Professional Documents
Culture Documents
2 . Disadvantages of adopting a database system are , it is costly that is adopting and buying or
developing a new system requires a large sum of money and most companies will have to invest a lot
in it
databases requires skills and expertise to operate therefore this poses a threat to employees who
have no skill and the company will hav to train its workers to adhere with the standards or they will get
poor results from from the implimentation of a database
databases are complicated and hard to maintain that is they reqire special attention and the know
how as they tend to be confusing at times if the skils aquired by the DBA are not sufficient
databases require a lot of space especially for those large companies the databases will consume a
lot of spaces as they have so much records to keep
b) SEQUENTIAL ACCESS is the retrieval of data from a data base in a sequence as it was entered
in the database this method uses hard copies and records are in an orderly manner so that any data
retrieval , addition or updating requres reaarangngment of records it has the advantage of being cheep
and easy to mannage however it is diffiicult to map data DIRECT ACCESS this method is when data
is accessed online and data is not in an orderly sequence and has the advantage of being easy to use
and store a lot of data randomly however it is more costly than sequential ,INDEXED SEQUENTIAL ,
this is a method which comprisese of both direct and sequential methods and uss online services too
and has the advantage of being fast and however it is costly and requires a lot of space
c) a mouse can use the sequential access when accessing to stored records it points at instructions like
search bar to search for desired results
d) sequentaial file can be used in banks when accounting for cheques which are stored acoording to
date and can be retrived by looking for a specific date
3) malware is a maliciouse harmful software designed to spy , control or gain access to someones
computer and includes viruses trojan horses and worms
FIREWALL, this is a security againast unathorised entry on a company network and will prevent
unkown user from gainin access to the use of the network of a company therfore will reduce risks of
viruses and vulnerability
ACCESS CONTROL LIST , is giving a specified list of the only people who are required or who have
the access to the seystem and protected by passswords and pins
POP-UP BLOCKER , is the restricting of unintended pop ups when using the computer system this is
done by blocking unknown pop up masseges and reduces the threat of being vulnerable to viruses
ANTI-VIRUS SOFTWARE , is a software that is installedto remove virus threats that are imposed on a
computer and they run scans to detect threats and then eliminate them and examples includes avast
,norton, E set nod
ANTI-SPYWARE , this is a software that scans and detects an intrusion in the computer systesm and
runs a scan to detect them and examples of of spyware includes rea time protection