What is a database?
What is a Primary Key
What is a Composite Key?
What is a Foreign Key?
Data Consistency
Data Integrity
Data Redundancy
Data Independence
First Normal Form
Second Normal Form
Third Normal Form
Purpose of Data Normalisation
Explain how data normalisation is carried out.
Describe the main components of a Database Management System (DBMS)
Data Definition Language
Data manipulation language (DML)
Data Dictionary
What is a DBMS?
1/5 functions of a DBMS
2/5 functions of a DBMS
3/5 function of a DBMS
4/5 function of a DBMS
5/5 function of a DBMS
The role of the database administrator in a typical DBMS
Facilities provided by a DBMS for end users.
1/5
MSRPC
Facilities provided by a DBMS for end users.
2/5
MSRPC
Facilities provided by a DBMS for end users.
3/5
MSRPC
Facilities provided by a DBMS for end users.
4/5
MSRPC
Facilities provided by a DBMS for end users.
5/5
MSRPC
How a DBMS improves the quality of the organisation's information.
Features the DBMS will provide for the I.T manager.
Features the DBMS will be able to provide for end users
What does a Management Information System (MIS) do?
Strategic level of a MIS
Tactical level of a MIS
Operational Level of MIS
External Data
Internal Data
Describe the purpose of a typical MIS
MIS help managers to:
1/6
MIS help managers to:
2/6
MIS help managers to:
3/6
MIS help managers to:
4/6
MIS help managers to:
5/6
MIS help managers to:
6/6
What is the difference between a data processing system and a management information system?
Limitations of using a MIS
Two disadvantages of a MIS except accuracy and up to date.
Reasons why the MIS might fail
What is a decision support system?
Main features of a DSS
What is an expert system?
Difference between data support system and expert system?
Features of an expert system
Three components of an expert system
Examples of an expert system
Why should a business not rely on a DSS alone?
How an expert system is created
Benefits of using an expert system
How is a rule base created?
Security Threats
Threats to Data Security when connected to the internet
1/2
Threats to Data Security when connected to the internet
2/2
How can access rights improve data security?
Main methods of ensuring data security and privacy in a DBMS
Auditing and Accounting Software
1/3
What information does auditing software record?
2/3
How audit trails improve security of data on a network
3/3
How does encryption improve the security of data on a network?
Activities which take place during a typical audit trail
Different Access Levels which can be used on a network.
A non physical measure of restricting access to a network to authorised users only
How could accounting software be used on a network?
How could accounting software be used on a network?
2/2
What is a backup and recovery plan?
Why might an organisation need a disaster Recovery plan?
Contents of a typical disaster recovery strategy
1/2
Contents of a typical disaster recovery strategy
2/2
Common Backup and Recovery Strategies
What should a backup strategy do?
1/2
What should a backup strategy do?
2/2
A suitable backup and recovery strategy for a real-time application?
A suitable backup and recovery plan for a batch processing application.
Back up.
A suitable backup and recovery plan for a batch processing application.
Recovery Plan
Main features of an incremental backup?
Other sections you would find in the security policy?