ISM Assignment 2
ISM Assignment 2
ISM Assignment 2
Ques. 1 Explain various data models along with example of each of them.
ANSWER.
Data models define how the logical structure of a database is modeled. Data Models are
fundamental entities to introduce abstraction in a DBMS. Data models define how data is
connected to each other and how they are processed and stored inside the system.
The very first data model could be flat data-models, where all the data used are to be kept in
the same plane. Earlier data models were not so scientific, hence they were prone to introduce
lots of duplication and update anomalies.
ENTITY-RELATIONSHIP MODEL
Entity-Relationship (ER) Model is based on the notion of real-world entities and
relationships among them. While formulating real-world scenario into the database
model, the ER Model creates entity set, relationship set, general attributes and
constraints.
Mapping cardinalities:
one to one
one to many
many to one
many to many
RELATIONAL MODEL
The most popular data model in DBMS is the Relational Model. It is more scientific a model
than others. This model is based on first-order predicate logic and defines a table as an n-ary
relation.
Answer.
Information Technology specifies to the components that are used to store, fetch and
manipulate the information at the minimum level with the server having an operating system.
With the leading advancement in information technology, it is necessary to have the knowledge
of security issues, privacy issues and main negative impacts of IT.
Some of the major ethical issues faced by Information Technology (IT) are:
1. Personal Privacy:
It is an important aspect of ethical issues in information technology.
IT facilitates the users having their own hardware, operating system and software tools to
access the servers that are connected to each other and to the users by a network.
Due to the distribution of the network on a large scale, data or information transfer in a big
amount takes place which leads to the hidden chances of disclosing information and
violating the privacy of any individuals or a group.
It is a major challenge for IT society and organizations to maintain the privacy and
integrity of data. Accidental disclosure to inappropriate individuals and provisions to
protect the accuracy of data also comes in the privacy issue.
2. Access Right:
The second aspect of ethical issues in information technology is access right.
Access right becomes a high priority issue for the IT and cyberspace with the great
advancement in technology. E-commerce and Electronic payment systems evolution on
the internet heightened this issue for various corporate organizations and government
agencies.
Network on the internet cannot be made secure from unauthorized access. Generally, the
intrusion detection systems are used to determine whether the user is an intruder or an
appropriate user.
3. Harmful Actions:
Harmful actions in the computer ethics refers to the damage or negative consequences to
the IT such as loss of important information, loss of property, loss of ownership,
destruction of property and undesirable substantial impacts.
This principle of ethical conduct restricts any outsiders from the use of information
technology in manner which leads to any loss to any of the users, employees, employers
and the general public.
4. Patents:
It is more difficult to deal with these types of ethical issues.
A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very
difficult as compared with obtaining a copyright.
A thorough disclosure is required with the software. The patent holder has to reveal the
full details of a program to a proficient programmer for building a program.
5. Copyright:
The information security specialists are to be familiar with necessary concept of the
copyright law.
Copyright law works as a very powerful legal tool in protecting computer software, both
before a security breach and surely after a security breach.
This type of breach could be the mishandling and misuse of data, computer programs,
documentation and similar material. In many countries, copyright legislation is amended
or revised to provide explicit laws to protect computer programs.
6. Trade Secrets:
Trade secrets are also a significant ethical issue in information technology. A trade secret
secures something of value and usefulness.
This law protects the private aspects of ideas which is known only to the discover or his
confidants.
7. Liability:
One should be aware of the liability issue in making ethical decisions. Software developer
makes promises and assertions to the user about the nature and quality of the product that
can be restricted as an express warranty.
Programmers or retailers possess the legitimate to determine the express warranties.
8. Piracy:
Piracy is an activity in which the creation of illegal copy of the software is made.
It is entirely up to the owner of the software as to whether or not users can make backup
copies of their software.
As laws made for copyright protection are evolving, also legislation that would stop
unauthorized duplication of software is in consideration.
The software industry is prepared to do encounter against software piracy.
The courts are dealing with an increasing number of actions concerning the protection of
software.
Q3. What are the minimum software and hardware requirements for installing an MIS
in an organization?
Answer.
Processor Intel Core i3 and above (such as Intel Core i5, or Intel Core
i7) OR AMD FX 4100 and above, or A6 and above
Hard Drive 128 Gigabytes (GB)* 128GB+ Solid State Disk
(SSD) with at least 50GB of
free disk space
Memory 8 GB
Wired Networking Ethernet LAN Port or USB Ethernet Adapter/Dongle
In order to use the CBS wired network connection on your
ultra-light or Mac Book Air PC, you will need to purchase a
USB-to-Ethernet Adapter.
Wireless Networking 802.11n
ANSWER.
action on structure level and not on the Update command will perform on the data
delete, modify the attributes of the UPDATE Command is used to update existing
initializes values of all the tuple as UPDATE Command sets specified values in
5 This command make changes with This command makes changes with data inside
SR.NO ALTER COMMAND UPDATE COMMAND
Memory Table memory space is not free Drop command frees the memory
Space if all records are deleted using space.
Delete Command.
S.NO GRANT REVOKE