Exam 2 Chs 5-8 Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Database

a collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data.

Data mining in business

a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs

data mart

a subset of a data warehouse in which a summarized or highly focused portion of the organization data is placed in a separate databased for a specific population of user, bookseller Barnes & Noble use this by a one point of sale data in retail stores, another for college bookstores sales, and a third for online sales

Cyber attacks

any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source

data dictionary

automated or manual file storing definitions of data elements and their characteristics, for large corporate databased may capture additional info such as usage, ownership authorization, security, and the individuals, business function, program, and report that use each data element

data definition

capability to specify the structure of the content of the database, it would be used to create databased tables and to define the characteristic of the field in each table

Data Cleansing

detects and corrects incorrect, incomplete, improperly formatted, and redundant data, not only correct error but also enforce consistency among different set of data that originate in separate info system

Outsourcing

enables a firm to contract custom software development or maintenance of existing legacy program to outside firms which often operate offshore in low wage area of the world

data governance

encompasses policies and procedures through which data can be managed as an organizational resource, it established the organization rules for sharing, disseminating, acquiring, standardizing, classifying and inventorying info.

Malware

include a variety of threats such as computer viruses, worm, and trojan horses

networking equipment

includes the wires, modems, routers, and cables that are used to connect the system

data warehouse

is a databased that stores current and historical data of potential interest to decision makers throughout the company, the data originated in many core operational transaction systems such as systems for sales, customer account, and manufacturing and may include data from website transaction

Databased Management System (DBMS)

is software that enables an organization to centralized data, manage, them efficiently, and provide access to the stored data by application programs, the DBMS act as an interface between application programs and the physical data files.

data redundancy

is the presence of duplicate data in multiple data files so that the same data are stored in more than one place or location. this data occur when different groups in an organization independently collect the same piece of data and store it independently

Virtualization

is the process of presenting a set of computing resources (such as computing power or data storage) so that they can tell be accessed in ways that are not restricted by physical or geographical location

data inconsistency

occurs when the same data element has different values

Legacy systems

older Transaction Processing System created for mainframes computers that continue to be used to avoid the high cost of replacing or redesigning them

Scalability

refer to the ability of a computer, product, or system to expand to serve a large number of user without breaking down

Cloud computing

refers to a model of computing that provided access to a shared pool of computing resources (computer, storage, application, and services) over the network often the internet. allows organizations to avoid the expenses of maintaining their own hardware and software, relying on the cloud instead

Network Topologies

represents a network's physical layout, including the arrangement of computers and cables

Challenges in system building

the challenge is to maintain it

Net neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers.

data quality audit

which is a structured survey of the accuracy and level of completeness of the data in an information system. can be performed by surveying entire data files surveying samples from data files or surveying end user for their perceptions of data quality

Types of software

•Software outsourcing and cloud services -Software packages and enterprise software -Software outsourcing -Cloud-based software services and tools Service Level Agreements (SLAs): formal agreement with service providers -Mashups and apps

Moore's law

-Computing power doubles every 2 years -Nanotechnology the number of transistors on a chip doubles ever 18 months; computing power doubles every 18 months; and the price of computing falls by half every 18 months

Metcalfe's law

-Value or power of a network grows exponentially as a function of the number of network members

Importance of standards

1) To provide a uniform set of standards specifying minimum acceptable accuracies of control survey for various purposes. 2) To establish specifications for instruments, field procedures, and misclosure checks to ensure that the intended level of accuracy is achieved.

database server

A computer in a client/server environment that is responsible for running a DBMS to process SQL statements and perform database management tasks, the DBMS receives the SQL request and provides the required data.

Network protocols

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design

Benefits/risks of cloud computing

Benefits: Productive, Collaborate, Reduce cost, respond quickly to market change, Mining insights from data, expand scope of operations, customize Risk: Legacy, Reliability, Privacy, Security, Legal, not knowing location of your data, weak restoration, unable to investigate provider, provider might go out of business, outsourcing corporate security measures, may no use audits or security certifications, using shared environment

Data Manipulation Language (DML)

DBMS language that changes, delete, and retrieve data from the database. content, including data element creations, updates, insertions, and deletions

Network Configuration

Determining the number and location of suppliers, warehouses, production/operations facilities, and distribution centers

data lake

Repository for raw unstructured data or structured data that for the most part have not yet been analyzed and the data can e accessed in many ways. It stores these data in their native format until they are needed.


Ensembles d'études connexes

Welcome to Section 5, Financing Documents

View Set

ch.2 -Suffixes-Suffixes That Pertain to Pathological Conditions

View Set

Chapter 18 Meghan Provenzano, Chapter 18, 17

View Set

Taxes Vocabulary - Payroll Taxes

View Set

Antepartum NCLEX style questions Module 6 Chapter 4

View Set

Chapter 55: Management of Patients with Urinary Disorders

View Set

Chapter 16: Reading/Study Guide Terms Review

View Set

questions that could possibly be written from the lab practical quizzes

View Set