Chapter TIK XII Science
DATABASE MANAGEMENT
Database, Data, and Information Database Collection of data organized in a manner that allows access, retrieval, and use of that data Data Collection of unprocessed items Text Numbers Images Audio Video Information Processed data Documents Audio Images Video
Garbage In, Garbage Out
Database
Old vs New File processing system Each department has its own set of files Used for many years Have data redundancy Isolate data Database approach Programs and users share data Reduce data redundancy Improve data integrity Share data Allows easier access Reduces development time Can be more vulnerable
DBMS Structured Query Language (SQL) Form Report Generator Relational Database Data Warehouse
COMPUTER SECURITY AND SAFETY, ETHICS, AND PRIVACY
Network Attacks Computer Virus Affects a computer negatively by altering the way the computer works Worm Copies itself repeatedly, using up resources and possibly shutting down the computer or network Trojan Horse A malicious program that hides within or looks like a legitimate program Rootkit Program that hides in a computer and allows someone from a remote location to take full control
Terms Denial of Service Attack Back Door Spoofing Firewall Honeypot Captcha Digital Forensics Spam
Software Theft Steals software media Intentionally erases programs Illegally copies a program Illegally registers and/or activates a program
Health Concerns of Computer Use
Computer addiction occurs when the computer consumes someone’s entire social life Symptoms of users include: Craves computer time Overjoy when at the computer Unable to stop computer activity Irritable when not at the computer Neglects family and friends Problems at work or school
INFORMATION SYSTEM DEVELOPMENT
fin