Data Storage. Database structure 1 What is a database system? Answer 1 a database is a system for managing a collection of data. Answer 2 data bases are.

Slides:



Advertisements
Similar presentations
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Advertisements

Section C Threats to Data.
Database management system (DBMS)  a DBMS allows users and other software to store and retrieve data in a structured way  controls the organization,
POSSIBLE THREATS TO DATA
Database Theory Each Table in a Database needs a Primary Key Data TypesDescriptionExample TextCharacters (Letters, numbers and symbols) ABC 123 NumberNumerical.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Relational Databases Chapter 4.
FIRST COURSE Microsoft Access (Basics). XP Objectives Define the terms field, record, table, relational database, primary key, and foreign key. Learn.
Organizing Data Chapter 5. Data Hierachy Table = Entities X Attributes Entities = Records Attributes = Fields.
Introduction to Databases
Organizing Data & Information
1004INT Information Systems Week 10 Databases as Business Tools.
WFM-6103: Hydrologic Information System (HIS) Akm Saiful Islam Lecture-5: Database Management System April-October, 2006 Institute of Water and Flood Management.
Organizing Data and Information
Chapter 4 Relational Databases Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 4-1.
Attribute databases. GIS Definition Diagram Output Query Results.
Databases and Database Management Systems
Mgt 20600: IT Management & Applications Databases Tuesday April 4, 2006.
Chapter 4 Relational Databases Copyright © 2012 Pearson Education 4-1.
An Introduction to Database Management Systems R. Nakatsu.
Databases. Objectives Define what a database is. Understand the difference between a flat and relational database Design and create a relational database.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Information storage: Introduction of database 10/7/2004 Xiangming Mu.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
CPS120: Introduction to Computer Science Information Systems: Database Management Nell Dale John Lewis.
IT security By Tilly Gerlack.
Database Technical Session By: Prof. Adarsh Patel.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
Simple Database.
Intro-Part 1 Introduction to Database Management: Ch 1 & 2.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
CHAPTER 8: MANAGING DATA RESOURCES. File Organization Terms Field: group of characters that represent something Record: group of related fields File:
Homework Pathways Year 7s By Mr S Dhesi HomeworkStart Date:Finish Date: E-safety Extreme Sports Murder Most Horrid Kodu Programming.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Database A database is a collection of data organized to meet users’ needs. In this section: Database Structure Database Tools Industrial Databases Concepts.
Oleh Munawar Asikin. Principles of Information Systems, Seventh Edition 2  Database management system (DBMS): group of programs that manipulate database.
Database Design Presenters: Nicolas Lee Tam Nguyen.
Database Design Presenters: Nicolas Lee Tam Nguyen.
Lecture2: Database Environment Prepared by L. Nouf Almujally 1 Ref. Chapter2 Lecture2.
Databases. What is a database?  A database is used to store data. The word DATA is actually Latin for FACTS. A database is, therefore, a place, or thing.
Chapter 4 Data and Databases. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe the differences between data,
Database Management Systems.  Database management system (DBMS)  Store large collections of data  Organize the data  Becomes a data storage system.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Data resource management
Database revision.
+ Information Systems and Databases 2.2 Organisation.
Database Management Systems (DBMS)
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
Management Information Systems, 4 th Edition 1 Chapter 8 Data and Knowledge Management.
SQL Jan 20,2014. DBMS Stores data as records, tables etc. Accepts data and stores that data for later use Uses query languages for searching, sorting,
Database Management Systems (DBMS)
IT in Business Personal and PC Databases Lecture – 14.
GLOBEX INFOTEK Copyright © 2013 Dr. Emelda Ntinglet-DavisSYSTEMS ANALYSIS AND DESIGN METHODSINTRODUCTORY SESSION EFFECTIVE DATABASE DESIGN for BEGINNERS.
Introduction to Access Chapter 13 pages 1-4. What is a database??? Related information is stored in databases  All SC student information is stored in.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 14 Database Design.
Chapter 3: Relational Databases
Databases Flat Files & Relational Databases. Learning Objectives Describe flat files and databases. Explain the advantages that using a relational database.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
N5 Databases Notes Information Systems Design & Development: Structures and links.
Chapter 4 Relational Databases
Database.
Computer Security.
Spreadsheets, Modelling & Databases
The ultimate in data organization
Databases This topic looks at the basic concept of a database, the key features and benefits of a Database Management System (DBMS) and the basic theory.
Presentation transcript:

Data Storage

Database structure 1 What is a database system? Answer 1 a database is a system for managing a collection of data. Answer 2 data bases are stored in tables Answer 3 time: a sequence of numbers, letters or symbols Answer 4 number: represents a numerical value. Answer 5 date/time: stores a combination of dates and times 2 How is data stored in a database? 3-6 Give brief descriptions of different four types of data Answer 6 logical: represents the data as true and false

Database structure 7-8 Describe the part played by a primary key and a foreign key in a database Answer 7 the primary key is the key used to organise and sort data. It is the unique identifier of each record in each table. Answer 8 a foreign key is a piece of data which is not meant to be in another table. 9\ Use a simple diagram to show the relationship between database tables 9 Diagram below

Online databases What is an online database and what are the main advantages of using oneline databases? Answer 10 an online data base is a data base that can be accessed using a network. Answer 11 an advantages of online data bases is that you can check to see if the products in stock and you can buy lots of different products. Answer 12 DBMS: Database Manager System Answer 13 SQL: Structured Query Language Answer 14 DDL: Data Definition Language What does DBMS, SQL, DDL and DML file stand for? Answer 15 DML: Data Manipulation Language

Threats to data Describe each of the following threats to data: opportunist, computer viruses, malware, phishing and accidental damage Answer 16 Opportunists: People who damage files and documents, with computers which are left logged on by the user. Answer1 7 computer viruses: These are programmes which harm the computer and spread viruses. They harm the computer via s and files. Answer 18 malware: malware is a intrusive or annoying piece of software or programming code which harms the computer. Answer 19 phishing: this tries to gain access to passwords, financial details and other info. Answer20 accidental damage: this is damage caused by floods or storms or mishap.

Threats to data Discuss four ways an organisation can be affected after data loss take places Answer 21 reputation people will be put of using the organisation as they won’t feel safe. Answer 22 secrets this will be bad as then the competition will find out if the companies making any new products. Answer 23 identity theft this will be a problem when trying to get loans ect. Answer 24 legal problems then the company will lose there costumers as they wont feel safe any more.