2023年全國碩士研究生考試考研英語一試題真題(含答案詳解+作文范文)_第1頁
已閱讀1頁,還剩6頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、<p><b>  附錄A</b></p><p>  Data Design </p><p>  DATA TYPES AND VALUE SETS</p><p>  Anyone who has ever programmed a computer is accustomed to the fact that you usua

2、lly have to tell the computer whether the information stored in a particular location is an integer, a real number, a character string, a Boolean va1ue, or whatever. Most computers have one electronic circuit for adding

3、two integers and another for adding two real numbers, and, of course, addition does not make any sense at all, in general, for character strings. Because the pattern of bits in at storage location ca</p><p>

4、<b>  KEYS</b></p><p>  All attributes describe some aspect of an entity. Some attributes perform the additional role of distinguishing one particular entity occurrence from all others of the same

5、 type. For example, if care is taken not to assign any employee number to more than one person, then knowing an individual's employee number should be sufficient to locate all of the other attribute values for that i

6、ndividual. </p><p>  An attribute that can be guaranteed to have a unique value for each entity is called a key.Sometimes there may be more than one attribute of an entity that uniquely identifies each occur

7、rence. For example, if the personnel records include Social Security Numbers (and if it is felt that the controls on issuing duplicate Social Security Numbers are adequate), then either Employee Number or Social Security

8、 Number could be used as the key for identifying employees. Keys are fundamental to virtually </p><p>  DATABASE SCHEMA</p><p>  This is a description of the data which is stored in the database

9、 and specifies what data elements are store and what access paths are provided between these elements. The database schema also contains specifications of privacy as well as integrity constraints. It is somewhat similar

10、to the conceptual schema, but is a description of data rather than of reality. Some aspects of reality which are described by data in the database schema. Note, however, that the database schema does not specify how</

11、p><p>  That part of the database schema which is of interest to a particular end-user or group of end –users is called a database sub-schema. Ideally, a sub-schema should be specified using a notation which is

12、 most appropriate for the use to which it is being put. Database sub-schemas have several use : </p><p>  (1) they can be referred to by application programmers to see what access paths are available in that

13、 part of the database in which they are interested</p><p>  (2) similarly, they can be referred to by the end-users when they are using a report program generator or formulating queries etc. using a query la

14、nguage provided.</p><p>  (3) they can be used to divide the database into units for the specification of privacy constrains. For example, a sub-schema could be defined for which all users have read access b

15、ut only one specified user has write (update) access.</p><p>  PHYSICAL SCHEMA</p><p>  The physical schema is a description of the physical structure of the database. If, for example, conventio

16、nal indexed-sequential files are used to store the database, then this will be stated in the physical schema. It will also contain details of record formats, blocking factors etc. The physical schema is constructed as an

17、 essential part of the design process. However, it may also be used as an integeral part of he operational database system as discussed below. The physical schema is sometime</p><p>  PHYSICAL STORAGE STRUCT

18、URE</p><p>  The structure in which the database actually resides is termed the physical storage structure. It typically consists of disc files, tapes, mainstore, indices and programs to manipulate these com

19、ponents.</p><p>  BACK-UP AND RECOVERY SYSTEM</p><p>  The back-up and recovery system is the module which rebuilds the database after corruption due to hardware or software failure.</p>

20、<p>  Understanding the Application Tasks</p><p>  One of the often-neglected steps on building software is really understanding the end user’s job-the that computer automation is intended to support.&l

21、t;/p><p>  Occasionally, this is because the application itself is quite specialized; more often, it is because the approach to design tends to be data-oriented. Frequently, these are the major question asked i

22、n the analysis:</p><p>  (1) What data should be captured</p><p>  (2) How should the data be processed</p><p>  (3) How should the data be reported</p><p>  These ques

23、tion expand into a series of sub question ,and include issues such as input forms, Codes, screen layouts, computations, postings, corrections, audit trails, retention, storage volumes, processing cycles, report formattin

24、g, distribution, and maintenance. there are all vitally important areas. One difficulty, however, is that they all focus solely on data. </p><p>  People use data, but they do tasks. One might argue t

25、hat while this may be true of professional workers. Key-entry clerks really only transfer data from an input form to a keyboard; their tasks are very data-oriented. This is a fair portrayal of their jobs today, but is th

26、is a consequence of the real job that need to get done, or is it a symptom of the computer application? Using humans as input devices, particularly for data that is voluminous, consistent in format (as on forms), and in

27、a limit</p><p>  This may sound like so much philosophy, but it has practical import in the way application design is done. People use data, but they do tasks. And they don’t do tasks through o completion on

28、e at a time. They do several tasks that are subset of or in intersection with each other, and they so them all at once, in parallel.</p><p>  When designers allow this idea to direct the analysis and creatio

29、n of an Application, rather than focusing on the data orientation that has been historically dominant, the very nature of the effort changes significantly. Why have windowing environments been so successful.Because they

30、allow a user to shut down and exit one in order to begin another. The windowing environment comes closer to mapping the way people really think and work than the old one thing at a time approach ever did. This lesso</

31、p><p>  Understanding the application tasks means going far beyond identifying the data elements, normalizing them, and creating screens, processing programs, and reports. It means really understanding what the

32、 users do and what their tasks are, and designing the application to be responsive to those tasks, not just to capture the data, associated with them. In fact, when the orientation is toward the data, the resulting desig

33、n will inevitably distort the user’s tasks rather than support them.</p><p>  How do you design an application that is responsive to tasks rather than data.The biggest hurdle is simply understanding that foc

34、using on tasks is necessary. This allows you to approach the analysis of the business from a fresh perspective.</p><p><b>  附錄B</b></p><p><b>  數(shù)據(jù)設(shè)計(jì)</b></p><p&

35、gt;<b>  數(shù)據(jù)類型和值域</b></p><p>  任何一個曾經(jīng)編過程的人都習(xí)慣了這樣一個事實(shí):你不得不告訴計(jì)算機(jī)信息是一個整數(shù),實(shí)數(shù),字符串,布爾值或其它的值。大多數(shù)計(jì)算機(jī)由一個整數(shù)加法電路,又有一個實(shí)數(shù)加法電路,而且,通常字符串相加當(dāng)然沒有任何意義。因?yàn)樵趦?nèi)存中的比特資料可以被解釋成任何一種形式,計(jì)算機(jī)必須被告訴去做什么。這就是我們熟知的類型。定義資料對象為一個特定的類型對事物

36、內(nèi)部代表的定義有影響。舉例來說,在大多數(shù)現(xiàn)代計(jì)算機(jī)框架內(nèi)部整數(shù)表示為32位比特?cái)?shù)的形式。在外部,整數(shù)表現(xiàn)為從0到9的數(shù)字符串的形式,可能帶有負(fù)號。當(dāng)一個資料對象被定義為整數(shù)類型時,所有標(biāo)準(zhǔn)的算術(shù)和邏輯運(yùn)算都要做合適的解釋。在定義一個數(shù)據(jù)類型為整形時,定義它的整理系統(tǒng)的事件也同樣如此(可能不是如此明顯)。那就是說,要定義相對復(fù)雜的操作,如排序,是如何進(jìn)行的。內(nèi)部表示和外部表示的轉(zhuǎn)換算法也是必須的。</p><p>

37、<b>  關(guān)鍵詞</b></p><p>  所有的屬性都描述實(shí)體的某一方面。一些屬性扮演附加的角色:從所有其它同一類型的實(shí)體事例中區(qū)分某一特定實(shí)例。舉個例子,如果我們注意不用一個雇員后標(biāo)記一個以上的雇員,我們可知一個雇員的雇員號足以固定雇員的其它屬性值。能確保每個實(shí)體都有唯一值的屬性叫做關(guān)鍵詞。</p><p>  有時可能不只一個屬性唯一的確定每個實(shí)體。舉個例子

38、,如果人事紀(jì)錄包含社會安全號(而且認(rèn)為足以控制社會安全號的重復(fù)),那幺雇員號和社會安全號都可作為確定雇員的關(guān)鍵詞。關(guān)鍵詞在計(jì)算機(jī)系統(tǒng)中管理資料的所有物理有效方法中是最基本的。當(dāng)有多余一個的可用關(guān)鍵詞時,可供選者的為候選關(guān)鍵詞。通常,我們選出一個作為主關(guān)鍵詞,并決定紀(jì)錄的位置。其它便于檢索的候選關(guān)鍵詞被稱為副關(guān)鍵詞。</p><p><b>  數(shù)據(jù)庫模式</b></p><

39、;p>  用于描述存儲數(shù)據(jù)庫中的數(shù)據(jù)和明確記載數(shù)據(jù)中的數(shù)據(jù)包括什么元素,即這些元素通過怎樣的訪問路徑被訪問。它也包含了安全設(shè)置出完整限制之外,與概念模式由幾分相似。但對數(shù)據(jù)的描述將更加真實(shí),一些真實(shí)反映由數(shù)據(jù)庫中的數(shù)據(jù)所描述,筆記上,并不能明確記載數(shù)據(jù)庫中的數(shù)據(jù)是如何被存儲及訪問路徑如何被提供。(理想的它是不會參考文件、記錄、設(shè)置或其他同類的東西)它是,因此獨(dú)立描述及為這結(jié)論作為邏輯模式作為參考。</p><p

40、>  最終用戶或最終用戶組對數(shù)據(jù)庫中的某部分模式特別感興趣被稱為數(shù)據(jù)庫代替-模式,理想的,代替-模式將利用字符明確記載數(shù)據(jù)存放位置與最適合的位置,數(shù)據(jù)庫代替-模式有以下幾種功能:</p><p>  (1)它們能利用應(yīng)用程序,使它們所感興趣的內(nèi)容被訪問的路徑可見。</p><p> ?。?)同樣的,它們可以在最終用戶的使用報(bào)告程序發(fā)電機(jī)和使用一種查詢語言等等被體現(xiàn)。</p>

41、;<p> ?。?)它們能被用于劃分?jǐn)?shù)據(jù)單位為按去勸秘密的說明書。例如,代替模式中規(guī)定,每類級別上的用戶可進(jìn)行那些操作,并不僅指定少數(shù)用戶有修改更新的權(quán)利。</p><p><b>  物理模式</b></p><p>  物理模式是以物理的結(jié)構(gòu)描述數(shù)據(jù)庫,如果,例如傳統(tǒng)的編入索引的-順序的文件存于數(shù)據(jù)庫中,它將在物理模式中進(jìn)行說明。它將包含詳細(xì)的有按可

42、查格式、塊因素等等物理的模式,這部分構(gòu)造作為設(shè)計(jì)所必須的部分進(jìn)行處理。它也可使用作為完整的部分,它進(jìn)行操作的部分在以后進(jìn)行說明。物理的模式有時成內(nèi)部模式。</p><p><b>  物理的存儲結(jié)構(gòu)</b></p><p>  數(shù)據(jù)庫中的結(jié)構(gòu)以被事先在物理結(jié)構(gòu)中定義了存儲結(jié)構(gòu),它包含幾個典型組件:盤文件,幫起文件,組存儲文件,索引文件及程序操縱等。</p>

43、<p><b>  支援和恢復(fù)系統(tǒng)</b></p><p>  支援和恢復(fù)系統(tǒng)是指在軟件和硬件發(fā)生故障時重建數(shù)據(jù)庫系統(tǒng)。</p><p><b>  理解應(yīng)用任務(wù)</b></p><p>  在建造軟件方面經(jīng)常忽略的步驟之一就是真正理解終端用戶的任務(wù)-計(jì)算機(jī)自動化準(zhǔn)備去支持的任務(wù)。</p>&l

44、t;p>  偶爾,這是由于應(yīng)用本身是專門的;更經(jīng)常,它是由于傾向于面向數(shù)據(jù)的設(shè)計(jì)方法。經(jīng)常地,這些是在分析中主要的問題:</p><p> ?。?)什么數(shù)據(jù)應(yīng)該被獲取</p><p> ?。?)數(shù)據(jù)怎樣被處理</p><p> ?。?)數(shù)據(jù)怎樣被匯報(bào)</p><p>  這些問題擴(kuò)展成一系列子問題,并且包括諸如輸入報(bào)表,代碼,屏幕布局,

45、計(jì)算,存儲容量,處理循環(huán),報(bào)表格式化,分布和維護(hù)。這些是所有極其重要的部分。然而一個困難是,他們都單獨(dú)集中于數(shù)據(jù)。</p><p>  人們使用數(shù)據(jù),但他們做任務(wù)。一個可能的爭論是這或許是專業(yè)的工作人員,有權(quán)利的人員僅僅將數(shù)據(jù)從輸入報(bào)表轉(zhuǎn)移到鍵盤;他們的任務(wù)是非常面向數(shù)據(jù)的。這是今天這些工作的一個清楚地描繪。但這是一個真正要去做的工作的結(jié)果,還是計(jì)算機(jī)應(yīng)用設(shè)計(jì)的征兆,使用人類作為輸入設(shè)備,特別是大容量的,格式一致

46、的(如報(bào)表),并在一個有限可變形范圍內(nèi)的數(shù)據(jù),是昂貴和廢棄的,更別說失去人性,獲取數(shù)據(jù)的方法。</p><p>  這或許聽起來像哲學(xué),但它實(shí)際上以應(yīng)用設(shè)計(jì)方式輸入。人們使用數(shù)據(jù),并且他們不通過一次完成來做任務(wù)。他們互相做好幾項(xiàng)任務(wù)的子集或交集,并且他們并行第一次做完。</p><p>  設(shè)計(jì)者允許此觀念指導(dǎo)一項(xiàng)應(yīng)用的分析和創(chuàng)造,而不是集中于很多年獨(dú)領(lǐng)風(fēng)騷的面向數(shù)據(jù),就是這種努力的本性有

47、了驚人的改變。為什么Windows環(huán)境如此成功,因?yàn)樗麄冊试S用戶在小的任務(wù)間迅速切換,使它們都存在而不必關(guān)閉并退出一個來開始另一個。Windows環(huán)境更近地映射人們真正的思維和工作方式而不是老一套的“一次做一件事”的方法。這一課不應(yīng)被丟掉,他應(yīng)被建立。</p><p>  理解應(yīng)用任務(wù)意味著遠(yuǎn)遠(yuǎn)高于識別數(shù)據(jù)元素,使之標(biāo)準(zhǔn)化,創(chuàng)建屏幕,處理數(shù)據(jù),并且匯報(bào)。他意味著真正理解用戶做什么并且他們的任務(wù)是什么,并設(shè)計(jì)響應(yīng)這

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論