BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Wednesday, April 14, 2010

4/14/10 R Q's

1. Readable Database Management System
2. Past surgeries, medications, past appointments
3. Searching the database to find specific information is called a
__query____________.
4. Electronic databases can be easily accessed by hackers which can lead to stolen information, but at the same time they are more organized and more efficent are are able to hold more information than a paper notebook.
5. Security: Databases must be secured and gaurded with software to be protected from any database breaches.
Reliability: Management and organizations whol hold databases should be reliable in order for consumers to trust them with information.
Privacy and anonymity: Some databases hold personal and private information on individulas. if given to the wrong hands, that infpramtion can be severly misused.
6.
We can protect databases from database breaches and hackers. Helpful software or firewall can be used to protect databases .

Tuesday, April 13, 2010

News Bubble Article

Monday, April 12, 2010

4/12/10 Notes

Privacy of Information in Different Cultures

With a click of a button you can post pictures and information over the internet on social networking sites allowing people to paint an alarmingly accurate picture of who you are.

In the UK strict measurements are taken to prevent any theft of personal information on databases.
Individuals have rightsd over the information they dislose to the organizations.
__________________

Biometrics are used as security restricting access to certain parties, there are opposing argumetns on whether this is ethical or not.

It is legal to rack cyber records in the US.

__________________________
Social consequences of the release of sensitive data stored in databases
It is important to try to proetct data from being stolen
sensiive data can be easily recovered even though you may have thought they were deleted

__________________

Database selling
Inofmation can be sold to brokers and companies, which are privacy and security issues
Database informatin should be kept private
No one has the right to access any1 elses secure information
There are laws relating to this issue
he database only collects necessary information and then lets the owner know about stored info and must allow owner to access information or change any information
________
Social consequences of outdated or incorrect information in databases.
If a databses has incorrect information about you, you may not be able to get prodeuct(mailing lists)
Databases can record what you interested in based on likes and information from other database breaches

Friday, April 9, 2010

Friday Guest Speaker Notes

Logic does not mean thinking.
Thinking looks areound the reality and uses senses to make a conclusion.
A website can querie againts a table to extract information to make it visible on the web, such as prayer times.
An electronis database sorts and manages information easier and more efficiently than a paper notebook organizer.

Thursday, April 8, 2010

Key terms

1. Backup (or back-up) is a way of copying files to one or more places (independent of the normal file system) to avoid loss of data in case of a mass failure or system crash.
2. A graphical user interface (or GUI) is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of text. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.
3. One or more pieces of information that are grouped together and are the subject of a query.
The information that you put into a search of a database.
4. Query: An inquiry that retrieves specific data from a database.
5.Copyright
:Protection given to a person for their original work and the rights to determine to who can publish, reproduce, and distribute.
6.Baud
A unit of speed in data transmission equal to one bit per second. The Voltage or frequency changes that are made per second. Baud is not used as often anymore.
7. fuzzy logic A type of logic that allows conclusions to be stated as probabilities rather than certainties.

8. pattern recognition Identifying recurring patterns in input data with the goal of understanding or categorizing that input.
9. heuristic A rule of thumb.

10. command-line interface User interface that requires the user to type text commands on a command-line to communicate with the operating system.
11. uninterruptible power supply (UPS) A hardware device that protects computers from data loss during power failures.
12. electronic data interchange (EDI) A set of specifications for conducting basic business transactions over private networks.
13. mail merge A feature of a word processor or other program that enables it to merge names and addresses from a database mailing list into personalized form letters and mailings.
14. push technology Technology in which information is delivered automatically to a client computer. The user subscribes to a service and the server delivers that information periodically and unobtrusively. Contrast with pull technology.
15. database management system (DBMS) A program or system of programs that can manipulate data in a large collection of files (the database), cross-referencing between files as needed.
16. database A collection of information stored in an organized form in a computer.
17. data warehouse An integrated collection of corporate data stored in one location.
18. optical character recognition (OCR) Locating and identifying printed characters embedded in an image, allowing the text to be stored as an editable document. OCR can be performed by wand readers, pen scanners, and OCR software.
19. macro Custom-designed embedded procedure program that automates tasks in application programs.
20. fieldEach discrete chunk of information in a database record.
21. record In a database, the information relating to one person, product, or event.
22. sort Arrange records in alphabetic or numeric order based on values in one or more fields.
23. Feedback loop In a computer simulation, the user and the computer responding to data from each other.
24. expert systems (ES) Information systems or software programs designed to replicate the decision-making process of a human expert.
25. knowledge base A database that contains both facts and a system of rules for determining and changing the relationship among those facts.

Review Q's pg 259 #'s 7-11

7. Sorting data files allows a user to arrange records in alphebetic or numeric order based on values in one or more fields.

8.Most large databased use data-checking routines whenever data is entered . Many organizations also depend on software to correct errors that make it through data checks to prevent any dirty data. When didrty data is eliminated it is referred to as data scrubbing or data cleansing.

9.If tables in the databases share a single unique field, such as social security number field, record matching can be quick and easy than when database information is combined.
Data matching can prove beneficial and helps in the National Crime Information Center.

10. Everyone has a right to privacy, although it is not explicitly stated in the US Constitusion.
The creation of computerized databases led to concerns over individual privacy.
In the 1970's the Code of Fair Information practices was created calling for no secret government databases, but this mainly caught on in Europe.
In the US The Privacy act of 1974 was created, however it only applies to databases managed by the federal governmetn.

11. Computers are important in discussions of invasion of privacy becuase a lot of information can be taken away off what a computer user searches. HAckers can also hack into computer databases and take or release private information.

Tuesday, April 6, 2010

Review Q's pg 237 #'s 2-6

2. A file manager enables users to work with one file at a time. A DBMS can manipulate data in a large collection of files. Both are used to search and store data. DBMS is more complex.
3. A database is composed of one or more tables, which is a collection of related information. It holds records which are information of people, product or event. Each "chunk" of information in a database is called a field.

4. A query is an information request. It can be a simple search for a record.An example of a query would be "all students who attended Al-Arqam in the year 1998)

5. To create a simple business report one would arrange data in tables with rows for individual records and columns for selected fields.

6. some advantages of personal information management softwares include more organized records of information, it is faster and more efficient then paper notebook organizers, it can also hold more information then a standard sized notebook.
Advantages of a paper notebook organizer is that this way one would not face privacy or security issues. A computer hacker can easily access a computer database and use or release confidential information.