Category: Notes

  • The biggested misconception? Dr. Stilianos Vidalis Disclaimer: I have committed plagiarism to my heart’s content! “When the power of love overcomes the love for power, the world will know peace.” The Beginning… The evolution of computing Computer-centric era Computers have come a long way since the days they were invented.…

    +
  • 1. Which comparison operator is used to check for one value being greater than the other value? ✔ > <> == 2. What does the following SQL query do? SELECT * FROM employees WHERE age > 30; Selects all rows from the “employees” table Selects all rows where the “age”…

    +
  • Session 4: Working with Data  Main Topics Covered: SQL Examples from the Session 1. Using Logical Operators SELECT * FROM students  WHERE age >= 18 AND name LIKE ‘J%’; SELECT * FROM training_exercises  WHERE difficulty_level = ‘hard’ AND is_completed = false; 2. Sorting Data SELECT * FROM students  ORDER BY…

    +
  • 1. Which of the following is a correct SQL statement to select all records from a table named ‘Customers’? EXTRACT * FROM Customers; SELECT ALL RECORDS Customers; ✔ SELECT * FROM Customers; 2. Which comparison operator checks if text matches a pattern? IN ✔ LIKE BETWEEN 3. Which comparison operator…

    +
  • Session 3: Working with Data – Part 1  Selecting & Retrieving Data  SELECT Statements Basic Syntax: SELECT column_name FROM table_name; Example: Selecting student names and IDs from a students table: SELECT student_id, name FROM students; To select all columns, use *: SELECT * FROM students; Using Aliases (AS) Syntax:SELECT column_name…

    +
  • 1. What is a database schema? Defines a type of software used for database management. Data is structured and stored by relationships, through tables. ✔ Defines how data is structured, stored and related. It describes the tables, fields, data types and relationships in the database. Defines how  unstructured data is…

    +
  • Key Concepts and Demos 1. Introduction to Databases 2. Creating a Database Example: CREATE DATABASE intro_to_data; USE intro_to_data; 3. Creating Tables Example: CREATE TABLE equipment_maintenance (     equipment_id INT,     maintenance_cost DECIMAL(10,2),     description VARCHAR(255),     is_operational BOOLEAN,     last_maintenance_date DATE ); 4. Inserting Data Example: INSERT INTO equipment_maintenance VALUES  (101, 2500.75, ‘Engine maintenance’, TRUE,…

    +
  • 1.5 Cyber Warfare 1.5.1 Sign of the Times (Stuxnet) Cyberwarfare involves using technology to attack a nation’s computer systems, causing disruption or physical damage. One major example is the Stuxnet malware, a sophisticated cyberweapon used to target Iran’s nuclear enrichment program. Key Features of Stuxnet: 1.5.2 The Purpose of Cyberwarfare…

    +
  • 1.4 Cyber Attackers 1.4.1 Types of Attackers Attackers exploit vulnerabilities for personal or financial gain. They are categorized into white hat, gray hat, and black hat attackers. 1.4.2 What Color Is My Hat? 1.4.3 Internal and External Threats Cyber attacks originate from both inside and outside an organization.

    +
  • 1.2 Organisational Data 1.2.1 Types of Organisational Data 1.2.1.1 Traditional Data Traditional data is generated and maintained by organizations and includes: 1.2.1.2 Internet of Things (IoT) and Big Data IoT refers to a network of connected devices that collect and share data. With the growth of IoT, Big Data has…

    +