CIS 2010: Final Exam SG:
Peer-to-peer
A network model where all computers on the network are equal and data may be shared from computer to computer.
Cloud computing
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.
data dictionary
compiles all of the metadata about the data elements in the data model
blockchain
- A blockchain is a shared ledger where transactions are permanently recorded by appending blocks - The blockchain serves as a historical record of all transactions that ever occurred, from the genesis block to the latest block, hence the name blockchain.
Chapter 14 learning objectives:
- LO 2.4: categories of artificial intelligence including Expert Systems, Neural Networks, Genetic Algorithms, and Intelligent Agents. - LO X14.1: Artificial Intelligence, Machine learning and Deep learning
Chapter 13 learning objectives:
- LO 5.5: grid computing, virtualization and cloud computing (Figure 5.1) - LO 5.5: distinct types of virtualization - LO 5.5: cloud service delivery models including Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) (Figure 5.25) - LO 5.5: distinct cloud computing environments including Private, Public, Hybrid and Community (Figure 5.24) - LO 5.5: Benefits of cloud computing (Figure 5.23) - LO X.3b: augmented reality vs. virtual reality - LO X.3b: technologies that support AR and VR - LO X.6c: the use of next and break within R loops - LO X.6c: the role of arguments and parameters for functions
Chapter 8 learning objectives:
- LO 6.2: entities, attributes, and records - LO 6.2: DBMS tools including query-by-example and SQL - LO 6.3: identify advantages and features of relational databases (Figure 6.9) - LO 6.3: characteristics of redundant data - LO 6.3: examples of metadata - LO X.8b: central components of blockchain - LO X.8b: advantages of blockchain and bitcoin
Chapter 9 learning objectives:
- LO 6.5: internal databases, external databases, data warehouses and data marts (Figure 6.14) - LO 6.5: Dirty data problems and information scrubbing (Figure 6.15) - LO 6.7: common characteristics of big data (Figure 6.21) - LO 6.7: structured and unstructured data (Figure 6.23) - LO X.9b: Business Intelligence and Data Analytics - LO X.9b: Predictive vs. prescriptive analytics
Chapter 12 learning objectives:
- LO 9.1: phases of the System Development Life Cycle (Figure 9.1, Table 9.1) - LO 9.1: methods for gathering business requirements (Figure 9.2) - LO 9.1: Different forms of Systems Testing (Figure 9.8) - LO 9.1: System Implementation Methods (Figure 9.9) - LO 9.4: tangible benefits vs. intangible benefits - LO X.11b: algorithms vs. functions
Chapter 10 learning objectives:
- LO A.3: application software and system software - LO A.3: Operating system software and Utility software - LO A.3: software distribution and licensing methods - LO A.3: software updates and software upgrades - LO X.4b & LO 1.3: three aspects of systems: Inputs, Process & Output - LO X.4b: feedback loops vs. feed-forward loops - LO X.4b: barriers vs. tools - LO X.10a: distinct types of data including numbers, strings, Boolean and lists (arrays or vectors) - LO X.10b: appropriate methods for assigning variables in R
Chapter 11 learning objectives:
- LO C.1: types of attributes - LO C.1: format vs. business rule - LO C.2: types of entity relationships - LO C.3: tables, records and attributes - LO C.3: primary key vs. foreign key - LO X.11b: common SQL commands
Double-Spend
- Scenario, in the Bitcoin network, where someone tries to send a bitcoin transaction to two different recipients at the same time. - However, once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. - The more confirmations that a particular transaction has, the harder it becomes to double spend the bitcoins.
database management system
- creates, reads, updates, and deletes data in a database
data model
- logical data structures that detail relationships using graphs/pictures
database
- maintains inventory, transactions, employees, and warehouses
data element
- smallest/basic unit of info, product name, quantity, etc
structured query language (SQL)
- users write lines of code against a database
AND, FROM, JOIN, SELECT
-RStudio commands
Grid computing
A collection of computers, often geographically dispersed, that are coordinated to solve a common problem
Virtual Reality
A computer-simulated environment that can be a simulation of the real world or an imaginary world
Digital Ledger
A digital ledger is a bookkeeping list of assets (money, property, ideas...), identified ownership, and transactions that record the transfer of ownership among participants. All transactions are recorded with a date, time, participant names and other information. It is a linear list to which information can only be added, with older records retained to preserve the full history of each asset.[1]
System
A group of parts that work together as a whole
Algorithm
A methodical, logical rule or procedure that guarantees solving a particular problem.
Entity relationship diagram
A methodology for documenting databases illustrating the relationship between various entities in the database.
foreign key
A primary key from one table that is used in another table.
information scrubbing
A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
off-the-shelf application
A software program that is mass produced and commercialized by a software vendor.
project
A temporary endeavor undertaken to create a unique product, service, or result.
Data Analytics
The science of examining raw data with the purpose of drawing conclusions about that information
project manager
An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget
multitasking
An operating system feature that allows more than one application to run at a time.
CASE
Computer Aided Software Engineering
Hash
Computer Science and advanced mathematics (in the form of cryptographic hash functions) protect the blockchain's integrity and anonymity. Each transaction has a digital hash calculated and attached. The hash includes digital signatures from the existing blockchain as well as the new transaction. In this way each block vouches the the integrity of all prior blocks and thereby prevents falsification or manipulation of prior transactions. The result is a fully transparent ledger with strong collective trust.
Virtualization
Creates multiple "virtual" machines on a single computing device
virtualization
Creates multiple "virtual" machines on a single computing device
redundant data
Duplicate information in a database.
Decentralization
Each node in the participating computer network has a full copy of the digital ledger. This avoids the need to have a centralized database managed by a trusted party. Transactions are broadcast to the network. Network nodes can validate transactions and add them to their copy, then broadcast those additions to other nodes
ETL
Extract, Transform, Load
Data types
Format of data in a field, such as text, number, or date.
Business Intelligence
Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
Code blocks {}
Segments of code embedded in color coded blocks in scratch.
SQL
Structured Query Language. Most of the time SQL is used to get specific data out of a large database.
Input-Process-Output
The basic computer system (IPO)
Miners
Transactions are authenticated by a network of 'miners' who complete complex mathematical problems. When all miners arrive at the same unique solution, the transaction is verified and recorded as a new 'block'. New transaction blocks are added to the digital ledger in a chained fashion, forming a 'blockchain'. The distribution of miners means that the system cannot be hacked by a single source. If anyone tries to tamper with one ledger, all of the nodes will disagree on the integrity of that ledger and will refuse to incorporate the transaction into the blockchain.
Knowledge base
a body of knowledge in a particular area that makes it easier to master new information in that area
data artist
a business analytics specialist who uses visual tools to help people understand complex data
primary key
a field that uniquely identifies a record in a table
Fuzzy logic
a mathematical method of handling imprecise or subjective information
Mutation
a random error in gene replication that leads to a change
Field
a single characteristic of data that appears in a table as a column
Artificial Intelligence
a subdiscipline of computer science that attempts to simulate human thinking
Cryptocurrency
a system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds
Bitcoin
a type of digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.
Systems Thinking
a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part
Legacy system
an old system that is fast approaching or beyond the end of its useful life within an organization
bugs
any error in the program
One-to-One relationship
between two entities in which an instance of one entity can be related to only one instance of a related entity
Many-to-many relationship
between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity
Assignment
boolean logic uses these
Conditions
boolean logic uses these
Data aggregation
collection of data from various sources for purpose of data processing
information cube
common term for the representation of multidimensional information
Application Software
computer software created to allow the user to perform a specific job or task
Open Systems
computing products that work together by using the same operating system with compatible software on all the computers that interact in an organization
data mart
contains subsets of data warehouse info
metadata
data about data
DBMS
database management system
business rule
defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer
project plan
defines the what, when, and who questions of system development
Data Visualization
describes technologies that allow users to see or visualize data to transform information into a business perspective
Single-tenancy
each customer or tenant must purchase and maintain an individual system
dirty data
erroneous or flawed data
data scientist
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
Operating systems software
govern basic operation of the hardware
information integrity
increased info security, reduced info redundancy
process modeling
involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment
Fast data
is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value
data warehouse
logical collection of info combined into one place
Function
named set of computer logic to accomplish a specific task. Functions are sometimes also called procedures. Functions typically contain the software logic for an single algorithm, though some software programs collect multiple functions in order to provide more complex capabilities for the user
Functions
named set of computer logic to accomplish a specific task. Functions are sometimes also called procedures. Functions typically contain the software logic for an single algorithm, though some software programs collect multiple functions in order to provide more complex capabilities for the user
distributed computing
processes and manages algorithms across many machines in a computing environment
Utility Software
provides additional functionality to the operating system
One-to-Many relationship
relationship which exists between two tables; one record in the fist table matches zero, one or many records in a second table, and one record in the second table matches at most one record in the first table
integrity constraints
rules that help ensure the quality of info
Subsystems
smaller systems that operate within the context of a larger system
System Software
software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management
Deep Learning
students are motivated to learn deeply to satisfy their own curiosity
Attribute
the data elements associated with an entity
Information redundancy
the duplication of data, or the storage of the same data in multiple places
information redundancy
the duplication of data, or the storage of the same data in multiple places
Big data
the huge and complex data sets generated by today's sophisticated information generation, collection, storage, and analysis technologies
Management Information Systems
the management and use of information systems that help organizations achieve their strategies
Analytics
the science of fact-based decision making
business requirement
the specific business requests the system must meet to be successful
Augmented Reality
the viewing of the physical world with computer-generated layers of information added to it
redundency
unnecessary repetition of an idea or term
Feed-back loops
when outputs of a system are routed back as inputs as part of a chain of cause-and-effect that forms a circuit or loop