100% found this document useful (2 votes)
1K views43 pages

DP Ss3 Note First Term

The document discusses various types of database indexes including clustered and unclustered indexes, dense and sparse indexes, and primary and secondary indexes. It provides examples and explanations of each type of index.

Uploaded by

odunsal5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
1K views43 pages

DP Ss3 Note First Term

The document discusses various types of database indexes including clustered and unclustered indexes, dense and sparse indexes, and primary and secondary indexes. It provides examples and explanations of each type of index.

Uploaded by

odunsal5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 43

SCHEME OF WORK

1. INDEXES

2. DATA SECURITY

3. DATA SECURITY 2

4. CRASH RECOVERY

5. PARALLEL AND DISTRIBUTED DATABASES

6. PARALLEL AND DISTRIBUTED DATABASES 2

7. NETWORKING

8. NETWORKING 2

9. NETWORKING 3

10. COMPUTER VIRUS

11. MAINTENANE OF COMPUTER


SUBJECT: DATA PROCESSING
WEEK ONE
DURATION: 45 MINUTES
TOPIC: INDEXES
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Explain how data entries are organized in order to support efficient retrieval of data

CONTENT

An Index is a copy of database table that has been reduced to certain fields and the copy is
always in sorted form. The index also contains a pointer to the corresponding record of the
actual table so that the fields not contained in the index can also be read. Index contains a
value and a pointer to first record that contains data value.

A Database Index is a data structure that speeds up certain operation on a file. The Operation
involves a search key which is the set of record files (in most cases a single field). The elements
of an index are called data entries. Data entries can be actual data record. A given file
of data records can have several indexes, each with different search keys as showed in the table
below.

Customer ID Name Address City State Zip

001 Mr Daniel 10,Bale str. Maryland Lagos 1011

002 Mrs Okon 5, Oju-ile Ota Ogun 1021

003 Mr David 26, Dalemo str. Ikeja Lagos 1023

The search engine searches for a value in table or file in two ways. The table scan which is
sequential and index which is random.

Indexes are special lookup tables that the database engine uses to speed up data retrieval. An
index in a database is similar to an index in the back of a book.
An index table or file consists of records called index entries. It is of the form

Search- key Pointer

The search key field is used to sort the rows (in the index column) and the pointer field (in index
column) indicates where the actual data in the table will be retrieved. When a table has an
index it simply means the records in that table has been sorted in one way or the other.

Indexes are automatically created when primary key and unique constraints are defined on
table columns.

Index Classification

1. Clustered & Non-Clustered Index


 .Clustered Index

Clustered index is an index whose sorting order determines the order of how the rows/records
in a table are stored. There could be only one clustered index in a table because there could
always be one way of arranging the records in a table at a given time. For example, if you are
asked to arrange some tables in a room, you could arrange them in a round form, row form or
packed them close together, only one way at a time. Clustered index also means that related
values in a table are stored close to each other according to the order of the index. A Clustered
index is when a file is organized so that the ordering of data records is the same as or closes to
the ordering of data entries. A clustered index can take place only if the data records are sorted
on the search key field. For example, suppose that students records are sorted by age; an index
on age that stores data entries in sorted order by age is a clustered index.

Indexes that maintain data entries in sorted order by search key use a collection of index
entries, organized into a tree structure to guide searches for data entries. Thus, clustered
indexes are relatively expensive to maintain when the file is updated, when data entries are to
be moved across pages, and if records are identified by a combination of page id and slot as is
often the case, all places in the database that point to a moved record must also be updated to
point to the new location. These additional updates can be time consuming.

The table below illustrate a clustered index file:

Student ID Name Age


00231364OJ Olu Jacob 12

00241265AF Agu Faith 13

00251057AJ Abiola Joseph 13

00211362MS Mathew Stephen 14

00251302TB Tjomas Bintu 15

 Unclustered Index

This an index whose sorting order does not determine the order of how the rows/records in a
table are stored. This means that the search keys in the index column is sorted in one order
while the actual records or rows are sorted in another order or are not sorted at all.

This is an index that is not clustered. A data file can contain several unclustered index. For
example, supposing that students records are sorted by age; and if additional index on GPA
field is included, it is called unclustered index.

2. Dense & Sparse Indexes


 Dense Index

This is said to be dense if it contains (at least) one data entry for every search key value that
appears in a record in the indexed file.

In a dense index, index record appears for every search key value in the file or table. That is
every search key in the index column has a particular record it will point to in the table or file.

 Sparse Index

A Sparse Index contains one entry for each page of records in the data file. The index record
contains the search key and a pointer to the first data record with that search key value. A
Sparse index must be clustered and it is smaller than a dense index.

3. Primary & Secondary Index


 Primary Index

Primary index is an index defined on a primary key column(s) of a relation with unique
constraint which guarantee that the field will not contain duplicate values and determine the
order of how the records are physically stored on the disk. Note that this is also called clustered
index.

This is an index on a set of fields that includes the primary key. Primary index contains records
that are usually clustered. A primary index is created for the primary key of a table.

 Secondary Index

Secondary index is an index defined on a non-key field which may contain duplicate values and
as such does not determine the order of how the records are physically stored on a disk. It is
also called non-clustered index.

For example, in student database, student ID is used to look up for a student as the key,
however, one might want to look up for a student using Last Name by creating secondary index
on that column.

Secondary index is an index that is not a primary index i.e. it does not include primary key.
Secondary index can be created on non- key attribute. It contains duplicate data entries.

A Unique index is an index in which the search key contains some candidate key.

Indexes Using Composite Search Keys

Composite search keys or concatenated keys are when the search key for an index contain
several fields. For example, considering a collection of employee records with field name, age
and salary stored in sorted order by name. if the search key is composite, an equality query is
one in which each field in the search key is bound to a constant. For example, we can ask to
retrieve all data entries with age = 20 and sal = 10, the hashed file organization supports only
equality queries since a hash function identifies the bucket containing desired records only if a
value is specified for each field in the search key.

The search key for an index can contain several fields, such keys are called Composite Search
Keys or Concatenated Keys.

Range Queryis the one in which not all fields in the search key are bound to constants. For
example, we can ask to retrieve all data entries with age = 20; this query implies that any value
is acceptable for the sal fields. Another example of a range query is when ask to retrieve
all data entries with age < 30 and sal > 40

GENERAL EVALUATION

Class Task

1. ………. is a database table that has been reduced to certain fields. a) Table b) An index c)
Table model d) Network model
2. The copy of an index is always in …… form. a) duplicate b) field c) sorted d) domain
3. The ………… index can take place only if the data records are sorted on the search key
field. a) unclustered (b)insert (c) update (d) clustered
4. A …………….. can contain several unclustered indexes a) data file b) primary c) check d)
index
5. Index contain a value and ……. (a) pointer (b) sign (c) update (d) model
6. ………. is an index in which the search key contains some candidate key. a) Unique index
b) An index c) composite d) sparse index
7. …… can be created on a non- key attribute. a) primary index b) dense index c)
secondary index d) sparse index
8. A sparse index contains one entry for each ……of records in the data file. a) page b) table
c) row d) column
9. ………is the one in which not all fields in the Search key are bound to constant. a) dense
index b) composite search key c) secondary index d) range query
10. ……. is when the search key for an index contain several fields. a) primary index b)
composite search key c) secondary index d) unique index
11. Differentiate between a unique index and a range query.

Ticket-Out

1. What is an index?
2. What are data entries?
3. Differentiate between clustered index and unclustered index.
4. State two reasons why clustered index is expensive to maintain.
5. Distinguish between dense index and sparse index
6. Explain primary and secondary index
7. Create a student table with the following fields: name, age, and scores of 5 records.
Create an index using a composite keys name and age. (show the table and SQL
statements)

SUBJECT: DATA PROCESSING


WEEK TWO
DURATION: 45 MINUTES
TOPIC: DATA SECURITY
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Explain data security

2. State the importance of data security

3. Understand secrecy, integrity and availability

CONTENT

What is Database Security? Database Security concerns the use of a broad range of information security
controls to protect database against compromise of their integrity, confidentiality and availability.

What is Data Security? Data security is the practice of keeping data protected from corruption
and unauthorized access. The focus behind data security is to ensure privacy while protecting
personal or corporate data.

It is a means of putting in place the different form of information security controls to protect
database against compromise of their confidentiality, integrity and availability.

Security Risk to Database System

1. Unauthorized access or unintended activity or misuse by authorized database user,


administrator or network/system manager, hackers
2. Malware infections causing incidents such as unauthorized access, leakage or disclosure of
personal or proprietary data, deletion or damage to data or program, interruption or denial of
authorized access.
3. Overloads, performance constraints and capacity issues resulting in the inability of authorized
user to use database as intended.
4. Physical damage to database servers caused by fire, flood, overheating, lightening, accidental
liquid spills, static discharge, electronic breakdown/equipment failures and obsolescence.
5. Design flaws and programming bugs in database and the associated program and system,
creating various security vulnerabilities.
6. Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in
database or system administration process.

Importance of Data Security

1. Risk Assessment: This will enable you to identify the risks you are faced with and what could
happen if valuable data is lost through theft, malware infection or a system crash.
2. Securing Data: Since data can be compromised in many ways, the best security against misuse
or theft involves a combination of technical measures, physical security and a well-educated
staff. You should implement clearly defined polices into your infrastructure and effectively
present them to the staff.
3. Data security is critical for most business and even home computer users. Client information,
payment information, personal files, bank account details- all this information can be hard to
replace and potentially dangerous if it falls into the wrong hands. Data lost due to disaster such
as a flood of fire is crushing, but losing it to hackers or a malware infection can have much
greater consequences.

Types of Security Control on the Data

Access Control

1. Access Control: Is the selective restriction of access to a place or other resource. The act of
accessing may mean consuming, entering, or using. Permission to access a resource is called
authorization.
2. Auditing: Database auditing involves observing a database so as to be aware of the actions of
database users. Database administrators and consultants often set up auditing
for security purposes, for example, to ensure that those without the permission to access
information do not access it.
3. Authentication: Is the validation control that allows you to log into a system, email or
blog account etc. Once logged in, you have various privileges until logging out. Some systems
will cancel a session if your machine has been idle for a certain amount of time, requiring that
you prove authentication once again to re-enter. You can log in using multiple factors such as a
password, a smart card or even a fingerprint.
4. Encryption: This security mechanism uses mathematical scheme and algorithms to
scramble data into unreadable text. It can only be decoded or decrypted by the party that
possesses the associated key.

Integrity Control

5. Backup: This is the process of making copy and archiving of computer data in the event
of data loss which is used to restore the original data. Backups have two distinct purposes. The
primary purpose is to recover data after its loss, be it by data deletion or corruption. The
secondary purpose of backups is to recover data from an earlier time, according to a user-
defined data retention policy, typically configured within a backup application for how long
copies of data are required. Backup is just one of the disaster recovery plans.

6. Password: This is sequence of secret characters used to enable access to file,


program, computer system and other resources.

Application Security

Application security is the use of software, hardware and procedural methods to protect
application from external threats.

Major Threats to Data Security

1. Accident can happen due to human error or software/ hardware error.


2. Hackers could steal vital information and fraud can easily be perpetrated.
3. Loss of data integrity.
4. Improper data access to personal or confidential data.
5. Loss of data availability through sabotage, a virus, or a worm.

Class Task

1. Explain data security.


2. Explain types of security control on data that you know
SUBJECT: DATA PROCESSING
WEEK THREE
DURATION: 45 MINUTES
TOPIC: DATA SECURITY 2
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Explain the role of a database administrator

CONTENT

THE ROLE OF DATABASE ADMINISTRATOR IN DATA SECURITY

A database administrator (DB) is a person responsible for the installation, configuration,


upgrade, administration, monitoring and maintenance of databases in an organization. The role
includes the development and design of database strategies, system monitoring and improving
database performance and capacity, and planning for future expansion requirements. They may
also plan, co-ordinate an implement security measures to safeguard the database.

A database administrator’s responsibilities can include the following tasks:

1. Installing and upgrading the database server and application tools.


2. Allocating system storage and planning future storage requirements for the database system
3. Modifying the database structure, as necessary, from information given by application
developers.
4. Enrolling users and maintaining system security.
5. Ensuring compliance with database vendor license agreement.
6. Controlling and monitoring user access to the database.
7. Monitoring and optimizing the performance of the database.
8. Planning for backup and recovery of database information.
9. Maintaining archive data.
10. Backing and restoring databases.
11. Contacting database vendor for technical support.
12. Generating various reports by querying database as per need.

Class Task

1. Define the roles of a database administrator in data security


2. Define backup and list its importance in data security

Ticket-Out

1. …..……… is the computer professional responsible for the configuration, administration and
maintenance of a database (a) Programmer (b) System administrator (c) Database
administrator (d) System analyst
2. Mention five (5) duties of a database administrator
SUBJECT: DATA PROCESSING
WEEK FOUR
DURATION: 45 MINUTES
TOPIC: CRASH RECOVERY
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Ensure data integrity by recovering data loss after crash

CONTENT

Crash recovery is the process by which the database is moved back to a consistent and usable
state. This is done by rolling back incomplete transactions and completing committed
transactions that were still in memory when the crash occurred. When the database is in a
consistent and usable state, it has attained what is known as a point of consistency. Following a
transaction failure, the database must be recovered.

Conditions that can result in transaction failure include:

1. A power failure on the machine causing the database manager and the database partitions
on it to go down.

2. A hardware failure such as memory corruption, or disk, CPU, or network failure.

3. A serious operating system error that causes the DB to go down

Introduction to ARIES (Algorithms for Recovery and Isolation Exploiting Semantics)

This is a recovery algorithm designed to work with no-force, steal database approach. It is used
by IBM DB2, MS SQL Server and many other database systems.

The three main principles that lie behind ARIES recovery algorithm

1. Write Ahead Logging: Any change to an object is first recorded in the log, and then the log must
be written to a stable storage before changes to the object are written to a disk.
2. Repeating History during Redo: On restart, after a crash, ARIES retraces the actions of a
database before the crash and brings the system back to the exact state that it was in before
the crash. The n it undoes the transaction still active at crash time.
3. Logging Changes during Undo: Change made to the database while undoing transactions are
logged to ensure such an action isn’t repeated in the event of repeated restarts.

Recovery Procedure after Crash

The recovery works in three phases

1. Analysis Phase: The first phase, analysis, computes all the necessary information from the log
file.
2. REDO Phase: The Redo phase restores the database to the exact state at the crash, including all
the changes of uncommitted transactions that were running at that point time.
3. UNDO Phase: The undo phase then undoes all uncommitted changes, leaving the database in a
consistent state. After the redo phase the database reflects the exact state at the crash.
However, the changes of uncommitted transactions have to be undone to restore the database
to a consistent state.

Other Recovery Related To Data Structure

THE WRITE-AHEAD LOG PROTOCOL: Write Ahead Logging (WAL) is family of techniques for
providing atomicity and durability (two of the ACID properties) in database systems. In a system
using WAL, all modifications are written to a log before they are applied. Usually both redo and
undo information is stored in the log. WAL allows updates of a database to be done in one
place.

ATOMICITY: This is the property of transaction processing whereby either all the operations of
transactions are executed or none of them are executed (all-or-nothing)

DURABILITY: This is the ACID property which guarantees that transactions that have committed
will survive permanently.

LOG: A transaction log (also transaction journal, database log, binary log or audit trail) is
a history of actions executed by a database management system to guarantee ACID properties
over crashes or hardware failure. Physically, a log is a file of updates done to the database,
stored in stable storage.
CHECK POINTING: Check pointing is basically consists of storing a snapshot of the current
application state, and later on, use it for restarting the execution in case of failure. A check
point record is written into the log periodically at that point when the system writes out to the
database on disk all DBMS buffers that have been modified. This is a periodic operation that can
reduce the time for recovery from a crash.

Check points are used to make recovery more efficient and to control the reuse of primary and
secondary log files. In the case of crash, backup files will be used to recover the database to the
point of crash.

Media Recovery

Media recovery deals with failure of the storage media holding the permanent database, in
particular disk failures. The traditional database approach for media recovery uses archive
copies (dumps) of the database as well as archive logs. Archive copies represent snapshots of
the database and are periodically taken.

The archive log contains the log records for all committed changes which are not yet reflected
in the archive copy. In the event of a media failure, the current database can be reconstructed
by using the latest archive copy and redoing all changes in chronological order from the archive
log.

A faster recovery from disk failures is supported by disk organizations like RAID (redundant
arrays of independent disks) which store data redundantly on several disks. However, they do
not eliminate the need for archive based media recovery since they cannot completely rule out
the possibility of data loss, e.g. when multiple disk fail.

Class Task

1. Define crash recovery.


2. Explain the term ARIES.
3. The process by which a database is moved back to a consistent and usable state is called……….
(a) cash recovery (b) crash recovery (c) past recovery (d) undo recovery
4. The recovery algorithm that uses no-force and steals approach is …………. (a) ARIAS (b) ARIES (c)
ARREARS (d) ARIS
5. ARIES works in ……………. Phases (a) 3 (b) 2 (c) 1 (d) 4
6. Which of these is not a crash recovery type ………… (a) ARIES (b) Media recovery (c) Check
pointing (d) UNDO
7. ………. Crash recovery uses backup files (a) Check point (b) ARIES (c) Media recovery
(d) Atomicity

Ticket-Out

1. Explain the following terms in crash recovery (i) Media recovery (ii) Check point (iii) The Write –
Ahead log protocol
2. Discuss the concepts of ARIES in crash recovery.
3. Discuss the concept of ARIES in crash recovery.
4. Explain the difference between media recovery and check point.
5. Explain the difference between a system crash and a media failure.
SUBJECT: DATA PROCESSING
WEEK FIVE
DURATION: 45 MINUTES
TOPIC: PARALLEL AND DISTRIBUTED DATABASES
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Define what parallel and distributed database is.

2. Understand the significance of parallel and distributed database.

CONTENT

Parallel database

A parallel database system seeks to improve performance through parallelization of various


operations, such as loading data, building indexes and evaluating queries. Although data may
be stored in a distributed fashion, the distribution is governed solely by performance
considerations. Parallel databases improve processing and input/output speeds by using
multiple CPUs and disks in parallel. Centralized and client–server database systems are not
powerful enough to handle such applications. In parallel processing, many operations are
performed simultaneously, as opposed to serial processing, in which the computational steps
are performed sequentially.

Architectures of Parallel Database

Shared memory architecture - Where multiple processors share the main memory (RAM)space
but each processor has its own disk (HDD). If many processes run simultaneously, the speed is
reduced, the same as a computer when many parallel tasks run and the computer slows down.

Shared disk architecture - Where each node has its own main memory, but all nodes share
mass storage, usually a storage area network. In practice, each node usually also has multiple
processors.

Shared nothing architecture - Where each node has its own mass storage as well as main
memory.
The Benefits of Parallel Database

Parallel database technology can benefit certain kinds of applications by enabling:

1. Higher Performance - more CPUs available to an application, higher speedup and scaleup can
be attained.
2. Higher Availability - Nodes are isolated from each other, so a failure at one node does not bring
the whole system down.
3. Greater Flexibility - An OPS environment is extremely flexible. Instances can be allocated or de-
allocated as necessary.
4. More Users - Parallel database technology can make it possible to overcome memory limits,
enabling a single system to serve thousands of users.

Distributed Database

In a distributed database, data is stored in different systems across a network. For Example, in
mainframes, personal computers, laptops, cell phones, etc.

Advantages of Distributed Database

1. In a distributed database, data can be stored in different systems like personal computers,
servers, mainframes, etc.
2. A user doesn’t know where the data is located physically. Database presents the data to the
user as if it were located locally.
3. Database can be accessed over different networks.
4. Data can be joined and updated from different tables which are located on different machines.
5. Even if a system fails the integrity of the distributed database is maintained.
6. A distributed database is secure.

Disadvantages of Distributed Database

1. Since the data is accessed from a remote system, performance is reduced.


2. Static SQL cannot be used.
3. Network traffic is increased in a distributed database.
4. Database optimization is difficult in a distributed database.
5. Different data formats are used in different systems.
6. Different DBMS products are used in different systems which increases in complexity of the
system.
7. Managing system catalog is a difficult task.
8. While recovering a failed system, the DBMS has to make sure that the recovered system is
consistent with other systems.
9. Managing distributed deadlock is a difficult task.

Types of Distributed Databases

Distributed databases can be broadly classified into homogeneous and heterogeneous


distributed database

 Homogeneous Distributed Databases - In a homogeneous distributed database, all the


sites use identical DBMS and operating systems.
 Heterogeneous Distributed Databases - In a heterogeneous distributed database,
different sites have different operating systems, DBMS products and data models.

Ticket-Out

1. State 3 advantages and 3 disadvantages of distributed databases.


2. Summaries the parallel and distributed databases.
SUBJECT: DATA PROCESSING
WEEK SIX
DURATION: 45 MINUTES
TOPIC: PARALLEL AND DISTRIBUTED DATABASES
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Describe the architecture of DDBs.

2. Explain how data is stored in a distributed DDB.

CONTENT

Architectural Models

Architectural model describes responsibilities distributed between system components and


how are these components placed. Some of the common architectural models are

1. Client-server model Architecture for DDBMS: The system is structured as a set of processes,
called servers that offer services to the users, called clients.

 The client-server model is usually based on a simple request/reply protocol,


implemented with send/receive primitives or using remote procedure calls (RPC) or
remote method invocation (RMI):
 The client sends a request (invocation) message to the server asking for some service;
 The server does the work and returns a result (e.g. the data requested) or an error code
if the work could not be performed

A server can itself request services from other servers; thus, in this new relation, the server itself
acts like a client

2. Peer – to – Peer Architecture for DDBMS: All processes (objects) play similar role.

 Processes (objects) interact without particular distinction between clients and servers.
 The pattern of communication depends on the particular application.
 A large number of data objects are shared; any individual computer holds only a small
part of the application database.
 Processing and communication loads for access to objects are distributed across many
computers and access links.

 This is the most general and flexible model.


 It distributes shared resources widely -> share computing and communication loads.

Problems with peer-to-peer:

 High complexity due to


o Cleverly place individual objects
o retrieve the objects
o maintain potentially large number of replicas

3. Middleware (distributed applications): a layer of software that coordinates the execution of


queries and transactions across one or more independent database servers. It is designed to
allow a single query to span multiple servers, without requiring all database servers to be
capable of managing such multi-site execution strategies. It is attractive when trying to
integrate several legacy systems, whose basic capabilities cannot be extended.

Storing Data in a Distributed DBMS


This involves data fragmentation and data replication.
Data Fragmentation
Data fragmentation is a database design technique used to divide a database into smaller, more
manageable pieces called fragments. Each fragment contains a subset of the data, and the goal
is to distribute the data efficiently across multiple storage locations or nodes in a distributed
database system. Fragmentation is primarily used to improve performance, scalability, and
manageability in large and distributed database environments. There are several types of data
fragmentation:
 Horizontal Fragmentation:
In horizontal fragmentation, data is divided into subsets based on rows or records. Each
fragment contains a subset of the rows in the table. This type of fragmentation is often used to
distribute data based on a specific criterion, such as customer location or department.
 Vertical Fragmentation:
Vertical fragmentation divides a table into subsets based on columns or attributes. Each
fragment contains a subset of the columns for each row. This approach is useful when different
subsets of columns are frequently accessed together or when certain columns are rarely
needed, improving storage efficiency.
 Hybrid Fragmentation:
Hybrid fragmentation combines both horizontal and vertical fragmentation to create more
flexible data distribution schemes. It allows for fine-grained control over which data is placed in
each fragment, optimizing query performance.

Data Replication
Data replication is a database management technique that involves creating and maintaining
multiple copies of data across distributed locations or nodes in a networked environment. This
redundancy is introduced for various reasons, including improving data availability, fault
tolerance, and performance. Here are some key aspects of data replication:
 High Availability: Data replication ensures that data is available even in the event of
hardware failures or network issues. If one copy of the data becomes unavailable,
applications can still access the data from another replica.
 Fault Tolerance: Replication enhances fault tolerance by providing backup copies of
data. If one replica fails, the system can continue to operate using other available
replicas.
 Load Balancing and Performance: Multiple replicas of data can be used to distribute
read and write operations, reducing the load on individual database servers and
improving overall system performance.
 Latency Reduction: By placing data replicas closer to the users or applications that need
those, replication can reduce data access latency. This is especially important for
distributed and geographically dispersed systems.
 Disaster Recovery: Replicated data can serve as a disaster recovery strategy. In the
event of a catastrophic failure or data corruption, backups in the form of replicas can be
used to restore the system.
 Consistency Models: Replication introduces challenges related to data consistency.
Different consistency models, such as strong consistency, eventual consistency, and
causal consistency, can be employed based on application requirements.
 Synchronization and Conflict Resolution: When multiple copies of data are updated
concurrently, conflicts can occur. Systems need mechanisms to detect and resolve
conflicts to maintain data integrity.

Ticket-Out
1. Explain data fragmentation and replication.
2. Name the types of architectural models in DBMS
SUBJECT: DATA PROCESSING
WEEK SEVEN
DURATION: 45 MINUTES
TOPIC: NETWORKING
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Explain the meaning of networking

2. Understand the computer network terms

3. State the classes of networks

CONTENT

Networking

Networking is the practice of linking or connection of two or more computing devices together
for the purpose of sharing data. Networks are built with a mix of computer hardware
and computer software.

Network Design

Computer networks also differ in their design. The two basic forms of network design are called
client/server and peer-to-peer. Client-server networks feature centralized server computers
that store email, Web pages, files and or applications.

Resources Shared on a Computer Network

1. Files/documents
2. Software
3. Printer
4. Scanner
5. Hard disk
6. Computers
Computer Network Terminologies

 A Network Topology: A network topology represents its layout or structure from the
point of view of data flow.
 Network Protocols: Communication languages used by computer devices are called
network protocol. Yet another way to classify computer networks is by the set of
protocols they support. Networks often implement multiple protocols with each
supporting specific applications. Popular protocols include TCP/IP, the most common
protocol found on the Internet and in home networks.
 The Internet: The Internet is the global system of interconnected computer networks
that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is A network of
networks that consists of private, public, academic, business, and government networks
of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies. The Internet carries an extensive range of information
resources and services, such as the inter-linked hypertext documents and applications of
the World Wide Web (WWW), electronic mail, telephony, and peer-to-peer networks
for file sharing.

Classes of Networks

Computer networks can be classified into

 Intranet
 Extranet

An intranet

An intranet is a private network that is contained within an enterprise. It may consist of many
interlinked local area networks and also use leased lines in the wide area network. Typically, an
intranet includes connections through one or more gateway computers to the outside Internet.
The main purpose of an intranet is to share company information and computing resources
among employees. An intranet can also be used to facilitate working in groups and for
teleconferences.

An Extranet

An extranet is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business‘s information or operations with
suppliers, vendors, partners, customers, or other businesses. An extranet can be viewed as part
of a company’s intranet that is extended to users outside the company. It has also been
described as a “state of mind” in which the Internet is perceived as a way to do business with
other companies as well as to sell products to customers.

Class Task

1. Define the computer networking.


2. What 4 resources can be shared on a computer network?
3. Explain what kind of network the internet is.

Ticket-Out

1. Differentiate between the two classes of networks.


2. Define network topology.
SUBJECT: DATA PROCESSING
WEEK EIGHT
DURATION: 45 MINUTES
TOPIC: NETWORKING 2
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Describe the architecture of DDBs.

CONTENT

Network Topology

A network topology is the pattern in which nodes (i.e., computers, printers, routers or other
devices) are connected to a local area network(LAN) or other network via links (e.g., twisted
pair copper wire cable or optical fiber cable).

There are four principal topologies used in LANs: bus, ring, star and mesh. The most widely
used of these is bus, because it is employed by Ethernet, which is the dominant LAN
architecture.

In a bus topology all devices are connected to a central cable, called the bus or backbone. This
topology is relatively inexpensive and easy to install for small networks.

In a ring topology each device is connected directly to two other devices, one on either side
of it, to form a closed loop. This topology is relatively expensive and difficult to install, but it
offers high bandwidth and can span large distances. A variation is the token ring, in which
signals travel in only one direction around the loop, carried by a so-called token from node to
node.

In a star topology all devices are connected directly to a central computer or server. Such
networks are relatively easy to install and manage, but bottlenecks can occur because
all data must pass through the central device.

The mesh topology can be either a full mesh or a partial mesh. In the full mesh,
each computer is connected directly to each of the others. In the partial mesh, some computers
are connected to most of the others, and some are connected only to those other nodes with
which they exchange the most data.

The several basic network topologies can be combined in various ways to form hybrid
topologies, such as a ring-star network or a tree network. The latter consists of two or more
star networks connected to a linear bus.

The word topology comes from the Greek words “topos” meaning place and “logos” meaning
study. It is a description of any locality in terms of its layout. Topology is a branch
of mathematics concerned with properties of geometric figures that are distorted without
tearing or bonding together.

Class Task

1. Topology is gotten from what two Greek words?


2. Name the 4 types of network topologies.
3. What is a hybrid topology? Give examples.

Ticket-Out

1. Explain the most common type of network topology.


2. What are the pros and cons of the ring topology?
WEEK NINE
DURATION: 45 MINUTES
TOPIC: NETWORKING 3
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Explain the various types of computer networking

2. State the importance of computer networking

CONTENT

Types of Networking

A personal area network-PAN

Definition: A personal area network-PAN- is a computer network organized around an


individual person. Personal area networks typically involve a mobile computer, a cell phone
and/or a handheld computing device such as a PDA. You can use these networks to transfer
files including email and calendar appointments, digital photos and music.

Local area network

A local area network (LAN) is a network that connects computers and devices in a limited
geographical area such as home, school, computer laboratory, office building, or closely
positioned group of buildings. Each computer or device on the network is a node.

Metropolitan area network

A Metropolitan area network (MAN) is a large computer network that usually spans a city or a
large campus.

Wide area network

A wide area network (WAN) is a computer network that covers a large geographic area such as
a city, country, or spans even intercontinental distances, using a communications channel that
combines many types of media such as telephone lines, cables, and air waves. A WAN often
uses transmission facilities provided by common carriers, such as telephone companies.
Client-Server Network

A client-server network is designed for end-users, called clients, to access resources such as
files, songs, video collections, or some other service from a central computer called a server.

A Peer-To-Peer (P2p) Network

In its simplest form, a peer-to-peer (P2P) network is created when two or more PCs are
connected and share resources without going through a separate server computer. A P2P
network can be an ad hoc connection—a couple of computers connected via a Universal Serial
Bus to transfer files.

Importance of Computer Networking


Computer networking is of paramount importance in the modern world, playing a crucial role in
various aspects of our personal and professional lives. Here are some key reasons why
computer networking is essential:
 Communication:
Networking allows individuals and organizations to communicate effectively. It enables email,
instant messaging, video conferencing, and other forms of real-time and asynchronous
communication.
 Information Sharing:
Networking enables the sharing of information and resources, making it easier for people to
access and collaborate on documents, files, and data from different locations.
 Data Transfer and Storage:
Networks facilitate the transfer of data between devices and the storage of data in centralized
servers or cloud-based systems. This is crucial for data backup, sharing, and retrieval.
 Internet Access:
Computer networks provide the infrastructure for internet access, which has become an
essential part of daily life for most people. It enables web browsing, online shopping, research,
and more.
 Business Operations:
Networking is critical for businesses to operate efficiently. It supports functions like inventory
management, customer relationship management (CRM), and enterprise resource planning
(ERP) systems.
 Remote Work:
In recent years, the importance of networking has been highlighted by the rise of remote work.
Networks allow employees to work from anywhere, accessing company resources and
collaborating with colleagues.
 E-commerce:
Networking is fundamental to e-commerce platforms, enabling online shopping, payment
processing, and secure transactions over the internet.
 Education:
Computer networks are essential for modern education. They support online learning
platforms, virtual classrooms, and access to educational resources from around the world.
 Entertainment:
Networks enable streaming services, online gaming, social media, and other forms of digital
entertainment. They connect people to a wide range of multimedia content.
 Research and Development:
Researchers and scientists rely on networks for data sharing, collaborative research, and access
to vast online databases and libraries.
 Healthcare:
Networking is critical in healthcare for sharing patient records, medical imaging, telemedicine,
and remote monitoring of patients.
 Transportation and Logistics:
The transportation and logistics industry depends on networks for tracking shipments,
managing fleets, and optimizing supply chain operations.
 Security:
Networking is essential for implementing security measures, including firewalls, intrusion
detection systems, and encryption, to protect data and prevent cyber-attacks.
 Smart Cities and IoT:
Networking forms the backbone of smart city initiatives, connecting various IoT devices and
sensors to collect data and improve urban services.
 Global Connectivity:
Networking connects people and organizations globally, fostering international collaboration,
trade, and cultural exchange.
 Disaster Recovery:
Networking plays a vital role in disaster recovery and business continuity planning, enabling
data backup and replication to remote locations.
In summary, computer networking is essential for modern society and the digital age. It
facilitates communication, collaboration, and access to information and services, driving
innovation, economic growth, and improved quality of life. Its importance is likely to continue
growing as technology advances and our reliance on digital connectivity deepens.

Class Task
1. Explain the following types of computer networks. (a) PAN (b) MAN (c) LAN

Ticket-Out
1. State 5 importance of computer networking.
SUBJECT: DATA PROCESSING
WEEK TEN
DURATION: 45 MINUTES
TOPIC: COMPUTER VIRUS
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. State the meaning of computer virus

2. State the types, examples and sources of computer viruses

CONTENT

Computer virus is a program intentionally written by some software developer to cause damage
to the computer, programs and files in which it found itself. The computer virus may be
designed to display unwanted messages.

The computer virus is a program that has the ability to replicates itself by changing other
programs to include a copy of itself. A virus causes the infected computer system to function in
ways not originally planned. The computer virus cannot be seen with your natural eyes yet the
effects can be notified on an infected system.

Types of Computer Virus

There are basically three ways in which a virus will infect your microcomputer.

1. Boot sector virus


2. Executable file virus
3. Document virus

Boot Sector

A boot sector virus infects hard drives and flash disks by making itself available on the boot
sector of the disk. Booting up from an infected flash disk can cause damage to the hard drive.

Executable file virus


They spread the infection by attacking the code to executable files (EXE.COM) in this way; the
virus program will be executable before the host program is executed.

Document Virus

A document virus can affect the document by moving from disk partition table to a different
sector and replace it with its own code, therefore infecting document as they are accessed.

Examples of Viruses

The following are example of computer virus:

1. Trojan horse
2. Sleeper
3. Logic bomb
4. Alabama virus
5. Christmas virus
6. Worm
7. Data crime virus
8. Jerusalem Virus
9. Barcelona virus
10. April 1st virus

Sources of Viruses

Virus infection can happen through the following:

1. Infected diskettes
2. Hard drive
3. Infected CD ROMS
4. Internet download
5. E-mail
6. Illegal duplication of software
7. Bad handling of computer

Ways of Preventing Computer Viruses


Preventing computer viruses is crucial to maintaining the security and integrity of your
computer systems and data. Here are several effective ways to prevent computer viruses:
1. Install Antivirus Software: Use reputable antivirus software and keep it updated. Ensure it
includes real-time scanning and automatic updates to detect and remove viruses.
2. Keep Operating Systems Updated: Regularly update your computer's operating system (e.g.,
Windows, macOS, Linux) to patch vulnerabilities and fix security issues.
3. Update Software and Applications: Keep all software and applications, including web browsers,
office suites, and media players, up to date. Vulnerabilities in outdated software can be
exploited by viruses.
4. Enable Automatic Updates: Enable automatic updates for your operating system, software, and
antivirus program to ensure you receive the latest security patches.
5. Use a Firewall: Enable a firewall on your computer to monitor and block suspicious incoming
and outgoing network traffic. Many operating systems come with built-in firewalls.
6. Be Cautious with Email: Be wary of email attachments and links from unknown or suspicious
sources. Never open attachments or click on links from unsolicited or unexpected emails.
7. Download from Trusted Sources: Only download software and files from reputable sources.
Avoid downloading cracked or pirated software, as they often contain malware.
8. Secure Your Web Browsing: Use a secure web browser and enable pop-up blockers. Be cautious
when visiting websites and avoid clicking on suspicious ads or links.
9. Implement User Account Controls: Use non-administrator accounts for everyday computing
tasks. Administrative privileges should only be granted when necessary to install or modify
software.
10. Regularly Backup Data: Backup your data regularly to an external device or cloud storage. In the
event of a virus infection or data loss, you can restore your files.
11. Use Strong Passwords: Create strong, unique passwords for your accounts and change them
regularly. Consider using a password manager to generate and store complex passwords.
12. Enable Two-Factor Authentication (2FA): Whenever possible, enable 2FA for your online
accounts. This adds an extra layer of security beyond passwords.
13. Educate yourself and others: Stay informed about the latest virus threats and educate yourself
and your family or colleagues about safe online practices.
14. Use Email Filtering: Employ email filtering and spam protection to reduce the likelihood of
malicious emails reaching your inbox.
15. Secure Your Wireless Network: Secure your Wi-Fi network with a strong password and
encryption. Limit access to authorized devices.
16. Disable Unnecessary Services: Disable unnecessary services and ports on your computer to
reduce potential attack surfaces.
17. Regularly Scan for Malware: Conduct regular malware scans with your antivirus software to
detect and remove any potential threats.
18. Be Cautious with USB Drives: Be cautious when using USB drives or external storage devices.
They can carry malware if used on infected computers.
19. Stay Informed: Stay informed about the latest cyber security threats and best practices for virus
prevention by following reputable cyber security blogs and news sources.
Remember that no security measure is foolproof, so it's essential to maintain a proactive and
layered approach to computer virus prevention. Combining multiple security practices and
regularly updating your knowledge is key to protecting your computer and data from viruses
and other malware.

Class-Task

1. What is a computer virus?


2. List ten (10) examples of computer viruses you know.

Ticket-Out

1. Explain how a computer virus can infect your computer.


2. List and explain three sources of viruses.
SUBJECT: DATA PROCESSING
WEEK ELEVEN
DURATION: 45 MINUTES
TOPIC: MAINTENANCE OF COMPUTER
INSTRUCTIONAL MATERIALS: CLASSIC COMPUTER STUDIES BOOK 1, TUTORIAL VIDEOS &
PICTURE MATERIALS
OBJECTIVES: at the end of the lesson, learners should be able to:
1. Perform simple hardware and software maintenance

CONTENT

Hardware Maintenance

Maintenance of computer hardware is a way of taking care, repairing and replacing broken and
failing computer hardware.

Maintenance is necessary on computer to avoid hardware failure or loosing valuable


information and most times, hardware breaks without notice. Excess heat accelerates the
deterioration of the delicate circuits in the system. Dust and dirt are the most common cause of
overheating. Thus, cleaning a case is done to prevent components from overheating.

Computer hardware components attract dust, dirt, lint, carpet fibers, pet hair and smoke
particles. The air from the computer cooling fan contains grime which settles on the
components and causes overheating which eventually results in permanent hardware failure.

As a result of this, complete cleaning should be done at least once a year and if the computer is
used in hot, dusty moist environment, cleaning must be performed more frequently.

Process of Maintaining Computer Hardware

General Computer Cleaning

Step 1: Always shut down, power off the system before carrying out
any computer maintenance.
Step 2: Never sprays any liquid onto any computer component. Spray or pour the liquid on a
lint – free cloth and wipe the PC with the cloth. Avoid product with certain cellulose which will
leave streaks on your computer equipment. The use of paper towels or an old rag to clean
delicate surfaces of a computer should be discouraged because paper products contain
cellulose which can scratch delicate surfaces of your hardware.

Step 3: Use vacuum cleaner to remove dirt, dust, food and hair from keyboards.it is advisable to
wear an anti – static wrist strip to reduce the transfer of static electricity from the body to
the computer.

Step 4: Do not apply cleaning solution including water directly to computer components.

Step 5: Do not use your breath to blow the dust off the components because your breath
contains moisture and the components are not built to be rust- proof.

Step 6: Sometimes, it is necessary to replace fans or physically wipe


some computer components.

Step 7: Do not use anything wet or damp inside the computer case.

Step 8: Do not let any component or circuit board inside the computer case get wet or damp.

Step 9: Do not attempt to clean the motherboard with a cloth as it may damage the electrical
components. Use a slightly moist cloth to wipe off dust and grime inside the computer case.

Step 10: Do not allow any drink around the machinery.

Step 11: Avoid vibrations and shocks.

Tools for Cleaning Computer Hardware

1. A clean non-abrasive cloth such as microfiber, cotton, T-shirt, cotton handkerchief should be
used and avoid using paper towels, dish towels, facial tissue, old rag.
2. Portable vacuum.
3. Appropriate cleaning solution.
4. Cotton swabs.
5. Foam swabs.
6. DVD or CD-ROM cleaner.

How to Clean Your Mouse


Step 1: Disconnect the mouse cable from the back of the computer case.

Step 2: Lightly dampen a cleaning cloth with isopropyl alcohol and wipe down the outside of
the
computer mouse a mouse pad.

Step 3: Remove the bottom cover of the mouse. To this, turn it over and note the directional
arrows that indicate the direction of rotation, or how to slide it off. Press with your fingers in
the direction of the arrows and then turn the mouse right side up, letting the cover and mouse
ball drop into your hand.

Step 4: Wipe the computer mouse ball with a lint-free cloth dampened with isopropyl alcohol.
Put it aside.

Step 5: Dampen a swab with isopropyl alcohol and clean between, around and on top the keys.
Change swabs as they become dirty. You may need several swabs.

Step 6: Replace the mouse ball and cover.

Step 7: Wipe the mouse cord. Lightly dampen a cleaning cloth with mild soap solution and
gently pull the cord through the cloth.

Step 8: Plug the mouse back into the computer.

How to Clean Your Monitor

Step 1: Unplug the power supply cord and cable from the back of the monitor and allow it to
cool for at least 20 minutes.

Step 2: Vacuum the outside of the monitor, particularly the cooling grooves, holes or slots in
the top surface where heavy dust or other debris may have collected. Blow compressed air in
short puffs at an angle to the monitor surface. The goal is to remove dust and dirt without
letting anything fall into the ventilation holes.

Step 3: Lightly dampen a cloth with a mild soap solution and wipe down the outside plastic
portions of the monitor.

Step 4: Clean the monitor cables and power cord while they are disconnected. Lightly dampen a
cloth with mild soap solution and gently pull the cables and cords through the cloth.

Step 5: Check the documentation or call the manufacturer to find out if your monitor screen
has anti-glare, or other delicate coatings. If so, ask the manufacturer or cleaning instructions. If
it does not have these special coatings you may spray a window cleaner unto a lint-free cloth
and wipe it clean. Do not spray directly onto the screen. Chemicals may drip inside the monitor
and damage it.

Step 6: For dusty or dirty manufacturing environments use a computer dust cover to protect
the monitor

How to Clean a Keyboard

Step 1: Remove the cable from the back of the computer case.

Step 2: Use a vacuum cleaner to remove debris between the key. If no vacuum is available, turn
the keyboard upside down and gently tap on the back side dislodge debris.

Step 3: Aim between the keys and compressed air to remove remaining dust and debris. Use
short puffs of air applied at about a 30-45 degree angle to the keyboard surface. Alternate
between blowing the keys and tapping the keyboard upside down to dislodge particles until it is
clean.

Step 4: Lightly dampen a cloth with a mild soap solution and wipe down the outside of the
keyboard. Do not spray soap solution directly onto the keyboard.

Step 5: Dampen a swab with isopropyl alcohol and clean between, around and on top of the
keys. Change swabs as they become dirty. You may need several swabs.

Step 6: Wipe the keyboard cord. Lightly dampen a cleaning cloth with mild soap solution and
gently pull the cord through the cloth. Dry the cord with a dry cloth.

Step 7: For dusty or dirty manufacturing environments a good keyboard cover is recommended.

Battery Charging and Replacement

This can be divided into two types which are:

1. Battery charging and replacement for laptop

2. Battery charging and replacement for PC that used UPS.

How to Charge a Laptop Battery

1. Plug your laptop into the socket and you can leave it there whenever possible.
2. You can recharge your laptop’s battery whether the battery is fully drained or not.
3. There is no need to fully drain your laptop’s lithium-ion battery every time you use it.
4. Lithium-ion battery have a rapid-charging option. This option is available either on a custom tab
inside the Power Option dialog box or from special battery software that came with your
laptop.
5. Do not over charge the battery, charge the battery when is getting low between 20%- 10% and
do not dry the battery.

FOR PC THAT ARE USING UPS

1. The battery needed to be fully charge before use at least for 4 to 6 hours.
2. Ensure that the UPS is kept in contact to its electrical ground at all times. Do not over load
3. Do not let the UPS shut down by itself because it can damage battery.

How to Clean A DVD Drive

1. Purchase DVD laser cleaning kit. The kit is comprised of a single disc that is design to spin in
your drive and remove all dust from the lens.

2. Place the CD/DVD laser lens cleaning disc inside your DVD drive’s tray. Close the tray and
allow the CD spin in the drive. As it spins, it will clear your lens of most, if not all, of the dust
that is on it.

3. Purchase a can of spray air. As an extra precaution, open your drive’s disc tray and gently
spray a can of spray air into it. This will remove any of the big pieces of dust that may be lurking
inside the tray.

SOFTWARE MAINTENANCE

The maintenance of programs inside the computer system such as virus, a spyware removal,
backup software and a registry removal, cleaner. Every PC should be installed with an anti-virus,
a spyware removal application back up and a registry cleanser.

Some helpful Tips

1. Always scan your system once a week.


2. The hardware should also be defragmented at least once a month.
3. Delete all temporary files and cookies at regular interval.

Types of Software Maintenance


1. CORRECTIVE MAINTENANCE: This type of maintenance involves developing and deploying solution to
problems that occur during usage of a software program. For instance, when an error message comes
up on the screen or program is hanging or freezing or crashing, this implies that corrective software
maintenance is needed. A computer programmer is employed to work on a more permanent solution to
the problems.

2. PERFECTIVE MAINTENANCE: This is a measure taken by computer programmer to upgrade the way a
software programs function or how fast it processes, requests, develop software menu layouts and
command interface so as to ensure that the program has zero tolerance for flaws.

3. ADAPTIVE MAINTENANCE: It takes care of the changes that occur in software development. For
instance, if there is a change in processors speed, thus change will invariably affect how the software
performs on a single computer software interfaces with other software programs. So changes in one
program necessitates changes in other programs.

4. PREVENTIVE MAINTENANCE: This is a situation whereby computer programmers try to prevent


problems with software programs before they occur. They seek to prevent corrective maintenance as
well as anticipating adaptive maintenance needs before users encounter problems. This is done by test
running their programs to ensure that the software can handle high data loads and other stressful
operation without difficulties. Computer programmers also ensure compatibility by testing the software
with other programs users that are likely to use their software. Preventive maintenance activities
include the following:

a. Installing anti-virus protection software and update


b. Install firewall on your computer
c. Keep computer registry up to date.
d. Make sure your operating system is up to date
e. Delete cookies

Benefits of Software Maintenance

1. It promotes fully functional and highly reliable computer.


2. It corrects faults
3. If preventive maintenance operations are carried out regularly, a PC will never run slowly or
have programs that changes or freezes the computer.
4. It improves performance.
5. When a PC is protected and maintained by S/W clean-up programs, the hard drive will not be
slow and fragmentation will hardly occur.
6. Registry cleaning.
7. Problems due to lack of maintenance are reduced.
Routine Computer Maintenance

Routine Computer Maintenance consists of tasks performed on computer daily, weekly or


monthly in order to keep the computer running efficiently for a long time.

1. Disk cleaning should be done weekly to get rid of “trash”.


2. Defragmentation- Run defrag which is located in terms tools to pull those fragments into one
location.
3. Always update your system
4. Back up with external hard drive and back-up software.
5. Physical maintenance, i.e., regular physical cleaning of the hardware components should be
observed.
6. Internet Security: Always run full updated antivirus program when using the internet and also
perform full system scan with your anti-virus program. It is ideal to run a firewall to block
potential threats.
7. Patches and updates: They are regularly released by software companies to
tackle security problems found in the programs. System administrators and network
technicians should regularly download and apply these updates to ensure that their computers
and their networks are protected from hackers, viruses and network intrusions.
8. Apply repair functions.

Computer Maintenance Tips

1. Never turn your computer off with the power switch on until window has shut down.
2. Get a UPS (Uninterrupted Power Supply) for your computer.
3. Back up your data to external hard drives, DVD/ CD ROMS, USB/ drives, memory card etc.
4. Run scan disk and defragment at least once in a month.
5. Never unplug peripheral from the computer when it is on.
6. Ensure that you have 300 mbs or 500-600 mbs of free space on your C Drive for window XP,
Vista, or Window 7.
7. Do not allow a lot of programs to load up when you start your computer.
8. Use anti-virus checker regularly.
9. Use a firewall program for a high speed internet connection.
10. Keep track of the software disk you receive with your computer and new peripheral.
11. Make sure window update is set.

Class Task

1. Which of the following is not a software maintenance? a) Virus b) Spyware c) Hard disk d) Registry
removal

2. The software maintenance that involves developing and deploying solutions to problems is .……… a)
corrective b) adaptive c) preventive d) perfective

3. The software maintenance that takes care of the changes that occur in software maintenance is called
……… a) adaptive b) corrective c) perfective d) preventive

4. Disk cleaning should be done ……….. a) hourly b) daily c) weekly d) yearly


5. Patches and update are regularly released by software companies to tackle security problems found in
…………. a) programs b) hardware c) people ware d) peripheral

6. Maintenance is necessary on computer to avoid ………. (a) Hardware failure b) stealing c)


invasion d) crime
7. Excess heat accelerates the deterioration of the delicate ……… in the system. a) Vacuum b)
transistors c) circuits d) particles
8. Dust and dirt are the most common cause of ……… a) leakage b) overheating c) breakage d)
spooling.
9. ……….. Is used to remove dust, dirt and hair from the keyboard. a) Vacuum cleaner b) Brush c)
Old rag d) Paper towels
10. It is advisable to wear a ………… to reduce transferring static electricity from your body to
the computer. a) Hand glove b) anti – static wrist strip c) coat d) dust cover

Ticket-Out

1. State the steps involve in maintaining a computer hardware


2. Mention six tools used in cleaning computer hardware
3. Discuss the four types of software maintenance.
4. State five benefits of software maintenance.
5. State five routine computer maintenance.
6. State six computer maintenance tips.
7. Explain the steps in cleaning the following: (i) Mouse (ii) Keyboard (iii) Monitor (iv) DVD drive
lens

You might also like