CIS FINAL
data element
The smallest or basic unit of information
data model
logical data structures that detail the relationships among data elements using graphics or pictures. a diagram that represents entities in the database and their relationships
computer aided software engineering
tools are software suites that automate systems analysis, design, and development
Double Spend
- Scenario, in the Bitcoin network, where someone tries to send a bitcoin transaction to two different recipients at the same time. - However, once a bitcoin transaction is confirmed, it makes it nearly impossible to double spend it. - The more confirmations that a particular transaction has, the harder it becomes to double spend the bitcoins.
loops
A loop is used to repeat code in your program.
function
1. A relationship from one set (called the domain) to another set (called the range) that assigns to each element of the domain exactly one element of the range. 2. The action or actions that an item is designed to perform.
data artist
A business analytics (BA) specialist who creates graphs charts infographics and other visual tools that help people understand complex data.
grid computing
A collection of computers, often geographically dispersed, that are coordinated to solve a common problem
record
A collection of fields that appear as a row in a database or table.
virtual reality
A computer-simulated environment that can be a simulation of the real world or an imaginary world
FROM (SQL)
A condition that controls where the operation is executed Syntax: <THIS> <TABLE>
cryptocurrency
A digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds.
Blockchain
A digital ledger in which transactions made in bitcoin or another cryptocurrency are recorded chronologically and publicly.
Digital Ledger
A digital ledger is a bookkeeping list of assets (money, property, ideas...), identified ownership, and transactions that record the transfer of ownership among participants. All transactions are recorded with a date, time, participant names and other information. It is a linear list to which information can only be added, with older records retained to preserve the full history of each asset.
Primary Key
A field (or group of fields) that uniquely identifies a given entity in a table
Project Plan
A formal, approved document that manages and controls project execution
Entity Relationship Diagram
A methodology for documenting databases illustrating the relationship between various entities in the database. used to clarify table relationships in a relational database
hash
A number generated by an algorithm from a text string. Also known as a message digest.
Foreign Key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
ETL (extraction, transformation, and loading)
A process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse
information scrubbing
A process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
one-to-many relationship
A relationship between two tables in a database in which one record in the primary table can match many (zero, one, or many) records in the related table.
project
A temporary activity a company undertakes to create a unique product, service, or result
Analytics
A term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions. The science of fact-based decision making
Data Visualization
A term used to describe the use of graphical displays to summarize and present information about a data set. describes technologies that allow users to see or visualize data to transform information into a business perspective
table
An arrangement of data made up of horizontal rows and vertical columns.
Symmetric Encryption
An encryption method whereby the same key is used to encode and to decode the message Symmetric keys must be handed off between people sharing an encrypted file Exchanging a symmetric key securely is typically done face-to-face
What is the primary difference between an entity and an attribute?
An entity (also known as a table) stores information about people, places, or events, whereas an attribute is a column or specific field of the data elements associated with an entity.
Multitasking
An operating system feature that allows more than one application to run at a time.
one-to-one
Each entity in the relationship will have exactly one related entity
What are advantages of Bitcoin ?
Any well-connected node in the Bitcoin blockchain can determine, with certainty, whether a transaction does or does not exist in the data set. A prohibitively high cost to attempt to rewrite or alter transaction history
narrow ai
Artificial intelligence in which a program is written to accomplish a specific task.
CAD/CAM
Computer Aided Drawing-Computer Aided Manufacturing. The instructions stored in a computer that will be translated to very precise operating instructions to a robot, for tasks such as assembling cars or laser-cutting signage.
Decentralization
Degree to which decision-making authority is given to lower levels in an organization's hierarchy. the location of a significant amount of authority in the lower levels of the organization
redundant data
Duplicate information in a database.
many-to-many relationship
In databases, a relationship in which one record in Table A can relate to many matching records in Table B, and vice versa. between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity
JOIN (SQL)
Joins allow you to link data from two or more tables together into a single query result--from one single SELECT statement. Forms relationships between tables ex. SELECT customer_info.firstname, customer_info.lastname, purchases.item FROM customer_info, purchases WHERE customer_info.customer_number = purchases.customer_number;
general ai
Machines that have all the senses (maybe more), all the reason, and think just like people do
Operating System Software
Programs that make the computer work. ex: Windows 8, vista, GUI, Linux.
SELECT (SQL)
Returns the records from the database that match the given input Syntax: <THIS> <DATA> FROM <TABLE> [EXP]
Code Blocks
Segments of code identified by beginning with { and ending with }.
artificial intelligence
Simulates human intelligence such as the ability to reason and learn
peer-to-peer
Software (often free) which allows you to download files directly from a single computer anywhere in the world that also has the same software installed. Sometimes known as P2P, this is a commonly used way of accessing music, software and movies. Sometimes referred to as P2P. A network model where all computers on the network are equal and data may be shared from computer to computer.
Application Software
Software that performs some useful task such as word processing or playing a game for a user.
WHERE
The "Where" SQL clause can be used to link two tables.
AND
The AND operator displays a record if all the conditions separated by AND are TRUE.
Systems Development Life Cycle (SDLC)
The overall process for developing information systems from planning and analysis through implementation and maintenance
Conversion
The process of transferring information from a legacy system to a new one.
Bitcoin uses encryption to maintain the integrity of transactions, which is why it is called a ________________.
cryptocurrency
knowledge base
a body of knowledge in a particular area that makes it easier to master new information in that area
fuzzy logic
a branch of mathematics that deals with uncertainties by simulating the processes of human reasoning. a mathematical method of handling imprecise or subjective information
Big Data
a broad term for datasets so large or complex that traditional data processing applications are inadequate.
neural network
a category of AI that attempts to emulate the way the human brain works
information integrity
a measure of the quality of information
DBMS (Database Management System)
a program used to create, process, and administer a database. a product used for the storage and organization of data that typically has defined formats and structures
field
a single characteristic of data that appears in a table as a column
Multi-tenancy
a single instance of a system serves multiple customers
Bitcoin
a type of digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.
data scientist
an individual who searches through multiple, disparate data sources in order to discover hidden insights that will provide a competitive advantage. extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
SQL (Structured Query Language)
an international standard language for processing a database
legacy system
an old system that is fast approaching or beyond the end of its useful life within an organization
Business Intelligence
analyzing large amounts of data for strategic decision making. Information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making
Structured Query Language (SQL)
asks users to write lines of code to answer questions against a database
A doctor notices that a patient is due for a certain medical procedure or test. The doctor initiates a transaction marked with the patient's unique digital identity within the individual's ______ wallet.
blockchain
information cube
common term for the representation of multidimensional information
data mart
contains a subset of data warehouse information
data dictionary
contains the logical structure for the information in a database. compiles all of the metadata about the data elements in the data model
Database Management System (DBMS)
creates, reads, updates, and deletes data in a database while controlling access and security
Metadata
data that describes data
bugs
defects in the code of an information system
business rule
defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer
project scope
describes the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project
By issuing concert tickets on the blockchain, fans can verify transfer of ownership from one digital wallet to another, rather than worrying whether the PDF (or paper) ticket they received was sold to 10 other people. This is an example of how blockchain solves the ____________ problem.
double-spend
Single-tenancy
each customer or tenant must purchase and maintain an individual system
dirty data
erroneous or flawed data
Cardinality
expresses the specific number of instances in an entity
Process Modeling
graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment
Data
is the raw material that computers receive, store, manipulate, transform and deliver as part of an activity. By organizing and providing context, data becomes information. Information can be applied to specific tasks where it can inform and guide decisions, or simply entertain.
Database
maintains information about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)
Algorithm
mathematical formulas placed in software that performs an analysis on a data set.
software customization
modifies software to meet specific user or business requirements
distributed computing
processes and manages algorithms across many machines in a computing environment
integrity constraints
rules that help ensure the quality of information
Virtualization
running multiple systems simultaneously on one physical computer. the practice of sharing or pooling computing resources, such as servers and storage devices
entity
stores information about a person, place, thing, transaction, or event
Cloud Computing
stores, manages, and processes data and applications over the internet rather than on a personal computer or server
Off-the-shelf application software
supports general business processes and does not require any specific software customization to meet the organization's needs
fast data
the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value
data aggregation
the collection of data from various sources for the purpose of data processing
attribute
the data elements associated with an entity
information redundancy
the duplication of data, or the storage of the same data in multiple places
Mutation
the process within a genetic algorithm of randomly trying combinations and evaluating the success or failure of the outcome.
Business requirement
the specific business requests the system must meet to be successful
augmented reality
the viewing of the physical world with computer-generated layers of information added to it. A combination of our normal sense of the objects around us with an overlay of information displayed.
Deep Learning
understanding the "why" and "how" behind the details Involves developing the tools of critical thinking and applying them to whatever challenges you encounter now and in the future.
natural language processing
uses AI techniques to enable computers to generate and understand natural human languages, such as English
Miners
who complete complex mathematical problems. When all miners arrive at the same unique solution, the transaction is verified and recorded as a new 'block'. New transaction blocks are added to the digital ledger in a chained fashion, forming a 'blockchain'. The distribution of miners means that the system cannot be hacked by a single source. If anyone tries to tamper with one ledger, all of the nodes will disagree on the integrity of that ledger and will refuse to incorporate the transaction into the blockchain