Information and Communication Technologies - III
76 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does 'Social Media' refer to?

Social media refers to the means of interactions among people where they create, share, and/or exchange information and ideas in virtual communities and networks.

What is a Social Media Platform?

A Social media platform refers to an online digital service or website that enables users to create, share, and interact with content. It allows users to interact and connect with others in a virtual environment.

Which of these are forms of Social Media? (Select all that apply)

  • instant messaging (correct)
  • micro-blogs (correct)
  • photo-sharing sites (correct)
  • virtual worlds (correct)
  • podcasts (correct)
  • widgets (correct)
  • wikis (correct)
  • Social networking sites (correct)
  • video-sharing sites (correct)
  • blogs (correct)
  • What is Cyber Ethics?

    <p>Cyberethics is a branch of applied ethics that examines moral, legal, and social issues at the intersection of computer/information and communication technologies.</p> Signup and view all the answers

    Cyberethics is also sometimes referred to as Internet ethics, computer ethics, and information ethics

    <p>True</p> Signup and view all the answers

    What are the key elements of Cyber Law?

    <p>Cyber Law, often termed IT Law, focuses on information-technology, including computers and the internet.</p> Signup and view all the answers

    What does a Database refer to?

    <p>A database is an organized collection of data stored in a computer system, typically managed by a DBMS (Database Management System).</p> Signup and view all the answers

    What is 'Data' in the context of computing?

    <p>Data is statically raw and unprocessed information, like name, class, marks, etc. It is a piece of information that can be translated into a form for efficient movement and processing.</p> Signup and view all the answers

    What is an application or 'App' in information technology?

    <p>An application (app) is a computer program designed to help people perform a specific activity.</p> Signup and view all the answers

    What is Artificial Intelligence (AI)?

    <p>AI refers to the application of artificial intelligence technologies and techniques to various aspects of information technology.</p> Signup and view all the answers

    What is Machine Learning (ML) in the context of AI?

    <p>Machine learning (ML) is a branch of AI and computer science that focuses on using data and algorithms to enable AI to imitate human learning.</p> Signup and view all the answers

    What is Machine Learning Technology?

    <p>Machine Learning Technology is defined as a system that optimizes performance using statistical methods to infer conclusions from data and computer science methods.</p> Signup and view all the answers

    What is Machine Learning in Information Technology?

    <p>Machine learning is a subfield of artificial intelligence broadly defined as the capability of a machine to imitate intelligent human behavior.</p> Signup and view all the answers

    What are some applications of Machine Learning in communication?

    <p>Machine learning is applied in communication through signal detection, channel encoding and decoding, channel estimation, prediction, compression, and resource allocation.</p> Signup and view all the answers

    What are the main types of Machine Learning paradigms?

    <p>The three main ML types are supervised learning, unsupervised learning, and reinforcement learning.</p> Signup and view all the answers

    Describe Supervised Learning.

    <p>Supervised learning is a machine learning paradigm where input objects (predictor variables) and a desired output value (supervisory signal) train a model. This process creates a function that maps new data to expected output values based on the learned patterns.</p> Signup and view all the answers

    Explain Unsupervised Learning.

    <p>Unsupervised learning algorithms find structures in data that hasn't been labeled or categorized. They do not explicitly require feedback but identify commonalities in the data.</p> Signup and view all the answers

    What is Reinforcement Learning?

    <p>Reinforcement learning is an interdisciplinary area of machine learning and optimal control that is concerned with how an intelligent agent ought to take actions in a dynamic environment to maximize the cumulative reward.</p> Signup and view all the answers

    What is a DBMS?

    <p>A DBMS is a software system used to manage a database and its various operations like insertion, deletion, updating, and retrieval.</p> Signup and view all the answers

    What are the key benefits of using a DBMS in system development?

    <p>DBMS offers data abstraction, integrity, security, sharing, and analysis. It provides a high-level interface for users and applications and enforces rules and constraints to ensure data accuracy, consistency, and validity.</p> Signup and view all the answers

    Which of these are well-known DBMS systems? (Select all that apply)

    <p>MySQL</p> Signup and view all the answers

    State the main characteristics of a database system.

    <p>A database system is typically self-describing, provides insulation between data and program, supports multiple user views of the data, and enables sharing of data with multiple user transaction processing.</p> Signup and view all the answers

    What is 'Data Independence' in a database system?

    <p>Data independence refers to separating the management of data from the programs that use it. Changes in the structure of a database do not require changes in the way data is accessed or manipulated.</p> Signup and view all the answers

    What is Logical Data Independence?

    <p>Logical Data Independence involves changing the logical or conceptual schema of a database without affecting the external schema. It allows modifications like adding or removing attributes without impacting existing application programs.</p> Signup and view all the answers

    What does Data Model signify?

    <p>A data model is a description of the organization of a database. It defines the way entities and their relationships are represented within the database.</p> Signup and view all the answers

    What is an Entity in the context of databases?

    <p>An entity in a database represents a group of similar information or data that is relevant to an organization. It is a key building block of a database model and represents a particular concept.</p> Signup and view all the answers

    What are attributes in a database?

    <p>Attributes are the characteristics of an entity that define its properties.</p> Signup and view all the answers

    What is Database Security and what does it encompass?

    <p>Database Security is the process of protecting a database from unintended activities, including authenticated misuse, malicious attacks, and inadvertent mistakes.</p> Signup and view all the answers

    What are the key aspects addressed by Data Security?

    <p>Data Security addresses the aspects of Privacy of data elements, Preserving Policies of the Organization, System-related security levels, and Maintaining the integrity of the database.</p> Signup and view all the answers

    What does 'Privacy of Data Elements' signify?

    <p>It relates to the legal and ethical rights regarding the access to certain personal data items. Critical information, like medical records, should not be accessed, read, or modified by unauthorized people.</p> Signup and view all the answers

    What does System-related Security Level mean in the context of database security?

    <p>This refers to the level of the system at which security should be enforced, such as hardware level, operating system level, or DBMS level.</p> Signup and view all the answers

    How does 'Maintaining Integrity of Database' contribute to data security?

    <p>Maintaining Integrity of Database ensures that the data items stored in the database are valid and consistent.</p> Signup and view all the answers

    What are the key data security risks that a database faces?

    <p>Database security risks include unauthorized user access, accidental or deliberate privilege granting to unauthorized users, improper concurrent transaction processing, unauthorized access through communication channels, intentional data copying, forced information transmission, memory protection failure against virus attack, and system malfunctioning.</p> Signup and view all the answers

    What does database security require to protect it from unauthorized access?

    <p>Legislation and security laws</p> Signup and view all the answers

    What are the different levels of database security?

    <p>The different levels of security include Network Level Security, Operating System (OS) Level Security, Database System Level Security, Program Level Security, Record Level Security, and Field Level Security.</p> Signup and view all the answers

    Define 'Database Integrity'.

    <p>Database Integrity refers to preserving data correctly and ensuring that the database is protected from accidental deletion or alteration.</p> Signup and view all the answers

    What are the key factors to consider for ensuring database integrity?

    <p>When many users enter data, ensuring data integrity through data insertions, updations, and other operations is crucial.</p> Signup and view all the answers

    What are the key integrity rules or constraints in the relational database model? (Select all that apply)

    <p>Entity Integrity Constraint</p> Signup and view all the answers

    What does Entity Integrity Constraint specify?

    <p>Entity Integrity Constraint ensures that each entity (row) is distinguishable and unique through the use of primary keys.</p> Signup and view all the answers

    What does Referential Integrity Constraint ensure?

    <p>Referential Integrity Constraint ensures that a value appearing in one relation for an attribute also appears in another relation if the two relations are related through a common attribute.</p> Signup and view all the answers

    What does Domain Integrity Constraint specify?

    <p>Domain Integrity Constraint specifies that the value of an attribute should be within a defined domain (set of atomic values).</p> Signup and view all the answers

    Why is implementing integrity constraint checking in a DBMS advantageous?

    <p>Implementing integrity constraint checking in a DBMS eliminates inconsistency, reduces the burden on application programmers, prevents duplication of efforts, and protects the database from manipulation by malicious users.</p> Signup and view all the answers

    What is User Authentication and why is it important in the context of databases?

    <p>User Authentication is a process of verifying the identity of a user before granting access to a database. It secures data from unauthorized access, preventing data theft, data loss, or network attacks.</p> Signup and view all the answers

    What are the common methods of user authentication in DBMS?

    <p>Common methods of user authentication include multi-factor authentication, password authentication, certificate authentication, biometrics token authentication, device authentication API, etc.</p> Signup and view all the answers

    Explain the purpose of User Authentication in DBMS.

    <p>User Authentication in DBMS verifies whether the person accessing the data is legitimate or not.</p> Signup and view all the answers

    Describe the concept of User Authorization in databases.

    <p>User Authorization determines which specific database operations and data objects a user can access based on their authentication status.</p> Signup and view all the answers

    What are the key elements that User Authorization controls?

    <p>User Authorization controls both 'access' and 'actions'. It determines which data objects a user can access and which database operations they can perform.</p> Signup and view all the answers

    How is Authorization typically paired with Authentication in a system?

    <p>Authorization is typically paired with Authentication, which verifies a user's identity. Authentication grants access, while Authorization controls what operations and resources a user can access.</p> Signup and view all the answers

    What are the various ways to gain authorization in a database system?

    <p>Users gain authorization through their user ID, membership in a group or role, or by being granted authorization permissions. Other methods include access control, inference control, flow control, and encryption.</p> Signup and view all the answers

    Define Data Encryption.

    <p>Data Encryption is a process of converting plaintext data into ciphertext by using a unique encryption key.</p> Signup and view all the answers

    Why is Data Encryption important?

    <p>Data Encryption is crucial for securing data, especially in today's digital landscape where data theft and hacks are common.</p> Signup and view all the answers

    What are the two main types of data encryption?

    <p>The two main types of data encryption are Symmetric Key Encryption and Asymmetric Key Encryption.</p> Signup and view all the answers

    Describe Symmetric Key Encryption.

    <p>Symmetric Key Encryption uses a single unique key for both encryption and decryption. This key must be securely shared between the sender and receiver.</p> Signup and view all the answers

    What is Access Control in the context of Encryption?

    <p>Access Control enables organizations to manage who has access to corporate data and resources by defining authorization policies.</p> Signup and view all the answers

    How does Access Control differ from Encryption?

    <p>Access Control regulates who can access data, while Encryption encodes data to prevent unauthorized access.</p> Signup and view all the answers

    Which of the following are key types of access control? (Select all that apply)

    <p>Role-Based Access Control (RBAC)</p> Signup and view all the answers

    Explain Role-Based Access Control (RBAC).

    <p>RBAC grants access to resources based on a user's role within an organization.</p> Signup and view all the answers

    What is Attribute-Based Access Control (ABAC)?

    <p>ABAC uses attributes to determine access to resources. It provides more granular control, allowing access based on a combination of attributes like user roles, data sensitivity, and network location.</p> Signup and view all the answers

    Define Discretionary Access Control (DAC).

    <p>DAC allows authorized users to control access to objects, providing a decentralized approach to access management.</p> Signup and view all the answers

    What are the roles and responsibilities of a Database Administrator (DBA)?

    <p>A DBA designs, implements, maintains databases, ensures data security, monitors performance, backs up and recovers data, troubleshoots issues, provides user support, plans for capacity, handles data extraction, transformation, and loading, and maintains software.</p> Signup and view all the answers

    Describe the concept of 'Transaction Recovery' in DBMS.

    <p>Transaction Recovery ensures that a database is consistent and reliable by managing individual DBMS operations, called transactions, as a single unit.</p> Signup and view all the answers

    What are the ways a transaction can be terminated?

    <p>Transactions can be terminated through Suicidal Termination (due to detected errors), Murderous Termination (forced by the DBMS or operating system), and Successful Termination (after completing successfully).</p> Signup and view all the answers

    Define 'Database Backups'.

    <p>Database Backups involve creating copies of a database to a permanent storage medium like magnetic tape to preserve data in case of equipment failures or disasters.</p> Signup and view all the answers

    Why is Backup Planning crucial for databases?

    <p>Backup Planning ensures that a recent copy of the database is always available, safeguarding against potential disasters like fire, flood, earthquake, virus attack, or accidental deletion.</p> Signup and view all the answers

    What are the two main types of backups? (Select all that apply)

    <p>Archival Backup</p> Signup and view all the answers

    Explain 'Immediate Backups'.

    <p>Immediate Backups are kept on media like floppy disks, zip disks, hard disks, or magnetic tapes. They are used for recovering data from technical faults, such as system crashes or data erasure.</p> Signup and view all the answers

    Explain 'Archival Backups'.

    <p>Archival Backups are stored on media like magnetic tapes, CD-ROMs, Internet servers, or other mass storage devices. They are used for recovering data lost during major disasters, such as fires, earthquakes, or floods.</p> Signup and view all the answers

    Why is database system recovery essential?

    <p>Database system recovery ensures that the database can be restored to a working state after failures of various forms, such as system crashes or data corruption.</p> Signup and view all the answers

    What are common reasons for a transaction to fail in the middle of execution? (Select all that apply)

    <p>Disk failure</p> Signup and view all the answers

    Define 'Big Data'.

    <p>Big data refers to large and diverse datasets that are huge in volume and rapidly grow in size over time.</p> Signup and view all the answers

    What are the three V's that characterize Big Data?

    <p>The three V's of Big Data are Volume, Variety, and Velocity. Volume refers to the large amount of data, Variety represents the wide range of data types, and Velocity describes the speed at which data is generated, collected, and processed.</p> Signup and view all the answers

    What is 'Data Analytics'?

    <p>Data Analytics is the process of collecting, transforming, and organizing data to extract meaningful insights and make informed decisions.</p> Signup and view all the answers

    What are the four main forms of Data Analytics?

    <p>The four forms of Data Analytics are Descriptive Analytics, Diagnostic Analytics, Predictive Analytics, and Prescriptive Analytics.</p> Signup and view all the answers

    Explain 'Descriptive Analytics'.

    <p>Descriptive Analytics analyzes historical data to identify patterns and relationships, providing insights into past events or trends. It describes a phenomenon or outcome based on available data.</p> Signup and view all the answers

    Explain 'Diagnostic Analytics'.

    <p>Diagnostic Analytics identifies the root causes of events, behaviors, and outcomes by analyzing patterns, trends, and connections in data.</p> Signup and view all the answers

    Explain 'Predictive Analytics'.

    <p>Predictive Analytics makes predictions about future outcomes by using statistical models, data mining techniques, and machine learning on historical data.</p> Signup and view all the answers

    Study Notes

    Information and Communication Technologies -III

    • Paper Code: MDC0300603

    Social Media Plateforms

    • Social media refers to interactions among people, sharing and/or exchanging information in virtual communities and networks.
    • Social media platforms are online services or websites enabling users to create, share, and interact with content.
    • Platforms include blogs, micro-blogs, wikis, social networking sites, photo-sharing sites, instant messaging, video-sharing sites, podcasts, widgets, virtual worlds, and more.
    • The Office of Communications and Marketing manages Facebook, X/Twitter, Instagram, LinkedIn, and YouTube accounts.
    • Social media platforms facilitate content creation, sharing, and aggregation amongst virtual communities and networks.
    • Common features include online platforms enabling users to create and share content and participate in social networking.

    Cyber Ethics

    • Cyber ethics examines moral, legal, and social issues at the intersection of computer/information and communication technologies.
    • This field is also referred to as Internet ethics, computer ethics, and information ethics.
    • Cyber ethics is "a branch of ethics concerned with behavior in an online environment."
    • It is the "exploration of the entire range of ethical and moral issues that arise in cyberspace."
    • Cyberspace is the electronic worlds made visible by the Internet.

    Breaches of Cyber Ethics

    • Cyberbullying: A form of bullying via internet technology, often social media, where individuals are mocked based on their physical appearance, lifestyle, or preferences. Teenagers/youngsters are often victims.
    • Hacking: Stealing personal or organizational information without authorization, often resulting in data breaches that involve sensitive information such as passwords and bank details, passed to unauthorized third-party users.
    • Copywriting:Claiming another individual's content or document as one's own, leading to plagiarism, a punishable legal offense.

    Cyber Ethics Focuses

    • Privacy: The content available online should not harm the moral, emotional, or personal ethics of individuals. Users should have rights to protect their information. Private information such as user contact details, addresses, and financial details must not be breached.
    • IPR (Intellectual Property Rights): The owners retain full rights to the content posted online. No one can claim another's content as their own. Unauthorised content distribution is ethically incorrect and does not benefit the creator financially or otherwise.
    • Security: Internet security is the most fundamental ethical right, and users should feel secure while using the internet. Only authorized users should access computer content. Confidential information must be safe.
    • Accuracy: Online content must be accurate, as billions of users rely on it for facts and information. Inaccuracies can cause widespread misinformation.

    Cyber Law

    • Cyber law, also called IT law, covers legal informatics and oversees digital information circulation, software, information security, and e-commerce.
    • It encompasses contract, intellectual property, privacy, and data protection principles.
    • Software licensing is a controversial area.

    Major Areas of Cyber Law

    • Fraud: Laws protect consumers from online fraud, including identity theft and credit card theft.
    • Copyright: Protects individuals and companies from copyright violations related to their creative works.
    • Defamation: Covers civil laws protecting individuals from fake public statements, which can harm reputations.
    • Harassment/Stalking: Online harassment and stalking violate criminal laws.
    • Trade Secrets: Laws protect the trade secrets companies develop (e.g., algorithms, software etc).
    • Contracts/Employment laws: These laws relate to the terms and conditions of using websites.
    • Databases: Data management principles.

    Databases

    • A database is a structured collection of data stored in a computer system, usually controlled by a database management system (DBMS).
    • Data querying and processing in databases is generally efficient because data is organized into tables using a structured query language (SQL).
    • Databases are critical for organizations such as banks, universities, etc.

    Artificial Intelligence (AI)

    • AI is integrated seamlessly into various communication systems.
    • It's applied to diverse areas of information technology, such as software development, data analysis, cybersecurity, and infrastructure management.

    Machine Learning (ML)

    • ML is a branch of Artificial Intelligence (AI) and Computer science that uses data and algorithms to enable AI.
    • The aim is to improve accuracy by gradually learning from data.
    • This technology is used in optimizing machine performance using statistical methods on data, finding solutions to problems and creating predictions.
    • ML is used to perform complex tasks relating to human intelligence in many communications systems.

    Machine Learning Types

    • Supervised Learning(SL): Using labeled input & output data, training a model to map new data to expected output values.
    • Unsupervised Learning(UL): Identifying structures in unlabeled data based on commonalities and differences.
    • Reinforcement learning(RL): An interdisciplinary area concerned with how an intelligent agent acts within a dynamic environment, aiming to maximize its cumulative rewards.

    Major Social Media Platforms

    • A list & associated user statistics for the top 10 social media platforms is available for the year 2024.

    Data Model

    • Data models: A representation of a database organisation describing entities and their interrelations within a given database.
    • Entity: A group of similar data elements relevant to an organization.
    • Attribute: The characteristics of an entity (e.g., a customer might have an address, phone number etc).

    Database Security

    • Implementing and maintaining database security involves protecting data from unauthorized access, use, disclosure, modification, or destruction.
    • This is typically achieved through user/access levels, data encryption, and logical protections.
    • Importance of database preservation: Data security is a vital aspect for data integrity.

    Levels of Security

    • Network Level: Security is at the network software layer in a communication or distributed database system.
    • OS Level: Security associated with the operating system software used to manage a database.
    • Database System Level: Security implemented within the database system itself for determining which parts of a database are accessible to which particular user.
    • Program Level: Security can be implemented through software (programs) used to manipulate the data.
    • Record Level: Security level where access or modification restrictions apply to a particular record in a database, enabling granular controls over data access
    • Field Level: Security level applicable to individual fields within a database requiring that only certain values be permitted, e.g., salary.

    Database Management System (DBMS)

    • DBMSs are programs used for managing databases.
    • They offer many tools and benefits in data analysis and decision making.
    • Features include: data abstraction, privacy, integrity, data sharing and analysis, plus user functionality.

    Importance of Data Encryption

    • Encryption is important for protecting data integrity, regardless of how it is stored or transmitted.
    • Data security is paramount. Even in "secure systems", unauthorized access is possible and there is a risk of compromised data.
    • It helps to secure data when transmitted.
    • Encryption provides an enhanced layer of protection.

    Backup and Recovery

    • Backup is critical for disaster recovery and continuity.
    • Data must be periodically backed up to ensure data availability and to mitigate risks associated with failures and errors.
    • The need for backup increases if there is a possibility of failures occurring simultaneously, e.g., earthquake, fire or hurricane etc.
    • Two main types of backups are: immediate and archival backups.
    • Immediate backups are readily available to mitigate risks if instantaneous data damage occurs.
    • Archival backups are stored at a segregated site, to safely archive and maintain historical data records.

    Transaction Recovery

    • To execute a single database operation, many DBMS tasks need to be performed in the specified order to ensure consistency.
    • A sequence of tasks performed in a particular order is called a transaction.
    • The DBMS may commit an operation or "rollback" an operation if errors occur.

    Database Administration

    • DBAs have various responsibilities, such as database design/implementation, security, performance monitoring, backup/recovery, troubleshooting, user support, capacity planning, data management and software maintenance.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    ICT-III Past Paper PDF

    Description

    This quiz covers the fundamentals of social media platforms and cyber ethics as part of the Information and Communication Technologies curriculum. Explore various types of social media services, their functions, and the ethical considerations surrounding their use. Enhance your understanding of how technology intersects with society through this interactive assessment.

    More Like This

    Use Quizgecko on...
    Browser
    Browser