Chapter 11 Database Management Key points: useful terms and definitions of Database Management Difficult points: Classification of the logical structuring techniques of DBMS
Chapter 10 Computer and Network Security Key points: useful terms and definitions of computer security Difficult points: distinguish between four kinds of computer security breaches
Chapter Operating System Key points: Function and structure of Operating System Difficult points: Resource allocation and related functions User interface functions