Chapter 10-12 TIK XII Science. DATABASE MANAGEMENT.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Computer Security and Safety, Ethics and Privacy.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Physical Security Logical/Computer Security What other examples?
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Living in a Digital World Discovering Computers 2010.
Discovering Computers Fundamentals, 2012 Edition Living in a Digital World.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 10 Managing a Database.
Living in a Digital World Discovering Computers 2010.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Databases Chapter 11.
Living in a Digital World Discovering Computers 2011.
Discovering Computers 2010
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 11 Computer Security and Safety, Ethics, and Privacy.
D IGITAL C ITIZENSHIP. Definition: The informal rules of behavior to be followed when using the Internet N ETIQUETTE.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Computer Security, Ethics and Privacy Chapter 11.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe the qualities of valuable information.
history, hardware, software, safety, and computer ethics
Living in a Digital World Discovering Computers 2010.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Living in a Digital World Discovering Computers 2011.
1 Chapter 9 Database Management. Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Your Interactive Guide to the Digital World Discovering Computers Manage Computing Securely, Safely, and Ethically Chapter Eleven.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Introduction to Computers
MALWARE Autumn Mattis.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet.
Chapter Ten Managing a Database.
Database Management Systems
Chapter Nine (Part 2).
Chapter Nine (Part 1).
Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Chapter TIK XII Science

DATABASE MANAGEMENT

Database, Data, and Information Database Collection of data organized in a manner that allows access, retrieval, and use of that data Data Collection of unprocessed items Text Numbers Images Audio Video Information Processed data Documents Audio Images Video

Garbage In, Garbage Out

Database

Old vs New File processing system Each department has its own set of files Used for many years Have data redundancy Isolate data Database approach Programs and users share data Reduce data redundancy Improve data integrity Share data Allows easier access Reduces development time Can be more vulnerable

DBMS Structured Query Language (SQL) Form Report Generator Relational Database Data Warehouse

COMPUTER SECURITY AND SAFETY, ETHICS, AND PRIVACY

Network Attacks Computer Virus Affects a computer negatively by altering the way the computer works Worm Copies itself repeatedly, using up resources and possibly shutting down the computer or network Trojan Horse A malicious program that hides within or looks like a legitimate program Rootkit Program that hides in a computer and allows someone from a remote location to take full control

Terms Denial of Service Attack Back Door Spoofing Firewall Honeypot Captcha Digital Forensics Spam

Software Theft Steals software media Intentionally erases programs Illegally copies a program Illegally registers and/or activates a program

Health Concerns of Computer Use

Computer addiction occurs when the computer consumes someone’s entire social life Symptoms of users include: Craves computer time Overjoy when at the computer Unable to stop computer activity Irritable when not at the computer Neglects family and friends Problems at work or school

INFORMATION SYSTEM DEVELOPMENT

fin