BA 370H
RDBMS
Relational DataBase Management System (i.e. Access)
RDBMS
Relational Database Management System
Business Processes (are driven by data- existing data is used, new data stored)
Sales process (grocery/clothes), car rental and return process, insurance (claim handling process)
Which of the following is a technique for intercepting computer communications?
Sniffing
strengthen customer and supplier relationships
use IS to create strong linkages between business and suppliers/customers to increase loyalty and switching costs
product differentiation
use information systems to enable new products and services or change customer experience using existing products and services (ex. Nike ID, iTunes)
attributes
characteristics/properties of entities, vertical columns in tables
Database
collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data
advantages of database systems
controlled redundancy of data, data integrity and consistency, sharing of data, improved security, enforcement of standards
table
each type of entity gets its own table
The persons, places, things or events associated with a business process about which we record data in our systems are referred to as
entities
effectiveness
evaluating a process on how well it produces the expected output measured by consistency and reduction in number of errors
Computer processing
every computer has at least one processing element (CPU), and mainly two types of memory, secondary storage and primary memory (RAM)
IT and IS are synonymous terms
false
each table in a database must have one or more foreign keys
false
Contrasting authentication and authorization, which of the following statements is true?
fingerprint scanners support authentication
efficiency
looks at whether or not a process creates more output with the same/less input, or the same/more output with less input measured by the reduction in the use of resources
How information systems help in executing business strategies and provide competitive advantage
low cost leadership, product differentiation, strengthen customer and supplier relationships, automating business processes by reducing/eliminating manpower
secondary storage device examples
magnetic (hard) disks, solid state drives, optical disks. USB flash/thumb/pen drives
Ability to experiment
make a reasoned analysis of an opportunity, envision potential solutions, evaluate those possibilities, and develop the most promising ones consistent with available resources
Exponential Growth in IS
many scaling trends are strongly linked to exponential trend (moore's law), i.e. processing speed, memory capacity, pixels in digital cameras, hardware miniaturization, overall cost of computing
Cycles
measure of the speed of a CPU is cycles per second, aka Hertz (Hz)
metadata
metadata refers to data about data, it can help in understanding the purpose served by the database elements in the database schema
Systems Thinking
model system components and show how those components relate to each other
query
queries are a way of searching for and compiling data from one or more tables, running a query is like asking a detailed question of your database, the database gets the answer by specifying the criteria on the attributes
Data
raw facts which are collected in many functional areas like accounting, manufacturing, sales, HR, etc
Transaction Data
record events (i.e. Invoices, shipments, payment, receipts)
Which of the following best describes data?
recorded facts or figures
report
reports give us the ability to present our data in the desired format,
Master Data/ Object Data
represent people or things (i.e. customer rewards programs, products, vendors, projects)
In the database context, in a table for customers, all the data about a single customer would reside in a single:
row
referential integrity
rules that enforce defined relationships between tables
Database management system (DBMS)
software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs
Information System
group of components that interact and work together with the purpose to store data and to produce and disseminate information
Attributes
specific characteristics of entities, the smallest unit of data with meaning to a user
Matching: Table- Attribute- Primary Key- Foreign Key- Record-
- a list of all customers and their data - a column labeled customer zip code in a customer table - "customer account # that uniquely identifies a customer - a column labeled "sales rep ID" used as a cross reference - information pertaining to 100th customer/100th row
Computer Hardware
- input/ouput: human interaction devices (mouse, keyboard, printers, etc.) - CPU: central processing unit, the "thinking brain" of the computer, fastest hardware component -RAM/primary storage: random access memory, where the computer holds its current 'thoughts' - secondary storage/hard disk: recall old memories from here, everything is stored here
three ways IS improve business processes
-improve efficiency -improve effectiveness -provide linkages across processes
Informations
-usefully organized facts -data presented in a meaningful context -data processed by summing, ordering, averaging, grouping, comparing or similar operation (accurate, timely, relevant, just barely sufficient, worth its cost)
Bytes
1 byte is 8 bits ie 10100110
An example of raw data from a national chain of automobile stores would be
1 toyota RAv4 sold March 3, 2016 in Louisville, Kentucky
Advantages of Databases
1. they can be shared by thousands of users overs the network (single-version of truth) 2. Databases can find buried information more quickly and elegantly 3. No more "dirty data". rule of databases restrict type of data that can be entered into any given field, resulting in cleaner more reliable outputs
foreign key (FK)
A primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables
Referential Integrity (uses FKs)
A set of rules that Access uses to ensure that the data between related tables is valid.
ANSI
American national standards institute
entities
Anything and everything data is stored about. People, things, transactions, etc.
Which of the following statements is true about the security of our day to day online business transactions?
Asymmetric key cryptography uses a public/private key pair
A malicious hacker can use several computers as bots to flood a web server and hinder regular service to legitimate requests. This is referred to in technical terms as:
DDoS (distributed denial of service)
IS hardware
CPU- central processing unit RAM- random access memory Secondary storage- data here has to be moved into RAM for processing Input devices-accessories (keyboard, mouse, mic) Ouput- video displays, printers, projectors
Abstract reasoning
Construct a model or representation -ability to make and manipulate models
moore's law
The number of transistors per square inch on an integrated chip doubles every 18 months, allows a computer to store and process more data faster at a lower cost
Entity Integrity (uses PKs)
The property of a relational table that guarantees each entity has a unique value in a primary key and that the key has no null values.
Which of the following statements is TRUE of all business users of information systems?
They are expected to take an active role in the design and evaluation of information systems.
low cost leadership
Use information systems to achieve the lowest operational costs and the lowest prices
As a business professional, what is one of the reasons you have to be involved in information systems (IS) design and evaluation?
You understand the business requirements and can convey them correctly to the developers.
Database
a collection of related lists (tables) containing facts (raw data) about entities provides an organizational structure for data provides a mechanism to interact with the data
Which of the following is an example of computer hardware?
a computer monitor/screen
Database Management System (DBMS)
a computer program that controls the creation, maintenance, and the use of a database
schema or data model
a database schema or a data model is the way to logically structure data in the form of related tables
A foreign key refers to:
a field in one table that refers to the primary key of another
foreign key
a field in one table that refers to the primary key of another table, a lookup field
primary key (PK)
a field that uniquely identifies a record in a table, first column in table, always different (person name, thing name)
form
a form is a window or screen that contains numerous fields, or spaces to enter data, a form provides a user-friendly way to enter or modify data into tables
Information System
a group of components that interact to produce information for decision making, coordination, and control
Cores
a mostly independent processor able to ingest and manipulate a stream of ones and zeros, today's CPU chips can have multiple cores, a multi-core CPU can be 'thinking' about several things at once instead of focusing on one thing at a time
Entity
a person or place or things, or event on which we store and maintain data
record
a row in a table, corresponds to one item
The hardware components of an information system will act as a(n) ________.
actor on the computer side
hardware/people
actors, where the work gets done
ASCII
american standard code for information interchange, binary numbers are used to encode ASCII characters, each number represents a different character,
primary key
an attribute that uniquely identifies a record of an entity
Which of the following operational problems is NOT something an organization could address using a Referential Integrity constraint in a database?
an incorrect DOB has been saved for a student
Bits, binary digits, 0 and 1
another measure of speed of a CPU is the number of bits processed in each cycle. standard CPUS today process 32 or 64 bits at a time
Each entity in a database has ________ that describe the characteristics of the entity.
attributes
Three types of "hats" associated with hackers are:
black, white, grey
First General Purpose Computer (ENIAC) us army 1946
could compare for equality, add, subtract, multiply, divide, and extract square roots, stored a max of 20 10-digit decimal numbers, used 20 accumulators connected by patch cords to process data, contained 17,468 vacuum tubes-1,500 relays-and weighed more than 30 tons
relationships
customers:sales (1:M) sales:customers (1:1) salary:employee (1:M) employee:salary (1:1) students:class (M:M) products:invoices (M:M)
A Customer Relationship Management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component of the IS.
data
The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.
data
record
data about one person (row in table)
Which of the following descriptions, by definition, characterize a DBMS as an RDBMS
data are stored in tables which are connected using primary keys and foreign keys
The special type of database configured for business intelligence applications is called a _____?
data warehouse
Collaboration
develop ideas and plans with others, provide and receive critical feedback
Assume a database with two tables. One table is named "Departments" with attributes Dept_Code, Dept_Name, Building, and Budget. The other table is named "Employees" with attributes Employee_Id, Name, Dept_Code, and Salary.Here the Dept_Code attribute in the "Employees" table acts as a/an:
foreign key
First fully transistorized computer (TRADIC) 1955
from vacuum tubes to transistors
Which of the following statements is TRUE of good information?
good information should be based on correct and complete data
Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption?
hardware
Five-Component Framework
hardware (machine), software (operating system, programs), data (unique to each business process), procedures (what kind of data needs to be stored/processed), people (business people, IT people) they all work together, all are necessary to create an IS
Difference between hardware and software
hardware (visible): the actual machinery made up of complex electronic circuitry, software (not visible): the list of instructions, both are vital to the business
IS components
hardware and people (actors), programs and procedures (instructions), data (bridge) IT=HW+SW+Data IS= IT+processes+people
Which of the following pairs of components constitutes the computer side of information systems?
hardware and software
IT
hardware, software, data without IT there is not IS, is one component of information systems
A system which has been improved so that it consumes fewer resources in accomplishing the same tasks:
has become more efficient than it was before
transaction table
holds a list of a particular kind of event which we want to record
master table
holds a list of a particular kind of things, these things exist independently over time and can participate in many transactions
Three ways IS improves business processes
improve efficiency, improve effectiveness, provide linkages across processes
software/procedures
instructions,
integrated circuits 1967
integrated circuits drastically reduces the size and cost of electronics
by definition, if we say that a piece of information is accurate we mean that:
it is based on correct and complete data and processed correctly as expected
IS exist to help businesses execute strategies and achieve goals, Period.
not for sheer joy of exploring technology, not to avoid falling behind the technology curve
The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold in the previous quarter. These details do NOT qualify as good information because they are ________.
not relevant
Solid state drives
nothing moves, that can make a system much faster, no moving parts, solid state drives are more expensive than magnetic hard disks
Relational database
organize data into 2D tables
Relational Database
organizes data into 2d tables, columns store attributes or fields, rows store records, one table for each entity
The ____________ component of the five-comp framework of an info system includes individuals who maintain and support the hardware and software
people
Which of the following pairs of components constitutes the human side of information systems?
people and procedures
You get an email from someone claiming to be from the marketing department of your bank saying that the bank wanted to honor loyal customers. It further says that since you had an account with them for more than three years, you qualified to be entered for a draw and have been selected as one of the ten lucky customers who were being given a cash award of $200 by the bank. The email asks you to provide your complete bank account details so that they can transfer $200 to your account as the prize money. This email is an example of:
phising
IT infrastructure
platform to support all information systems in a business
Albert creates a database table to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n)
primary key
According to the five-component model of information systems, the ________ component provides instructions for the people.
procedure
IS helps businesses achieve competitive advantage through
product differentiation, cost leadership, increasing customer/supplier intimacy, automating business processes by reducing/eliminating manpower
tables
tables store data about entities (things/services and people [independent], transactions [dependent])
a business needs a database instead of a spreadsheet when
the business involves data with multiple entities
In the five-component model, the process of automation is a process of moving work from ________.
the human side to the computer side
The concept of connecting, controlling or monitoring common everyday objects such as home security cameras, refrigerators etc., over the Internet is known as__________
the internet of things
Moore's Law
the number of transistors per square inch on an integrated chip doubles every 18 months, this has held true for more than 5 decades
Data mining is primarily used for allowing users to find hidden relationships in large data sets.
true
Obtaining or developing new programs is more difficult than ordering additional hardware.
true
Restricting access of users to specific portions of the system as well as specific tasks, is an example of authorization.
true
The five-component framework applies to both simple and complex information systems.
true