1. The Flat-File Approach
2. The Database Approach
The Flat-File Approach.
Flat files are data files that contain records with no structured
relationships to other files. The flat-file approach is most often
associated with so-called legacy systems.
The Flat-File Approach.
The accounting function needs customer sales S data organized
by account number and structured to show outstanding balances.
The marketing function needs customer sales history data
organized by demographic keys for use in targeting new product
promotions and for selling product upgrades
The product service group needs customer sales data organized
by products and structured to show scheduled service dates
Data Redundancy
replication of essentially the same data in multiple files
Significant Problems
Data Storage
Efficient data captures and stores data only once management and
makes this single source available to all users who need it.
organizations must incur the costs of both multiple collection and
multiple storage procedures
Data Updating
Organizations store a great deal of data on master files and
reference. files that require periodic updating to reflect changes.
These redundant updating tasks add significantly to the cost of
data management
, Currency Of Information
In contrast to the problem of performing multiple updates is the
problem of failing to update all the user files that are affected by
a change in status. If update information is not properly
disseminated, the change will not be reflected in some users data,
resulting in decisions based on outdated information
Task-Data Dependency
the user's inability to obtain additional information as his or her
needs change, a user's task is limited and decision making ability
constrained by the data that he or she possesses and controls.
Users in this environment tend to satisfy new information needs
by procuring new data files.
The Database Approach.
Access to the data resource is controlled by a database
management system (DBMS). The DBMS is a special software
system that is programmed to know which data elements each
user is authorized to access
The user's program sends requests for data to the DBMS, which
validates and authorizes access to the database in accordance with
the user's level of authority. If the user requests data that he or she
is not authorized to access, the request is denied.
Database Approach
1. 01this approach centralizes the organization's data into This
approach a common database that is shared by other users
2. 02all users have access to the data they need All users have acces
to achieve their respective objective
3. 03 through data sharing the traditional problems associated with
the flat-file approach may be overcome
Eliminate Problems
Data Storage