The document provides information on data, information, and information systems. It defines data as raw unorganized material that has little value on its own. Information is organized data that is meaningful to a user. An information system is a set of related components that collects data, processes it, and provides information. It gives examples of information systems used in education like learning management systems, and information systems used in business for online shopping, transportation, and hotel booking.
The document discusses computer networks and communications. It defines a computer network as a system that connects interconnected computers and devices to share information and resources. It describes the different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also explains the basic components, hardware, and software needed for networks and communications to function properly.
This document discusses computer networks and communications. It begins by defining a computer network as a system that connects interconnected computers and peripheral devices to communicate and share information and resources. There are three main types of networks: local area networks (LANs) which cover a small area like a building; metropolitan area networks (MANs) which connect LANs within a larger area like a city; and wide area networks (WANs) which are the largest and connect LANs or MANs across large distances like countries or continents. The document then discusses network architectures, focusing on client/server networks where shared files and applications are stored on a server and accessed by client computers, and peer-to-peer networks where all nodes can
The document provides information about computer input and output devices. It discusses different types of input devices including keyboards, mice, scanners, microphones, webcams, and digital cameras. It also covers various output devices such as monitors, printers, speakers, projectors, and photo printers. The summary discusses how input devices capture different types of data like text, graphics, audio, and video, and how output devices present the processed results in forms that are useful to users.
This document provides information about extranets and communication devices and their hardware requirements. It discusses:
1) What an extranet is, how it originated in the late 1990s/early 2000s, and how it allows authorized parties like customers and affiliates external access to a company's website.
2) Examples of communication devices like network interface cards, wireless network cards, modems, hubs/switches, routers, and wireless access points that enable computers to communicate over a network.
3) Requirements for communication devices including different types of network cards, modems, how hubs/switches and routers function, and that wireless access points use antennas to transfer information wirelessly.
Primary storage refers to the internal memory of a computer, including RAM and ROM. RAM (random-access memory) allows for reading and writing of data during processing but is volatile and loses data when power is turned off. ROM (read-only memory) holds programs and data non-volatily but only allows for reading. Primary storage is directly accessible by the CPU and stores instructions and data currently being processed. Larger and more complex programs/functions are placed in primary storage.
This document provides an introduction to computer networks and communications. It discusses what a computer network is, how computers communicate on a network using hardware, software and protocols. It describes the different types of networks - local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) - and compares their key characteristics like size, speed, and transmission media. The document also covers the basic components needed for network communications, including physical transmission channels, network interface cards, routers, and network software.
A computer system consists of four major hardware components: input devices, output devices, a processor, and storage devices. Input devices feed data into the processor, the processor processes the data, and storage devices hold both processed and unprocessed data. Common input devices include keyboards, mice, scanners, and digital cameras. Output devices like monitors display processed data for the user. A computer requires hardware, software, and a user to fully function.
This document provides information about data, information systems, and their components. It defines data as raw unorganized material that has little value on its own. Information is organized data that is meaningful to users. An information system is a set of related components that collects data, processes it, and provides information. The key components of an information system are data, hardware, software, people, and procedures. Together these components work to input data, process it, and output useful information to meet users' needs.
The document discusses computer networks and communications. It defines a computer network as a system that connects interconnected computers and devices to share information and resources. It describes the different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also explains the basic components, hardware, and software needed for networks and communications to function properly.
This document discusses computer networks and communications. It begins by defining a computer network as a system that connects interconnected computers and peripheral devices to communicate and share information and resources. There are three main types of networks: local area networks (LANs) which cover a small area like a building; metropolitan area networks (MANs) which connect LANs within a larger area like a city; and wide area networks (WANs) which are the largest and connect LANs or MANs across large distances like countries or continents. The document then discusses network architectures, focusing on client/server networks where shared files and applications are stored on a server and accessed by client computers, and peer-to-peer networks where all nodes can
The document provides information about computer input and output devices. It discusses different types of input devices including keyboards, mice, scanners, microphones, webcams, and digital cameras. It also covers various output devices such as monitors, printers, speakers, projectors, and photo printers. The summary discusses how input devices capture different types of data like text, graphics, audio, and video, and how output devices present the processed results in forms that are useful to users.
This document provides information about extranets and communication devices and their hardware requirements. It discusses:
1) What an extranet is, how it originated in the late 1990s/early 2000s, and how it allows authorized parties like customers and affiliates external access to a company's website.
2) Examples of communication devices like network interface cards, wireless network cards, modems, hubs/switches, routers, and wireless access points that enable computers to communicate over a network.
3) Requirements for communication devices including different types of network cards, modems, how hubs/switches and routers function, and that wireless access points use antennas to transfer information wirelessly.
Primary storage refers to the internal memory of a computer, including RAM and ROM. RAM (random-access memory) allows for reading and writing of data during processing but is volatile and loses data when power is turned off. ROM (read-only memory) holds programs and data non-volatily but only allows for reading. Primary storage is directly accessible by the CPU and stores instructions and data currently being processed. Larger and more complex programs/functions are placed in primary storage.
This document provides an introduction to computer networks and communications. It discusses what a computer network is, how computers communicate on a network using hardware, software and protocols. It describes the different types of networks - local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) - and compares their key characteristics like size, speed, and transmission media. The document also covers the basic components needed for network communications, including physical transmission channels, network interface cards, routers, and network software.
A computer system consists of four major hardware components: input devices, output devices, a processor, and storage devices. Input devices feed data into the processor, the processor processes the data, and storage devices hold both processed and unprocessed data. Common input devices include keyboards, mice, scanners, and digital cameras. Output devices like monitors display processed data for the user. A computer requires hardware, software, and a user to fully function.
This document provides information about data, information systems, and their components. It defines data as raw unorganized material that has little value on its own. Information is organized data that is meaningful to users. An information system is a set of related components that collects data, processes it, and provides information. The key components of an information system are data, hardware, software, people, and procedures. Together these components work to input data, process it, and output useful information to meet users' needs.
The document discusses computer security and threats. It defines computer security as protecting computer systems and information from unwanted access, damage, or modification. It describes three types of computer security: hardware security, software/data security, and network security. It also discusses various threats like viruses, Trojans, hackers, and natural disasters. It provides checklists and security measures like backups, antivirus software, firewalls, and access controls to protect against these threats.
A computer network connects multiple computers and devices to allow sharing of resources and communication between users. There are three main types of networks - local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs cover small physical areas like a home or office building. MANs encompass larger areas like a city. WANs have the largest geographical reach such as between countries. Common network architectures include client-server, where file storage and services are centralized on server computers, and peer-to-peer where computers directly share files and resources without a central server.
This document provides an introduction to information and communication technology (ICT). It discusses the evolution of communication from early forms like sign language to modern technologies like smartphones and the internet. It defines ICT as the use of computers, devices, and software to store, process, transmit and retrieve information. The document then covers key topics in ICT including information, communication, and technology. It provides timelines showing the development of technologies like writing, printing, telephones and computers. It also summarizes the four generations of computer development from vacuum tubes to integrated circuits and microprocessors.
Dr. John Sum introduces various concepts related to telecommunications and computer networks. He discusses different types of telecommunication media that can transmit electronic signals including twisted pair wire, coaxial cable, fiber optic cable, microwave, satellite, cellular, and infrared transmission. He also describes network topologies like ring, bus, star, and hierarchical networks. The document covers protocols like TCP/IP and OSI 7-layer model, as well as applications of telecommunications including email, videoconferencing, electronic data interchange, and public network services.
Telecommunication networks provide several business benefits for networked enterprises, including better communication, data distribution, instant transactions, a flexible workforce, and greater efficiency. As businesses become digital firms, they are able to develop digitally-enabled relationships and seamless information flow. Telecommunication networks are made up of various components including people, hardware, software, data, and network resources. Common network topologies used include star, ring, and bus networks. Businesses can leverage telecommunication networks and the internet to collaborate, provide customer support, engage in e-commerce, and realize cost savings. Intranets also allow internal information sharing and communication within an organization.
This document provides an overview of computer systems and networking. It discusses the history of computer generations from vacuum tubes to modern integrated circuits. It also covers networking topics like topologies, protocols, standards, and network devices. Security measures are described like authentication, verification, filtering, and preventing computer crimes. The roles of hardware, software, operating systems, and networking components are defined.
This document provides an overview of mobile computing. It discusses mobile communication infrastructure, mobile hardware devices like smartphones and tablets, and mobile software operating systems. It also describes the three-tier architecture of mobile networks, including the presentation tier for user interfaces, application tier for processing transactions, and data tier for database management. Finally, it discusses common mobile network types like cellular networks that connect devices to base stations, WLAN networks that use wireless access points, and ad hoc networks that allow direct communication between nodes.
Mobile computing allows users to access computing devices while mobile through portable devices. It involves mobile communication, hardware, and software. Limitations include insufficient bandwidth on mobile networks, security risks on public networks, limited battery life, signal interference issues, and potential health hazards. Common mobile computing devices are portable computers, tablets, PDAs, smartphones. Wireless services include cellular networks, GPS, cordless devices, and satellite television. Wireless networks use technologies like WiFi to connect laptop and mobile users over distances or in locations where cabling is not practical. Wireless communication occurs through radio frequency, microwave or infrared modes for various applications.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the US Advanced Research Projects Agency (ARPA). It served as the basis for today's internet and initially linked computers located at Pentagon-funded research institutions over telephone lines. A computer network connects computers together to allow for sharing of resources like files, printers or internet access. There are several types of computer networks including local area networks (LANs), personal area networks (PANs), metropolitan area networks (MANs), and wide area networks (WANs). Key components of computer networks include hardware like network interface cards (NICs), cables, routers, switches and software.
This document provides an introduction to computer networking concepts for students. It discusses the basic components of a network, including cables, switches, routers and wireless access points. It explains the differences between peer-to-peer and client-server network configurations. Advantages of networking for schools include faster sharing of files and resources, lower costs through shared software licenses, and easier collaboration between students and teachers. Some considerations for setting up a wireless network are also outlined.
Distributed systems allow networked computers to coordinate actions and share resources by passing messages. Key characteristics include concurrency as computers can work independently, a lack of global clock for coordination, and independent failures as computers may fail or disconnect without crashing the entire system. Examples of distributed systems include the Internet, intranets, and mobile/ubiquitous computing networks that allow sharing of resources across devices.
An operating system is software that acts as an interface between computer hardware and users, allowing applications to run and perform tasks. The main functions of an operating system include process management, memory management, file management, device management, I/O system management, and security. The kernel is the central component of the operating system and enables communication between hardware and software. Mainframe systems evolved from early batch systems with no user interaction to time-sharing systems that allowed for simultaneous multi-user interaction through rapid switching between users.
ICT refers to the technologies required for information processing, including electronic computers, communication devices, and software applications. These technologies allow for information to be converted, stored, processed, transmitted, and retrieved from anywhere at any time. Key aspects of ICT include computers, the internet, email, video conferencing, phones, fax machines, radio, television, and satellites. ICT has evolved over time from early counting tools to modern computers and is now widely used in education, banking, industry, e-commerce, and other areas of daily life.
This document provides an introduction to information technology. It defines information as any knowledge that comes to our attention in the form of voice, image, text or video. Data is defined as information when dealing with machines. Information technology is described as the application of computers to store, study, retrieve, transmit, and manipulate data or information, often in business contexts. Examples of information technology include telephones, televisions, and various handheld devices. The document also discusses how information technology is used in education through email, course management software, distance learning and avatars. Computers are also described as being used in health and medicine through telemedicine and robots. The effects of information technology on financial matters, television, and other activities are also
This document provides an overview of computer networking and telecommunications. It discusses how networks allow hardware, software, and people to be connected. It describes the basic anatomy of networks, including network interface cards and modems. It also discusses different types of networks like local area networks and wide area networks. Additional topics covered include electronic mail, bulletin boards, teleconferencing, and emerging technologies like video conferencing and electronic funds transfer.
This document provides an overview of key concepts in information systems, including databases, data storage methods, information integration challenges, business intelligence, and how organizations use IT to support business activities. It describes the core components of IT infrastructure including hardware, software, networks and how they work together. It also discusses databases, data organization, data storage and sharing methods, and how IS supports business transactions and processes.
1. The document describes applications of computer networking including resource access, data access, communication and data exchange, decentralization of data processing, and easy communication between organizations.
2. It then discusses internet security including client-server security using methods like passwords, firewalls, and encryption. Data and transaction security also uses encryption.
3. Various security methods are described for client/server and data/transaction security including password schemes, firewalls, and encryption techniques.
The document provides an overview of the history and operation of the internet and communication technologies. It discusses early communication technologies like the slide rule and telephone and how they evolved over time. It then covers the basics of how the internet works, including physical connections, data transmission speeds, protocols, IP addresses, and applications. It also summarizes key technologies that enabled the development of the modern internet like radio, computers, and the world wide web.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
The document provides an introduction to basic programming concepts through 10 lessons:
1) It defines programs, programming, and programming languages. Programs direct computers using organized instructions. Programming is creating commands to direct computers. Programming languages allow communication with computers.
2) It discusses generations of programming languages from low-level machine code to high-level languages.
3) It covers structured and object-oriented programming approaches.
4) It defines translators like assemblers, interpreters, and compilers that translate human-readable code into machine-readable code.
5) It provides an overview of installing and using the Visual Basic programming language.
6) It identifies the basic elements of programming:
The document provides information about database objects in Microsoft Access, including queries, forms, and reports. It defines queries as objects that retrieve specific information from a database. Forms allow users to add, modify, and view information from tables or queries. Reports summarize information from the database for printing purposes. The document discusses how to create and use these different database objects.
The document discusses computer security and threats. It defines computer security as protecting computer systems and information from unwanted access, damage, or modification. It describes three types of computer security: hardware security, software/data security, and network security. It also discusses various threats like viruses, Trojans, hackers, and natural disasters. It provides checklists and security measures like backups, antivirus software, firewalls, and access controls to protect against these threats.
A computer network connects multiple computers and devices to allow sharing of resources and communication between users. There are three main types of networks - local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs cover small physical areas like a home or office building. MANs encompass larger areas like a city. WANs have the largest geographical reach such as between countries. Common network architectures include client-server, where file storage and services are centralized on server computers, and peer-to-peer where computers directly share files and resources without a central server.
This document provides an introduction to information and communication technology (ICT). It discusses the evolution of communication from early forms like sign language to modern technologies like smartphones and the internet. It defines ICT as the use of computers, devices, and software to store, process, transmit and retrieve information. The document then covers key topics in ICT including information, communication, and technology. It provides timelines showing the development of technologies like writing, printing, telephones and computers. It also summarizes the four generations of computer development from vacuum tubes to integrated circuits and microprocessors.
Dr. John Sum introduces various concepts related to telecommunications and computer networks. He discusses different types of telecommunication media that can transmit electronic signals including twisted pair wire, coaxial cable, fiber optic cable, microwave, satellite, cellular, and infrared transmission. He also describes network topologies like ring, bus, star, and hierarchical networks. The document covers protocols like TCP/IP and OSI 7-layer model, as well as applications of telecommunications including email, videoconferencing, electronic data interchange, and public network services.
Telecommunication networks provide several business benefits for networked enterprises, including better communication, data distribution, instant transactions, a flexible workforce, and greater efficiency. As businesses become digital firms, they are able to develop digitally-enabled relationships and seamless information flow. Telecommunication networks are made up of various components including people, hardware, software, data, and network resources. Common network topologies used include star, ring, and bus networks. Businesses can leverage telecommunication networks and the internet to collaborate, provide customer support, engage in e-commerce, and realize cost savings. Intranets also allow internal information sharing and communication within an organization.
This document provides an overview of computer systems and networking. It discusses the history of computer generations from vacuum tubes to modern integrated circuits. It also covers networking topics like topologies, protocols, standards, and network devices. Security measures are described like authentication, verification, filtering, and preventing computer crimes. The roles of hardware, software, operating systems, and networking components are defined.
This document provides an overview of mobile computing. It discusses mobile communication infrastructure, mobile hardware devices like smartphones and tablets, and mobile software operating systems. It also describes the three-tier architecture of mobile networks, including the presentation tier for user interfaces, application tier for processing transactions, and data tier for database management. Finally, it discusses common mobile network types like cellular networks that connect devices to base stations, WLAN networks that use wireless access points, and ad hoc networks that allow direct communication between nodes.
Mobile computing allows users to access computing devices while mobile through portable devices. It involves mobile communication, hardware, and software. Limitations include insufficient bandwidth on mobile networks, security risks on public networks, limited battery life, signal interference issues, and potential health hazards. Common mobile computing devices are portable computers, tablets, PDAs, smartphones. Wireless services include cellular networks, GPS, cordless devices, and satellite television. Wireless networks use technologies like WiFi to connect laptop and mobile users over distances or in locations where cabling is not practical. Wireless communication occurs through radio frequency, microwave or infrared modes for various applications.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the US Advanced Research Projects Agency (ARPA). It served as the basis for today's internet and initially linked computers located at Pentagon-funded research institutions over telephone lines. A computer network connects computers together to allow for sharing of resources like files, printers or internet access. There are several types of computer networks including local area networks (LANs), personal area networks (PANs), metropolitan area networks (MANs), and wide area networks (WANs). Key components of computer networks include hardware like network interface cards (NICs), cables, routers, switches and software.
This document provides an introduction to computer networking concepts for students. It discusses the basic components of a network, including cables, switches, routers and wireless access points. It explains the differences between peer-to-peer and client-server network configurations. Advantages of networking for schools include faster sharing of files and resources, lower costs through shared software licenses, and easier collaboration between students and teachers. Some considerations for setting up a wireless network are also outlined.
Distributed systems allow networked computers to coordinate actions and share resources by passing messages. Key characteristics include concurrency as computers can work independently, a lack of global clock for coordination, and independent failures as computers may fail or disconnect without crashing the entire system. Examples of distributed systems include the Internet, intranets, and mobile/ubiquitous computing networks that allow sharing of resources across devices.
An operating system is software that acts as an interface between computer hardware and users, allowing applications to run and perform tasks. The main functions of an operating system include process management, memory management, file management, device management, I/O system management, and security. The kernel is the central component of the operating system and enables communication between hardware and software. Mainframe systems evolved from early batch systems with no user interaction to time-sharing systems that allowed for simultaneous multi-user interaction through rapid switching between users.
ICT refers to the technologies required for information processing, including electronic computers, communication devices, and software applications. These technologies allow for information to be converted, stored, processed, transmitted, and retrieved from anywhere at any time. Key aspects of ICT include computers, the internet, email, video conferencing, phones, fax machines, radio, television, and satellites. ICT has evolved over time from early counting tools to modern computers and is now widely used in education, banking, industry, e-commerce, and other areas of daily life.
This document provides an introduction to information technology. It defines information as any knowledge that comes to our attention in the form of voice, image, text or video. Data is defined as information when dealing with machines. Information technology is described as the application of computers to store, study, retrieve, transmit, and manipulate data or information, often in business contexts. Examples of information technology include telephones, televisions, and various handheld devices. The document also discusses how information technology is used in education through email, course management software, distance learning and avatars. Computers are also described as being used in health and medicine through telemedicine and robots. The effects of information technology on financial matters, television, and other activities are also
This document provides an overview of computer networking and telecommunications. It discusses how networks allow hardware, software, and people to be connected. It describes the basic anatomy of networks, including network interface cards and modems. It also discusses different types of networks like local area networks and wide area networks. Additional topics covered include electronic mail, bulletin boards, teleconferencing, and emerging technologies like video conferencing and electronic funds transfer.
This document provides an overview of key concepts in information systems, including databases, data storage methods, information integration challenges, business intelligence, and how organizations use IT to support business activities. It describes the core components of IT infrastructure including hardware, software, networks and how they work together. It also discusses databases, data organization, data storage and sharing methods, and how IS supports business transactions and processes.
1. The document describes applications of computer networking including resource access, data access, communication and data exchange, decentralization of data processing, and easy communication between organizations.
2. It then discusses internet security including client-server security using methods like passwords, firewalls, and encryption. Data and transaction security also uses encryption.
3. Various security methods are described for client/server and data/transaction security including password schemes, firewalls, and encryption techniques.
The document provides an overview of the history and operation of the internet and communication technologies. It discusses early communication technologies like the slide rule and telephone and how they evolved over time. It then covers the basics of how the internet works, including physical connections, data transmission speeds, protocols, IP addresses, and applications. It also summarizes key technologies that enabled the development of the modern internet like radio, computers, and the world wide web.
Full video explained in Hindi
Check youtube channel -
The Avi Security
basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions. basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
Basic networking concepts is fundamental to a successful career in information technology. Networking technologies underlie all IT activities and a strong comprehension of the hardware and protocols used to create networks is essential to future success. In this training course, you will learn how to configure a workstation to connect to a network, analyze network traffic using a protocol analyzer, examine switch and router configurations, perform basic IPv4 addressing and subnetting, and research network security solutions.
The document provides an introduction to basic programming concepts through 10 lessons:
1) It defines programs, programming, and programming languages. Programs direct computers using organized instructions. Programming is creating commands to direct computers. Programming languages allow communication with computers.
2) It discusses generations of programming languages from low-level machine code to high-level languages.
3) It covers structured and object-oriented programming approaches.
4) It defines translators like assemblers, interpreters, and compilers that translate human-readable code into machine-readable code.
5) It provides an overview of installing and using the Visual Basic programming language.
6) It identifies the basic elements of programming:
The document provides information about database objects in Microsoft Access, including queries, forms, and reports. It defines queries as objects that retrieve specific information from a database. Forms allow users to add, modify, and view information from tables or queries. Reports summarize information from the database for printing purposes. The document discusses how to create and use these different database objects.
The document discusses the five main phases of program development:
1) Problem analysis phase where the programmer identifies the client's needs.
2) Program design phase where the programmer designs a flowchart representing the client's needs.
3) Coding phase where the programmer performs coding.
4) Testing and debugging phase where the program is tested by users and errors are debugged.
5) Documentation phase where the programmer completes documentation including a user manual and program listing.
The document discusses the concept of multimedia, defining it as the presentation of information using a combination of text, audio, graphics, video, and animation. It provides examples of how multimedia is used in various aspects of life, such as in business, entertainment, and education. The document also examines key elements of multimedia like hardware, software, file formats, and how authoring tools can be used to integrate different multimedia elements into interactive applications.
A multimedia production team consists of various roles including a project manager, subject matter expert, graphic artist, audio/video technician, instructional designer, and programmer. The project manager defines the project scope and coordinates the team. Each role contributes different elements - the subject matter expert provides content, the graphic artist develops visual elements, the audio/video technician records and edits sound/video, the instructional designer plans educational strategies, and the programmer codes the program. The team goes through various phases from analysis to design, implementation, testing, evaluation, and publishing to produce high-quality multimedia applications.
This document provides information about computer security and threats. It discusses defining computer security, types of security including hardware, software/data, and network security. It also covers computer threats such as malicious code like viruses, Trojan horses, logic bombs, and worms. Additional threats discussed are hackers, natural disasters, theft, and security measures to protect against these threats like data backup, cryptography, antivirus software, anti-spyware, and firewalls.
Utility programs perform maintenance tasks related to managing computers and their systems. Examples of utility programs include file managers, which allow users to organize and manage files; diagnostic utilities, which compile system information to identify and help resolve problems; and disk defragmenters, which optimize how files are physically stored on a disk to improve performance. Other common utilities include backup programs, which copy files and system data as a safeguard, as well as smaller utilities like image viewers, firewalls, uninstallers, and screen savers.
1. ICT refers to technologies used for information processing, including computers, communication devices, and software.
2. Communication has evolved significantly with technology, from early forms like writing and speech to modern devices like phones, TV, and the internet.
3. Computers have advanced through five generations from vacuum tubes to integrated circuits and microprocessors, becoming smaller and more powerful over time.
Ringkasan dokumen tersebut adalah sebagai berikut:
Dokumen tersebut membahas tentang perjanjian Aqabah Kedua, hijrah Nabi Muhammad s.a.w. ke Madinah, dan pembentukan negara Islam pertama di bawah kepemimpinannya.
Islam mempengaruhi perkembangan bahasa dan kesusasteraan Melayu di Asia Tenggara. Tulisan jawi menjadi tulisan rasmi, sementara bahasa Melayu menjadi bahasa pentadbiran dan perdagangan (lingua franca). Gaya dan tatabahasa bahasa Melayu dipengaruhi Arab, sementara kesusasteraan Melayu mengambil bentuk sastera Islam.
Dokumen tersebut membahas tentang Diagram Arus Data (DFD) yang berguna untuk merancang dan mendokumentasikan sistem informasi. DFD menggambarkan komponen sistem, aliran data antar komponen, dan asal serta tujuan data. Dokumen tersebut juga menjelaskan fungsi dan komponen DFD seperti simbol-simbolnya beserta konsep-konsep aliran data.
Dokumen tersebut membahas tentang teknologi dual channel RAM, jenis-jenis ROM, BIOS dan hubungannya dengan ROM, serta proses update BIOS. Juga dibahas tentang sejarah dan teknologi penyimpanan data, termasuk cara kerja penyimpanan data dan karakteristik berbagai media penyimpanan seperti removable media dan hard disk.
Sistem operasi Unix adalah sistem operasi pertama yang dikembangkan pada laboratorium Bell dan memiliki fitur multiuser, multitasking, dan portabilitas. Dokumen ini menjelaskan sejarah, komponen perangkat keras dan lunak, serta operasi dasar Unix seperti login, logout, manajemen file dan direktori, serta pengaturan akses file.
Dokumen tersebut memberikan instruksi langkah-langkah untuk membuat blog baru di www.blogger.com dengan melakukan pendaftaran, memilih opsi buat blog baru, mengisi judul dan alamat blog, lalu membuka blog yang telah dibuat.
A foreign key is a field or group of fields in a table that links to the primary key of another table. It works like a cross-reference between two related tables. For example, a student registration system may have a Courses table with a primary key of CourseID. The Students table would then have a foreign key of CourseID to link each student record to the course they are enrolled in. Together the primary key and foreign key help define the relationship between tables and maintain data integrity.
The document provides information about data, information, and information systems. It defines data as raw unorganized facts that have little meaning on their own. Information is organized data that is meaningful to a user. An information system is a set of related components that collects data, processes it, and provides information. It gives the example of a school grading system as an information system that collects student marks as input data, processes it by calculating grades, and outputs reports with grading information.
1. The document discusses data, information, and information systems. It defines data as unorganized raw material with little value, while information is organized data that is meaningful to users.
2. An information system is described as a set of related components that collects data, processes it, and provides information. It includes input, processes, and output.
3. Examples of information systems include school grading systems, business retail systems, transportation delivery systems, and hotel booking systems.
Data is the raw material that is collected and organized into information. An information system collects, processes, and provides information by bringing together interrelated components like data, hardware, software, people, and procedures. For example, a school grading system collects student mark data from teachers, processes it by calculating grades, and outputs information like student report cards.
This document provides information on data, information, and information systems. It begins by defining data as raw unorganized material that has little value on its own. Data includes text, numbers, images, audio, and video. Information is organized data that is meaningful and valuable to a specific user. An information system is defined as a set of related components that collects data, processes it, and provides information. Examples of components include hardware, software, data, people, and procedures. School grading systems and other examples of information systems are provided.
The document discusses the importance of information systems in decision making and strategy building for organizations. It defines information and information technology, and describes the difference between information systems and information technology. An information system is comprised of various components including hardware, software, data, people, and processes. Information systems help management make informed decisions, improve communication and business processes, and develop effective strategies. Managers play an important role in overseeing information systems and ensuring they meet the needs of the organization.
The document discusses various types of computer-based information systems. It defines key terms like data, information, systems, and computer-based information systems. It describes the basic elements of a computer-based information system like hardware, software, data, procedures, and people. It also discusses different types of computer-based information systems including management support systems, expert systems, transaction processing systems, and office automation systems.
An information system combines people, processes, data and technology to support operations, management and decision-making. It processes data into information through input, processing, output, storage and control activities. An information system depends on resources like people, hardware, software, data and networks. It transforms data into information products through information processing. Transaction processing systems support routine tasks while management information systems and decision support systems aid management and complex decisions.
Information systems are integral to modern organizations, supporting operations, knowledge work, and management. An information system consists of hardware, software, databases, telecommunications, procedures, and human resources. It collects, stores, and processes data and delivers information to users. Information systems allow organizations to manage their operations more efficiently and compete effectively. They also support individuals in conducting personal activities. However, ensuring security and controlling access to sensitive information is important.
The document provides an overview of information systems, including their definition, components, types, functions, importance, and security considerations. It defines an information system as a set of components that collect, process, store and distribute information to support decision making in an organization. The key components are hardware, software, data, people, and networks. There are different types of information systems like transaction processing systems, management information systems, decision support systems, and expert systems that support various levels and functions within an organization. Ensuring security and privacy of information is also an important aspect.
This document discusses features and functions of different types of information systems. It provides examples of information systems used in various business environments like laboratories, schools, and organizations. Specific information systems discussed include Laboratory Information Management Systems (LIMS), School Information Management Systems (SIMS), Marketing Information Systems, Human Resource Information Systems, and Financial Information Systems. The document also covers purposes of information systems, data flow diagrams for a school SIMS and library booking system, and legal and ethical implications of input and output data.
Management information systems (MIS) are used to collect, process, store, and distribute
information to support decision making, coordination, control, analysis, and visualization in an
organization. MIS use hardware, software, networks, and data resources to transform data into
useful information. They provide outputs like scheduled reports, key indicator reports, and
demand reports to support management functions like planning, controlling, and decision making.
MIS help organizations gain competitive advantages through improved decision making and
performance monitoring. While MIS face challenges to build and maintain, they also create
opportunities to enhance productivity, quality, and global competitiveness.
1) Data refers to raw facts or numbers while information is data that has been organized and given meaning or context.
2) A system is defined as a group of interrelated components working together toward a common goal by accepting inputs, processing them, and producing outputs. Key components of systems include inputs, processing, outputs, feedback, and control.
3) Information systems can be classified as either operations support systems, which process business transactions and control processes, or management support systems, which provide information to support decision making.
This document discusses information systems and the role of data and information. It defines data as raw facts while information is data placed in context and manipulated in some way. An information system takes data as an input, processes it, and produces useful information as an output. The document also discusses systems and subsystems, noting that information systems help managers focus on goals and operations through systems thinking. Finally, it briefly outlines some careers in information systems and ethical issues related to privacy, free speech, and inequality.
Computer based information systems (CBIS) are systems that use computers to collect, process, store, analyze, and distribute information. CBIS can include transaction processing systems, management information systems, decision support systems, expert systems, and office automation systems. CBIS provide advantages like increased access speed, data redundancy, and reduced storage needs but also disadvantages such as potential job losses, privacy issues, and risk of dominant cultures.
Most schools do not realize full advantages of scaling up due to administrative challenges and manual processing of student data. MIS systems allow for great automation of most processes freeing up time for teachers to concentrate on core functions.
An information system is a combination of hardware, software, infrastructure, and trained personnel that facilitates planning, control, coordination, and decision making within an organization. It turns raw data into useful information through organizing, processing, and analyzing the data stored in databases. Typical components of an information system include hardware, software, databases, networks, and procedures. Information systems support management activities like monitoring operations, achieving goals, and adapting to environmental trends to aid decision making.
This document provides definitions and information about various types of information systems:
- It defines data, information, intelligence, and information technology (IT).
- It discusses the need for and importance of IT in education.
- It explains functional information systems, decision support systems (DSS), executive support systems (ESS), knowledge management systems (KMS), geographic information systems (GIS), and international information systems.
- It provides overviews of the components, classifications, and purposes of these different information systems.
Introduction to IT, Introduction to IS, Difference be IS and IT, Need for Information System, Information Systems in the Enterprise, Impact of Information Technology on Business (Business Data Processing, Intra and Inter Organizational communication using network technology, Business process and Knowledge process outsourcing), Managers and Activities in IS, Importance of Information systems in decision making and strategy building, Information systems and subsystems.
SOALAN ULANGKAJI SPM 2014 :
1.BM
2.BI
3.MATH
4.SEJARAH
5.SAINS
6.ADD MATH
7.FIZIK
8.KIMIA
9.BIO
10.P.PERAKAUANAN
11.PERDAGANGAN
* 1.untuk dapatkan skema jawapan sila layari
http://e-learningsmktsj2.blogspot.com/
2.Cari nama folder ULANGKAJI SPM 2014 pada box MUAT TURUN BAHAN bahagian paling bawah post dan klik download.
The document contains repeated headings for different types of maps including "PETA BULATAN", "PETA BUIH BERGANDA", "PETA POKOK", "PETA ALIR", "PETA PELBAGAI ARAH", "PETA TITI", and "PETA DAKAP", suggesting it is providing information on or examples of different kinds of maps.
Majlis perutusan tahunan Menteri Pendidikan membahas pencapaian Kementerian Pendidikan pada tahun 2013 termasuk program transformasi daerah, peningkatan literasi dan numerasi melalui LINUS, pelibatan ibu bapa dan komuniti, pendidikan teknikal dan vokasional, serta pendidikan khas.
This document provides advice on being grateful for what you have rather than complaining. It notes that while people may worry about school, diets, games or chores, others have it much harder without choices or privileges. It encourages taking time to thank God for blessings like health, family, friends and more. Finally, it asks the reader to remind themselves to ask less and be thankful more, suggesting they pass this message on.
Cara menulis pendahuluan karangan dengan menggunakan teknik faclksmktsj2
Dokumen tersebut memberikan panduan tentang teknik FACLK (Fokus, Akibat, Contoh, Langkah, Kepentingan) untuk membangun pendahuluan karangan SPM secara efektif. Teknik ini melibatkan penulisan ayat pertama tentang fokus soalan, diikuti akibat, contoh, langkah, dan kepentingan. Contoh pendahuluan menggunakan teknik ini juga diberikan untuk dua soalan berbeza. Guru menekankan penting
This document provides background information on the novel Around the World in 80 Days by Jules Verne. It discusses Verne's background as the father of modern science fiction and how he anticipated many future inventions in his novels. It also summarizes the background of the reteller, Ms. Deanna McFadden, who worked as an author and freelance writer focusing on rewriting classics. The document serves as an introduction for teachers and students to understand the origins and context of the novel.
1. Melindungi masa instruksional merupakan usaha penting untuk memastikan pembelajaran berlangsung secara berkesan di sekolah dengan mengurangkan gangguan.
2. Ia perlu dirancang oleh pemimpin sekolah dan guru untuk mengoptimumkan masa pengajaran dan pembelajaran murid.
3. Matlamatnya adalah untuk meningkatkan keberhasilan pembelajaran murid.
1. Melindungi masa instruksional penting untuk memastikan pembelajaran berlangsung secara berkesan di sekolah dengan mengurangkan gangguan.
2. Faktor pengurusan sekolah dan faktor instruksional guru perlu diperbaiki untuk meningkatkan masa pembelajaran murid.
3. Matlamat melindungi masa instruksional adalah untuk memberikan peluang pembelajaran yang optimum kepada murid.
Jadual kursus TOT MMI memberikan maklumat tentang jadual slot kursus pada pagi dan petang serta bengkel yang diadakan pada petang. Bengkel dibahagikan kepada 4 kumpulan yang akan mengerjakan pelan tindakan sekolah, mengenal pasti isu dan cadangan penyelesaian mengenai MMI, serta memberikan respon terhadap pelaksanaan MMI di sekolah. Cadangan taklimat kepada pengetua dan GPK1 pada Disember untuk membinc
1. High School B. Mertajam
INFORMATION SYSTEM
LESSON 41
DATA, INFORMATION AND INFORMATION SYSTEM
DATA
Data and information are used in our daily life. Each type of data has its own
importances that contribute toward useful information.
Data is like raw material. It is not organised and has little value. Data can
include text, numbers, images, audio and video.
Text data consists of sentences and paragraphs.
Number or numerical data consists of digits from 0 to 9.
Image data are graphical images.
Audio data can be sound, voice or tones
Video data consist of moving images
147
2. High School B. Mertajam
INFORMATION
Information is organised data that is valuable and meaningful to a specific
user.
INFORMATION SYSTEM
Information system is a set of related components
that collects data, processes data and provides
information.
For example: School Grading System is the information
system used in schools. In this system, student’s marks
are the input data that must be obtained from the class
teachers.
Process involves making calculations, comparing,
grading and storing data.
In a School Grading System, output usually in the form of documents.
Output can be digital or in printed format.
LESSON 42
USAGE OF INFORMATION SYSTEMS IN VARIOUS FIELDS
INFORMATION SYSTEMS IN EDUCATION
Keep track of student’s statistic and grades.
Help students and teachers in online learning and discussion -
Learning Management System, example: Moodle, University Sains
Malaysia and Open University Malaysia.
Store subject content - for Online Learning Portal.
USAGE OF INFORMATION SYSTEMS IN BUSINESS
Carry out online buying and selling:
In retail companies, information systems are used in online buying and
selling. Examples of information systems for a retail company are
Amazon.com, Lelong.com and Maybank2U.com.
Help plan the delivery of goods and services:
In the transportation industry, information systems are used to help
plan the delivery of goods and services. Examples of information
systems in the transportation industry are UPS.com, FedEx Express
and City-Link.
148
3. High School B. Mertajam
Make room bookings and for checking the best rates:
In the hotel industry, information systems are used to make room
bookings and for checking the best rates. Examples of information
systems in the hotel industry are Genting Online booking, Booking.com
and Sabah Hotel Booking Center.
USAGE OF INFORMATION SYSTEMS
IN MANAGEMENT
See employee records: In human resource management,
information systems are used to see things like employee records.
Analyse product, services and product prices: In marketing
management information systems are used to analyse products,
services and product prices that give the best sales.
Process customer orders, organise production times and keep
track of product inventory: In manufacturing management,
information systems are used to process customers orders, organise
production times and keep track of product inventory.
EXTENSION: INFORMATION SYSTEMS CAREERS
Graduates with information systems degrees usually
have a variety of job opportunities. Knowledge of
information systems will help you develop skills on
application software.
Examples of jobs in information systems are
database administrator, systems analysts and
system designer.
LESSON 43
INFORMATION SYSTEM COMPONENTS
COMPONENTS OF AN INFORMATION SYSTEM
An information system (IS) is a set of related
components that collects data, process data and
provide information.
149
4. High School B. Mertajam
The components of information systems are: data, hardware, software,
people and procedures.
DATA
Data is very important in information systems. Without data, decision and
conclusion cannot be made. The right data in information systems helps us
to make the right decision.
For example, the stock status report in a book store helps the book store’s
manager to decide when to reorder their stocks.
HARDWARE
The hardware component in an information system means all computer
equipment used to perform input, processing and output functions.
Hardware resources also include all media on which data is recorded, such
as paper, floppy disks and compact discs.
150
5. High School B. Mertajam
SOFTWARE
The software component in an information system consists of programs for
the computers. These programs allow the computers to carry out most of
the instructions related to information processing.
There are two types of software: system software and application
software.
System software controls basic computer operations. For example, the
Operating Systems are Microsoft Windows, Linux and Macintosh.
151
6. High School B. Mertajam
Application software is the programs that allow users to do specific tasks.
Examples of application software are Microsoft Excel, Microsoft Access and
SQL Server.
PEOPLE
People involved are information systems personnel and end users.
INFORMATION SYSTEMS PERSONNEL
People involve in IS are the database
administrator, system analyst and system
designer.
Database administrator: The database administrator monitors
database security and solves errors.
System analyst: A system analyst analyses the customer’s needs by
providing specifications to customers.
System designer: A system designer designs database according to
the specifications given by systems analysts.
152
7. High School B. Mertajam
INFORMATION SYSTEMS END USER
End users are people who use information
systems. They can be customers, managers
and clerks.
PROCEDURES
Procedures are operating instructions
for the user of an information system.
Procedures can be in the form of
guidelines in the user manuals.
153
8. High School B. Mertajam
INTERRELATIONSHIP BETWEEN
INFORMATION SYSTEMS COMPONENT
An information system consists of the interrelated component of data,
hardware, software, people and procedures.
These components work together to perform input, process and output. This
provides information products in order to meet the needs of and information
system.
154
9. High School B. Mertajam
For example, Dell Computer Corporation’s workers who receive input data
will work on computers. This input data will be kept in the company’s
databases.
The database system stores information
about customer preferences on products
and also the technical problem faced.
Its customer service could give answers and suggestions quickly by having
the database.
EXTENSION: THE COMPONENTS OF A PORTAL
An enterprise portal is an information system which is a combination of
databases, software and procedures. The components of a portal are
documents, drawings, multimedia and data. These components have to be
processed, categorised, indexed and stored. This helps a company to
manage documents and media for future use.
155
10. High School B. Mertajam
LESSON 44
TYPES OF INFORMATION SYSTEM
In the 70s, businessmen used a manual system to run their business. They
used traditional filing systems to keep track their daily transactions.
They produced their reports based on a manual system. This caused the
delays in making decisions and in planning strategies.
Today, there are so many information systems available to help organisations
in making better decisions in business.
TYPES OF INFORMATION SYSTEMS
156
11. High School B. Mertajam
Organisations need different information systems for various levels of
management. There are three levels of management: Top management,
middle management and low level management.
MANAGEMENT INFORMATION SYSTEM (MIS)
Management Information Systems are used to provide regular information
about the daily activities of a business to the manager.
Management Information Systems are to help managers make the business
processes and activities more efficient compared to doing them manually.
TRANSACTION PROCESSING SYSTEMS (TPS)
Transaction Processing Systems are used to record business
transaction. Transaction Processing Systems keep track of daily
transactions in a database.
157
12. High School B. Mertajam
DECISION SUPPORT SYSTEMS (DSS)
Decision Support Systems provide managers with information to make the
best decisions.
Decision Support Systems help to analyse information, recognise problems
and making decisions.
Most Decision Supports Systems reports are in the form of charts and
diagrams.
EXECUTIVE INFORMATION SYSTEM (EIS)
Executive Information System helps top-level management to plan
strategies.
An Executive Information System is used to forecast future trends.
158
13. High School B. Mertajam
EXPERT SYSTEM (ES)
Expert system is used to store knowledge and make logical suggestions for
the user.
Expert System users can be professionals like doctors and scientist.
Example: An Expert System can suggest conditions and estimate the
probability of having illness.
EXTENSION: OFFICE INFORMATION SYSTEM (OIS)
Office Information System is also known as office automation. Office
Information System is an information system that uses hardware, software
and networks to enhance work flow among employees.
159
14. High School B. Mertajam
For example, the administration department has a request to purchase a
printer toner.
The purchasing department will issue a purchase order to the supplier. The
supplier will email the administration department about the purchase order
and the status of delivery.
LESSON 45
HIERARCHY OF DATA
BIT, BYTE, FIELD, RECORD AND FILE
The bit is represented by 0 for OFF or 1 for ON. It is a binary digit. It is the
smallest unit of data the computer can store in a database.
160
15. High School B. Mertajam
A byte is a collection of bits. Each byte consists of eight bits. Each byte
represents a character.
For example: The letter S is made up of 0101 0011
A field is a unit of data consisting of one or more characters (bytes).
A field is the smallest unit of meaningful information in the database. Each
field has a field name.
The field name describes the data that should be entered into the field, such
as StudentlD (Student lD), Name, Address and MyKad Number.
161
16. High School B. Mertajam
A record is a collection of related fields.
Example: Each record stores data about students.
For example, a student record is a collection of fields about a student.
A file is a collection of related records. For example, a student file is a
collection of students’ records.
HIERARCHY OF DATA
Hierarchy is a series of ordered
groupings in a system, beginning
with the smallest unit to the
largest.
Data is organised in a hierarchy
that begins with the smallest to
the largest unit of data, as it
progresses up the hierarchy.
Together, bits, bytes, fields,
records, files and database form
the hierarchy of data.
162
17. High School B. Mertajam
EXTENSION: HIERARCHICAL DATA
MODEL OF DATABASE
In a hierarchical database, data is organised in a family tree. As with a
family tree, the hierarchical database has branches made up of parent and
child records.
Each parent record can have multiple child records. Each child records,
however, can have only one parent.
This is also a parent and child record.
In this model, records are searched from top to down. For example, to locate
records of employees working in the IT department of a local company, you
start with the Employees, then Local Company, and then IT.
163
18. High School B. Mertajam
LESSON 46
DATABASE
A bookshop’s online system enables customers to search for books easily. A
person can receive search results in an instant. He selects his books,
registers details online and completes the purchase.
DATABASE
Database is structured collection of information on specific subjects. We can
think of a database as an electronic filing system.
An example of the database is a telephone book which contains records of
names, addresses and contact numbers.
A database allows its contents to be easily accessed, updated, stored and
retrieved.
164
19. High School B. Mertajam
DATABASE MANAGEMENT SYSTEM (DBMS)
A Database management System is a program that accesses information
from a database.
A Database Management System provides an interface between the
database and the user.
A Database management System enables you to extract modify and store
information from a database.
Examples of DBMS are Oracle, SQL Server and Microsoft Access.
165
20. High School B. Mertajam
EXTENSION: SELECTING THE BEST DBMS
Guidelines to select the best DBMS
Performance: How fast the database is able to update records can
be the most important performance criteria for some companies.
Integration — A good DBMS must be able to integrate with other
applications and databases.
Features — Features such as security procedures, privacy protection
and other access tools are important considerations.
An important feature like Report Generator is not included in the DBMS
program. You have to buy it separately.
LESSON 47
BENEFITS OF USING DATABASE
BENEFITS OF USING DATABASE
Minimises Data Redundancy
Most data item stored in only one file. With a database there is no need to
repeat recording the same data. This minimises data redundancy.
166
21. High School B. Mertajam
For example, a school database would record a student’s name. address and
other details only once when the student enrolls in the school.
Data Integrity Is Assured
A database ensures that data is correct for all files. When a user modifies
data in one of the files in a database, the same data will change
automatically in all the files. This is called data integrity.
Data Can Be Shared
A database allows the ease of sharing data. Data can be shared over a
network, by a whole organisation.
Information Can Be Accessed Easily
A database makes information access easy.
Everyone can access and manage data in a database.
167
22. High School B. Mertajam
LESSON 48
FEATURES OF MICROSOFT ACCESS
MICROSOFT ACCESS
We can use database software such as SQL Server, Oracle and Microsoft
Access to organise data.
Among the three, Microsoft Access is easy to use
with tools that enable you to build your own
database.
Microsoft Access is a database program that
allows users to store and manage large collections
of information.
Microsoft Access is a Database Management
System. It allows users to create tables, set
relationships, design forms, queries and reports
very easily.
168
23. High School B. Mertajam
FEATURES OF MICROSOFT ACCESS
Microsoft Access is part of the Microsoft Office
Software, so the menus, toolbars and dialog
boxes work basically the same as other
Microsoft Windows applications.
EXTENSION: THE FEATURES OF DBMS
These are some features of Microsoft Access compared to SQL. Microsoft
Access is more suitable for a small number of users. It is commonly used on
desktop computers and is not suitable for database driven Websites.
SQL can be assessed by hundreds or thousands of users at the same time.
SQL is used in servers of developers and more suited for database driven
Websites.
Microsoft Access is cheaper as it comes along with Microsoft Office suite.
SQL requires extra cost to purchase.
169
24. High School B. Mertajam
LESSON 49
FEATURES OF TABLE, QUERY, FORM AND REPORT
FEATURES OF A TABLE
A table stores a collection of information about specific topic. For example
you can use a table to store student’s information in your database.
FEATURES OF A QUERY
A query is a type of a database objects in Microsoft Access. A query is a
request for a specific data from a database.
When you create a query, Microsoft Access helps to find information that
meets user’s criteria quickly.
170
25. High School B. Mertajam
FEATURES OF A FORM
A form is an interface to enter information such as students’ details in your
database.
FEATURES OF A REPORT
A report summarises information from the database.
LESSON 50
RELATIONSHIP BETWEEN FIELD, RECORD AND FILE
FIELD
Field is a specific category of information in a table. In a table, fields are
usually shown in columns and it has its own field name at the top.
171
26. High School B. Mertajam
For example, StudentlD, Name, MyKad Number, Date of Birth, Gender,
Address and Contact Number. All the data within the same field holds the
same data type.
For example, StudentlD, Name, Gender, Address and ContactNumber use
text as data type.
MyKad Number uses number as data type.
Date Of Birth uses date as data type.
Several fields make up a record.
RECORD
Record is a collection of fields about one person, place or thing in a table.
Records are arranged in rows.
The records consist of several data type
such as of text, date or numerical data.
A record is also known as the row or tuple.
For example, we have a total of five records in this table.
172
27. High School B. Mertajam
FILE
A file is a set of data arranged in columns and rows. They are grouped
together for a specific purpose. For example, this is a Student Registration
System which records all the students’ information.
To form a file, the file must have fields and records. A file is sometimes
called a table or relation. For example, a Book file and a Student file.
EXTENSION: GUIDELINES FOR PUTTING DATA
IN A FIELD
A field like address may contain a big
piece of data. It make the process of
data searching slower.
You can break down the address field
into several smaller fields like, a
house number, a street address, a
residential area, a post code, a town,
a state and even the country.
For example, if you want to know who lives in Damansara Jaya, you just key
in Damansara Jaya in the Residential Area field. A list of persons who stay in
Damansara Jaya will be displayed.
This will make the search of your contacts easy.
173
28. High School B. Mertajam
LESSON 51
PRIMARY KEY AND FOREIGN KEY
DEFINE THE PRIMARY KEY
A primary key is the field that uniquely represents each record in a table.
These keys must not have null values. Meaning, you must not leave these
keys blank. Each table in the database must have at least one primary key.
There is also another name for a primary key: the unique identifier.
In the student table, student name might not be a good primary key. For
example there are two Sulaiman bin Yahya in this school.
So, the Student Name is not a good primary key.
174
29. High School B. Mertajam
You may use the MyKad Number as the primary key. Some students might
not have their own MyKad Number yet, the MyKad Number is sometimes
rejected as the primary key.
To uniquely identify each student, you can add a special StudentlD field to
be used as the primary key. For example, each StudentlD represents a
student.
DEFINE FOREIGN KEY
A foreign key is the field that matches the primary key in another table. lt
contains the same data as those of the primary key in the other table.
175
30. High School B. Mertajam
Foreign key fields are linked to fields in other tables. While a primary key
must have unique values, a foreign key may have duplicate values.
For example, the StudentlD is the primary key in the Student table, but
the StudentlD is a foreign key in the Subject table.
Since a student may take more than one subject, the foreign key
(StudentlD) will have a duplicate value in the subject table.
176
31. High School B. Mertajam
THE IMPORTANCE OF THE PRIMARY KEY
A primary key ensures data integrity by uniquely identifying each record.
It helps to avoid duplicating records.
It prevents null values being entered in the unique field.
DIFFERENTIATE BETWEEN THE PRIMARY KEY
AND FOREIGN KEY
A foreign key links to a primary key in another table.
While primary keys must have unique values, foreign keys may have
duplicate values. These are the differences between the primary key and
foreign key.
177
32. High School B. Mertajam
EXTENSION : TYPES OF PRIMARY KEYS
There are three kinds of primary keys in Microsoft Access such as
AutoNumber primary keys, Single-field primary keys and Multiple-field
primary keys.
AutoNumber
It can be set to automatically enter a sequential number as each record is
added to the table.
If you don’t set a primary key before saving a newly created table, Microsoft
Access will ask if you want it to create a primary key for you.
If you answer Yes, Microsoft Access will create an AutoNumber primary key.
Single-field
If you have a field that contains unique values such as ID numbers or part
numbers, you can assign that field as the primary key.
You can specify a primary key for a field provided it does not contain
duplicate values.
Multiple-field
In situations where you are unsure of the uniqueness of any single field, you
may assign two or more fields as the primary key.
If you are unsure whether you can select a multiple-field primary key, you
should probably add an AutoNumber field and assign it as the primary key.
178
33. High School B. Mertajam
LESSON 52
RELATIONSHIP BETWEEN PRIMARY KEY AND
FOREIGN KEY
RELATIONSHIP BETWEEN TWO TABLES
Connections between fields of related tables having common values are
called relationships.
A relationship works by matching data in key fields, usually a field with the
same name in both tables.
These matching fields are the primary key from one table and a foreign key
in the other table.
IMPORTANCE OF THE RELATIONSHIP
BETWEEN PRIMARY KEY AND FOREIGN KEY
The primary key of one table becomes a foreign key of the other table.
By matching a foreign key with a primary key, the data does not need to be
entered repeatedly.
179
34. High School B. Mertajam
A primary key makes creating Queries, Forms and Reports easier.
A primary key improves data performance by relating smaller tables into
meaningful databases.
EXTENSION : ENFORCE REFERENTIAL
INTEGRITY
Referential integrity is a set of rules that protect data from accidental
changes or deletions, if matching records still exist in a related table.
For example, if a patient wants to check out, the referential integrity will
check whether this patient has any outstanding bills. If there is, referential
integrity will protect data from being deleted.
180
35. High School B. Mertajam
In Microsoft Access, to enforce referential integrity between two tables,
double-click the line that connects the tables.
The Relationships dialog box will appear.
Click on Enforce Referential Integrity
Microsoft Access provides two options of referential integrity.
When you change data in the primary key, Microsoft Access will
automatically update the matching data in all related records.
When you have deleted a record in the primary table, Microsoft Access will
automatically delete matching records in the related table.
181
36. High School B. Mertajam
LESSON 53
DATABASE OBJECT-TABLE
DEFINE THE TABLE AS ONE OF THE DATABASE
OBJECTS
Tables are one of the database objects in Microsoft Access. A Table is a
collection of data that is organised as rows and columns.
Every database object such as Queries, Forms and Reports are based on one
ore more Tables.
A database contains at least one Table.
182
37. High School B. Mertajam
IDENTIFY A TABLE
You can create new Tables using one of three methods:
Design view
Wizard
Datasheet
CREATING A TABLE IN DESIGN VIEW
When creating a Table in Design view, you customise your fields, data types
and even enter descriptions for them.
In the Database window, click Tables on the Objects bar, and then double-
click the Create table in Design view icon.
To add a field, click on the Field Name cell and type a field name.
To change data type, click the Data Type drop-down menu, and choose the
data type.
Click on a Description cell, and then type a description.
After that, you can define the Field Properties.
Assign Primary key.
Save the Table.
183
38. High School B. Mertajam
CREATING A TABLE BY USING WIZARD
Microsoft Access lets you create a new Table based on their templates. In the
Database window, click Tables on the Objects bar, and then double click the
Create table by using wizard icon.
There are templates for Business and Personal options.
Scroll through the list to find and choose Students. Click
Next to continue.
Type a name for the Table, or accept the suggested name.
Click No when Table Wizard wants to assign the primary key. Click Next to
continue.
In the final wizard dialog box, click Enter data directly into the Table. Click
Finish.
We can also add another new column. Follow these steps.
Click Insert and select Column to add columns. Rename the field.
Change the data type.
Save the table.
The table is displayed in the Database windows.
CREATING A TABLE BY ENTERING DATA
Create a Table in Database view, we can enter data into the Table.
In the Database window, click Tables on the Objects bar.
Double-click the icon for Create table by entering data.
Click to move from field to field.
To change a field name, double-click the field name, type the new name and
then press Enter.
Enter all the data.
Click the save button on the toolbar.
Type a table name and then click OK.
When asked a primary key, choose No.
184
39. High School B. Mertajam
Assign Primary key.
Save the Table.
The table is displayed in the Database windows.
EXTENSION : ENFORCE REFERENTIAL
INTEGRITY
The Table Analyzer is a tool that breaks a large Table into small Tables. It
remove redundant data in the large Table.
Then it generates smaller new Table only to keep the required data such as
address and telephone number.
The information in the new Table will be the same as the large table.
It reduces data redundancy and makes the data easier to maintain.
185