  Many-to-Many relationship exist when a primary record from the primary table is related to many records in the related table AND a related record in the related table is also related to many records in the primary table.  People can have many address; and addresses may have many people  A single order can include more than one product. On the other hand, a single product can appear on many orders.  A supplier can carry many products; and a single product may be available from many suppliers  A student takes many classes; and each class has many students
  翻译: