SlideShare a Scribd company logo
1 of 41
Faculty of ICT


Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs and Patents Act
Computer Misuse Act
 This law was created to make it
illegal to:
 Hack
◦ Gain unauthorised access into a
computer system


Spread Viruses
◦ Send harmful code to other computers



Phish
◦ Pretend to be a company to steal to
password information








Copyright Designs and Patents Act
This law was created to make it illegal to:
Make unauthorised copies of music, movies
or software
Use multiple copies of software when you
only have 1 license
Steal someone’s idea, work etc when it is
under copyright
Last Lesson
 Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act




Today’s Lesson
Computing Laws
◦ Data Protection Act


Data Protection Act

◦ This law was created to control the storage
of personal information
◦ Data Controller
 The company or person storing the information on the
person

◦ The Data must be:

 Accurate and kept up to date
 Protected properly with a password
 Relevant and only stored for the period it is
required
 Not sell the data on to other companies


The Data User:
◦ The person who makes use of the personal
information, for example, the secretary in a doctor’s
surgery



The Data Subject
◦ The person that the information is about, for example,
the patient in a doctor’s surgery
◦ The Data Subject can:
 See the information held on them
 Change any inaccurate information
 Know why the data is being stored about them

◦
Last Lesson
 Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act
◦ Data Protection Act




Today’s Lesson
Health and Safety
Regulations


Main Health Problems
◦ Back problems
◦ RSI = repetitive strain injury
◦ Eye strain



The law states that an employer must:
◦ Provide adjustable screens, chairs and provide foot support
◦ Make sure lighting is suitable and provide antiglare filters
for monitors
◦ Give employees adequate breaks
◦ Pay for eye tests
◦ Avoid trailing wires
◦ Have suitable heating
◦
Last Lesson
 Computing Laws
◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act
◦ Data Protection Act
◦ Health and Safety
Regulations




Today’s Lesson
Environmental
Impact
◦ Carbon footprint


Carbon Footprint = the amount of C02 you
generate

◦ When using a computer system you are adding to
carbon emissions
◦ Desktop = 110 watts
◦ LCD Monitor = 35 watts
◦ You are using electricity generated by fossil fuels



Minimising Carbon Footprint
◦
◦
◦
◦

PCs on the markets that use 25 watts
Low energy processor chips
Automated power shutdown systems for out of hours
Laptop usage rather than desktop
 15-60 watt rather than 145 watt
Last Lesson
 Computing Laws

◦ Computer Misuse Act
◦ Copyright Designs
and Patents Act
◦ Data Protection Act
◦ Health and Safety
Regulations



Environmental
Impact

◦ Carbon footprint




Today’s Lesson
Security Risks
◦ Virus
◦ Worm
◦ Trojan Horse


Viruses

◦ A piece of code that attaches itself to programs,
makes copies of itself and destroys your system
◦ Ways of spreading
 Downloaded from a website
 Opened up from an email attachment
 Infected backing storage device

◦ Symptoms of a virus





Data loss
Keyboard malfunctioning
Strange display on monitor
Hard drive spinning for no reason


Worms
◦ A program that finds gaps in your security, creates
copies of itself and floods your system with
unwanted data



Trojans
◦ A program that appears as if it is carrying out a
task, for example, defragmenting your hard disk
◦ You download it thinking it is carrying out a
harmless task and it causing hard, for example,
deleting files or adding unwanted toolbars
Last Lesson
 Security Risks
◦ Virus
◦ Worm
◦ Trojan Horse




Today’s Lesson
Security Risks
◦ Keylogging Software
◦ Spyware
◦ DOS attacks


Keylogging software
◦ A program that monitors user’s keystrokes and is
often used to steal passwords, credit card numbers
etc



Spyware
◦ Spyware programs gather information about you
from your computer, for example which websites
you visit.
◦ This data can be used to target you with specific
marketing


Denial of Service attacks
◦ A DOS attack is designed to cause problems on a
network so that legitimate users cannot access
resources, for example their online bank account
◦ Resource Starvation = using up network resources, for
example processors or disk space on servers so that
legitimate users can’t access resources
◦ Bandwidth Consumption = flooding the network with
useless traffic, for example flooding an email server
with useless data, making it crash
◦ Attacking Routers = corrupt PING attacks that stop
Routers from working properly
Last Lesson
 Security Risks
◦
◦
◦
◦
◦
◦

Virus
Worm
Trojan Horse
Keylogging Software
Spyware
DOS attacks




Today’s Lesson
Securing
Computers
◦
◦
◦
◦
◦

Passwords
Encryption
Biometrics
Firewalls
Anti virus software


Passwords

◦ A list of characters that stops people accessing you data
◦ Disadvantage

 You can forget them
 Programs have been created that can test billions of different
passwords each second, eventually guessing yours!!



Encryption



Biometrics

◦ Putting data into a code before transfer
◦ The hacker cant understand the data without having the
key to decipher the code
◦ Using physical characteristics to allow access to a
system, for example, finger print, retina, voice, face
recognition


Firewalls
◦ A program that checks all data coming in and out of
a network
◦ The firewall decides which packets of data are
allowed through to the destination address



Anti-virus software
◦ A program that has a database of known viruses
◦ The anti virus software compares sections of code
to this database to identify and destroy viruses
Last Lesson
◦ Securing Computers






Passwords
Encryption
Biometrics
Firewalls
Anti virus software



Today’s Lesson
◦ Securing Computers
 Security Protocols
 Security Suites


Security Protocols



Security suites

◦ A rule or agreement set up between the sender and
receiver of data
◦ Secure Sockets Layer (SSL) and Transport Layer Security
(TLS) are 2 examples
◦ SSL and TLS both use encryption
◦ Groups of programs used to block threat to your
computer






Anti-virus
Anti-spyware
A firewall
Identify theft protection
Spam Filters
Last Lesson
◦ Securing Computers








Passwords
Encryption
Biometrics
Firewalls
Anti virus software
Security Protocols
Security Suites



Today’s Lesson
◦ Databases
 Manual V Electronic
storage
 What is a Database?


Electronic databases have a number of
advantages over a manual database
 You can have a backup copy
 They take up less room
 Faster to search for records
 Email information to others

=
=




A database is a
program used to store
data in a structured
way
Examples
◦ The Police National
Database
◦ DVLA
◦ Inland Revenue
◦ Esporta Health Club
Last Lesson
◦ Databases
 Manual V Electronic
storage
 What is a Database?



Today’s Lesson
◦ Databases
 Files, Records and
Fields
 Data Types
FIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE
FIRSTNAME

RECORD =
INFORMATION
ON ONE
PERSON OR
ITEM

DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE




When creating a database you have to
choose the data/field type depending
on the data that is going to be stored
Examples
◦
◦
◦
◦
◦
◦

Text
Number
Date/Time
Currency
Yes/No
OLE object
Last Lesson
◦ Databases
 Manual V Electronic
storage
 What is a Database?



Today’s Lesson
◦ Databases
 Simple/Complex
searching


I want to carry out a simple search on the
field Favourite Hobby with the criteria
Football


I want to carry out a complex search on the
field Surname with the criteria “Forbes” and
on the field Fav Hobby with the criteria
“Football”
Last Lesson
◦ Databases
 Manual V Electronic
storage
 What is a Database?
 Simple/Complex
searching



Today’s Lesson
◦ Primary Key
◦ Index key


Primary Key
◦ A primary keys allows
you to make each
record unique in a
database
◦ Example
 ID number or Account
number
 You may have 2 John
Smith records but they
would have different ID
numbers



Foreign Key
◦ Foreign keys allow
you to set up a
relationship or link
between 2 tables in a
database
◦ Example
 ID may be the primary
key in the customer
table and a foreign key
in the book ordered
table
Last Lesson
◦ Primary Key
◦ Index key



Today’s Lesson
◦ Computed Fields
◦ Validation


A computed field will carry out a
calculation on another field or fields and
give you an answer



Validation is checking that the correct
information has been entered into the database
Presence Check

◦ This checks that data has been entered and the field has
not been left blank



Restricted Choice

◦ This presents the user with a choice they pick from



Field Length Check

◦ The specifies the number of characters that should be in
each field



Field Range Check

◦ This specifies that range of numbers that can be stored
e.g. > 0 and < 100



I want to carry out a Simple Sort on Surname
Ascending
I want to carry out a Complex Sort on Surname
Ascending following by Firstname Ascending
Info systems design and development
Info systems design and development
Info systems design and development
Info systems design and development

More Related Content

What's hot (20)

ISDD Networking & Connectivity
ISDD Networking & ConnectivityISDD Networking & Connectivity
ISDD Networking & Connectivity
 
Networking And Internet
Networking And InternetNetworking And Internet
Networking And Internet
 
Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
 
computer networks
computer networks computer networks
computer networks
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Computer network
Computer networkComputer network
Computer network
 
Internet
InternetInternet
Internet
 
network
networknetwork
network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
 
Networks
NetworksNetworks
Networks
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
Bab3
Bab3Bab3
Bab3
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Transmission Media for Networking
Transmission Media for NetworkingTransmission Media for Networking
Transmission Media for Networking
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Arpanet
ArpanetArpanet
Arpanet
 
Networkingconcepts (1)
Networkingconcepts (1)Networkingconcepts (1)
Networkingconcepts (1)
 

Viewers also liked

Database Blog
Database BlogDatabase Blog
Database Blogiarthur
 
Higher Accounting
Higher AccountingHigher Accounting
Higher Accountingiarthur
 
Building a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual ResourcesBuilding a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual ResourcesMyfitbrain
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
The Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual EntrepreneurThe Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual EntrepreneurDave Rigotti
 
Protection of Information System & Types of Controls
Protection of Information System & Types of ControlsProtection of Information System & Types of Controls
Protection of Information System & Types of ControlsVR Talsaniya
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)Muhammed Kedir Hiko
 
Tps Presentation
Tps PresentationTps Presentation
Tps PresentationApex
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systemsProf. Othman Alsalloum
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing systemuday sharma
 

Viewers also liked (20)

Database Blog
Database BlogDatabase Blog
Database Blog
 
Higher Accounting
Higher AccountingHigher Accounting
Higher Accounting
 
Building a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual ResourcesBuilding a Global Internet Company with Virtual Resources
Building a Global Internet Company with Virtual Resources
 
Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
The Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual EntrepreneurThe Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
The Virtual Company - Online Tools You Need To Be A Virtual Entrepreneur
 
Protection of Information System & Types of Controls
Protection of Information System & Types of ControlsProtection of Information System & Types of Controls
Protection of Information System & Types of Controls
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Information resource management (assignment p pt)
Information resource management (assignment p pt)Information resource management (assignment p pt)
Information resource management (assignment p pt)
 
Tps Presentation
Tps PresentationTps Presentation
Tps Presentation
 
management information system module2
management information system module2management information system module2
management information system module2
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
Transaction Processing System
Transaction Processing SystemTransaction Processing System
Transaction Processing System
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
Capp
CappCapp
Capp
 

Similar to Info systems design and development

14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdfLakshyaKhowala
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyersdarrentthurston
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Senseusbcopynotify
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyersrtrautz
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Wendy Knox Everette
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Sean Bradley
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxSATYAJIT58
 

Similar to Info systems design and development (20)

14 - Computer Security.pdf
14 - Computer Security.pdf14 - Computer Security.pdf
14 - Computer Security.pdf
 
Don't Diligence Information Security for Lawyers
Don't Diligence Information Security for LawyersDon't Diligence Information Security for Lawyers
Don't Diligence Information Security for Lawyers
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018Meet the hackers: Seattle Tech Law CLE December 2018
Meet the hackers: Seattle Tech Law CLE December 2018
 
Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"Erik Nachbahr "Dealership Technology"
Erik Nachbahr "Dealership Technology"
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Computer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptxComputer Ethics_Satyajit Patil.pptx
Computer Ethics_Satyajit Patil.pptx
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 

More from iarthur

Software development slides
Software development slidesSoftware development slides
Software development slidesiarthur
 
All about me by mike
All about me by mikeAll about me by mike
All about me by mikeiarthur
 
Software development slides
Software development slidesSoftware development slides
Software development slidesiarthur
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceiarthur
 
Graphics slides
Graphics slidesGraphics slides
Graphics slidesiarthur
 
Internet slides
Internet slidesInternet slides
Internet slidesiarthur
 
Software development slides
Software development slidesSoftware development slides
Software development slidesiarthur
 
Int 2 software slides 2010
Int 2 software slides 2010Int 2 software slides 2010
Int 2 software slides 2010iarthur
 
Int 2 peripherals 2010
Int 2 peripherals 2010Int 2 peripherals 2010
Int 2 peripherals 2010iarthur
 
Int 2 computer structure 2010
Int 2 computer structure 2010Int 2 computer structure 2010
Int 2 computer structure 2010iarthur
 
Int 2 data representation 2010
Int 2 data representation 2010Int 2 data representation 2010
Int 2 data representation 2010iarthur
 
Networking slides
Networking slidesNetworking slides
Networking slidesiarthur
 
Non Profit Making
Non Profit MakingNon Profit Making
Non Profit Makingiarthur
 
Word Processing Slides
Word Processing SlidesWord Processing Slides
Word Processing Slidesiarthur
 
Intro To Computer Hardware
Intro To Computer HardwareIntro To Computer Hardware
Intro To Computer Hardwareiarthur
 
Spreadsheets
SpreadsheetsSpreadsheets
Spreadsheetsiarthur
 
Int 2 Accounting
Int 2 AccountingInt 2 Accounting
Int 2 Accountingiarthur
 
Admission Of A New Partner Accounts
Admission Of A New Partner AccountsAdmission Of A New Partner Accounts
Admission Of A New Partner Accountsiarthur
 
Unit 4 Reprographics
Unit 4 ReprographicsUnit 4 Reprographics
Unit 4 Reprographicsiarthur
 
Partnership Accounts
Partnership AccountsPartnership Accounts
Partnership Accountsiarthur
 

More from iarthur (20)

Software development slides
Software development slidesSoftware development slides
Software development slides
 
All about me by mike
All about me by mikeAll about me by mike
All about me by mike
 
Software development slides
Software development slidesSoftware development slides
Software development slides
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Graphics slides
Graphics slidesGraphics slides
Graphics slides
 
Internet slides
Internet slidesInternet slides
Internet slides
 
Software development slides
Software development slidesSoftware development slides
Software development slides
 
Int 2 software slides 2010
Int 2 software slides 2010Int 2 software slides 2010
Int 2 software slides 2010
 
Int 2 peripherals 2010
Int 2 peripherals 2010Int 2 peripherals 2010
Int 2 peripherals 2010
 
Int 2 computer structure 2010
Int 2 computer structure 2010Int 2 computer structure 2010
Int 2 computer structure 2010
 
Int 2 data representation 2010
Int 2 data representation 2010Int 2 data representation 2010
Int 2 data representation 2010
 
Networking slides
Networking slidesNetworking slides
Networking slides
 
Non Profit Making
Non Profit MakingNon Profit Making
Non Profit Making
 
Word Processing Slides
Word Processing SlidesWord Processing Slides
Word Processing Slides
 
Intro To Computer Hardware
Intro To Computer HardwareIntro To Computer Hardware
Intro To Computer Hardware
 
Spreadsheets
SpreadsheetsSpreadsheets
Spreadsheets
 
Int 2 Accounting
Int 2 AccountingInt 2 Accounting
Int 2 Accounting
 
Admission Of A New Partner Accounts
Admission Of A New Partner AccountsAdmission Of A New Partner Accounts
Admission Of A New Partner Accounts
 
Unit 4 Reprographics
Unit 4 ReprographicsUnit 4 Reprographics
Unit 4 Reprographics
 
Partnership Accounts
Partnership AccountsPartnership Accounts
Partnership Accounts
 

Info systems design and development

  • 2.  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act
  • 3. Computer Misuse Act  This law was created to make it illegal to:  Hack ◦ Gain unauthorised access into a computer system  Spread Viruses ◦ Send harmful code to other computers  Phish ◦ Pretend to be a company to steal to password information
  • 4.      Copyright Designs and Patents Act This law was created to make it illegal to: Make unauthorised copies of music, movies or software Use multiple copies of software when you only have 1 license Steal someone’s idea, work etc when it is under copyright
  • 5. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act   Today’s Lesson Computing Laws ◦ Data Protection Act
  • 6.  Data Protection Act ◦ This law was created to control the storage of personal information ◦ Data Controller  The company or person storing the information on the person ◦ The Data must be:  Accurate and kept up to date  Protected properly with a password  Relevant and only stored for the period it is required  Not sell the data on to other companies
  • 7.  The Data User: ◦ The person who makes use of the personal information, for example, the secretary in a doctor’s surgery  The Data Subject ◦ The person that the information is about, for example, the patient in a doctor’s surgery ◦ The Data Subject can:  See the information held on them  Change any inaccurate information  Know why the data is being stored about them ◦
  • 8. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act   Today’s Lesson Health and Safety Regulations
  • 9.  Main Health Problems ◦ Back problems ◦ RSI = repetitive strain injury ◦ Eye strain  The law states that an employer must: ◦ Provide adjustable screens, chairs and provide foot support ◦ Make sure lighting is suitable and provide antiglare filters for monitors ◦ Give employees adequate breaks ◦ Pay for eye tests ◦ Avoid trailing wires ◦ Have suitable heating ◦
  • 10. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act ◦ Health and Safety Regulations   Today’s Lesson Environmental Impact ◦ Carbon footprint
  • 11.  Carbon Footprint = the amount of C02 you generate ◦ When using a computer system you are adding to carbon emissions ◦ Desktop = 110 watts ◦ LCD Monitor = 35 watts ◦ You are using electricity generated by fossil fuels  Minimising Carbon Footprint ◦ ◦ ◦ ◦ PCs on the markets that use 25 watts Low energy processor chips Automated power shutdown systems for out of hours Laptop usage rather than desktop  15-60 watt rather than 145 watt
  • 12. Last Lesson  Computing Laws ◦ Computer Misuse Act ◦ Copyright Designs and Patents Act ◦ Data Protection Act ◦ Health and Safety Regulations  Environmental Impact ◦ Carbon footprint   Today’s Lesson Security Risks ◦ Virus ◦ Worm ◦ Trojan Horse
  • 13.  Viruses ◦ A piece of code that attaches itself to programs, makes copies of itself and destroys your system ◦ Ways of spreading  Downloaded from a website  Opened up from an email attachment  Infected backing storage device ◦ Symptoms of a virus     Data loss Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason
  • 14.  Worms ◦ A program that finds gaps in your security, creates copies of itself and floods your system with unwanted data  Trojans ◦ A program that appears as if it is carrying out a task, for example, defragmenting your hard disk ◦ You download it thinking it is carrying out a harmless task and it causing hard, for example, deleting files or adding unwanted toolbars
  • 15. Last Lesson  Security Risks ◦ Virus ◦ Worm ◦ Trojan Horse   Today’s Lesson Security Risks ◦ Keylogging Software ◦ Spyware ◦ DOS attacks
  • 16.  Keylogging software ◦ A program that monitors user’s keystrokes and is often used to steal passwords, credit card numbers etc  Spyware ◦ Spyware programs gather information about you from your computer, for example which websites you visit. ◦ This data can be used to target you with specific marketing
  • 17.  Denial of Service attacks ◦ A DOS attack is designed to cause problems on a network so that legitimate users cannot access resources, for example their online bank account ◦ Resource Starvation = using up network resources, for example processors or disk space on servers so that legitimate users can’t access resources ◦ Bandwidth Consumption = flooding the network with useless traffic, for example flooding an email server with useless data, making it crash ◦ Attacking Routers = corrupt PING attacks that stop Routers from working properly
  • 18. Last Lesson  Security Risks ◦ ◦ ◦ ◦ ◦ ◦ Virus Worm Trojan Horse Keylogging Software Spyware DOS attacks   Today’s Lesson Securing Computers ◦ ◦ ◦ ◦ ◦ Passwords Encryption Biometrics Firewalls Anti virus software
  • 19.  Passwords ◦ A list of characters that stops people accessing you data ◦ Disadvantage  You can forget them  Programs have been created that can test billions of different passwords each second, eventually guessing yours!!  Encryption  Biometrics ◦ Putting data into a code before transfer ◦ The hacker cant understand the data without having the key to decipher the code ◦ Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition
  • 20.  Firewalls ◦ A program that checks all data coming in and out of a network ◦ The firewall decides which packets of data are allowed through to the destination address  Anti-virus software ◦ A program that has a database of known viruses ◦ The anti virus software compares sections of code to this database to identify and destroy viruses
  • 21. Last Lesson ◦ Securing Computers      Passwords Encryption Biometrics Firewalls Anti virus software  Today’s Lesson ◦ Securing Computers  Security Protocols  Security Suites
  • 22.  Security Protocols  Security suites ◦ A rule or agreement set up between the sender and receiver of data ◦ Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are 2 examples ◦ SSL and TLS both use encryption ◦ Groups of programs used to block threat to your computer      Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters
  • 23. Last Lesson ◦ Securing Computers        Passwords Encryption Biometrics Firewalls Anti virus software Security Protocols Security Suites  Today’s Lesson ◦ Databases  Manual V Electronic storage  What is a Database?
  • 24.  Electronic databases have a number of advantages over a manual database  You can have a backup copy  They take up less room  Faster to search for records  Email information to others = =
  • 25.   A database is a program used to store data in a structured way Examples ◦ The Police National Database ◦ DVLA ◦ Inland Revenue ◦ Esporta Health Club
  • 26. Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Today’s Lesson ◦ Databases  Files, Records and Fields  Data Types
  • 27. FIELD = A CATEGORY OF DATA THAT IS BEING STORED, FOR EXAMPLE FIRSTNAME RECORD = INFORMATION ON ONE PERSON OR ITEM DATA FILE = ALL THE RECORDS ARE STORED TOGETHER IN A DATA FILE
  • 28.   When creating a database you have to choose the data/field type depending on the data that is going to be stored Examples ◦ ◦ ◦ ◦ ◦ ◦ Text Number Date/Time Currency Yes/No OLE object
  • 29. Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Today’s Lesson ◦ Databases  Simple/Complex searching
  • 30.  I want to carry out a simple search on the field Favourite Hobby with the criteria Football
  • 31.  I want to carry out a complex search on the field Surname with the criteria “Forbes” and on the field Fav Hobby with the criteria “Football”
  • 32. Last Lesson ◦ Databases  Manual V Electronic storage  What is a Database?  Simple/Complex searching  Today’s Lesson ◦ Primary Key ◦ Index key
  • 33.  Primary Key ◦ A primary keys allows you to make each record unique in a database ◦ Example  ID number or Account number  You may have 2 John Smith records but they would have different ID numbers  Foreign Key ◦ Foreign keys allow you to set up a relationship or link between 2 tables in a database ◦ Example  ID may be the primary key in the customer table and a foreign key in the book ordered table
  • 34. Last Lesson ◦ Primary Key ◦ Index key  Today’s Lesson ◦ Computed Fields ◦ Validation
  • 35.  A computed field will carry out a calculation on another field or fields and give you an answer
  • 36.   Validation is checking that the correct information has been entered into the database Presence Check ◦ This checks that data has been entered and the field has not been left blank  Restricted Choice ◦ This presents the user with a choice they pick from  Field Length Check ◦ The specifies the number of characters that should be in each field  Field Range Check ◦ This specifies that range of numbers that can be stored e.g. > 0 and < 100
  • 37.   I want to carry out a Simple Sort on Surname Ascending I want to carry out a Complex Sort on Surname Ascending following by Firstname Ascending