Wednesday, April 26, 2023

8-NTRCA Written Exam Preparation Lecturer ICT বিষয়- কম্পিউটার বিজ্ঞান (Computer Science- 431) Unit-8

Syllabus
DBMS, E-Commerce and Web Application

Engineering

Database Management System (DBMS): data database, database management, data abstraction, database model, database relation, database security, etc, 

Database Languages data management; types of database, database system structure, relational algebra and SQL Database design, indexing, normalization;

Concept of e-government and its scope, Unicode and ICT in local languages, issues in transliteration and natural language translation, it workforce, concepts in bridging the digital divide, models of public-private partnerships (PPP), application scenarios for G2G, G2B and G2C categories of e-business (B2B, B2C, 82A, etc), electronic markets, Introduction to web and web application:

Web Essential: client, server and protocols, http request and response message, web application, CGI, web server mode, logging, access control, HTML/XHTML, CSS, Javascript, W3C standard, pattern, service locator pattern, data access object pattern, persistent communication, web application security policy, network-level security: SSL, etc


Data abstraction is a process in which complex data is simplified by hiding unnecessary details while highlighting essential features. It is a technique that allows us to focus on the important aspects of a system while ignoring the non-essential details.

Data abstraction is commonly used in computer science and programming to manage large and complex data sets. By abstracting data, programmers can create simplified models of the data that are easier to understand and work with. For example, a programmer might use data abstraction to create a simplified model of a database that only includes the essential information needed for a particular task.

Data abstraction is also used in software engineering to design complex systems. By abstracting the system's components and interactions, designers can create a high-level view of the system that makes it easier to understand and modify.

Overall, data abstraction is a powerful technique that allows us to manage complexity and focus on the most important aspects of a system or data set.


Database security is the protection of digital data stored in a database from unauthorized access, use, or modification. It involves a range of security measures to prevent data breaches and protect sensitive information from theft or corruption. Database security is critical for protecting confidential information such as personal data, financial information, and intellectual property.

Some of the most common database security measures include:

Access controls: Access controls ensure that only authorized users are granted access to the database. This includes implementing strong passwords, two-factor authentication, and limiting access based on user roles and permissions.

Encryption: Encryption is the process of converting data into a code to prevent unauthorized access. This can include encrypting sensitive data at rest and in transit to prevent interception by hackers.

Audit trails: Audit trails record all activities on the database, including logins, queries, and modifications. This can help detect and investigate any suspicious activity.

Regular updates and patches: Regular updates and patches are essential for fixing vulnerabilities and weaknesses in the database system.

Backup and recovery: Regularly backing up data and having a disaster recovery plan in place is important in case of a security breach or other data loss event.

Monitoring and testing: Regularly monitoring the database for suspicious activity and conducting security testing can help identify vulnerabilities and prevent attacks.

Overall, database security is a complex and ongoing process that requires a combination of technical measures, policies, and user education to protect against threats and maintain the confidentiality, integrity, and availability of data.




Types of databases:
There are several types of databases, including:
Relational databases: This is the most common type of database, where data is stored in tables with predefined relationships between them.

NoSQL databases: This type of database does not rely on predefined relationships and can handle unstructured data.

Object-oriented databases: This type of database is designed to work with object-oriented programming languages and stores data as objects.

Graph databases: This type of database is designed to work with graph theory and is ideal for storing data with complex relationships.

Database system structure:
A typical database system consists of several components, including:
Database server: This is the software that manages and controls access to the database.

Database engine: This is the core software that processes database requests and manages data storage.

Data storage: This is where the actual data is stored, typically on a hard drive or solid-state drive.

Application programming interface (API): This is the interface that allows other applications to interact with the database.

User interface: This is the interface that allows users to interact with the database through a graphical user interface or command line.

Relational algebra and SQL:
Relational algebra is a mathematical language used to describe operations on relational databases, including selection, projection, join, and union. SQL (Structured Query Language) is a programming language used to interact with relational databases, including creating, modifying, and querying data.

Database design, indexing, and normalization:
Database design involves designing the structure of a database, including the tables, columns, and relationships between them. Indexing is the process of creating indexes on certain columns to improve query performance. Normalization is the process of organizing data in a database to minimize redundancy and ensure data integrity.

Overall, database languages and data management involve a variety of concepts and techniques, from selecting the appropriate database type to designing and optimizing database structures and queries. It is a complex and ongoing process that requires careful planning and management to ensure data security, integrity, and efficiency.


Unicode and ICT in local languages:
Unicode is a standard encoding system that allows computers to represent and manipulate text in different languages and scripts. The adoption of Unicode has enabled the use of local languages in information and communication technology (ICT) applications. However, there are still challenges in implementing Unicode for some languages, particularly those with complex scripts or for which there is limited support from software developers.

Issues in transliteration and natural language translation:
Transliteration is the process of converting text from one writing system to another. It is often used when there is no direct translation between two languages. However, transliteration can result in ambiguity or loss of meaning, particularly when there are multiple ways to represent a sound or letter in the target script. Natural language translation, on the other hand, involves translating text from one language to another while preserving meaning and context. This is a challenging task, as languages have different grammar rules, idioms, and cultural nuances that can be difficult to capture accurately.

IT workforce:
The IT workforce comprises professionals who design, develop, and maintain ICT systems. There is a growing demand for IT professionals, driven by the increasing adoption of technology in all sectors of the economy. However, there are concerns about the shortage of skilled IT workers, particularly in developing countries, where there is a lack of training and education opportunities.

Concepts in bridging the digital divide:
The digital divide refers to the gap between those who have access to digital technologies and those who do not. Bridging the digital divide involves creating equal opportunities for people to access and use ICT tools and resources. This can be achieved through various initiatives, such as providing affordable and reliable internet connectivity, promoting digital literacy and skills training, and developing localized content and applications that meet the needs of diverse communities.

Models of public-private partnerships (PPP):
Public-private partnerships (PPP) are collaborations between government and private sector entities to achieve shared objectives. In the context of ICT, PPP models can be used to promote the development and adoption of technology, particularly in areas where the private sector may not have sufficient incentive to invest. Examples of PPP models include joint ventures, licensing agreements, and co-investment schemes. Effective PPP models require careful planning, transparent governance structures, and a clear understanding of the roles and responsibilities of each partner.




G2G, G2B, and G2C are categories of e-business that refer to different types of transactions and interactions between various entities. B2B, B2C, and B2G are other commonly used categories in e-business.

G2G refers to transactions between government entities, such as inter-departmental communication or information sharing between different government agencies.

G2B refers to transactions between government agencies and private businesses. This can include procurement, licensing, permitting, and other business-related interactions.

G2C refers to transactions between government agencies and individual citizens. Examples of G2C e-business include online tax filing, online applications for government services such as passports or driver's licenses, and online payment of fines or fees.

Electronic markets are online platforms that enable buyers and sellers to conduct transactions. These markets can be either B2B or B2C, and may operate in a variety of industries, such as retail, manufacturing, or services. Examples of electronic markets include Amazon, Alibaba, and eBay.

The web is a network of interconnected documents and resources, accessible via the internet. Web applications are software programs that run on web servers and are accessed via web browsers. These applications can be either static or dynamic, and can be used for a variety of purposes, such as e-commerce, social networking, or productivity tools. Examples of web applications include Google Docs, Facebook, and Shopify.










Web Essential refers to the fundamental components and concepts necessary for the functioning of the World Wide Web. Some of the key concepts in web essential include:

Client and Server: The client and server model is a common approach to web architecture. Clients are typically web browsers, while servers are the machines that store and serve web pages. Clients request resources from servers, and servers respond by sending the requested content.

Protocols: Protocols are the set of rules that govern communication between clients and servers. The most commonly used protocol for web communication is HTTP (Hypertext Transfer Protocol), which defines how web browsers and servers communicate with each other.

HTTP Request and Response Message: HTTP request and response messages are the format used to send and receive information between clients and servers. The request message contains the type of request, the URL, and additional information such as cookies or authentication data. The response message contains the status code, the requested data, and additional headers.

Web Application: A web application is a software program that runs on a web server and is accessed via a web browser. Web applications can be used for a variety of purposes, such as e-commerce, social networking, or productivity tools.

Common Gateway Interface (CGI): CGI is a standard for interfacing external applications with web servers. It enables web servers to run external programs or scripts, which can perform various functions such as processing form data or generating dynamic content.

Web Server Mode: Web servers can operate in different modes, such as static mode or dynamic mode. In static mode, web servers serve pre-existing files without making any changes. In dynamic mode, web servers generate content on the fly, using scripts or other programming languages to create dynamic web pages.

Logging: Logging is the process of recording events or transactions that occur on a web server. This information can be used for debugging, performance monitoring, or security analysis.

Access Control: Access control is the process of restricting access to web resources based on certain criteria, such as user credentials or IP address. This can help protect sensitive information and prevent unauthorized access.















HTML/XHTML, CSS, and JavaScript are three core technologies used for web development. HTML/XHTML is used to structure and present content on web pages, CSS is used to style the presentation of the content, and JavaScript is used to add interactive elements and behavior to the page.

W3C (World Wide Web Consortium) is a standards organization that develops and promotes web standards. They provide guidelines and specifications for HTML/XHTML, CSS, and other web technologies to ensure consistency and interoperability across different platforms and devices.

Design patterns are reusable solutions to common problems in software design. The Service Locator Pattern is a pattern that allows objects to locate other objects or services by using a centralized registry or locator. The Data Access Object Pattern is a pattern that provides a way to separate data access logic from the rest of the application code.

Persistent communication is a type of communication where data is transmitted and received continuously between a client and server. This can be used in real-time applications such as chat applications, online games, or collaborative editing tools.

Web application security policies are a set of rules and guidelines that help protect web applications from various types of attacks, such as cross-site scripting (XSS), SQL injection, and cross-site request forgery (CSRF). This can include measures such as input validation, secure session management, and secure coding practices.

Network-level security refers to security measures that are implemented at the network layer, such as SSL (Secure Sockets Layer). SSL is a protocol that provides secure communication over the internet by encrypting data sent between a client and server. It is commonly used for secure transactions, such as online shopping or banking.

0 comments:

Post a Comment

Featured Post

২০২৫ ও ২০২৪ সালের এইচএসসি পরীক্ষার সিলেবাস

  ২০২৫ সালের এইচএসসি পরীক্ষার সিলেবাস (২০২৩ সালের সিলেবাসের অনুরূপ) পত্রিকার খবরের লিঙ্ক     ২০২৪ সালের এইচএসসি পরীক্ষার সিলেবাস (২০২৩ সালের...

Blog Archive

Powered by Blogger.