K201 xP Lecture Koin Questions and Slides (first 8 weeks)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Thick-client applications

"Native applications" designed to be ran on a particular operating system.

Thin-client applications

"Web applications" designed to be ran within a browser on any operating system.

IaaS

(Infrastructure as a service) - The most basic cloud service, offering basic server computers and/or storage. - Amazon EC2, Amazon S3 - Rackspace provides hardware for customers to load whatever operating system they want. Amazon S3 provides unlimited, reliable data storage in the cloud.

PaaS

(Platform as a service) - Provide hosted computers, an operating system, and possibly a DBMS - Microsoft Azure, Oracle on Demand, Amazon Web Services - Organizations add their own applications to the platform provided by the vendor.

SaaS

(Software as a service) - Provides operating system and application programs - SalesForce, Apple iCloud, Microsoft Office 365 - Apple's iCloud includes 10+ free applications: calendar, mail, photos, contacts, etc.

How can organizations use cloud services securely?

* Virtual Private Network (VPN) -- creates a secure tunnel used to encrypt data being transmitted over the internet * Using a Private Cloud -- Owned and operated by an organization for its own benefit. A VPN would be necessary to access cloud from outside the infrastructure * Using a Virtual Private Cloud (VPC) -- As subset of a private cloud that has highly restricted, secure access. Sensitive data can be stored on own infrastructure and less sensitive data on VPC.

Central Processing Unit (CPU)

- "the brain" - Dual-processor and Quad-processor computers - vary in speed, function, cost - works in conjunction with main memory (RAM) - reads data and instructions from memory and stores results of computation in memory

The Internet and the internets

- An internet is a network of networks (LANs, WANs, and other internets) - The Internet (capital I) is the most famous internet - Intranets are private internets used exclusively within an organization

Why are Organizations moving to the Cloud?

- Lease storage capacity from third party - All incoming data from mobile storefronts automatically uploaded - Average monthly storage costs cut at least 50% - Power savings, backup time saved, no new hardware configuration - One-time set up and development costs

Over the Internet (Cloud)

- Made easier due to web standards for sending and receiving services over the internet - Allows vendors to manage resources for organizations all over the world

Self-driving cars

- Make things easier, cheaper, safer. - Automobile accidents may become a thing of the past. - Eliminate need to have multiple cars. - Avoid costly traffic tickets, parking tickets, DUI citations.

Elastic

- Resources can be increased or decreased on demand - Pay for only the resources used

Pooled

- Same hardware used by many different organizations - Shared through virtualization

What are the characteristics of data?

- accurate (this is crucial) - timely (subjective to needs of business/individual) - relevant (to context, to subject) - just barely sufficient - worth its cost

What is an Information System?

- consists of 5 component - data is at the center - most important component is people

What is a database management system (DBMS)?

- create --> tables, relationships, and other database objects - process --> read, insert, modify, and delete data using SQL - administer --> accounts, passwords, permissions of least privilege

Cryptocurrencies

- digital-only currencies (like Bitcoin) --> use cryptographic protections to manage and record secure transactions - Benefits: faster, easier, few to no fees --> govt's can't monitor, tax, seize - Risks: price volatility, not accepted everywhere, bad reputation (organized crime(?)) - Future: Blockchain - underlying technology, making all types of transactions more secure - these are slowly gaining acceptance. Banks and even some governments are launching their own _______.

What is the user's role in DB development?

- final judges - thorough review of data model --> entities must contain all the data users need to do their jobs --> must accurately reflect their view of the business - take it seriously - devote time

What forces are driving AI Innovation?

- increases in computing power - availability of large data sets for training - cloud scalability and applications - increased device connectivity - new AI techniques - practical AI applications

What is an Entity-Relationship Data model?

- often referred to as an ER diagram - a tool for constructing data models - defines entities (tables) and their relationships *databases are made up of entities and entities have relationships*

Hierarchy of Data Elements

- table (represents an Entity) - rows or records - fields or columns (Attributes) - bytes or characters

What is Big Data?

-Huge volume -Rapid velocity -Great variety

What are the 3 techniques for processing BI data?

-Reporting -Data Mining -Big Data

What are the 2 categories of Data Mining?

-Unsupervised -Supervised

What are typical BI applications?

-identifying changes in purchasing patterns -developing new entertainment options -predictive policing

How do organizations use BI?

-project management -problem solving -decision making -becoming informed

What affects threat of substitutes?

1. Availability of substitute 2. Substitute performance 3. Cost of substitute 4. Switching costs

What are the 5 Primary Activities in the Manufacturing Value Chain?

1. Inbound logistics 2. Operations/Manufacturing 3. Outbound Logistics 4. Sales and Marketing 5. Customer Service

How do businesses acquire software?

1. License - right to use specified number of copies; limits vendor's liability 2. Site License - flat fee to install software product on all company computers or all computers at specific site 3. Open Source - no license fees

How is a Data Model transformed into a Database Design?

1. Normalizing Data - Converting a poorly structured table into two or more well-structured tables - Eliminate Redundancy - Prevent Data Integrity Issues 2. Transform Data Model into a Database Design - Represent Each Entity with a Table --> Each Identifier becomes a Key Field --> Entity Attributes Become Table Columns - Normalize Tables as Necessary - Representing Relationships --> Use Foreign Keys --> Add Additional Tables for N:M Relationships

What affects competitive rivalry?

1. Number of competitors 2. Quality differences 3. Switching costs 4. Customer loyalty

What affects bargaining power?

1. Number of customers 2. Size of each order 3. Cost of changing 4. Differences between competitors

What affects supplier power?

1. Number of suppliers 2. Size of suppliers 3. Uniqueness of service 4. Cost of changing

How are databases developed?

1. Requirements (forms, reports, queries) 2. Create Data Model (entities and relationships) 3. Create Database Design (tables with foreign keys) 4. Create Database

What forces determine Industry Structure?

1. Threat of new entrants 2. Supplier power 3. Competitive Rivalry 4. Buyer power 5. Threat of substitutes

What affects threat of new entrants?

1. Time and cost of entry 2. Specialist knowledge 3. Economies of scale 4. Barriers to entry (e.g. regulations(

The main difference between volatile and non-volatile storage

= what happens when you turn-off the power. With non-volatile storage, as long as the data has already been written, it will remain for a considerable amount of time; typically hundreds of years. Volatile memory needs constant power in order to retain the stored data. Once the power goes out, the data is also lost instantly. The main difference between volatile and non-volatile storage is what happens when you turn-off the power. With non-volatile storage, as long as the data has already been written, it will remain for a considerable amount of time; typically hundreds of years. Volatile memory needs constant power in order to retain the stored data. Once the power goes out, the data is also lost instantly.

What is a data mart?

A data collection, smaller than a warehouse, that addresses the needs of a particular department or functional area.

What is a data warehouse?

A facility for managing an organizations BI Data. - obtain data: operational, internal and external databases - cleanse data - organize and relate data - catalog data using metadata

What is information?

A graph is data and its data people perceive and use to conceive ____. Processed data is ___. The ability to conceive information determined by cognitive skills. People perceive different _____ from same data. You add value by conceiving ___- from data.

PC Virtualization

A personal computer hosts multiple operating systems (Oracle VMWare)

What is a Database?

A self-describing collection of integrated records. - a collection of related tables - relationships among rows - metadata

Server Virtualization

A server computer hosts one or more server computers

Which of the following is an example of a value chain linkage? A. A manufacturing information system used to reduce inventory costs B. A sales system used to place product orders C. A system that supports customer service efforts D. None of the above

A. A manufacturing IS used to reduce inventory costs

Which of the following are examples of unsupervised data mining techniques? Select all that apply. A. Cluster analysis B. Regression analysis C. Neural networks D. Market-basket analysis E. Decision trees

A. Cluster analysis, D. Market-based analysis, E. Decision trees ask to explain

Microsoft PowerPoint is an example of ______. A. Horizontal-market application B. Vertical-market application C. One-of-a-kind application

A. Horizontal-market application

Porter's five forces model is used to assess ________. A. Industry structure B. Market share C. Internal competition D. Life cycles of products

A. Industry Structure

Which of the following hardware developments allow objects to connect to a network and share data with any other application, service, or device? A. Internet of things (IoT) B. 3D printing C. self-driving cars D. automated guided vehicles

A. Internet of things (IoT)

How would you characterize the threat of new entrants for a lemonade stand? A. Strong B. Weak

A. Strong ask to explain

An Application that is designed to run within a computer browser is also known as a ______ application. A. Thin-Client B. Thick-Client C. Modern-Style D. One-of-a-kind

A. Thin-Client

The contents of unsaved documents on a volatile storage device are lost when the when the power is off. A. True B. False

A. True

The goal of AI research is to create strong AI that can complete all of the same tasks a human can. A. True B. False

A. True

The forked lines, vertical lines, and 0s in an E-R diagram identifying the type of relationship between two entities is referred to as ________. A. crow's feet B. forks C. cardinality D. none of the above

A. crow's feet

Augmented Reality (AR)

Alter reality by overlaying digital information on real-world objects.

________ is the altering of reality by overlaying digital information on real-world objects. A. Reality B. Augmented Reality (AR) C. Virtual Reality (VR) D. None of these

B. Augmented Reality (AR)

What is the software component of a BI System called? A. Business Intelligence B. BI Application C. Data Mining software D. None of the above

B. BI Application

The Business Intelligence Process contains three primary activities. What are they? A. Model processes, Create components, Implement processes B. Acquire data, Perform analysis, Publish results C. Define system, Determine requirements, Implement system

B. Data acquisition, BI analysis, Publishing results

Which of the following statements is TRUE about data marts? A. Data mart users possess the data management expertise that data warehouse employees have. B. Data marts address the needs of a particular department or functional area of a business. C. Data marts are larger than data warehouses. D. Data marts contain only metadata for data warehouses.

B. Data marts address the needs of a particular department or functional area of a business.

Microsoft Access is a Database. A. True B. False

B. False - Microsoft is a DBMS

In your Premiere file, you created a relationship between tblEmployee and tblEmployeeTraining. Both tables contain an EmployeeID field. What type of Key is the EmployeeID field in the tblEmployeeTraning table? A. Primary key B. Foreign key C. Composite key D. Employee key

B. Foreign key

Does Apple, as a company, attempt to compete with a cost leader strategy or with a product differentiation strategy? A. Cost leader B. Product differentiation

B. Product differentiation

How would you characterize the bargaining (buyer) power individual customers of discount stores like ALDI and Wal-Mart have? A. Strong B. Weak

B. Weak ask to explain

What are the components of a BI system?

BI Application: Operational Data, Social Data, Purchased Data, Employee Knowledge Business Intelligence Knowledge Workers

A database is used instead of a spreadsheet when ________. A. lists of data involve a single theme B. structures of data lists are simple C. lists involve data with multiple themes D. users do not want to store all data in one place

C. lists involve data with multiple themes

Mixed Reality (MR)

Combination of real world with interactive virtual images or objects.

Virtual Reality (VR)

Completely computer-generated virtual world with interactive digital objects.

Personal area network (PAN)

Connected devices located around a single person. Most PAN devices connect wirelessly, using WiFi or Bluetooth.

Wide area network (WAN)

Connects devices at different locations (e.g., a company with several campuses worldwide)

Local area network (LAN)

Connects devices that reside in a single location. Usually the computers are located within a half-mile or so of each other. The key distinction, however, is that all of the computers are located on property controlled by the organization that operates the LAN. This means that the organization can run cables wherever needed to connect the computers.

Which of the following is the purpose of a Database Management System (DBMS) A. Create the database tables, relationships, and metadata B. Process changes to the database using SQL C. Administer access to the database objects using accounts, passwords and permissions D. All of the above

D. All of the above

Primary activities in the BI Process

Data sources --> Acquire Data --> Perform Analysis --> Publish Results (Push and Pull) --> Knowledge workers

Protocols

Devices connected to a network communicate using a set of rules and data structures for organizing communication, known _____.

The Internet of Things (IoT)

Everyday objects embedded with hardware capable of sensing, processing, transmitting data. Objects share data via a network with any other application, service, or device. Increases efficiencies, reduce waste, improve decision making.

What's the difference between spreadsheets and databases?

Excel: only ONE theme Database: multiple, related themes

What is the difference between IS and IT?

Information Technology + Procedures and People = Information Systems

Native vs. Web Applications

NA's: - Professional programming languages (Objective - C, C#, C++, Swift, Java, etc. Enable creation of sophisticated and complex user interfaces) - Limited to type of operating system - Costly development WA's: - Web development languages (HTML5, CSS3, JavaScript. Support for graphics, animation, logic and more.) - Works in browser, regardless of operating system - Less expensive to develop

What is the purpose of a database?

Organize and keep track of things with multiple themes - products - transactions - customers - employees

Bell's Law

Pertains to new classes of computers; Personal computers, the Internet, smartphones, social networks and cloud-based services. New platforms, programming environments, industries, networks, and information systems every 10 years.

Metcalfe's Law

Pertains to the growing number of connected devices. The value of a network is equal to the square of the number of users connected to it. People and other devices!

Moore's Law

Pertains to the speed and power of computers and its relationship to price. Computers are getting exponentially faster. The cost of data processing is approaching zero.

Nielson's Law

Pertains to the speed of the internet. Network speed is increasing. Higher speeds enable new products, platforms, and companies.

Pros and Cons of Cloud Computing

Pros: - Small capital requirements - Flexibility on demand - Known cost structure - Possible top-notch security and disaster preparedness - No risk of technology becoming obsolete (the vendor takes that risk) - Low cost due to industry-wide economies of scale Cons: - Loss of control over data location - Dependent on vendor - Little visibility into security and/or disaster preparedness capabilities

Kryder's Law

Refers to storage capacity of devices. Storage capacity is increasing exponentially. The cost of storing data is approaching zero.

The software component is the BI Application and conducts the analysis on the data:

Reports, Data mining, Knowledge management, etc.

What is the "cloud"?

The "____" is defined as the elastic leasing of pooled computer resources over the internet.

What is artificial intelligence?

The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal. ___ could be used in robots, c commercial drones, agricultural systems, military platforms, surgical systems, and other smart devices.

What is data mining?

The application of statistical techniques to find patters and relationships among data for classification and prediction.

How does data processing on a web server work?

Three-Tier Architecture * User Tier --> computers, phones, other devices * Server Tier --> web servers and applications * Database Tier --> DBMS processes requests to retrieve and store data

What is a database application?

a collection of forms, reports, queries, and application programs with which users interact

DeepText

a deep learning-based text understanding engine that can understand with near-human accuracy the textual content of several thousands posts per second, spanning more than 20 languages.

Primary key

a field or group of fields that uniquely identify each record in a table

Desktop Virtualization

a server hosts multiple versions of desktop operating systems (IUanyWare - access your virtual desktop from anywhere)

Commerce server

application program that runs on server-tier computer. Receives requests from users via Web server, takes some action, and returns a response to users. Typical commerce server functions are to obtain product data from a database, manage items in a shopping cart, and coordinate checkout process.

metadata

data that describes data (e.g. field size, data type, description, field name)

Foreign key

fields that are primary keys in a table that exist in other tables (necessary to form relationships)

DeepFace

is a deep learning facial recognition system created by a research group at Facebook. It identifies human faces in digital images.

Deep learning

is a multilayer neural network technique

One-of-a-kind application

software is developed for a specific, unique need

Horizontal-market application

software provides capabilities common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software

Vertical-market application

software serves the needs of a specific industry. Example of such programs are those used by dental offices to schedule appointments and bill patients


संबंधित स्टडी सेट्स

Chapter 13 American Pageant Vocabulary and Questions

View Set

CITI Social and Behavioral Responsible Conduct of Research

View Set

CNA Measuring Vital Signs review questions

View Set

Ch 17 Heart Failure Practice Questions

View Set