Download presentation
Presentation is loading. Please wait.
Published byAlexis Todd Modified over 9 years ago
1
Chapter 10-12 TIK XII Science
2
DATABASE MANAGEMENT
3
Database, Data, and Information Database Collection of data organized in a manner that allows access, retrieval, and use of that data Data Collection of unprocessed items Text Numbers Images Audio Video Information Processed data Documents Audio Images Video
4
Garbage In, Garbage Out
5
Database
6
Old vs New File processing system Each department has its own set of files Used for many years Have data redundancy Isolate data Database approach Programs and users share data Reduce data redundancy Improve data integrity Share data Allows easier access Reduces development time Can be more vulnerable
7
DBMS Structured Query Language (SQL) Form Report Generator Relational Database Data Warehouse
8
COMPUTER SECURITY AND SAFETY, ETHICS, AND PRIVACY
9
Network Attacks Computer Virus Affects a computer negatively by altering the way the computer works Worm Copies itself repeatedly, using up resources and possibly shutting down the computer or network Trojan Horse A malicious program that hides within or looks like a legitimate program Rootkit Program that hides in a computer and allows someone from a remote location to take full control
10
Terms Denial of Service Attack Back Door Spoofing Firewall Honeypot Captcha Digital Forensics Spam
11
Software Theft Steals software media Intentionally erases programs Illegally copies a program Illegally registers and/or activates a program
12
Health Concerns of Computer Use
13
Computer addiction occurs when the computer consumes someone’s entire social life Symptoms of users include: Craves computer time Overjoy when at the computer Unable to stop computer activity Irritable when not at the computer Neglects family and friends Problems at work or school
14
INFORMATION SYSTEM DEVELOPMENT
17
fin
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.