SS2 DATA Wk1 4
SS2 DATA Wk1 4
8 File Organization II -File extension, By the end of the lesson, students should
doc, xls, pdf, jpeg be able to:
-Indexes: clustered versus non clustered 1. explain the concept of file
indexes. extension
dense
versus sparse, primary and secondary
2. give examples of file
extension3. save files with different
indexes, indexes using
files format(extension)
composite sketch keys -significance of
choosing appropriate file organization 4. determine the appropriate
methods for data methods for file organization of
-Differences between types of file data
organization 5. differentiate between types
of file organization
6. give examples of storage
media appropriate to each file
organization
12 Revision
13 Examination
Week 1
Introduction to Relational Database
A relational database is a set of tables containing data fitted in predefined categories. Each
table (which is sometimes called a relation contains one or more data categories in columns.
Each row contains a unique instance of data for the categories defined by the columns. For
example, a typical business order entry database would include a table that described a
customer with columns for name, address, phone number, and so forth. Another table would
describe an order: product, customer, date, sales price, and so forth.
SQL Statements
Most of the actions you need to perform on a database are done with SQL statements.
The following SQL statement selects all the records in the “Customers”
table:
Example
SELECT * FROM Customers;
**********************************************************************************
Week 2
EXAMPLE- A brood group must be ‘A’ or ‘B’ or ‘AB’ or ‘O’ only (cannot be any other values else).
2. Entity Integrity Constraint- This rule states that in any database relation
value of attribute of a primary key can’t be null.
EXAMPLE- Consider a relation “STUDENT” Where “Stu_id” is a primary key and it must not
contain any null value whereas other attributes may contain null value e.g. “Branch” in the
following relation contains one null value.
3.Referential Integrity Constraint-It states that if a foreign key exists in a relation then
either the foreign key value must match a primary key value of some tuple in its home relation
or the foreign key value must be null.
**********************************************************************************
Week3
Relational Database Query and Report
We will start the course with Microsoft Access, which provides perhaps the most
user-friendly interface.
• Forms
A form is another database object that provides a convenient way to enter and view records in
a table.
Creating Forms
Forms allows you to enter, edit or display data. They are based on tables. With forms, you can
choose the format and arrangement the fields will take or will be displayed.
To create a form
After you create a form, you can save it. You can also open a saved form at any time.
Form Wizard
A query is a database object that enables you to locate records that match specified criteria by
providing a way for you to ask a question about the information stored in a database table.
Creating Queries
A query allows you to select and filter data from multiple tables. Queries can be saved and
utilized as often as you need them.
The Query Wizard walks you through the steps to set up a query. To run a query using the
query wizard
1. To select fields from different tables, click the Tables/Queries down arrow
2. Click OK
A report is a database object that allows you to organize, summarize, and print all or a portion
of the data in a database
**********************************************************************************
Week 4
Database security
Data security is the practice of keeping data protected from corruption and unauthorized
access. The focus behind data security is to ensure privacy while protecting personal or
corporate data.
It is a means of putting in place the different form of information security controls to protect
database against compromise of their confidentiality, integrity and availability.
Risk assessment
This will enable you to identify the risks you are faced with and what could happen if valuable
data is lost through theft, malware infection or a system crash.
Securing data
Since data can be compromised in many ways, the best security against misuse or theft involves
a combination of technical measures, physical security and a well-educated staff. You should
implement clearly defined polices into your infrastructure and effectively present them to the
staff.
Integrity control
Backups:
It is the process of copying and archiving of computer data so it may be used to restore the
original after a data loss event.
Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it
by data deletion or corruption.
The secondary purpose of backups is to recover data from an earlier time, according to a user-
defined data retention policy, typically configured within a backup application for how long
copies of data are required. Backup is just one of the disaster recovery plans.
Application security:
Application security is the use of software, hardware and procedural methods to protect an
application from external threats.
**********************************************************************************