chapter 10-12 tik xii science. database management

17
Chapter 10-12 TIK XII Science

Upload: alexis-todd

Post on 13-Jan-2016

230 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Chapter 10-12

TIKXII Science

Page 2: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

DATABASE MANAGEMENT

Page 3: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Database, Data, and Information

Database•Collection of data organized in a manner that allows access, retrieval, and use of that data

Data•Collection of unprocessed items•Text•Numbers•Images•Audio•Video

Information•Processed data•Documents•Audio•Images Video

Page 4: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Garbage In, Garbage Out

Page 5: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Database

Page 6: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Old vs New

File processing system

•Each department has its own set of files•Used for many years•Have data redundancy•Isolate data

Database approach

•Programs and users share data•Reduce data redundancy•Improve data integrity•Share data•Allows easier access•Reduces development time•Can be more vulnerable

Page 7: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

DBMS

• Structured Query Language (SQL)• Form• Report Generator• Relational Database• Data Warehouse

Page 8: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

COMPUTER SECURITY AND SAFETY, ETHICS, AND PRIVACY

Page 9: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Network Attacks

Computer Virus

•Affects a computer negatively by altering the way the computer works

Worm•Copies itself repeatedly, using up resources and possibly shutting down the computer or network

Trojan Horse

•A malicious program that hides within or looks like a legitimate program

Rootkit•Program that hides in a computer and allows someone from a remote location to take full control

Page 10: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Terms

• Denial of Service Attack• Back Door• Spoofing• Firewall• Honeypot• Captcha• Digital Forensics• Spam

Page 11: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Software Theft

Steals software media

Intentionally erases

programs

Illegally copies a program

Illegally registers and/or activates

a program

Page 12: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Health Concerns of Computer Use

Page 13: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

Health Concerns of Computer Use

• Computer addiction occurs when the computer consumes someone’s entire social life

• Symptoms of users include:

Craves computer time

Overjoy when at the

computer

Unable to stop computer

activity

Irritable when not at the computer

Page 14: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

INFORMATION SYSTEM DEVELOPMENT

Page 15: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT
Page 16: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT
Page 17: Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT

fin