CIS 2010: Final Exam SG:

¡Supera tus tareas y exámenes ahora con Quizwiz!

Peer-to-peer

A network model where all computers on the network are equal and data may be shared from computer to computer.

Cloud computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

data dictionary

compiles all of the metadata about the data elements in the data model

blockchain

- A blockchain is a shared ledger where transactions are permanently recorded by appending blocks - The blockchain serves as a historical record of all transactions that ever occurred, from the genesis block to the latest block, hence the name blockchain.

Chapter 14 learning objectives:

- LO 2.4: categories of artificial intelligence including Expert Systems, Neural Networks, Genetic Algorithms, and Intelligent Agents. - LO X14.1: Artificial Intelligence, Machine learning and Deep learning

Chapter 13 learning objectives:

- LO 5.5: grid computing, virtualization and cloud computing (Figure 5.1) - LO 5.5: distinct types of virtualization - LO 5.5: cloud service delivery models including Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) (Figure 5.25) - LO 5.5: distinct cloud computing environments including Private, Public, Hybrid and Community (Figure 5.24) - LO 5.5: Benefits of cloud computing (Figure 5.23) - LO X.3b: augmented reality vs. virtual reality - LO X.3b: technologies that support AR and VR - LO X.6c: the use of next and break within R loops - LO X.6c: the role of arguments and parameters for functions

Chapter 8 learning objectives:

- LO 6.2: entities, attributes, and records - LO 6.2: DBMS tools including query-by-example and SQL - LO 6.3: identify advantages and features of relational databases (Figure 6.9) - LO 6.3: characteristics of redundant data - LO 6.3: examples of metadata - LO X.8b: central components of blockchain - LO X.8b: advantages of blockchain and bitcoin

Chapter 9 learning objectives:

- LO 6.5: internal databases, external databases, data warehouses and data marts (Figure 6.14) - LO 6.5: Dirty data problems and information scrubbing (Figure 6.15) - LO 6.7: common characteristics of big data (Figure 6.21) - LO 6.7: structured and unstructured data (Figure 6.23) - LO X.9b: Business Intelligence and Data Analytics - LO X.9b: Predictive vs. prescriptive analytics

Chapter 12 learning objectives:

- LO 9.1: phases of the System Development Life Cycle (Figure 9.1, Table 9.1) - LO 9.1: methods for gathering business requirements (Figure 9.2) - LO 9.1: Different forms of Systems Testing (Figure 9.8) - LO 9.1: System Implementation Methods (Figure 9.9) - LO 9.4: tangible benefits vs. intangible benefits - LO X.11b: algorithms vs. functions

Chapter 10 learning objectives:

- LO A.3: application software and system software - LO A.3: Operating system software and Utility software - LO A.3: software distribution and licensing methods - LO A.3: software updates and software upgrades - LO X.4b & LO 1.3: three aspects of systems: Inputs, Process & Output - LO X.4b: feedback loops vs. feed-forward loops - LO X.4b: barriers vs. tools - LO X.10a: distinct types of data including numbers, strings, Boolean and lists (arrays or vectors) - LO X.10b: appropriate methods for assigning variables in R

Chapter 11 learning objectives:

- LO C.1: types of attributes - LO C.1: format vs. business rule - LO C.2: types of entity relationships - LO C.3: tables, records and attributes - LO C.3: primary key vs. foreign key - LO X.11b: common SQL commands

Double-Spend

- Scenario, in the Bitcoin network, where someone tries to send a bitcoin transaction to two different recipients at the same time. - However, once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. - The more confirmations that a particular transaction has, the harder it becomes to double spend the bitcoins.

database management system

- creates, reads, updates, and deletes data in a database

data model

- logical data structures that detail relationships using graphs/pictures

database

- maintains inventory, transactions, employees, and warehouses

data element

- smallest/basic unit of info, product name, quantity, etc

structured query language (SQL)

- users write lines of code against a database

AND, FROM, JOIN, SELECT

-RStudio commands

Grid computing

A collection of computers, often geographically dispersed, that are coordinated to solve a common problem

Virtual Reality

A computer-simulated environment that can be a simulation of the real world or an imaginary world

Digital Ledger

A digital ledger is a bookkeeping list of assets (money, property, ideas...), identified ownership, and transactions that record the transfer of ownership among participants. All transactions are recorded with a date, time, participant names and other information. It is a linear list to which information can only be added, with older records retained to preserve the full history of each asset.[1]

System

A group of parts that work together as a whole

Algorithm

A methodical, logical rule or procedure that guarantees solving a particular problem.

Entity relationship diagram

A methodology for documenting databases illustrating the relationship between various entities in the database.

foreign key

A primary key from one table that is used in another table.

information scrubbing

A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

off-the-shelf application

A software program that is mass produced and commercialized by a software vendor.

project

A temporary endeavor undertaken to create a unique product, service, or result.

Data Analytics

The science of examining raw data with the purpose of drawing conclusions about that information

project manager

An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget

multitasking

An operating system feature that allows more than one application to run at a time.

CASE

Computer Aided Software Engineering

Hash

Computer Science and advanced mathematics (in the form of cryptographic hash functions) protect the blockchain's integrity and anonymity. Each transaction has a digital hash calculated and attached. The hash includes digital signatures from the existing blockchain as well as the new transaction. In this way each block vouches the the integrity of all prior blocks and thereby prevents falsification or manipulation of prior transactions. The result is a fully transparent ledger with strong collective trust.

Virtualization

Creates multiple "virtual" machines on a single computing device

virtualization

Creates multiple "virtual" machines on a single computing device

redundant data

Duplicate information in a database.

Decentralization

Each node in the participating computer network has a full copy of the digital ledger. This avoids the need to have a centralized database managed by a trusted party. Transactions are broadcast to the network. Network nodes can validate transactions and add them to their copy, then broadcast those additions to other nodes

ETL

Extract, Transform, Load

Data types

Format of data in a field, such as text, number, or date.

Business Intelligence

Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making

Code blocks {}

Segments of code embedded in color coded blocks in scratch.

SQL

Structured Query Language. Most of the time SQL is used to get specific data out of a large database.

Input-Process-Output

The basic computer system (IPO)

Miners

Transactions are authenticated by a network of 'miners' who complete complex mathematical problems. When all miners arrive at the same unique solution, the transaction is verified and recorded as a new 'block'. New transaction blocks are added to the digital ledger in a chained fashion, forming a 'blockchain'. The distribution of miners means that the system cannot be hacked by a single source. If anyone tries to tamper with one ledger, all of the nodes will disagree on the integrity of that ledger and will refuse to incorporate the transaction into the blockchain.

Knowledge base

a body of knowledge in a particular area that makes it easier to master new information in that area

data artist

a business analytics specialist who uses visual tools to help people understand complex data

primary key

a field that uniquely identifies a record in a table

Fuzzy logic

a mathematical method of handling imprecise or subjective information

Mutation

a random error in gene replication that leads to a change

Field

a single characteristic of data that appears in a table as a column

Artificial Intelligence

a subdiscipline of computer science that attempts to simulate human thinking

Cryptocurrency

a system that relies upon encryption techniques rather than banks to regulate the generation of units of currency and verify the transfer of funds

Bitcoin

a type of digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.

Systems Thinking

a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

Legacy system

an old system that is fast approaching or beyond the end of its useful life within an organization

bugs

any error in the program

One-to-One relationship

between two entities in which an instance of one entity can be related to only one instance of a related entity

Many-to-many relationship

between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity

Assignment

boolean logic uses these

Conditions

boolean logic uses these

Data aggregation

collection of data from various sources for purpose of data processing

information cube

common term for the representation of multidimensional information

Application Software

computer software created to allow the user to perform a specific job or task

Open Systems

computing products that work together by using the same operating system with compatible software on all the computers that interact in an organization

data mart

contains subsets of data warehouse info

metadata

data about data

DBMS

database management system

business rule

defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer

project plan

defines the what, when, and who questions of system development

Data Visualization

describes technologies that allow users to see or visualize data to transform information into a business perspective

Single-tenancy

each customer or tenant must purchase and maintain an individual system

dirty data

erroneous or flawed data

data scientist

extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

Operating systems software

govern basic operation of the hardware

information integrity

increased info security, reduced info redundancy

process modeling

involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment

Fast data

is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value

data warehouse

logical collection of info combined into one place

Function

named set of computer logic to accomplish a specific task. Functions are sometimes also called procedures. Functions typically contain the software logic for an single algorithm, though some software programs collect multiple functions in order to provide more complex capabilities for the user

Functions

named set of computer logic to accomplish a specific task. Functions are sometimes also called procedures. Functions typically contain the software logic for an single algorithm, though some software programs collect multiple functions in order to provide more complex capabilities for the user

distributed computing

processes and manages algorithms across many machines in a computing environment

Utility Software

provides additional functionality to the operating system

One-to-Many relationship

relationship which exists between two tables; one record in the fist table matches zero, one or many records in a second table, and one record in the second table matches at most one record in the first table

integrity constraints

rules that help ensure the quality of info

Subsystems

smaller systems that operate within the context of a larger system

System Software

software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management

Deep Learning

students are motivated to learn deeply to satisfy their own curiosity

Attribute

the data elements associated with an entity

Information redundancy

the duplication of data, or the storage of the same data in multiple places

information redundancy

the duplication of data, or the storage of the same data in multiple places

Big data

the huge and complex data sets generated by today's sophisticated information generation, collection, storage, and analysis technologies

Management Information Systems

the management and use of information systems that help organizations achieve their strategies

Analytics

the science of fact-based decision making

business requirement

the specific business requests the system must meet to be successful

Augmented Reality

the viewing of the physical world with computer-generated layers of information added to it

redundency

unnecessary repetition of an idea or term

Feed-back loops

when outputs of a system are routed back as inputs as part of a chain of cause-and-effect that forms a circuit or loop


Conjuntos de estudio relacionados

Intro to Art: Political Purposes of Art

View Set

Northwestern Mutual - Life Insurance Basics

View Set

Ch. 9: Long Run Production Costs

View Set