Documente Academic
Documente Profesional
Documente Cultură
Database Approach
-this approach centralizes the organizations data into
a common database that is shared by other users.
DBMS is a special software system that is programmed to know
which data elements each user is authorized to access.
Key Elements of the Database environment
Database planning
Design
Logical database
External users view demand
Internal view of database
Database control
Implementation
3.
DBMS Models
A data model is an abstract representation of
the data about entities, including resources, events and
transactions, and agents (personnel or customer) and their
relationships in an organization. The purpose of a data
model is to represent entity attributes in a way that is
understandable to users.
o
1.
3 common models
Hierarchical database model is a data
model in which the data is organized
into a tree-like structure. The structure
Flat-File Approach
-are data files that contain records with no structured
relationship to other files. This approach is most often associated
with so called legacy systems. These are often large mainframe
systems that were implemented in the 1970s and 1980s. Some
organizations today still make extensive use of such systems.
Eventually, they will be replaced by modern database
management systems, but in the meantime, auditors must
continue to deal with legacy-system technologies.
- This approach promotes a single-user view
approach to data management whereby end users own their
data rather than share them with others users. It is therefore
structured, formatted and arranged to suit the specific needs of
the owner or primary user of the data. It may exclude data
attributes that are useful together users, thus preventing
successful integration of data across the organization. When
multiple users need the same data for different purposes, they
must obtain separate data sets structured to their specific needs.
3.
4.
ACCESS CONTROLS
specific resources.
Access controls may be discretionary
process
called
destructive
being updated.
through
Off-site Storage
suitable role.
2.
Backup
3.
BACK UP CONTROL
A backup is a copy of data. This copy can include
Checkpoint Feature
important parts of the database, such as the control file and data
files. A backup is a safeguard against unexpected data loss and
application errors. If you lose the original data, then you can
Recovery Module