0% found this document useful (0 votes)
131 views13 pages

Obasa's Blog - Ss2 Data Processing Note First Term (2019-2020 Session)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views13 pages

Obasa's Blog - Ss2 Data Processing Note First Term (2019-2020 Session)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)

More Create Blog Sign In

Obasa's blog
A blog on Computer/Data Processing Education, Motivation for Students, Technology info, Business Ideas,
Job/Vacancy opportunities, General Information and News.

Home Educational Business Technology Job/Vacancy Information Motivational

Friday 13 September 2019

SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)

SCHEME OF WORK

WEEK TOPIC

1 Writing of scheme of work

2 COMPUTER ETHICS
· Definition of Computer ethics
· Definition of computer room management ethics
· Computer ethics issues
· Responsible ways of using the Computer
· Ways of misusing the computer

3 SAFETY MEASURES
· Meaning of safety measures
· Safety measures to be taken when using computer

4-5 DATA MODEL


· Definition of Data model
· Types of data model

6-7 DATA MODELLING


· Definition of Data modelling
· Approaches to data model
· Data modelling using MS Access

Search This Blog


8-9 NORMAL FORM
Search
· Definition of Normalization
· Goals of normalization
About Me
· Types of normal forms
Obasa Mustapha
· Problems with first normal form
I'm an InfoTech crazy dude
and Computer enthusiast. I
TOPIC ONE: COMPUTER ETHICS love writing about trends in
technology, entertainment,
Computer ethics is a term used to describe the principles of right and wrong that are acceptable
sport and news. I'm an Arsenal fan. I love
when using computer system and related technologies. playing and watching football especially
Computer room management ethics can be defined as the appropriate way of handling and taking Arsenal and Barcelona.
good care of computer and associated resources within the computer room. View my complete profile
Computer ethic issues

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 1/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
1. Plagiarism – presenting someone’s work (hard copy, softcopy) as your own. My Archive
2. Copyright violation: violation of the legal rights to an original work (e.g. software, ebook etc.) ► 2023 (2)
is a common ethical dilemma in our society.
► 2022 (2)
3. Privacy infringement: having unauthorized access to data of an individual is a privacy
► 2021 (1)
infringement which is liable to jail term.
4. Netiquette: Netiquette is the short for “internet etiquette”. It is the set of social rules about ► 2020 (3)
the proper and polite way to communicate when using the internet. Some of the common ▼ 2019 (2)
guidelines here are:
▼ Sept 2019 (1)

a. Email – when using email, if you don’t know the source of the email, make sure you: SS2 DATA PROCESSING NOTE FIRST
TERM (2019-2020 SES...

Don’t reply to the email ► May 2019 (1)


Don’t click the (malicious) attachment
► 2018 (7)
Don’t click the dangerous links in the email that could download malware to
your system. ► 2017 (3)
► 2016 (3)
b. Don’t click on any link or online ad (advertisement) that you are not sure of the source ► 2015 (2)
c. Do not reveal your sensitive information online
► 2013 (1)
d. Don’t just download any free software if you are not sure of the security of the website
e. Keep your username and password to yourself; don’t be deceived to sharing this vital ► 2012 (1)
information (not even to your friend)
f. Think twice before posting that message because whatever you post online stays online
Labels
and can affect your personal or professional life in the future
g. Install antivirus protection before going online, it’s important for your online safety. Business (2)
Educational (17)
Responsible ways of using the computer Information (5)
Installing antivirus on the computer and regularly update it Jobs/Vacancy (2)
Checking and respond to emails promptly and politely Motivational (2)
Avoid using the computer to send anonymous emails/messages Technology (7)
Take regular backups of files/data
Report Abuse
Ways of misusing the computer Total Pageviews Followers
Followers (38)
1. Hacking – using computer knowledge to have unauthorized access to files and information Next
2. Pornography- using computer or internet to watch or distribute pictures and videos that are
sexually explicit.
2 7 5
3. Fraud – using the internet to fraudulently swindle unsuspecting victims of money or valuables 7 2 7
e.g. yahoo yahoo
4. Spreading malicious software into networked computer
5. Using the computer to send discriminatory, harassing and threatening messages

Assignment: List 10 Computer room rules and regulations.

TOPIC TWO: SAFETY MEASURES


Safety measures are the precautions or actions taken to ensure protection from or not being
exposed to, the risk of illness, or injury from the use of computer and related equipment within a
computer environment.

The following are some of the safety measures/guidelines:

1. There should be appropriate ventilation in the computer room


2. Use surge protector to protect your computer against power surge and spikes
3. Unauthorized access to computer should be restricted by putting passwords on computer or
by encrypting the files
4. Using anti-glare screen protector to cover the monitor in order to reduce strain to the eyes
5. Ensure good working posture when using the computer
Follow
6. Ensure you install and regularly update antivirus software to guard against malware
7. Make sure you regularly backup your files on external storage media
8. Avoid repairing computer components or devices esp. CRT monitor to avoid electrocution.

Computer related health problems and solutions

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 2/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
1. Eye strain and vision problem – continuous staring at the monitor without taking breaks can
cause eyestrain which weakens the sight.
Precautions/solution
Use anti-glare glasses to cover the monitor
Take regular short breaks from sitting in front of the computer

2. Low back pain – this is as a result of wrong sitting posture adopted when you use the computer.
The risk increases when this happens regularly over a long period.
Precaution/solution

1. Use a proper chair that support your back and lower back
2. Sit up straight. Do not slouch
3. Regular exercises at least five times a week to strengthen your back muscle
4. Using a lumbosacral belt as a precautionary and preventive measure will help prevent this
problem

3. Carpal tunnel syndrome – regular typing and use of mouse over prolonged periods is a major risk
factor of the risk called Carpal tunnel syndrome. Tingling and numbness, pain and loss of strength of
the affect wrist, fingers and hands are symptoms.
Precautions/solution

1. Exercises for the wrist will help and take regular breaks
2. Do not hold the mouse tightly.

4. Cervical spondylosis (neck and shoulder problem) - reading from the monitor screen or typing
over a prolonged periods regularly is a risk factor that can over time cause cervical spondylosis
Precaution/solution

1. Wear a cervical collar during your computing hours, this will keep the neck and shoulder
muscles strong
2. Neck and shoulder exercise two to three times a day will keep the neck and shoulder muscles
strong

TOPIC THREE: DATA MODEL

A model is like a blueprint of a more complex real-world object or event.


A data model is a picture or description which shows how data is to be arranged to serve a specific
purpose.
A data model defines how data is connected to each other and how they are processed and stored
inside the system.
A data model documents and organizes data, how it is stored and accessed, and the relationships
among different parts of data.
TYPES OF DATA MODEL

1. Flat file model: A flat data is a type of database that stores data in a single table. Flat file
databases are generally in plain-text form, where each line holds only one record. The fields in the
record are separated using delimiters such as tabs and commas

2. Hierarchical model: In this model, data is organised into a tree like structure. The data is stored
as records which are connected to one another through links. In a hierarchical model, each child
record has only one parent, whereas each parent record can have one or more children. At the top
of hierarchy there is only one entity which is called Root. In order to retrieve data from a
hierarchical database the whole tree needs to be traversed starting from the root node.

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 3/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)

3. Network model: In the network model, data records are organised in a graph, in which some
records can be accessed through several paths. This model organizes data using two fundamental
constructs, called records and sets. Records contain fields, and sets define one-to-many
relationships between records: one owner, many members.

4. Relational model: In this model, data record is organised in two-dimensional tables called
relations. The tables or relations are related to each other. Each table is made up of rows and
columns and a table stores records about a particular subject. Relational data models are used in
IBM’s DB2, Informix, Oracle, Sybase, Paradox, FoxBase, Teradata).

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 4/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)

5. Entity-relationship model: this model is based on the notion of real world entities and
relationships among them. ER model is based on:
Entities and their attributes
Relationships among entities

In ER modeling, the structure for a database is portrayed as a diagram called an entity-relationship


diagram (or ER diagram). An example is shown below

TOPIC FOUR: DATA MODELLING

Data modelling is the process of creating a data model for an information system by applying certain
formal techniques

APPROACHES TO DATA MODEL


The three approaches to data model are:

1. Conceptual data model


2. Logical data model
3. Physical data model

Conceptual data model: This is the first stage of database design. A conceptual data model
identifies the highest-level relationships between different entities. In a conceptual data model, the
following steps are taken:

1. Specify the important entities and the relationships among them


2. No attribute is specified
3. No primary key is specified

Logical data model: This is the second stage in database design. A logical data model describes the
data in as much details as possible, without regard to how they will be physically implemented in
the database. In a logical data model, the following steps are taken:

1. Specify primary keys for all entities


2. Find the relationships among different entities
3. Find all attributes for each entity
4. Resolve many-to-many relationships
5. Normalization

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 5/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)

Physical data model: Physical data model is the transformation of the logical database into the
actual database. Physical data model represents how the model will be built in the database. A
physical database model shows all table structures, including column name, column data type,
column constraints, primary key, foreign key and relationships between tables. The steps for
physical data model design are as follows:

1. Convert entities into tables


2. Convert relationships into foreign keys
3. Convert attribute into columns
4. Modify the physical data model based on physical constraints/requirements.

CREATING LIBRARY DATABASE


The following table information will be used to create a Library database:
Author (AuID, AuName, AuPhone, Address,)
Book (ISBN, title, PubName, Category, AuID, Price)
Publisher (PubID, PubName, PubPhone, AuID, ISBN)

To create the “library” database, follow the following steps:


Click on the Start button on the Taskbar
Point to All Programs
Select Microsoft Office
Click Microsoft Access 2010
Click on Microsoft Office button/File tab
Click New
Click the New Blank Database icon
Type “Library” as the database name in the File Name box
Click Create. Microsoft Access window will be displayed.

Table
A table is the first and the most important object to be added to a database. It stores data about a
particular subject such as Authors or Books. It consists of records and fields. Each record contains
data about one instance of the table subject, such as a particular author. Each field contains data
about one aspect of the table subject, such as AuthorName, AuthorPhoneNumber, etc. A field is also
commonly called a column or an attribute. A record consists of field values.
Field property
Field property applies to a particular field in a table and defines one of the field’s characteristics or
an aspect of the field’s behavior.
Data types
A field data type indicates the kind of data that field stores or accepts. If the field name holds
numeric value, the data type will be Number. Some of the data types include text, autonumber,
number, memo, date/time, currency, Yes/No, Attachment, etc. Refer to your SS1 3rd term note
for the explanation.
Table relationships
Although each table stores data about a different subject, tables in a database store data about
subjects that are related to each other. Before storing data about different subjects in separate
tables, you need a way to link them together so that you can easily combine related data from
those separate tables. To connect the data stored in different tables, you create relationships. A
relationship is a logical connection between two tables that specify fields that the tables have in
common.

Key : A key is a minimal set of attributes whose values uniquely identify an entity in the set. A key
consists of one field, but may consist of more than one field (i.e. Composite key).
Primary key: A primary key consist of one or more fields that uniquely identify each record that you
store in the table. Consider the Student table; the AdmissionNumber field is the primary key of the
Student table.

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 6/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
Foreign key: A foreign key contains values that correspond to values in the primary field of another
table. For example, consider the table information below:
Author (AuID, AuName, AuPhone, Address,)
Book (ISBN, title, PubName, Category, AuID, Price)

In the Author’s table information above, AuID field is the primary key but a look at the Book’s table
information, AuID field is also part of its attributes. Here AuID field is a foreign key of the Books
table. The similarity of values between key fields forms the basis of a table relationship.

Differences between primary and foreign key


Primary key Foreign key
The field used for primary key cannot be empty Field can contain a null value
(null)
A table cannot have more than one primary key A table can have more than one foreign key
value value
Primary key uniquely identify rows in a table Foreign key create relationship between two
tables
The primary key for each table is stored in an Index is not automatically created for a foreign
index key

Creating Book table


When already on the Microsoft Access window

1. Click the Create tab, then click Table.


2. Click View, then select Design View.
3. In the window that shows, type Books in the Table name box and click ok.
4. On the first row of the Field Name title, type ISBN for the first field name of the Books table
to replace the highlighted ID, click inside Data type and select Text for the ISBN field
5. Click the second row, type Title for the second field name and select Text for its data type.
6. Click the third row, type AuID for the third field name, and select Text as the data type.
7. Click the fourth row, type Price for the fourth field name, and select Text as the data type.
8. Save your work, select View and choose Datasheet View to take you to the datasheet view
where you can insert your records.

Creating the Authors and Publishers Tables


To add other tables, do the following:

1. Click the Create tab on the menu bar, select Table, another table will be added to the
database.
2. Follow step 4 to 8 above to define the table fields and the data type.
3. Follow the process to create the Authors and Publishers tables.

Forms
A form is another database object that provides a convenient way to enter and view records in a
table.
Queries
A query is a database object that enables you to locate records that match specified criteria by
providing a way for you to ask a question about the information stored in a database table.
Report

A report is a database object that allows you to organize, summarize, and print all or a portion of
the data in a database.

TOPIC FIVE: NORMAL FORM


Normalization is the set of guidelines used to optimally design a database to reduce redundant data.
Normalization is a database design technique which organizes tables in a manner that reduces
redundancy and dependency of data.
A database that is not normalized may include data that is contained in one or more different tables
for no apparent reasons. Normalization is achieved by applying a number of tests called normal
forms to tables.
https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 7/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
Goals of normalization
The goals of normalization are:

1. Eliminating data redundancy i.e. duplication of data


2. To minimize or avoid modification issues
3. To simplify queries

Normal form
Normal form is the way of measuring the level, or depth, to which a database has been normalized.
The most common normal forms are:

1. First normal form (1NF)


2. Second normal form (2NF)
3. Third normal form (3NF)

Other normal forms are Boyce /Codd normal form (BCNF), 4th normal form and 5th normal form.

Note: Each subsequent normal form depends on the normalization steps taken in the previous
normal form. The 3NF is sufficient for most typical database applications.
First normal form (1NF)
A database table is said to be in 1NF if:
It contains no repeating or duplicate fields/columns (i.e. each column name should be
unique)
No data in a columns is multi-valued (i.e. each data field is single value)
Each row of data has a unique identifier (or Primary Key)
The attribute domain remains the same (i.e. age value cannot be in the name column)

For example, consider the un-normalized table below:


Item Colour Price Tax
T-shirt Red, Blue 12.00 0.60
Polo Red, Yellow 12.00 0.60
T-shirt Red, Blue 12.00 0.60
Sweatshirt Blue, Black 25.00 1.25
Pant White 6.00 0.30
Table1: Un-normalized table
The table above is not in a first normal form because:
Multiple items in color field (i.e. red and blue , red and yellow etc)
Duplicate records/no particular primary key (i.e. row1 and row3)

So, how do you convert the table above into 1NF?


Delete one of the duplicate records (i.e. row1 or row3)
Expand the remaining rows such that each column has a single value

The resulting table now in 1NF is shown below.


Item Colour Price Tax
T-shirt Red 12.00 0.60
T-shirt Blue 12.00 0.60
Polo Red 12.00 0.60
Polo Yellow 12.00 0.60
Sweatshirt Blue 25.00 1.25
Sweatshirt Black 25.00 1.25
Pant White 6.00 0.30
Table 2: 1NF table

Problems with tables in first normal form (1NF)


Insert anomalies: An Insert Anomaly occurs when certain attributes cannot be inserted into the
database without the presence of other attributes. Suppose a new item has just been bought and is
to be added into the table and you do not know the tax applicable, it will be difficult to enter a few
item of information and not all, thereby leading to Insertion Anomaly.
Delete anomalies: A Delete Anomaly exists when certain attributes are lost because of the deletion
of other attributes. If the White colour of the item Pant is no more in stock, and we try to delete
‘white’ from the colour column, then we will be forced to remove the item Pant, the price and the
tax as well since the entire row will be deleted

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 8/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
Update anomalies: An Update Anomaly exists when one or more instances of duplicated data are
updated, but not all. For example, if the tax applicable to the price 12.0 changed, then we will
have to update all the rows where there is 0.60, else data will become inconsistent i.e. there will
be different tax value for the price 12.0 in different rows.

Second normal form (2NF)


A database table is in a 2NF if and only if:

1. It is in 1NF and
2. Every non-key attribute is fully functionally dependent on the primary key i.e. there should
be no partial dependency in the table

Consider the Table 2 above, the non-key attributes are colour, price and tax. The attribute item is
the primary key. The price and the tax are functionally dependent on the item and not on the colour
i.e. the item determines the price and not the colour.

So what do you do to normalize into 2NF?


Decompose the 1NF table and set up a new relation (table) for each partial key with its dependent
attributes. Make sure to keep a table with the original primary key and any attributes that are fully
functionally dependent on it.

Having decomposed the above table, the tables below are now in 2NF

Third normal form (3NF)


The third normal form's objective is to remove data in a table that is not dependent on the primary
key.
A database table is said to be in 3NF if:
It is in a 2NF
All non-key field depend only on the primary key – no transitive dependency (i.e.
Eliminate all fields that do not depend on the primary key by moving them into a
separate table)

Tables 2NF(b) is not in third normal form because Tax depends on price, not item.
To normalize to 3NF, decompose the table and set up a new table that includes the non-key
attribute(s) i.e. price, that functionally determine(s) other non-key attribute(s) i.e. tax

The tables below are now in 3NF.

at September 13, 2019

Labels: Educational, Technology

22 comments:

Unknown 22 September 2019 at 16:04

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 9/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
Nice
Please can you post ss1 and ss3 computer first term and some questions
Reply

Replies

Obasa Mustapha 24 September 2019 at 21:56


Check through the education tab on the blog, you will see the computer
notes for SS1 and SS2

Reply

SIRJOE 22 September 2019 at 22:13


good job
Reply

Replies

Obasa Mustapha 24 September 2019 at 21:56


thank you

Reply

Unknown 24 September 2019 at 17:18


Nice one
Reply

Unknown 25 September 2019 at 11:59


so grateful thanks a million
Reply

Enoch 26 February 2020 at 08:01


Appreciate sir
Reply

Unknown 13 November 2020 at 12:48

Good day sir, I really want to appreciate you for your good work... May God continue to
enrich you...
Pls I want to request for data processing ss3 first-third term.. Thanks in advance
Reply

Unknown 17 November 2020 at 10:02


thank you sir .. you just saved me from alot of stress... God bless you Sir
Reply

Unknown 3 December 2020 at 06:25

Thank you so much continue the good work God is your strength. Pls I want to
download s s 2 data processing note but no link to do that is I need it
Reply

admin 31 December 2020 at 09:56


https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 10/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
Pls I want to request for data processing ss3 first-third term.. Thanks in advance rose
day wishes
Reply

Unknown 31 January 2021 at 18:09


thanks Sir
Reply

OAU 4 July 2021 at 11:23


With all of my heart i pray GOD BLESS YOU FOR THIS POST
Reply

Unknown 16 October 2021 at 15:00

So explanatory. God bless you Sir

Reply

KITS Technologies 29 November 2021 at 08:31

nice post.
oracle dba online training
aws online training
r programming online training
Reply

Unknown 25 December 2021 at 06:52


Pls can you post s . S 2 second term data processing
Reply

Anonymous 4 October 2022 at 21:30


God bless you for this post, it has been really helpful. more Grace
Reply

Replies

Obasa Mustapha 14 October 2022 at 15:58


You are welcome

Reply

[email protected] 9 October 2023 at 22:44


Pls the significance of data model and example of standard data model for SS 2
Reply

Anonymous 17 May 2024 at 13:28


This is really wonderful.
Reply

Anonymous 23 September 2024 at 12:27


God bless you sir. Please can I get ss3 data processing

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 11/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)
Reply

Anonymous 28 September 2024 at 12:09

It is good
Reply

Enter comment

Newer Post Home Older Post

Subscribe to: Post Comments (Atom)

ICT APPLICATIONS IN EDUCATION

ICT refers to information and communication technology and is defined as an umbrella term that
includes any communication device or applicat...

POPULAR POSTS

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 12/13
10/23/24, 6:18 AM Obasa's blog: SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)

SS2 DATA PROCESSING NOTE FIRST TERM (2019-2020 SESSION)


SCHEME OF WORK WEEK TOPIC 1 Writing of scheme of work 2 COMPUTER ETHICS ·
Definition...

SS2 COMPUTER FIRST TERM 2017/2018 SESSION


SCHEME OF WORK WEEK TOPIC 1 Introduction/Scheme of work 2 Central Processing
Unit (CPU) · ...

SS3 COMPUTER STUDIES FIRST TERM 2020/21 SESSION


SCHEME OF WORK FOR FIRST TERM WEEK TOPIC 1 · REVIEW OF LAST TERM
EXAM QUESTION · ...

SS2 SECOND TERM DATA PROCESSING NOTE


WEEK TOPIC 1 Writing of scheme of work/Revision 2-3 ENTITY-RELATIONSHIP MODEL
· Defini...

COMPUTER STUDIES (SS 1)


Scheme of work Week Topic 1 Writing the scheme of work/introduction 2-3
OVERVIEW OF COMPU...

SS2 COMPUTER STUDIES (THIRD TERM) 2017/18 SESSION


SCHEME OF WORK FOR THIRD TERM WEEK TOPIC 1 · REVIEW OF 2ND TERM EXAM
QUESTION · WRITING THE SCHEM...

SS1 COMPUTER STUDIES 3RD TERM (2016/1017 ACADEMIC SESSION)


SCHEME OF WORK COMMUNICATION SYSTEMS APPLICATION AREAS OF ICT BASIC
COMPUTER OPERATIONS WORD PROCESSING PRESENTATION PACKAGES ...

Obasa Mustapha. Travel theme. Powered by Blogger.

https://basmust4real.blogspot.com/2019/09/ss2-data-processing-note-first-term.html 13/13

You might also like