0% found this document useful (0 votes)
25 views14 pages

SS2 DATA Wk1 4

The document outlines the curriculum for Data Processing at Elias International Secondary School for the second term of the 2024/2025 session, detailing weekly topics and learning objectives. Key subjects include relational models, database security, file organization, and presentation packages, with a focus on practical skills such as SQL usage and Microsoft Access functionalities. The course also emphasizes the importance of data integrity and security in database management.

Uploaded by

Noah Babalola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views14 pages

SS2 DATA Wk1 4

The document outlines the curriculum for Data Processing at Elias International Secondary School for the second term of the 2024/2025 session, detailing weekly topics and learning objectives. Key subjects include relational models, database security, file organization, and presentation packages, with a focus on practical skills such as SQL usage and Microsoft Access functionalities. The course also emphasizes the importance of data integrity and security in database management.

Uploaded by

Noah Babalola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

ELIAS INTERNATIONAL SECONDARY SCHOOL

SIGMA TERM (2024/2025) SESSSION

SUBJECT Data Processing

TERM Second Term

WEEK TOPICS Learning Objectives

1 Test/Relational Models By the end of the lesson, students should


be able to:
1. explain the term relational model
2. describe how data can be
represented in relational model
3. create tables and insert data in
the appropriate fields

2 Relational model By the end of the lesson, students should


-Modifying relations using application be able to:
packages -Integrity constraint in over 1. modify relation using database
relation application
package
2. explain integrity constraint over
relation
3. state terms related to RDBMS

3 Relational models By the end of the lesson, students


-Enforce integrity constraint should be able to:
-Query and reports 1. create forms
2. generate queries
3. prepare report using MS-Access
4 Database security -Concept of By the end of the lesson, students should
database security -Access be able to:
control 1. explain the concept of data
-Database encryption security
2. state the importance of security3.
encrypt data using the appropriate
method

5 Role of database By the end of the lesson, students should


administration in Nigeria be able to:
-Who is a database administrator 1. describe a database administrator 2.
-Function of database administrator state the function of a database
-Methods of database administrator
security 3. list methods of database security
6 File organization 1 -Definition of file By the end of the lesson, students should
organization be able to:
-Types of file organization 1. explain the concept file
-Sequential organization
-Serial 2. list the types of file
-Index organization3. describe each types of
file organization

7 MID TERM BREAK/TEST AND PROJECT

8 File Organization II -File extension, By the end of the lesson, students should
doc, xls, pdf, jpeg be able to:
-Indexes: clustered versus non clustered 1. explain the concept of file
indexes. extension
dense
versus sparse, primary and secondary
2. give examples of file
extension3. save files with different
indexes, indexes using
files format(extension)
composite sketch keys -significance of
choosing appropriate file organization 4. determine the appropriate
methods for data methods for file organization of
-Differences between types of file data
organization 5. differentiate between types
of file organization
6. give examples of storage
media appropriate to each file
organization

9 Presentation packages -Definition of By the end of the lesson, students should


presentation packages be able to:
-Types of presentation packages 1. explain presentation packages
-Features of presentation packages 2. give examples of presentation
packages
3. state features of presentations
packages
4. list uses of presentation packages
10 a. Basic concepts of entrepreneurship By the end of the lesson, students should
b. Entrepreneurship education be able to:
c. Qualities of an entrepreneur 1. explain the term
d. Importance of entrepreneurship entrepreneurship;
2. examine the concept
entrepreneurship education 3.
outline the importance of
entrepreneurship;
4. analyse frequalites of an entrepreneur
11 Presentation packages By the end of the lesson, students
-Microsoft PowerPoint should be able to:
-Creating 1. load Microsoft PowerPoint
-Retrieving and presenting files presentation
2. identify features of Microsoft
PowerPoint
3. apply Microsoft PowerPoint
application to create a presentation

12 Revision

13 Examination
Week 1
Introduction to Relational Database

A relational database is a collection of data items organized as a set of formally-described


tables from which data can be accessed or reassembled in many different ways without having
to reorganize the database tables. The relational database was invented by E. F. Codd at IBM
in 1970.
The standard user and application program interface to a relational database is the structured
query language (SQL).

A relational database is a set of tables containing data fitted in predefined categories. Each
table (which is sometimes called a relation contains one or more data categories in columns.
Each row contains a unique instance of data for the categories defined by the columns. For
example, a typical business order entry database would include a table that described a
customer with columns for name, address, phone number, and so forth. Another table would
describe an order: product, customer, date, sales price, and so forth.

Creating and modifying relations using SQL

SQL Statements
Most of the actions you need to perform on a database are done with SQL statements.
The following SQL statement selects all the records in the “Customers”
table:
Example
SELECT * FROM Customers;

Some of The Most Important SQL Commands


SELECT – extracts data from a database
UPDATE – updates data in a database
DELETE – deletes data from a database
INSERT INTO – inserts new data into a database
CREATE DATABASE – creates a new database
ALTER DATABASE – modifies a databa
CREATE TABLE – creates a new table
ALTER TABLE – modifies a tab
DROP TABLE – deletes a table
CREATE INDEX – creates an index (search key)
DROP INDEX – deletes an index
The SELECT statement is used to select data from a database.
The SQL SELECT Statement
The SELECT statement is used to select data from a database.
The result is stored in a result table, called the result-set.
Data Processing | 2024/25

SQL SELECT Syntax


SELECT column_name,column_name
FROM table_name;
and
SELECT * FROM table_name

**********************************************************************************

Week 2

RELATIONAL MODEL — Integrity Constraints

Integrity Constraints over Relations


An integrity constraint (IC) is a condition specified on a database scheme and restricts the
data that can be stored in an instance of the database. If a database instance satisfies all the
integrity constraints specifies on database schema, it is a legal instance. A DBMS permits only
legal instances to be stored in the database. Many kinds of integrity constraints can be
specified in the relational mode

Database integrity refers to the validity and consistency of stored data.


Integrity is usually expressed in terms of constraints, which are consistency
rules that the database is not permitted to violate.
Constraints may apply to each attribute or they may apply to relationships between tables.
Integrity constraints ensure that changes (update deletion, insertion) made to the database by
authorized users do not result in a loss of data consistency. Thus, integrity constraints guard
against accidental damage to the database.

EXAMPLE- A brood group must be ‘A’ or ‘B’ or ‘AB’ or ‘O’ only (cannot be any other values else).

TYPES OF INTEGRITY CONSTRAINTS


Various types of integrity constraints are1. Domain Integrity
2. Entity Integrity Constraint
3. Referential Integrity Constraint
4. Key Constraints

1. Domain Integrity- Domain integrity means the definition of a valid set


values for an attribute. You define data type, length or size, is null value allowed, is the value
unique or not for an attribute, the default value, the range (values in between) and/or specific
values for the attribute

2024/25 | Mr. Adesina


Data Processing | 2024/25

2. Entity Integrity Constraint- This rule states that in any database relation
value of attribute of a primary key can’t be null.
EXAMPLE- Consider a relation “STUDENT” Where “Stu_id” is a primary key and it must not
contain any null value whereas other attributes may contain null value e.g. “Branch” in the
following relation contains one null value.

Stu_id Name Branch


11255234 Aman CSE
11255369 Kapil ECE
11255324 Ajay
11255237 Raman CSE
11255678 Aastha ECE

3.Referential Integrity Constraint-It states that if a foreign key exists in a relation then
either the foreign key value must match a primary key value of some tuple in its home relation
or the foreign key value must be null.

4. Key Constraints- A Key Constraint is a statement/condition that a certain minimal subset


of the fields of a relation is a unique identifier of tuple.

There are 4 types of key constraints1. Candidate key.


2. Super key
3. Primary key
4. Foreign key

**********************************************************************************

Week3
Relational Database Query and Report

We will start the course with Microsoft Access, which provides perhaps the most
user-friendly interface.
• Forms

2024/25 | Mr. Adesina


Data Processing | 2024/25

A form is another database object that provides a convenient way to enter and view records in
a table.

Creating Forms

Forms allows you to enter, edit or display data. They are based on tables. With forms, you can
choose the format and arrangement the fields will take or will be displayed.

To create a form

1. Open the navigation pane


2. Click the table or query on which you want to base your form
3. Activate the create tab
4. Click form in the forms group

After you create a form, you can save it. You can also open a saved form at any time.

1. Click the save button on the Quick Access toolbar.


2. Type the name you want to give the form.
3. Click OK. You can access the form by clicking the navigation pane.

Form Wizard

You can create forms with the help of a form wizard

On the create tab, click the more forms down arrow.

1. Click Form Wizard


2. Choose the Table/ Queries that you wish to have on the form
3. Choose the field you wish to have on the forms
4. Click Next
5. Choose the layout for the form
6. Click Next
7. Choose Style
8. Click next
9. Create a title for the form
10. Choose whether you want to open the form to view it or modify the form’s design
11. Click finish
• Queries

A query is a database object that enables you to locate records that match specified criteria by
providing a way for you to ask a question about the information stored in a database table.

Creating Queries

A query allows you to select and filter data from multiple tables. Queries can be saved and
utilized as often as you need them.

Creating using Query Wizard

2024/25 | Mr. Adesina


Data Processing | 2024/25

The Query Wizard walks you through the steps to set up a query. To run a query using the
query wizard

1. Click the create tab


2. Click the query Wizard button under other group
3. Choose the type of query you wish to run
4. Click OK

To choose the field you wish to include from each table

1. To select fields from different tables, click the Tables/Queries down arrow
2. Click OK

To insert picture of query wizard

1. Type in a title for the query


2. Click Finish
3. The query will be displayed
• Report

A report is a database object that allows you to organize, summarize, and print all or a portion
of the data in a database

1. Click the Blank report button on the Create Tab


2. Click the Add Existing Fields button
3. From the field list, click and drag the fields to the report

Creating using Report Wizard

1. On the Create tab, click, the report Wizard button


2. Choose the Tables/Queries that you wish to have on the form
3. Choose the field you wish to have on the forms
4. Click Next
5. Choose the sort order for your report
6. Choose the layout for the form
7. Click Next
8. Choose a style
9. Click Next
10. Create a title
11. Choose whether you want to open the form to view it or modify the form’s design
12. Click Finish package is Microsoft Access. MS Access is a Relational Database Management
System used to create and modify databases.

**********************************************************************************

2024/25 | Mr. Adesina


Data Processing | 2024/25

Week 4
Database security

Data security is the practice of keeping data protected from corruption and unauthorized
access. The focus behind data security is to ensure privacy while protecting personal or
corporate data.

It is a means of putting in place the different form of information security controls to protect
database against compromise of their confidentiality, integrity and availability.
Risk assessment
This will enable you to identify the risks you are faced with and what could happen if valuable
data is lost through theft, malware infection or a system crash.
Securing data
Since data can be compromised in many ways, the best security against misuse or theft involves
a combination of technical measures, physical security and a well-educated staff. You should
implement clearly defined polices into your infrastructure and effectively present them to the
staff.

Types of data security control


1. Access control:
It is the selective restriction of access to a place or other resource. The act of accessing may
mean consuming, entering, or using. Permission to access a resource is called authorization.
2. Auditing:
Database auditing involves observing a database so as to be aware of the actions of database
users. Database administrators and consultants often set up auditing for security purposes,
for example, to ensure that those without the permission to access information do not access
it.
3. Authentication:
It is the validation control that allows you to log into a system, email or blog account etc. Once
logged in, you have various privileges until logging out. Some systems will cancel a session if
your machine has been idle for a certain amount of time, requiring that you prove
authentication once again to re-enter. You can log in using multiple factors such as a password,
a smart card or even a fingerprint.
4. Encryption:
This security mechanism uses mathematical scheme and algorithms to scramble data into
unreadable text. It can only be decoded or decrypted by the party that possesses the
associated key.
5. Back up: This is the process of making copy and archiving of computer data in the event of
data loss which is used to restore the original data.
6. Password:
This is sequence of secret characters used to enable access to a file, program, computer
system and other resources.

2024/25 | Mr. Adesina


Data Processing | 2024/25

Importance of Data Security


Data security is critical for most business and even home computer users. Client information,
payment information, personal files, bank account details- all this information can be hard to
replace and potentially dangerous if it falls into the wrong hands. Data lost due to disaster
such as a flood of fire is crushing, but losing it to hackers or a malware infection can have
much greater consequences.

Major threats to data security


1. An accident can happen due to human error or software/hardware error.
2. Hackers could steal vital information and fraud can easily be perpetrated.
3. Loss of data integrity.
4. Improper data access to personal or confidential data.
5. Loss of data availability through sabotage, a virus, or a worm.

Integrity control

Backups:
It is the process of copying and archiving of computer data so it may be used to restore the
original after a data loss event.
Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it
by data deletion or corruption.
The secondary purpose of backups is to recover data from an earlier time, according to a user-
defined data retention policy, typically configured within a backup application for how long
copies of data are required. Backup is just one of the disaster recovery plans.

Application security:
Application security is the use of software, hardware and procedural methods to protect an
application from external threats.

**********************************************************************************

2024/25 | Mr. Adesina


Data Processing | 2024/25

2024/25 | Mr. Adesina

You might also like