Computer Application UNIT 3
Computer Application UNIT 3
Vijayanagar,Bangaluru-40
Subject:Computer Applications
UNIT -3
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 1
o Example: Integrated Data Store (IDS).
Object-Oriented DBMS (OODBMS):
o Stores data as objects, similar to object-oriented programming.
o Supports data types such as multimedia, graphics, and complex data relationships.
o Example: db4o (Database for Objects), ObjectDB.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 2
Key Terms
Attribute: Attributes are the properties that define an entity. e.g. ROLL_NO,
NAME, ADDRESS.
Relation Schema: A relation schema defines the structure of the relation and represents the
name of the relation with its attributes. e.g. STUDENT (ROLL_NO, NAME, ADDRESS,
PHONE, and AGE) is the relation schema for STUDENT. If a schema has more than 1
relation it is
called Relational Schema.
Tuple: Each row in the relation is known as a tuple. The above relation contains 4 tuples one
of which is shown as:
Relation Instance: The set of tuples of a relation at a particular instance of time is called
a relation instance. It can change whenever there is an insertion, deletion or update in the
database.
Degree: The number of attributes in the relation is known as the degree of the relation. The
STUDENT relation defined above has degree 5.
Cardinality: The number of tuples in a relation is known as cardinality. The
STUDENT relation defined above has cardinality 4.
Column: The column represents the set of values for a particular attribute. The column
ROLL_NO is extracted from the relation STUDENT.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 3
6)What are the characteristics of the Relational Model?
Data Representation: Data is organized in tables (relations), with rows (tuples)
representing records and columns (attributes) representing data fields.
Atomic Values: Each attribute in a table contains atomic values, meaning no multi-
valued or nested data is allowed in a single cell.
Unique Keys: Every table has a primary key to uniquely identify each record, ensuring
no duplicate rows.
Attribute Domain: Each attribute has a defined domain, specifying the valid data
types and constraints for the values it can hold.
Tuples as Rows: Rows in a table, called tuples, represent individual records or
instances of real-world entities or relationships.
Relation Schema: A table’s structure is defined by its schema, which specifies the
table name, attributes, and their domains.
Data Independence: The model ensures logical and physical data independence,
allowing changes in the database schema without affecting the application layer.
7) What is E-learning?Explain.
E-learning, or electronic learning, is a method of education that utilizes digital technology to
deliver instructional content outside of traditional classrooms. It enables students to learn
anytime and anywhere through various electronic devices, such as computers, tablets, and
smartphones.
Key Features of E-Learning
Accessibility: Learners can access materials from anywhere, reducing the need for
physical presence in a classroom.
Flexibility: E-learning allows students to learn at their own pace, making education
more adaptable to different schedules.
Interactivity: Digital tools like quizzes, simulations, and discussion forums enhance
engagement and participation.
Cost-Effective: Online education reduces expenses related to travel, accommodation,
and printed materials.
Personalization: Courses can be tailored to suit individual learning styles and needs.
Advantages of E-Learning
Enhances digital literacy and technical skills.
Encourages self-paced and independent learning.
Offers a vast range of courses and subjects.
Supports multimedia content, improving engagement and
understanding. Challenges of E-Learning
Requires reliable internet access and digital devices.
May lack the social interaction of traditional classrooms.
Self-discipline and motivation are crucial for success.
Not all courses or subjects can be effectively taught online.
E-learning is transforming the education landscape, making knowledge more accessible and
customizable. With technological advancements, it continues to evolve, offering innovative
solutions to learners worldwide.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 4
8) Explain e-learning platforms such as Swayam, and MOOC?
E-learning platforms like Swayam and MOOCs (Massive Open Online Courses) have
revolutionized education by making high-quality learning resources accessible to a global audience.
Here's an introduction to both:
Swayam:-
What it is: Swayam (Study Webs of Active Learning for Young Aspiring Minds) is an Indian
government initiative aimed at providing free online courses across various disciplines.
Key Features:
o Offers courses from school level to post-graduation.
o Includes video lectures, reading materials, quizzes, and discussion forums.
o Provides certification for a nominal fee after passing an exam.
o Covers diverse subjects like engineering, humanities, management, and more.
Objective: To bridge the digital divide and ensure equitable access to quality education for
all, including disadvantaged groups.
MOOCs:-
What it is: MOOCs are online courses designed for large-scale participation and open access
via the internet.
Key Features:
o Offered by top universities and institutions worldwide.
o Flexible learning with self-paced modules.
o Often free to access, with optional paid certifications.
o Covers a wide range of topics, from academic subjects to professional skills.
Popular Platforms: Coursera, edX, Udemy, and Khan Academy.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 5
i)Technical Requirements for a Virtual Meeting:-
To ensure a smooth virtual meeting experience, the following technical requirements must be
met:
a) Hardware Requirements
Computer/Laptop/Smartphone – A device with internet access.
Webcam – Built-in or external camera for video calls.
Microphone & Speakers/Headphones – For clear audio communication.
Internet Connection – A stable broadband or mobile network (Minimum 2 Mbps
recommended).
b) Software Requirements
Video Conferencing Software – Zoom, Google Meet, Microsoft Teams, Cisco
Webex, etc.
Updated Web Browser – If using a web-based meeting platform (Chrome, Edge,
or Firefox).
Necessary Plugins/Apps – Install required software or extensions if needed.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 6
Check Permissions: Some platforms require the host to enable recording, and some may
notify participants.
Storage Location: Recordings are often saved to the cloud or locally on your device.
Privacy & Consent: Make sure recording is allowed and that all participants are aware.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 8
1. Open the form and go to the "Responses" section.
2. Click "Open in Excel" to download responses as a spreadsheet.
3. The file will be saved as an Excel (.xlsx) document.
1. Digital Footprints
A digital footprint refers to the traces of data we leave online, including:
Active Digital Footprint – Data we intentionally share (e.g., social media posts,
online purchases).
Passive Digital Footprint – Data collected without direct user input (e.g.,
browsing history, cookies, location tracking).
Impacts of Digital Footprints
✔ Helps personalize user experiences (e.g., recommendations on YouTube, shopping sites).
✔ Employers and universities review digital footprints for background checks.
⚠Risk of cyber threats, identity theft, and privacy invasion.
Responsibilities of a Netizen
✔ Follow ethical online behavior.
✔ Protect personal and others' data.
✔ Report cybercrimes and misinformation.
3. Data Protection
Data protection refers to safeguarding personal and sensitive information from unauthorized access.
Key Aspects of Data Protection
Privacy Laws – Laws like GDPR (Europe) and IT Act (India) regulate data handling.
Encryption – Protects data from cyberattacks.
Two-Factor Authentication (2FA) – Enhances security for online accounts.
Awareness – Users must be careful about sharing personal data online.
⚠Lack of data protection can lead to identity theft, financial fraud, and cyberbullying.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 9
4. E-Waste (Electronic Waste)
E-waste includes discarded electronic devices such as computers, smartphones, and batteries.
Causes of E-Waste
Rapid technological advancements.
Short device life cycles.
Improper disposal of electronics.
Impact of E-Waste
⚠Toxic chemicals (lead, mercury) pollute the environment.
⚠Unsafe recycling methods affect workers' health.
Solutions
✔ Recycling and proper disposal of old gadgets.
✔ Encouraging e-waste management policies.
✔ Promoting sustainable technology use.
5. Impact on Health
While digital technology improves convenience, excessive use can negatively affect health.
Physical Health Effects
Eye Strain – Prolonged screen time leads to digital eye fatigue.
Obesity & Posture Issues – Lack of physical activity causes health problems.
Mental Health Effects
Social Media Anxiety – Constant comparisons can affect self-esteem.
Sleep Disorders – Excessive screen exposure disrupts sleep patterns.
Preventive Measures
✔ Follow the 20-20-20 rule (every 20 minutes, look 20 feet away for 20 seconds).
✔ Limit screen time and take regular breaks.
✔ Engage in outdoor activities and exercise.
Yogesha S N
Asst Prof in Computer Science
Vasavi Jnana Peetha Evening College Page 10