Database Concepts I (SQL) CSCI 133
This course provides the student with an introduction to the structure and function of database systems, with emphasis on practical applications. Data structures, hierarchical relationships, sequential and indexed searching, updating and deleting records, and data security and recovery will be discussed. The students will use the select statement to query the database and produce the correct outcomes. Students will use functions, join multiple tables and create sub-queries.
Correlated Learning Outcomes
- IT. 4. Identify a variety of assistive or adaptive technologies and universal design considerations.
- IT. 6. Implement a hardware and software configuration responsive to an identified scenario.
- IT. 8. Summarize strategies to support or train users with their IT resources.
- IT. 10. Describe the data management activities associated with the data lifecycle.
- IT. 11. Diagram a database design based on an identified scenario.
- IT. 12. Differentiate between public and private data.
- IT. 13. Discuss applications of data analytics.
- IT. 14. Discuss issues relevant to dealing with very large data sets, both structured and unstructured.
- IT. 15. Identify database administration tasks.
- IT. 16. Produce simple database queries.
- IT. 17. Use data analytics to support decision making for a given scenario.
- IT. 19. Differentiate among data types, data transfer protocols and file characteristics specific to the targeted use.
- IT. 24. Diagram the components of an integrated IT system.
- IT. 28. Demonstrate best practices for designing end-user computing interfaces.
- IT. 29. Demonstrate the techniques of defensive programming and secure coding.
- IT. 33. Use a programming or a scripting language to share data across an integrated IT system.
- IT. 34. Use a programming or a scripting language to solve a problem.
- IT. 39. Modify a system to improve data confidentiality or regulatory compliance.
- IT. 40. Summarize the implications of various cloud computing models.
- IT. 41. Summarize the security implications and risks for distributed IT systems.
- IT. 44. Produce technical documentation responsive to an identified computing scenario
- IT. 47. Demonstrate professional behavior in response to an ethically-challenging scenario in computing.