Data Processing Lesson Note SS2 Second Term
Data Processing Lesson Note SS2 Second Term
Second Term
20 minutes read
2. Relational Database
7. File Organization
8. Internet
9. Internet
11. Revision
12. Examination
WEEK : 2
CONTENT
Relational database
https://upload.wikimedia.org/wikipedia/common
s/thumb/8/8d/Relational_model_concepts.png/360
px-Relational_model_concepts.png
A user of the database could obtain a view of the database that fitted
the user’s needs. For example, a branch office manager might like a view
or report on all customers that had bought products after a certain date.
A financial services manager in the same company could, from the same
tables, obtain a report on accounts that needed to be paid.
SQL Statements
Most of the actions you need to perform on a database are done with
SQL statements.
The following SQL statement selects all the records in the “Customers”
table:
Example
SELECT * FROM Customers;
and
WEEK : 3-4
Read Also
EXAMPLE- A brood group must be ‘A’ or ‘B’ or ‘AB’ or ‘O’ only (can not be
any other values else).
1. Domain Integrity
4. Key Constraints
11255324 Ajay
1. Candidate key.
2. Super key
3. Primary key
4. Foreign key
WEEK : 5
CONTENT
Why MS-Access?
One part of the Access interface that you’ll use frequently is the
“Navigation Pane,” which is situated on the left side of the application
window. The top of the Navigation Pane is just beneath the “Ribbon” (the
strip of controls that runs horizontally along the top of the window).
The Navigation Pane provides access to the objects stored in the
database, such as tables, queries, forms and reports. When you first
open the baseball_stats.accdb database, the Navigation Pane should
appear with the word Tables at the top, indicating that it is listing the
tables stored in the database (PLAYERS, STATS and TEAMS).
With our first query we’ll retrieve data from selected fields in the STATS
table.
1. Click on the Create tab near the top of the application window.
2. Next, click on the Query Design button (found on the left side of
the Create Ribbon in the group of commands labeled as Queries).
At any time, you can view the SQL that’s created by your GUI
settings by accessing the View drop-down list on the far-left side of
Design Ribbon, (it is also available when you have the Home tab
selected, as shown below).
As you go through the next steps look at the SQL that corresponds
to queries you are building.
1. From the same View drop-down list, select Design View to return
to the query design GUI.
2. In the design grid, set the Criteria value for the RBI field to >99.
3. Test the query by clicking on the red exclamation point, (it should
return 103 records).
D. Sort the returned records
2. In the design grid click in the Sort cell under the RBI column and
select Descending from the drop-down list. This will sort the
records from highest RBI total to lowest.
1. Return to Design View and set the Criteria value for the YEAR field
to >1989. This will limit the results to seasons of over 100 RBI since
1990.
3. Return to Design View and modify the Criteria value for the YEAR
field to >1989 And<2000, which will further limit the results to just
the 1990s.
5. Return to Design View and change the Criteria value for the YEAR
field back to >1989, beneath that cell (in the :or cell) add <1960.
As you should be able to guess, I’m asking you to write a query that
identifies 100-RBI seasonssince 1989 OR prior to 1960. However,
the query as written at this point doesn’t quite yield that result, look
at the WHERE line in the SQL view. Instead, it would return 100-RBI
seasons since 1989 and all seasons prior to 1960 (not just the 100-
RBI ones). To produce the desired result you need to repeat
the >99 criterion in the RBI field’s :or cell, check the SQL view to see
the change.
You’ve probably recognized by now that the output from these queries is
not particularly human friendly. In the next part of the lesson we’ll see
how to use a join between the two tables to add the names of the
players to the query output.
WEEK : 6-7
FILE
Computer File
File organization
Records are placed in file in the same order as they are inserted. A new
record is inserted in the last page of the file; if there is insufficient space
in the last page, a new page is added to the file. This makes insertion
very efficient. However, as a heap file has no particular ordering with
respect to field values, a linear search must be performed to access a
record. A linear search involves reading pages from the file until the
required is found. This makes retrievals from heap files that have more
than a few pages relatively slow, unless the retrieval involves a large
proportion of the records in the file.
The relation is only a few pages long. In this case, the time to locate any
tuple is Short, even if the entire relation has been searched serially.
When every tuple in the relation has to be retrieved (in any order) every
time the relation is accessed. For example, retrieve the name of all the
students.
Cons of Heap storage
Heap files are inappropriate when only selected tuples of a relation are
to be accessed.
In a hash file, records are not stored sequentially in a file instead a hash
function is used to calculate the address of the page in which the record
is to be stored.
The field on which hash function is calculated is called as Hash field and
if that field acts as the key of the relation then it is called as Hash key.
Records are randomly distributed in the file so it is also called as
Random or Direct files. Commonly some arithmetic function is applied
to the hash field so that records will be evenly distributed throughout
the file.
WEEK : 8-9
: Internet
CONTENT
Internet
Web browser
A web browser (commonly referred to as a browser) is a software
application for retrieving, presenting, and traversing information
resources on theWorld Wide Web. An information resource is identified
by a Uniform Resource Identifier (URI/URL) and may be a web page,
image, video or other piece of content.[1] Hyperlinks present in
resources enable users easily to navigate their browsers to related
resources.
Although browsers are primarily intended to use the World Wide Web,
they can also be used to access information provided by web
servers in private networks or files in file systems.
Anchor
ASCII
Avatar
Bandwidth
Baseband
A transmission method in which a network uses its entire transmission
range to send a single signal.
Broadband
Browser
Client
DNS
Document
When used in reference to the World Wide Web, a document is any file
containing text, media or hyperlinks that can be transferred from an
HTTP server to a client program.
Document Window
Download
FAQ
This is the acronym for Frequently Asked Questions. A common feature
on the Internet, FAQs are files of answers to commonly asked questions.
Firewall
FTP
File Transfer Protocol is a protocol that allows the transfer of files from
one computer to another. FTP is also the verb used to describe the act of
transferring files from one computer to another.
Gopher
Gopherspace
GUI
Home Page
The document displayed when you first open Mosaic. Home Page also
refers to the first document you come to at a Web site.
Hotlists
Host
HTML Document
HTTP
Hypermedia
Hypertext
IP
ISDN
JPEG
The acronym for Joint Photographic Experts Group, JPEG is an image
compression format used to transfer color photographs and images
over computer networks.
Links
POP
Router
Search Engine
This term refers to a program that helps users find information in text-
oriented databases.
Server
TCP-IP
URL
Web Browser
This is the software that allows a user to access and view HTML
documents. Examples of Web browsers include Mosaic, Cello and Lynx.
Web Document
Web Page
Internet is today one of the most important part of our daily life. There
are large numbers of things that can be done using the internet and so it
is very important. The following are uses of the internet.
1. Communication
At the moment the easiest thing that can be done using the internet is
that we can communicate with the people living far away from us with
extreme ease. Now people can not only chat but can also do the video
conferencing. Email, social networking sites are some of the prime
example of it.
2. Research
Now the point that has been placed next is research. In order to do
research you need to go through hundreds of books as well as the
references and that was one of the most difficult jobs to do earlier. Since
the internet came into life, everything is available just a click away. You
just have to search for the concerned topic and you will get hundreds of
references that may be beneficial for your research. And since internet is
here to make your research public, you can then benefit a large amount
of people from the research work that you have done. Research is one
such thing which has got lots of benefit from this evolution of internet.
Research process has now got wings and has gained the most due to the
internet.
3. Education
The next point that we have in this list is education. Yes you read it right.
Education is one of the best things that the internet can provide. There
are a number of books, reference books, online help centres, expert’s
views and other study oriented material on the internet that can make
the learning process very easier as well as a fun learning experience.
There are lots and lots of websites which are related to different topic.
You can visit them and can gain endless amount of knowledge that you
wish to have. With the use of internet for education, you are non-longer
dependent on some other person to come and teach you. There are
various number of tutorials available over the internet using which you
can learn so many thing very easily. There can’t be any excellent use of
the internet other than education as it is the key to achieve everything in
life.
4. Financial Transaction
Real time updates have been placed at the number fifth position here.
This has been mentioned here in regards to the news and other
happenings that may be on-going in different parts of the world but with
the use of internet we come to know about it very easily and without any
difficulty. There are various websites on the internet which provides you
with the real time updates in every field be it in business, sports, finance,
politics, entertainment and others. Many a time the decisions are taken
on the real time updates that are happening in various parts of the
world and this is where internet is very essential and helpful.
6. Email:
7. Information:
8. Business:
World trade has seen a big boom with the help of the internet, as it has
become easier for buyers and sellers to communicate and also to
advertise their sites. Now a day’s most of the people are using online
classified sites to buy or sell or advertising their products or services.
Classified sites save a lot of money and time so this is chosen as medium
by most of people to advertise their products. We have many classified
sites on the web like craigslist, Adsglobe.com, Kijiji etc.
9. Social Networking:
10. Shopping:
In today’s busy life most of us are interested to shop online. Now a day’s
almost anything can be bought with the use of the internet. In countries
like US most of consumers prefer to shop from home. We have many
shopping sites on internet like amazon.com, Dealsglobe.com etc. People
also use the internet to auction goods. There are many auction sites
online, where anything can be sold.
11 Entertainment:
12 E-Commerce:
13 Services:
Many services are now provided on the internet such as online banking,
job seeking, purchasing tickets for your favorite movies, and guidance
services on array of topics in the every aspect of life, and hotel
reservations and bills paying. Often these services are not available off-
line and can cost you more.
14 Job Search:
Internet makes life easy for both employers and job seekers as there are
plenty of job sites which connects employers and job seekers.
INTERNET SECURITY
WEEK : 10
CONTENT
Internet abuse
Internet abuse refers to improper use of the internet and may include:
Most of the people are using internet to satisfy their sexual desires.
The student waste their time in useless talking with each others.
Types of Abuse
Spamvertized
A type of unsolicited e-mail (spam) that specifically advertises a product.
Copyright Infringement
Hacking
Open Relay
An SMTP server that allows third party relay of email messages. An open
relay makes it possible for an unscrupulous sender to route large
volumes of email messages.
Open Proxy
A proxy server that is configured so that any internet user can use it.
Open proxy servers are widely used by spammers due to the fact that it
hides the spammer’s IP Address from recipients.
Port Scan
Virus/Worm
Phishing
Blacklisting
DoS Attack
Dictionary Attack
Probes
Unsolicited Bounce
419 Scam
Auto Responder
/** * cleverwebserver * */