1ST Term S3 Data Processing
1ST Term S3 Data Processing
SCHEME OF WORK
WEEK TOPIC
1 REVISION
2 INDEXES:- Definition, Clustered versus Unclustered indexes
3 INDEXES:- Dense versus Sparse, Primary and Secondary Indexes, Indexes using
Composite Search Keys
4 MAINTENANCE OF COMPUTER:- Computer Hardware, Process Of Maintaining
Hardware
5 MAINTENANCE OF COMPUTER:- Procedure for Software Maintenance, Software
for Hardware and Software Maintenance
6 DATABASE SECURITY:- Definition and Explanation, Access Control and Encryption
7 DATABASE SECURITY:- Importance, Integrity and Availability, the Role of a
Database Administrator
8 CRASH RECOVERY:- Introduction to ARIES, other Recovery Related Data
Structure.
9 CRASH RECOVERY:- Definition and Explanation of Check Pointing, Explain Media
Recovery
10 REVISION
11 EXAMINATION
REFERENCE TEXTBOOK: UNDERSTANDING DATA PROCESSING for SENIOR SECONDARY SCHOOLS
BY: DINEHIN VICTORIA
WEEK ONE
REVISION
DEFINITION OF DATA MODEL
Is the process of structuring and organizing data.
NORMALIZATION
Is the process of efficiently organizing data in a database by reducing duplication or redundancy
and design flaws.
NORMAL FORM
Provide criteria for determining a table’s degree of vulnerability to logical inconsistencies and
anomalies.
EVALUATION
1. Define data model
2. State types of data model
CONCEPT OF KEYS
PRIMARY KEY
Is the attribute used to identify a record uniquely in a table or database
FOREIGN KEY
Is the field or attribute of a table that matches the primary key of another table.
ATTRIBUTES
Are data elements that have the smallest units of data that can be described in a meaningful
manner.
RELATIONSHIP
Is an association among the instances of one or more entity types
CARDINALITY
Defines the relationships between the entities in terms of numbers.
TYPES OF RELATIONSHIP
One-to-One, One-to-Many, Many-to-Many
GENERAL EVALUATION
1. (a) Define data model?
(b) State types of data model
(c) Use the following data to draw a hierarchical data model: Fruit; Orange, Pear, Berry;
Lime, Grape,Avocado, Sour Sop, Raspberry, Cranberry [Hints: Lime and Grape are
children of Orange, Avocado, and SoarSopare children of Pear while Raspberry and
Cranberry are children of Berry]
2. (a) State five (5) classes of normal forms
(b) Bring the table below to Second Normal Form
TABLE_PURCHASE
CustomerID StoreID Purchase Location
1 1 Lagos
1 3 Kano
2 1 Lagos
3 2 Abuja
4 3 Kano
Hint: This table has a composite primary key [CustomerID, StoreID]
WEEKEND ASSIGNMENT
1. Data models describe ……… data for storage in data management systems (a) structured
(b) unstructured (c) integer (d) alphabetic
2. Which of this is not an example of standard data model (a) ISO 10303 (b) ISO 15926
(c) IDEAS GROUP d) Good shepherd
3. ……….. key is a field in a relational table that matches a primary key of another table (a)
foreign (b) surrogate (c) primary (d) candidate
THEORY
1. (a) Define the following terms (i) Entity (ii) Attribute (iii) Relationship
(b) What is cardinality?
(c) Mention and explain three types of relationship in ERD with one example each
2. (a) Define the following (i) Primary key (ii) Foreign key (iii) Composite primary key
(b) Explain the term Normal Form.
(c) Design a database of your choice indicating the primary key and the foreign key
WEEK TWO
INDEXES
DEFINITION
An Index is a copy of database table that has been reduced to certain fields and the copy is
always in sorted form. The index also contains a pointer to the corresponding record of the
actual table so that the fields not contained in the index can also be read. Index contains a
value and a pointer to first record that contains data value.
A Database Index is a data structure that speeds up certain operation on a file. The Operation
involves a search key which is the set of record files( in most cases a single field). The elements
of an index are called data entries. Data entries can be actual data record. A given file of data
records can have several indexes, each with different search keys as showed in the table below.
The search engine searches for a value in table or file in two ways. The table scan which is
sequential and index which is random.
Indexes are special lookup tables that the database engine uses to speed up data retrieval. An
index in a database is similar to an index in the back of a book.
An index table or file consists of records called index entries. It is of the form
The search key field is used to sort the rows (in the index column) and the pointer field (in index
column) indicates where the actual data in the table will be retrieved. When a table has an
index it simply means the records in that table has been sorted in one way or the other.
EVALUATION
1. What is an index?
2. What are data entries?
INDEX CLASSIFICATION
Index can be classified as either clustered or unclustered.
CLUSTERED
Clustered index is an index whose sorting order determines the order of how the rows/records
in a table are stored. There could be only one clustered index in a table because there could
always be one way of arranging the records in a table at a given time. For example, if you are
asked to arrange some tables in a room, you could arrange them in a round form, row form or
packed them close together, only one way at a time. Clustered index also means that related
values in a table are stored close to each other according to the order of the index.
1. CLUSTERED INDEX
A Clustered index is when a file is organized so that the ordering of data records is the same as
or closes to the ordering of data entries. A clustered index can take place only if the data
records are sorted on the search key field. For example, suppose that students records are
sorted by age; an index on age that stores data entries in sorted order by age is a clustered
index.
Indexes that maintain data entries in sorted order by search key use a collection of index
entries, organized into a tree structure to guide searches for data entries. Thus, clustered
indexes are relatively expensive to maintain when the file is updated, when data entries are to
be moved across pages, and if records are identified by a combination of page id and slot as is
often the case, all places in the database that point to a moved record must also be updated to
point to the new location.These additional updates can be time consuming.
2. UNCLUSTERED INDEX
This an index whose sorting order does not determine the order of how the rows/records in a
table are stored. This means that the search keys in the index column is sorted in one order
while the actual records or rows are sorted in another order or are not sorted at all.
GENERAL EVALUATION
(1)Explain a database index
(2) Explain clustered index versus unclustered index.
READING ASSIGNMENT
Understanding Data Processing for Senior Secondary Schools by Dinehin Victoria, Page 254.
WEEKEND ASSIGNMENT
1. ………. is a database table that has been reduced to certain fields.a) Table b) An index c)
Table model d) Network model
2. The copy of an index is always in …… form. a) duplicate b) field c) sorted d) domain
3. The …………index can take place only if the data records are sorted on the search key
field. a)unclustered b)insert c) update d) clustered
4. A …………….. can contain several unclusterd indexes a) data file b) primary c) check d)
index
5. Index contain a value and ……. a)pointer b) sign c) update d) model
THEORY
1. Differentiate between clustered index and unclustered index.
2. State two reasons why clustered index is expensive to maintain.
3. What is an index?
WEEK THREE
INDEXES
DENSE VERSUS SPARSE INDEXES
DENSE INDEX
This is said to be dense if it contains (at least) one data entry for every search key value that
appears in a record in the indexed file.
In a dense index, index record appears for every search key value in the file or table. That is
every search key in the index column has a particular record it will point to in the table or file.
SPARSE INDEX
In a sparse index, each search key does not have a corresponding record it point to but may
point to a group of records in the base table. For example:
From the figure above, search keys such as 12121, 15151 do not have corresponding records in
the index but you can search for them through 10101 key to retrieve their records in the base
table.
A Sparse Index contains one entry for each page of records in the data file. The index record
contains the search key and a pointer to the first data record with that search key value. A
Sparse index must be clustered and it is smaller than a dense index.
This is an index on a set of fields that includes the primary key. Primary index contains records
that are usually clustered. A primary index is created for the primary key of a table.
SECONDARY INDEX
Secondary index is an index defined on a non-key field which may contain duplicate values and
as such does not determine the order of how the records are physically stored on a disk. It is
also called non-clustered index.
Secondary index is an index that is not a primary index i.e. it does not include primary key.
Secondary index can be created on non- key attribute. It contains duplicate data entries.
A Unique index is an index in which the search key contains some candidate key.
EVALUATION
1. Distinguish between dense index and sparse index
2. Explain primary and secondary index
The search key for an index can contain several fields, such keys are called Composite Search
Keysor Concatenated Keys.
Range Queryis the one in which not all fields in the search key are bound to constants. For
example, we can ask to retrieve all data entries with age = 20; this query implies that any value
is acceptable for the sal _eld. Another example of a range query is when ask to retrieve all data
entries with age < 30 and sal> 40
GENERAL EVALUATION
1. Differentiate between a unique index and a range query.
2. What is the difference between primary and secondary indexes?.
READING ASSIGNMENT
Understanding Data Processing for Senior Secondary Schools by Dinehin Victoria, Page 254.
WEEKEND ASSIGNMENT
1. ………. is an index in which the search key contains some candidate key. a) Unique index
b) An index c) composite d) sparse index
2. …… can be created on a non- key attribute. a) primary index b) dense index c)
secondary index d) sparse index
3. A sparse index contains one entry for each ……of records in the data file. a) page b)
table c) row d) column
THEORY
1. Create a student table with the following fields: name, age, and scores of 5 records.
Create an index using a composite keys name and age. (show the table and SQL
statements)
2. Discuss the different types of indexing.
3. Differentiate between a unique index and a range query.
4. What is composite search key?
WEEK FOUR
MAINTENANCE OF COMPUTER HARDWARE I
Maintenance of computer hardware is a way of taking care, repairing and replacing broken and
failing computer hardware.
As a result of this, complete cleaning should be done at least once a year and if the computer is
used in hot, dusty moist environment, cleaning must be performed more frequently.
Step 2: Never sprays any liquid onto any computer component. Spray or pour the liquid on a
lint – free cloth and wipe the PC with the cloth. Avoid product with certain cellulose
which will leave streaks on your computer equipment. The use of paper towels or an old
rag to clean delicate surfaces of a computer should be discouraged because paper
products contain cellulose which can scratch delicate surfaces of your hardware.
Step 3: Use vacuum cleaner to remove dirt, dust, food and hair from keyboards.it is advisable to
wear an anti – static wrist strip to reduce the transfer of static electricity from the
body to the computer.
Step 4: Do not apply cleaning solution including water directly to computer components.
Step 7: Do not use anything wet or damp inside the computer case.
Step 8: Do not let any component or circuit board inside the computer case get wet or damp.
Step 9: Do not attempt to clean the motherboard with a cloth as it may damage the electrical
components. Use a slightly moist cloth to wipe off dust and grime inside the computer
case.
EVALUATION
1. State the steps involve in maintaining a computer hardware
2. Mention six tools used in cleaning computer hardware
Step 2: Lightly dampen a cleaning cloth with isopropyl alcohol and wipe down the outside of the
Step 3: Remove the bottom cover of the mouse. To this, turn it over and note the directional
arrows that indicate the direction of rotation, or how to slide it off. Press with your
fingers in the direction of the arrows and then turn the mouse right side up, letting the
cover and mouse ball drop into your hand.
Step 4: Wipe the computer mouse ball with a lint-free cloth dampened with isopropyl alcohol.
Put it aside.
Step 7: Wipe the mouse cord. Lightly dampen a cleaning cloth with mild soap solution and
gently pull the cord through the cloth.
Step 2: Vacuum the outside of the monitor, particularly the cooling grooves, holes or slots in
the top surface where heavy dust or other debris may have collected. Blow compressed
air in short puffs at an angle to the monitor surface. The goal is to remove dust and dirt
without letting anything fall into the ventilation holes.
Step 3: Lightly dampen a cloth with a mild soap solution and wipe down the outside plastic
portions of the monitor.
Step 4: Clean the monitor cables and power cord while they are disconnected. Lightly dampen a
cloth with mild soap solution and gently pull the cables and cords through the cloth.
Step 5: Check the documentation or call the manufacturer to find out if your monitor screen
has anti-glare, or other delicate coatings. If so, ask the manufacturer or cleaning
instructions. If it does not have these special coatings you may spray a window cleaner
unto a lint-free cloth and wipe it clean. Do not spray directly onto the screen. Chemicals
may drip inside the monitor and damage it.
Step 6: For dusty or dirty manufacturing environments use a computer dust cover to protect
the monitor
Step 2: Use a vacuum cleaner to remove debris between the key. If no vacuum is available, turn
the keyboard upside down and gently tap on the back side dislodge debris.
Step 3: Aim between the keys and compressed air to remove remaining dust and debris. Use
short puffs of air applied at about a 30-45 degree angle to the keyboard surface.
Alternate between blowing the keys and tapping the keyboard upside down to dislodge
particles until it is clean.
Step 5: Dampen a swab with isopropyl alcohol and clean between, around and on top of the
keys. Change swabs as they become dirty. You may need several swabs.
Step 6: Wipe the keyboard cord. Lightly dampen a cleaning cloth with mild soap solution and
gently pull the cord through the cloth. Dry the cord with a dry cloth.
Step 7: For dusty or dirty manufacturing environments a good keyboard cover is recommended.
GENERAL EVALUATION
1. Explain steps for cleaning the following (i) Keyboard (ii) Monitor
2. List steps to clean DVD drive lens.
WEEKEND ASSIGNMENT
1. Maintenance is necessary on computer to avoid ……….
a) hardware failure b) stealing c) invasion d) crime
2. Excess heat accelerates the deterioration of the delicate ……… in the system. a) vacuum
b) transistors c) circuits d) particles
3. Dust and dirt are the most common cause of ……… a) leakage b) overheating c) breakage
d) spooling.
4. ……….. is used to remove dust, dirt and hair from the keyboard. a) Vacuum cleaner b)
Brush c) Old rag d) Paper towels
5. It is advisable to wear an ………… to reduce transferring static electricity from your body
to the computer. a) hand glove b) anti – static wrist strip c) coat d) dust cover
THEORY
1. Explain the steps in cleaning the following: i) Mouse ii) Keyboard iii Monitor iv) DVD
drive lens
2. State six tools used in cleaning computer hardware.
WEEK FIVE
MAINTENANCE OF COMPUTER II
Maintenance is highly essential in order to prolong its contributing functionality.
SOFTWARE MAINTENANCE
The maintenance of programs inside the computer system such as virus, a spyware removal,
back up software and a registry removal, cleaner. Every PC should be installed with an anti
virus, a spyware removal application back up and a registry cleanser.
1. CORRECTIVE MAINTENANCE
2. PERFECTIVE MAINTENANCE
This is a measure taken by computer programmer to upgrade the way a software programs
function or how fast it processes, requests, develop software menu layouts and command
interface so as to ensure that the program has zero tolerance for flaws.
3. ADAPTIVE MAINTENANCE
It takes care of the changes that occur in software development. For instance, if there is a
change in processors speed, thus change will invariably affect how the software performs on a
single computer software interfaces with other software programs. So changes in one program
necessitates changes in other programs.
4. PREVENTIVE MAINTENANCE
This is a situation whereby computer programmers try to prevent problems with software
programs before they occur. They seek to prevent corrective maintenance as well as
anticipating adaptive maintenance needs before users encounter problems. This is done by test
running their programs to ensure that the software can handle high data loads and other
stressful opearatiobn without difficulties. Computer programmers also ensure compatibility by
testing the software with other programs users that are likely to use their software.
EVALUATION
1. Discuss the four types of software maintenance.
2. State five benefits of software maintenance.
GENERAL EVALUATION
1. State five routine computer maintenance.
2. State six computer maintenance tips.
READING ASSIGNMENT
WEEKEND ASSIGNMENT
1. Which of the following is not a software maintenance? a) Virus b) Spyware c) Hard disk
d) Registry removal
2. The software maintenance that involves developing and deploying solutions to
problems is .……… a) corrective b) adaptive c) preventive d) perfective
3. The software maintenance that takes care of the changes that occur in software
maintenance is called ……... a) adaptive b) corrective c) perfective d) preventive
4. Disk cleaning should be done ……….. a) hourly b) daily c) weekly d) yearly
5. Patches and update are regularly released by software companies to tackle security
problems found in …………. a) programs b) hardware c) people ware d) peripheral
THEORY
1. List and explain the four software maintenance.
2. State four benefits of software maintenance
3. State three routine computer maintenance
It is a means of putting in place the different form of information security controls to protect
database against compromise of their confidentiality, integrity and availability.
RISK ASSESSMENT
This will enable you to identify the risks you are faced with and what could happen if valuable
data is lost through theft, malware infection or a system crash.
SECURING DATA
Since data can be compromised in many ways, the best security against misuse or theft involves
a combination of technical measures, physical security and a well-educated staff. You should
implement clearly defined polices into your infrastructure and effectively present them to the
staff.
2. Auditing
3. Authentication
Is the validation control that allows you to log into a system, email or blog account etc. Once
logged in, you have various privileges until logging out. Some systems will cancel a session if
your machine has been idle for a certain amount of time, requiring that you prove
authentication once again to re-enter.You can log in using multiple factors such as a password,
a smart card or even a fingerprint.
4. Encryption
This security mechanism uses mathematical scheme and algorithms to scramble data into
unreadable text. It can only be decoded or decrypted by the party that possesses the associated
key.
5. Back Up
This is the process of making copy and archiving of computer data in the event of data
losswhich is used to restore the original data.
6. Password
This is sequence of secret characters used to enable access to afile, program, computer system
and other resources.
EVALUATION
1. Explain data security.
2. Explain types of security control on data that you know
INTEGRITY CONTROLS
BACKUPS
Backupshave two distinct purposes. The primary purpose is to recover data after its loss, be it
by data deletion or corruption. The secondary purpose of backups is to recover data from an
earlier time, according to a user-defined data retention policy, typically configured within a
backup application for how long copies of data are required. Backup is just one of the disaster
recovery plans.
APPLICATION SECURITY
Application security is the use of software, hardware and procedural methods to protect
application from external threats.
READING ASSIGNMENT
Understanding Data Processing for Senior Secondary Schools by Dinehin Victoria Pages 255 -
260
WEEKEND ASSIGNMENT
THEORY
1. Explain two types of data security control.
2. Mention five (5) duties of a database administrator.
The three main principles that lie behind ARIES recovery algorithm
1. Write Ahead Logging: Any change to an object is first recorded in the log, and then the
log must be written to a stable storage before changes to the object are written to a
disk.
2. Repeating History during Redo: On restart, after a crash, ARIES retraces the actions of a
database before the crash and brings the system back to the exact state that it was in
before the crash. The n it undoes the transaction still active at crash time.
3. Logging Changes during Undo: Change made to the database while undoing transactions
are logged to ensure such an action isn’t repeated in the event of repeated restarts.
EVALUATION
1. Define crash recovery.
2. Explain the term ARIES.
ATOMICITY
This is the property of transaction processing whereby either all the operations of transactions
are executed or none of them are executed (all-or-nothing)
DURABILITY
This is the ACID property which guarantees that transactions that have committed will survive
permanently.
LOG
CHECK POINTING
Check pointing is basically consists of storing a snapshot of the current application state, and
later on, use it for restarting the execution in case of failure. A check point record is written into
the log periodically at that point when the system writes out to the database on disk all DBMS
buffers that have been modified. This is a periodic operation that can reduce the time for
recovery from a crash.
Check points are used to make recovery more efficient and to control the reuse of primary and
secondary log files. In the case of crash, backup files will be used to recover the database to the
point of crash.
MEDIA RECOVERY
Media recovery deals with failure of the storage media holding the permanent database, in
particular disk failures. The traditional database approach for media recovery uses archive
copies (dumps) of the database as well as archive logs. Archive copies represent snapshots of
the database and are periodically taken.
The archive log contains the log records for all committed changes which are not yet reflected
in the archive copy. In the event of a media failure, the current database can be reconstructed
by using the latest archive copy and redoing all changes in chronological order from the archive
log.
A faster recovery from disk failures is supported by disk organizations like RAID (redundant
arrays of independent disks) which store data redundantly on several disks. However, they do
not eliminate the need for archive based media recovery since they cannot completely rule out
the possibility of data loss, e.g when multiple disk fail.
GENERAL EVALUATION
1. Explain crash recovery.
2. Explain the following terms in crash recovery (i) Media recovery (ii) Check point (iii) The
Write - Ahead log protocol
3. Discuss the concepts of ARIES in crash recovery.
READING ASSIGNMENT
Understanding Data Processing for Senior Secondary Schools by Dinehin Victoria Pages 261 –
267
THEORY
1. Discuss the concept of ARIES in crash recovery.
2. Explain the difference between media recovery and check point.
3. Explain the difference between a system crash and a media failure.