Computer Application Unit-3
Computer Application Unit-3
UNIT-3
Database Management Systems, Relational Data Model, Introduction to e-learning platforms such
as Swayam, and MOOC. Virtual Meet: Technical Requirements, Scheduling a meeting, joining
virtual meet, recording the meeting. Online Forms: Creating questionnaire, Publishing
Questionnaire, conducting online responses, Analysing the responses, copying graphics into
powerpoint, Downloading the response to spreadsheet. Introduction to societal impacts, Digital
Foot prints, Digital Society and Netizen, Data Protection, E-waste, Impact on Health.
1
2. Data Storage and Retrieval: Efficient mechanisms for storing data and executing queries
to retrieve it quickly.
3. Concurrency Control: Ensures multiple users can access the database simultaneously
without conflicts.
4. Data Integrity and Security: Enforces rules to maintain accurate and secure data,
including access controls and encryption.
5. Backup and Recovery: Protects data with regular backups and enables recovery in case
of system failures.
Types of DBMS
There are several types of Database Management Systems (DBMS), each
tailored to different data structures, scalability requirements, and
application needs. The most common types are as follows:
Database Languages
Database languages are specialized sets of commands and instructions used to define,
manipulate, and control data within a database. Each language type plays a distinct role in
database management, ensuring efficient storage, retrieval, and security of data. The primary
database languages include:
1. Data Definition Language (DDL)
DDL is the short name for Data Definition Language, which deals with database schemas and
descriptions, of how the data should reside in the database.
2
• CREATE: to create a database and its objects like (table, index, views, store
procedure, function, and triggers)
• ALTER: alters the structure of the existing database
• DROP: delete objects from the database
• TRUNCATE: remove all records from a table, including all spaces allocated for the
records are removed
• COMMENT: add comments to the data dictionary
• RENAME: rename an object
2. Data Manipulation Language (DML)
DML focuses on manipulating the data stored in the database, enabling users to retrieve, add,
update, and delete data.
• SELECT: retrieve data from a database
• INSERT: insert data into a table
• UPDATE: updates existing data within a table
• DELETE: Delete all records from a database table
• MERGE: UPSERT operation (insert or update)
• CALL: call a PL/SQL or Java subprogram
• EXPLAIN PLAN: interpretation of the data access path
• LOCK TABLE: concurrency Control
3. Data Control Language (DCL)
DCL commands manage access permissions, ensuring data security by controlling who can
perform certain actions on the database.
• GRANT: Provides specific privileges to a user (e.g., SELECT, INSERT).
• REVOKE: Removes previously granted permissions from a user.
4. Transaction Control Language (TCL)
TCL commands oversee transactional data to maintain consistency, reliability, and atomicity.
• ROLLBACK: Undoes changes made during a transaction.
• COMMIT: Saves all changes made during a transaction.
• SAVEPOINT: Sets a point within a transaction to which one can later roll back.
5. Data Query Language (DQL)
DQL is a subset of DML, specifically focused on data retrieval.
• SELECT: The primary DQL command, used to query data from the database without
altering its structure or contents.
Relational Model
The Relational Model represents data and their relationships through a collection of tables.
Each table also known as a relation consists of rows and columns. Every column has a unique
name and corresponds to a specific attribute, while each row contains a set of related data
values representing a real-world entity or relationship. This model is part of the record-
based models which structure data in fixed-format records each belonging to a particular
type with a defined set of attributes.
3
What is the Relational Model?
The relational model represents how data is stored in Relational Databases. A relational database
consists of a collection of tables each of which is assigned a unique name. Consider a relation
STUDENT with attributes ROLL_NO, NAME, ADDRESS, PHONE, and AGE shown in the table
Key Terms
• Attribute: Attributes are the properties that define an entity. e.g. ROLL_NO, NAME,
ADDRESS.
• Relation Schema: A relation schema defines the structure of the relation and represents the
name of the relation with its attributes. e.g. STUDENT (ROLL_NO, NAME, ADDRESS, PHONE,
and AGE) is the relation schema for STUDENT. If a schema has more than 1 relation it is
called Relational Schema.
• Tuple: Each row in the relation is known as a tuple. The above relation contains 4 tuples one
of which is shown as:
• Relation Instance: The set of tuples of a relation at a particular instance of time is called
a relation instance. It can change whenever there is an insertion, deletion or update in the
database.
• Degree: The number of attributes in the relation is known as the degree of the relation. The
STUDENT relation defined above has degree 5.
• Cardinality: The number of tuples in a relation is known as cardinality. The STUDENT
relation defined above has cardinality 4.
• Column: The column represents the set of values for a particular attribute. The column
ROLL_NO is extracted from the relation STUDENT.
4
characteristics of the Relational Model
• Data Representation: Data is organized in tables (relations), with rows (tuples)
representing records and columns (attributes) representing data fields.
• Atomic Values: Each attribute in a table contains atomic values, meaning no multi-
valued or nested data is allowed in a single cell.
• Unique Keys: Every table has a primary key to uniquely identify each record, ensuring
no duplicate rows.
• Attribute Domain: Each attribute has a defined domain, specifying the valid data
types and constraints for the values it can hold.
• Tuples as Rows: Rows in a table, called tuples, represent individual records or
instances of real-world entities or relationships.
• Relation Schema: A table’s structure is defined by its schema, which specifies the
table name, attributes, and their domains.
• Data Independence: The model ensures logical and physical data independence,
allowing changes in the database schema without affecting the application layer.
Introduction to e-learning
E-learning, or electronic learning, is a method of education that utilizes digital technology to
deliver instructional content outside of traditional classrooms. It enables students to learn
anytime and anywhere through various electronic devices, such as computers, tablets, and
smartphones.
Key Features of E-Learning
• Accessibility: Learners can access materials from anywhere, reducing the need for
physical presence in a classroom.
• Flexibility: E-learning allows students to learn at their own pace, making education
more adaptable to different schedules.
• Interactivity: Digital tools like quizzes, simulations, and discussion forums enhance
engagement and participation.
• Cost-Effective: Online education reduces expenses related to travel, accommodation,
and printed materials.
• Personalization: Courses can be tailored to suit individual learning styles and needs.
Types of E-Learning
1. Synchronous E-Learning: Real-time learning where students and instructors interact
through live video conferencing, webinars, or virtual classrooms.
2. Asynchronous E-Learning: Learning that occurs at the learner’s own pace, with pre-
recorded videos, online modules, and discussion boards.
3. Blended Learning: A mix of online and traditional face-to-face learning, offering the
best of both methods.
4. Mobile Learning (M-Learning): Education delivered through mobile devices, allowing
greater accessibility on the go.
5
Advantages of E-Learning
• Enhances digital literacy and technical skills.
• Encourages self-paced and independent learning.
• Offers a vast range of courses and subjects.
• Supports multimedia content, improving engagement and understanding.
Challenges of E-Learning
• Requires reliable internet access and digital devices.
• May lack the social interaction of traditional classrooms.
• Self-discipline and motivation are crucial for success.
• Not all courses or subjects can be effectively taught online.
E-learning is transforming the education landscape, making knowledge more accessible and
customizable. With technological advancements, it continues to evolve, offering innovative
solutions to learners worldwide.
e-learning platforms
SWAYAM: Study Webs of Active Learning for Young Aspiring Minds
Introduction to SWAYAM
SWAYAM (Study Webs of Active Learning for Young Aspiring Minds) is an Indian government
initiative designed to provide free online education to students across the country. Launched
by the Ministry of Education, Government of India, it aims to bridge the digital divide and
ensure quality education for all, irrespective of their location or financial background.
Objectives of SWAYAM
1. Provide Free Learning Resources – High-quality courses from top Indian institutions.
2. Enhance Digital Learning – Promote e-learning as an alternative to traditional
classroom education.
3. Improve Accessibility – Make higher education accessible to students in remote and
rural areas.
4. Offer Certification – Learners can earn certificates by completing courses and taking
exams.
Structure of SWAYAM
SWAYAM offers Massive Open Online Courses (MOOCs) developed by leading educational
institutions in India, such as IITs, IIMs, NPTEL, IGNOU, and central universities. The platform
is designed to cover school, undergraduate, postgraduate, and vocational courses.
Four Quadrant Approach
SWAYAM follows a four-quadrant learning model, ensuring a holistic and interactive learning
experience:
1. Video Lectures – Pre-recorded lectures from expert instructors.
2. Reading Material – Downloadable PDFs, books, and notes.
3. Assignments and Quizzes – Self-assessment tools to track progress.
4. Discussion Forums – Peer interaction and doubt clarification.
Course Categories
6
• Engineering & Technology (NPTEL)
• Management (IIMs)
• Humanities & Social Sciences
• Law & Governance (NALSAR)
• Health & Medical Science
• School Education (NCERT, NIOS)
Certification and Credit Transfer
• SWAYAM courses are recognized by the University Grants Commission (UGC) and
other academic bodies.
• Students enrolled in regular degree programs can transfer SWAYAM course credits to
their university.
• Final certification may require a proctored exam with a nominal fee.
Benefits of SWAYAM
✔ Free Learning – Most courses are available at no cost.
✔ Learn at Your Own Pace – Flexible schedules for self-paced learning.
✔ Expert Faculty – Courses designed by top educators in India.
✔ Skill Development – Helps students and professionals enhance their knowledge.
Conclusion
SWAYAM is a revolutionary step towards digital education in India, ensuring that every
learner has access to quality educational resources. It plays a crucial role in expanding e-
learning opportunities and making education more inclusive.
7
✔ Accessible to learners worldwide.
✔ Affordable or free courses available.
✔ Self-paced learning for flexibility.
✔ Industry-recognized certifications enhance career opportunities.
9
Step 2: Define the Purpose
• Identify the goal of the questionnaire (e.g., feedback, research, assessment).
• Determine the target audience.
Step 3: Add Questions
• Use a mix of question types:
o Multiple Choice – Users select one or more answers.
o Short Answer – Collect brief text responses.
o Paragraph – For detailed feedback.
o Dropdown – Users pick one option from a list.
o Rating Scale – Measure opinions or satisfaction (e.g., 1-5 stars).
o Checkboxes – Allow multiple selections.
• Keep questions clear, concise, and relevant.
Step 4: Customize the Form
• Add a title and description.
• Use sections for better organization.
• Apply themes, colors, or images to make it visually appealing.
Conclusion
Creating and publishing an online questionnaire is an efficient way to collect information. With
the right platform and well-structured questions, you can gather valuable insights for
education, research, or business.
10
Conducting Online Responses and Analyzing Data
Online questionnaires help collect responses efficiently. Once responses are received, they can be
analyzed, visualized, and shared through reports and presentations.
11
3. A spreadsheet will open with all responses saved automatically.
4. You can also click "More options (⋮)" → "Download responses (.csv)" for offline
access.
Microsoft Forms
1. Open the form and go to the "Responses" section.
2. Click "Open in Excel" to download responses as a spreadsheet.
3. The file will be saved as an Excel (.xlsx) document.
Conclusion
By following these steps, you can effectively conduct surveys, analyze responses, create visual
reports in PowerPoint, and download data for further processing. This streamlines data collection
and enhances decision-making.
Downloading Responses to a Spreadsheet in Google Forms
Google Forms allows users to collect and download responses in a structured spreadsheet format
for further analysis.
Steps to Download Responses in Google Sheets
Method 1: Link Google Forms to Google Sheets (Auto-Save Responses)
1. Open your Google Form.
2. Click on the "Responses" tab.
3. Click the Google Sheets icon ( Green Spreadsheet icon).
4. A Google Sheet will be created, where all responses will be automatically stored.
5. You can access and edit this sheet anytime in Google Drive.
Method 2: Download Responses as a CSV File
1. Open your Google Form.
2. Go to the "Responses" tab.
3. Click on the three-dot menu (⋮) in the top-right corner.
4. Select "Download responses (.csv)".
5. The CSV file will be saved to your device, which can be opened in Microsoft Excel,
Google Sheets, or any data analysis tool.
Advantages of Downloading Responses
✔ Allows offline analysis.
✔ Easily import data into Excel, Power BI, or other tools.
✔ Helps in sorting and filtering responses efficiently.
Now, you can analyze, visualize, or present your collected data with ease!
12
Introduction to Societal Impacts of Digital Technology
The rapid growth of digital technologies has transformed society, influencing how we
communicate, work, and live. While technology provides numerous benefits, it also brings
challenges, such as privacy concerns, e-waste, and health issues.
1. Digital Footprints
A digital footprint refers to the traces of data we leave online, including:
• Active Digital Footprint – Data we intentionally share (e.g., social media posts, online
purchases).
• Passive Digital Footprint – Data collected without direct user input (e.g., browsing
history, cookies, location tracking).
Impacts of Digital Footprints
✔ Helps personalize user experiences (e.g., recommendations on YouTube, shopping sites).
✔ Employers and universities review digital footprints for background checks.
⚠ Risk of cyber threats, identity theft, and privacy invasion.
3. Data Protection
Data protection refers to safeguarding personal and sensitive information from unauthorized
access.
Key Aspects of Data Protection
• Privacy Laws – Laws like GDPR (Europe) and IT Act (India) regulate data handling.
• Encryption – Protects data from cyberattacks.
• Two-Factor Authentication (2FA) – Enhances security for online accounts.
• Awareness – Users must be careful about sharing personal data online.
⚠ Lack of data protection can lead to identity theft, financial fraud, and cyberbullying.
13
• Short device life cycles.
• Improper disposal of electronics.
Impact of E-Waste
⚠ Toxic chemicals (lead, mercury) pollute the environment.
⚠ Unsafe recycling methods affect workers' health.
Solutions
✔ Recycling and proper disposal of old gadgets.
✔ Encouraging e-waste management policies.
✔ Promoting sustainable technology use.
5. Impact on Health
While digital technology improves convenience, excessive use can negatively affect health.
Physical Health Effects
• Eye Strain – Prolonged screen time leads to digital eye fatigue.
• Obesity & Posture Issues – Lack of physical activity causes health problems.
Mental Health Effects
• Social Media Anxiety – Constant comparisons can affect self-esteem.
• Sleep Disorders – Excessive screen exposure disrupts sleep patterns.
Preventive Measures
✔ Follow the 20-20-20 rule (every 20 minutes, look 20 feet away for 20 seconds).
✔ Limit screen time and take regular breaks.
✔ Engage in outdoor activities and exercise.
Conclusion
Digital technology has transformed society, but responsible use is essential. Awareness about
digital footprints, netizen responsibilities, data protection, e-waste management, and health
impacts helps ensure a balanced and safe digital lifestyle.
14