Part 7 Q31 to Q35 of National 5 Prelim

Slides:



Advertisements
Similar presentations
DATABASE RC D DD CMA C M R B PK E I S H S RC H L I V FK.
Advertisements

WHAT D IS RAW, UNPROCESSED FACTS AND FIGURES COLLECTED, STORED AND PROCESSED BY COMPUTERS.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
FIRST COURSE Microsoft Access (Basics). XP Objectives Define the terms field, record, table, relational database, primary key, and foreign key. Learn.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
The Copyright, Designs and Patent Act.  Software copyright is protected by law for 50 years after it is published  It also includes data stored on computer.
Database terms Mr. Brunton.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Data Storage. Database structure 1 What is a database system? Answer 1 a database is a system for managing a collection of data. Answer 2 data bases are.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
G041: Lecture 16 Section B Revision Questions
MICROSOFT ACCESS 2007 BTA – Spring What is Access?  Microsoft Access is a database management system…this means that it contains database information.
RELATIONSHIPS Generally there are two main database types: flat-file and relational.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Slide 1 Computing Science: Databases Revised May 2012 St Andrew’s High School Computing Science Databases Computing Science Level - National 4 / 5.
Chapter 4 Database Processing Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 4-1.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
What have we learned?. What is a database? An organized collection of related data.
What is Access?. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked.
Databases Letts Chapter 11. A database program can be used to:  sort a file into a different order;  search through the records for a matching string.
Lesson 13 Databases Unit 2—Using the Computer. Computer Concepts BASICS - 22 Objectives Define the purpose and function of database software. Identify.
Chapter 9 Vocabulary Databases. 1.Table – a collection of information, or data arranged in columns and rows. 2.Record – all of the information about one.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Lesson 13 Databases Lesson Objective: Understand the main features of database software Learning Outcome: Clearly identify the uses of database software.
Information Systems Design and Development Security Risks Computing Science.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
( ) 1 Chapter # 8 How Data is stored DATABASE.
Digital Citizenship (Cyber bullying, Identity Theft and Hacker) By Gabby and Heidi.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
N5 Databases Notes Information Systems Design & Development: Structures and links.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Databases.
Databases.
Relational Databases.
Lesson Objectives Aims You should be able to:
What is IT? Preparation work for the BTEC Level 3 National Extended Certificate in Information Technology.
Hierarchy of Data in a Database
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
CSCI-100 Introduction to Computing
Chapter 4 Relational Databases
Design a Relational Database Identify Database Purpose
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Database Management  .
Web Design and Development
Insert Suitable field names
Learning Area 1 Information And Communication Technology and Society
What is a Database? A collection of data organized in a manner that allows access, retrieval, and use of that data.
Lesson Objectives Aims The Data Protection Act 1998
Creating Your New Account From a Computer
Access Tutorial 1 Creating a Database
Ethical, Legal, Cultural and Environmental Concerns
Spreadsheets, Modelling & Databases
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
The ultimate in data organization
ICT Database Lesson 2 Designing a Database.
G061 - Network Security.
Databases WOW!! A database is a collection of related data.
Cycle 3: Unit 27 Lessons 104 – 111.
Presentation transcript:

Part 7 Q31 to Q35 of National 5 Prelim Revision Part 7 Q31 to Q35 of National 5 Prelim

Revision Part 7 31 Give an example for each type of testing when entering the length and height of the rectangle. The length and height must be between 0 and 10. 3 32 Describe what you can do to put a database table in order. 2 33 Explain how a primary key is used in a database table. 1 34 Explain how a foreign key is used in a database table. 35 State the full name and describe the 4 laws used in computing. 4

Revision Part 7 31. Give an example for each type of testing when entering the length and height of the rectangle. The length and height must be between 1 and 10. (3) Normal = 2,7 Extreme = 1, 10 Exceptional = -15, 15

Revision Part 7 32. Describe what you can do to put a database table in order. (2) You can SORT the data base on one or more fields. You can sort ASCENDING (A-Z, 0-9) or DESCENDING (Z-A, 9-0).

Revision Part 7 33. Explain how a primary key is used in a database table. (1) A PRIMARY key is used to uniquely identify a single record in a table. For example: Bank Account Number.

Revision Part 7 34. Explain how a foreign key is used in a database table. (1) A foreign key is used when linking tables in a relational database. A foreign key is a primary key featured in another table (however it will probably not be unique in that linked table).

Revision Part 7 35. State the full name and describe the 4 laws used in computing. (4) Data Protection Act = You have right to see your data and have it protected. The company must protect your data. Copyright, design and patent Act = It is illegal to copy any digital media without permission. Computer Misuse Act = Using a computer to cause damage through viruses or other malicious software. Communications Act = Do not cyber bully, spread false information, clone digital devices or stop others from receiving electronic communications.