MIS 430 Exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Data Warehouses

a huge database center that houses many large databases

Role of Technology standards

establish specifications and procedures designed to ensure the reliability of the materials, products, methods, and/or services people use every day. consistent protocols that can be universally understood and adopted

Coaxial Cable

higher bandwidth than twisted pair, less prone to interference, but also more costly than twisted pair

MIS Audit

identifies all the controls that govern individual information systems and assesses their effectiveness

Evil Twins

is a fraudulent Wi-Fi access point that appears to be legitimate, set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam

Extensible Markup Language (XML)

is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable

Data Mart

is the access layer of the data warehouse environment that is used to get data out to the users. is a subset of the data warehouse and is usually oriented to a specific business line or team. Design to be read only.

RSS

is the acronym used to describe the de facto standard for the syndication of Web content is an XML-based format and while it can be used in different ways for content distribution, its most widespread usage is in distributing news headlines on the Web

Scalability

is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.

OLAP (Online Analytical Processing)

is the technology behind many Business Intelligence (BI) applications. OLAP is a powerful technology for data discovery, including capabilities for limitless report viewing, complex analytical calculations, and predictive "what if" scenario (budget, forecast) planning

Data Definition Language

it is used to create and modify the structure of database objects in database

Twisted Pair

least expensive but prone to error at moderate and high transmission rates

Convergence communication

networks that have arisen as the result of the evolution and popularization of the Internet as well as the activities, products and services that have emerged in the digital media

disaster recovery plan (DRP)

s a documented process or set of procedures to recover and protect a business IT infrastructure in the event of a disaster

middleware

software that acts as a bridge between an operating system or database and applications, especially on a network.

database management system (DBMS)

software that handles the storage, retrieval, and updating of data in a computer system

cracker

(also known as a black hat hacker) is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things

Moore's Law

(paraphrased) the processing capability of computers will double every (approximately) two years (actually, it has been progressing at a pace of doubling about every 16-20 months)

Metcalfe's Law

(paraphrased) the value of a network increases exponentially as the number of users on the network rises (For example, now that a lot of consumers are on the Internet, it is attracting more businesses.

Internet domain extensions

.com commercial .org organization .net network .int international organizaitons .edu enducaiton .gov U.S national and state goverment agencies .mil U.S military

T1 lines

1.544 Mbps point-to-point, dedicated, digital circuit provided by the telephone companies re widely used for connecting an organization's PBX to the telephone company or a local network (LAN) to an Internet provider (ISP)

wifi standards

802.11 (legacy) 1.2 Mbit/s 802.11a 54 Mbit/s 802.11b 11 Mbit/s 802.11g 54 Mbit/s 802.11n 150 Mbit/s 802.11ac 800 Mbit/s

mashup

A mixture of content or elements. For example, an application that was built from routines from multiple sources or a Web site that combines content and/or scripts from multiple sources

Tuple

A row of a table

Network security

ACLS Firewalls intrusion prevention systems intrusion detection systmes

Total cost of ownership (TCO) components

Acquisition/Physical Hardware Costs cquisition/Physical Hardware costs include the cost of equipment or property before taxes, but after commissions, discounts, purchasing incentives, and closing costs. Operating Costs This includes utility costs, direct operator labor, and initial training costs Personnel Costs Personnel overhead may include administrative staffing, support personnel to the equipment, facility housing the equipment and operators.

7 components IT infrastructure

Computer hardware platforms Operating system platforms Enterprise and other software applications Data management and storage Networking and telecommunications platforms Internet platforms Consulting and system integration services

Database conceptual

Conceptual ERD models information gathered from business requirements. Entities and relationships modeled in such ERD are defined around the business's need

Workstations

Cost Between a Minicomputer and a Microcomputer, May Be Multi-User In Secretarial or Accounting Applications But Often Single-User Machines in Drafting and Design Applications, Physical Size is Usually Not Much Larger Than a Desktop Microcomputer, Most Have Extremely Fast Single Processors But A Few Can Be Ordered With Parallel Processing Capabilities, Examples: SUN Microsystems or Hewlett-Packard Workstations

Subcategories of the Microcomputers

Desktops, Luggables, Laptops, Notebooks, Sub-Notebooks, Palmtops, Personal Digital Assistants (PDAs), Pen-Based Computers, Wearable Tab Computers, PC-on-a-Chip Computers, Tablets, Smartphones, and numerous other forms

Database Physical Model

ERD represents the actual design blueprint of a relational database. It represents how data should be structured and related in a specific DBMS so it is important to consider the convention and restriction of the DBMS you use when you are designing

RING Topology

Features A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology Advantages Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data. Cheap to install and expand Disadvantages Troubleshooting is difficult in ring topology. Adding or deleting the computers disturbs the network activity. Failure of one computer disturbs the whole network.

STAR Topology

Features Every node has its own dedicated connection to the hub. Hub acts as a repeater for data flow. Can be used with twisted pair, Optical Fibre or coaxial cable. Advantages Fast performance with few nodes and low network traffic. Hub can be upgraded easily. Easy to troubleshoot. Easy to setup and modify. Disadvantages Cost of installation is high. Expensive to use. If the hub fails then the whole network is stopped because all the nodes depend on the hub.

Bus Topology

Features It transmits data only in one direction. Every device is connected to a single cable Advantages It is cost effective Cable required is least compared to other network topology It is easy to understand Disadvantages Cables fails then whole network fails If network traffic is heavy or nodes are more the performance of the network decreases

Most popular search engine

Google

database models

Hierarchical database model. Network model. Relational model. Entity-relationship model. Enhanced entity-relationship model. Object model.

Attributes

Identifiable characteristics of an entity

JAVA

It was designed to have the "look and feel" of the C++ language, but it is simpler to use than C++ and enforces an object-oriented programming model. Java can be used to create complete applications that may run on a single computer or be distributed among servers and clients in a network.

Storage Size measurements

KB Kilobyte 1,000 MB Megabyte 1,000,000 GB Gigabyte TB terabyte P Petabyte E exabyte Z zettabyte

Minicomputer

Medium-sized, Medium capacity, Usually Multi-User but Single-User Installations Can Be Found, Most Are Single-Processor Machines Although Parallel Processing Models Can Be Found, Moderately Expensive, Usually Scalable Across A Range of Activity, Used for Main Processing in Many Small and Medium-sized Businesses or as a "Front-End" Processor to the Mainframe Computer in Corporate Settings, Examples: DEC VAX series or IBM AS400

Simplex

One Way Communication (example: broadcast radio)

types of network geographical area

Personal area network, or PAN. Local area network, or LAN. Metropolitan area network, or MAN. Wide area network, or WAN.

Laws about electronic records

SEC New account records FDA Records related to new drug applications HIPAA Patient Records FOI Act Governmetlally created

Radio Frequency (RF)

Subject to availability of channels and carriers, potential for interference, costly in some cases, relies on presence of infrastructure for very long distance

Half-Duplex

Two Way Communication, but only one direction at a time (example: drive-up lane intercom at a fast food restaurant)

Full-Duplex

Two Way Communication, capable of communication in both directions simultaneously (example: telephone)

Microcomputers

Usually Relatively Low Cost, Generally Single-User (at a time) Machines, Very Prevalent as a Form of Computing, Usually Smaller in Physical Size than Workstations or Minicomputers, Usually Contain A Single Processor (Although Dual and Quad Processor Machines Can Be Found), Almost Endless Applications Have Been Made of This Class of Computers, Examples: IBM PC, Apple MacIntosh, Compaq, Gateway, Packard-Bell, Toshiba, and numerous other vendors

Infrared Linkages

Usually line of sight, can't work through most obstructions, reliable for only short distances

Mainframe

Very Large, Relatively High Capacity, Usually Multi-User, May or May Not Have Parallel Processing Capabilities, Relatively Fast Processing, Expensive, Used for "Big Iron" Transaction Processing and as Corporate Database Engines in Many Organizations Today, Example: IBM

Supercomputers

Very Large, Very High Capacity, Multi-User, Massively Parallel Processing, Very Fast at Computationally Intensive Applications, Very Expensive, Example: Cray

User

a person or application that accesses the database for a purpose

Hacker

a person who gains unauthorized access to a computer network for profit, criminal mischief, or personal pleasure

Network Attached Storage (NAS)

a server placed on the network with the sole purpose of providing storage to the users and systems attached to that network

Data Quality Audit

a survey of end users, files, and samples of files for accuracy and completeness of data in an information system

Wiki

a website that allows collaborative editing of its content and structure by its users.

Database Administrator (DBA)

addresses "how" data is stored

Data Administrator (DA)

addresses "what" gets stored

Database Logical Model

also models information gathered from business requirements. It is more complex than conceptual model in that column types are set.

distributed database

appears to a user as a single database but is, in fact, a set of databases stored on multiple computers have it on a server access database

Convergence computing

coming together of two or more distinct entities or phenomena. is increasingly prevalent in the IT world; in this context the term refers to the combination of two or more different technologies in a single device

Hierarchy of data smallest to largest

data field, record, file (table), database

file system vs database

database management system is designed to allow flexible access to data (i.e. queries), whereas a file-processing system is designed to allow predetermined access to data (i.e. compiled programs). ... Redundancy is control in DBMS, but not in file system

application service provider (ASP)

is a business providing computer-based services to customers over a network; such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP)

Enterprise Computing

is a buzzword that refers to business-oriented information technology that is critical to a company's operations encompasses all the various types of enterprise software, including database management, relationship management and so on

Voice over Internet Protocol

is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN.

T3 line

is a dedicated physical circuit that uses high-speed media to transmit data, voice and video at the rate of 45 Mbps. It offers a broadband connection consisting of 672 individual channels of 64 kilobits each.

Network-attached storage (NAS)

is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients

Virtual private network (VPN)

is a network that is constructed using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data.

Grid computing

is a processor architecture that combines computer resources from various domains to reach a main objective. the computers on the network can work on a task together, thus functioning as a supercomputer.

Integrated Services Digital Network (ISDN)

is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. It was first defined in 1988 in the CCITT red book.

public key infrastructure (PKI)

is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption

SQL Structured Query Language

is a special-purpose programming language designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS)

service-oriented architecture (SOA)

is a style of computer software where services are provided to the other components by application components, through a communication protocol over a network. The basic fundamental principles of service oriented architecture is independent of vendors, products and technologies

Wireless Application Protocol (WAP)

is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.

RFID (radio frequency identification)

is a technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, animal, or person.

DDoS Distributed Denial of Service

is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service

Internet telephony

is a type of communications technology that allows voice calls and other telephony services like fax, SMS and other voice-messaging applications to be transmitted using the Internet as a connection medium.

Asymmetric digital subscriber line (ADSL)

is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines rather than a conventional voiceband modem can provide.

Total Cost of Ownership (TCO)

is an estimation of the expenses associated with purchasing, deploying, using and retiring a product or piece of equipment

legacy system

is an old method, technology, computer system, or application program, "of, relating to, or being a previous or outdated computer system

analog signal

is any continuous signal for which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. ... For example, an aneroid barometer uses rotary position as the signal to convey pressure information

Ambient data

is information that lies in areas not generally accessible to the user. This data lies in file slack, unallocated clusters, virtual memory files and other areas not allocated to active files.

Internet technology

is the ability of the Internet to transmit information and data through different servers and systems WWW is main application

Microwave Channels

line-of-sight, requires repeaters for following curvature of earth, less time-consuming than erecting or burying wires

Satellite Channels

long lead-times, relatively expensive, wide coverage

Virtualization

means to create a virtual version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments

IS vulnerablity

no physical protection bugs malware disasters no firewalls

Technology Infrastructure

ontext refers to an enterprise's entire collection of hardware, software, networks, data centers, facilities and related equipment used to develop, test, operate, monitor, manage and/or support information technology services

routers

perform the traffic directing functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node

query by example (QBE)

refers to a method of forming queries in which the database program displays a blank record with a space for each field. You can then enter conditions for each field that you want to be included in the query.

digital signal

refers to an electrical signal that is converted into a pattern of bits. Unlike an analog signal, which is a continuous signal that contains time-varying quantities, a digital signal has a discrete value at each sampling point

Autonomic computing

refers to the self-managing characteristics of distributed computing resources, adapting to unpredictable changes while hiding intrinsic complexity to operators and users.

Database model is used the most today

relational database model

Data Manipulation Language

t is used to retrieve, store, modify, delete, insert and update data in database. Examples: SELECT, UPDATE, INSERT statements

nanotechnology

the branch of technology that deals with dimensions and tolerances of less than 100 nanometers, especially the manipulation of individual atoms and molecules

Domain Name system

the system by which Internet domain names and addresses are tracked and regulated.

Electronic authentication

the username identifies the user, while the password authenticates

Normalization

tries to prevent or avoid anomalies. Carefully researched rules for splitting large database tables into many smaller, linked tables are employed

Data Mining

using automated techniques to discover hidden patterns or unknown relationships in the data in a database

Fiber Optic Cable

very expensive, very reliable, capable of extremely high data transfer rates


संबंधित स्टडी सेट्स

Module 7:5 IM Injections for Final

View Set

Adult Health II Musculoskeletal Disorders Chapter 36 Prep U

View Set

The Fall of Satan from Paradise Lost

View Set