Data: is defined as unprocessed facts, numbers, or signals.
Information: is what data becomes once it has been processed and organized, making it
meaningful
Data collection: process of gathering raw data from various sources.
DATABASES:
are a collection of organised data.
are the single most important tool used to store data by programmers and web
developers.
Uses: to store everything such as, the settings in an application, text on a website,
graphics, status updates, personal messages and comments on social networks.
DATABASE MANAGEMENT SOFTWARE (DBMS):
software responsible for managing a database.
Responsibilities: Creating new databases, Managing tables within databases, Ensuring
database security.
Examples: Microsoft SQL Server, Microsoft Access, MySQL and SQLite.
FORMS :
A web form, is an online interactive page that allows for user input.
Imitates a physical form that users need to complete.
To assist with user input and limit errors, a web form usually contains GUI components
such as: checkboxes, combo boxes, spinners, drop down lists, text boxes, buttons
Key benefit of web forms is the reduction of paperwork, streamlining many processes.
TAGS:
Transmit a radio frequency from the tag to a tag reader, or vice versa
Transmits the information to a computer program associated with the tag
USES: track or identify different items and are often used in merchandising warehouses,
for vehicle tracking, pet tracking
RFID (Radio Frequency Identification) is a type of tag: Tiny chips, similar to SIM
cards, that store a few kilobytes of information. When scanned, the stored information is
read and displayed
USES: Track warehouse stock: Automatically updates inventory as products move) ,
Track workshop tools: Monitors tool usage and identifies which employee is using
them. , Tickets at events: Allows automatic gate opening for attendees, Public transport
cards: Gautrain cards in South Africa record trips and deduct costs automatically. Shop
inventory & billing: Enables automatic billing at checkout and inventory removal.
RFID readers not only scan the information but can also send it to software that
automatically adds additional details like date, time, and location to databases
DIGITAL SENSORS: an electronic or electrochemical sensor, where data conversion and data
transmission are done digitally. Sensors sense a wide range of different energy forms like
movement, electrical signals, radiant energy, pressure, thermal or magnetic.
COOKIES: a small amount of text-only data saved on your computer while you browse a
certain website to help create custom pages for you upon your return visits or
save session information
USES:
User identification: Recognizing a returning user.
Customizing web pages: Tailoring content based on past interactions. For instance, initial
form fills can create cookies that store personal information for future convenience.
TRANSACTION TRACKING: is sent from stores to the corporate database. Data is stored on
cards, such as credit cards, store cards. Main disadvantage of transaction tracking is the
unauthorised use of your personal Information.
LOCATION BASED DATA: refers to information that can be displayed on maps, providing
geographical context.
STATIC LBD : Includes information that generally does not change over short periods.
Examples: Maps showing roads, street names, locations of shops and offices, farming
information, government buildings, electric grids, and military data.
NON STATIC: Involves real-time or frequently updated positional information.
Examples: Tracking the real-time positions of airplanes, monitoring transport vehicles, locating
stolen vehicles, personal positioning (e.g., via smartphones), positions of satellites, current traffic
patterns, and tracking wildlife like rhinos or pets.
Examples of location-based computing includes:
Weather applications tell you what the weather in your specific area will be, based on
your location.
Food ordering applications can use your location to deliver food directly to you.
Car sharing services, such as, Uber use your phone’s location to find the nearest Uber
driver, who will pick you up and drop you off at the correct location
DATA WAREHOUSING:
Technique for storing data from more than one database. Data warehousing takes the data
from these databases and stores it in a non-normalised way (unlike most databases where
data is normalized and sorted)
Goal: to make the data available and ready for analysis.
DATA WAREHOUSING VS DATABASE :
SIMILARITY : both are relational data systems.
A data warehouse stores a large quantity of historical data and all the data from the
various databases are available.
A database stores current transactions and enables easy access to specific transactions for
ongoing business processes.
DATA MINING:
Process used to identify trends and patterns between different sets of data in large
databases.
PROCESS : extract the relevant data, look for patterns in the data, discover
knowledge from the patterns
CHARACTERISTICS THAT DETERMINE THE QUALITY OF DATA:
Accurate : data needs to be both correct and precise.
Consistent : data in one part of your database should not contradict or differ from
the data in another part of your database.
Current :For information to be high-quality, it’s important data is up-to-date. If
you fail to keep your information current, you run the risk that it will no longer
be relevant or accurate.
Complete: Gaps in the data can cause the data to be difficult to use, outdated
and misleading.
Relevant: Good quality data is relevant to the people who are using it.
HOW TO PROTECT DATA:
Data validation: process in which you check whether the data is accurate, in the
correct format or of the correct type before allowing your database to record it.
Ensures that data in your database is consistent and accurate. Can be used to
prevent certain types of unauthorised access
Data verification: a manual technique that can be used to make sure that the data
on a database is correct and accurate. Two main ways to do this: Full verification
requires that each piece of data that is entered into a database is read and
checked by someone. Very time consuming. Sample verification: a randomly
selected sample of data is checked to ensure there are not systematic errors. Can
help you notice errors that occur in all data, possible to miss small mistakes (like
typing errors).
Data integrity checks: referring to the reliability, accuracy and how trustworthy
data is over its entire lifecycle. This ties in with data security because
uncorrupted data (integrity) is considered to be ‘clean data’ that stays unchanged
throughout its lifecycle. built-in integrity controls that help to maintain the data
integrity include features such as data validation and access control, but also
refers to several automatic maintenance processes to prevent data corruption and
errors from occurring in a database.
Logging changes : process of recording any changes made by users to a
database. Doesn’t directly protect a database from any possible threats, it can
discourage people from sabotaging a database and make it easier to solve any
problems once they occur. This is called creating an audit trail. The audit trail
records exactly: who made the changes, what the user changed, when they made
the changes.
Data warehousing: Improved data integrity : make incorrect data entries or data
corruption more visible by allowing data analysis. Can make data loss more
visible, allowing the problem to be fixed. Can be used to recover critical data if it
is deleted or corrupted.
Access control: refers to managing and controlling the parts of a database that
users have access to. By limiting the number of people who can change a
database, and by limiting what changes each user can make, you can reduce the
damage that any single user can do to a database. Important when many users
have access to your database. Three ways to control access to your data:
-Passwords ensure that only the owner of a username can log in with that
username.
-User rights determine which tables and fields every username can access, and
what changes (if any) the user can make to these tables. This prevents others
from gaining access to certain data or making changes they are not authorised to
do.
-Good database security ensures that the data is secure and that outside people
cannot find other ways to access the database.
PARALLEL DATA SETS : ensure that data has not been corrupted or deleted, the database is
checked at intervals against a perfect copy of it, called a parallel data set. If there are differences,
it means that data was either corrupted or deleted.
CHARACTERISTICS OF A GOOD DB:
be strong enough to store all the relevant data and requirements.
Should be able to relate the tables in the database by means of a relation, for example, an
employee works for a department so that employee is related to a particular department.
We should be able to define such a relationship between any two entities in the database.
Multiple users should be able to access the same database, without affecting the other
user. For example, several teachers can work on a database to update learners’ marks at
the same time. Teachers should also be allowed to update the marks for their subjects,
without modifying other subject marks.
A single database provides different views to different users, it supports multiple views
to the user, depending on his role. In a school database, for example, teachers can see
the breakdown of learners’ marks; however, parents are only able to see only their
child’s report – thus the parents’ access would be read only. At the same time, teachers
will have access to all the learners’ information and assessment details with modification
rights. All this is able to happen in the same database.
Data integrity refers to how accurate and consistent the data in a database is. Databases
with lots of missing information and incorrect information is said to have low data
integrity.
Data independence refers to the separation between data and the application (or
applications) in which it is being used. This allows you to update the data in your
application (such as fixing a spelling mistake)without having to recompile the entire
application.
Data Redundancy refers to having the exact same data at different places in the
database. Increases the size of the database, creates Integrity problems, decreases
efficiency and leads to anomalies. Data should be stored so that It Is not repeated In
multiple tables.
Data security refers to how well the data in the database is protected from crashes,
hacks and accidental deletion.
Data maintenance refers to monthly, daily or hourly tasks that are run to fix errors
within a database and prevent anomalies from occurring. Database maintenance not only
fixes errors, but it also detects potential errors and prevents future errors from occurring.
PEOPLE INVOLVED WITH DATABASES:
Developers: who design and develop the database to suite the needs of an enterprise
Administrator: checks the database for its usages, provides access to other uses,
provides any other maintenance work required to keep the database up to date
User: anyone who uses the database to perform their work or access information, such as
teachers or parents.
PROBLEMS WITH DATABASES:
Insertion anomaly: database has been created in such a way that required data cannot be
added unless another piece of unavailable data is also added
Deletion anomaly: legitimate deletion of a record of data can cause the deletion of some
required data.
Modification anomaly: Incorrect data may have to be changed, which could involve
many records having to be changed, leading to the possibility of some changes being
made incorrectly.
How to get rid of Anomalies:
Normalise the database by efficiently organising the data in a database.
goals of normalisation include: removing all redundant (or repeated) data from the
database, removing undesirable insertions, updates and deletion dependencies, reducing
the need to restructure the entire database every time new fields are added to it, making
the relationships between tables more useful and understandable.
TERM 2:
COMPUTER MANAGEMENT:
process of managing, monitoring and optimising your computer’s functionality to best
serve your needs. This process could include improving and maintaining the security
features, performance, and reliability of your computer.
Tasks you can do to ensure your computer remains fast, reliable and secure include the
following:
- managing your desktop
-managing files and folders by: freeing up storage space, compressing files and folders,
updating your software, backing up your files, scanning for viruses and malware,
checking your hard disks
FACTORS INFLUENCING COMPUTER MANAGEMENT:
A computer’s speed, ease of use and security are influenced by various factors. The five most
important factors are:
Software: refers to computer instructions in the form of operating systems, utilities,
programs, and applications that enable computers to work. Affects computer’s
performance in different ways:
- installing too many applications may use up a computer’s resources and cause the
computer to slow down
- out-of-date software may contain bugs or security problems
-viruses are also a form of software and are often installed with other software
applications.
Most important software task you should complete is to regularly update your software.
(An update: new, improved, or fixed software, which replaces older versions of the same
software.)
Security: protection of computer systems and information from harm, theft, and
unauthorized use.
Weak security can result in files being accessed illegally, and viruses being installed
leading to reduced computer performance.
Two main goals: Prevent any malicious software from affecting your computer by using
antivirus software. Backup your files so that they are safe, even if your computer is
damaged in some way.
Firewall: A network utility that prevents unauthorised network connections to and from
your computer. Only the applications you allow on your computing device can send or
receive data from and to the internet.
Antivirus: Software programme designed to prevent, search, detect and remove
malicious software (Malware) from your computing device.
Spyware: Piece of code that hides on your computer and tracks all your activity
without your knowledge. (can control the Spyware, by activating the pop-up blocker on
your browser settings or installing an anti-spyware software application.)
Adware: Type of malware that presents unwanted advertisements to the user of a
computer in the form of pop-up or an ‘unclosable window’.
Back up data : process of making copies/duplicates of data and storing it on a different
device in a different geographical location in the event of the original data being lost or
destroyed. (natural disaster, theft situation, accidental deletion) Data loss can occur due
to: hardware failure, many potential threats to your data (viruses and Trojans), threat of
ransomware: when a hacker puts a virus on your computer that encrypts your data,
making it useless.
Backing your data up is the single best way to protect your data. With an up to date
backup, any data that you lose can be recovered easily.
Use the following guidelines when creating a backup system:
-must include all important files and folders.
- should be run regularly, preferably every day, but at least once a week.
-must be saved on a different storage device from the data it is backing up.
-should be saved on a storage device that is not permanently connected to your computer.
- should be kept in a safe place to protect it from physical damage.
-data should be verified occasionally to make sure the backup system is still working.
Three main techniques you can use to create a backup:
- Copy and paste (select files and folders you would like to backup, copy them using the
copy command and paste In a folder on an external hard drive)
- Backup and Restore Software: (This utility can be used to automatically backup your
data to an external hard drive by simply updating changes to the relevant files that were
backed-up previously).
- Online backup (back files up online using a service like Google Drive).
House keeping: The way in which a computer and its files and folders are organised so
that they are quick and easy to find. General housekeeping tasks include:
- Disk clean-up: is a computer maintenance utility designed to free-up storage space on a
computing device. It identifies and removes temporary files that are no longer needed
and cleans out old files, programs and settings that cause your computer to slow down.
Defragmentation of the hard disk also improves the speed at which the files are
accessed.
-Scheduling and updating: Can task scheduler to create and manage common tasks that
your computer will carry out automatically at a time you specify, for example, you can
schedule your computer to run a software update or make a backup at a specific time.
-Archive and backup : Chugging is the process of moving data that is no longer actively
used to a separate storage device for long-term retention. Files are not duplicated.
Archived data consists of old data that remains important and is retained for future
reference.
-Compression and decompression: File compression: process that makes use of advanced
algorithms and mathematical formulas to decrease the amount of disc space used by big
files. Decompressing : method of extracting the compressed file back to its original form
using the same algorithms or mathematical formulas.
-Space on the hard drive: Computers need sufficient unused space on the hard drive In
order to operate smoothly. Free space on your drive is required because certain
programs/
-Errors and corrupt files: Errors and corrupted computer files are files have been
damaged or saved incorrectly and can’t be opened in the normal way. Files with errors
and corrupt files are difficult to detect and they can cause everything from videos not
loading to applications crashing, or even your operating system not opening.
Amount of unused space on the hard drive : Computers need sufficient unused space on
the hard drive to operate smoothly. There are a few things you can do: use the disk
clean-up tool , uninstall unused software, empty the recycle bin, compress data not
frequently used.
SOFTWARE:
Comprises of Systems software or applications software.
System software is a specific type of software that manages a computing device and
comprises of: the operating system that manages hardware, software and other
applications on a computing device. Functions of the operating system is grouped into:
hardware management, I/O management, process management, file management and
memory management. Utilize programs : adds functionality to your computer and helps
your computer perform better. (antivirus, backup, disk repair, file management,
security, and networking programs.) Device drivers (software program) : controls a
particular type of hardware device that is attached to a computer.
Application software is a program or group of programs designed for end-users.
Applications software include database programs, word processors, web browsers,
spreadsheets, and so on.
CLOUD COMPUTING:
Process in which computers on the Internet (rather than local computers) are used to
store, manage and process data.
Examples: Google Docs, Office 365, Dropbox.
Cloud computing offers several significant advantages to users:
●Scalable: Cloud computing is perfectly scalable, which means that the capacity of your virtual
machine will grow automatically as your requirements increase.
●Affordable: A single virtual machine is affordable, and it only becomes expensive once you
need to rent large numbers of virtual machines.
●Reliable: Many cloud computing companies guarantee that the machine will be available to
users always.
●Fast: Cloud computers and the Internet connection to these computers can be incredibly fast.
● Maintained: servers used for cloud computing are maintained by an expert team who ensure
they continue running efficiently.
SOFTWARE AS A SERVICE (SAAS) SaaS (or Software as a Service)
refers to applications that are hosted on the cloud and that users pay a monthly
subscription to access.
Runs on cloud servers, displaying only the user interface in browsers, with no local
installation needed.
Advantages of SAAS
●minimal setup required: No need to purchase expensive licenses upfront or install complex
software locally.
● minimal initial cost
●software is updated automatically on the cloud computers: The vendor handles all updates and
patches, ensuring users always have the latest version.
● new features are regularly added: Providers frequently roll out new features and
improvements.
●can be used from any computer with an Internet connection.
● easier to collaborate or share information with other users.
VIRTUAL REALITY: an artificial environment that is created with software. Computer-
generated simulation of a three-dimensional image or environment. This is presented to the user
in such a way that the user believes and accepts it as a real environment and becomes
completely immersed in that world and shuts out the physical world. It is primarily experienced
through two of the five senses: sight and sound.
PURPOSES
Gaming: Immersive virtual worlds.
Military: Combat training simulations.
Education: Virtual classrooms with interactive data.
Healthcare: Surgery simulations, phobia treatment, robotic surgery, skills training.
Entertainment: Interactive theme parks, virtual museums, theatres.
Fashion: Avatar-based clothing design, virtual stores.
Heritage: Virtual visitor centres (e.g., Terracotta Army) to preserve sites.
Business: Employee training, virtual business tours.
Engineering: Visualize projects to identify flaws/risks.
Sport: Analyse athletic performance.
Media: Create realistic films.
Scientific Visualization: Display complex concepts (e.g., molecular models).
Telecommunications: Enhance smartphone interactions.
HARDWARE AND SOFTWARE REQUIREMENTS
Personal Computer (PC)/Console/Smartphone : used to process and power the inputs
and outputs sequentially.
Input devices : let’s user navigate and interact within a VR environment e.g. joysticks,
force Balls/Tracking balls, controller wands, data gloves, trackpads, On-device control
buttons, motion trackers, bodysuits, treadmills and motion platforms (virtual omni).
Output devices present the VR content or environment to the users and includes visual,
auditory or haptic displays.
ADVANTAGES
used as a training tool in many areas of life and can provide remote access (e.g. surgery
can be performed in remote locations using robotic technology and virtual reality.)
provides learning experiences that one cannot get from reading books as it immerses
you in that world. (makes learning fun and can eliminate the language barrier and certain
dangers associated with scientific experiments.
LIMITATIONS OF TECHNOLOGIES
cannot simulate a real classroom where learning fluctuates,
Challenges in rendering meaningful graphics.
Scaling digital data to match visual perspectives.
Smartphone AR compatibility issues with virtualization.
Can be addictive and detrimental to social connections as it is not real-life, only an
imaginary world.
ARGUMEBTED REALITY
a computer-generated image onto a user’s view of the real world.
provides a composite 3D view that provides full immersion.
can be experienced through headsets that people wear and through displays on mobile
devices.
USES
AR apps, headsets, and smart glasses add value to virtually every industry retail to
industrial manufacturing. AR has the potential to solve some of the biggest problems.
AR TECHNOLOGY :
Product view – Allows customers to view and interact with products or services before
purchasing.
Enhance content – Allows users to embed various types of data onto content. People can
point their device at a real-life object to learn whatever kind of information is necessary,
instead of needing to search for it elsewhere.
Training – AR enables users to train employees more thoroughly than they can through
documentation and meetings. This software allows for trainees to learn job
responsibilities by fully visualizing them, instead of just reading about job duties
Productivity – This software enables users to improve workflow and processes at their
business. Factory line workers can spot potential dangers quicker.
Engage your audience – People are inundated with print and television advertisements
to the point where they don’t pay much attention to them. Inserting augmented reality
into advertisements will catch the eye of your target demographic.
HARDWARE AND SOFTWARE REQUIREMENTS
battery life
bluetooth connectivity/Wi-Fi
field of view in 3D view
on board storage capacity
on board OS/Web Browser
inputs/outputs (button, eye tracking, accelerometer)
microphone
sound capacity
display capacity
visual tracking
Software :
appropriate software that enables computer-generated objects to be projected into the
real world.
on-board operating system and user interface to support the software
web Browser
authoring to allow the user to use API links to other databases and websites to display
information.
ADVANTAGES
to get or enhance creativity
provide a new product experience
able to preview the product visually
build real-time data experiences
enjoy experiential experiences
functional uses demo
LIMITATIONS OF AUGMENTED REALITY
rendering digital data into meaningful graphics
scaling digital data to be suitable with the perspective of the visual field
in smartphones, AR must work with limited storage, small processing power and small
amount of memory.
Virtualisation: refers to running multiple computing environments (called virtual machines) on
a single set of hardware.
USES OF VIRTUALISATION
Testing different operating systems/software.
Cloning computers.
Hosting cloud applications.
Allowing multiple users on one computer.
Benefits:
Cost Savings: Reduces need for servers, storage, and desktops, lowering
capital/operational costs and software licenses
Asset Efficiency: Server virtualization maximizes hardware use.
Disaster Recovery: Supports high availability and automated recovery without full
replication.
Green IT: fewer server and storage resources, the demand for power and cooling can be
reduced and there will be fewer units to dispose of.
Long-Term: Establishes infrastructure for ongoing cost savings and sustainability.
SOCIAL IMPLICATIONS:
HACKERS :anyone who uses their computer skills to gain unauthorised access to computer
systems or data.
TYPES OF HACKERS
White hat hackers help companies improve their security by trying to hack into their
computers.
Black hat hackers illegally break into computer systems.
CRACKERS :Individuals who use their skills illegally. May break into computer systems for a
variety of reasons, from stealing data to testing their skills to making political statements.
(cracker can also be used to refer to people who write software cracks (tools that allow software
to be pirated and used illegally).
CYBER GANGS :group of people who work together to commit computer crimes. Just like in
real life gangs, these gangs can be made up of many loosely organised members.
VIRUS AUTHOR :any person who writes a computer virus. Virus authors create viruses for
several reasons, including causing damage, showing off their skills, gaining information or
money or taking over computers and using them to send spam emails.
EFFECTS:
lost money due to online theft
expenses incurred to fix problems and prevent future cybercrimes
loss of reputation due to personal information that is revealed
corrupted files due to viruses
long-term debt created resulting in poor credit rating due to online identity
HARDWARE HACKING :attacks aimed at specific pieces of hardware. The goal of these
attacks is to unlock the hardware in order to give the owner access to features that are normally
locked.
SOFTWARE HACKING :achieved by finding software exploits and breaking software
protection When finding software exploits, hackers look for weaknesses in an application’s
security. These exploits are used to gain unauthorised access to the software itself, or gain
remote access to the computer.
When breaking software protection, the goal of hackers is to remove the protection which
ensures that the software was purchased and is used legally. This allows people to play pirated
games or use pirated software
WEBSITE AND INFORMATION HACKING Hacking a website is ilegally getting the
password to add, edit, delete data stored in that website. After hacking, the hacker will insert
harmful programs by inserting malicious codes into the website.
Website and information hacking is used for several different reasons:
Steal users’ personal (email addresses, passwords, credit card information, information)
for identity theft
Build a database of common usernames and passwords
Deface the website or place political messages on the website
Reroute traffic from the website to a phishing website
IDENTITY THEFT happens when a criminal gains access to your personal information and
uses that information to gain some benefit. This can include taking out loans in your name,
taking control of your existing bank or service accounts, creating a phone number in your
name, or using your name to commit other illegal activities
.BANDWIDTH THEFT Bandwidth theft, occurs when someone links to a file on your
website or server from their website. This video will use your bandwidth for all users
viewing the video.
SERVICE THEFT Service theft occurs on the Internet whenever someone illegally uses a
username and password to access an online service.
INTERNET RELATED FRAUD SCHEMES Internet fraud is the use of Internet services or
software to defraud victims or to otherwise take advantage of them. Some examples of Internet
related fraud schemes are: business fraud, credit card fraud, fraudulent investment schemes,
non-delivery of merchandise etc.
INTERNET ATTACKS:
Worms: Self-replicating malware spreading across networks.
Malware: Software designed to harm or exploit systems.
Denial-of-Service (DoS): Overwhelms systems to make them inaccessible.
Phishing: Tricks users into revealing sensitive information by posing as legitimate entities.
Backdoors: Exploit hidden access points.
Drive-by Attacks: Malware delivered via website visits.
SQL Injection: Inserts malicious code into databases to extract or manipulate data.
PHISHING an attempt by cybercriminals to obtain sensitive information (usernames,
passwords and credit card details) by posing as legitimate institutions, usually via an electronic
communication