1. Define the term, database, and explain how a database interacts with data
and information.
2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.
3. Discuss the terms character, field, record, and file
4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.
5. Differentiate between a file processing approach and the database
approach.
6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
7. Explain how to access Web databases.
8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.
10. Discuss techniques to prevent unauthorized computer access and use
ANSWER:
1.Database is an organized collection of data for one or more purposes, usually in digital form.
2.
3.Character- a unit of information that roughly corresponds to a grapheme, grapheme-like unit, or symbol such as in an alphabet or syllabary in the written form of a natural language.
Field-is an open-source software project initiated by OpenEnded Group, for the creation of their digital artworks.
Record- any document or other source of information compiled, recorded or stored in written form or on film, or by electronic process, or in any other manner or by any other means.
File- is a block of arbitrary information, or resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.
4. Data Dictionary- is acentralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.
File Retrieval- is the retrieval of inaccessible or contaminated data from media that has been damaged in some way.
Data Security- is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled.
Backup- is making copies of data which may be used to restore the original after a data loss event.
Recovery- restoration to a former or better condition.
5. Database Approach:
- Self contained nature of database systems (database contains both data and meta-data).
- Data Independence: application programs and queries are independent of how data is actually stored.
- Data sharing.
- Controlling redundancies and inconsistencies.
- Secure access to database; Restricting unauthorized access.
- Enforcing Integrity Constraints.
- Backup and Recovery from system crashes.
- Support for multiple-users and concurrent access.
6. Relational Database- matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand.
Object-oriented databases store objects rather than data such as integers, strings or real numbers.
Multi-Dimensional Database- is a database which has been constructed with the multiple dimensions pre-filled in hyper dimensional “cubes” of data rather than the traditional two dimensional tables of Relational Databases.
7.
8. Computer Security Risk- a risk is a vulnerability that could allow loss of confidentiality, integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited.
hacker- a person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
cracker- is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
script kiddie- an inexperienced and unskilled "hacker" who attempts to infiltrate or disrupt computer systems by running pre-fabricated scripts designed to crack those systems.
corporate spy- "competitive intelligence professionals."
Unethical Employee-can take many forms, ranging from theft to disclosure of confidential information to the misrepresentation of products and services.
cyberextortionist-is an individual or group who uses email as an offensive force.
9.Database design Guidelines:
While designing a relational database, it is a good idea to distribute the information in multiple tables. It is not advisable to store all the information in a single table, although it is easier to design. When your database grows in size, the efficiency decreases accordingly.
Responsibilities of the database analysts and administrator:
- adminster
- develop
- maintain
- implement the policies and procedures necessary to ensure the security and integrity of the corporate database.
- security
- architecture
- warehousing
- business analysis
- Implementation of data models
- Database design
- Database accessibility
- Performance issues
- Capacity issues
- Data replication
- Table Maintainence
- Operating system and software patches and updates
- Passwords
- Get a hardware of software firewall
- Trojans, viruses, spyware and other malware
- Know how to handle e-mails
- Alternative browser
- Run system scans to check for vulnerabilities