New Perspectives on Computer Concepts 2011 Instructor’s Manual 1 of 18
A Guide to this Instructor’s Manual:
We have designed this Instructor’s Manual to supplement and enhance your teaching experience through classroom activities and a cohesive chapter summary.
This document is organized chronologically, using the same heading in blue that you see in the textbook. Under each heading you will find (in order): Lecture Notes that summarize the section, Figures and Boxes found in the section (if any), Teacher Tips, Classroom Activities, and
Lab Activities. Pay special attention to teaching tips, and activities geared towards quizzing your students, enhancing their critical thinking skills, and encouraging experimentation within the software.
In addition to this Instructor’s Manual, our Instructor’s Resources CD also contains PowerPoint
Presentations, Test Banks, and other supplements to aid in your teaching experience.
For your students:
Our latest online feature, CourseCasts, is a library of weekly podcasts designed to keep your students up to date with the latest in technology news. Direct your students to http://coursecasts.course.com
, where they can download the most recent CourseCast onto their mp3 player. Ken Baldauf, host of CourseCasts, is a faculty member of the Florida State
University Computer Science Department, where he is responsible for teaching technology classes to thousands of FSU students each year. Ken is an expert in the latest technology and sorts through and aggregates the most pertinent news and information for CourseCasts so your students can spend their time enjoying technology, rather than trying to figure it out. Open or close your lecture with a discussion based on the latest CourseCast.
Table of Contents
Section A: File and Database Concepts
Section B: Data Management Tools
2
2
5
7
12
14
18
New Perspectives on Computer Concepts 2011 Instructor’s Manual 2 of 18
Chapter Objectives
Students will have mastered the material in Chapter Eleven when they can answer the following questions:
What makes databases such an essential component of modern life?
Can databases be used to predict customer behavior and find terrorists?
What are the basic components of a
How do database designers use normalization to reduce data redundancy?
What role does sorting and indexing play in making databases more
database?
Why are relationships a significant aspect of databases?
What’s the difference between flat
versatile?
Is it difficult to create reports from a
and managing databases?
Is it possible to access databases using
files and other database models?
What is the best software for creating the Web?
What is the significance of field types database?
What is SQL?
How safe is the data in a database?
Have lawmakers kept up with technology by enacting laws and regulations pertaining to databases?
Can individuals take steps to protect their privacy when so much personal data is stored in corporate and government databases? in a database?
Why do errors creep into databases?
READING ASSIGNMENT FASTPOLL T/F QUESTIONS
110100 Predictive data entry produces data warehouses and OLAPs. (Answer: F) (612)
110200 The simplest model for storing data is a flat file. (Answer: True) (614)
110300 A fixed-length field contains field names and record types. (Answer: False) (615)
110400 An ERD shows relationships and cardinality. (Answer: True) (616)
110500 The most popular business database model is based on a relational database. (Answer:
True) (618)
110600 Spreadsheet software is optimized for working with relational data. (Answer: False) (623)
110700 Database software such as Microsoft Access provides an option to produce HTML formatted reports. (Answer: True) (627)
110800 XML is a database model that combines flat files and relational database models. (Answer:
False) (630)
110900 BLOB and SQL are data types. (Answer: True) (635)
111000 The goal of normalization is to reduce data redundancy. (Answer: True) (637)
111100 Sorting a database is the same as indexing it. (Answer: False) (639)
111200 Databases transmitted over the Web can be encrypted using HTML. (Answer: False) (655)
111300 A database audit can sometimes identify unauthorized intrusion attempts. (Answer: True)
(656)
SECTION A: FILE AND DATABASE CONCEPTS (610)
SECTION A OPENER QUESTION
112100 The plots for several recent movies revolve around the government’s use of what technology to identify terrorists based on spending habits and other data stored in commercial and government databases? a. Predictive analytics b. Executive dashboards c. ERDs
New Perspectives on Computer Concepts 2011 Instructor’s Manual 3 of 18 d. Data cubes
(Answer: a)
Database Basics (610)
LECTURE NOTES
Explain that a database is a collection of information, typically stored as a computer file.
Identify databases that are not computer files (such as card files, address books, and rolodexes).
Introduce Vintage Music Shop, a fictitious music store on the Web. It is an example that continues
throughout each section.
Explain that data mining is the process of analyzing information in databases to discover previously unknown information, including relationships and patterns.
Introduce OLAP, which is covered on page 613.
TEACHER TIP
Based on the description of Vintage Music Shop on page 610, work as a class to list the kinds of data that
Vintage Music Shop maintains.
FIGURES
Figure 11-1, Figure 11-2, Figure 11-3, Figure 11-4
CLASSROOM ACTIVITIES
Class Discussion: Ask students to brainstorm applications for databases. Do students use a database at home? List examples that are computer-based and those that are not. What types of organizations
use databases?
Quick Quiz:
1.
A(n) _________ is a collection of information. (Answer: database))
2.
True/False: The data in a typical database is stored in no particular order. (Answer: True))
3.
Which of the following refers to the process of analyzing existing information in databases to discover previously unknown and potentially useful information (including relationships and patterns)? a.
querying b.
data mining c.
analysis d.
data warehousing
(Answer: b.)
Database Models (614)
LECTURE NOTES
Explain that a structured file uses a uniform format to store data for each item in the file.
Explain that a field contains the smallest unit of meaningful information and that each field has a unique field name.
Discuss with students the pros and cons of limiting fields (such as a Last Name field) and allowing unlimited field lengths.
Explain that in database terminology, a record refers to a collection of data fields, and each record stores data about one entity—a person, place, thing, or event.
New Perspectives on Computer Concepts 2011 Instructor’s Manual 4 of 18
Distinguish between record occurrence and record type. A record occurrence is a particular instance of a record that contains data describing an entity. A record type is the general record format—a form that contains blanks for data, but no actual data. Figure 11-8 illustrates the difference between a record occurrence and a record type.
Explain that the flat file model presents the data as a simple two-dimensional table with a single record type.
Discuss the definition of a relationship between record types and why such relationships in a database are important.
Explain that cardinality refers to the number of associations that two record types can have. The three different relationships are one-to-one, one-to-many, and many-to-many. Figure 11-9 shows an ER diagram where the data structure contains rectangles that represent entities (record types) and lines that represent relationships.
Use Figures 11-10 and 11-11 to illustrate hierarchical and network database models.
Explain the relational database model, contrasting this model to the flat file model. Use Figures 11-
12 and 11-13 for a detailed walkthrough of relational databases. Explain that this is the most common data model in use today.
Briefly explain the dimensional, object, and object-relational database models, citing the advantages of each. Use Figures 11-14, 11-15, and 11-16.
TEACHER TIP
Ask students to cite cases for Vintage Music Shop in which it would be wise to limit fields to a maximum length, and other cases when leaving a field length unlimited would be most appropriate. Relate the terminology of fields, records, and files to the structure of data discussed earlier in the text.
FIGURES
Figure 11-5, Figure 11-6, Figure 11-7, Figure 11-8, Figure 11-9, Figure 11-10, Figure 11-11, Figure
11-12, Figure 11-13, Figure 11-14, Figure 11-15, Figure 11-16
CLASSROOM ACTIVITIES
Assign a Project: Have students create lists of field names for a personal database. Use examples like a telephone database, music database, recipe database. Is more than one table needed to organize the fields? Note that within a set of tables there could be common fields like the name of the person who gave you the CD or recipe.
Quick Quiz:
1.
Each field has a unique _________ that describes its content. (Answer: name)
2.
True/False: In database jargon, a relationship is an association between data that is stored in different record types. (Answer: True)
3.
Which of the following database type excels in representing items that have slightly different attributes? a.
dimensional b.
object c.
hierarchical d.
relational
(Answer: b.)
New Perspectives on Computer Concepts 2011 Instructor’s Manual 5 of 18
SECTION B: DATA MANAGEMENT TOOLS (622)
SECTION B OPENER QUESTION
112200 Most people have purchased merchandise from Amazon.com and similar online stores.
What technology do these sites use to describe merchandise and handle customer shopping carts? a. Static Web publishing b. Spreadsheet data management c. Server-side programming d. E-commerce client software
(Answer: c)
Data Management Software (622)
LECTURE NOTES
Discuss personal organizers available as standalone products or as part of mobile devices like PDAs, and other simple applications that let users keep small numbers of records.
Explain that a flat data file using tables can be created in a word-processing program, such as
Microsoft Word, or a spreadsheet program, such as Microsoft Excel.
Point out that custom software, if poorly designed, may lead to data dependence, where the software and data are dependent on each other. If you change the data or file structure you must also change the program. This approach is fairly costly compared to other approaches.
Explain that one goal for a database is to have data independence (they separate data from the programs that manipulate the data).
Explain that quality database software is data independent.
Using Figure 11-20, discuss when one tool is more appropriate than another.
FIGURES
Figure 11-17, Figure 11-18, Figure 11-19, Figure 11-20
CLASSROOM ACTIVITIES
Assign a Project: Have students think of an application for which they could use a database at home.
Then have them refer to the table in Figure 11-20 to determine what type of tool best fits their needs.
Quick Quiz:
1.
_________ refers to data and program modules being so tightly interrelated that they become difficult to modify. (Answer: Data dependence)
2.
True/False: Modern database software supports data independence. (Answer: True)
3.
True/False: Data dependence is usually found in well written software. (Answer: False)
Database Management Systems (625)
LECTURE NOTES
Explain that database management systems (DBMS) are designed to manage data stored in a database, and that it includes generalized data management software to manage the data in one or more related files.
Explain that database management software generally supports one of the four database models, and that currently the most popular database management software in use supports the relational database model.
New Perspectives on Computer Concepts 2011 Instructor’s Manual 6 of 18
Explain that whereas an entry-level DBMS is designed for personal and small business use, database server software is designed to manage billions of records and several hundred transactions per second.
Using Access as an example of an entry-level DBMS, refer to Figure 11-21 and demonstrate Access in class.
Discuss how an entry-level DBMS located on a network allows multiple users to access the database at the same time, and note that there can be problems when users attempt to update the same record at the same time. Explain that database server software is a more robust approach that can manage billions of records and several hundred transactions each second.
TEACHER TIP
Ask students to identify the types of data that are best suited for an entry-level DBMS, and those best suited for database server software.
FIGURES
Figure 11-21, Figure 11-22, Figure 11-23
CLASSROOM ACTIVITIES
Assign a Project: Have students write a brief paragraph describing the following types of DBMS systems: DBMS, XML DBMS, ODBMS, and RDBMS.
Quick Quiz:
1.
A(n) _________ allows you to create, update, and administer a relational database. (Answer:
RDBMS or relational database management system)
2.
True/False: A distributed database has data stored on several computers, multiple networks, or in different geographical locations. (Answer: True)
3.
What does DBMS stand for? (Answer: database management system)
Databases and the Web (627)
LECTURE NOTES
Explain that while providing database access over the Web requires some ‘tricks’, it does not require special databases or special DBMSs.
Discuss how Web-enabled database tools give users the advantages of database management combined with access to the World Wide Web. These tools are a particularly useful resource for ecommerce.
Explain how Web sites can provide access to databases through static Web publishing or dynamic
Web publishing.
Use Figures 11-24 and 11-25 to explain concepts of Web publishing. Point out the advantages of each approach.
Discuss the HTML forms and XForms used to add and update database records over the Web.
Explain the purpose of server-side programs and the tools used to create them.
TEACHER TIP
Visit a Web site that uses forms, such as Expedia.com or Travelocity.com. Refer to page 628 and explain the process Web sites use to display forms and to send the data to a database.
New Perspectives on Computer Concepts 2011 Instructor’s Manual 7 of 18
FIGURES
Figure 11-24, Figure 11-25, Figure 11-26, Figure 11-27
XML (630)
LECTURE NOTES
Explain that XML is a markup language that allows you to incorporate field tags, data, and tables in a Web document.
Use Figure 11-28 to explain that XML helps organize data in context.
Explain that an XML document can also contain structured data organized into fields and records, replacing a traditional database.
FIGURES
Figure 11-28, Figure 11-29, Figure 11-30
CLASSROOM ACTIVITIES
Assign a Project: Have students browse the Internet and find database management software. Have them list the DBMS data model used, vendor, price and system requirements.
Quick Quiz:
1.
Database _________ software allows any remote computer or network workstation to access data in a database. (Answer: client)
2.
_________ is a technology that can be used to generate an HTML document that contains scripts. a.
ASP b.
CGI c.
PHP d.
HTML
(Answer: a.)
3.
_________ is a mark-up language that allows fields tags, data, and tables to be incorporated into a Web document via scripts. a.
ASP b.
CGI c.
PHP d.
XML
(Answer: d.)
SECTION C: DATABASE DESIGN (633)
SECTION C OPENER QUESTION
112300 Most commercial databases store data in a series of tables, rather than a single flat file.
Why? a. To reduce data redundancy b. To maintain unique sort keys c. To enable field validation rules d. To avoid case sensitivity
(Answer: a)
Defining Fields (633)
New Perspectives on Computer Concepts 2011 Instructor’s Manual 8 of 18
LECTURE NOTES
Discuss the first step in designing a database— determine what data you want to collect and store
then define the fields to hold that data. Remind them to break up the data when appropriate.
Use Figure 11-31 to illustrate the benefits of breaking data into fields.
Explain the definition and purpose of a primary key.
Explain the definition and purpose of data types. Review the data types listed in Figure 11-33.
Stress the need to validate data before it is stored in the database, and discuss some validation techniques.
FIGURES
Figure 11-31, Figure 11-32, Figure 11-33, Figure 11-34, Figure 11-35, Figure 11-36
CLASSROOM ACTIVITIES
Class Discussion: List the commonly used data types. Have a list of data values on the board and ask
students to identify the appropriate data type for each.
Quick Quiz:
1.
The term _________ refers to the arrangement of fields, records, tables, and relationships in a database. (Answer: database structure)
2.
True/False: A computed data field permanently holds a computed value and therefore requires disk storage space. (Answer: False)
3.
True/False: The hyperlink data type stores URLs used to link directly from a database to a Web page. (Answer: True)
Normalization (637)
LECTURE NOTES
Explain the process and purpose of normalization.
Review the goals of normalization. Eliminating data redundancy as part of the normalization process will make it easier to update the database. It also saves storage space.
Explain that the next step in designing a database is to group the fields into tables, attempting to minimize data redundancy. Once this is done, identify any relationships among the tables.
Note that a one-to-many relationship between items often indicates that the data should be separated into two or more tables.
FIGURES
Figure 11-37, Figure 11-38, Figure 11-39
CLASSROOM ACTIVITIES
Assign a Project: Have students list groups of fields they would use, or do use, in their home-use databases.
New Perspectives on Computer Concepts 2011 Instructor’s Manual 9 of 18
Quick Quiz:
1.
_________ is the process used by database designers to create a database structure that can save storage space, increase processing efficiency, and minimize data redundancy. (Answer:
Normalization)
2.
True/False: The goal of normalization is to minimize data redundancy. (Answer: True)
3.
_________ is the amount of data that is repeated or duplicated in a database. (Answer: Data redundancy)
Organizing Records (639)
LECTURE NOTES
Compare and contrast sorting and indexing. One powerful feature of databases is that they can present data in various ways depending on how their tables are sorted or indexed.
Explain that the sort order is the order in which records are stored on disk.
Point out that databases work more efficiently when their data is sorted.
Explain that a sort key usually determines how the records are sorted. For example, a table can use the record number as the sort key and then store the records in numerical order.
Explain that a database index contains a list of keys, with each key referencing the record that contains the rest of the fields related to that key. Use Figure 11-40 to illustrate this concept.
Note that an index is not related to how the records are stored on disk. Tables are usually indexed by any field that is commonly used as a search field, such as Customer Name.
TEACHER TIP
Ensure that students understand that a sort key is not the same thing as a primary key. The sort key is one or more fields used to specify where new records are inserted in a table. The primary key is a field that contains data unique to a record.
FIGURES
Figure 11-40
CLASSROOM ACTIVITIES
Assign a Project: Give students an example of a table with at least five records. Have students identify the sort order and suggest which field(s) can be used as an index.
Quick Quiz:
1.
A table’s _________ is one or more fields used to specify where new records will be inserted in a table. (Answer: sort key)
2.
True/False: The primary key is always used as the sort key. (Answer: False)
3.
What does a database index contain? (Answer: It contains a list of keys, each with a pointer to the records that contains the rest of the fields)
Designing the Interface (640)
LECTURE NOTES
Explain that the database interface is the window into which users will enter data. For students interested in programming, mention Visual Basic and Visual C# as languages often used to create user interface forms.
New Perspectives on Computer Concepts 2011 Instructor’s Manual 10 of 18
Emphasize that it is important to keep the user in mind when designing the interface form. A welldesigned user interface is clear, intuitive, and efficient. The order of the fields should make sense for the user of the database, not the designer.
Explain that the design should also make clear which entry box corresponds to which label. The labels themselves should be meaningful, informative, and provide instructions for entering data into the field.
TEACHER TIP
Show examples of database interfaces and ask students to evaluate them. If you do not have access to a variety of databases, refer to Figures 11-41 and 11-42, which show the same data entry screen designed in two ways.
FIGURES
Figure 11-41, Figure 11-42
CLASSROOM ACTIVITIES
Class Discussion: Create a business scenario where a user interface must be created (a health club application interface, for example). List relevant fields and ask students to sketch a well-designed interface used to enter data for the fields. Refer them to page 641 for a list of design principles. Have them evaluate each others interfaces.
Quick Quiz:
1.
True/False: The way database records, queries, and reports appear on the screen depends on the user interface. (Answer: True)
2.
True/False: Entry areas should appear in a consistent position relative to their labels. (Answer:
True)
3.
True/False: Including on-screen instructions in a database interface is not recommended.
(Answer: False)
Designing Report Templates (642)
LECTURE NOTES
Explain that a report generator in a DBMS is used to create reports.
Explain that, like forms, reports should be designed with the user in mind.
Use the list on page 643 to identify the hallmarks of a well-designed report.
FIGURES
Figure 11-43, Figure 11-44
CLASSROOM ACTIVITIES
Class Discussion: On an overhead display device, show some examples of report templates. Have students determine whether they are well or poorly designed and list the reasons why.
New Perspectives on Computer Concepts 2011 Instructor’s Manual 11 of 18
Quick Quiz:
1.
A(n) _________ is a software tool for specifying the content and format for a database report.
(Answer: report generator)
2.
A(n) _________ contains the outline or general specifications for a report, including such elements as the report title, fields to include, fields to subtotal or total, and report format specifications. (Answer: report template)
3.
True/False: Data is merged into a report template as soon as you complete the template.
(Answer: False)
Loading Data (644)
LECTURE NOTES
Explain that entering data can be tedious and cumbersome. To avoid data redundancy and errors,
you can use an importing and exporting tool.
Discuss the use of generic data entry tools supplied with a DBMS, such as import and export routines.
Note that custom conversion or import and export routines are sometimes used, but such routines require time and knowledge about the database formats to write.
TEACHER TIP
Import a flat file into an Access database. You may also show how to use data created in other programs, such as a Word table or an Excel spreadsheet, to import into an Access database.
LAB ACTIVITY
The Lab “Working with Database Software” deals with issues that relate to this section of the textbook.
Go through the lab during class time if you have a computer with a projection device, or assign this lab for students to do outside of class.
CLASSROOM ACTIVITIES
Assign a Project: Have students define a list of fields, organize the records, and remove any redundancy. Next, have them design an input screen.
Quick Quiz:
1.
Fixed length fields that hold character data (such as names), should be assigned the _________ type. (Answer: text data)
2.
True/False: A computed field is a calculation that a DBMS performs during processing, and then temporarily stores in a memory location. (Answer: True)
3.
If data exists electronically in another type of database file or in flat files, it is usually possible to transfer the data using a(n) _________. a.
custom-written conversion routine b.
import routine c.
export routine d.
all of the above
(Answer: d.)
New Perspectives on Computer Concepts 2011 Instructor’s Manual 12 of 18
SECTION D: SQL (645)
SECTION D OPENER QUESTION
112400 How does SQL relate to a typical computer user? a. Because search engines like Google are databases, you can use SQL to make advanced searches. b. You can use SQL to get beyond the main menu option on e-commerce sites like the iTunes store. c. You can use SQL to find music at free file sharing sites. d. Knowing how a query language works can help you understand how databases work behind the scenes.
(Answer: d)
SQL Basics (645)
LECTURE NOTES
Define the terms query language and query. Explain the role of a query language.
Explain that an SQL query is a command used to retrieve specific information from a relational database. For example, the query SELECT * FROM Employee where Gender = ‘F’ would select records for all female employees.
Familiarize students with the SQL commands listed in Figure 11-46. In addition, discuss the use of parameters and their use with WHERE.
TEACHER TIP
Take time in class to dissect an SQL statement, such as SELECT * FROM Employee where Gender = 'F' .
Make sure students understand how the statement works to select certain records.
FIGURES
Figure 11-45, Figure 11-46
CLASSROOM ACTIVITIES
Class Discussion: Give students a small table with at least 10 records. On an overhead display device or whiteboard, show some example SQL queries and have students determine the results of the queries.
Quick Quiz:
1.
_________ are detailed specifications for a command. (Answer: Parameters)
2.
What does SQL stand for? (Answer: Structured Query Language)
3.
True/False: An SQL query typically begins with an action keyword. (Answer: True)
Adding Records (647)
LECTURE NOTES
Explain that SQL statements using the keyword INSERT add data to a database.
Refer to Figure 11-47 for an example of an INSERT statement and how it relates to the Vintage
Music Shop database.
Use the SQL feature in Access to show students how to construct an INSERT statement. Use a sample database in Access and add a record to one of its tables.
FIGURES
New Perspectives on Computer Concepts 2011 Instructor’s Manual 13 of 18
Figure 11-47
CLASSROOM ACTIVITIES
Quick Quiz:
1.
What command adds data to a table? (Answer: INSERT)
2.
True/False: You cannot add records to a database. (Answer: False)
Searching for Information (648)
LECTURE NOTES
Explain that SQL statements use SELECT to search for a record or group of records.
Dissect the statement SELECT CDName, CDCover FROM CompactDisks WHERE ArtistName =
‘Natalie Merchant’ as an example of an SQL SELECT statement.
Review Boolean operators. SQL can also perform more complex searches using Boolean operators,
which students might be familiar with from searching the Internet.
Point out that a key to success is structuring focused queries. Reviewing Boolean logic (and, or, not) helps students create focused queries.
TEACHER TIP
Consider spending class time reviewing examples of the appropriate use of operators.
FIGURES
Figure 11-48
CLASSROOM ACTIVITIES
Assign a Project: Give students a table with at least 10 records. Have them create three complex
SQL searches using OR and/or AND search operators.
Quick Quiz:
1.
One of the most common database operations is to query for a particular record or group of records by using the _________ command. (Answer: SELECT)
2.
What are three SQL search operators? (Answers: AND, OR, NOT)
3.
True/False: SQL cannot perform complex searches that include both an AND operator and an
OR operator. (Answer: False)
Updating Fields (650)
LECTURE NOTES
Note that an SQL statement using the UPDATE keyword can change the records in a database (if you have the right to do so).
Analyze the sample UPDATE statements on page 650. Note that the first statement reduces the number of albums in stock and the second statement performs a global update.
FIGURES
Figure 11-49
CLASSROOM ACTIVITIES
New Perspectives on Computer Concepts 2011 Instructor’s Manual 14 of 18
Quick Quiz:
1.
A(n) _________ changes the data in more than one record at a time. (Answer: global update)
2.
Which command would be used to change the data in some or all records in a database?
(Answer: UPDATE)
3.
True/False: You can change records in a database only if you have authorization to do so.
(Answer: True)
Joining Tables (651)
LECTURE NOTES
Explain that in SQL terminology, creating a relationship between tables is called joining tables.
Use Figure 11-50 to show an example of two tables that have a relationship.
Show students how to use the SQL JOIN command to join and access the data in more than one
table.
Review Figure 11-51 to illustrate how the JOIN command can be used with other SQL commands.
FIGURES
Figure 11-50, Figure 11-51
LAB ACTIVITY
Refer students to the New Perspectives Web site for a Student Edition Lab called “Advanced
Databases.”
CLASSROOM ACTIVITIES
Assign a Project: Give students two related database tables, each with at least 10 records (for example, a student table containing student ID, major, etc. and a course table listing enrolled students by student ID, etc.). Have students work in groups of two to create queries using JOIN.
Quick Quiz
1.
True/False: In a relational database, tables remain essentially independent unless joined.
(Answer: True)
2.
True/False: The SQL command that adds data to a table is the ADD command. (Answer: False)
Using the following SQL code, results will include which of the following?
SELECT INVName FROM InventoryTable
WHERE (ProductName = ‘Shirt’ AND ProductPrice < 100.00) a.
Shirt, 150.00 b.
Shirt, 100.00 c.
Hat, 125.00 d.
Shirt, 99.00
(Answer: d.)
SECTION E: DATABASE SECURITY (653)
SECTION E OPENER QUESTION
112500 If you were a hacker trying to get your hands on a database with lots of social security numbers, what is the easiest way to do it? a. Hack into the database of an ATM. b. Steal a government computer, preferably a notebook that's been left unattended. c. Tap into HIPAA.
New Perspectives on Computer Concepts 2011 Instructor’s Manual 15 of 18 d. Hack into a local business that has an unsecured wireless connection.
(Answer: d)
Database Vulnerabilities (653)
LECTURE NOTES
Discuss the fact that data for millions of people has been stolen, hacked, or simply gone missing and the average American is in at least 50 databases.
Explain that people who are active users of online music stores and Web sites (such as MySpace or
Facebook) are likely to be in many more databases.
FIGURES
Figure 11-52
CLASSROOM ACTIVITIES
Class Discussion: Ask students if the security of their personal information has ever been breached.
Have their banks issued them new PINs for ATM cards as a result of a security breach? Have they received new credit cards from their credit card company for this reason? Have they ever had unauthorized charges on any of their accounts?
Quick Quiz:
1.
True/False: Every time a person fills out a survey, registers with a Web site, visits a doctor, or uses a credit card that information is stored in a database. (Answer: True)
2.
True/False: The qualities that make a database efficient also make it invulnerable. (Answer:
False)
Database Security Measures (654)
LECTURE NOTES
Explain that no computer system can be 100% secure.
Note that there are security measures that can be used to make data more secure.
Discuss the benefits and costs of encrypting data.
Discuss how access controls can be used to limit who accesses the database and how they can
interact with it. Explain how user privileges and data views are used to control database access.
Note that businesses may periodically conduct database audits to look for abnormal usage patterns.
TEACHER TIP
Show students what encrypted data looks like.
FIGURES
Figure 11-53, Figure 11-54
CLASSROOM ACTIVITIES
Class Discussion: Ask students which of the security measures listed in this section they believe is the most effective. Why?
New Perspectives on Computer Concepts 2011 Instructor’s Manual 16 of 18
Quick Quiz:
1.
List three security measures that can be taken to protect a database. (Answers: Encryption, access controls, data security policies, and intrusion monitoring)
2.
A(n) ________ establishes which fields and records a particular user is allowed to access.
(Answer: data view)
3.
True/False: A database administrator can limit the way individuals or groups access data.
(Answer: True)
Database Security Regulations (656)
LECTURE NOTES
Explain that while government databases have some of the most stringent regulations, laws governing private sector databases offer spotty protection.
Discuss phishing emails. Refer to the e-mail shown in Figure 11-55.
FIGURES
Figure 11-55
CLASSROOM ACTIVITIES
Class Discussion: Ask students if they think industry self-regulation is enough to protect consumers’ privacy. Why or why not?
Quick Quiz:
1.
Laws dating back to the _________ cover disclosure of telephone and cable records. (Answer:
1950s)
2.
True/False: Regulations in the private sector are, in most cases, more stringent than those imposed on the government. (Answer: False)
3.
True/False: The U.S. has the most stringent privacy regulations in the world. (Answer: False)
What Individuals Can Do (658)
LECTURE NOTES
Emphasize that the key to minimizing risk is being very cautious about the information divulged.
Stress the need to read privacy statements before providing personal information.
Use Figure 11-56 in your discussion of portable password managers.
TEACHER TIP
Survey students about the guidelines listed on pages 658 and 659. How many of these suggestions do they follow on a regular basis?
FIGURES
Figure 11-56, Figure 11-57
CLASSROOM ACTIVITIES
Quick Quiz:
New Perspectives on Computer Concepts 2011 Instructor’s Manual 17 of 18
1.
True/False: When registering to use a Web site, you should always provide all the information requested. (Answer: False)
2.
True/False: Some Web sites have an opt-out button if you don’t want your data distributed to third parties. (Answer: True)
WHAT DO YOU THINK?
113100 Do you support the idea that a national ID card can help combat terrorism and help secure
U.S. Borders? a. Yes b. No c. Not sure
113200 Are you comfortable about the tradeoff between privacy and security that accompanies a national ID database? a. Yes b. No c. Not sure
113300 Do you think most citizens are well informed about the privacy risks associated with a national ID database? a. Yes b. No c. Not sure
113400 Will you get a national ID card? a. Yes b. No c. Not sure
New Perspectives on Computer Concepts 2011 Instructor’s Manual
Access control, 655
BLOB, 635
Cardinality, 616
Case sensitive database, 636
Computed field, 635
Data dependence, 624
Data independence, 624
Data mining, 612
Data redundancy, 637
Data type, 634
Data view, 655
Data warehouse, 612
Database, 610
Database audit, 656
Database client software, 626
Database index, 639
Database model, 614
Database server software, 626
Database structure, 633
Date data type, 634
DBMS, 625
DELETE, 646
Dimensional database, 619
Distributed database, 626
Dynamic Web publishing, 628
Entity-relationship diagram, 616
Executive dashboard software, 613
Field, 615
Field format, 636
Field name, 615
Field validation rule, 636
Fixed-length field, 615
Flat file, 614
Global update, 650
Hierarchical database, 617
Hyperlink data type, 635
INSERT, 647
Integer data type, 634
JOIN, 651
Joining tables, 651
Logical data type, 634
Top of Document
Lookup routine, 637
Many-to-many relationship, 616
Memo data type, 634
Network database, 617
Normalization, 637
Object database, 620
Object-relational database, 621
ODBMS, 625
OLAP, 613
One-to-many relationship, 616
One-to-one relationship, 616
Parameters, 647
Predictive analytics, 613
Primary key, 634
RDBMS, 625
Real data type, 634
Record, 615
Record occurrence, 615
Record type, 615
Relational database, 618
Relationship, 616
Report generator, 642
Report template, 642
SELECT, 648
Server-side program, 628
Sort key, 639
Sort order, 639
SQL, 645
SQL keywords, 646
SQL query, 645
Static Web publishing, 627
Structured file, 614
Table, 618
Text data type, 634
Unstructured file, 614
UPDATE, 650
User privileges, 655
Variable-length field, 615
XForms, 629
XML, 630
XML DBMS, 625
18 of 18