- •Royal International Language School
- •Chapter six queries
- •Create a new query without a wizard
- •Total Queries:
- •Questions
- •Explain briefly the following queries?
- •What is the difference between the select Query and the action Query?
- •Chapter Seven Forms
- •Questions
- •Exercises
- •Chapter Eight Reports
- •In the previous figure, we noticed the following:
- •Exercises:
- •Part Two Data and Information security
- •Intended Hacking :
- •Information Ethics
- •International agreements
- •Information negative sides:
- •Examples to show the negative sides of information The World Wide Web:
- •Viruses
- •Information filter
- •Filters:
- •Remember
- •Information:
- •Information properties:
- •Information filter:
- •Questions
- •Data and information Security
- •Keeping Data and Information
- •Implmenting the penalty:
- •Remember
- •Questions
- •Viruses
- •Viruses
- •Virus concept
- •Viruses Properties:
- •Virus Symptoms:
- •Virus and ways of protection:
- •Virus protection:
- •Remember
- •Virus properties:
- •Virus Symptoms:
- •Viruses and ways of protection:
- •Virus detecting programmes:
- •Question
- •84Mr.Khaled Anwar 01003340348
Exercises:
1. Create a report whose record source are the table of (Employee- Projects)
using (Design View) and display this report in (print Preview).
2. Insert a mathematical expression, to find the employee salary in every project
he works in and modify in the table if there is a need for modification, to find
the total cost for the projects in terms of the employee salary.
3. Insert common expressions in the previous report using the [Unbound]
elements style.
Part Two Data and Information security
Hacking of information and Data
As a start , What is Hacking ? How it happened ? Who are Hackers?
Hacking :
It is an attempt to hack into a computer from an unauthorized person with
the purpose of …….
1- Going through data
2- Robbing data
3- Corrupting information
4- Causing disorder in processing Procedures
Hacking Types:
Intended Hacking :
Some people from external sides try to hack into the computer in an
unauthorized way for different reasons that may differ according to the
nature of the hackers. Hackers are classified as follows:
1- Hackers. 2-Competing sides.
3- Foreign enemies 4- Inner enemies.
Unintended Hacking:
Hacking occurs because there are errors in the computer software that may
expose the computer to the same problems that result from the intended
dangers .
Who perform hackings:
Professionals:
They are distinguished people with an accurate knowledge of computer
software and a high ability in programming
Amateurs :
They are people with relatively limited experience in programming and they
search for ready made programmes to use in hacking .
Security Concept
Security means also managing and organizing relationships and
communications inside the system without an effect on computer users.
- Security does not prevent crime or hacking but when the security
system is strong, hacking Data will be …
1- Expensive |
2- needs a long time |
3- Easy to discover |
Information Ethics
What is mental property and how to protect it?
When you deal with data, you need software that can help you organize
and analyze Data and you need to make the necessary processing to get to
the correct information. The owners of these programmes must protect their
mental property. This is what we call mental property and how to protect it.
We find that computer programmes are protected by laws such as…
Publishing and Copyrights.
Copyrights --
Copyrights are given to any person who had mental production and has not
published it. Copyrights mean that no one is allowed to copy or publish any
part of it. This is considered breaking the laws of Copyrights.
International agreements
These agreements are considered licenses to deal with the programmes.
The license is an important part that should be enclosed with the programme. It
starts with a title of "Giving Liceses " that explains how to use the programme
and the restrictions imposed on borrowing or hiring programmes and also the
gurantees defining the programme.
Where can we find programme licenses?
- When you buy any programme, you will find the license agreement in one
of the following forms:
- Handouts attached to the product.
-A print out in the user's guide inside the cover.
- A web page from the programme
