E-Note SS Two 3rd Term Data Processing
E-Note SS Two 3rd Term Data Processing
REFERENCES:
Spectrum Computer Studies for Senior Secondary Schools 2 by Tuttuh-Adegun
Moses et al.
Search light on Computer Studies for Senior Secondary School 2 by Owolabi
Kayode et al.
A textbook of DATA PROCESSING for Senior Secondary Schools 2 by Adedapo
F.O et al.
WEEK ONE
TOPIC: GRAPHIC PACKAGES
CONTENT:
1. Meaning of Graphic Software Package
2. Uses of Graphic Software Packages
3. Examples of Graphic Package
Traditional Uses
It is used for pictorial representation and manipulation of data.
It is used for computer aided designs used in schools.
It is used for creating simple and complex fliers, posters, books and bill boards.
It is used in typesetting and graphic arts designing.
It is used for creating designs, text and graphics for effective presentation in
seminars.
EVALUATION
I. Define Graphics
II. Explain the word Graphic Package
III. Enumerate 3 uses each of advance and traditional use of Graphic package.
ASSIGNMENT
I. Find out 10 other uses of Graphic packages @ your own leisure
WEEK TWO
TOPIC: Graphic Packages
Subtopic: Corel Draw
CONTENT:
(i) Meaning of Corel Draw
(ii) Components of Corel Draw
Sub-topic 1
Meaning of Corel Draw
Corel Draw is a graphic package used mainly for automating artistic functions and designing
high quality graphics using conventional lines, basic shapes, symbols and logos. CorelDraw
was developed by Corel Corporation Ottawa, Canada in June 1985. The latest version that
makes the twenty-fifth versions (i.e. CorelDraw 2024) was released in March 2024.
Uses of CorelDraw
1. CorelDraw provides users with different tools to create original images or drastically
edit them.
2. CorelDraw is also compatible with other program in the Corel Draw Graphics suite,
such as Corel Photo-Paint
3. CorelDraw is used to create logos
4. To create complex drawing
5. To create professional world brochure
Sub-topic 2
Components of Corel Draw
After loading Corel Draw it brings you to an environment with a blank/white background or
drawing window with a rectangular box where your drawing is created. This environment
displays the following features or components.
1. Title Bar: It displays application name and file name at the top of the package.
2. Menu Bar: It displays the various command use to work on the program.
3. Page Layout: This is a workspace for user’s work, otherwise known as printable
page.
4. Standard Tool Bar: This bar contains icon and commands for performing operations
on documents.
5. Status Bar: It displays detailed information about programs selected.
6. Ruler: This is used for measuring objects in order to obtain accurate size. There are
two types: horizontal and vertical.
7. Properties Bar: It displays detailed information about graphic/text selected.
8. Scroll Bar: They are used for scrolling page layout/work in the desired direction
(Horizontal and Vertical)
9. Colour Palette: It displays various colours used for colouring any selected
object/text.
10. Tool Box: This contains the tools used to create, fill, and modify your drawing.
11. Document Navigator: it allows movement, quick view or move from one work area
to another.
12. Docker: A window containing available commands and settings relevant to a specific
tool or task.
13. Navigator: A button at the lower-right corner that opens a smaller display to help
you move around a drawing.
TOOL BOX
Toolbox appears on the left corner of the publication window. It is used to display tool/icon
for performing different operations on the screen.
1. Pick Tool: Pick tool selects objects. Once selected, you can use the Pick Tool for move,
stretch, scale, rotate, and skew objects.
2. Shape tool: Shape tool reshapes objects by moving nodes, lines, and control points.
3. Crop tool: The Crop tool is located in the toolbox, on the Crop tool flyout. To crop
objects, you define a rectangular area (cropping area) that you want to keep. Portions
of the graphic outside the cropping area will be removed. You can specify the exact
position and size of the cropping area, and you can rotate and resize it.
4. Zoom tool: Changes the current view of the drawing
5. Freehand tool: Draws lines and curves. You can also use this tool to trace bitmaps.
6. Smart Fill tool: Converts the freehand strokes you draw to basic shapes and smoothed
curves.
7. Rectangular tool: Draws rectangles and squares. Squares are created by using the
control key while drawing.
8. Ellipse tool: Draws ellipses and circles. Circles are created by holding down the control
key as you draw.
9. Polygon tool: is used to create polygons having two or more straight sides, depends on
your requirement.
10. Basic shape tool: A collection of objects, which you can add to your drawing.
11. Text tool: Adds either Artistic or paragraph text to your drawing.
12. Interactive blend tool: Allows you to merge objects.
13. Eyedropper tool: Allows you to select a color within an object.
14. Pen tool: pen tool mainly draws lines one by one (curve or straight line) by accurately
placing nodes and controlling the shape of each curve segment.
15. Fill tool: Assigns the fill style of any object.
16. Interactive fill tool: Allows you to apply fountain fills (gradients) using the mouse. The
flyout gives access to the Mesh fill Tool.
CorelDraw Menu
This consists of eleven menus. They are: File, Edit, View, Layout, Arrange, Effect, Bitmap,
Text, Tools, Windows and Help
EVALUATION
i. Explain the term CorelDraw
ii. Itemize and explain 5 distinct components of CorelDraw environment
ASSIGNMENT:
I. The area displaying the title of a currently opened drawing is called____________
II. Itemize 5 tools in CorelDraw
WEEK THREE
TOPIC: Graphic Packages (Cont.)
CONTENT:
i. SPECIALISED GRAPHIC APPLICATIONS
ii. Practical section
Sub-topic 1
SPECIALISED GRAPHIC APPLICATIONS
These are specialized Graphic Applications used in other field of endeavours, namely;
Paint programs used to create rough free hand drawings and can be edited
using bitmap.
Illustration/design programs are used drawing curved lines and its images are
stored in vector based formats.
Presentation graphics Software used for creating bar charts, pie charts and
graphics for slide shows and reports.
Animation software enables you to chain and sequence a series of images to
simulate movement.
CAD(Computer Aided Design) Software used by engineers and architects to
draft designs
Desktop Publishing allows full set of word processing and fine control of text
and graphics.
Sub-topic 2:
Practical Section
i. Design a Letter head using CorelDraw.
ii. Design Flag of Nigeria
iii. Design a Wedding Card
iv. Create the Logo of AIHS
v. Design a Birthday Card
Vi. Create MTN Logo
vii. Create and Design a Business Card
viii. Create Airtel Logo
EVALUATION
I. Outline 5 examples of graphic packages
II. State 5 specialized graphic applications and their uses.
WEEKEND ASSIGNMENT
i. Use CorelDraw to design any of the following
Business Card
Invitation Card
Letter headed paper of a school or company
WEEK 5:
TOPIC: Maintenance of computer I
CONTENT:
1. Meaning of Maintenance
2. Understanding Concept of General Cleaning
3. General Cleaning Tips
4. Battery Charging and Replacement
TYPES OF MAINTENANCE
There are 2 types of maintenance, namely;
i. Preventive Maintenance
ii. Corrective Maintenance (This is a step taken or performed to correct an already
existing problems.)
Sub Topic 2: GENERAL CLEANING
Cleaning generally is the process and act of keeping ones computer, its components and
other related peripheral devices in good condition free from dust and debris for proper
functioning to avoid mal-function and sudden breakdown.
SUB-TOPIC 3
Tools for cleaning Computer Hardware
i. A clean non-abrasive cloth as microfiber, cotton T-shirt, Cotton handkerchief.
ii. Portable vacuum
iii. Cleaning solution, in case of moistening a cloth, water should be used while other
solvents can be used for different purposes
iv. Cotton swabs
v. Foam swabs
vi. DVD or CD-ROM cleaner
PROCEDURES
Get a cleaning kit for effective cleaning of disc
A piece of normal clean cotton cloth could be used to wipe against the track starting
from the middle of the CD or DVD.
For tough dirt, light use of water or pure spirit could be used
Also, when a battery displays epileptic and flashing panel light alarm repeatedly, it shows a
bad battery and calls for replacement.
Note: It is better to wait for battery alarm to trigger before ordering a replacement
because keeping batteries on shelves reduces its life span or cycle except fully charged.
EVALUATION
I. Define the term “Maintenance”
II. Explain the types of Maintenance
III. State 4 General Cleaning tips
IV. What is cleaning?
V. Itemize 2 procedures involved in cleaning DVD or CD drives
VI. Itemize 2 procedures involved in cleaning DVD or CD disc
ASSIGNMENT
Itemize steps involved in cleaning a keyboard, Mouse and System Unit casing.
WEEK SIX
TOPIC: Database Security
CONTENT:
1. Introduction to database security
2. Types of Database security
3. Roles of the database administrator in security
SUBTOPIC 1: Introduction to database Security
Database management systems are increasingly being used to store information about all aspects
of an enterprise. The data stored in a DBMS is often vital to the business interests of the
organization and is regarded as a corporate asset.
Database Security
Database security refers to the collective measures used to protect
and secure a database or database management software from illegitimate use and
malicious threats and attacks.
OR
Is the means of ensuring that data is kept from corruption and that access to it is suitable
controlled. Thus, data security helps to ensure privacy. It also helps in protecting personal
data. Data security is part of the larger practice of Information security.
Data is the raw form of information stored as columns and rows in our databases, network
servers and personal computers.
Objectives to be considered
There are three main objectives to consider while designing a secure database application.
1. Secrecy: Information should not be disclosed to unauthorized users. E.g. a student should
not be allowed to examine other students’ grades.
2. Integrity: Only authorized users should be allowed to modify data. E.g. students may be
allowed to see their grades, yet not allowed (obviously!) to modify them.
3. Availability: Authorized users should not be denied access. E.g. an instructor who wishes to
change a grade should be allowed to do so.
To achieve these objectives, a clear and consistent security policy should be developed to
described what security measures must be enforced. In particular, we must determine what part of
the data is to be protected and which users get access to which portions of the data.
Next, the security mechanisms of the underlying DBMS (and OS, as well as external mechanisms
such as securing access to buildings and so on) must be utilized to enforce the policy. We
emphasize that security measures must be taken at several levels. Security leaks in the operating
system or network connections can circumvent database security mechanisms.
Access Control
An Access Control mechanism is a system of controlling data that is accessible to a given giver. This
implies the use of authentication and authorization. A computer system that is meant to be used by
those authorized to do so must attempt to detect and exclude the unauthorized users.
Database Audit
It involves observing a database so as to be aware of the actions of
database users. Database administrators and consultants often set up auditing for security
purposes, for example, to ensure that those without the permission to access information
do not access it
Authentication
Is the act of confirming the truth of an attribute of a single piece of data claimed true by an
entity. In contrast with identification, which refers to the act of stating or otherwise
indicating a claim purportedly attesting to a person or thing's identity, authentication is the
process of actually confirming that identity. It might involve confirming the identity of a
person by validating their identity documents, verifying the authenticity of a website with
a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a
product is what its packaging and labeling claim to be. In other words, authentication often
involves verifying the validity of at least one form of identification.
Backup
Is the process of backing up, refers to the copying and archiving of computer data so it may
be used to restore the original after a data loss event. The verb form is to back up in two
words, whereas the noun is backup.
Password
This is an un-spaced sequence of secret characters used to enable access to a file, program,
computer system and other resources.
Encryption
Encryption is the most effective way to achieve data security. To read an encrypted file, you
must have access to a secret key or password that enables you to decrypt it. Unencrypted
data is called plain text; encrypted data is referred to as cipher text.
EVALUATION:
(i) What do you mean by data security?
(ii) How is data secured?
(iii) Why is mandatory access control better than discretionary access control?
(iv) What is the role of a database administrator?
READING ASSIGNMENT:
Study the topic ‘Database Security’ using students’ textbook
WEEKEND ASSIGNMENT:
OBJECTIVE TEST:
1. DBMS can use ___ to protect information in certain situations where the normal security
mechanisms of the DBMS are not adequate. (a) access control (b) encryption (c) data
mining (d) security guard
2. ____access control is based on system wide policies that cannot be changed by individual
users. (a) discretionary (b) secure (c) mandatory (d) insecure
WEEK SEVEN: MID TERM BREAK
WEEK EIGHT:
TOPIC: INDEXES
CONTENT:
1. What is an Index?
2. Types of Index
i. Clustered vs Non-clustered Indexes
ii. Dense vs Sparse
iii. Primary and Secondary Indexes
iv. Indexes using composite search keys
A database index is a data structure that speeds up certain operation on a file. The operation
involves a search key which is the set of record files (in most cases a single field). The elements of
an index are called data entries. Data entries can be actual data records. A given file of a data
records can have several indexes, each with different search keys as showed in the table below:
The search engine searches for a value in table or file in two ways. The table scan which is
sequential and index which is random.
Indexes are special lookup tables that the database engine uses to speed up data retrieval. An
index in a database is similar to an index in the back of a book.
An index table or file consists of records called index entries. It is of the form
The search key field is used to sort the rows (in the index column) and the pointer field (in index
column) indicates where the actual data in the table will be retrieved. When a table has an index it
simply means the records in that table has been sorted in one way or the other.
EVALUATION
1. What is an index?
2. What are data entries?
A clustered index is when a file is organized so that the ordering of data records is the same as
or closes to the ordering of data entries. A clustered index can take place only if the data
records are sorted on the search key field. For example, suppose that students records are
sorted by age; an index on age that stores data entries in sorted order by age is a clustered
index.
Indexes that maintain data entries in sorted order by search key use a collection of index
entries, organized into a tree structure to guide searches for data entries. Thus, clustered
indexes are relatively expensive to maintain when the file is updated, when data entries are to
be moved across pages, and if records are identified by a combination of page id and slot as is
often the case, all places in the database that point to a moved record must also be updated to
point to the new location. These additional updates can be time consuming.
This is an index that is not clustered. A data file can contain several unclustered index. For
example supposing that students records are sorted by age; and if additional index on GPA field
is included, it is called unclustered index.
Also for example, a book can have more than one index, one at the beginning which displays
the contents of a book unit wise while the second index shows the index of terms in
alphabetical order.
You can create only one clustered index on a table because there is only one possible physical
ordering of the data rows. You can create up to 249 non-clustered indexes per table.
Thus, clustered indexes are relatively expensive to maintain when the file is updated. Another
reason clustered indexes are expensive to maintain is that data entries may have to be moved
across pages, and if records are identified by a combination of page id and slot, as is often the case,
all places in the database that point to a moved record (typically, entries in other indexes for the
same collection of records) must also be updated to point to the new location; these additional
updates can be very time consuming.
For example;
From the figure above, we can see that each search key in the index has a particular record that
it point to in a base table.
Sparse Index: In a sparse index, each search key does not have a corresponding record it point
to but may point to a group of records in the base table. This contains index records for only
some search key values. Applicable when records are sequentially ordered on search key. For
example:
From the figure above, search keys such as 12121, 15151 do not have corresponding records in the
index but you can search for them through 10101 key to retrieve their records in the base table.
A sparse index contains one entry for each page or records in the data file. The index record
contains the search key and a pointer to the first data record with that search key value. A sparse
index must be clustered and it is smaller than a dense index.
Secondary Index
Is an index that is not a primary index and may have duplicates. E.g Student name.
Two data entries are said to be duplicates if they have the same value for the search key field
associated with the index. A primary index is guaranteed not to contain duplicates, but an index on
other (collections of) field can contain duplicates. Thus, in general, a secondary index contains
duplicates.
If we know that no duplicates exist, that is, we know that the search key contains some candidate
key, we call the index a unique index.
If the search key is composite, an equality query is one in which each field in the search key is
bound to a constant. E.g. we can ask to retrieve all data entries with age =20 and sal=10. The
hashed file organization supports only equality queries, since a hash function identifies the bucket
containing desired records only if a value is specified for each field in the search key.
A range query is one in which not all fields in the search key are bound to constants. E.g. we can ask
to retrieve all data entries with age=20; thus query implies that any value is acceptable for the sal
field. As another example of a range query, we can ask to retrieve all data entries with age < 30 and
sal > 40.
READING ASSIGNMENT:
Study the topic ‘the primary and secondary index
WEEKEND ASSIGNMENT
OBJECTIVE TEST
1. ____________ is a database table that has been reduced to certain fields. (a) Table (b) An index
(c) Table Model (d) Network Model
2. We can have at most _____ clustered index on a data file. (a) one (b) two (c) three (d) four
3. The copy of an index is always in ______ form. (a) duplicate (b) field (c) sorted (d) domain
4. The _________ index can take place only if the data records are sorted on the search key field.
(a) unclustered (b) insert (c) update (d) clustered
5. A ___________ can contain several unclustered indexes. (a) data file primary (c) check (d) index
6. Index contain a value and ___________ (a) pointer (b) sign (c) update (d) model
7. ____________ is an index in which the search key contains some candidate key. (a) Unique
index (b) An index (c) Composite (d) Sparse index
8. _______ can be created on a non-key attribute. (a) Primary index (b) Dense index (c) Secondary
index (d) Sparse index
9. A sparse index contains one entry for each …………… of records in the data file. (a) page (b) table
(c) row (d) column
10. _________ is the one in which not all fields in the search key are bound to constant. (a) Dense
index (b) composite search key (c) Secondary index (d) range query
11. ______________ is when the search key for an index contain several fields. (a) Primary index
(b) Composite search key (c) Secondary index (d) Unique index
THEORY
1. Differentiate between clustered index and unclustered index.
2. State two reasons why clustered index is expensive to maintain.
3. Differentiate between dense and sparse index
4. What do you mean by sparse index?
5. Differentiate between a unique index and a range query.
6. What is composite search key
7. What is the difference between primary and secondary indexes?
8. Create a student table with the following fields: name, age, and scores of 5 records. Create an
index using a composite keys name and age. (show the table and SQL statements).