Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-hfldf Total loading time: 0 Render date: 2024-06-12T07:58:27.845Z Has data issue: false hasContentIssue false

D - Database to Dynamic web pages

Published online by Cambridge University Press:  17 May 2010

Robert Plant
Affiliation:
University of Miami
Stephen Murrell
Affiliation:
University of Miami
Get access

Summary

Definition: An organized collection of information.

Overview

A collection of files and records is just raw data. Once it has been organized, rationalized, and formatted so that it can be effectively accessed in a uniform way, enabling general queries to be answered by a simple procedure, it becomes a database.

Rational organization is of course essential for any effective record keeping, but for a database system the demands are far more rigorous. A database system will be expected to be able to answer queries totally automatically. To answer even the simplest of queries, such as “what is the salary of the employee named Q. X. Smith in the advertising department?,” mechanically, without any access to intelligence, requires an established format to the data. A human searcher could simply leaf through all the employee records; they would easily be able to pick out the employee's name and their departmental assignment from each form, because everybody knows what proper names look like. It is just common sense; nobody would ever confuse a department name with a social-security number even if they were written in unexpected places on the form.

Of course, computers don't have common sense, and can't be expected to know what makes a credible name for a human. For any such query to be answerable, every single employee record must be formatted uniformly, so that the query application knows exactly where in each record to find the employee's name, department, and salary.

Type
Chapter
Information
An Executive's Guide to Information Technology
Principles, Business Models, and Terminology
, pp. 88 - 122
Publisher: Cambridge University Press
Print publication year: 2007

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Date, C. (2000). An Introduction to Database Systems (New York, Addison-Wesley).Google Scholar
Elmasri, R. and Navathe, S. (1994). Fundamentals of Database Systems (New York, Addison-Wesley).Google Scholar
Bowman, J., Emerson, S., and Darnovsky, M. (2001). The Practical SQL Handbook (New York, Addison-Wesley).Google Scholar
Associated terminology: Database administrator, CIO, Distributed database, Application server.
Mullins, C. (2002). Database Administration: The Complete Guide to Practices and Procedures (New York, Addison-Wesley).Google Scholar
Associated terminology: Data Protection Act, Sarbanes–Oxley, HIPAA.
DeMarco, T. (1978). Structured Analysis and System Specification (New York, Yourdon Press).Google Scholar
Associated terminology: UML, Normalization.
K. Hirji (2001). “Exploring data mining implementation,” Communications of the A. C. M., Volume 44, No. 67.
Witten, I. and Eibe, F. (2005). Data Mining: Practical Machine Learning Tools and Techniques (San Francisco, CA, Morgan Kaufmann).Google Scholar
Associated terminology: Business intelligence, CIO.
http://www.worldwideretailexchange.org/cs/en/index.htm.
http://www.transora.com/.
http://nsidc.org/.
Associated terminology: Client, Server, Data mining, XML.
Data Protection Act 1998 Chapter 29.
http://www.informationcommissioner.gov.uk.
Associated terminology: Law cross-reference.
M. Gonzales (2004). “The data quality audit,” Intelligent Enterprise, July.
Inmom, W. (1996). Building the Data Warehouse (New York, John Wiley and Sons).Google Scholar
Vitt, E., Luckevic, M., and Misner, S. (2002). Business Intelligence (Redmond, WA, Microsoft Press).Google Scholar
Associated terminology: Business intelligence, Data mining, Database, OLAP, ETL.
D. Power (2003). “A brief history of decision support systems,” http://DSSResources.COM/history/dsshistory.html.
Associated terminology: Business intelligence, Data warehouse, ERP.
Mirkovic, J., Dietrich, S., Dittrich, D., and Reiher, P. (2004). Internet Denial of Service: Attack and Defense Mechanisms (Englewood Cliffs, NJ, Prentice-Hall).Google Scholar
Associated terminology: Virus, Trojan horse.
Droms, R. and Lemon, T. (2002). The DHCP Handbook (Indianapolis, IN, Sams).Google Scholar
Associated terminology: ISP, Protocol.
Chaum, D. (1983). “Blind signatures for untraceable payments,” in Advances in Cryptology CRYPTO '82, Lecture Notes in Computer Science, ed. Chaum, D., Rivest, R., and Sherman, A. (New York, Plenum Press).
D. Chaum (1985). “Security without identification,” Communications of the A. C. M., October.
Associated terminology: Cracking, Protocol.
Schneier, B. (1996). Applied Cryptography (New York, John Wiley and Sons).Google Scholar
Feghhi, J. and Williams, P. (1998). Digital Certificates: Applied Internet Security (New York, Addison-Wesley).Google Scholar
Associated terminology: Phishing, Cracking, Hacker.
“The Digital Millennium Copyright Act of 1998,” The United States Copyright Office, 1998.
Associated terminology: Caching, Network, Law cross-reference.
Schneier, B. (1996). Applied Cryptography (New York, John Wiley and Sons).Google Scholar
Directive 1999/93/EC of the European Parliament and of the Council of 13th December 1999 on a Community framework for electronic signatures, Official Journal of the European Communities, L13/12, January 2000.
Associated terminology: Digital cash, Digital certificate.
Ozsu, M. and Valduriez, P. (1999). Principles of Distributed Database Systems (Englewood Cliffs, NJ, Prentice-Hall).Google Scholar
Associated terminology: Database administrator, CIO.
http:/www.icann.org.
ICANN, 4676 Admiralty Way, Suite 330, Marina del Rey, CA 90292–6601, USA.
Associated terminology: ISP, DHCP, Client–server.
Soukoreff, R. and MacKenzie, I. (1995). “Theoretical upper and lower bounds on typing speed using a stylus and soft keyboard,”Behaviour & Information Technology, 14, 370–379.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×