info systems design and development
DESCRIPTION
TRANSCRIPT
National 4/5 Computer Science Information Systems Design
and Development
Faculty of ICT
Computing Laws◦ Computer Misuse Act◦ Copyright Designs and Patents Act
Aims - Systems Lesson 1
Computer Misuse Act This law was created to make it
illegal to: Hack
◦ Gain unauthorised access into a computer system
Spread Viruses◦ Send harmful code to other computers
Phish◦ Pretend to be a company to steal to
password information
Computing Laws
Copyright Designs and Patents Act This law was created to make it illegal to: Make unauthorised copies of music, movies
or software Use multiple copies of software when you
only have 1 license Steal someone’s idea, work etc when it is
under copyright
Computing Laws
Last Lesson Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs and Patents Act
Today’s Lesson Computing Laws
◦ Data Protection Act
Aims - Systems Lesson 2
Computing Laws Data Protection Act
◦This law was created to control the storage of personal information
◦Data Controller The company or person storing the information on the
person
◦The Data must be: Accurate and kept up to date Protected properly with a password Relevant and only stored for the period it is
required Not sell the data on to other companies
Computing Laws The Data User:
◦ The person who makes use of the personal information, for example, the secretary in a doctor’s surgery
The Data Subject◦ The person that the information is about, for
example, the patient in a doctor’s surgery◦ The Data Subject can:
See the information held on them Change any inaccurate information Know why the data is being stored about them
◦
Last Lesson Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs and Patents Act
◦ Data Protection Act
Today’s Lesson Health and Safety
Regulations
Aims - Systems Lesson 3
Health and Safety Regulations
Main Health Problems◦ Back problems◦ RSI = repetitive strain injury◦ Eye strain
The law states that an employer must:◦ Provide adjustable screens, chairs and provide foot
support◦ Make sure lighting is suitable and provide antiglare filters
for monitors◦ Give employees adequate breaks◦ Pay for eye tests◦ Avoid trailing wires◦ Have suitable heating
◦
Last Lesson Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs and Patents Act
◦ Data Protection Act◦ Health and Safety
Regulations
Today’s Lesson Environmental
Impact◦ Carbon footprint
Aims - Systems Lesson 4
Environmental Impact
Carbon Footprint = the amount of C02 you generate◦ When using a computer system you are adding to
carbon emissions◦ Desktop = 110 watts◦ LCD Monitor = 35 watts ◦ You are using electricity generated by fossil fuels
Minimising Carbon Footprint◦ PCs on the markets that use 25 watts◦ Low energy processor chips◦ Automated power shutdown systems for out of hours◦ Laptop usage rather than desktop
15-60 watt rather than 145 watt
Last Lesson Computing Laws
◦ Computer Misuse Act◦ Copyright Designs
and Patents Act◦ Data Protection Act◦ Health and Safety
Regulations Environmental
Impact◦ Carbon footprint
Today’s Lesson Security Risks
◦ Virus◦ Worm◦ Trojan Horse
Aims - Systems Lesson 5
Viruses◦ A piece of code that attaches itself to programs,
makes copies of itself and destroys your system◦ Ways of spreading
Downloaded from a website Opened up from an email attachment Infected backing storage device
◦ Symptoms of a virus Data loss Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason
Security Risks
Worms◦ A program that finds gaps in your security,
creates copies of itself and floods your system with unwanted data
Trojans◦ A program that appears as if it is carrying out a
task, for example, defragmenting your hard disk◦ You download it thinking it is carrying out a
harmless task and it causing hard, for example, deleting files or adding unwanted toolbars
Security Risks
Last Lesson Security Risks
◦ Virus◦ Worm◦ Trojan Horse
Today’s Lesson Security Risks
◦ Keylogging Software◦ Spyware◦ DOS attacks
Aims - Systems Lesson 5
Keylogging software◦ A program that monitors user’s keystrokes and is
often used to steal passwords, credit card numbers etc
Spyware◦ Spyware programs gather information about you
from your computer, for example which websites you visit.
◦ This data can be used to target you with specific marketing
Security Risks
Denial of Service attacks◦ A DOS attack is designed to cause problems on a
network so that legitimate users cannot access resources, for example their online bank account
◦ Resource Starvation = using up network resources, for example processors or disk space on servers so that legitimate users can’t access resources
◦ Bandwidth Consumption = flooding the network with useless traffic, for example flooding an email server with useless data, making it crash
◦ Attacking Routers = corrupt PING attacks that stop Routers from working properly
Security Risks
Last Lesson Security Risks
◦ Virus◦ Worm◦ Trojan Horse◦ Keylogging Software◦ Spyware◦ DOS attacks
Today’s Lesson Securing
Computers◦ Passwords◦ Encryption◦ Biometrics◦ Firewalls◦ Anti virus software
Aims - Systems Lesson 6
Passwords◦ A list of characters that stops people accessing you data◦ Disadvantage
You can forget them Programs have been created that can test billions of different
passwords each second, eventually guessing yours!! Encryption
◦ Putting data into a code before transfer ◦ The hacker cant understand the data without having the
key to decipher the code Biometrics
◦ Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition
Securing Computers
Firewalls◦ A program that checks all data coming in and out
of a network◦ The firewall decides which packets of data are
allowed through to the destination address Anti-virus software
◦ A program that has a database of known viruses◦ The anti virus software compares sections of code
to this database to identify and destroy viruses
Securing Computers
Last Lesson◦ Securing Computers
Passwords Encryption Biometrics Firewalls Anti virus software
Today’s Lesson◦ Securing Computers
Security Protocols Security Suites
Aims - Systems Lesson 6
Security Protocols◦ A rule or agreement set up between the sender and
receiver of data◦ Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) are 2 examples◦ SSL and TLS both use encryption
Security suites◦ Groups of programs used to block threat to your computer
Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters
Securing Computers
Last Lesson◦ Securing Computers
Passwords Encryption Biometrics Firewalls Anti virus software Security Protocols Security Suites
Today’s Lesson◦ Databases
Manual V Electronic storage
What is a Database?
Aims - Systems Lesson 7
Manual/Electronic Systems
=
=
Electronic databases have a number of advantages over a manual database
You can have a backup copy They take up less room Faster to search for records Email information to others
What is a Database
A database is a program used to store data in a structured way
Examples◦ The Police National
Database◦ DVLA◦ Inland Revenue◦ Esporta Health Club
Last Lesson◦ Databases
Manual V Electronic storage
What is a Database?
Today’s Lesson◦ Databases
Files, Records and Fields
Data Types
Aims - Systems Lesson 8
Data File/Record/FieldFIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE FIRSTNAME
RECORD = INFORMATION ON ONE PERSON OR ITEM
DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE
Data/Fields Types
When creating a database you have to choose the data/field type depending on the data that is going to be stored
Examples◦ Text◦ Number◦ Date/Time◦ Currency◦ Yes/No◦ OLE object
Last Lesson◦ Databases
Manual V Electronic storage
What is a Database?
Today’s Lesson◦ Databases
Simple/Complex searching
Aims - Systems Lesson 9
Simple Search
I want to carry out a simple search on the field Favourite Hobby with the criteria Football
Complex Search
I want to carry out a complex search on the field Surname with the criteria “Forbes” and on the field Fav Hobby with the criteria “Football”
Last Lesson◦ Databases
Manual V Electronic storage
What is a Database? Simple/Complex
searching
Today’s Lesson◦ Primary Key◦ Index key
Aims - Systems Lesson 10
Primary Key◦ A primary keys
allows you to make each record unique in a database
◦ Example ID number or Account
number You may have 2 John
Smith records but they would have different ID numbers
Foreign Key◦ Foreign keys allow
you to set up a relationship or link between 2 tables in a database
◦ Example ID may be the primary
key in the customer table and a foreign key in the book ordered table
Keys
Last Lesson◦ Primary Key◦ Index key
Today’s Lesson◦ Computed Fields◦ Validation
Aims - Systems Lesson 11
Computed/Calculated Fields A computed field will carry out a
calculation on another field or fields and give you an answer
Validation
Validation is checking that the correct information has been entered into the database
Presence Check ◦ This checks that data has been entered and the field
has not been left blank Restricted Choice
◦ This presents the user with a choice they pick from Field Length Check
◦ The specifies the number of characters that should be in each field
Field Range Check◦ This specifies that range of numbers that can be stored
e.g. > 0 and < 100
Simple/Complex Sort
I want to carry out a Simple Sort on Surname Ascending
I want to carry out a Complex Sort on Surname Ascending following by Firstname Ascending
Arrangements
Arrangements
Arrangements
Arrangements