Data Processing For Ss 1 2 3
Data Processing For Ss 1 2 3
Data Processing For Ss 1 2 3
TOPICS FOR SS 2
THEME 1: Data Management Problems of Table in First Normal Form
CHAPTER One: TYPES OF DATA MODELS Determinant of Normal Forms
I Foreign Keys
Definition of Data Model CHAPTER Four: ENTITY-RELATIONSHIP
Types of Data Models MODEL I
CHAPTER Two: DATA MODELING IIII Entities, Attributes and Relationship
Creating Tables, Forms, Queries and Additional features of Entity Model
Reports CHAPTER Five: RELATIONAL MODEL I
Significance of Data Model Creating and Modifying Relations using
Examples of Standard Data Models SQL
CHAPTER Three: NORMALIZATION Integrity Constraints over Relations
(NORMAL FORMS) I Enforcing Integrity Constraints
Examples of Tables in First normal forms Querying Relational Data
Tables in Second and Third Normal CHAPTER Six: FILE ORGANISATION
Forms
Comparison of the three file Uses of Web Design Packages
organisation Component of Web Design Packages
THEME 2: Information Transmission Examples of Web Design Packages
CHAPTER Seven: INTERNET II CHAPTER Ten: GRAPHIC PACKAGES I
Definition of Internet Meaning of Graphic Software Package
Internet Browser Uses of Graphic Software Package
Benefits of Internet Components of CorelDraw
Internet Security Examples of Graphic Packages
Abuses of Internet THEME 4: Computer Maintenance,
THEME 3: Tools for Processing Ethics and Human Issues
Information CHAPTER Eleven: MAINTENANCE OF
CHAPTER Eight: PRESENTATION COMPUTER I
PACKAGES I General Cleaning
Meaning of Presentation Package Battery charging and replacement
Uses of Presentation Package DVD Drive lens cleaning
CHAPTER Nine: WEB DESIGN PACKAGES
Meaning of Web Design Packages
TOPICS FOR SS 3
THEME 1: Data Management Role of the Database Administrator in
CHAPTER One: INDEXES I Security
Clustered versus Indexes Encryption
Dense versus Sparse CHAPTER Three: CRASH RECOVERY III
Primary and Secondary Indexes Introduction to Aries (Analysis, redo and
Indexes using Composite search keys undo)
CHAPTER Two: DATABASE SECURITY Other Recovery related Data Structure
Introduction to Database Security The White-Ahead log Protocol
Access Control Checking Pointing
Media Recovery CHAPTER Six: COMPUTER VIRUS
CHAPTER Four: PARALLEL AND Meaning of computer virus
DISTRIBUTED DATABASE Types of virus
Architecture for parallel databases Example of Virus
Introduction to distributed databases Sources
Distributed DBMS Architecture Virus warning signs
Storing Data in a distributed DBMS Virus detection and prevention
THEME 2: Tools for Processing CHAPTER Seven: MAINTENANCE OF
Information COMPUTER II