1.Information Technology is defined as the study of design, development , implementation , support or management of computer-based information systems, particularly software-applications and computer hardware.
2.In short IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit and retrieve information.
3.In information technology you would be covering many fields similar to computer science but also
A series of steps followed to obtain a database design that allows for efficient access and storage of data in a relational database .These steps reduce data redundancy and the chances of data becoming inconsistent.
A table in a relational database is said to be in normal form if it satisfies certain constraints. Codd’s original work defined three such forms but there are now five generally accepted steps of normalization. The output of the first step is called First Normal Form (1NF); the output of the second step is Second Normal Form (2NF), etc.
First Normal Form eliminates repeating groups by putting each into a separate table and connecting them with a one-to-many relationship
Second Normal Form eliminates functional dependencies on a partial key by putting the fields in a separate table from those that are dependent on the whole key
Third Normal Form eliminates functional dependencies on non-key fields by putting them in a separate table. At this stage, all non-key fields are dependent on the key, the whole key and nothing but the key.
Fourth Normal Form separates independent multi-valued facts stored in one table into separate tables.
Fifth Normal Form breaks out data redundancy that is not covered by any of the previous normal forms.
A unique primary key generated by the RDBMS that is not derived from any data in the database and whose only significance is to act as the primary key.
A surrogate key is frequently a sequential number but doesn't have to be. Having the key independent of all other columns insulates the database relationships from changes in data values or database design and guarantees uniqueness.
Some database designers use surrogate keys religiously regardless of the suitability of other candidate keys However, if a good key already exists, the addition of a surrogate key will merely slow down access, particularly if it is indexed.
Intelligent key
A relational database which depends wholely on one or more other columns in the same table. An intelligent key might be identified for implementation convenience, where there is no good candidate key
For example, if the three-letter initials of a group of people are known to be unique but only their full names are recorded, a three letter acronym for their names (e.g. John Doe Smith -> JDS) would be an intelligent key.
Intelligent keys are a Bad Thing because it is hard to guarantee uniqueness, and if the value on which an intelligent key depends changes then the key must either stay the same, creating an inconsistency within the containing table, or change, requiring changes to all other tables in which it appears as a foreign key The correct solution is to use a surrogate
Partial key
A key which identifies a subset of a set of information itemsand which could narrow the subset to one item if other partial key(s) were combined with it.
Compound key
(Or "multi-part key", "concatenated key") A key which consists of more than one attribute of the body of information (e.g. database "record ") it identifies.
Alternate key
A candidate key which is not selected as a primary key
Unique key
A key which identifies only one body of information out of several.
Primary key
The candidate key selected as being most important for identifying a body of information (an entity, object or record).
Candidate key
One of several possible attributes or combinations of attributes which can be used to uniquely identify a body of information (a "record ").
Super Key
A Set of attributes that uniquely identify a tuple in a relation is called a super key.
Secondary Keys
Keys other than the candidate keys are called the secondary keys.
Foreign Key
A key column in a table that identifies records in a different tbale is called foreign key.
·Sophisticated users: interact with the DBMS using the DML directly. The query processor translates DML commands into commands to the database manager.
·Specialized users: interact with the DBMS in specialized ways:
·CAD
·Expert systems
·Graphical or audio data
·Temporal data
·Naive users: interact with the database through application programs.
The data definition language (DDL) is the language used to define and modify the conceptual scheme of the database.
·Often used to define/modify sub schemes
·The definition of the conceptual scheme (written in the DDL) is compiled into a file called the data dictionary
·The data dictionary is consulted for scheme information whenever data is read or modified
·A separate language called the data storage and definition language is used to access the physical scheme of the database
Data Manipulation Language (DML):
The language used at the conceptual and view levels to retrieve, insert, delete and modify information stored in the database
Query
A request for information retrieval. Example (in English): List all customers who have an account balance over $500
Query language
The part of the DML used for retrieving information
The terms query language and data manipulation language are often used interchangeably.
Example: SQL is a DML, but is usually called a query language.
DML's are classified by the kind of query language they include:
·Procedural DML's require the user to specify what data is needed and to provide an algorithm for getting the data. The algorithm is written in query language.
Examples: SQL, Quell
·Nonprocedural DML's require only that the user specify what data is needed
Examples: Data log, QBE
Notes:
·Like the distinction between procedural programming languages (C, C++, Ada) and nonprocedural languages (Prolog)
·DDL's manipulate schemes, while DML's manipulate instances