Professional Documents
Culture Documents
Introduction - 2019 (Compatibility Mode)
Introduction - 2019 (Compatibility Mode)
1
DATA
Data represents unorganized and
unprocessed facts.
Operational Data
2
Operational Data
Data on Internet
TEXT
IMAGE
VIDEO
Operational
SOUND
LOCATION Data
3
Web Server Log data
date(2006-10-04) time(04:24:39)
Client side IP (203.200.95.194) Server site name(W3SVC195)
Server Computer Name (NS), Server ip(69.41.233.13)
Server port(80) method (GET)
Client url(/STUDYCENTRE/StudyCentreSearchPage.asp)
Server status code(200 ) Client side byte received (568)
Time taken(210),
User agent Mozilla/4.0+(compatible;+MSIE+5.0;+Windows+98;)
CS_referer (http://www.mcu.ac.in/search_a_study_institute.htm)
7
4
DATA CUBE OF WEB LOG
Pages
Result
Total Visit
TID Items
100 134
TRANSACTION DATABASES 200 235
300 1235
400 25
5
Temporal Database & Time series
database
Example
Given two temporal relations:
S# During S2 P1 [d02,d04]
S S1 [d04,d10]
S2 P9 [d03,d03]
S2 P1 [d08,d10]
S2 [d02,d04]
S2 P5 [d09,d10]
S2 [d07,d10]
S3 P1 [d08,d10]
S3 [d03,d10] S4 P2 [d06,d09]
S4 [d04,d10] S4 P5 [d04,d08]
S5 [d02,d10] S4 P7 [d05,d10]
12
6
Text databases
7
Text databases
Object-Oriented Database
A set of message
A set of method
8
Object-Relational Database
SPATIAL DATA
Spatial data is about instances located in a
physical space.
Spatial data has location features.
A spatial database stores a large amount of
space-related data.
Such as maps data, preprocessed remote
sensing or medical imaging data, VLSI chip
layout data.
Example of Spatial database:
Cartographic databases (that store maps)
information)
9
10
Heterogeneous database & legacy
database
Objects in one component database may differ
greatly from object in other component
databases making it difficult to assimilate their
semantics into over all heterogeneous
database.
A legacy database is a group of heterogeneous
databases that combine different kind of data
system such as relational or object oriented
databases, hierarchical databases, network
databases, spreadsheets,multimedia databases
or file system.
11
12
EMAIL HEADER
Delivered-To: ranjansingh06@gmail.com Received: by 10.115.55.2 with SMTP id h2cs59002wak; Wed, 8 Apr
2009 10:38:05 -0700 (PDT) Received: by 10.210.53.5 with SMTP id b5mr3667848eba.12.1239212284303; Wed,
08 Apr 2009 10:38:04 -0700 (PDT) Return-Path: <manmohansingh@gmail.com> Received: from
Bumba.profithost.net ([89.248.172.66]) by mx.google.com with ESMTP id
8si8244998ewy.109.2009.04.08.10.38.03; Wed, 08 Apr 2009 10:38:04 -0700 (PDT) Received-SPF: neutral
(google.com: 89.248.172.66 is neither permitted nor denied by domain of manmohansingh@gmail.com) client-
ip=89.248.172.66; Authentication-Results: mx.google.com; spf=neutral (google.com: 89.248.172.66 is neither
permitted nor denied by domain of manmohansingh@gmail.com) smtp.mail=manmohansingh@gmail.com
Received: from localhost ([127.0.0.1] helo=fakesend.com) by Bumba.profithost.net with esmtp (Exim 4.67)
(envelope-from <manmohansingh@gmail.com>) id 1Lrcf9-0007hi-8i for ranjansingh06@gmail.com; Wed, 08
Apr 2009 13:38:15 -0500 Date: Wed, 8 Apr 2009 13:38:15 -0500 To: ranjansingh06@gmail.com From: dr
manmohan singh <manmohansingh@gmail.com> Subject: appointment Message-ID:
<ddbe7ca7a7f3766f4b133647a88e0d4b@fakesend.com> X-Priority: 3 X-Mailer: PHPMailer [version 1.73] MIME-
Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="iso-8859-1"
congaratulation.............
13
14
15
Make the appropriate changes in the
C:\WINDOWS\system32\drivers\etc\Hosts
16
Multimedia databases
17
35
36
18
CDR
19
Sample CDR
20
Fusion Table in Google
A similar map
(again using
Google Fusion
Tables) will
allow users to
visually see the
route.
21
43
44
22
45
https://support.google.com
/fusiontables/answer/25271
32?hl=en&topic=2573107&
ctx=topic
46
23
47
Firewall logs
Firewall logs can provide valuable
information like source and destination
IP addresses, port numbers, and
protocols. You can also use the Windows
Firewall log file to monitor TCP and UDP
connections and packets that are
blocked by the firewall.
Firewall logs reveal a lot of information
about the security threat attempts at the
periphery of the network and on the
nature of traffic coming in and going out
of the firewall.
24
Firewall log
25