Download Slide 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Database wikipedia , lookup

Data vault modeling wikipedia , lookup

Computer security wikipedia , lookup

Information privacy law wikipedia , lookup

Business intelligence wikipedia , lookup

Clusterpoint wikipedia , lookup

Open data in the United Kingdom wikipedia , lookup

Database model wikipedia , lookup

Transcript
Chapter 10-12
TIK
XII Science
DATABASE MANAGEMENT
Database, Data, and Information
Database
• Collection of
data
organized in a
manner that
allows access,
retrieval, and
use of that
data
Data
• Collection of
unprocessed
items
• Text
• Numbers
• Images
• Audio
• Video
Information
• Processed
data
• Documents
• Audio
• Images
Video
Garbage In, Garbage Out
Database
Old vs New
File processing system
• Each department has its
own set of files
• Used for many years
• Have data redundancy
• Isolate data
Database approach
• Programs and users share
data
• Reduce data redundancy
• Improve data integrity
• Share data
• Allows easier access
• Reduces development
time
• Can be more vulnerable
DBMS
•
•
•
•
•
Structured Query Language (SQL)
Form
Report Generator
Relational Database
Data Warehouse
COMPUTER SECURITY AND SAFETY,
ETHICS, AND PRIVACY
Network Attacks
Computer
Virus
• Affects a
computer
negatively by
altering the
way the
computer
works
Worm
Trojan Horse
Rootkit
• Copies itself
repeatedly,
using up
resources
and possibly
shutting
down the
computer or
network
• A malicious
program that
hides within
or looks like
a legitimate
program
• Program that
hides in a
computer
and allows
someone
from a
remote
location to
take full
control
Terms
•
•
•
•
•
•
•
•
Denial of Service Attack
Back Door
Spoofing
Firewall
Honeypot
Captcha
Digital Forensics
Spam
Software Theft
Steals software
media
Intentionally
erases programs
Illegally copies a
program
Illegally registers
and/or activates
a program
Health Concerns of Computer Use
Health Concerns of Computer Use
• Computer addiction occurs when the
computer consumes someone’s entire social
life
• Symptoms of users include:
Craves
computer time
Overjoy when
at the
computer
Unable to stop
computer
activity
Irritable when
not at the
computer
Neglects
family and
friends
Problems at
work or school
INFORMATION SYSTEM
DEVELOPMENT
fin