0% found this document useful (0 votes)
18 views7 pages

Fundamentals of Computer Day 9

Uploaded by

Iduni Hiranya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views7 pages

Fundamentals of Computer Day 9

Uploaded by

Iduni Hiranya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

PART 1 Day 9

Data base management system


• A database management system (or DBMS) is essentially nothing more than a
computerized data-keeping system. Users of the system are given facilities to perform
several kinds of operations on such a system for either manipulation of the data in the
database or the management of the database structure itself. Database Management
Systems (DBMSs) are categorized according to their data structures or types.
• There are several types of databases that can be used on a mainframe to exploit z/OS®:
inverted list, hierarchic, network, or relational.
• Mainframe sites tend to use a hierarchical model when the data structure (not data
values) of the data needed for an application is relatively static. For example, a Bill of
Material (BOM) database structure always has a high level assembly part number, and
several levels of components with subcomponents. The structure usually has a component
forecast, cost, and pricing data, and so on. The structure of the data for a BOM
application rarely changes, and new data elements (not values) are rarely identified. An
application normally starts at the top with the assembly part number, and goes down to
the detail components.
• Hierarchical and relational database systems have common benefits. RDBMS has the
additional, significant advantage over the hierarchical DB of being non-navigational.
By navigational, we mean that in a hierarchical database, the application programmer
must know the structure of the database. The program must contain specific logic to
navigate from the root segment to the desired child segments containing the desired
attributes or elements. The program must still access the intervening segments, even
though they are not needed.

Rational data base management system


Relational databases include the following structures:
Database
A database is a logical grouping of data. It contains a set of related table spaces and index
spaces. Typically, a database contains all the data that is associated with one application or with
a group of related applications. You could have a payroll database or an inventory database, for
example.
Table
A table is a logical structure made up of rows and columns. Rows have no fixed order, so
if you retrieve data you might need to sort the data. The order of the columns is the order
specified when the table was created by the database administrator. At the intersection of every
column and row is a specific data item called a value, or, more precisely, an atomic value. A
table is named with a high-level qualifier of the owner's user ID followed by the table name, for
example TEST.DEPT or PROD.DEPT. There are three types of tables: A base table that is
created and holds persistent data. A temporary table that stores intermediate query results. A
results table that is returned when you query tables. Columns, rows, values.

RDBMS Indexes
Indexes
An index is an ordered set of pointers to rows of a table. Unlike the rows of a table that
are not in a specific order, an index must always be maintained in order by DB2®. An index is
used for two purposes:
For performance, to retrieve data values more quickly
For uniqueness.
By creating an index on an employee's name, you can retrieve data more quickly for that
employee than by scanning the entire table. Also, by creating a unique index on an employee
number, DB2 will enforce the uniqueness of each value. A unique index is the only way DB2
can enforce uniqueness.
Creating an index automatically creates the index space, the data set that contains the
index.

RDBMS Keys
Keys
A key is one or more columns that are identified as such in the creation of a table or
index, or in the definition of referential integrity.
Primary key
A table can only have one primary key because it defines the entity. There are two
requirements for a primary key:
It must have a value, that is, it cannot be null.
It must be unique, that is, it must have a unique index defined on it.
Unique key
We already know that a primary key must be unique, but it is possible to have more than
one unique key in a table. In our EMP table example, the employee number is defined as the
primary key and is therefore unique. If we also had a social security value in our table, hopefully
that value would be unique. To guarantee this, you could create a unique index on the social
security column.
Foreign key
A foreign key is a key that is specified in a referential integrity constraint to make its
existence dependent on a primary or unique key (parent key) in another table.

Data Dictionary
• A Data Dictionary contains information about attributes or fields of a certain data set. In a
relational database, the metadata in the data dictionary includes the following:
• Names of all tables in the database and their owners.
• Names of all indexes and the columns to which the tables in those indexes relate.
• Constraints defined on tables, including primary keys, foreign-key relationships to
other tables, and not-null constraints.
• Additional physical information about the tables including their storage location,
storage method, etc.

Data base administrator


• A database administrator (DBA) is the information technician responsible for directing or
performing all activities related to maintaining a successful database environment. A
DBA makes sure an organization's database and its related applications operate
functionally and efficiently.
• Importance
• Roles

Data base languages


• Database Languages are the set of statements, that are used to define and manipulate
a database. A Database language has Data Definition Language (DDL), which is used
to construct a database & it has Data Manipulation Language (DML), which is used to
access a database
Data Modelling
• Data modeling is the process of creating a visual representation of either a whole
information system or parts of it to communicate connections between data points and
structures. The goal is to illustrate the types of data used and stored within the system, the
relationships among these data types, the ways the data can be grouped and organized
and its formats and attributes.
• Data models are built around business needs. Rules and requirements are defined upfront
through feedback from business stakeholders so they can be incorporated into the design
of a new system or adapted in the iteration of an existing one.
• Conceptual, Logical and Physical data models available.
PART 2
Computer virus
• a computer virus is a type of malicious code or program written to alter the way a
computer operates and is designed to spread from one computer to another. A virus
operates by inserting or attaching itself to a legitimate program or document that supports
macros in order to execute its code. In the process, a virus has the potential to cause
unexpected or damaging effects, such as harming the system software by corrupting or
destroying data.

How does a computer virus attack?


• Once a virus has successfully attached to a program, file, or document, the virus will lie
dormant until circumstances cause the computer or device to execute its code. In order
for a virus to infect your computer, you have to run the infected program, which in turn
causes the virus code to be executed.
• This means that a virus can remain dormant on your computer, without showing major
signs or symptoms. However, once the virus infects your computer, the virus can infect
other computers on the same network. Stealing passwords or data, logging keystrokes,
corrupting files, spamming your email contacts, and even taking over your machine are
just some of the devastating and irritating things a virus can do.
• While some viruses can be playful in intent and effect, others can have profound and
damaging effects. This includes erasing data or causing permanent damage to your hard
disk. Worse yet, some viruses are designed with financial gains in mind.

How do they spread?


• In a constantly connected world, you can contract a computer virus in many ways, some
more obvious than others. Viruses can be spread through email and text message
attachments, Internet file downloads, and social media scam links. Your mobile devices
and smartphones can become infected with mobile viruses through shady app downloads.
Viruses can hide disguised as attachments of socially shareable content such as funny
images, greeting cards, or audio and video files.
• To avoid contact with a virus, it’s important to exercise caution when surfing the web,
downloading files, and opening links or attachments. To help stay safe, never download
text or email attachments that you’re not expecting, or files from websites you don’t trust.

Signs of Computer Virus attacks


• Frequent pop-up windows. Pop-ups might encourage you to visit unusual sites. Or they might
prod you to download antivirus or other software programs.
• Changes to your homepage. Your usual homepage may change to another website, for instance.
Plus, you may be unable to reset it.
• Mass emails being sent from your email account. A criminal may take control of your account
or send emails in your name from another infected computer.
• Frequent crashes. A virus can inflict major damage on your hard drive. This may cause your
device to freeze or crash. It may also prevent your device from coming back on.
• Unusually slow computer performance. A sudden change of processing speed could signal that
your computer has a virus.
• Unknown programs that start up when you turn on your computer. You may become aware
of the unfamiliar program when you start your computer. Or you might notice it by checking your
computer’s list of active applications.
• Unusual activities like password changes. This could prevent you from logging into your
computer.

Steps to Safeguard
How can you help protect your devices against computer viruses? Here are some of the things you can do
to help keep your computer safe.
• Use a trusted antivirus product, such as Norton Anti-Virus Basic, and keep it updated with the
latest virus definitions. Norton Security Premium offers additional protection for even more
devices, plus backup.
• Avoid clicking on any pop-up advertisements.
• Always scan your email attachments before opening them.
• Always scan the files that you download using file sharing programs.

Types of Virus
Boot sector virus
• This type of virus can take control when you start — or boot — your computer. One way
it can spread is by plugging an infected USB drive into your computer.
Web scripting virus
• This type of virus exploits the code of web browsers and web pages. If you access such a
web page, the virus can infect your computer.
Browser hijacker
• This type of virus “hijacks” certain web browser functions, and you may be automatically
directed to an unintended website.
Resident virus
• This is a general term for any virus that inserts itself in a computer system’s memory. A
resident virus can execute anytime when an operating system loads.
Direct action virus
• This type of virus comes into action when you execute a file containing a virus.
Otherwise, it remains dormant.
Polymorphic virus
• A polymorphic virus changes its code each time an infected file is executed. It does this
to evade antivirus programs.
File infector virus
• This common virus inserts malicious code into executable files — files used to perform
certain functions or operations on a system.
Multipartite virus
• This kind of virus infects and spreads in multiple ways. It can infect both program files
and system sectors.
Macro virus
• Macro viruses are written in the same macro language used for software applications.
Such viruses spread when you open an infected document, often through email
attachments.

How to remove
• You can take two approaches to removing a computer virus. One is the manual do-it-yourself
approach. The other is by enlisting the help of a reputable antivirus program.
• Want to do it yourself? There can be a lot of variables when it comes to removing a computer
virus. This process usually begins by doing a web search. You may be asked to perform a long
list of steps. You’ll need time and probably some expertise to complete the process.
• If you prefer a simpler approach, you can usually remove a computer virus by using an antivirus
software program. For instance, Norton AntiVirus Basic can remove many infections that are on
your computer. The product can also help protect you from future threats.
• Separately, Norton also offers a free, three-step virus clean-up plan. Here’s how it works.
Run a free Norton Security Scan to check for viruses and malware on your devices. Note: It does
not run on Mac OS.
Use Norton Power Eraser’s free virus and malware removal tool to destroy existing viruses. Need
help? A Norton tech can assist by remotely accessing your computer to track down and eliminate most
viruses.
Install up-to-date security software to help prevent future malware and virus threats.

You might also like