Podcast
Questions and Answers
What does 'Social Media' refer to?
What does 'Social Media' refer to?
Social media refers to the means of interactions among people where they create, share, and/or exchange information and ideas in virtual communities and networks.
What is a Social Media Platform?
What is a Social Media Platform?
A Social media platform refers to an online digital service or website that enables users to create, share, and interact with content. It allows users to interact and connect with others in a virtual environment.
Which of these are forms of Social Media? (Select all that apply)
Which of these are forms of Social Media? (Select all that apply)
What is Cyber Ethics?
What is Cyber Ethics?
Signup and view all the answers
Cyberethics is also sometimes referred to as Internet ethics, computer ethics, and information ethics
Cyberethics is also sometimes referred to as Internet ethics, computer ethics, and information ethics
Signup and view all the answers
What are the key elements of Cyber Law?
What are the key elements of Cyber Law?
Signup and view all the answers
What does a Database refer to?
What does a Database refer to?
Signup and view all the answers
What is 'Data' in the context of computing?
What is 'Data' in the context of computing?
Signup and view all the answers
What is an application or 'App' in information technology?
What is an application or 'App' in information technology?
Signup and view all the answers
What is Artificial Intelligence (AI)?
What is Artificial Intelligence (AI)?
Signup and view all the answers
What is Machine Learning (ML) in the context of AI?
What is Machine Learning (ML) in the context of AI?
Signup and view all the answers
What is Machine Learning Technology?
What is Machine Learning Technology?
Signup and view all the answers
What is Machine Learning in Information Technology?
What is Machine Learning in Information Technology?
Signup and view all the answers
What are some applications of Machine Learning in communication?
What are some applications of Machine Learning in communication?
Signup and view all the answers
What are the main types of Machine Learning paradigms?
What are the main types of Machine Learning paradigms?
Signup and view all the answers
Describe Supervised Learning.
Describe Supervised Learning.
Signup and view all the answers
Explain Unsupervised Learning.
Explain Unsupervised Learning.
Signup and view all the answers
What is Reinforcement Learning?
What is Reinforcement Learning?
Signup and view all the answers
What is a DBMS?
What is a DBMS?
Signup and view all the answers
What are the key benefits of using a DBMS in system development?
What are the key benefits of using a DBMS in system development?
Signup and view all the answers
Which of these are well-known DBMS systems? (Select all that apply)
Which of these are well-known DBMS systems? (Select all that apply)
Signup and view all the answers
State the main characteristics of a database system.
State the main characteristics of a database system.
Signup and view all the answers
What is 'Data Independence' in a database system?
What is 'Data Independence' in a database system?
Signup and view all the answers
What is Logical Data Independence?
What is Logical Data Independence?
Signup and view all the answers
What does Data Model signify?
What does Data Model signify?
Signup and view all the answers
What is an Entity in the context of databases?
What is an Entity in the context of databases?
Signup and view all the answers
What are attributes in a database?
What are attributes in a database?
Signup and view all the answers
What is Database Security and what does it encompass?
What is Database Security and what does it encompass?
Signup and view all the answers
What are the key aspects addressed by Data Security?
What are the key aspects addressed by Data Security?
Signup and view all the answers
What does 'Privacy of Data Elements' signify?
What does 'Privacy of Data Elements' signify?
Signup and view all the answers
What does System-related Security Level mean in the context of database security?
What does System-related Security Level mean in the context of database security?
Signup and view all the answers
How does 'Maintaining Integrity of Database' contribute to data security?
How does 'Maintaining Integrity of Database' contribute to data security?
Signup and view all the answers
What are the key data security risks that a database faces?
What are the key data security risks that a database faces?
Signup and view all the answers
What does database security require to protect it from unauthorized access?
What does database security require to protect it from unauthorized access?
Signup and view all the answers
What are the different levels of database security?
What are the different levels of database security?
Signup and view all the answers
Define 'Database Integrity'.
Define 'Database Integrity'.
Signup and view all the answers
What are the key factors to consider for ensuring database integrity?
What are the key factors to consider for ensuring database integrity?
Signup and view all the answers
What are the key integrity rules or constraints in the relational database model? (Select all that apply)
What are the key integrity rules or constraints in the relational database model? (Select all that apply)
Signup and view all the answers
What does Entity Integrity Constraint specify?
What does Entity Integrity Constraint specify?
Signup and view all the answers
What does Referential Integrity Constraint ensure?
What does Referential Integrity Constraint ensure?
Signup and view all the answers
What does Domain Integrity Constraint specify?
What does Domain Integrity Constraint specify?
Signup and view all the answers
Why is implementing integrity constraint checking in a DBMS advantageous?
Why is implementing integrity constraint checking in a DBMS advantageous?
Signup and view all the answers
What is User Authentication and why is it important in the context of databases?
What is User Authentication and why is it important in the context of databases?
Signup and view all the answers
What are the common methods of user authentication in DBMS?
What are the common methods of user authentication in DBMS?
Signup and view all the answers
Explain the purpose of User Authentication in DBMS.
Explain the purpose of User Authentication in DBMS.
Signup and view all the answers
Describe the concept of User Authorization in databases.
Describe the concept of User Authorization in databases.
Signup and view all the answers
What are the key elements that User Authorization controls?
What are the key elements that User Authorization controls?
Signup and view all the answers
How is Authorization typically paired with Authentication in a system?
How is Authorization typically paired with Authentication in a system?
Signup and view all the answers
What are the various ways to gain authorization in a database system?
What are the various ways to gain authorization in a database system?
Signup and view all the answers
Define Data Encryption.
Define Data Encryption.
Signup and view all the answers
Why is Data Encryption important?
Why is Data Encryption important?
Signup and view all the answers
What are the two main types of data encryption?
What are the two main types of data encryption?
Signup and view all the answers
Describe Symmetric Key Encryption.
Describe Symmetric Key Encryption.
Signup and view all the answers
What is Access Control in the context of Encryption?
What is Access Control in the context of Encryption?
Signup and view all the answers
How does Access Control differ from Encryption?
How does Access Control differ from Encryption?
Signup and view all the answers
Which of the following are key types of access control? (Select all that apply)
Which of the following are key types of access control? (Select all that apply)
Signup and view all the answers
Explain Role-Based Access Control (RBAC).
Explain Role-Based Access Control (RBAC).
Signup and view all the answers
What is Attribute-Based Access Control (ABAC)?
What is Attribute-Based Access Control (ABAC)?
Signup and view all the answers
Define Discretionary Access Control (DAC).
Define Discretionary Access Control (DAC).
Signup and view all the answers
What are the roles and responsibilities of a Database Administrator (DBA)?
What are the roles and responsibilities of a Database Administrator (DBA)?
Signup and view all the answers
Describe the concept of 'Transaction Recovery' in DBMS.
Describe the concept of 'Transaction Recovery' in DBMS.
Signup and view all the answers
What are the ways a transaction can be terminated?
What are the ways a transaction can be terminated?
Signup and view all the answers
Define 'Database Backups'.
Define 'Database Backups'.
Signup and view all the answers
Why is Backup Planning crucial for databases?
Why is Backup Planning crucial for databases?
Signup and view all the answers
What are the two main types of backups? (Select all that apply)
What are the two main types of backups? (Select all that apply)
Signup and view all the answers
Explain 'Immediate Backups'.
Explain 'Immediate Backups'.
Signup and view all the answers
Explain 'Archival Backups'.
Explain 'Archival Backups'.
Signup and view all the answers
Why is database system recovery essential?
Why is database system recovery essential?
Signup and view all the answers
What are common reasons for a transaction to fail in the middle of execution? (Select all that apply)
What are common reasons for a transaction to fail in the middle of execution? (Select all that apply)
Signup and view all the answers
Define 'Big Data'.
Define 'Big Data'.
Signup and view all the answers
What are the three V's that characterize Big Data?
What are the three V's that characterize Big Data?
Signup and view all the answers
What is 'Data Analytics'?
What is 'Data Analytics'?
Signup and view all the answers
What are the four main forms of Data Analytics?
What are the four main forms of Data Analytics?
Signup and view all the answers
Explain 'Descriptive Analytics'.
Explain 'Descriptive Analytics'.
Signup and view all the answers
Explain 'Diagnostic Analytics'.
Explain 'Diagnostic Analytics'.
Signup and view all the answers
Explain 'Predictive Analytics'.
Explain 'Predictive Analytics'.
Signup and view all the answers
Study Notes
Information and Communication Technologies -III
- Paper Code: MDC0300603
Social Media Plateforms
- Social media refers to interactions among people, sharing and/or exchanging information in virtual communities and networks.
- Social media platforms are online services or websites enabling users to create, share, and interact with content.
- Platforms include blogs, micro-blogs, wikis, social networking sites, photo-sharing sites, instant messaging, video-sharing sites, podcasts, widgets, virtual worlds, and more.
- The Office of Communications and Marketing manages Facebook, X/Twitter, Instagram, LinkedIn, and YouTube accounts.
- Social media platforms facilitate content creation, sharing, and aggregation amongst virtual communities and networks.
- Common features include online platforms enabling users to create and share content and participate in social networking.
Cyber Ethics
- Cyber ethics examines moral, legal, and social issues at the intersection of computer/information and communication technologies.
- This field is also referred to as Internet ethics, computer ethics, and information ethics.
- Cyber ethics is "a branch of ethics concerned with behavior in an online environment."
- It is the "exploration of the entire range of ethical and moral issues that arise in cyberspace."
- Cyberspace is the electronic worlds made visible by the Internet.
Breaches of Cyber Ethics
- Cyberbullying: A form of bullying via internet technology, often social media, where individuals are mocked based on their physical appearance, lifestyle, or preferences. Teenagers/youngsters are often victims.
- Hacking: Stealing personal or organizational information without authorization, often resulting in data breaches that involve sensitive information such as passwords and bank details, passed to unauthorized third-party users.
- Copywriting:Claiming another individual's content or document as one's own, leading to plagiarism, a punishable legal offense.
Cyber Ethics Focuses
- Privacy: The content available online should not harm the moral, emotional, or personal ethics of individuals. Users should have rights to protect their information. Private information such as user contact details, addresses, and financial details must not be breached.
- IPR (Intellectual Property Rights): The owners retain full rights to the content posted online. No one can claim another's content as their own. Unauthorised content distribution is ethically incorrect and does not benefit the creator financially or otherwise.
- Security: Internet security is the most fundamental ethical right, and users should feel secure while using the internet. Only authorized users should access computer content. Confidential information must be safe.
- Accuracy: Online content must be accurate, as billions of users rely on it for facts and information. Inaccuracies can cause widespread misinformation.
Cyber Law
- Cyber law, also called IT law, covers legal informatics and oversees digital information circulation, software, information security, and e-commerce.
- It encompasses contract, intellectual property, privacy, and data protection principles.
- Software licensing is a controversial area.
Major Areas of Cyber Law
- Fraud: Laws protect consumers from online fraud, including identity theft and credit card theft.
- Copyright: Protects individuals and companies from copyright violations related to their creative works.
- Defamation: Covers civil laws protecting individuals from fake public statements, which can harm reputations.
- Harassment/Stalking: Online harassment and stalking violate criminal laws.
- Trade Secrets: Laws protect the trade secrets companies develop (e.g., algorithms, software etc).
- Contracts/Employment laws: These laws relate to the terms and conditions of using websites.
- Databases: Data management principles.
Databases
- A database is a structured collection of data stored in a computer system, usually controlled by a database management system (DBMS).
- Data querying and processing in databases is generally efficient because data is organized into tables using a structured query language (SQL).
- Databases are critical for organizations such as banks, universities, etc.
Artificial Intelligence (AI)
- AI is integrated seamlessly into various communication systems.
- It's applied to diverse areas of information technology, such as software development, data analysis, cybersecurity, and infrastructure management.
Machine Learning (ML)
- ML is a branch of Artificial Intelligence (AI) and Computer science that uses data and algorithms to enable AI.
- The aim is to improve accuracy by gradually learning from data.
- This technology is used in optimizing machine performance using statistical methods on data, finding solutions to problems and creating predictions.
- ML is used to perform complex tasks relating to human intelligence in many communications systems.
Machine Learning Types
- Supervised Learning(SL): Using labeled input & output data, training a model to map new data to expected output values.
- Unsupervised Learning(UL): Identifying structures in unlabeled data based on commonalities and differences.
- Reinforcement learning(RL): An interdisciplinary area concerned with how an intelligent agent acts within a dynamic environment, aiming to maximize its cumulative rewards.
Major Social Media Platforms
- A list & associated user statistics for the top 10 social media platforms is available for the year 2024.
Data Model
- Data models: A representation of a database organisation describing entities and their interrelations within a given database.
- Entity: A group of similar data elements relevant to an organization.
- Attribute: The characteristics of an entity (e.g., a customer might have an address, phone number etc).
Database Security
- Implementing and maintaining database security involves protecting data from unauthorized access, use, disclosure, modification, or destruction.
- This is typically achieved through user/access levels, data encryption, and logical protections.
- Importance of database preservation: Data security is a vital aspect for data integrity.
Levels of Security
- Network Level: Security is at the network software layer in a communication or distributed database system.
- OS Level: Security associated with the operating system software used to manage a database.
- Database System Level: Security implemented within the database system itself for determining which parts of a database are accessible to which particular user.
- Program Level: Security can be implemented through software (programs) used to manipulate the data.
- Record Level: Security level where access or modification restrictions apply to a particular record in a database, enabling granular controls over data access
- Field Level: Security level applicable to individual fields within a database requiring that only certain values be permitted, e.g., salary.
Database Management System (DBMS)
- DBMSs are programs used for managing databases.
- They offer many tools and benefits in data analysis and decision making.
- Features include: data abstraction, privacy, integrity, data sharing and analysis, plus user functionality.
Importance of Data Encryption
- Encryption is important for protecting data integrity, regardless of how it is stored or transmitted.
- Data security is paramount. Even in "secure systems", unauthorized access is possible and there is a risk of compromised data.
- It helps to secure data when transmitted.
- Encryption provides an enhanced layer of protection.
Backup and Recovery
- Backup is critical for disaster recovery and continuity.
- Data must be periodically backed up to ensure data availability and to mitigate risks associated with failures and errors.
- The need for backup increases if there is a possibility of failures occurring simultaneously, e.g., earthquake, fire or hurricane etc.
- Two main types of backups are: immediate and archival backups.
- Immediate backups are readily available to mitigate risks if instantaneous data damage occurs.
- Archival backups are stored at a segregated site, to safely archive and maintain historical data records.
Transaction Recovery
- To execute a single database operation, many DBMS tasks need to be performed in the specified order to ensure consistency.
- A sequence of tasks performed in a particular order is called a transaction.
- The DBMS may commit an operation or "rollback" an operation if errors occur.
Database Administration
- DBAs have various responsibilities, such as database design/implementation, security, performance monitoring, backup/recovery, troubleshooting, user support, capacity planning, data management and software maintenance.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of social media platforms and cyber ethics as part of the Information and Communication Technologies curriculum. Explore various types of social media services, their functions, and the ethical considerations surrounding their use. Enhance your understanding of how technology intersects with society through this interactive assessment.