Premium Essay

Database Management And Information Retrieval System Case Study

Submitted By
Words 1137
Pages 5
Question 1
Differentiate between database management system and information retrieval system by focusing on their functionalities. (30 marks).
Database management system Information retrieval system Main software in computer system Obtain resources to the information relevant Offer Data modelling Facility Restricted to classify of object Structured data format Unstructured data format Provide precise semantics Provide imprecise semantics Complete of query specification Incomplete of query specification Data dictionary system management Item normalization Data transformation and presentation Document database search Backup and recovery management Index database search Data store management Selective dissemination of information
…show more content…
Hardware can range from a PC to a network of computers. In implementation of DBMS it’s impossible without the hardware devices. The software is the main component of a DBMS. It is to control DBMS, operating system, network software and also the application programs. The most important component in DBMS is data. Processing the data is the main purpose of DBMS. Data used by the organization and a description of this data called the schema. Next, is procedures that is a instructions and rules that should be applied to the design and use of the database and DBMS. By using or run the DBMS, the user which operate and manage the DBMS require documented procedures. Then, user is a person who interact with DBMS to perform different operations on database such as retrieving, updating, inserting, deleting data and so …show more content…
Not fit tidily in database
High cost and performance limitation File have internal structure
Manage data at one time Unorganized data in database
Example ; numeric ,name, date. Example ; e-mail, video, photo.

Structured data is first dependent by creating a data model which is a model of the kind of business data to be recorded and how the data will be store, process and access. Structured data has it own the advantage that can easily inserting, storing, queries and analyzing. Due to the high cost and performance limitations of storage, memory and processing, relational databases and spreadsheets are using structured data is the best way to manage the data effectively at one time. Example of structure data is numeric, currency, alphabetic, name, date and also address.
Unstructured data refer to the information that does not reside in a traditional row and column database. Even the kinds of file have internal structure, the data contained in it do not fit tidily in database and they are still considered as unstructured data. Examples for unstructured data is e-mail messages, by using word documentation, video, photo, web pages, and other kind of business document. The disadvantage of unstructured data is raw and unorganized data in the

Similar Documents

Free Essay

Web Based Hotel Management System

...CHAPTER ONE INTRODUCTION 1.1 Background Information A hotel is an establishment that provides lodging paid on a short-term basis. The provision of basic accommodation, in times past, consisting only of a room with a bed, a cupboard, a small table and a washstand has largely been replaced by rooms with modern facilities For the purpose of this work a guest house is (also guesthouse) is a kind of lodging. In some parts of the world a guest house is similar to a hostel, bed and breakfast, or inn whereas in other parts of the world (such as for example the Caribbean), guest houses are a type of inexpensive hotel-like lodging and a hotel is a commercial establishment providing lodging, meals, and other guest services, both of which can be used interchangeably For this Project I would be using The Covenant University Guest House as my case study The Covenant University Guest house has 80 rooms which are divided into three categories; Executive deluxe rooms, mini suits and standard rooms. All rooms have intercoms, internet services and satellite television, it has a standard restaurant serving continental and national dishes,24hours room service, a mini mart, a gymnasium, laundry service with modern dry cleaning equipment, 3 large halls for exhibitions and conferences and a large secure cark park The Covenant University Guest house has 5 departments namely: 1. Housekeeping department 2. Laundry department 3. F&B(Food and Beverage) department 4.......

Words: 5965 - Pages: 24

Free Essay

Database

...1 Basic concepts of information retrieval systems Introduction The term ‘information retrieval’ was coined in 1952 and gained popularity in the research community from 1961 onwards.1 At that time the organizing function of information retrieval was seen as a major advance in libraries that were no longer just storehouses of books, but also places where the information they hold is catalogued and indexed.2 Subsequently, with the introduction of computers in information handling, there appeared a number of databases containing bibliographic details of documents, often married with abstracts, keywords, and so on, and consequently the concept of information retrieval came to mean the retrieval of bibliographic information from stored document databases. Information retrieval is concerned with all the activities related to the organization of, processing of, and access to, information of all forms and formats. An information retrieval system allows people to communicate with an information system or service in order to find information – text, graphic images, sound recordings or video that meet their specific needs. Thus the objective of an information retrieval system is to enable users to find relevant information from an organized collection of documents. In fact, most information retrieval systems are, truly speaking, document retrieval systems, since they are designed to retrieve information about the existence (or non-existence) of documents relevant to a user query.......

Words: 5238 - Pages: 21

Premium Essay

Immunization Records Mgt System

...BUGANDA ROYAL INSTITUTE OF BUSINESS AND TECHINICAL EDUCATION - MENGO AUTOMATED IMMUNISATION RECORDS MANAGEMENT SYSTEM A CASE STUDY OF NSANGI HEALTN CENTER III A RESEARCH REPORT BY NAMATOVU ANGELLA BR/DCS/8045/11 A RESEARCH REPORT SUBMITTED TO THE DEPARTMENT OF COMMUNICATION AND EDUCATION IN PARTIAL FULFILMENT FOR THE AWARD OF DIPLOMA IN COMPUTER SCIENCE OF BUGANDA ROYAL INSTITUTE OF BUSINESS AND TECHNICAL EDUCATION JULY 2013 DECLARATION I hereby declare that this research which submitted to the department of communication and education of Buganda Royal institute is my original work and it is and it has never been submitted to any other degree/diploma award institute. Students Name: NAMATOVU ANGELLA Reg No:BR/DCS/8045/11 Date:___________________________ Approval I approve that this research report has been under my supervision and it is ready for Submission to the academic council of Buganda Royal Institute. Supervisor’s Name: Mr. SSekuwanda Henry Signature: ____________________________ Date: ___/07/2013 DEDICATION I dedicate this research report firstly my mother who has sacrificed whatever My siblings and my friends at Buganda Royal Institute for both moral and financial support they have provided. May the almighty God Reward them accordingly. ACKNOWLEDGEMENT I would like to acknowledge this piece of work most......

Words: 7325 - Pages: 30

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus......

Words: 15250 - Pages: 61

Premium Essay

Hostel Management System

...5.1 Applications of Data Mining A wide range of companies have deployed successful applications of data mining. While early adopters of this technology have tended to be in information-intensive industries such as financial services and direct mail marketing, the technology is applicable to any company looking to leverage a large data warehouse to better manage their customer relationships. Two critical factors for success with data mining are: a large, well-integrated data warehouse and a well-defined understanding of the business process within which data mining is to be applied (such as customer prospecting, retention, campaign management, and so on). Some successful application areas include: • A pharmaceutical company can analyze its recent sales force activity and their results to improve targeting of high-value physicians and determine which marketing activities will have the greatest impact in the next few months. The data needs to include competitor market activity as well as information about the local health care systems. The results can be distributed to the sales force via a wide-area network that enables the representatives to review the recommendations from the perspective of the key attributes in the decision process. The ongoing, dynamic analysis of the data warehouse allows best practices from throughout the organization to be applied in specific sales situations. • A credit card company can leverage its vast warehouse of customer transaction...

Words: 5855 - Pages: 24

Premium Essay

Dbms

...(Tribhuvan University) A STUDY IN THE ATTENDANCE MANAGEMENT SYSTEM OF HIMALAYAN WHITEHOUSE INTERNATIONAL COLLEGE Project Report on Database Management System In partial fulfillment of the requirements For the Bachelor’s Degree in Business Administration By: September 2014 Table of Contents Chapter I 1 INTRODUCTION 1 1.1 Introduction of the Organization 1 1.2 Attendance Management System 1 1.3 Overview 2 1.4 Economically Feasibility 2 1.5 Technical Feasibility 2 1.6 Behavioural Feasibility 2 Chapter II 3 LITERATURE SURVEY 3 2.1 Drawbacks Of Present System 3 2.2 Proposed System 3 2.2.1 Objectives of the Proposed System 3 2.2.2 Advantages of Proposed System 4 2.3 Scope 4 Chapter III 5 SYSTEM DESIGN 5 3.1 E-R-D Representations 5 3.2 E-R Diagram 6 3.3 Schema 7 3.4 Tabular Representation Of Schema 7 Chapter IV 10 IMPLEMENTATION 10 4.1 Syntaxes 10 4.2 Snapshots 11 Chapter V 14 CONCLUSION 14 BIBLIOGRAPHY 15 REFERENCES 16 LIST OF TABLES |Table no. |Title |Page no. | |3.4.1 |Tabular representation of Schema: Teacher |9 | |3.4.2 |Tabular representation of Schema: Teaches |9 | |3.4.3 |Tabular representation of Schema: Subject |9 ...

Words: 2569 - Pages: 11

Premium Essay

Syaran

...MEC/CEC, CA/CWA, B.Com & B.Sc. Master Minds 4. Data Storage, Retrieval & DBMS Q.No.1. Write about different coding schemes. BCD: » » » » » » » » » » » » » » » » » » BCD stands for binary Coded Decimal system. This is a 6 bit code i.e. each character is expressed in terms of a 6 bit code. There will be 64 ways of representing digits, alphabets and special symbols. There is no parity bit in this coding scheme. ASCII: ASCII stands for American Standard Code for Information Interchange. This code is extensively used in small computers, peripherals, instruments and communication devices. It is a seven-bit code and has replaced many of the special codes that were previously used. Microcomputers using 8-bit word length use 7 bits to represent the basic code. The 8th bit is used for parity or it may be permanently 1 or 0. With 7 bits, up to 128 characters can be coded. A letter, digit or special symbol is called a character. It includes upper and lower case alphabets, numbers, punctuation marks, special and control characters. Here the first 3 bits are zone bits and the remaining 4 bits represent digit values. ASCII-8: A newer version of ASCII is ASCII-8 code, which is an 8-bit code. With 8 bits, the code capacity is extended to 256 characters. EBCDIC: EBCDIC stands for Extended Binary Coded Decimal Interchange Code. It is a standard character code for large computers. It is a 8-bit code without parity and 9th bit can be used as parity bit. Using 8 bits 256......

Words: 14549 - Pages: 59

Premium Essay

St.Matthew Academy of Cavite Library Management System

...LIBRARY MANAGEMENT SYSTEM Undergraduate Thesis Submitted to the Faculty of the College of Business and Entrepreneurship Cavite State University Imus, Cavite In partial fulfillment of the requirements for the degree of Bachelor of Science in Information Technology JENNIFER ACEBO DYAN JESSICA LIM JOBIN DEL ROSARIO INTRODUCTION In today’s modern age where computer has become a way of life, it is evident that a majority of country’s institution still do not adapt high technology. Particularly in some schools, library transactions are still done on paper. We all know that modern school libraries are operating at great pace striving to serve as many students as possible with the best of their abilities. But as the years rolled by, the number of study has grown and the manual method of managing student and book records is no longer practical. A Library Management System is a system that makes use of information technology to perform managerial objects. The main goal of a library management information system is to store, organize, share and retrieve vital information needed to perform daily operational functions of the library. St. Matthew Academy of Cavite does not have one. Since library has a very large number of books and large number of members, it is impossible for librarians to handle day to day activities manually. Therefore, a library management......

Words: 2715 - Pages: 11

Free Essay

Ict in Service Delievry

...||Volume||2 ||Issue|| 8 ||Pages|| 37-43||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 The Impact Of Information And Communication Technology (Ict) Compliant Librarians On Library Services Delivery In Academic Library: The Case Of National Open University Of Nigeria(Noun)Library By Nebeolise, Lucy Ndidiamaka National Open University of Nigeria,Victoria Island , Lagos -----------------------------------------------------ABSTRACT----------------------------------------------------- The study aimed at examining the impact of information and communication Technology (ICT) compliant librarians on library services delivery on NOUN library. The paper traces briefly the history of National Open University Library. The e-resources, staff strengths are highlighted. The study adopted the descriptive survey method. The questionnaire was used as instrument for data collection. A total of fifty (50) questionnaires were distributed and collected back. The data collected were analyzed with the use of tables and simple percentages. From the analysis of the data collected, it was found that the use of ICT compliant librarians on library service delivery aids immensely in the development of NOUN library, quick delivery of information services, access and easy retrieval of information by users. The study shows thatInadequate ICT skilled professional Librarians, Inadequate provision of ICT training......

Words: 4437 - Pages: 18

Free Essay

Network Proposal

...Course: Date: Table of Contents SECTION I: CONSULTANT …………………………..............................................2-5 SECTION II: OUR UNDERSTANDING OF ABC REQUIREMENTS…………….5 SECTION III: OUR PROPOSAL……………………………………………………..6-16 SECTION IV: PROJECT RESOURCE……………………………………………..….17-18 Reference………………………………………………………………………………… I.0. Introduction BLM COMMUNICATIONS Your Ref… Our Ref: ABC/14/9 26 September 2014 Information Technology/ Systems Engineer ABC, Department of ICT Address: Dear Sir/Madam, RE: PROPOSAL FOR NETWORKING AND CYBER-PHYSICAL SYTEMS SAFETY Proposal on enterprise-wide solution for networking topology, network devices, IP infrastructure, and network security innovative safety procedures and measures for implementation to provide safer environments for networking and electronic document management software. We look forward for your favorable consideration. Sincerely, Name, LEAD CONSULTANT 1. Business Questionnaire |Company Registration No. 490998 | |PIN Number P051564540Q | |VAT Number ...

Words: 2114 - Pages: 9

Premium Essay

Project

...comprises of the background of the study, statement of the problem, general and specific objectives of the research, scope of the study and significance of a computerized records management system. 1.1 Background information. I have much concentration on one of primary school known as kyegera parents primary school. It is one of the many privately owned primary schools in kampala district. This primary school was constructed and started operating in 2006 to offer good education to the young generation in the district and perhaps competite with the rest of the country’s schools. The manual based granding system is the current system used by this education institute as I analyze this system I found that the system was costly in terms of purchasing papers, calculator and minimising error. A computerized granding management system for an education institution is all about simpling stundents granding, securing reports, managing and quick retrieval of data and storage of large volume of data with the help of hard drive and can be kept for long period of time. It also allows deletion and editing of data which cannot be done on paper. 1.2 Problem statement. The institutions current system is mainly manual based granding system which are costly in terms of granding using calculator , storage and securing records from intruder to access them. 1.2.1 General objective. The purpose of this project is to design a computerized records management system that will provide......

Words: 8272 - Pages: 34

Premium Essay

User Authentication for Network Environment

...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members,......

Words: 17307 - Pages: 70

Premium Essay

Studies

...HOSPITAL MANAGEMENT INFORMATION SYSTEM Group Members- Rohan Rodrigues-03 Deepa patel-32 INTRODUCTION Hospitals are the key institutions in providing relief against sickness and disease. They have become an integral part of the comprehensive health services in India, both curative and preventive. Significant progress has been made in improving their efficiency and operations.Effectiveness of a health institution - hospitals or nursing homes, depends on its goals and objectives, itsstrategic location, soundness of its operations, and efficiency of its management systems. The administrator's effectiveness depends upon the efficiency with which he is able to achieve the goals and objectives. Some of the major factors determining the effectiveness of a health institution includes patient care management and patient satisfaction. Hospitals are very expensive to build and to operate. Administrators and professionals have to be extremely cost conscious. Effective computerised systems and procedures need to be implemented to ensure proper utilization of limited resources toward quality health care. It becomes even more important when an in-house medical facility is provided by an industry for it’s employees, as is the case for Tata Steel. Patient care management in Tata hospital has fully utilised the power of computers in Medicare, whereby network of integrated systems maintaining patient database for the hospital services in the areas of Pathology, Radiology, Medical......

Words: 2223 - Pages: 9

Free Essay

Vector Space Model

... 3 Information retrieval deals with the problem of matching information needs of human users with information provided in information collections. For achieving this an information retrieval system has to deal with the following tasks: • Generating structured representations of information items: this process is called feature extraction and can include simple tasks, such as extracting words from a text as well as complex methods, e.g., for image or video analysis. • Generating structured representations of information needs: often this task is solved by providing users with a query language and leave the formulation of structured queries to them. This is the case, for example, for simple keyword based query languages, as used in Web search engines. Some information retrieval systems also support the user in the query formulation, e.g., through visual interfaces. • Matching of information needs with information items: this is the algorithmic task of computing similarity of information items and retrieval querie. T the heart of this step is the information retrieval model. Similarity measures on the structured representations of queries and documents are used to model relevance of information for users. As a result, a selection of relevant information items or a ranked result can be presented to the user. Since information retrieval systems deal usually with large information collections and/or large user communities, the efficiency of an information retrieval system is......

Words: 3315 - Pages: 14

Premium Essay

Thesis

...* 1. Chapter 2 Reviews of Related Literature and Studies This chapter includes the ideas, finished thesis, generalization or conclusions, methodologies and others. Those that were included in this chapter helps in familiarizing information that are relevant and similar to the present study. Related Literature Local According to Aquino (2005), importance of computer application is increasing day by day. In the latest decades of the Millennium winning organization are those which are willing to integrate business strategy and computer information technology in plying their respective trades. The use of computer information technology results for them to be able to develop products fast and make decisions fast, ability to have fluid organization structures, able to cope with the demanding work force and external environment by the rapid development of innovative approaches and lastly using information system confirms the company‟s mission vision. Schools use information systems in the way of implementing an enrolment system. This results for them to attract enrolees and earn an income. Enrollees are attracted because the use of the said system makes the transactions faster and easier. * 2. 13 “Lack of enrolment system in schools can lead to chaos and troubles”, as stated by Ace Adrian (2011). Students will be confused on what they should do to be able to enroll that is why such systems is extremely useful in the way that it gives an ease on working on enrolment processes.......

Words: 2359 - Pages: 10