Test 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Database Administrator

Creates and maintains the data dictionary; monitors database performance

GUI can into play in what programming language?

4GLs

PERT chart

Short for Program Evaluation and Review Technique chart; chart developed by the U.S. Department of Defense that analyzes the time required to complete a task and identifies the minimum time required for an entire project.

macro

Small programs the user can create to perform repetitive tasks. -Macros are simple programs that allow users to automate routine, repetitive, or difficult tasks in application software, such as word processing, spreadsheet, or database programs.

Agile development

Software development method that incorporates flexibility in the goals and scope of the project; agile projects may evolve in phases, releasing components as they are finalized, and adding functionality as it is needed or requested by users. (also known as adaptive development)

Data file = collection of ...

Tables

End User License Agreement (EULA)

A license agreement that grants permission for one installation. Also called a Single User license.

waterfall method

A linear, structured software development cycle that takes each step individually and completes it before continuing to the next phase.

request for proposal (RFP)

A method in which the vendor selects the product(s) that meets the specified requirements and then quotes the price(s) during system development. -the vendor selects the product(s) that meets specified requirements and then quotes the price(s).

request for quotation (RFQ)

A method that identifies the required products and in which the vendor quotes a price during system development.

request for information (RFI)

A method that uses a standard form to request information about a product or service during system development. -is a less formal method that uses a standard form to request information about a product or service.

pull notification

A notification sent in response to a user's actions or request. -or client pull is a style of network communication where the initial request for data originates from the client

dashboards

A page or screen providing informative visuals of data, key performance indicators, and statistics. -After data from a data warehouse or data lake is summarized and analyzed, it often is presented to decision-makers in dashboards that provide at-a-glance views, with live updates as data continues to pour in Figure 10-22.

Certified Information Systems Security Professional (CISSP)

A popular specific security certification includes Certified Information Systems Security Professional (CISSP), which tests in-depth knowledge of access control methods, information systems development, cryptography, operations security, physical security, and network and Internet security.

inference rules

A set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system.

programming language

A set of words, abbreviations, and symbols. A programmer or developer uses a programming language to create instructions for a program or app. -Each language has its own rules, or syntax, for writing instructions.

relational database management system (RDBMS)

A software program in which data is organized as a collection of tables, and relationships between tables are formed through a common field. -Access is just one of many RDBMSs, but it is the one many users begin with as they are learning about database concepts.

Fuzz testing

A testing strategy that uses automated tools to test a system by using unexpected input to ensure the app or system does not crash. Also called fuzzing.

Benefit of IDE

An IDE is an application that provides multiple programming tools in one environment. The benefit of an IDE is that you become familiar with one interface, and the tools can work together to automate and perfect your program.

4GLs

Fourth-generation programming language; provides a graphical environment in which the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code.

conditional statements

If... Then... Else statement used to instruct a program to make decisions by determining if a condition is either true or false.

Security Analyst

Implements security procedures and methods, looks for flaws in security of a company's devices and networks, works with and trains employees at all levels, and assigns permissions and network settings

Enterprise Resource Planning (ERP)

Information system that integrates MRP II with the information flow across an organization to manage and coordinate the ongoing activities of the enterprise, including product planning, manufacturing and distribution, accounting and finance, sales, human resources, and customer support.

Manufacturing Resource Planning II

Information system that is an extension of MRP that also includes product packaging and shipping, machine scheduling, financial planning, demand forecasting, tracking labor productivity, and monitoring product quality.

Material Requirements Planning (MRP)

Information system that monitors and controls inventory, material purchases, and other processes related to manufacturing operations.

Digital Forensics Analyst:

Inspects electronic data to recover documents and files from data storage devices that may have been damaged or deleted, in order to use them as evidence in a crime investigation

Systems Programmer

Installs and maintains operating system software and provides technical support to the programming staff

A popular application software certification includes....

Microsoft Office Specialist (MOS)

security audit

Test that looks at common security practices and ensures that the app or system meets the recommended criteria.

penetration testing

Testing strategy in which developers attempt to break into the app or system to pinpoint security vulnerabilities.

Variable

That belongs to the set (the value)

knowledge base

The combined subject knowledge and experiences of the human experts used in an expert system.

Machine languages

The first generation of programming languages; their instructions use a series of binary digits (0s and 1s). Coding in machine language is tedious and time consuming.

Search Engine Optimization (SEO) Expert

Writes and develops web content and website layouts so that they will appear at the beginning of search results when users search for content

Programmer

Writes code or uses a product development app to create the program's specifications

method

defines the behavior of an object. (Open/Close window)

Web developers

distinguish between the front-end and back-end portions of application development

Management Information Systems (MIS)

information system that generates accurate, timely, and organized information, so that managers and other users can make decisions, solve problems, supervise activities, and track progress. A management information system creates three basic types of reports: detailed, summary, and exception.

information system

integrating the whole company departments and pieces -is a set of hardware, software, data, people, and procedures that work together to produce information. Information systems support daily, short-term, and long-range information requirements of users in a company.

compiler

is a separate program that converts the entire source program into machine language before executing it. The output from a compiler is the object code, which the compiler stores so that the program or app can be run. The compiler also produces a list of errors in the source code.

Ethical design

is a set of evolving principles that developers should follow to enhance UX, to make data collection usage transparent, and to enable users to easily make choices that protect their privacy.

software development kit (SDK)

is a set of programming tools that includes a programming interface, compiler, debugger, and more. Often, SDKs are proprietary and can be used to develop apps that run on that company's platform and device. For example, you cannot use an Android SDK to create an app that will run on Apple's iOS.

Cybersecurity

is a term used to encompass protection of systems and networks from hacking, data theft, viruses, and other issues that disrupt services. Cybersecurity is an important, and ever-evolving, industry. Companies prioritize security expertise when hiring for technology jobs at all levels.

class

is a type of object that defines the format of the object and the actions an object can perform. (window going to be a square or circle)

T or F: Query contains all the fields of a table

F

5GLs

Fifth-generation programming language; an attempt to create programs that solve problems without requiring the programmer to write algorithms. -This proved difficult to implement; many 5GLs on the market actually are 4GLs that include some automation.

Testers

Review every aspect and functionality of a program to ensure it works as intended

relational database

A database that consists of a collection of tables that can be joined through a common field; each table contains information on a specific subject, stored in the same file.

database as a service (DBaaS)

A DBMS that runs on servers owned by a cloud provider and which users access remotely using a browser. --Amazon's Aurora --Google Cloud

object-oriented programming (OOP)

A common method of programming that focuses on objects that represent real persons, events, or transactions, and the behavior and data associated with those objects.

beta version

A prerelease version of a system or app made available at the late stages of development so that select users can start using the product to determine any additional work that is needed. An advantage of beta testing is that the product is being used by real users in the way that they actually will be using the final product. These users, called beta testers, often are selected or offered the opportunity to participate in the development of the new product in order to find errors in usage or security.

IT consultant

A professional, typically hired based on technical expertise, who provides technology services to his or her clients.

sandbox

A protected environment that guards against websites and hackers trying to save files or install malware on the user's computer. Sandboxes are used for testing purposes both by developers and users. Developers use sandboxes to test code or sections of code. Often used for revisions, the sandbox environment will mimic the environment (system and network) into which the new code will be placed. Developers can see how the code affects the environment without impacting the actual system and users. Users often work with a sandbox to familiarize themselves with a new program or information system before they use it.

drone

An aircraft that operates by an onboard computer and GPS, a remote control device, and/or an app on a computer or mobile device. -Drones have been cited in instances where a person's privacy is invaded, as a drone can look through a window or over a person's yard in ways that may be hard to detect or notice. The Federal Aviation Administration (FAA) regulations limit the height a drone can fly, and state that the drone must stay within the operator's line of sight; further, it cannot venture over airports or populated areas.

push notification

An alert sent through a user's device's notification, or by email or text.

Transaction Processing System (TPS)

An information system that captures and processes data from day-to-day business activities. Examples of transactions are deposits, payments, orders, and reservations. When you use a credit card to purchase an item, you are interacting with a transaction processing system. Information systems use batch or online transaction processing systems

expert system

An information system that captures and stores the knowledge of human experts and then imitates human reasoning and decision making. Expert systems consist of two main components: a knowledge base and inference rules. Expert systems help all levels of users make decisions. Enterprises employ expert systems in a variety of roles, such as answering customer questions, training new employees, and analyzing data. Expert systems also successfully have resolved such diverse problems as diagnosing illnesses, searching for oil, and making soup.

object

An item that can contain both data and the procedures that read or manipulate that data.

value-added reseller (VAR)

An organization that purchases products from manufacturers and then resells these products to the public, offering additional services with the product.

Web Developer

Analyzes, develops, and supports the functionality of a website, including applications that often interact with databases or other online resources

Help Desk Specialist/Help Desk Technician

Answers technology-related questions in person, on the phone, or via email or an online chat room

AI helps write...

Code

Digital Forensics Examiner

Collects and analyzes evidence found on computers, networks, mobile devices, and databases

Web Analytics Expert

Collects and measures Internet data, such as website traffic patterns and advertising, and develops reports that recommend strategies to maximize an organization's web presence

integrated development environment (IDE)

Combines advanced code editing tools, debugging tools, and a graphical user interface to interact with file management tools, to simplify the process of developing websites and applications.

Network Security Administrator

Configures routers and firewalls; specifies web protocols and enterprise technologies

Virtual Reality Engineer

Designs applications that incorporate technologies (such as VR and 3-D) with tools (such as Google Cardboard) to create storytelling tools and apps

Web Designer

Designs the layout, navigation, and overall appearance of a website with a focus on user experience; specifies a website's appearance using HTML 5, JavaScript, CSS, media, and other web design technologies

Security System Project Manager

Develops and maintains programs and tools designed to provide security to a network

What websites help with job listings?

Dice and Monster

Some principles of ethical design include:

Do not hide or obscure options that enable users to accept cookies, allow the app to access their location, or other options that may affect a user's privacy. The best policy is to ask permission before accessing a device's GPS or turning on its camera. Include an easily accessible statement that lists the privacy and security features of the app and a method of notifying users when the features change. Do not collect more data than is needed. If a user's account can be created using only a few pieces of information (such as email and username), do not ask for additional distinguishing information, such as address, age, or income level, that may be of value to data brokers but does not increase the UX. Always request permission before sending the user push notifications. A push notification is an alert sent through the user's device's notifications, or by email or text, that may let users know about new features or remind them when a game booster is available. (The opposite of a push notification is a pull notification, which is sent in response to a user's actions or request). Clearly distinguish ads from app content. For example, in a travel app, let users know which search results are sponsored and separate those from results that might be more relevant to their needs. Ethical design may also take into consideration technology addiction and the issues that arise when users spend too much time on their devices.

Drones used in the world?

Most are equipped with autopilot, a high-resolution camera, and real-time video. The drone pilot, or operator, manages the controls from the ground and can watch the drone by viewing a display attached to the base station. Insurance companies use drones to survey storm damage to buildings and property. Farmers create aerial maps to manage crop watering and fertilizing. Military uses of drones include surveillance of areas into which it would be unsafe to send personnel, to supply deliveries to combat areas, and even to detonate weapons.

Where is certification test taking take place?

Most testing done in testing facilities for Certifications

PostgreSQL

MySQL is an open-source RDBMS. PostgreSQL is free and open

If you can work when it fits in your schedule does productivity go up?

No, down

Benefit of OOP

One benefit of OOP is the ability to reuse and modify existing objects. For example, a program developed for a human resources department might have a class called Employee, with objects for both part-time and full-time employees. Both objects can be used by the payroll program as well as the health benefits program. Developers can create programs and apps faster, because they design programs using existing objects.

support and security phase

Phase of the software development life cycle that involves providing necessary maintenance for a program or app, such as fixing errors or improving functionality; also includes monitoring performance to ensure efficiency.

User Experience (UX) Designer

Plans and designs software and apps that consider a user's reaction to a program and its interface, including its efficiency, its effectiveness, and its ease of use

batch processing

Processing technique in which the computer collects data over time and processes all transactions later, as a group.

Online Transaction Processing (OLTP)

Processing technique in which the computer processes each transaction as it is entered. For example, when you book a flight on the web, the airline probably uses OLTP to schedule the flight, book the flight, and send you a confirmation message. Most transaction processing systems today use OLTP because users need information immediately. For some routine processing tasks, such as printing monthly invoices or weekly paychecks, they use batch processing.

interpreter

Program used to convert a source program into machine language by translating and then executing the machine language instructions one instruction at a time. -Interpreters do not produce or store object code. Each time the source program runs, the interpreter translates instructions statement by statement.

Copyright Agreements and Licenses

Recall that licenses are categorized by the number of allowed users: single user (also known as an end-user license agreement, or EULA), multiple users (specifies a limit to the number of users), and site license (enables an organization to provide access to as many users as it wants). Websites exist that help developers acquire trademarks and copyrights, often for a fee. You also should secure a domain name for your company or product so that you can ensure you have a website to sell, market, and support the program or app. You may want to consider hiring an attorney who specializes in digital copyrights in order to protect against piracy and to develop your license agreements.

rollforward

Recovery technique where the DBMS uses the log to reenter changes made to the database since the last save or backup. Also called forward recovery.

File Processing System Weaknesses: Redundant Data

Redundant Data: Because each department or area in an organization has its own files in a file processing system, the same fields are stored in multiple files, creating redundancy. Data redundancy occurs when you store the same data in more than one place. It wastes space and can cause inconsistencies. Duplicating data in this manner can increase the chance of errors. If a student changes their address, for example, the school must update the address in each instance. If the Address field is not changed in all the locations where it is stored or is changed incorrectly in one location, then discrepancies among the files exist. This duplication also wastes resources, such as storage space and time. When new students are added or student data is modified, file maintenance tasks consume additional time because employees must update multiple instances of the same data.

Program and App Developer

Specifies, designs, implements, tests, and documents programs and apps in a variety of fields, including robotics, operating systems, animation, and applications

document management system

System that allows for storage and management of a company's documents, such as word processing documents, presentations, and spreadsheets. -A central library stores all documents within a company or department. The system supports access control, security, version tracking of documents, and search capabilities; it also gives users the ability to check out documents to review or edit them and then check them back in when finished. Users are granted access to certain parts of the repository, depending on their needs.

Feasibility

The measure of the suitability of the development process to the individual project at any given time.

assembly language

The second generation of programming languages; uses symbolic instruction codes, such as A for add, M for multiply, and L for load. These languages can be difficult to learn.

Procedural languages

Third generation of programming languages that use a series of English-like words to write instructions, such as ADD for addition, or PRINT for printing.

Presence check

This check, when enabled, requires the user to add information to a particular field and will not allow the user to leave a field blank.

How to count in binary system?

To count in the binary system, you alternate using zeroes and ones. For example, 1 in binary is 01. To continue counting, you add a digit for each number, so two is 1 0, three is 1 1, four is 1 0 0, and so on

debuggers

Tool used to test program code, determine any errors, and provide suggestions to fix them.

Data Scientist

Uses analytics and other Big Data techniques to interpret a company's data from a variety of sources to better understand its performance, make recommendations for improvement, and predict future outcomes

Database Analyst

Uses data modeling techniques and tools to analyze and specify data usage

check digit

Validity check consisting of a number(s) or character(s) that is appended to or inserted in a primary key value.

code repository

Web-based tool programmers use to archive and host source code; often used by open source projects so that developers can access the parts of the code they want to modify. -Repositories are often used by open source projects so that developers can access the parts of the code they want to modify. Many code repositories include social aspects that enable programmers to connect with each other, comment on, and share code.

Computer-aided manufacturing (CAM)

controls production equipment, such as drills, lathes, and milling machines.

Enterprise computing

refers to the use of technology by a company's employees to meet the needs of a large business. A system is a set of components that interact to achieve a common goal. As you have learned, an information system is a set of hardware, software, data, people, and procedures that work together to produce information. Information systems support daily, short-term, and long-range information requirements of users in a company. A billing system, for example, allows a company to send invoices and receive payments from customers. Through a payroll system, employees receive paychecks — often deposited directly into their bank accounts. A manufacturing system produces the goods that customers order. Very often, these systems also are information systems.

constant

that defines the set (the key)

How are Excel and Access alike?

-Can store large amounts of data -Can search, sort, filter data -have analysis tools -can create basic charts -have sophisticated functions -can perform advanced calculations

When to use Database?

-For data storage and management -creating a Robust User Interface -Multiple Simultaneous Users -Easier to maintain data integrity -Disadvantage: Steeper learning curve; longer development time -access has security, controls data redundancy, and can create relationships

When to use Excel?

-works best with smaller data, pivot tables, trends, what if scenarios, advanced charting, conditional formatting -Data Analysis and Visualization -Disadvantages: Lack of structure; not relational

data lake

A central repository that stores both structured and unstructured data collected from existing databases and live data streams.

Consistency check

A completeness check verifies that a required field contains data. For example, some fields cannot be left blank; others require a minimum number of characters. One completeness check can ensure that data exists in a Last Name field. Another can ensure that a day, month, and year are included in a Birth Date field.

Data redundancy

A condition that occurs when the user stores the same data in more than one place; it wastes space and can cause inconsistencies.

one-to-many relationship

A database relationship that connects each record in one table to one or more records in another table. For example, most schools assign exactly one instructor to each course, and each instructor can teach many courses.

input mask

A field property that provides a visual guide for users as they enter data.

Log

A listing of activities that modify the contents of a database. More complex DBMSs maintain a log, which is a listing of activities that modify the contents of the database. If a registration department specialist modifies a student's address, for example, the change appears in the log.

Project manager

A person dedicated to coordinating project components and ensuring that each member is progressing as planned; oversees the product's team, budget, and schedule; reports to the development company's management

design phase

A phase of the software development life cycle when the project team acquires the necessary hardware and programming languages/tools, as well as develops the details of the finished product.

foreign key

A primary key field from one table that the user includes as a field in a second table to form a relationship between the two tables.

testing

A process in which each app or program function is tested to ensure it works properly.

Range check:

A range check determines whether a number is within a specified range. Assume the lowest per credit hour fee at the school is $75.00 and the highest is $370.75. A range check for the Credit Hour Fee field ensures it is a value between $75.00 and $370.75; any value entered that is less than $75.00 or greater than $370.50 would be considered invalid.

many-to-many relationship

A relationship between two tables in a database in which one record of one table relates to many records in the other table and vice versa; to create such a relationship, the user must establish a third table called a junction table that creates separate one-to-many relationships with the two original tables. For example, each student at a school can take more than one course at a time, and each course will typically have more than one student in it.

one-to-one relationship

A relationship between two tables in which each record in the first table matches at most one record in the second table, and each record in the second table matches at most one record in the first table. For example, a school's student council likely has only one president's position, and only one elected student can fill that position.

database objects

Are components of a database. 6 different types of database objects: 1. tables 2. queries 3. forms 4. reports 5. macros 6. modules From smallest to largest, the parts of a database that store data are: character, field, record, and table. Other database objects, such as records, forms, and queries, are based on data stored in tables.

Secure IT: Database Integrity

Data in a database can be more vulnerable than data in a file processing system because it can store a large amount of data in a single physical file. Many users and programs share and depend on this data. If the database is not operating properly or is damaged or destroyed, users may not be able to perform their jobs. Further, unauthorized users potentially could gain access to a single database file that contains personal and confidential data. To protect their database resources, individuals and companies should establish and follow security procedures. Managing a company's databases requires a great deal of coordination. The database administrator (DBA) is the person in the organization who is responsible for managing and coordinating all database activities, including development, maintenance, and permissions. One way the DBA ensures that the data in the database has integrity is to perform validation checks. The DBA also is responsible for securing, maintaining, and backing up the database and protecting its data.

Cognitive Engineer

Develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes

Which is better — a relational or nonrelational database?

Each database type has its strengths. For example, with a relational database your data is categorized and structured. Data is easy to navigate, and the input and meaning of the data is consistent. It is easy to define relationships between data points. With a nonrelational database, because data is not confined to structured groups, you can perform more flexible functions that allow your analysis to be more dynamic and varied. Choosing a database type is the first of many decisions you make when creating a database.

Data type check:

Field data types ensure that the correct type of data is entered into a field. For example, a numeric data type will not allow alphabetic characters.

Cloud Architect

Identifies business requirements, strategies, and solutions for cloud storage and services that meet a company's goals or needs

How can you remember the purpose or use of database objects?

If you are new to using databases, it can be difficult to recall the difference between forms, tables, queries, and reports in Access. It is helpful to think of each object in terms of how it relates to the data in the database. A form is designed for easily entering data in a table. A table holds data. A query combines data from one or more tables. A report presents data in a visually appealing format. Can you think of specific uses of each of the database objects? What value does each object have?

IT department

Interacts with customers and users of the product to assist them with any issues that arise -are responsible for ensuring that all the computer operations, mobile devices, and networks run smoothly. They also determine when and if the organization requires new hardware, systems, or software.

Scope creep

Occurs during program development when one activity has led to another that was not planned originally. Also called feature creep.

PERT vs. Gantt charts

PERT charts, sometimes called network diagrams, can be more complicated to create than Gantt charts, but are better suited than Gantt charts for planning and scheduling large, complex projects.

systems analyst

Person responsible for designing and developing an information system. Works closely with users to analyze their requirements, designs and develops new information systems, and incorporates new technologies The systems analyst is the users' primary contact person.

implementation phase

Phase of the system development life cycle during which the new or modified system is constructed, or built, and then delivered to the users. Four major activities performed include: (1) develop programs and apps, (2) install and test the new system, (3) train users, and (4) convert to the new system.

Predictive development

Software development that uses a linear, structured development cycle. -One example of predictive development is the waterfall method

Field property check

Some field properties can be used to validate data entry. For example, a maximum field length of 2 can be used on a state code field to prevent the entry of longer entries.

database administrators (DBAs)

Specially trained person who works with a database's back-end components to ensure a company's business data is safe, secure, and well managed.

file processing system

System used to store and manage data in which each department or area within an organization has its own set of files.

Quality assurance

Testing software and reporting any issues to the developers

User experience (UX)

The focus on the user's reaction to and interaction with a product, including its efficiency, effectiveness, and ease of use.

planning phase

The initial phase of the software development life cycle, including reviewing and approving requests for the project, allocating resources, and forming a project team.

validation

The process of comparing data with a set of rules or values to determine if the data meets certain criteria.

software development life cycle (SDLC)

The set of activities used to build a program or app. -The phases in the SDLC also can be applied to system development. Each activity, or phase, is a step in the life cycle. The goal in creating and using an SDLC is to produce the fastest, least expensive, and highest quality product. The steps can vary, and sometimes overlap, but most development processes include most or all of the following phases: planning, analysis, design, implementation, and support/security

Database Approach

When an organization uses a database approach, many programs and users share the data in the database. A school's database most likely, at a minimum, contains data about students, instructors, schedule of classes, and student schedules. As shown in Figure 10-5, various areas within the school share and interact with the data in this database. The database does secure its data, however, so that only authorized users can access certain data items.

primary key

is a field that uniquely identifies each record in a table, such as Student ID. Typically, every table in a relational database has a primary key. If the information in a table does not naturally include a field with unique information, the database will assign an automatically generated number to each record that is unique and then use that number field as the primary key.

Development

is the process of creating information systems or programs and apps from the idea stage to distribution to users. Recall that programs and apps, also known as software, are coded instructions to control a computer or device, and that an information system is collection of hardware, software, data, people, and procedures that work together to produce information. During development, many steps and people are involved in programming, designing, coding, and testing.

What kind of database is Access?

relational database

data dictionary

A DBMS element that contains data about each table in the database and each field in those tables. Sometimes called a repository. For each table, it stores details such as the table name, a description, the table's relationship to other tables, and the number of records in the table. For each field, it stores details such as the field name, description, field type, field size, default value, validation rules and the field's relationship to other fields.

How DBMS uses validation?

A DBMS uses the data dictionary to perform validation checks to maintain the integrity of the data. When users enter data, the data dictionary verifies that the entered data matches the field's data type. For example, the data dictionary allows only dates to be entered in a DateAdmitted field. The data dictionary also can limit the type of data that can be entered, often allowing a user to select from a list. For example, the data dictionary ensures that the State field contains a valid two-letter state code, such as IA, by presenting a list of valid state codes to the user.

How does DBMS use data dictionary?

A Database Management System uses the data dictionary to perform validation checks to maintain the integrity of the data. When users enter data, the data dictionary verifies that the entered data matches the field's data type. For example, the data dictionary allows only dates to be entered in a DateAdmitted field. The data dictionary also can limit the type of data that can be entered, often allowing a user to select from a list. For example, the data dictionary ensures that the State field contains a valid two-letter state code, such as IA, by presenting a list of valid state codes to the user.

data warehouse

A central repository that stores data collected from existing databases and live data streams.

Gantt chart

A chart that shows project schedule timelines. developed by Henry L. Gantt, is a bar chart that uses horizontal bars to show project phases or activities. The left side, or vertical axis, displays the list of required activities. A horizontal axis across the top or bottom of the chart represents time.

Documentation

A collection and summary of the data, information, and deliverables specific to a project. -To start the development process, users write a formal request for a new or modified information system or app, which is called a project request or request for system services. The project request becomes the first item of documentation for the project.

Structured Query Language

A popular query language that allows users to manage, update, and retrieve data.

blockchain

A series (or chain) of records stored in encrypted blocks across a network. Often, blockchains are stored across nodes on a peer-to-peer network. Each node follows protocols designed to validate a new block of data, as well as report its existence as part of the chain. A blockchain consists of infrastructure (hardware), network (nodes), consensus (validation), data (blocks), and an application so that users can modify and manage the blockchain.

joint-application design (JAD) session

A series of lengthy, structured group meetings in which users and IT professionals work together to design or develop an application. Also called a focus group.

database management system (DBMS)

A software program that lets you create databases and then manipulate data in them. (or database program)

prototype

A working model that demonstrates the functionality of the program or app. The team considers UX when designing with a prototype that includes the format, media, and sample data.

Format check

Access allows the use of an input mask to control how data is formatted in a field. An input mask is a field property that provides a visual guide for users as they enter data. Figure 10-20 shows the Input Mask wizard. (A wizard is a tool that guides you through the steps of a process or task by asking a series of questions or presenting options.) For example, an input mask might require that a ZIP code be entered using nine digits instead of five.

Alphabetic/numeric check

An alphabetic check ensures that users enter only alphabetic data into a field. A numeric check ensures that users enter only numeric data into a field. For example, data in a phone number field should contain only numerals. Data in a Current Enrollment field should contain numerals.

Nonrelational Database (NoSQL)

An unstructured database that uses a variety of approaches to store many kinds of data. Also called a nonrelational database.

deliverable

Any tangible item, such as a chart, diagram, report, or program file. Charts can help to create schedules and assign tasks.

Confidentiality, Integrity, and Availability (CIA) triad

Classic security model that addresses database concerns by defining the need for confidentiality (C), integrity (I), and availability (A). Confidentiality implies the need to protect a database from unauthorized access, as discussed previously. Integrity refers to protecting data from unauthorized changes. Availability indicates the need to ensure that data is accessible by authorized users when needed.

Parallel conversion

Conversion strategy that consists of running the old system alongside the new system for a specified time. The advantage of this strategy is that you can fix any problems in the new product before you terminate the old product. The disadvantage is that it is costly to operate two products or systems at the same time.

phased conversion

Conversion strategy where each location converts at a separate time. -For example, an accounting system might convert its accounts receivable, accounts payable, general ledger, and payroll sites in separate phases. Each site can use a direct or parallel conversion. Larger systems with multiple sites may use a phased conversion.

pilot conversion

Conversion strategy where only one location in the organization uses the new system so that it can be tested.

direct conversion

Conversion strategy where the user stops using the old system and begins using the new system on a certain date. The advantage of this strategy is that it requires no transition costs and is a quick implementation technique. The disadvantage is that it is extremely risky and can disrupt operations seriously if the new product does not work correctly the first time.

Designer

Develops the program's user interface, including colors, fonts, and layout

scope

Goals, objectives, and expectations of a project.

navigation pane

In Access, a pane in the program window that lets the user move between objects (tables, queries, forms, reports, macros, and modules) in the database.

Advantage and Disadvantage of Relational Database

In many situations, the enforced consistency of a relational database (with the same kinds of information in every record in a table) is an advantage. This consistency, however, comes with the limitation that data must generally be represented by text or numbers rather than images, videos, or other table types. As the Internet — and particularly web applications — became more popular, this restriction led to the emergence of more powerful database technologies better suited to managing Big Data.

analysis phase

Phase of the software development life cycle that includes conducting a preliminary investigation and performing detailed analysis. -Create system proposal -The preliminary investigation sometimes is called a feasibility study. The goal of this part of the phase is to determine if the project is worth pursuing. This is a critical phase, as it provides the customer or client with a clear-cut plan for achieving the goals. If a program gets developed without a feasibility study, the work put into development could be wasted if stakeholders are not happy with the final product.

Data visualization

Power View tables, charts, and maps that present data in a visual way. is the process of presenting data graphically in the form of charts, maps, or other pictorial formats in order to understand the resulting information easily. As the size of databases grows, data visualizations make it possible to interpret complex data sets, find relationships among data items, and discover patterns that can provide useful information. Data visualization products often present multiple objects to show the data in different formats.

Function creep

Problem that occurs when a company uses the technology intended for one purpose for an entirely different purpose. -One example of function creep is when companies use or sell customer data collected through sales transactions using customer loyalty cards or other customer-tracking methods. While some companies use data for their own purposes, such as to plan inventory or identify sales trends, others sell to data brokers or businesses that perform marketing surveys or generate credit reports.

rollback

Recovery technique where the DBMS uses the log to undo any changes made to the database during a certain period. The rollback restores the database to its condition prior to the failure. Also called backward recovery.

Advantages of the database approach include the following:

Reduced data redundancy: Most data items are stored in only one file, which greatly reduces duplicate data. For example, a school's database would record a student's name and address only once. When student data is entered or changed, one employee makes the change only once. Improved data integrity: When users modify data in the database, they make changes only once. Thus, the database approach increases the data's integrity by reducing the possibility of introducing inconsistencies or errors. Shared data: The data in a database environment belongs to and is shared, usually over a network, by the entire organization. This data is independent of, or separate from, the programs that access the data. Organizations that use databases typically have security settings to define who can access, add, modify, and delete the data in a database. Easier access: The database approach allows nontechnical users to access and maintain data, provided they have the necessary privileges. Many computer users also can develop smaller databases themselves, without professional assistance. Reduced development time: It often is easier and faster to develop programs that use the database approach. Many DBMSs include several tools to assist in developing programs, which further reduces the development time.

Data and Information Gathering Techniques

Review documentation: By reviewing documentation, such as organization charts, memos, and meeting minutes, systems analysts learn about the history of a project. Documentation also provides information about the organization, such as its operations, weaknesses, and strengths. Observe: Observing people helps systems analysts understand exactly how they perform a task. Likewise, observing a machine allows someone to see how it works. Survey: To obtain data and information from a large number of people, systems analysts distribute surveys. Interview: The interview is the most important data and information gathering technique for the systems analyst. It allows the systems analyst to clarify responses and probe during face-to-face feedback. JAD sessions: Instead of a single one-on-one interview, analysts often use joint-application design sessions to gather data and information. A joint-application design (JAD) session, or focus group, consists of a series of lengthy, structured group meetings in which users and IT professionals work together to design or develop an application. Research: Newspapers, technology magazines and journals, reference books, trade shows, the web, vendors, and consultants are excellent sources of information. These sources can provide the systems analyst with information, such as the latest hardware and software products and explanations of new processes and procedures. In addition, systems analysts often collect website statistics, such as the number of visitors and most-visited webpages, etc., and then evaluate these statistics as part of their research.

Database Designer

Specifies the structure, interface, and requirements of a large-scale database; determines security and permissions for users

Big Data

These large and complex data sources that defy traditional data processing methods -The massive volume of data kept by a typical organization complicates storage and analysis processes, especially when you consider that data is often not structured in a way that allows it to be stored in traditional relational database tables.

Advantages and Disadvantages of Non relational Database

These unstructured databases use a variety of approaches to store many kinds of data. One simple example is a key-value database. With a nonrelational database, because data is not confined to structured groups, you can perform more flexible functions that allow your analysis to be more dynamic and varied. Nonrelational databases do not offer the same kind of data consistency or validation as relational databases. They are, however, highly scalable, which means the resources available to the database can be increased to manage the massive volume of Big Data that continues to increase continually. This is possible because a nonrelational database can be distributed across multiple servers, which makes it easy to add more servers without compromising the database's design. Also, the data stored in a nonrelational database is more protected from loss due to a system or hardware failure, which is to say the database offers high availability. Many other types of databases exist, depending on the hardware architecture that supports the database, the kinds of data the database is designed to work with, and the ways data is organized within the database.

Multiple choice check

This check can be enforced by using a data type that allows users to choose from a preexisting list, such as a list of days of the week. While these validity checks cannot guarantee that the data is accurate, they can serve as a guide to help database users notice if they are entering incorrect data. For example, if you start to type your street address into a phone number field, the database will alert you to the problem and ask for more appropriate information.

Uniqueness check

This check, when enabled, requires the user to enter information unique to that record. For example, if someone has already created an account with a certain username, no one else can create another account with that same username.

How the UX comes into play in the development process?

UX comes into play during all aspects of the software development process. During the analysis phase, the needs of the customer help decide the scope of the project. A designer takes into account how the user will interact with the program to come up with a design that is appealing and easy to use. Programmers and testers work together to recreate and troubleshoot potential issues or areas of confusion. Designers use wireframes, which are blueprints of different aspects of the program that also indicate how a user gets from one area of the program to another

The following lists several best practices in database security:

Users given access to the database should have a profile that includes a long, secure password for their account that must be changed periodically. Users should be given only the minimum access privileges required to do their job, such as the ability to view data but not change it or delete it. Web servers are designed to be accessible to the open Internet, but database servers should reside in more secure segments of the network behind a firewall. Sensitive data in a database should be encrypted. If a hacker manages to access a password database, for example, encryption can provide a last layer of defense that might prevent the attacker from actually using the stolen information. Not all data in the database must be encrypted, as that could severely slow the database's overall performance. The data that indicates a person's identity (such as a name or Social Security number), contact information, or other personal information (such as medical records), though, should be encrypted. Any backup files also should be encrypted. Limit the number of unsuccessful sign-in attempts in a specified period, and record when users access the database.

Sort and Filter Data

You can sort the records in a table according to the contents of one or more fields. For example, you could sort the records in a table alphabetically by last name, or numerically by ZIP code. You can choose to sort records in ascending order (A to Z, or lowest number to highest number) or in descending order (Z to A, or highest number to lowest number). You also can sort a table by its primary key. A primary key is a field that uniquely identifies each record in a table, such as Student ID. You might also want to temporarily hide some of the records in a table while you work with a few, specific records. To do this, you can apply a filter. For example, you might want to see a list of all students who live in Iowa (IA). To do this, you can filter the StudentState field for all records where the State equals IA so that all other records are hidden, as shown in Figure 10-4. The other records still exist; they are just temporarily not visible.

Spreadsheet vs. Database

You might have used a spreadsheet to track some basic information, such as a directory of contact information or expenses in a budget. While spreadsheets fill an important role, they are unable to perform the sophisticated manipulations that a database can. A spreadsheet is designed to store numbers, charts, and other data in a grid of cells where it can perform automatic recalculations as data changes. The data is organized in a grid of rows and columns; and while you can have multiple worksheets within a spreadsheet, these worksheets are not designed to fluidly interact with one another. In other words, the spreadsheet software is not capable of recognizing any significant relationships among each worksheet except in the form of performing calculations. While documents and spreadsheets do store information, generally that information is isolated from the information held in other documents or spreadsheets. Document and spreadsheet files are stored as unrelated objects in a file system; you can open one file and use it, but the data inside it is not connected in any way to data in a different file. Databases offer the advantage of showing connections between different sets of data. both are used to store and manage sets of data - a spreadsheet stores data values in cells with multiple cells represented in a system of rows and columns - cells can refer to other cells - even in other worksheets or workbooks - and the spreadsheet can include cells that carry out processing on other cell values - a database typically stores data values in tables - each table has a name and one or more columns and rows - a row is called a record and a column is called a field - databases can enforce relationships b/w records in different tables

index

is a database object that is created based on a field or combination of fields. The index speeds up searching and sorting records in a table. The index on the primary key field keeps a constantly updated list of all records in that table sorted in numerical order by those unique numbers. Even if users re-sort the records according to last name in alphabetical order or in chronological order by birthdate, the DBMS can always very quickly reorganize the records by the primary key because of the index on that field.

Validity checks

sometimes called validation rules, reduce data entry errors and thus enhance the data's integrity. If the data fails a validity check, the computer either should not allow the invalid data to be stored, or it should display an error message that instructs the user to enter the data again.


Kaugnay na mga set ng pag-aaral

Pharmacology ATI study questions part 16

View Set

IA Ch. 22 Accounting Changes and Error Analysis

View Set

Requirements Elicitation (kravinsamling)

View Set