chapter 10-12 tik xii science. database management
TRANSCRIPT
Chapter 10-12
TIKXII Science
DATABASE MANAGEMENT
Database, Data, and Information
Database•Collection of data organized in a manner that allows access, retrieval, and use of that data
Data•Collection of unprocessed items•Text•Numbers•Images•Audio•Video
Information•Processed data•Documents•Audio•Images Video
Garbage In, Garbage Out
Database
Old vs New
File processing system
•Each department has its own set of files•Used for many years•Have data redundancy•Isolate data
Database approach
•Programs and users share data•Reduce data redundancy•Improve data integrity•Share data•Allows easier access•Reduces development time•Can be more vulnerable
DBMS
• Structured Query Language (SQL)• Form• Report Generator• Relational Database• Data Warehouse
COMPUTER SECURITY AND SAFETY, ETHICS, AND PRIVACY
Network Attacks
Computer Virus
•Affects a computer negatively by altering the way the computer works
Worm•Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Trojan Horse
•A malicious program that hides within or looks like a legitimate program
Rootkit•Program that hides in a computer and allows someone from a remote location to take full control
Terms
• Denial of Service Attack• Back Door• Spoofing• Firewall• Honeypot• Captcha• Digital Forensics• Spam
Software Theft
Steals software media
Intentionally erases
programs
Illegally copies a program
Illegally registers and/or activates
a program
Health Concerns of Computer Use
Health Concerns of Computer Use
• Computer addiction occurs when the computer consumes someone’s entire social life
• Symptoms of users include:
Craves computer time
Overjoy when at the
computer
Unable to stop computer
activity
Irritable when not at the computer
INFORMATION SYSTEM DEVELOPMENT
fin