Quiz 8 - Database Management
1. Define the term, database, and explain how a database interacts with data
and information.
and information.
A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports processes requiring this information (for example, finding a hotel with vacancies).2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.
deleting records) and validation techniques.
- Adding records is simply putting information that is needed.
-Modifying records is to change somewhat the form or qualities
-Modifying records is to change somewhat the form or qualities
-Deleting records is the deduction or emission of some words or things that doesn’t merely give importance in the thought.
If you are validating form data, the techniques you use can vary depending on whether you are using HTML, Flash, or XML forms; for example, different form types have different validation limitations.
3. Discuss the terms character, field, record, and file
A distinctive mark, letter, number or symbol
A field is a named unit of information
A record is a row of data in a database table consisting of a single value from each column of data in the table. The data in the columns in a table are all of the same type of data, whereas the rows represent a given instance.A file is lots of fields or information crammed together
A file tells you lots of information that you need
A file tells you lots of information that you need
4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.
Data dictionary –is very important in the database management systems because through it we can easily find references and of course the info that we want.
File retrieves and maintenance -will help to retrieve our files.
Data security -will help us to secure our files, and this will protect our files from the other users.
Back up and recovery- in case our file was deleted or lost we can recover it.
5. Differentiate between a file processing approach and the database
approach.
A database co-ordinate the physical and logical access to data while a file - processing system only co-ordinates physical access to the data
6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
multidimensional databases.
An object-relational database (ORD), or object-relational database management system (ORDBMS), is a database management system (DBMS) similar to a relational database, but with an object-oriented database model: objects, classes and inheritance are directly supported in database schemas and in the query language. Multidimensional structure is defined as “a variation of the relational model that uses multidimensional structures to organize data and express the relationships between data”. The structure is broken into cubes and the cubes are able to store and access data within the confines of each cube
7. Explain how to access Web databases.
Using the Microsoft Visual Web Developer Web development tool, you can create Web pages that work with data from a variety of sources, including databases, XML files, and business objects. This walkthrough shows you how to work with data in a Microsoft Access database. Access databases do not have the same capacity and are not as scalable as other types of databases, such as Microsoft SQL Server. Generally, if you are creating a Web site that will support only light traffic or a limited number of users, an Access database is sufficient. However, if the Web site will support more throughput or a larger number of users, you should consider using SQL Server or another database that is suited for production Web sites.
8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses, cyberextortionist, and cyberterrorist.
Computer security is a branch of computer technology known as Information Security as applied to computers and networks.
Types of perpetrators:
A hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.
Script kiddie or skiddie, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks and deface websites
Computer Spies are interested in information, not just computers
Cyberextortionist are criminals increasingly using a method known as Distributed Denial of Service (DDOS) attacks.
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses
9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.
While designing a relational database, it is a good idea to distribute the information in multiple tables. It is not advisable to store all the information in a single table, although it is easier to design. When your database grows in size, the efficiency decreases accordingly, For example, if you are planning to make a simple database of your employees, then you can divide the employees’ information in 3 tables. In one table you can store the contact info, in second you can store the salary and department details and in third table you can store the bonus history of the employees
10. Discuss techniques to prevent unauthorized computer access and use
10. Discuss techniques to prevent unauthorized computer access and use
Through Operating system and software patches and updates, Passwords, Get a hardware or software firewall, Get a hardware or software firewall, Get a hardware or software firewall, Get a hardware or software firewall and Get a hardware or software firewall.
Walang komento:
Mag-post ng isang Komento