SS 3 Lesson Note On Ict
SS 3 Lesson Note On Ict
PRIMARY INDEX
A primary index is an index on a set of fields that includes the unique primary key
for the field and is guaranteed not to contain duplicates. It is typically created
when the database is created and is used as the primary means of accessing data in
the database. It ensures fast access to data based on the primary key. They are two
types of primary index: Dense index and Sparse index
SECONDARY INDEX
A secondary index provides an alternate means of accessing data in a database, in
addition to the primary index. Unlike the primary index, a secondary index is not
based on the primary key and may have duplicates. It is created on non-key fields
of the table and allows for efficient retrieval of data based on those fields.
For example, if you have a database of employees and you want to retrieve data
based on the employee's name, you can create a secondary index on the name
field. This secondary index will help in faster retrieval of data based on the
employee's name.
Differences between Primary and Secondary Indexes:
1. Primary indexes are based on the primary key of the table, while
secondary indexes are based on non-key fields.
2. Primary indexes are guaranteed not to contain duplicates, while secondary
indexes may have duplicates.
3. Primary indexes are automatically created when the table is activated,
while secondary indexes need to be explicitly created by the database
administrator or developer.
4. Primary indexes are used as the primary means of accessing data in the
database, while secondary indexes provide an alternate means of accessing
data.
In summary, primary indexes are based on the primary key and provide fast access to
data, while secondary indexes are based on non-key fields and provide an alternate
means of accessing data based on those fields.
EVALUATION:
1. What is indexing?
2. Explain primary and secondary indexes
3. Why do we use composite search keys in index?
LESSON NOTE FOR WEEK 3 ENDING
SUBJECT INFORMATION AND COMMUNICATION TECHNOLOGY
CLASS SS 3
SEX MIXED
AGE 15 YEARS
PEROID
DURATION
TIME
DATE
NO: OF STUDENTS
TEACHER MR. ISAIAH SAMSON
TOPIC DATABASE SECURITY
EVALUATION:
1. Define database security
2. What are the challenges of database security?
3. Importance of database security
4. What are the best practices in database security?
LESSON NOTE FOR WEEK 4 ENDING
SUBJECT INFORMATION AND COOMUNICATION TECHNOLOGY
CLASS SS 3
SEX MIXED
AGE 15 YEARS
PEROID
DURATION
TIME
DATE
NO: OF STUDENTS
TEACHER MR. ISAIAH SAMSON
TOPIC ACCESS CONTROL AND ENCRYPTION
ENCRYPTION
Encryption is a method of converting data into a secure and unreadable format to protect
it from unauthorized access or interception. It involves using algorithms and keys to
transform plaintext data into ciphertext, which can only be decrypted back into its
original form with the correct decryption key.
Encryption serves several important purposes in information security:
1. Data Confidentiality
2. Data Integrity
3. Secure Communication
4. Compliance with Regulations
5. Protection against Data Breaches
It's important to note that encryption is not a foolproof solution, and proper key
management and secure implementation are essential. Additionally, encryption does not
protect against all types of attacks, such as attacks targeting the endpoints or
vulnerabilities in the encryption algorithms themselves.
Therefore, a comprehensive security strategy should include multiple layers of protection
in addition to encryption.
EVALUATION:
1. Define Access control
2. What are the types of Access controls?
3. Define encryption
4. Identify the role of database Administrator
5. Encryption serves several important purposes in information security. List four
LESSON NOTE FOR WEEK 5 ENDING
SUBJECT INFORMATION AND COMMUNICATION TECHNOLOGY
CLASS SS 3
SEX MIXED
AGE 15 YEARS
PEROID
DURATION
TIME
DATE
NO: OF STUDENTS
TEACHER MR. ISAIAH SAMSON
TOPIC CRASH RECOVERY
CHECKPOINTING
Checkpointing is a technique used in computer systems to create consistent and
recoverable states of a system or application at specific points in time. It involves
capturing the state of the system or application and storing it as a checkpoint, which can
be used for recovery purposes in case of failures or errors.
The process of checkpointing typically involves the following steps:
1. State Capture: The system or application's state is captured by saving critical
data structures, variables, or other relevant information. This may include the
contents of memory, processor registers, file system metadata, database
buffers, and other important system components.
2. Checkpoint Creation: The captured state is then stored as a checkpoint in a
persistent storage medium such as disk or non-volatile memory. This ensures
that the checkpoint survives system failures or crashes.
3. Recovery Point: Checkpoints are typically created periodically or at specific
milestones in the system's execution. These points are chosen based on criteria
such as time intervals, completion of specific tasks, or reaching specific
consistency points in the application.
4. Recovery Process: This involves loading the checkpointed state and resuming
execution from that point, potentially applying additional recovery techniques
such as redo or undo operations to bring the system or application to a
consistent state.
Checkpointing provides several benefits:
1. Fault Tolerance
2. Recovery Efficiency
3. Consistency
MEDIA RECOVERY
Media recovery is a process in database management systems (DBMS) that involves
restoring and recovering data from media failures.
The primary goal of media recovery is to bring the database back to a consistent and
usable state after a media failure.
This typically involves two main steps:
Restore: The restore phase of media recovery focuses on recovering the database
files or data from backup copies or other forms of data protection.
During the restore phase, the following steps are typically performed:
a. Identifying the affected files
b. Retrieving backups
c. Restoring the files
Recovery: The recovery phase of media recovery focuses on applying the
necessary changes or updates to the database to bring it up to date with the state it
had at the time of the media failure.
During the recovery phase, the following steps are typically performed:
a. Analyzing the transaction log
b. Redoing changes
c. Ensuring consistency
Media recovery is essential for maintaining data durability and availability in the
face of media failures.
EVALUATION:
1. Explain Recovery Related To Database
2. What is Checkpointing?
3. What is Media Recovery
4. State the process of checkpointing
LESSON NOTE FOR WEEK 7-9 ENDING
SUBJECT INFORMATION AND COMMUNICATION TECHNOLOGY
CLASS SS 3
SEX MIXED
AGE
PEROID
DURATION
TIME
DATE
NO: OF STUDENTS
TEACHER MR. ISAIAH SAMSON
TOPIC PARALLEL AND DISTRIBUTED DATABASE
PARALLEL PROCESSING
Parallel processing refers to the simultaneous execution of multiple tasks or processes to
achieve faster and more efficient computation. It involves dividing a task into smaller
subtasks that can be executed concurrently, either on multiple processors within a single
computing system or across multiple computing systems in a distributed environment.
EVALUATION:
1. Define parallel and Distributed Database
2. Explain the goal of parallel processing
3. The benefits of processing
4. What are the primary objectives of parallel processing?
LESSON NOTE FOR WEEK 10 ENDING
SUBJECT INFORMATION AND COMMUNICATION TECHNOLOGY
CLASS SS 3
SEX MIXED
AGE 15 YEARS
PEROID
DURATION
TIME
DATE
NO: OF STUDENTS
TEACHER MR. ISAIAH SAMSON
TOPIC NETWORKING
EVALUATION:
1. What is Networking ?
2. List and explain 5 types of Networking