1.Define the term, database, and explain how a database interacts with data
and information.
- A database is an integrated collection of data records, files, and other database objects. The term database implies that the data is managed to some level of quality and it is correctly applied to the data and data structures.
2. Describe file maintenance techniques (adding records, modifying records, deleting records) and validation techniques.
- File maintenance procedures include adding records when new data is obtained, modifying records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed.
- Validation maintenance is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyze data, either as you enter it or after you enter it, to help ensure that it is correct.
3. Discuss the terms character, feild, record, and file.
- Character it can be a number, letter, space, punctuation mark, or other symbols.
- Field is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses.
- Record is a group of related fields.
- File is a collection of related records stored on a storage medium.
4. Discuss the functions common to most database management systems: data dictionary, file retrieval and maintenance, data security, and backup and recovery.
- Data dictionary contains data about cache file in the database and cache field within those files. A DBMS offers several methods to retrieve and maintain data, such as query languages, query by example, forms, and report generators. A report generator allows users to design a report on the screen, retrieve data into the report design, and display or print the report.Backup is the copy of the database.Recovery Utility uses the logs and/or backups to restore the database.
5. Differentiate between a file processing approach and the database approach.
- File processing approach each department or area within an organization has its own set of data files. Two major weaknesses of file processing systems are redundant data and isolated data.
- The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time. A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power. Data in a database also can be more vulnerable than data in file processing system.
- A relational database user refers to a file as a table, a record as a row, and a field as a column.
- An object-oriented database (OODB) stores data in objects. An object is an item that contains data, as well as the actions that read or process the data.
- A multidimensional database stores data in dimensions. These multiple dimensions, sometimes known as a hypercube, allow users to access and analyze any view of the database data.
7. Explain how to access Web databases.
- To access data in a Web database, you fill in a form or enter search text on a Web page, which is the front end to the database. A Web database usually resides on a database server, which is a computer that stores and provides access to a database.
8. Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.
- The term computer security risk means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
Types of Cybercrime Perpetrators
- The term hacker refers to someone who accesses a computer or network illegally that the intent of their security breaches is to improve security.
A cracker is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions.
A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge.
Corporate spies have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information, or to help identify security risks in their own organization.
Unethical employees may break into their employees’ computers for a variety of reasons. Some simply want to exploit a security weakness.
A cyberextortionist is someone who use e-mail as a vehicle for extortion.
A cyberterrorist is someone who use the Internet or Network to destroy or damage computers for political reasons.
9. Identify database design guidelines and discuss the responsibilities of database analysts and administrators.
- A database analyst (DA), or data modeler, focuses on the meaning and usage of data. The DA decides on the placement of fields, defines data relationships, and identifies users' access privileges. A database administrator (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages database security, monitors database performance, and checks backup and recovery procedures.
10. Discuss techniques to prevent unauthorized computer access and use.
- Operating system and software patches and updates. There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.
- Passwords. Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.
- Get a hardware or software firewall. We highly recommend all computer users have a firewall solution. There are two ways a firewall can protect your computer and network.
- Trojans, viruses, spyware, and other malware. Software Trojans, viruses, spyware, and other malware can not only damage or destroy your computer data Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information. But is also capable of monitoring your computer to learn more about your viewing habits
- To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.
- Know how to handle e-mails. Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe.
- Alternative browser. Before the release of Microsoft Windows XP SP2 and Internet Explorer 7.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Below are a listing of recommend sites to try:
- Gibson Research Corporation. The Gibson Research Corporation, or GRC, is a great location to learn about network security as well as well as test your computer or network for vulnerabilities.
- Hacker Wacker. Another great site with computer security related information, help, and programs to help test your computer and network.
Walang komento:
Mag-post ng isang Komento