Page | 1
Module 9 DATABASE MANAGEMENT
Databases, Data, and Information
Database - Collection of data organized in a manner
that allows access, retrieval, and use of that data
Data - Collection of unprocessed items
• Text
• Numbers
• Images
• Audio
• Video
Information
• Processed data
o Organized
o Meaningful
o Useful
Page | 2
Data integrity identifies the quality of the data
• Garbage in, garbage out (GIGO) points out the
accuracy of a computer’s output depends on the
accuracy of the input
The Hierarchy of Data
Character - is one byte
• Numbers, letters, spaces, punctuation marks, or
other symbols
Field is a combination of one or more related
characters
• Field name
• Field size
• Data type
Record is a group of related fields
• A primary key uniquely identifies each record
Data file is a collection of related records
File maintenance refers to the procedures that keep
data current.
• Adding Records
• Modifying records
• Deleting records
Maintaining Data - Users add new records to a file
when they obtain new data.
Page | 3
Validation compares data with a set of rules or values
to find out if the data is correct
File Processing Versus Databases
File processing system
• Each department has its own set of files
• Used for many years
• Have data redundancy
• Isolate data
Database approach
• Programs and users share data
• Reduce data redundancy
• Improve data integrity
• Share data
• Allows easier access
• Reduces development time
• Can be more vulnerable
Database Managem ent Systems
Data dictionary - contains data about each file in the
database and each field in those files.
DBMS provides several tools that allow users and
programs to retrieve and maintain data in the
database;
• Query language - consists of simple, English-
like statements that allow users to specify the
data to display, print, or store
Page | 4
• Query by example (QBE) - provides a GUI to
assist users with retrieving data
• Form - a window on the screen that provides
areas for entering or modifying data in a
database
• Report generator - allows users to design a
report on the screen, retrieve data into the
report design, and then display or print the
report.
DBMS provides means to ensure that only authorized
users access data at permitted times.
Data model consists of rules and standards that
define how the database organizes data
Relational database stores data in tables that
consist of rows and columns
- ○ Each row has a primary key
- ○ Each column has a unique name
Relationship is a link within the data
Structured Query Language (SQL) is a query
language that allows users to manage, update, and
retrieve data.
Object-oriented database (OODB) stores data in
objects
Page | 5
Object-oriented databases often use Object Query
Language (OQL) to manipulate and retrieve data.
Multidimensional database can store data in more
than two dimensions of data
• Can consolidate data much faster than a
relational database
Data warehouse is a huge database that stores and
manages the data required to analyze historical and
current transactions
Database Administration
Database Analyst (DA) Decides on proper field
placement, defines data relationships, and identifies
users’ access privileges.
Database Administrator (DBA) Creates and
maintains the data dictionary, manages security,
monitors performance, and checks backup and
recovery procedures.
MODULE 10 Computer Security and
Safety, Ethics, and Privacy
Computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information, or processing
capability.
Page | 6
Cybercrime is an online or Internet-based illegal act.
• Hacker • Unethical
• Crackers Employees
• Script Kiddies • Cyber
• Corporate Spies extortionists
• Cyber Terrorists
Internet and Network Attacks
Computer Virus – negatively affects computers by
altering the way the computer works
Worm - Copies itself repeatedly, using up resources
and possibly shutting down the computer or network.
Trojan Horse - A malicious program that hides within
or looks like a legitimate program
Rootkit - Program that hides in a computer and allows
someone
from a remote location to take full control.
Botnet - is a group of compromised computers
connected to a network
• A compromised computer is known as a zombie
Denial of service attack (DoS attack) - disrupts
computer access to Internet services.
Back door - is a program or set of instructions in a
program that allow users to bypass security controls.
Page | 7
Spoofing - is a technique intruders use to make their
network or Internet transmission appear legitimate
Firewall is hardware and/or software that protects a
network’s resources from intrusion.
Intrusion detection software
• Analyzes all network traffic
• Assesses system vulnerabilities
• Identifies any unauthorized intrusions
• Notifies network administrators of suspicious
behavior patterns or security breaches
Unauthorized access is the use of a computer or
network without permission.
Unauthorized use is the use of a computer or its
data for unapproved or possibly illegal activities
Access controls define who can access a computer,
when they can access it, and what actions they can
take.
o Two-phase processes called identification and
authentication
o User name
o Password
o CAPTCHA
Possessed object is any item that you must carry to
Page | 8
gain access to a computer or computer facility
– Often are used in combination with a personal
identification number (PIN).
Biometric device authenticates a person’s identity
by translating a personal characteristic into a digital
code that is compared with a digital code in a
computer.
Digital forensics is the discovery, collection, and
analysis of evidence found on computers and
networks.
• Many areas use digital forensics
o Law enforcement
o Criminal prosecutors
o Military Intelligence
Hardware Theft and Vandalism
Hardware theft is the act of stealing computer
equipment.
Hardware vandalism is the act of defacing or
destroying computer equipment.
Software Theft occurs when someone
• Steals software media
• Intentionally erases programs
Information theft occurs when someone steals
personal or confidential information
Page | 9
Encryption is a process of converting readable data
into unreadable characters to prevent unauthorized
access.
Digital signature is an encrypted code that a person,
Web site, or organization attaches to an electronic
message to verify the identity of the sender.
Digital certificate is a notice that guarantees a user
or a Web site is legitimate
• Issued by a certificate authority.
System failure is the prolonged malfunction of a
computer
• A variety of factors can lead to system failure
including:
– Aging hardware
– Natural disasters
– Electrical power problems
– Errors in computer programs
Two ways to protect from system failures;
• Surge protectors and
• Uninterruptable power supplies (UPS)
Backing Up – The Ultimate Safeguard
Backup is a duplicate of a file, program, or disk that
can be used if the original is lost, damaged, or
destroyed
P a g e | 10
• To back up a file means to make a copy of it.
Wireless Security
War driving allows individuals to detect wireless
networks while driving a vehicle through the area.
Health Concerns of Computer Use
Ergonomics is an applied science devoted to
incorporating comfort, efficiency, and safety into the
design of items in the workplace
Computer addiction occurs when the computer
consumes someone’s entire social life
Ethics and Society
Computer ethics are the moral guidelines that govern
the use of computers and information systems
P a g e | 11
Intellectual property rights are the rights to which
creators are entitled for their work.
• copyright protects any tangible form of
expression.
Digital rights management is a strategy designed
to prevent illegal distribution of movies, music, and
other digital content.
Green computing involves reducing the electricity
and environmental waste while using a computer.
– ENERGY STAR program
Information privacy refers to the right of individuals
and companies to deny or restrict the collection and
use of information about them.
Cookie is a small text file that a Web server stores on
your computer
• Web sites use cookies for a variety of reasons:
Allow for personalization
Store users’ passwords
Assist with Online shopping
Track how
often users visit a site
Spam is an unsolicited e-mail message or newsgroup
posting
E-mail filtering blocks e-mail messages from
designated sources
P a g e | 12
Anti-spam programs attempt to remove spam
before it reaches your inbox.
Phishing is a scam in which a perpetrator sends an
official looking e-mail message that attempts to obtain
your personal and financial information.
Pharming is a scam where a perpetrator attempts to
obtain your personal and financial information via
spoofing.
Content filtering is the process of restricting access
to certain material on the Web
• Many businesses use content filtering
Web filtering software restricts access to specified
Web sites
MODULE 11 Information System Development and
Programming Language
System development is a set of activities used to
build an information system.
System development should follow three general
guidelines:
• Group activities or tasks into phases
• Involve users
• Define standards
P a g e | 13
Project management is the process of planning,
scheduling, and then controlling the activities during
system development.
Gantt chart;
A popular tool
used to plan and
schedule the
time
relationships
among project
activities.
PERT chart;
also can be used
for planning and
scheduling time.
Feasibility is a measure of how suitable the
development of a system will be to the organization.
Documentation is the collection and summarization
of data and information.
P a g e | 14
Planning phase for a project begins when the
steering committee receives a project request.
System proposal assesses the feasibility of each
alternative solution.
P a g e | 15
Systems analysts typically develop two types of
designs for each input and output
Prototype (proof of concept) is a working model of the
proposed system
• Prototypes have inadequate or missing
documentation
• Users tend to embrace the prototype as a final
system
• Should not eliminate or replace activities
Computer-aided software engineering (CASE)
tools are designed to support one or more activities of
system development.
P a g e | 16
The purpose of the implementation phase is to
construct the new or modified system and then deliver
it
Training
involves showing users exactly how they will use the
new hardware and software in the system
– One-on-one sessions
– Classroom-style lectures
– Web-based training
One or more of four conversion strategies can beused
to change from the old system to the new system
– Direct conversion
– Parallel conversion
– Phased conversion
– Pilot conversion
purpose of the operation, support, and security phase
is to provide ongoing assistance for an information
system and its users after the system is implemented
P a g e | 17
Programming Languages and Program
Development Tools
Computer program is a series of instructions that
directs a computer to perform tasks
– Created by a programmer using a
programming language.
Machine language is the first generation of
programming languages
• Only language the computer directly recognizes
Assembly language is the second generation of
programming languages.
Source program contains the code to be converted
to machine language.
Procedural language, the programmer writes that
tell the computer what to accomplish and how to do it
– Third-generation language (3GL)
P a g e | 18
The C programming language is used to write many of
today’s programs.
COBOL (COmmon Business-Oriented Language)
is designed for business applications, but easy to read
because of the English-like statements.
Object-oriented programming (OOP) language
allows programmers the ability to reuse and modify
existing objects.
Java is an object-oriented programming language
developed by Sun Microsystems
• The Just-in-time (JIT) compiler to convert the
bytecode into machine-dependent code.
Microsoft .NET Framework allows almost any type of
program to run on the Internet or an internal business
network, as well as computers and mobile devices.
C++ is an extension of the C programming language
– Additional features for working with objects,
classes, events, and other object-oriented
concepts
C# is based on C++ and was developed by Microsoft
C# combines the benefits of an object-oriented
language with the benefits of a functional language
P a g e | 19
Visual programming language is a language that
uses a visual or graphical interface for creating all
source code.
Borland’s Delphi is a powerful program development
tool that is ideal for building large-scale enterprise and
Web applications in a RAD environment
PowerBuilder is a powerful program development
RAD tool.
4GL (fourth-generation language) is a nonprocedural
language that enables users and programmers to
access data in a database
– One popular 4GL is SQL
Application generator is a program that creates
source code or machine code from a specification of
the required functionality.
Macro is a series of statements that instructs an
application how to complete a task.
HTML is a special formatting language that
programmers use to format documents for display on
the Web
XHTML is a markup language that allows Web sites to
be displayed more easily on mobile devices
XML allows Web developers to create customized tags
and use predefined tags to display content
appropriately on various devices
– WML is a subset of XML and is used to design
pages for microbrowsers
P a g e | 20
Two applications of XML are RSS 2.0 and ATOM
Dynamic HTML (DHTML) allows Web developers to
include more graphical interest and interactivity
Ruby on Rails (RoR) provides technologies for
developing object-oriented, database-driven Web sites.
Most Web 2.0 sites use APIs
– An API enables programmers to interact with an
environment such as a Web site or operating system.
Web page authoring software can create
sophisticated Web pages that include images, video,
audio, animation, and other effects.
Multimedia authoring software allows
programmers to combine text, graphics, animation,
audio, and video in an interactive presentation.
Program development consists of a series of steps
programmers use to build computer programs.
The sequence control structure shows one or more
actions following each other in order.
P a g e | 21
Selection control structure tells the program which
action to take, based on a certain condition
– If-then-else
– Case
Repetition control structure enables a program to
perform one or more actions repeatedly as long as a
certain condition is met.
P a g e | 22
MODULE 12 Enterprise Computing
Enterprise computing involves the use of computers
in networks, such as LANs and WANs, or a series of
interconnected networks that encompass a variety of
different operating systems, protocols, and network
architectures.
Enterprise information is the information gathered in
the ongoing operations of an enterprise-sized
organization
– Business intelligence
– Business process management
– Business process automation
Managers coordinate resources by performing four
activities.
• Planning
• Controlling
• Organizing
P a g e | 23
• Leading
Information system is a set of hardware, software,
data, people, and procedures that work together to
produce information.
Human resource information system (HRIS)
manages one or more human resources functions.
Computer-aided design (CAD) uses a computer and
special software to aid in engineering, drafting, and
design
Computer-aided engineering (CAE) uses
computers to test product designs
Computer-aided manufacturing (CAM) is the use
of computers to control production equipment.
Computer-integrated manufacturing (CIM) uses
computers to integrate the many different operations
of the manufacturing process
Material Requirements Planning (MRP) uses
software to help monitor and control processes related
to production.
Sales force automation (SFA) software equips
traveling salespeople with the electronic tools they
need to be more productive
Customer interaction management (CIM) software
manages the day-to-day interactions with customers.
Chief information officer (CIO) is an executive
position that oversees the IT department.
P a g e | 24
Portal is a collection of links, content, and services
presented on a Web page that are interesting for a
particular job function.
Data warehouse is a huge database that stores and
manages the data required to analyze historical and
current transactions.
EDI is a set of standards that controls the transfer of
business data and information among computers
P a g e | 25
within and among enterprises.
Extranet is the portion of a company’s network that
allows customers or suppliers of a company to access
parts of an enterprise’s intranet.
Web services allow businesses to create products
and B2B interactions. over the Internet.
Workflow is a defined process that identifies the
specific set of steps involved in completing a particular
project or business process
– Workflow application
Virtual private network (VPN) provides mobile
users, vendors, and customers with a secure
connection to the company network server.
Virtualization is the practice of sharing or pooling
computing resources;
Server virtualization - Provides the capability to
divide a physical server logically into many virtual
servers.
Storage virtualization - Provides the capability to
create a single logical storage device from many
physical storage devices.
Cloud computing is an Internet service that provides
computing needs to computing users
Grid computing combines many servers and/or
personal computers on a network to act as one large
computer.
P a g e | 26
ENTERPRISE HARDWARE
Enterprise hardware allows large organizations to
manage and store information and data using devices
geared for:
– Heavy use
– Maximum availability
– Maximum efficiency
RAID duplicates data and implements duplication in
different ways.
P a g e | 27
Network attached storage (NAS) is a server that
provides storage to users and information systems
attached to the network
Storage area network (SAN) is a high-speed
network that provides storage to other servers to
which it is attached.
Enterprise storage system is a strategy that
focuses on the availability, protection, organization,
and backup of storage in a company
• Goal is to consolidate storage.
P a g e | 28
Blade server packs a complete computer server on a
single card (called a blade) rather than a system unit.
The individual blades
insert in a blade server
chassis
High-availability system continues running and
performing tasks for at least 99 percent of the time.
May include hot-swapping and redundant
components
• When a component fails, another
component takes over and the system
continues to function.
P a g e | 29
Scalability is a measure of how well co
mputer hardware, software, or an information system
can grow to meet increasing performance demands.
Interoperability is the ability for an information
system to share information with other information
systems within an enterprise.
disaster recovery plan is a written plan describing
the steps a company would take to restore computer
operations in the event of a disaster.