• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Databases Portfolio

Extracts from this document...

Introduction

Portfolio Proposal Candidate Name Ammar Abouelghar Title of Piece DNA database swabs over 100,000 Area of Impact Medicine & Science News Item DNA database swabs over 100,000, BBC, Monday, 11 February 2009 Does the topic relate to ITGS ? ? Yes Is the Area of Impact one that has not been addressed in a ? previous portfolio piece ? Yes Was the news item published no more than six months before ? you started the course ? Yes Date of publication of the article ? Monday, 11 February 2009 Does the article raise one or more social or ethical issues related ? to an IT system ? yes Social issue ? Security, the medical data might be viewed by unautherized individuals Social issue ? Ethical issue ? Privacy is an issue, since it becomes easier to access such important information, anyone that works in the hospital might access that without the permission of the patient which is a violation of privacy Ethical issue ? (Note: You do not need to complete ALL the above) Is the problem clear ? ? Yes The problem is ? ...read more.

Middle

The networking database model is basically a design to correct the flaws in the hierarchical model specially when there is too much data. However, those databases have been replaced by the new database model. The most database model used nowadays is the "relational database"[eHow]. Developed by Dr. E. F. Codd who was a mathematician working in IBM. Due to the fact that he was a mathematician he developed the relational model based on "mathematical concepts"[the UK web design company] and ideas where each table in the database is connected with the rest of the tables by one or more common key. In this case, the first table would have general information for example, one column titled "patient ID", another column titled "Patient Name", a third column titled "Date of Birth". The second table would have information about specific medical information e.g. taking particular vaccinations at specific ages or if the patient has particular disease, however the common column would be "Patient ID". So the Patient ID is the common key that links all the tables together in the DNA database. This new development made it easier for the data to be accessed retrieved, inserted, updated, or deleted and caused more and people to use those databases and store information on them. ...read more.

Conclusion

Usually the database is saved in its own computer that is specialized for only saving information. That computer is stable and protected on its own, unlike a "public-facing server"[TechTarget] such as a "web server" [TechTarget] (internet). All necessary protection softwares and program patches (e.g. Firewall, Anti-Adware, Anti-Virus...etc) should be downloaded, installed and updated and all "unnecessary features" should be deleted. The database should have a hard username and a password that should be changed frequently every 48 days for example. In case the security is violated and the database is hacked, the privacy of the data will be violated thus to solve the privacy issue is to make sure that the individuals or the patients are aware that their information might be viewed by others in case something goes wrong. This can be done by giving patients forms to sign in which they state that they are fully aware that their information might be viewed by others. Thus by overcoming those issues and limitations, the broad DNA database is a good step towards using technology to improve the scientific and medical field. Criterion E (Citation) [1] BBC http://news.bbc.co.uk/2/hi/uk_news/england/kent/7238582.stm [2] about.com: http://databases.about.com/od/specificproducts/a/whatisadatabase.htm [3]eHow http://www.ehow.com/how-does_4914095_databases-work.htmxl [4] the UK web design company http://www.theukwebdesigncompany.com/articles/types-of-databases.php [5] TechTarget http://searchfinancialsecurity.techtarget.com/news/interview/0,289202,sid185_gci1293647,00.html ?? ?? ?? ?? Ammar Abouelghar DataBase Portfolio ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    will be able to use the credit card and personal information to make purchases. Online grocery shopping will definitely affect the business and employment field. If online grocery shopping becomes the ideal choice of buying produces for everyone in the society then the issue of employment will be very severe.

  2. Extended Essay: How do different Flavours, Storage Times affect the Effectiveness of Crisps as ...

    food, thus their nutritional as well as their calorific value is lost. Thus to sum up, over time, antioxidants are lost, resulting in less efficient retardation of fat molecule break down, where nutrients then leak out and are lost. Since many fats, including vegetable oil, contain naturally occurring antioxidants, (Bender p23)

  1. The History & Development of Reflexology

    Sheffield, S6 3NF Northern Ireland BT27 4BP T/F: 01142 812100 T: 02892 671004 E: info@reflexology-uk.net F: 02892 678698 Website: www.reflexology-uk.net E: bodyandsole104@aol.com Professional Association of Clinical Therapists Scottish Institute of Reflexology Federation of Holistic Therapists The Secretary FHT 3rd Floor Eastleigh House The Scottish Institute of Reflexology Upper Market Street

  2. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    This allows the thieves to use your money to pay for medical services. Also, the information available online could be used inappropriately and sent to universities or in any organizations that one would like to enroll in. Even though discrimination against people who have or had an illness is illegal,

  1. The Effect on Music in the Christian Church

    According to Psalms 150, we find the following: "Praise ye the Lord, Praise God in his sanctuary; praise him in his mighty heavens. Praise him for his acts of power; praise him for his surpassing greatness. Praise him with the sounding of the trumpet, praise him with the harp and

  2. Music revision note

    of seven pitch classes commonly found in western music but excluding the major and minor scales. Used in early and world music Raga - A type of scale used in Indian music Introduction - The opening section of a piece Coda - The end section which rounds off a piece

  1. Communicating with children

    Thus they became frustrated and uninterested because they did not understand the book. Sometimes I forgot to explain for example what is "a train", because I took it for granted that a 2 1/2 year old girl knew what it was.

  2. Commentary on February the 17th

    The repetition of pushed and the sounds of both of them create sympathy and disgust in the reader. The line 'I roped that baby head and hauled till she cried out' uses active, violent verbs like 'hauled' to emphasize the pain the mother is experiencing.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work