0% found this document useful (0 votes)
36 views29 pages

It Funda Reviewer Finals

The document covers various aspects of database management, including definitions of databases, data integrity, and the hierarchy of data. It also discusses computer security risks, types of cybercrime, and methods for protecting information systems. Additionally, it addresses programming languages, system development, and enterprise computing, emphasizing the importance of effective management and security in information systems.

Uploaded by

carlmalan23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views29 pages

It Funda Reviewer Finals

The document covers various aspects of database management, including definitions of databases, data integrity, and the hierarchy of data. It also discusses computer security risks, types of cybercrime, and methods for protecting information systems. Additionally, it addresses programming languages, system development, and enterprise computing, emphasizing the importance of effective management and security in information systems.

Uploaded by

carlmalan23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Page | 1

Module 9 DATABASE MANAGEMENT


Databases, Data, and Information

Database - Collection of data organized in a manner


that allows access, retrieval, and use of that data

Data - Collection of unprocessed items

• Text
• Numbers
• Images
• Audio
• Video

Information

• Processed data
o Organized
o Meaningful
o Useful
Page | 2

Data integrity identifies the quality of the data

• Garbage in, garbage out (GIGO) points out the


accuracy of a computer’s output depends on the
accuracy of the input

The Hierarchy of Data

Character - is one byte

• Numbers, letters, spaces, punctuation marks, or


other symbols

Field is a combination of one or more related


characters

• Field name
• Field size
• Data type

Record is a group of related fields

• A primary key uniquely identifies each record

Data file is a collection of related records

File maintenance refers to the procedures that keep


data current.

• Adding Records
• Modifying records
• Deleting records

Maintaining Data - Users add new records to a file


when they obtain new data.
Page | 3

Validation compares data with a set of rules or values


to find out if the data is correct

File Processing Versus Databases

File processing system

• Each department has its own set of files


• Used for many years
• Have data redundancy
• Isolate data

Database approach

• Programs and users share data


• Reduce data redundancy
• Improve data integrity
• Share data
• Allows easier access
• Reduces development time
• Can be more vulnerable

Database Managem ent Systems

Data dictionary - contains data about each file in the


database and each field in those files.

DBMS provides several tools that allow users and


programs to retrieve and maintain data in the
database;

• Query language - consists of simple, English-


like statements that allow users to specify the
data to display, print, or store
Page | 4

• Query by example (QBE) - provides a GUI to


assist users with retrieving data

• Form - a window on the screen that provides


areas for entering or modifying data in a
database
• Report generator - allows users to design a
report on the screen, retrieve data into the
report design, and then display or print the
report.

DBMS provides means to ensure that only authorized


users access data at permitted times.

Data model consists of rules and standards that


define how the database organizes data

Relational database stores data in tables that


consist of rows and columns

- ○ Each row has a primary key


- ○ Each column has a unique name

Relationship is a link within the data

Structured Query Language (SQL) is a query


language that allows users to manage, update, and
retrieve data.

Object-oriented database (OODB) stores data in


objects
Page | 5

Object-oriented databases often use Object Query


Language (OQL) to manipulate and retrieve data.

Multidimensional database can store data in more


than two dimensions of data

• Can consolidate data much faster than a


relational database

Data warehouse is a huge database that stores and


manages the data required to analyze historical and
current transactions

Database Administration

Database Analyst (DA) Decides on proper field


placement, defines data relationships, and identifies
users’ access privileges.

Database Administrator (DBA) Creates and


maintains the data dictionary, manages security,
monitors performance, and checks backup and
recovery procedures.

MODULE 10 Computer Security and


Safety, Ethics, and Privacy
Computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information, or processing
capability.
Page | 6

Cybercrime is an online or Internet-based illegal act.

• Hacker • Unethical
• Crackers Employees
• Script Kiddies • Cyber
• Corporate Spies extortionists
• Cyber Terrorists

Internet and Network Attacks

Computer Virus – negatively affects computers by


altering the way the computer works

Worm - Copies itself repeatedly, using up resources


and possibly shutting down the computer or network.

Trojan Horse - A malicious program that hides within


or looks like a legitimate program

Rootkit - Program that hides in a computer and allows


someone

from a remote location to take full control.

Botnet - is a group of compromised computers


connected to a network

• A compromised computer is known as a zombie

Denial of service attack (DoS attack) - disrupts


computer access to Internet services.

Back door - is a program or set of instructions in a


program that allow users to bypass security controls.
Page | 7

Spoofing - is a technique intruders use to make their


network or Internet transmission appear legitimate

Firewall is hardware and/or software that protects a


network’s resources from intrusion.

Intrusion detection software

• Analyzes all network traffic


• Assesses system vulnerabilities
• Identifies any unauthorized intrusions
• Notifies network administrators of suspicious
behavior patterns or security breaches

Unauthorized access is the use of a computer or


network without permission.

Unauthorized use is the use of a computer or its


data for unapproved or possibly illegal activities

Access controls define who can access a computer,


when they can access it, and what actions they can
take.

o Two-phase processes called identification and


authentication
o User name
o Password
o CAPTCHA

Possessed object is any item that you must carry to


Page | 8

gain access to a computer or computer facility

– Often are used in combination with a personal


identification number (PIN).

Biometric device authenticates a person’s identity


by translating a personal characteristic into a digital
code that is compared with a digital code in a
computer.

Digital forensics is the discovery, collection, and


analysis of evidence found on computers and
networks.

• Many areas use digital forensics


o Law enforcement
o Criminal prosecutors
o Military Intelligence

Hardware Theft and Vandalism

Hardware theft is the act of stealing computer


equipment.

Hardware vandalism is the act of defacing or


destroying computer equipment.

Software Theft occurs when someone

• Steals software media


• Intentionally erases programs

Information theft occurs when someone steals


personal or confidential information
Page | 9

Encryption is a process of converting readable data


into unreadable characters to prevent unauthorized
access.

Digital signature is an encrypted code that a person,


Web site, or organization attaches to an electronic
message to verify the identity of the sender.

Digital certificate is a notice that guarantees a user


or a Web site is legitimate

• Issued by a certificate authority.

System failure is the prolonged malfunction of a


computer

• A variety of factors can lead to system failure


including:

– Aging hardware
– Natural disasters
– Electrical power problems
– Errors in computer programs

Two ways to protect from system failures;

• Surge protectors and


• Uninterruptable power supplies (UPS)

Backing Up – The Ultimate Safeguard

Backup is a duplicate of a file, program, or disk that


can be used if the original is lost, damaged, or
destroyed
P a g e | 10

• To back up a file means to make a copy of it.

Wireless Security

War driving allows individuals to detect wireless


networks while driving a vehicle through the area.

Health Concerns of Computer Use

Ergonomics is an applied science devoted to


incorporating comfort, efficiency, and safety into the
design of items in the workplace

Computer addiction occurs when the computer


consumes someone’s entire social life

Ethics and Society

Computer ethics are the moral guidelines that govern


the use of computers and information systems
P a g e | 11

Intellectual property rights are the rights to which


creators are entitled for their work.

• copyright protects any tangible form of


expression.

Digital rights management is a strategy designed


to prevent illegal distribution of movies, music, and
other digital content.

Green computing involves reducing the electricity


and environmental waste while using a computer.

– ENERGY STAR program

Information privacy refers to the right of individuals


and companies to deny or restrict the collection and
use of information about them.

Cookie is a small text file that a Web server stores on


your computer

• Web sites use cookies for a variety of reasons:


 Allow for personalization
 Store users’ passwords
 Assist with Online shopping
 Track how
 often users visit a site

Spam is an unsolicited e-mail message or newsgroup


posting

E-mail filtering blocks e-mail messages from


designated sources
P a g e | 12

Anti-spam programs attempt to remove spam


before it reaches your inbox.

Phishing is a scam in which a perpetrator sends an


official looking e-mail message that attempts to obtain
your personal and financial information.

Pharming is a scam where a perpetrator attempts to


obtain your personal and financial information via
spoofing.

Content filtering is the process of restricting access


to certain material on the Web

• Many businesses use content filtering

Web filtering software restricts access to specified


Web sites

MODULE 11 Information System Development and


Programming Language

System development is a set of activities used to


build an information system.

System development should follow three general


guidelines:

• Group activities or tasks into phases


• Involve users
• Define standards
P a g e | 13

Project management is the process of planning,


scheduling, and then controlling the activities during
system development.

Gantt chart;
A popular tool
used to plan and
schedule the
time
relationships
among project
activities.

PERT chart;
also can be used
for planning and
scheduling time.

Feasibility is a measure of how suitable the


development of a system will be to the organization.
Documentation is the collection and summarization
of data and information.
P a g e | 14

Planning phase for a project begins when the


steering committee receives a project request.

System proposal assesses the feasibility of each


alternative solution.
P a g e | 15

Systems analysts typically develop two types of


designs for each input and output

Prototype (proof of concept) is a working model of the


proposed system
• Prototypes have inadequate or missing
documentation
• Users tend to embrace the prototype as a final
system
• Should not eliminate or replace activities
Computer-aided software engineering (CASE)
tools are designed to support one or more activities of
system development.
P a g e | 16

The purpose of the implementation phase is to


construct the new or modified system and then deliver
it

Training
involves showing users exactly how they will use the
new hardware and software in the system
– One-on-one sessions
– Classroom-style lectures
– Web-based training
One or more of four conversion strategies can beused
to change from the old system to the new system
– Direct conversion
– Parallel conversion
– Phased conversion
– Pilot conversion
purpose of the operation, support, and security phase
is to provide ongoing assistance for an information
system and its users after the system is implemented
P a g e | 17

Programming Languages and Program


Development Tools
Computer program is a series of instructions that
directs a computer to perform tasks
– Created by a programmer using a
programming language.
Machine language is the first generation of
programming languages
• Only language the computer directly recognizes
Assembly language is the second generation of
programming languages.
Source program contains the code to be converted
to machine language.
Procedural language, the programmer writes that
tell the computer what to accomplish and how to do it
– Third-generation language (3GL)
P a g e | 18

The C programming language is used to write many of


today’s programs.
COBOL (COmmon Business-Oriented Language)
is designed for business applications, but easy to read
because of the English-like statements.
Object-oriented programming (OOP) language
allows programmers the ability to reuse and modify
existing objects.
Java is an object-oriented programming language
developed by Sun Microsystems
• The Just-in-time (JIT) compiler to convert the
bytecode into machine-dependent code.
Microsoft .NET Framework allows almost any type of
program to run on the Internet or an internal business
network, as well as computers and mobile devices.
C++ is an extension of the C programming language
– Additional features for working with objects,
classes, events, and other object-oriented
concepts
C# is based on C++ and was developed by Microsoft
C# combines the benefits of an object-oriented
language with the benefits of a functional language
P a g e | 19

Visual programming language is a language that


uses a visual or graphical interface for creating all
source code.
Borland’s Delphi is a powerful program development
tool that is ideal for building large-scale enterprise and
Web applications in a RAD environment
PowerBuilder is a powerful program development
RAD tool.
4GL (fourth-generation language) is a nonprocedural
language that enables users and programmers to
access data in a database
– One popular 4GL is SQL
Application generator is a program that creates
source code or machine code from a specification of
the required functionality.
Macro is a series of statements that instructs an
application how to complete a task.

HTML is a special formatting language that


programmers use to format documents for display on
the Web
XHTML is a markup language that allows Web sites to
be displayed more easily on mobile devices
XML allows Web developers to create customized tags
and use predefined tags to display content
appropriately on various devices
– WML is a subset of XML and is used to design
pages for microbrowsers
P a g e | 20

Two applications of XML are RSS 2.0 and ATOM

Dynamic HTML (DHTML) allows Web developers to


include more graphical interest and interactivity
Ruby on Rails (RoR) provides technologies for
developing object-oriented, database-driven Web sites.
Most Web 2.0 sites use APIs
– An API enables programmers to interact with an
environment such as a Web site or operating system.
Web page authoring software can create
sophisticated Web pages that include images, video,
audio, animation, and other effects.
Multimedia authoring software allows
programmers to combine text, graphics, animation,
audio, and video in an interactive presentation.
Program development consists of a series of steps
programmers use to build computer programs.
The sequence control structure shows one or more
actions following each other in order.
P a g e | 21

Selection control structure tells the program which


action to take, based on a certain condition
– If-then-else
– Case

Repetition control structure enables a program to


perform one or more actions repeatedly as long as a
certain condition is met.
P a g e | 22

MODULE 12 Enterprise Computing

Enterprise computing involves the use of computers


in networks, such as LANs and WANs, or a series of
interconnected networks that encompass a variety of
different operating systems, protocols, and network
architectures.

Enterprise information is the information gathered in


the ongoing operations of an enterprise-sized
organization
– Business intelligence
– Business process management
– Business process automation
Managers coordinate resources by performing four
activities.
• Planning
• Controlling
• Organizing
P a g e | 23

• Leading
Information system is a set of hardware, software,
data, people, and procedures that work together to
produce information.
Human resource information system (HRIS)
manages one or more human resources functions.
Computer-aided design (CAD) uses a computer and
special software to aid in engineering, drafting, and
design
Computer-aided engineering (CAE) uses
computers to test product designs
Computer-aided manufacturing (CAM) is the use
of computers to control production equipment.
Computer-integrated manufacturing (CIM) uses
computers to integrate the many different operations
of the manufacturing process
Material Requirements Planning (MRP) uses
software to help monitor and control processes related
to production.
Sales force automation (SFA) software equips
traveling salespeople with the electronic tools they
need to be more productive
Customer interaction management (CIM) software
manages the day-to-day interactions with customers.
Chief information officer (CIO) is an executive
position that oversees the IT department.
P a g e | 24

Portal is a collection of links, content, and services


presented on a Web page that are interesting for a
particular job function.
Data warehouse is a huge database that stores and
manages the data required to analyze historical and
current transactions.
EDI is a set of standards that controls the transfer of
business data and information among computers
P a g e | 25

within and among enterprises.


Extranet is the portion of a company’s network that
allows customers or suppliers of a company to access
parts of an enterprise’s intranet.
Web services allow businesses to create products
and B2B interactions. over the Internet.
Workflow is a defined process that identifies the
specific set of steps involved in completing a particular
project or business process
– Workflow application
Virtual private network (VPN) provides mobile
users, vendors, and customers with a secure
connection to the company network server.
Virtualization is the practice of sharing or pooling
computing resources;
Server virtualization - Provides the capability to
divide a physical server logically into many virtual
servers.
Storage virtualization - Provides the capability to
create a single logical storage device from many
physical storage devices.
Cloud computing is an Internet service that provides
computing needs to computing users
Grid computing combines many servers and/or
personal computers on a network to act as one large
computer.
P a g e | 26

ENTERPRISE HARDWARE
Enterprise hardware allows large organizations to
manage and store information and data using devices
geared for:
– Heavy use
– Maximum availability
– Maximum efficiency
RAID duplicates data and implements duplication in
different ways.
P a g e | 27

Network attached storage (NAS) is a server that


provides storage to users and information systems
attached to the network

Storage area network (SAN) is a high-speed


network that provides storage to other servers to
which it is attached.

Enterprise storage system is a strategy that


focuses on the availability, protection, organization,
and backup of storage in a company
• Goal is to consolidate storage.
P a g e | 28

Blade server packs a complete computer server on a


single card (called a blade) rather than a system unit.

The individual blades


insert in a blade server
chassis

High-availability system continues running and


performing tasks for at least 99 percent of the time.

May include hot-swapping and redundant


components
• When a component fails, another
component takes over and the system
continues to function.
P a g e | 29

Scalability is a measure of how well co

mputer hardware, software, or an information system


can grow to meet increasing performance demands.

Interoperability is the ability for an information


system to share information with other information
systems within an enterprise.
disaster recovery plan is a written plan describing
the steps a company would take to restore computer
operations in the event of a disaster.

You might also like