Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ISM Assignment 2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

ASSIGNMENT – 2

Ques. 1 Explain various data models along with example of each of them.

ANSWER.

Data models define how the logical structure of a database is modeled. Data Models are
fundamental entities to introduce abstraction in a DBMS. Data models define how data is
connected to each other and how they are processed and stored inside the system.

The very first data model could be flat data-models, where all the data used are to be kept in
the same plane. Earlier data models were not so scientific, hence they were prone to introduce
lots of duplication and update anomalies.

ENTITY-RELATIONSHIP MODEL
 Entity-Relationship (ER) Model is based on the notion of real-world entities and
relationships among them. While formulating real-world scenario into the database
model, the ER Model creates entity set, relationship set, general attributes and
constraints.

 ER Model is best used for the conceptual design of a database.

 ER Model is based on:


 Entities and their 
 Relationships among entities.

These concepts are explained below.

Entity: An entity in an ER Model is a real-world entity having properties called attributes.


Every attribute is defined by its set of values called domain. For example, in a school
database, a student is considered as an entity. Student has various attributes like name, age,
class, etc.

Relationship: The logical association among entities is called relationship. Relationships are


mapped with entities in various ways. Mapping cardinalities define the number of association
between two entities.

Mapping cardinalities:

 one to one
 one to many
 many to one
 many to many

RELATIONAL MODEL
The most popular data model in DBMS is the Relational Model. It is more scientific a model
than others. This model is based on first-order predicate logic and defines a table as an n-ary
relation.

The main highlights of this model are:

 Data is stored in tables called relations.


 Relations can be normalized.
 In normalized relations, values saved are atomic values.
 Each row in a relation contains a unique value.
 Each column in a relation contains values from a same domain.
Q2. Explain the legal and ethical issues related to the implementation of an Information
System in an organization.

Answer.

Information Technology specifies to the components that are used to store, fetch and
manipulate the information at the minimum level with the server having an operating system.

Information Technology has a wide area of applications in education, business, health,


industries, banking sector and scientific research at a large level.

With the leading advancement in information technology, it is necessary to have the knowledge
of security issues, privacy issues and main negative impacts of IT.

Some of the major ethical issues faced by Information Technology (IT) are:

1. Personal Privacy:
 It is an important aspect of ethical issues in information technology.
 IT facilitates the users having their own hardware, operating system and software tools to
access the servers that are connected to each other and to the users by a network.
 Due to the distribution of the network on a large scale, data or information transfer in a big
amount takes place which leads to the hidden chances of disclosing information and
violating the privacy of any individuals or a group.
 It is a major challenge for IT society and organizations to maintain the privacy and
integrity of data. Accidental disclosure to inappropriate individuals and provisions to
protect the accuracy of data also comes in the privacy issue.

2. Access Right:
 The second aspect of ethical issues in information technology is access right.
 Access right becomes a high priority issue for the IT and cyberspace with the great
advancement in technology. E-commerce and Electronic payment systems evolution on
the internet heightened this issue for various corporate organizations and government
agencies.
 Network on the internet cannot be made secure from unauthorized access. Generally, the
intrusion detection systems are used to determine whether the user is an intruder or an
appropriate user.

3. Harmful Actions:
 Harmful actions in the computer ethics refers to the damage or negative consequences to
the IT such as loss of important information, loss of property, loss of ownership,
destruction of property and undesirable substantial impacts.
 This principle of ethical conduct restricts any outsiders from the use of information
technology in manner which leads to any loss to any of the users, employees, employers
and the general public.

4. Patents:
 It is more difficult to deal with these types of ethical issues.
 A patent can preserve the unique and secret aspect of an idea. Obtaining a patent is very
difficult as compared with obtaining a copyright.
 A thorough disclosure is required with the software. The patent holder has to reveal the
full details of a program to a proficient programmer for building a program.

5. Copyright:
 The information security specialists are to be familiar with necessary concept of the
copyright law.
 Copyright law works as a very powerful legal tool in protecting computer software, both
before a security breach and surely after a security breach.
 This type of breach could be the mishandling and misuse of data, computer programs,
documentation and similar material. In many countries, copyright legislation is amended
or revised to provide explicit laws to protect computer programs.

6. Trade Secrets:
 Trade secrets are also a significant ethical issue in information technology. A trade secret
secures something of value and usefulness.
 This law protects the private aspects of ideas which is known only to the discover or his
confidants.

7. Liability:
 One should be aware of the liability issue in making ethical decisions. Software developer
makes promises and assertions to the user about the nature and quality of the product that
can be restricted as an express warranty.
 Programmers or retailers possess the legitimate to determine the express warranties.

8. Piracy:
 Piracy is an activity in which the creation of illegal copy of the software is made.
 It is entirely up to the owner of the software as to whether or not users can make backup
copies of their software.
 As laws made for copyright protection are evolving, also legislation that would stop
unauthorized duplication of software is in consideration.
 The software industry is prepared to do encounter against software piracy.
 The courts are dealing with an increasing number of actions concerning the protection of
software.

Q3. What are the minimum software and hardware requirements for installing an MIS
in an organization?

Answer.

CATEGORY WINDOWS MAC OS X

Processor Intel Core i3 and above (such as Intel Core i5, or Intel Core
i7)  OR AMD FX 4100 and above, or A6 and above
Hard Drive 128 Gigabytes (GB)* 128GB+ Solid State Disk
(SSD) with at least 50GB of
free disk space

Memory 8 GB
Wired Networking Ethernet LAN Port or USB Ethernet Adapter/Dongle
In order to use the CBS wired network connection on your
ultra-light or Mac Book Air PC, you will need to purchase a
USB-to-Ethernet Adapter.
Wireless Networking 802.11n

Ques. 4 Differentiate between the following


1. Alter and update command
2. Delete and drop command
3. Grant and revoke command

ANSWER.

SR.NO ALTER COMMAND UPDATE COMMAND

ALTER command is Data Definition UPDATE Command is a Data Manipulation

1 Language (DDL). Language (DML).

Alter command will perform the

action on structure level and not on the Update command will perform on the data

2 data level. level.

ALTER Command is used to add,

delete, modify the attributes of the UPDATE Command is used to update existing

3 relations (tables) in the database. records in a database.

ALTER Command by default

initializes values of all the tuple as UPDATE Command sets specified values in

4 NULL. the command to the tuples.

5 This command make changes with This command makes changes with data inside
SR.NO ALTER COMMAND UPDATE COMMAND

table structure. the table.

Key DELETE DROP

Purpose DELETE Command, removes DROP Command, removes named


some or all tuples/records from elements of schema like
a relation/table relations/table, constraints or entire
schema.

Languag DELETE is DML. DROP is DDL.


e

Clause Where clause is used to add No where clause is available.


filtering.

Rollback Delete command can be Drop command can't be rollbacked as


rollbacked as it works on data it works directly on data.
buffer.

Memory Table memory space is not free Drop command frees the memory
Space if all records are deleted using space.
Delete Command.
S.NO GRANT REVOKE

This DCL command grants This DCL command removes

permissions to the user on permissions if any granted to the users

1 the database objects. on database objects.

It assigns access rights to

2 users. It revokes access rights of users.

If access for one user is removed; all

For each user you need to the particular permissions provided by

3 specify the permissions. that users to others will be removed.

When the access is

decentralized granting If decentralized access removing the

4 permissions will be easy. granted permissions is difficult.

You might also like