Unit 3 CIS
data element
The smallest or basic unit of information
data dictionary
compiles all of the metadata about the data elements in the data model
metadata
provides details about data (ex. for an image it includes size, resolution, & date created for an text it includes length, author name summary , area code, relationship defined
primary key
A field (or group of fields) that uniquely identifies a given entity in a table
• LO 6.8: four data mining techniques (Figure 6.29)
- Estimation analysis - Affinitity grouping analysis - Cluster analysis - Classififcation analysis
• LO X.9b: Predictive vs. prescriptive analytics
-predictive goes through data to predict what could happen-prescriptive - uses automation processes or AB testing, ex recommendations
while loop
A control flow statement that allows code to be executed repeatedly based on a given boolean condition
project plan
A formal, approved document that manages and controls project execution
data warehouse
A logical collection of information - gathered from many different operational databases - that supports business analysis activities and decision-making tasks
foreign key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
extraction, transformation & loading (ETL)
A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
information scrubbing
A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
project
A temporary activity a company undertakes to create a unique product, service, or result
project manager
An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget
redundant data
Data in a database which is needlessly duplicated.
dirty data
Dirty data, also known as rogue data, are inaccurate, incomplete or inconsistent data, especially in a computer system or database. flawed
Systems development lifecycle
The overall process for developing information systems from planning and analysis through implementation and maintenance
identity management
a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity
data artist
a business analytics specialist who uses visual tools to help people understand complex data
repository
a central location in which data is stored and managed
record
a collection of related data elements
blockchain
a distributed ledger that provides a way for information to be recorded and shared by a community. Central components include digital ledger, hash and digital signature, miners, decentralized,
Bitcoin
cryptocurrency that uses encryption to maintain the integrity of transactions
cluster analysis
a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible
legacy system
an old system that is fast approaching or beyond the end of its useful life within an organization
Conditions
basic if, then logic statements that modify how code is executed
Digital Ledger
bookkeeping list of assets, identified ownership, and transactions that record the transfer of ownership among participants
• LO X.9b: Business Intelligence and Data Analytics
business intelligence -delivering relevant and reliable information to the right people at the right time with the goal of achieving better decisions faster data analytics - 4 types- descriptive, diagnostic, predictive, prescriptive
information cube
common term for the representation of multidimensional information
data mart
contains a subset of data warehouse information
DBMS
creates, reads, updates, and deletes data in a database while controlling access and security
bugs
defects in the code of an information system
business rule
defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer
data visualization
describes technologies that allow users to see or visualize data to transform information into a business perspective
project scope
describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project
estimation analysis
determines values for an unknown continuous variable behavior or estimated future value
intangible benefits
difficult to quantify or measure
Cryptocurrency
digital asset designed to work as a medium of exchange
Decentralization
each node in the participating computer network has a full copy of the digital ledger this avoids the need to have a centralized database manager by a trusted party
tangible benefits
easy to quantify and typically measured to determine the success or failure of a project
Peer-to-peer
every user is allowed to connect to the network, send new transactions to it, verify transactions and create new blocks
data scientist
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
triple constraint
framework for evaluating competing demands between project-time, cost and scope
LO 6.3: identify advantages and features of relational databases (Figure 6.9)
increased flexibility, increased scalability and performance, increased information integrity, increased information security, reduced information redundance
process modeling
involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment
data model
logical data structures that detail the relationships among data elements using graphics or pictures
database
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
Software customization
modifies software to meet specific user or business requirements
Data types
numeric, string, list, boolean
Double-Spend
occurs when blockchain network is disrupted and cryptocurrency is stolen
• LO 9.1: phases of the System Development Life Cycle (Figure 9.1, Table 9.1)
planning, analysis, design, development, testing, implementation, and maintenance
Functions
prebuilt mini programs for input -> processing -> output
Hash
process of converting an input of any length into a fixed size string of text using a mathematical function
Loops
programming structure that repeats a sequence of instructions until a specific condition is met
LO 6.2: recognize tools used to retrieve information from a database management system.
query by example, structured query language
affinity grouping analysis
reveals the relationship between variables along with the nature and frequency of the relationships
integrity constraints
rules that help ensure the quality of information
infinite loop
sequence of instructions that, as written will continue endlessly, unless external intervention occurs
entity
stores information about a person, place, thing, transaction, or event
Assignment
storing data into a variable = -> <-
off-the-shelf application
supports general business processes and does not require any specific software customization to meet the organization's needs
attribute
the data elements associated with an entity (also called columns or fields)
information redundancy
the duplication of data, or the storage of the same data in multiple places
feasibility
the measure of the tangible and intangible benefits of an information system
data mining
the process of analyzing data to extract information not offered by the raw data alone
classification analysis
the process of organizing data into categories or groups for its most effective and efficient use
conversion
the process of transferring information from a legacy system to a new system
analytics
the science of fact-based decision making
business requirement
the specific business requests the system must meet to be successful
Miners
transactions are authenticated by a network of 'miners' who complete complex mathematical problems
• LO 9.4: identify the five primary reasons projects fail
unclear or missing business requirements, skipped SDLC phases, changing technology, cost of finding errors, balance of triple constraints
structured query language (SQL)
users write lines of code to answer questions against a database
Variable
value that can change, depending on conditions or on information passed to the program