Info systems

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Match the response set with the appropriate IS Data Type

'a' 'b' 'c': matches Character '1' '2' '3': matches Integer 'Chicken' 'Goat' 'Sheep': matches String '1/3' '4/11' '3.141592653589793238': matches Float 'True' 'False': matches Boolean

Match the response Set with the appropriate Business Analytics Data Type.

'a' 'b' 'c': matches Ordinal '1' '2' '3': matches Discrete 'Chicken' 'Goat' 'Sheep': matches Nominal '1/3' '4/11' '3.141592653589793238': matches Continuous

If you have a table 'Alphabet', that has one column called 'Letter' and each record has a unique letter of the alphabet, what is the value of the result set for the SQL Statement: SELECT COUNT(letter) FROM Alphabet

1

Evolution ( Data Reporting Needs Served)

1st Tier: Keep the doors open ( support transactions & maintain operations) 2nd Tier: Know the past & current operations 3rd Tier: Combine internal/external data to provide insight to future options/probabilities & help set strategy

If you have a table 'Alphabet', that has one column called 'Letter' and each record has a unique letter of the alphabet, what is the value of the result set for the SQL Statement: SELECT COUNT(Letter)FROM Alphabet WHERE NOT Letter='a'

25

If you have a table 'Alphabet', that has one column called 'letter' and each record has a unique letter of the alphabet, what is the value of the result set for the SQL Statement: SELECT COUNT(letter)FROM Alphabet WHERE letter='a' or letter ='b' or letter = 'c'

3

Multi-Processing(Parallel Processing)

A large problem can often be divided into smaller ones, which then all the component of the large problem can be solved all at the same time

The Agile product backlog is:

A list of product features wanted by the product owner

How cybercriminal gets access to cloud computing system> extracts the data

A. Hacker studies company's structure for weaknesses (aka exploits people /technology) B. Finds a way to approach a targeted individual (i.e., social media accounts, interests, history) C. Victim tricked into giving access to the company's network. (Technological, via malware sneakily installed on a victim's computer/ Social engineering, by gaining trust and persuading someone to give out their login credentials)

Characteristics of High-Quality Data

Accurate Complete Consistent Unique Timely

What reason would you want to create a dashboard alongside benchmark data?

All of the answers are correct

Which statement best describes how variables are used in programs?

All the options are correct

API

Application programming interface Software intermediary that allows two applications to talk to each other Think of as Lego parts in building your application(If there is another software that already does the job, can employ (call it -sending what I have) and it returns what I need.

IS Data Types of unstructured Data

BLOB (Binary Large OBject)(images, audio files, and video clips) CLOB (Character Large OBject)often source remains at native location and CLOB field is an address that references the location of the data (i.e., books, medical record document

Business Continuity Plan

Back up and recovery Disaster recovery Business continuity planning

Distinguish between five common types of phishing attacks.

Bulk Phishing: matches Sending a large number of untargeted emails in attempt to fool a victim into taking action Spear Phishing: matches Type of phishing that targets individuals. Whaling: matches Form of spear phishing that targets high-ranking victims within a company. Vishing: matches Phishing attacks performed over the phone or VOIP Smishing: matches Attacks using text message to mislead of deceive a victim Angler Phishing: matches Tricking by way of responding to info the victim has posted on social media

What is the result if you compile / run the following Python statement?A=10B=A-1if A==B: print("Draw!")elif A>B: print("Bummer!")else: print("Oops!")?

Bummer

100% Stacked Column

Compare % that each value contributes to the total overtime

Pie chart

Compare categories, or parts of a whole each slice of pie represents the size of the category in proportion to the size of the alternative categories, with the total equaling 100%

Cluster Column

Compare values across a few categories

Match the Data Privacy, Confidentiality and Ethics terms to their definition

DATA PRIVACY: matches Responsibly collecting - using and storing data about people - in line with their expectations - regulations and laws​ CONFIDENTIALITY: matches The assurance that information remain available only to those authorized to view them DATA ETHICS: matches Doing the right thing with data - considering the human impact from all perspectives and making decisions based on brand values

Which most closely reflects the three branches of the government?

Data Governance

Data loss

Data alteration: info changed /cannot be restored to previous state Unreliable storage medium outage: data lost due to problems on cloud provider's side Data deletion: accidental/wrongful erasure of info with no backups (i.e., human error, messy database structure, system glitch, malicious intent) Loss of access: info in system but unavailable due to lack of encryption keys and other credentials

Rearrange the levels within the Gartner's Analytics maturity model, sequence from lowest level of difficulty and value to highest level.

Descriptive Analytics (What happened?) Diagnostic Analytics (Why did it happen?) Predictive Analytics (What will happen?) Prescriptive Analytics (How can we make it happen?)

Intelligent Automation & Decision

Descriptive: what happened Diagnostic: why did it happen Predictive: what will happen Prescriptive: what should we do

DoS Attack (Denial-of-Service)

DoS Attack make system unusable so deny access/disrupt workflow Brute force attack from multiple sources (classic DoS) More elaborate attacks exploits system(i.e., image rendering, feed streaming, content delivery) During attack, the system resources are stretched thin. Lack of resources to scale causes multiple speed and stability issues. Can cause the app to work slow/unable to load - Frustrating to users. Company tries to identify/neuter sources of the disruption> Increased spending on the increased cloud resources Up-to-date Intrusion Detection System: identify anomalous traffic, provide early warning based on credentials and behavioral factors (i.e., a cloud security break-in alarm.) Firewall Traffic Type Inspection features to check the source and destination of incoming traffic, sorts out good and bad traffic and swiftly cut out the bad. Source Rate Limiting - one of the critical goals of DoS is to consume bandwidth. Blocking of the IP addresses, that are considered to be a source of an attack

ETL is moving data from a Transactional Database that is optimized for operations/workflows to a Reporting database the supports analytics. What does the ETL acronym stand for?

Extract, transform, load

AI is really good at responding to math questions because they are all formulas.

False

Match the Database Type with the featured characteristic

Hierarchal database: parent-child relationship Relational database: relationships in the form of tables (ex. My SQL, Oracle, Microsoft, SQL Server "No SQL Database" Not Only SQL: suited for semi-structured or unstructured data. Useful for storing large volumes of raw data Object-oriented databases(OODB): storage of all data types, stored in the form of objects, each object contains both data(attributes or fields) and the methods(functions) that can operate on that data

On-Premise

IT infrastructure hardware and software applications that are hosted on-site

I need an off-site data storage area to support my disaster recovery plans. What cloud model would I be looking at?

IaaS: Infrastructure as a Service

An API might enable a website developer to:

Integrate a Walk Score (provides walkability analysis and apartment search tools) from another system into the website they are developing

List in sequence the evolution an entity takes in utilizing IS and data

Keep the doors open (support transactions and maintain operations): matches 1st Tier Know the past and current operations: matches 2nd Tier Combine internal/external data to provide insight to future options/probabilities and help set strategy: matches 3rd Tier

Bandwidth is the maximum amount of data that can pass from one point to another in a unit of time measured by Bit (Short for binary digit: Smallest element of data (0 or 1)). Match the bandwidth term with the measure of bits per second.

Kilobit(Kb): matches 1000 bps Megabit(Mb): matches 1000 Kbps Gigabit(Gb): matches 1000 Mbps Terabit(Tb): matches 1000 Gbps Petabit(Pb): matches 1000 Tbps

Graphical User Interface

Methods of user-centered design are used to ensure that visual language introduced in design is well-tailored to tasks Goal is to enhance efficiency and ease of use: usability Self documenting Minimal clicks Enables clean data (bad data is worse than no data) Works well on any device Aesthetically Pleasing and Clear Compatibility and Configurable Comprehensive Consistency Control and Directiveness Efficiency and Familiarity and Predictability Keep Things Simple Forgiveness and Recovery

I am a UI student who has this great idea that uses public available data to build an app that shares where available parking exists and capitalizes on crowdsourcing to post sightings of parking tickets attendants at work. What cloud service model do I shop for?

PaaS: Platform as a Service

Access Management

Point of access = key to everything Multi-factor authentication: additional to password, user has a private device response Known device: warnings if account is accessed from an unknown device Role-based access management

Cloud types

Private Hybrid Public

A trucking system might use IoT sensors on their refrigeration trucks to:

Pull temperature data and send it to the cloud-based database for food safety analysis

Data Analytics Data Types

Qualitative Nominal: set of values that don't possess a natural ordering (not quantifiable and cannot be measured through numerical units (i.e., red, yellow, blue) Ordinal: natural ordering (i.e., small, medium, large) Quantitative Discrete: integers or whole numbers Continuous: fractional numbers(have a numeric value)

Types of Migration

Rehosting (aka 'lift & shift'): simplest method of application migration: applications are moved, more or less as-is, from on-premises servers to a cloud platform Refactoring or Re-architecting (aka 'rip & replace'): reworking the application(altering its architecture or code) specifically so that it can provide users with new benefits of the new platform Replatforming: smaller-scale variant of refactoring or re-architecting. It involves making relatively modest changes to applications, saving time, effort, and expenditure while ensuring that applications can provide at least some cloud-native benefits Retiring and Repurchasing (aka 'drop & shop'): sometimes it may be better simply to retire legacy applications and replace them rather than migrating them. Some applications may simply be too complicated for migration, or their functions may be better handled by alternative software

What is the slang name for the given types application migration?

Rehosting: matches lift and shift Re-architecting: matches rip and replace Retiring and Repurchasing: matches drop and shop

Infographic

Representing info in a graphical format so data is easily understandable at a glance

Government as a Hierarchy Database

Root level Branch level Child of branch

Relational Databases

SQL is closely associated with relational databases like My SQL, PostgreSQL, Oracle Database, Microsoft SQL Server, and others. These databases use tables to organize data and rely on SQL for data manipulation and querying Serves as a standard way to interact with databases• Can also be used in some non-relational databases• Is the language used to instruct a database system on what operations to perform on the data stored within

Text vs. Numeric Fields

SQL requires single quotes around text values (most database systems will also allow double quotes) Numeric fields should not be closed in quotes Operator Description= Equal > Greater than < Less than >= Greater than or equal <= Less than or equal <> Not equal BETWEEN: Between a certain range Like: Search for a pattern

I want to adopt a more healthy living lifestyle and be able to log and monitor my activity from any device and anywhere with internet service. The application I would need is what type of cloud model?

SaaS: Software as a Service

Models

SaaS: software as a service (accessible via web browser, priced on a pay-per-use basis / subscription fee) PaaS: platform as a service development and deployment environment) IaaS: infrastructure as a service (servers, storage, and networking, common uses: business continuity, disaster recovery)

If you have a table 'Alphabet' who has one column called 'Letter' and each row has a unique letter of the alphabet, which SQL statement would NOT return record a?

Select Letter FROM Alphabet Where NOT '*a'

Good GUI

Self-documenting minimizes data collect errors enhances overall understanding

IS Data Types of Structured Data

String (or str or text): used for a combination of any characters that appear on a keyboard, such as letters, numbers and symbols Character (or char): used for single letters Integer (or int): used for whole numbers Float (or Real): used for numbers that contain decimal points, or for fractions Boolean (or bool): used where data is restricted to True/False or yes/no options

All but which one is a characteristic of a blockchain?

Structures it data into tables

Challenges of Application Migration

Technical difficulties Unforeseen costs Unexpected downtime Organizational culture and management

All but which is a format that you would use to present information with graphicacy.

Text

SQL AND OR NOT Operators

The WHERE clause can be combined with AND, OR, and NOT operators The AND and OR operators are used to filter records based on more than one condition: The AND operator displays a record if all the conditions separated by AND are TRUE The OR operator displays a record if any of the conditions separated by OR is TRUE The NOT operator displays a record if the condition(s) is NOT TRUE

IT risk management

Threat + vulnerability = risk

Sparkline

Tiny chart in a worksheet cell that provides a visual representation of data Shows trends in a series of values

For the Python Statement: TravelOption = input("Enter a choice (car, bike, plane): ")

TravelOption will have the value of whatever the user types

Just because a process is legal does not mean it is ethical.

True

Programming commands rely on syntax-ruled statements that direct action (i.e., input, output, print, assign value, compute value)

True

Robotic Process Automation (RPA) bots can make significant impact on already automated work processes that are repetitive and recurring and often have low computer errors

True

SQL is primarily a query language vs a database.

True

The Waterfall and Agile Project Planning methods both incorporate Plan, Create, Review and Release phases.

True

The shortest path between two points tends to be the simpler the design, the less number of points of failure.

True

Which of the following is a way that a company might save money by using a cloud SaaS (Software as a Service)?

Two of the listed response are correct.

Treemap

Visualizing large number of related categories

Which WHERE clause would NOT select the letter z record in the SQL statement SELECT letter FROM ALPHABET WHERE ....

WHERE letter LIKE 'z'


Ensembles d'études connexes

Which chamber of Congress is the most powerful? (pc)

View Set

Chapter 2: Perception and the communication process and intrapersonal communication

View Set

Chapter 12 Lifespan; Social and Personality Development in Adolescence

View Set

AP Macroeconomics: Unit 2 Review

View Set

Kyle's Quiz Questions - Study Guide

View Set

FI 320 Exam 2 MC Questions from book

View Set

Common Reproductive Concerns, L&D at Risk, 312 Exam 3

View Set