Data from forms that are filled out by hand are then typed in to a computer manually
these are methods that automatically input data into a data base
smart card reader
barcode reader
scanners
optical character recognition
optical mark recognition
magnetic ink character recognition
sensors
Once data has been collected it can be transferred to a data base. Then once the data is analysed, any meaning found is known as information.
The EDI is the computer-to-computer exchange of documents. This is the digital replacement for business post, email and fax, because it is used by many businesses all the documents should be kept in a standard format to prevent errors.
this software is used to translate an EDI format document into raw data that a company can use in their data base
In the context of a databases a transaction is a single logical operation. One transaction can be made up of several steps.
ACID stands for Atomicity, Consistency, Isolation, Durability
ACID is used to ensure that the integrity of the database is maintained under any circumstances.
This ensures that if any part of the transaction fails it is cancelled. This is to ensure integrity of transactions and protect the money of a customer.
This is to ensure that no transaction can violate any of the defined validation rules. This ensures that any foreign relationships are preserved.
This ensures concurrent transactions lead to the same result as if the transactions are processed one after the other
This is to ensure that if a power cut occurs after the transaction is completed the transaction remains complete. This is achieved by having each part of a transaction stored on a buffer disk until all the elements are completed then it will make changes to the main database
This allows many users to simultaneously access and change data in a database.
When an item is to be updated, the entire block is read into the user’s local memory
When the record is saved the block is rewritten to the file server
record locking prevents simultaneous access to the same record. This is to prevent changes made while the record is on a local device from being overwritten when the record is then saved. It does this by stopping access to the record when it is on a local system.
If two users are attempting to update two records, a dead lock can happen when both records are inaccessible to each other as they both want to alter the other one. e.g.
Ken is attempting to make a transfer from Customer A’s account to Customer B’s account
Meanwhile, Paula is attempting to make a transfer from Customer B’s account to Customer A’s account
this is implemented by the database management system to prevent such situations from arising. It does this through serialisation.
every object in the data base has a read timestamp and a write timestamp. These will updated whenever an object is read or written. This prevents dead lock if the read timestamp is not the same as this means there has been another access in the time that a user has had the record. It will reject the mismatching read timestamps.
this is another serialisation technique. It does this by ordering transactions in terms of their dependencies on one another as well as the time they were initiated. This prevents dead lock by blocking one request until another is completed
Many organisations have built-in redundancy in their computer systems. It will duplicate hardware, located in different geographical areas, mirrors every transaction that happens on the main database.