info systems design and development
DESCRIPTION
TRANSCRIPT
![Page 1: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/1.jpg)
National 4/5 Computer Science Information Systems Design
and Development
Faculty of ICT
![Page 2: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/2.jpg)
Computing Laws◦ Computer Misuse Act◦ Copyright Designs and Patents Act
Aims - Systems Lesson 1
![Page 3: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/3.jpg)
Computer Misuse Act This law was created to make it
illegal to: Hack
◦ Gain unauthorised access into a computer system
Spread Viruses◦ Send harmful code to other computers
Phish◦ Pretend to be a company to steal to
password information
Computing Laws
![Page 4: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/4.jpg)
Copyright Designs and Patents Act This law was created to make it illegal to: Make unauthorised copies of music, movies
or software Use multiple copies of software when you
only have 1 license Steal someone’s idea, work etc when it is
under copyright
Computing Laws
![Page 5: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/5.jpg)
Last Lesson Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs and Patents Act
Today’s Lesson Computing Laws
◦ Data Protection Act
Aims - Systems Lesson 2
![Page 6: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/6.jpg)
Computing Laws Data Protection Act
◦This law was created to control the storage of personal information
◦Data Controller The company or person storing the information on the
person
◦The Data must be: Accurate and kept up to date Protected properly with a password Relevant and only stored for the period it is
required Not sell the data on to other companies
![Page 7: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/7.jpg)
Computing Laws The Data User:
◦ The person who makes use of the personal information, for example, the secretary in a doctor’s surgery
The Data Subject◦ The person that the information is about, for
example, the patient in a doctor’s surgery◦ The Data Subject can:
See the information held on them Change any inaccurate information Know why the data is being stored about them
◦
![Page 8: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/8.jpg)
Last Lesson Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs and Patents Act
◦ Data Protection Act
Today’s Lesson Health and Safety
Regulations
Aims - Systems Lesson 3
![Page 9: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/9.jpg)
Health and Safety Regulations
Main Health Problems◦ Back problems◦ RSI = repetitive strain injury◦ Eye strain
The law states that an employer must:◦ Provide adjustable screens, chairs and provide foot
support◦ Make sure lighting is suitable and provide antiglare filters
for monitors◦ Give employees adequate breaks◦ Pay for eye tests◦ Avoid trailing wires◦ Have suitable heating
◦
![Page 10: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/10.jpg)
Last Lesson Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs and Patents Act
◦ Data Protection Act◦ Health and Safety
Regulations
Today’s Lesson Environmental
Impact◦ Carbon footprint
Aims - Systems Lesson 4
![Page 11: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/11.jpg)
Environmental Impact
Carbon Footprint = the amount of C02 you generate◦ When using a computer system you are adding to
carbon emissions◦ Desktop = 110 watts◦ LCD Monitor = 35 watts ◦ You are using electricity generated by fossil fuels
Minimising Carbon Footprint◦ PCs on the markets that use 25 watts◦ Low energy processor chips◦ Automated power shutdown systems for out of hours◦ Laptop usage rather than desktop
15-60 watt rather than 145 watt
![Page 12: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/12.jpg)
Last Lesson Computing Laws
◦ Computer Misuse Act◦ Copyright Designs
and Patents Act◦ Data Protection Act◦ Health and Safety
Regulations Environmental
Impact◦ Carbon footprint
Today’s Lesson Security Risks
◦ Virus◦ Worm◦ Trojan Horse
Aims - Systems Lesson 5
![Page 13: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/13.jpg)
Viruses◦ A piece of code that attaches itself to programs,
makes copies of itself and destroys your system◦ Ways of spreading
Downloaded from a website Opened up from an email attachment Infected backing storage device
◦ Symptoms of a virus Data loss Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason
Security Risks
![Page 14: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/14.jpg)
Worms◦ A program that finds gaps in your security,
creates copies of itself and floods your system with unwanted data
Trojans◦ A program that appears as if it is carrying out a
task, for example, defragmenting your hard disk◦ You download it thinking it is carrying out a
harmless task and it causing hard, for example, deleting files or adding unwanted toolbars
Security Risks
![Page 15: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/15.jpg)
Last Lesson Security Risks
◦ Virus◦ Worm◦ Trojan Horse
Today’s Lesson Security Risks
◦ Keylogging Software◦ Spyware◦ DOS attacks
Aims - Systems Lesson 5
![Page 16: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/16.jpg)
Keylogging software◦ A program that monitors user’s keystrokes and is
often used to steal passwords, credit card numbers etc
Spyware◦ Spyware programs gather information about you
from your computer, for example which websites you visit.
◦ This data can be used to target you with specific marketing
Security Risks
![Page 17: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/17.jpg)
Denial of Service attacks◦ A DOS attack is designed to cause problems on a
network so that legitimate users cannot access resources, for example their online bank account
◦ Resource Starvation = using up network resources, for example processors or disk space on servers so that legitimate users can’t access resources
◦ Bandwidth Consumption = flooding the network with useless traffic, for example flooding an email server with useless data, making it crash
◦ Attacking Routers = corrupt PING attacks that stop Routers from working properly
Security Risks
![Page 18: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/18.jpg)
Last Lesson Security Risks
◦ Virus◦ Worm◦ Trojan Horse◦ Keylogging Software◦ Spyware◦ DOS attacks
Today’s Lesson Securing
Computers◦ Passwords◦ Encryption◦ Biometrics◦ Firewalls◦ Anti virus software
Aims - Systems Lesson 6
![Page 19: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/19.jpg)
Passwords◦ A list of characters that stops people accessing you data◦ Disadvantage
You can forget them Programs have been created that can test billions of different
passwords each second, eventually guessing yours!! Encryption
◦ Putting data into a code before transfer ◦ The hacker cant understand the data without having the
key to decipher the code Biometrics
◦ Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition
Securing Computers
![Page 20: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/20.jpg)
Firewalls◦ A program that checks all data coming in and out
of a network◦ The firewall decides which packets of data are
allowed through to the destination address Anti-virus software
◦ A program that has a database of known viruses◦ The anti virus software compares sections of code
to this database to identify and destroy viruses
Securing Computers
![Page 21: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/21.jpg)
Last Lesson◦ Securing Computers
Passwords Encryption Biometrics Firewalls Anti virus software
Today’s Lesson◦ Securing Computers
Security Protocols Security Suites
Aims - Systems Lesson 6
![Page 22: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/22.jpg)
Security Protocols◦ A rule or agreement set up between the sender and
receiver of data◦ Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) are 2 examples◦ SSL and TLS both use encryption
Security suites◦ Groups of programs used to block threat to your computer
Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters
Securing Computers
![Page 23: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/23.jpg)
Last Lesson◦ Securing Computers
Passwords Encryption Biometrics Firewalls Anti virus software Security Protocols Security Suites
Today’s Lesson◦ Databases
Manual V Electronic storage
What is a Database?
Aims - Systems Lesson 7
![Page 24: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/24.jpg)
Manual/Electronic Systems
=
=
Electronic databases have a number of advantages over a manual database
You can have a backup copy They take up less room Faster to search for records Email information to others
![Page 25: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/25.jpg)
What is a Database
A database is a program used to store data in a structured way
Examples◦ The Police National
Database◦ DVLA◦ Inland Revenue◦ Esporta Health Club
![Page 26: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/26.jpg)
Last Lesson◦ Databases
Manual V Electronic storage
What is a Database?
Today’s Lesson◦ Databases
Files, Records and Fields
Data Types
Aims - Systems Lesson 8
![Page 27: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/27.jpg)
Data File/Record/FieldFIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE FIRSTNAME
RECORD = INFORMATION ON ONE PERSON OR ITEM
DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE
![Page 28: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/28.jpg)
Data/Fields Types
When creating a database you have to choose the data/field type depending on the data that is going to be stored
Examples◦ Text◦ Number◦ Date/Time◦ Currency◦ Yes/No◦ OLE object
![Page 29: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/29.jpg)
Last Lesson◦ Databases
Manual V Electronic storage
What is a Database?
Today’s Lesson◦ Databases
Simple/Complex searching
Aims - Systems Lesson 9
![Page 30: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/30.jpg)
Simple Search
I want to carry out a simple search on the field Favourite Hobby with the criteria Football
![Page 31: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/31.jpg)
Complex Search
I want to carry out a complex search on the field Surname with the criteria “Forbes” and on the field Fav Hobby with the criteria “Football”
![Page 32: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/32.jpg)
Last Lesson◦ Databases
Manual V Electronic storage
What is a Database? Simple/Complex
searching
Today’s Lesson◦ Primary Key◦ Index key
Aims - Systems Lesson 10
![Page 33: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/33.jpg)
Primary Key◦ A primary keys
allows you to make each record unique in a database
◦ Example ID number or Account
number You may have 2 John
Smith records but they would have different ID numbers
Foreign Key◦ Foreign keys allow
you to set up a relationship or link between 2 tables in a database
◦ Example ID may be the primary
key in the customer table and a foreign key in the book ordered table
Keys
![Page 34: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/34.jpg)
Last Lesson◦ Primary Key◦ Index key
Today’s Lesson◦ Computed Fields◦ Validation
Aims - Systems Lesson 11
![Page 35: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/35.jpg)
Computed/Calculated Fields A computed field will carry out a
calculation on another field or fields and give you an answer
![Page 36: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/36.jpg)
Validation
Validation is checking that the correct information has been entered into the database
Presence Check ◦ This checks that data has been entered and the field
has not been left blank Restricted Choice
◦ This presents the user with a choice they pick from Field Length Check
◦ The specifies the number of characters that should be in each field
Field Range Check◦ This specifies that range of numbers that can be stored
e.g. > 0 and < 100
![Page 37: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/37.jpg)
Simple/Complex Sort
I want to carry out a Simple Sort on Surname Ascending
I want to carry out a Complex Sort on Surname Ascending following by Firstname Ascending
![Page 38: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/38.jpg)
Arrangements
![Page 39: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/39.jpg)
Arrangements
![Page 40: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/40.jpg)
Arrangements
![Page 41: Info systems design and development](https://reader035.vdocument.in/reader035/viewer/2022070301/54664aaeaf795969458b4e12/html5/thumbnails/41.jpg)
Arrangements