Professional Documents
Culture Documents
Asset-V1 RICE+43 28 3732+2021 Q1+type@asset+block@SSC Computer 7th Class
Asset-V1 RICE+43 28 3732+2021 Q1+type@asset+block@SSC Computer 7th Class
Government Exams
Teacher Name:- Partha Sarathi Chatterjee
Table of Content
Users in DBMS
Primary Key: Primary Key uniquely identify each record in a table. No two
records have same value in the relation. Doesn't accept null value.
Foreign Key: Foreign Key references the primary key of another table. Also
called as referential integrity constraints.
Candidate Key: It can chose as primary key in a table. More than one key
can be candidate in a same table. It is preferred to select a candidate key
which have a minimal number of attributes.
Composite Key: The Primary key compared of more than one field is known
as Composite Key. It is also called concentrated or structured key.
Unique Key: It Acts like a primary key. It can accept null also.
RDBMS
•RDBMS stands for Relational Database Management System.
•RDBMS is the basis for SQL, and for all modern database systems like MS SQL
Server, IBM DB2, Oracle, MySQL, and Microsoft Access.
Query:
•A database query is a piece of code that is sent to a database in
order to get Information back from the database.
•It is used as the way of retrieving the information from the
database.
•A database query is basically a question that you ask the
database.
Different types of Malware:
Spyware: It is a type of malware that function by
spying on user activity without their knowledge.
These spying capabilities can include activity
monitoring, collecting keystroke, data harvesting and
more.
Virus: A virus is a contagious program or code that
attached itself to another piece of software then
reproduces itself when that software is run.
Worm: Programs that replicates itself and destroy
data and files on the computer. Worms work to ‘eat’
the system operating files and data files until the
drive is empty.
Trojan: it is the most dangerous malware. Trojan are written with
the purpose of discovering your financial information, taking over
your computer system resource, and in the large systems creating
“denial- of service attack”.
Ransomware: If you see this screen that warns you that you have
been locked out of your computer until you pay.
Adware: - The least dangerous and most lucrative malware. Adware
displays ads on your computer.
Identity theft:
Cash transaction and Banking Transaction through
Internet face this type of problem. A criminal access
data about persons account such as debit card and
credit card details to siphon money or to buy things
online in the victim’s name.
Cybercrime
Any crime that involves a network and computers
is called cybercrime. When any crime committed
over the Internet is referred to as cybercrime.
There are many types of cyber crime:-
Hacking
This type of crime where in a person’s computer is
broken so that is personal or sensitive information
can be accessed. This is different from ethical
Hacking, which many organization use to check
their Internet security protection.
Phishing
It is an act of acquiring private or
sensitive information or data from
personal computers or individual details
like debit card and credit card details.
login details for using fraudulent
activities. Phishing is usually done by
sending emails that seem to appear to
come from credible sources which
require users to put in personal data
such as debit card, credit card number or
social security number.
Technological solutions for attacks:
Patches: It is also called the service patch, affix to a problem bug. A patch is an
actual piece of object code that is inserted into an executable file.