Foundations of Business - Module 1 (Ch.3,4,5,6,9,12)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

disaster recovery plan

A documented process to recover an organization's business information system assets including hardware, software, data, networks, and facilities in the event of a disaster.

hot site

A duplicate, operational hardware system that is ready for use (or immediate access to one through a specialized vendor).

server farm

A facility that houses a large number of servers in the same room, where access to the machines can be controlled and authorized support personnel can more easily manage and maintain the servers.

primary key

A field or set of fields that uniquely identifies the record

broadband communications

High-speed Internet access that is always on and that is faster than traditional dial-up access.

hyperlinks

Highlighted text or graphics in a Web document that, when clicked, opens a new Web page containing related content.

operating system (OS)

A set of computer programs that controls the computer hardware and acts as an interface to application software.

Bus

A set of electronic circuits used to route data and instructions to and from the various components of a computer.

processor family

A set of processors from the same manufacturer that have similar features and capabilities.

Syntax

A set of rules associated with a programming language.

Version

A significant program change that often requires changes in the documentation of the software

release

A significant program change that often requires changes in the documentation of the software.

relational database model

A simple but highly useful way to organize data into collections of two-dimensional tables called relations.

Cross-Industry Process for Data Mining (CRISP-DM)

A six-phase structured approach for the planning and execution of a data mining project.

single-user license

A software license that permits you to install the software on one or more computers, used by one person.

Compiler

A special software program that converts the programmer's source code into the machine-language instructions, which consist of binary digits.

SQL

A special-purpose programming language for accessing and manipulating data stored in a relational database.

System maintenance

A stage of system development that involves changing and enhancing the system to make it more useful in achieving user and organizational goals.

System disposal

A stage of system development that involves those activities that ensure the orderly dissolution of the system, including disposing of all equipment in an environmentally friendly manner, closing out contracts, and safely migrating information from the system to another system or archiving it in accordance with applicable records management policies.

Joint application development (JAD)

A structured meeting process that can accelerate and improve the efficiency and effectiveness of the investigation, analysis, and design phases of a system development project.

data mart

A subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.

system investigation report

A summary of the results of the system investigation, with a recommendation of a course of action.

Electronic Product Environmental Assessment Tool (EPEAT)

A system that enables purchasers to evaluate, compare, and select electronic products based on a set of environmental criteria.

database approach to data management

An approach to data management where multiple information systems share a pool of related data.

feasibility analysis

An assessment of the technical, economic, legal, operational, and schedule feasibility of a project.

Software-defined networking (SDN)

An emerging approach to networking that allows network administrators to have programmable central control of the network via a controller without requiring physical access to all the network devices.

data steward

An individual responsible for the management of critical data elements, including identifying and acquiring new data sources; creating and maintaining consistent reference data and master data definitions; and analyzing data for quality and reconciling data issues.

Infrastructure as a service (IaaS)

An information systems strategy in which an organization outsources the equipment used to support its data processing operations, including servers, storage devices, and networking components.

Agile development

An iterative system development process that develops the system in "sprint" increments lasting from two weeks to two months.

Pareto principle

An observation that for many events, roughly 80 percent of the effects come from 20 percent of the causes.

dashboard

A presentation of a set of KPIs about the state of a process at a specific point in time.

search engine optimization (SEO)

A process for driving traffic to a Web site by using techniques that improve the site's ranking in search results.

System Investigation steps

-Review system investigation request. -Identify and recruit team leader and team members. -Develop budget and schedule for investigation. -Perform investigation. -Perform preliminary feasibility analysis. -Prepare draft of investigation report. -Review results of investigation with steering team.

User Acceptance Testing steps:

-The UAT test team is selected from the set of likely users. -The UAT test team is trained using the currently available training material. -The overall UAT strategy and schedule is defined. -The UAT team designs test cases to exercise the functions and features of the information system. -The test cases are documented in a clear and simple step-by-step manner to make the tests easy to execute. -The UAT team executes the defined test cases and documents the results of each test. -The software development team reviews the test results and makes any required changes to the code so it meets the design specifications. -The UAT team retests the information system until all defects have been fixed or it is agreed that certain defects will not be fixed. -The UAT team indicates its acceptance or nonacceptance of the information system. If accepted, the information system is ready to be fully implemented. -The UAT team provides feedback on the user training material so it can be updated and improved.

Implementation steps:

-User preparation -Site preparation -Installation -Cutover

Characteristic of a data scientist

. ​strong business acumen, healthy appreciation of the limitations of their data, deep understanding of analytics

Execution Phase

1. Execute instruction. The computer executes the instruction by making an arithmetic computation, logical comparison, bit shift, or vector operation. 2. Store results. The results are stored in temporary storage locations called registers or in memory.

Instruction Phase

1. Fetch instruction. The computer reads the next program instruction to be executed—along with any necessary data—into the processor. 2. Decode instruction. The instruction is decoded and passed to the appropriate processor execution unit.

data-flow diagram (DFD)

A diagram used during both the analysis and design phases to document the processes of the current system or to provide a model of a proposed new system.

3 Processor families

1. X86 family. Intel, AMD, and VIA 2. Intel Atom. This is the brand name for a line of ultra-low-voltage CPUs from Intel that is designed to generate less heat than the x86 chip 3. ARM. These processors are used in computers that run Android, iOS,

Memory

A component of the computer that provides the processor with a working storage area to hold program instructions and data.

mission-critical processes

A process that plays a pivotal role in an organization's continued operations and goal attainment.

magnetic tape

A type of sequential secondary storage medium, now used primarily for storing backups of critical organizational data in the event of a disaster.

command-based user interface

A user interface that requires you to give text commands to the computer to perform basic activities.

Near field communication (NFC)

A very short-range wireless connectivity technology that enables two devices placed within a few inches of each other to exchange data.

word cloud

A visual depiction of a set of words that have been grouped together because of the frequency of their occurrence.

NoSQL database

A way to store and retrieve data that is modeled using some means other than the simple two dimensional tabular relations used in relational databases.

data administrator

An individual responsible for defining and implementing consistent principles for a variety of data issues.

Data Entry

Converting human-readable data into a machine-readable form.

Two

Domain names must always have at least _____ parts, with each part separated by a dot (period).

byte (B)

Eight bits that together represent a single character of data.

Two phases of completing instructions

Instruction & Execution Phases

System operation

Involves the use of a new or modified system under all kinds of operating conditions.

Internet backbone

One of the Internet's high-speed, long-distance communications links / The combined hardware of these and other NSPs—the fiber-optic cables that span the globe over land and under sea

Proprietary software

One-of-a-kind software designed for a specific application and owned by the company, organization, or person that uses it

network operating system (NOS)

Systems software that controls the computer systems and devices on a network and allows them to communicate with each other.

ARPANET

The ancestor of the Internet was _____.

kernel

The heart of the operating system that controls the most critical processes of the OS.

Supercomputers

The most powerful computer systems with the fastest processing speeds.

sphere of influence

The scope of the problems and opportunities that the software addresses.

Network topology

The shape or structure of a network, including the arrangement of the communication links and hardware devices on the network.

Business Intelligence (BI)

includes a wide range of applications, practices, and technologies for the extraction, transformation, integration, visualization, analysis, interpretation, and presentation of data to support improved decision making

Random Access Memory (RAM)

A form of memory in which instructions or data can be temporarily stored.

data lake

A "store everything" approach to big data that saves all the data in its raw and unaltered form.

IP address

A 64-bit number that identifies a computer on the Internet.

Data mining

A BI analytics tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making.

Input / Output Devices

A computer component that provides data and instructions to the computer and receives results from it.

Green computing

A program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products.

Data management

An integrated set of functions that defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization.

Communications media

Any material substance that carries an electronic signal to support communications between a sending and a receiving device.

Internet service provider (ISP)

Any organization that provides Internet access to people.

computer network

The communications media, devices, and software connecting two or more computer systems or devices.

Main Memory

The component of a computer that provides the CPU with a working storage area for program instructions and data.

domain

The range of allowable values for a data attribute.

Channel bandwidth

The rate at which data is exchanged, usually measured in bits per second (bps).

Parallel Computing

The simultaneous execution of the same task on multiple processors to obtain results faster.

Multiprocessing

The simultaneous execution of two or more instructions at the same time.

workgroup sphere of influence

The sphere of influence that helps workgroup members attain their common goals.

personal sphere of influence

The sphere of influence that serves the needs of an individual user.

Hypertext Transfer

The world-wide-web uses _____ protocol for transmitting content​.

Self-service analytics

Training, techniques, and processes that empower end users to work independently to access data from approved sources to perform their own analyses using an endorsed set of tools.

workgroup

Two or more people who work together to achieve a common goal.

System Construction steps:

-Code software components. -Create and load data. -Perform unit testing.

mainframe computer

A large, powerful computer often shared by hundreds of concurrent users connected to the machine over a network.

Functions of Operating System

-Control common computer hardware functions -Provide a user interface and manage input/output management -Provide a degree of hardware independence -Manage system memory -Manage processing tasks -Provide networking capability -Control access to system resources -Manage files

System analysis steps:

-Identify and recruit team leader and team members. -Develop budget and schedule for system analysis activities. -Study existing system. -Develop prioritized set of requirements. -Identify and evaluate alternative solutions. -Perform feasibility analysis. -Prepare draft of system analysis report. -Review results of system analysis with steering team.

System Design steps:

-Identify and recruit team leader and team members. -Develop schedule and budget for system design activities. -Design user interface. -Design system security and controls. -Design disaster recovery plan. -Design database. -Perform feasibility analysis. -Prepare draft of system design report. -Review results of system design with steering team.

Package Evaluation Phase steps:

-Identify potential solutions. -Select top contenders. -Research top contenders. -Perform final evaluation of leading solutions. -Make selection. -Finalize contract.

Cutover

The process of switching from an old information system to a replacement system.

Benefits of BI / Analytics

- detect fraud - improve forecasting - increase sales - optimize operations - reduce costs

Network-attached storage (NAS)

A hard disk drive storage device that is set up with its own network address and provides file-based storage services to other devices on the network.

Storage Area Network (SAN)

A high-speed, special-purpose network that integrates different types of data storage devices (e.g., hard disk drives, magnetic tape, solid state secondary storage devices) into a single storage system and connects that to computing resources across an entire organization. is a high-spe

Uniform Resource Locator (URL)

A Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host.

Flat file

A _____ is a simple database program whose records have no relationship to one another.

Low Earth Orbit (LEO)

A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles.

character

A basic building block of most information, consisting of uppercase letters, lowercase letters, numeric digits, or special symbols.

Instruction Set Architecture (ISA)

A basic set of commands (opcodes) that the processor can execute.

Bit

A binary digit (i.e., 0 or 1) that represents a circuit that is either on or off.

data center

A climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services.

hybrid cloud

A cloud computing environment is composed of both private and public clouds integrated through networking.

Grid Computing

A collection of computers, often geographically dispersed, that are coordinated to solve a common problem

record

A collection of data fields all related to one object, activity, or individual.

data cubes

A collection of data that contains numeric facts called measures, which are categorized by dimensions, such as time and geography.

data definition language (DDL)

A collection of instructions and commands used to define and describe data and relationships in a specific database.

file

A collection of related records.

performance evaluation test

A comparison of vendor options conducted in a computing environment (e.g., computing hardware, operating system software, database management system) and with a workload (e.g., number of concurrent users, database size, and number of transactions) that matches its intended operating conditions.

Server

A computer employed by many users to perform a specific task, such as running network or Internet applications.

cold site

A computer environment that includes rooms, electrical service, telecommunications links, data storage devices, and the like.

embedded system

A computer system (including some sort of processor) that is implanted in and dedicated to the control of another device.

Cloud computing

A computing environment where software and storage are provided as an Internet service and are accessed with a Web browser.

Parallel start-up

A cutover strategy that involves running both the old and new systems for a period of time and closely comparing the output of the new system with the output of the old system; any differences are reconciled. When users are comfortable that the new system is working correctly, the old system is eliminated.

Pilot start-up

A cutover strategy that involves running the complete new system for one group of users rather than for all users.

phase-in approach

A cutover strategy that involves slowly replacing components of the old system with those of the new one; this process is repeated for each application until the new system is running every application and performing as expected; also called a piecemeal approach.

Direct conversion

A cutover strategy that involves stopping the old system and starting the new system on a given date; also called plunge or direct cutover.

enterprise data model

A data model that provides a roadmap for building database and information systems by creating a single definition and format for data that can ensure data compatibility and the ability to exchange and integrate data among systems.

entity-relationship (ER) diagram

A data model that uses basic graphical symbols to show the organization of and relationships between data.

Storage as a service

A data storage model where a data storage service provider rents space to individuals and organizations.

in-memory database (IMDB)

A database management system that stores the entire database in random access memory (RAM).

schema

A description that defines the logical and physical structure of the database by identifying the tables, the fields in each table, and the relationships between fields and tables.

data dictionary

A detailed description of all the data used in the database.

Secondary Storage

A device that stores large amounts of data, instructions, and information more permanently than allowed with main memory.

data model

A diagram of data entities and their relationships.

request for information (RFI)

A document that outlines an organization's hardware or software needs and requests vendors to provide information about if and how they can meet those needs and the time and resources required.

Extreme programming (XP)

A form of agile software development that promotes incremental development of a system using short development cycles to improve productivity and to accommodate new customer requirements.

user acceptance document

A formal agreement that the organization signs stating that a phase of the installation or the complete system is approved.

conversion funnel

A graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer.

linear regression

A mathematical procedure to predict the value of a dependent variable based on a single independent variable and the linear relationship between the two.

Concurrency control

A method of dealing with a situation in which two or more users or applications need to access the same record at the same time.

virtual server

A method of logically dividing the resources of a single physical server to create multiple logical servers, each acting as its own dedicated machine.

redundant array of independent/inexpensive disks (RAID)

A method of storing data that generates extra bits of data from existing data, allowing the system to create a "reconstruction map" so that if a hard drive fails, the system can rebuild lost data.

key performance indicators (KPIs)

A metric that tracks progress in executing chosen strategies to attain organizational objectives and goals and consists of a direction, measure, target, and time frame.

multicore processor

A microprocessor that has two or more independent processing units, called cores, which are capable of sequencing and executing instructions.

Patch

A minor system upgrade-typically a code adjustment or minor bug fix; it usually requires recompiling all the code, and in so doing, it can create entirely new bugs.

slipstream upgrade

A minor system upgrade-typically a code adjustment or minor bug fix; it usually requires recompiling all the code, and in so doing, it can create entirely new bugs.

bus network

A network in which all network devices are connected to a common backbone that serves as a shared communications medium.

star network

A network in which all network devices connect to one another through a single central device called the hub node.

local area network (LAN)

A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building.

wide area network (WAN)

A network that connects large geographic regions.

metropolitan area network (MAN)

A network that connects users and their computers in a geographical area that spans a campus or city.

Personal Area Network (PAN)

A network that supports the interconnection of information technology devices close to one person.

Mesh networks

A network that uses multiple access points to link a series of devices that communicate with each other to form a network connection across a large area.

product owner

A person who represents the project stakeholders and is responsible for communicating and aligning project priorities between the stakeholders and development team.

entity

A person, place, or thing for which data is collected, stored, and maintained.

Data lifecycle management (DLM)

A policy-based approach to managing the flow of an enterprise's data, from its initial acquisition or creation and storage to the time when it becomes outdated and is deleted.

Utility programs

A program that helps to perform maintenance or correct problems with a computer system.

virtual private network (VPN)

A secure connection between two points on the Internet; VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet.

waterfall system development process

A sequential, multistage systems development process in which work on the next stage cannot begin until the results of the current stage are reviewed and approved or modified as necessary.

Clock Speed

A series of electronic pulses produced at a predetermined rate that affects machine cycle time.

blade server

A server that houses many individual computer motherboards that include one or more processors, computer memory, computer storage, and computer network connections.

Software as a service (SaaS)

A service that allows businesses to subscribe to Web-delivered application software.

Scrum

An agile development framework that emphasizes a team based approach in order to keep the development effort focused and moving quickly.

Platform as a service (PaaS)

An approach that provides users with a computing platform, typically including operating system, programming language execution environment, database services, and Web server.

client/server architecture

An approach to computing wherein multiple computer platforms are dedicated to special functions, such as database management, printing, communications, and program execution.

Internet of Things

If your home air conditioner has an IP address, it is part of the ____​.

Attached storage methods

Include all the options just discussed—tape, hard disk drives (including RAID devices), virtual tape systems, optical devices, and solid state secondary storage devices—which are connected directly to a single computer.

Applets

Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document.

field

Typically a name, a number, or a combination of characters that describes an aspect of a business object or activity.

Social journalism or citizen journalism ​________.

May not be as reliable as mainstream media sources

Central Processing Unit

Part of a computer that sequences and executes instructions

Data Inputs

Transferring machine-readable data into the system.

site preparation

Preparation of the location of a new system.

Application software

Programs that help users solve particular computing problems.

ACID properties

Properties (atomicity, consistency, isolation, durability) that guarantee relational database transactions are processed reliably and ensure the integrity of data in the database.

Web 2.0

The Web as a computing platform that supports software applications and the sharing of information among users.

Basic data manipulation includes: - , -, -, and -.

Selecting-Manipulating data to eliminate rows according to certain criteria. Projecting-Manipulating data to eliminate columns in a table. Joining-Manipulating data to combine two or more tables. Linking-The ability to combine two or more tables through common data attributes to form a new table with only the unique data attributes.

autonomic computing

The ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives.

Hardware independence

The ability of a software program to run on any platform, without concern for the specific underlying hardware.

Scalability

The ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period.

Database administrators (DBAs)

Skilled and trained IS professionals who hold discussions with business users to define their data needs; apply database programming languages to craft a set of databases to meet those needs; test and evaluate databases; implement changes to improve the performance of databases; and assure that data is secure from unauthorized access.

Off-the-shelf software

Software produced by software vendors to address needs that are common across businesses, organizations, or individuals.

network-management software

Software that enables a manager on a networked desktop to monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses.

personal productivity software

Software that enables users to improve their personal effectiveness, increasing the amount of work and quality of work they can do.

System software

Software that includes operating systems, utilities, and middleware that coordinate the activities and functions of the hardware and other programs throughout the computer system.

Mobile device management (MDM) software

Software that manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings while enforcing group policies for security.

Workgroup application software

Software that supports teamwork, whether team members are in the same location or dispersed around the world.

unit testing

Testing of individual components of code (subroutines, modules, and programs) to verify that each unit performs as designed.

user acceptance testing (UAT)

Testing performed by trained system users to verify that the system can complete required tasks in a real-world operating environment and perform according to the system design specifications.

Integration testing

Testing that involves linking all of the individual components together and testing them as a group to uncover any defects in the interfaces between individual components.

System testing

Testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that the information system meets all specified requirements.

Volume testing

Testing to evaluate the performance of the information system under varying yet realistic work volume and operating conditions to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required service-level performance.

accredited domain name registrars

The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names.

Data governance

The core component of data management; it defines the roles, responsibilities, and processes for ensuring that data can be trusted and used by the entire organization, with people identified and in place who are responsible for fixing and preventing issues with data.

user interface

The element of the operating system that allows people to access and interact with the computer system.

Economic feasibility

The process of determining whether the project makes financial sense and whether predicted benefits offset the cost and time needed to obtain them.

Monitoring

The process of measuring system performance by tracking the number of errors encountered, the amount of memory required, the amount of processing or CPU time needed, and other performance indicators.

Installation

The process of physically placing the computer equipment on the site and making it operational.

System investigation

The initial phase in the development of a new or modified business information system whose purpose is to gain a clear understanding of the specifics of the problem to solve or the opportunity to address.

Drill-down analysis

The interactive examination of high-level summary data in increasing detail to gain insight into certain elements—sort of like slowly peeling off the layers of an onion.

Coprocessor

The part of the computer that speeds processing by executing specific types of instructions while the CPU works on another processing activity.

scrum master

The person who coordinates all the scrum activities of a team.

System construction

The phase of system development that converts the system design into an operational system by acquiring and installing hardware and software, coding and testing software programs, creating and loading data into databases, and performing initial program testing.

system analysis

The phase of system development that focuses on gathering data on the existing system, determining the requirements for the new system, considering alternatives within identified constraints, and investigating the feasibility of alternative solutions.

DevOps

The practice of blending the tasks performed by the development and IT operations groups to enable faster and more reliable software releases.

Data visualization

The presentation of data in a pictorial or graphical format.

System review

The process of analyzing a system to make sure it is operating as intended.

Data cleansing (data cleaning or data scrubbing)

The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, or irrelevant records that reside in a database.

Operational feasibility

The process of determining how a system will be accepted by people and how well it will meet various system performance expectations.

Technical feasibility

The process of determining whether a project is feasible within the current limits of available technology.

Legal feasibility

The process of determining whether laws or regulations may prevent or limit a system development project.

Schedule feasibility

The process of determining whether the project can be completed within a desired time frame.

User preparation

The process of readying managers, decision makers, employees, other users, and stakeholders to accept and use the new system.

enterprise sphere of influence

The sphere of influence that serves the needs of an organization in its interactions with its environment.

system design

The stage of system development that answers the question, "How will the information system solve a problem?"

Hypertext Markup Language (HTML)

The standard page description language for Web pages.

Wireless communication

The transfer of information between two or more points that are not connected by an electrical conductor.

cache memory

a type of high-speed memory that a processor can access more rapidly than main memory

Wireless Access Point

When you are looking for a 'hot spot', you are searching for _____​.

User documentation

Written descriptions developed for people who use a program; in easy-to-understand language, it shows how the program can and should be used to meet the needs of its various users.

Technical documentation

Written details used by computer operators to execute the program and by analysts and programmers to solve problems or modify the program.

Big data

the term used to describe data collections that are so enormous (terabytes or more) and complex (from sensor data to social media data) that traditional data management software, hardware, and analysis processes are incapable of dealing with them.


Kaugnay na mga set ng pag-aaral

Sexual Reproduction Benefits and Disadvantages

View Set

Govt - CH 10,11,12 & 14 - Exam 3

View Set

Chapter 8: The Skeletal System Review

View Set

Oklahoma Life and Health Final Exam

View Set

Adolescence: Chapter 3 Brain and Cognitive Development

View Set

Chapter 4 Review - The Pesticide Label

View Set

US History- WWII Review Questions

View Set

Mental Health Chapter 21 Evolve Questions (Impulse Control Disorders)

View Set

PTH523: Module 13: Knee and Popliteal Fossa

View Set