HRM151 - Tou052 Sas Day16
HRM151 - Tou052 Sas Day16
Productivity Tip:
Excellence is the unlimited ability to improve the quality of what you have to offer. - Rick Pitino
A. LESSON PREVIEW/REVIEW
1) Introduction (2 mins)
Database Basics
B. MAIN LESSON
1) Activity 2: Content Notes (13 mins)
What is Database?
Today, hospitality organizations take advantage of the structural benefits provided by databases. A database is an
organized, centralized collection of data serving applications. Databases are a key element of most mission-critical
applications and represent the most common type of back-end software in client/server (C/S) systems. A property’s
databases store data on such things as its transactions, products, employees, guests and assets. Such databases must be
efficiently organized and easy to access. They must also provide data integrity and ensure the reliability of stored data.
Database Basics
From check-in, to food purchasing, to targeting customers, effective and efficient management of large quantities
of data requires a database. You might keep a folder or notebook with different pages containing information. These
papers have no apparent structure potentially linking them. When looking for specifics, you must go through each piece
and extract it. In other words, they stand alone.
Flat file databases are usually text files that have no structured interrelationship. This type database are paper
records or non-interrelated computer systems. Thus it encounters difficulties with management.
For example:
A foreign key is a key used to link two tables together. This is sometimes called a referencing key. Primary key
field from one table and insert it into the other table where it becomes a foreign key i.e. Foreign Key is a column or a
combination of columns whose values match a Primary Key in a different table.
The relationship between 2 tables matches the Primary Key in one of the
A Database Management System (DBMS) is that software that manages and controls access to the database. It
is a software system that enables users to define, create, maintain, and control access to the database.
The Data Definition Language (DDL) allows users to specify the data types and structures and the constraints on
the data to be stored in the database.
The Data Manipulation Language (DML) allows users to insert, update, delete, and retrieve data from the database.
Structured Query Language (SQL) is the most common query language, alleviates the problems with file-based
systems where the user has to work with a fixed set of queries or there is a proliferation of programs, giving major
software management problems. SQL is now both the formal and de facto standard language for relational DBMSs.
a , which restores the database to a previous consistent state following a hardware or software failure;
1. Oracle
3. MySQL
4. Microsoft Access
5. OpenOffice.org Base
6. PostgreSQL
Course Code: HRM 174
Course Code: HRM 151/TOU052
Course Title: Applied Business
Tools and Technologies
SAS - Module # 16
Name: _____________________________________________________________ Class number: _______
Section: ____________ Schedule: ______________________________________ Date: _______________
File Locks - File locking is a mechanism that restricts access to a computer file One-to-Many Relationship
by allowing only one user or process access at any specific time. Systems Referential Integrity
implement locking to prevent the classic interceding update scenario. File
locking prevents this problem by enforcing the serialization of update processes Form
to any given file.
Query
Report
Storage
Macro and Modules
Database Server - Single computer that runs the database application and in
most cases also store the database information Web (Pages)
Objectives of Database
Profile - is created when companies invest with large amounts of data that could lead to future profit and make use of marketing
initiatives to help target data for a sales campaign.
Data Mining - is analysis of data for potential relationships. Most data mining is statistical and can involve model formation as
follows: Profiling, Clustering, and Cluster Mapping. Clustering and cluster mapping involve the plotting and mapping of data with like
attributes. Analytics also include predictive analytics, which looks at your data to predict future events, and social media analytics,
which looks at social media for behavioral analysis.
Online Analytical Processing (OLAP) - is a computing method that enables users to easily and selectively extract and query data in
order to analyze it from different points of view. OLAP business intelligence queries often aid in trends analysis, financial reporting,
sales forecasting, budgeting and other planning purposes.
Pre-Emptive Measures: Trigger - A trigger in database terms is something that sets off another event. E.g. an email would be sent to
the sales manager stating that the customer is a loyal customer whose time between stay has lapsed and should be contacted.
Customer Relationship Management (CRM) is defined as “ a comprehensive proves in which a company fundamentally
improves the quality of interaction with its customers and prospects through the use of relevant, timely, and actionable information
resulting in improved profitability.” (Carlson Marketing Group 2001).
o Access must be given to this data when and where appropriate. Brand Loyalty No Loyalty
CRM in Sales
One of the most popular CRM solutions - customization is needed for many types of guests and is quickly becoming a
“must do” for properties wishing to stay competitive. Cloud based – scalable and reduce the total cost of
ownership.Instantly deploying without a long period of designing the application.
Course Code: HRM 174
Course Code: HRM 151/TOU052
Course Title: Applied Business
Tools and Technologies
SAS - Module # 16
Name: _____________________________________________________________ Class number: _______
Section: ____________ Schedule: ______________________________________ Date: _______________
1. It is a field in a table which uniquely identifies the each row/record in a database table.
2. It is the process of taking data and manipulating it in a method to be easier read or organized.
5. A term used to describe when data or computer files are kept clean and reliable.
6. It is a mechanism that restricts access to a computer file by allowing only one user or process
access at any specific time.
8. It is created when companies invest with large amounts of data that could lead to future profit and
make use of marketing initiatives to help target data for a sales campaign.
9. Single computer that runs the database application and in most cases also stores the database
information.
10. It is a computing method that enables users to easily and selectively extract and query data in
order to analyze it from different points of view.
C. LESSON WRAP-UP
1) Activity 6: Thinking about Learning (5 mins)
Congratulations for finishing this module! Shade the number of the module that you finished.
My Work Tracker: You are done with the session! Let’s track your progress:
P1 P2 P3
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Did you have challenges learning the concepts in this module? If none, which parts of the module helped you learn the
concepts?__________________________________________________________________________________________
__________________________________________________________________________________________________
Some question/s I want to ask my teacher about this module is/are: ____________________________________________
__________________________________________________________________________________________________
FAQs
A Primary Key uniquely identifies a record in the relational database table, thus it is important to tables because
it contains unique values.
The database has a unique property of storing data. All its transactions, products, employees, guests, and assets is
efficiently organized and easy to access that ensures reliability of the stored data.
Course Code: HRM 174
Course Code: HRM 151/TOU052
Course Title: Applied Business
Tools and Technologies
SAS - Module # 16
Name: _____________________________________________________________ Class number: _______
Section: ____________ Schedule: ______________________________________ Date: _______________
KEY TO CORRECTIONS
Exercise 1. Analyze and identify the correct answer to the following questions.
5. A term used to describe when data or computer files are kept clean and reliable.
DATA INTEGRITY
6. It is a mechanism that restricts access to a computer file by allowing only one user
or process access at any specific time. FILE LOCKS/FILE LOCKING
8. It is created when companies invest with large amounts of data that could lead to
future profit and make use of marketing initiatives to help target data for a sales
campaign. PROFILE
9. Single computer that runs the database application and in most cases also store the
database information. DATABASE SERVER
10. It is a computing method that enables users to easily and selectively extract and
query data in order to analyze it from different points of view.
ONLINE ANALYTICAL PROCESSING (OLAP)