• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Databases Portfolio

Extracts from this document...

Introduction

Portfolio Proposal Candidate Name Ammar Abouelghar Title of Piece DNA database swabs over 100,000 Area of Impact Medicine & Science News Item DNA database swabs over 100,000, BBC, Monday, 11 February 2009 Does the topic relate to ITGS ? ? Yes Is the Area of Impact one that has not been addressed in a ? previous portfolio piece ? Yes Was the news item published no more than six months before ? you started the course ? Yes Date of publication of the article ? Monday, 11 February 2009 Does the article raise one or more social or ethical issues related ? to an IT system ? yes Social issue ? Security, the medical data might be viewed by unautherized individuals Social issue ? Ethical issue ? Privacy is an issue, since it becomes easier to access such important information, anyone that works in the hospital might access that without the permission of the patient which is a violation of privacy Ethical issue ? (Note: You do not need to complete ALL the above) Is the problem clear ? ? Yes The problem is ? ...read more.

Middle

The networking database model is basically a design to correct the flaws in the hierarchical model specially when there is too much data. However, those databases have been replaced by the new database model. The most database model used nowadays is the "relational database"[eHow]. Developed by Dr. E. F. Codd who was a mathematician working in IBM. Due to the fact that he was a mathematician he developed the relational model based on "mathematical concepts"[the UK web design company] and ideas where each table in the database is connected with the rest of the tables by one or more common key. In this case, the first table would have general information for example, one column titled "patient ID", another column titled "Patient Name", a third column titled "Date of Birth". The second table would have information about specific medical information e.g. taking particular vaccinations at specific ages or if the patient has particular disease, however the common column would be "Patient ID". So the Patient ID is the common key that links all the tables together in the DNA database. This new development made it easier for the data to be accessed retrieved, inserted, updated, or deleted and caused more and people to use those databases and store information on them. ...read more.

Conclusion

Usually the database is saved in its own computer that is specialized for only saving information. That computer is stable and protected on its own, unlike a "public-facing server"[TechTarget] such as a "web server" [TechTarget] (internet). All necessary protection softwares and program patches (e.g. Firewall, Anti-Adware, Anti-Virus...etc) should be downloaded, installed and updated and all "unnecessary features" should be deleted. The database should have a hard username and a password that should be changed frequently every 48 days for example. In case the security is violated and the database is hacked, the privacy of the data will be violated thus to solve the privacy issue is to make sure that the individuals or the patients are aware that their information might be viewed by others in case something goes wrong. This can be done by giving patients forms to sign in which they state that they are fully aware that their information might be viewed by others. Thus by overcoming those issues and limitations, the broad DNA database is a good step towards using technology to improve the scientific and medical field. Criterion E (Citation) [1] BBC http://news.bbc.co.uk/2/hi/uk_news/england/kent/7238582.stm [2] about.com: http://databases.about.com/od/specificproducts/a/whatisadatabase.htm [3]eHow http://www.ehow.com/how-does_4914095_databases-work.htmxl [4] the UK web design company http://www.theukwebdesigncompany.com/articles/types-of-databases.php [5] TechTarget http://searchfinancialsecurity.techtarget.com/news/interview/0,289202,sid185_gci1293647,00.html ?? ?? ?? ?? Ammar Abouelghar DataBase Portfolio ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The Effect on Music in the Christian Church

    sound (meaning each note is a structure of a chord and it flows with dynamics and harmony.) In the piece it is very formal and straight forward. In the written piece of Amazing Grace by Ramon L, Jackson, many will see unbalance in harmony and chord structure.

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    As technology improves, communication between people decreases. For example, business meetings no longer need to be held in a meeting room, because video chat rooms on the computer are available for all members of the company. This also applies to online grocery shopping.

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    This allows the thieves to use your money to pay for medical services. Also, the information available online could be used inappropriately and sent to universities or in any organizations that one would like to enroll in. Even though discrimination against people who have or had an illness is illegal,

  2. ITGS portfolio Playstation news article. Too much playstation can be painful

    The repeated pressing of buttons injures the palms and sweating during playing makes it even worse. Excessive gaming also makes people unfit and people gain weight sitting in one place and playing on the playstation. There are severe consequences due to excessive gaming and in extreme cases children need to be taken to the hospital as well.

  1. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    Most of the large networks, which are often used in offices and hotels, are unsecured so that everyone can make use of it. These networks are hacked and then misused with. Preventive measures should be taken for this security. The password of the networks should be changed from time to time.

  2. ITGS portfolio Education games

    eye problems and might get specs for the same, as the eyesight becomes weaker. Excess to time spent in front of the screen even makes one lazy and causes problems in social life, where the children would not go outside and play, they would be just hooked on to the internet.

  1. GCSE Welsh Baccalaureate Completed Diary Pages

    be a bad thing to teach children about technology to influence them further into this district as a career, if of course they were interested. Element 4: Cultural Issues Describe what you have learnt from the activities you have taken part in for this element.

  2. Can the work of architect Le Corbusier be explored in the context of the ...

    This style of architecture could not motivate him however; it did inspire Le Corbusier to work towards a better, and more efficient design. It also helped him to identify the need within the world for more appropriate architecture.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work