Notes: What are databases?

What is a database?

  • A database is a place that holds information. The word combines:
    • data: information or numbers
    • base: a location or repository
  • In short: a database stores data in an organized way for retrieval and use.

Public access vs. restricted access

  • Not all information in databases is available to the general public.
  • Some databases contain personal records (health, marriage, birth records) and are restricted.
  • Information has value; access often requires credentials or special authorization.

Surface web vs deep web

  • Surface web
    • What it includes: most widely used browsers (Chrome, Bing, Safari, Firefox) help you search online.
    • Contains many credible sources but also junk; not all information on the surface web is free or credible.
    • Examples of surface web content: .com sites (e.g., Walmart, Target), social media (Twitter, Facebook, Instagram, Snapchat), blogs, Wikipedia, newspapers.
    • Metaphor: surface web is like the visible, easily navigable part of the web; there is more beneath the surface.
  • Deep web
    • Contains databases and other content not indexed by standard search engines.
    • Information here is often credible and trustworthy and can be valuable for research.
    • Access to the deep web typically requires credentials (e.g., student ID number and PIN in this context).
    • Databases host sources like books, magazines, newspapers, and scholarly articles.

Accessing LA Mission databases (example workflow)

  • Start at the LA Mission College website: http://www.lamission.edu
  • Navigate to the library resources:
    • Click the library icon on the home page, or
    • Click "Students" and then select "Library."
  • In the library homepage, click on "Databases" to access library databases.

Structure and types of LA Mission Library databases

  • Library databases include a range of options organized by scope:
    • Multi-subject databases: best for searching across multiple topics.
    • Example use: you might search for information on gun control and diabetes in the same database.
    • Specialized databases: focused on particular formats or subjects (newspapers, ebooks, subject-specific databases).
  • As you scroll, you’ll find more specialized databases tailored to specific classes or topics.
  • Practical tip: Based on your topic, choose the database that yields the most relevant results; select the best one for your needs.

Using databases vs. using Google

  • Databases do not work the same way as Google search.
  • You need to use keywords to query databases effectively.
  • Keywords are crucial for locating relevant credible sources within a database.
  • The technique for keyword searching and more advanced strategies will be covered in the next tutorial.

Why databases matter for research

  • Databases provide access to credible, trustworthy information, often not freely accessible on the surface web.
  • They are essential for academic research papers and assignments.
  • Access often requires institutional credentials (e.g., student ID, PIN) to protect sensitive information.

Practical takeaways and workflow recap

  • To begin using LA Mission databases:
    • Go to http://www.lamission.edu
    • Click the library icon or go via Students → Library
    • Click "Databases" to view available options
  • Start with multi-subject databases for broad topics; then drill down to subject-specific databases as needed.
  • Use keywords carefully to navigate databases; expect differences from general web search engines.
  • Remember: some information is restricted and requires proper credentials to access.

Ethical, philosophical, and practical implications

  • Information has value; not all information on the web is free or credible.
  • Access controls protect sensitive information (e.g., personal records) and require legitimate credentials.
  • Using credible databases supports academic integrity and high-quality research practices.
  • Privacy considerations: handling of personal data (e.g., student IDs, PINs) must be secure and restricted to authorized users.