CIS unit 3 test review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Types of Virtualization

-PC Virtualization -Server Virtualization -Desktop Virtualization

Phases of Systems Development Life Cycle (SDLC)

-Planning -Analyzing -Design -Development -Testing -Implementation -Maintenance

Data mining analysis methods

1. Prediction 2. Optimization 3. Forecasting 4. Regression

Process Model

A model that represents the processes involved in cognition. An example is the flow diagram for Broadbent's filter model of attention.

Methods for gathering business requirements

1.) Brainstorming 2.) Document Analysis 3.) Focus Group 4.) Interface Analysis 5.) Interview 6.) Observation 7.) Prototyping 8.) Requirements Workshop 9.) Reverse Engineering 10.) Survey

what are the three aspects of systems?

1.) inputs 2.) process 3.) output

blockchain

A blockchain, originally block chain, is a growing list of records, called blocks, which are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data.

Management Information Systems (MIS)

A business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision-making and problem-solving

business rule

A business rule defines or constrains some aspect of business and always resolves to either true or false. Business rules are intended to assert business structure or to control or influence the behavior of the business.

grid computing

A collection of computers, often geographically dispersed, that are coordinated to solve a common problem

data dictionary

A data dictionary is a collection of descriptions of the data objects or items in a data model for the benefit of programmers and others who need to refer to them.

data marts

A data mart is a structure / access pattern specific to data warehouse environments, used to retrieve client-facing data. The data mart is a subset of the data warehouse and is usually oriented to a specific business line or team.

feedback loops

A feedback loop is a biological occurrence wherein the output of a system amplifies the system (positive feedback) or inhibits the system (negative feedback).

data model

A data model is an abstract model that organizes elements of data and standardizes how they relate to one another and to properties of the real world entities

digital ledger

A distributed ledger is a consensus of replicated, shared, and synchronized digital data geographically spread across multiple sites, countries, or institutions.

Project Plan

A formal, approved document that manages and controls project execution

Algorithm

A methodical, logical rule or procedure that guarantees solving a particular problem.

primary key

A primary key, also called a primary keyword, is a key in a relational database that is unique for each record.

relational data

A relational database is a set of formally described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables.

open system

A system in which matter can enter from or escape to the surroundings.

System Restore

A utility in Windows that restores system settings to a specific previous date when everything was working properly.

project manager

An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget

big data

Big data is a term used to refer to data sets that are too large or complex for traditional data-processing application software to adequately deal with. Data with many cases offer greater statistical power, while data with higher complexity may lead to a higher false discovery rate.

intangible benefits

Benefits that are not easily quantified; they include more efficient customer service or enhanced decision making.

bitcoin

Bitcoin is a cryptocurrency, a form of electronic cash. It is a decentralized digital currency without a central bank or single administrator that can be sent from user-to-user on the peer-to-peer bitcoin network without the need for intermediaries.

Buisness Intelligence

Business intelligence comprises the strategies and technologies used by enterprises for the data analysis of business information.

Data types: Boolean

Can only hold true or false.

What are the Triple Constraints?

Cost, Time, Scope

data analytics

Data analysis is a process of inspecting, cleansing, transforming, and modeling data with the goal of discovering useful information, informing conclusions, and supporting decision-making

data quality audit

Data auditing is the process of conducting a data audit to assess how company's data is fit for given purpose. This involves profiling the data and assessing the impact of poor quality data on the organization's performance and profits.

data mining

Data mining is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems

redundant data

Data redundancy is a condition created within a database or data storage technology in which the same piece of data is held in two separate places. This can mean two different fields within a single database, or two different spots in multiple software environments or platforms.

information scrubbing

Data scrubbing is an error correction technique that uses a background task to periodically inspect main memory or storage for errors, then correct detected errors using redundant data in the form of different checksums or copies of data.

data visualization

Data visualization is viewed by many disciplines as a modern equivalent of visual communication. It involves the creation and study of the visual representation of data.

input, process, output

Describes the structure of an information processing program or other process. It is the most basic structure for describing a process.

dirty data

Dirty data, also known as rogue data, are inaccurate, incomplete or inconsistent data, especially in a computer system or database.

distributed computing

Distributed computing is a field of computer science that studies distributed systems. A distributed system is a system whose components are located on different networked computers, which then communicate and coordinate their actions by passing messages to one another.

double-spend

Double-spending is a potential flaw in a digital cash scheme in which the same single digital token can be spent more than once. Unlike physical cash, a digital token consists of a digital file that can be duplicated or falsified

Extraction, transformation, and loading (ETL)

ETL (Extract, Transform and Load) is a process in data warehousing responsible for pulling data out of the source systems and placing it into a data warehouse.

feed-forward loops

Feed-forward, sometimes written feedforward, is a term describing an element or pathway within a control system that passes a controlling signal from a source in its external environment to a load elsewhere in its external environment. This is often a command signal from an external operator.

feed back loops

Feedback Loops can enhance or buffer changes that occur in a system. Positive feedback loops enhance or amplify changes; this tends to move a system away from its equilibrium state and make it more unstable.

information redundancy

In Information theory, redundancy measures the fractional difference between the entropy H(X) of an ensemble X, and its maximum possible value

data warehouses

In computing, a data warehouse, also known as an enterprise data warehouse, is a system used for reporting and data analysis, and is considered a core component of business intelligence.

one-to-one relationship

In databases, a relationship in which each record in Table A can have only one matching record in Table B, and vice versa.

many-to-many relationship

In databases, a relationship in which one record in Table A can relate to many matching records in Table B, and vice versa.

data element

In metadata, a data element definition is a human readable phrase or sentence associated with a data element within a data dictionary that describes the meaning or semantics of a data element. Data element definitions are critical for external users of any data system.

foreign key

In the context of relational databases, a foreign key is a field in one table that uniquely identifies a row of another table or the same table. In simpler words, the foreign key is defined in a second table, but it refers to the primary key or a unique key in the first table.

information integrity

Information Integrity can be defined as the dependability and trustworthiness of information. More specifically, it is the accuracy, consistency and reliability of the information content, processes and systems

integrity constraints

Integrity constraints provide a way of ensuring that changes made to the database by authorized users do not result in a loss of data consistency

internal databases

Internal Databases. Every company has an internal network that sends and receives information from various sources within and outside the company. That network also stores all the internal data related to company like sales data, consumer feedback etc.

meta data

Metadata is "data [information] that provides information about other data".

metadata

Metadata is "data [information] that provides information about other data".

redundancy

Occurs when a task or activity is unnecessarily repeated

Prescriptive Analytics

Prescriptive analytics is the area of business analytics (BA) dedicated to finding the best course of action for a given situation. Prescriptive analytics is related to both descriptive and predictive analytics.

query by example

Query by Example (QBE) is a database query language for relational databases. It was devised by Moshé M. Zloof at IBM Research during the mid-1970s, in parallel to the development of SQL. It is the first graphical query language, using visual tables where the user would enter commands, example elements and conditions.

normalization

The process of applying rules to a database design to ensure that information is divided into the appropriate tables.

Types of Attributes

Simple versus composite Single-valued versus multi-valued Stored versus derived Null-valued

Off-the-shelf software

Software mass-produced by software vendors to address needs that are common across businesses, organizations, or individuals.

Data types: String

Stores alphanumeric combinations and text. String is really a group of characters stored together as one. Numbers to be used for calculations should not be stored as string data even though they can be. They should be stored as INTEGER or REAL

Data types: Integer

Stores positive or negative whole numbers

structured data

Structured data is data that has been organized into a formatted repository, typically a database, so that its elements can be made addressable for more effective processing and analysis. A data structure is a kind of repository that organizes information for that purpose.

CASE

The Council for Advancement and Support of Education is a nonprofit association of educational institutions. It serves professionals in the field of educational advancement.

information cube

The Information Cube is a new 3D visualization technique for hierarchical information.

System Development Life Cycle (SDLC)

The overall process for developing information systems from planning and analysis through implementation and maintenance

Business requirements

The requirements that describe how the business objectives of the project will be met.

Project Scope

The work performed to deliver a product, service, or result with the specified features and functions.

unstructured data

Unstructured data (or unstructured information) is information that either does not have a pre-defined data model or is not organized in a pre-defined manner.

legacy system

a current or existing system that will become the base for upgrading or integrating with a new system

Entity Relationship Diagram (ERD)

a technique for documenting the entities and relationships in a database environment

cryptocurrency

a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank.

function

a relation in which each element of the domain is paired with exactly one element of the range

one-to-many relationship

a relationship between two tables where one record in the first table corresponds to many records in the second table-- the most common type of relationship in Access

Subsystem

a smaller component of a larger system

data base

a structured set of data held in a computer, especially one that is accessible in various ways.

Systems Thinking

a way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part

examples of cryptocurrency

a.) bitcoin b.) litecoin

central components of blockchain

a.) decentralization b.) Immutability c.) trustless D.)faster, cheaper transactions

data scientist

an individual who searches through multiple, disparate data sources in order to discover hidden insights that will provide a competitive advantage

tangible benefits

are easy to quantify and typically measured to determine the success or failure of a project

examples of meta data

author, date created and date modified and file size are examples of very basic document metadata.

Application Software

computer software created to allow the user to perform a specific job or task

business rule

defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer

peer-to-peer

denoting or relating to computer networks in which each computer can act as a server for the others, allowing shared access to files and peripherals without the need for a central server.

Predictive Analytics

extracts information from data and uses it to predict future trends and identify behavioral patterns

external databases

external database servers are defined, the databases on them can be defined. ... port - The listening port of the server. name - The name of the database on the server. username - The name of the user account having full access to the database.

DBMS tools

includes query-by-example and SQL

cloud services

is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand

software customization

modifies software to meet specific user or business requirements

software updates (software patch)

occur when the software vendor releases updates to software to fix problems or enhance features

software upgrade

occurs when the software vendor releases a new version of the software, making significant changes to the program

types of entity relationships

one to one, one to many, many to many

Virtulization

running multiple systems simultaneously on one physical computer

system software

software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management

database management system

software that handles the storage, retrieval, and updating of data in a computer system.

entites

something that exists as itself, as a subject or as an object, actually or potentially, concretely or abstractly, physically or not.

SQL

stands for Structured Query Language. SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for relational database management systems.

Utility Software

systems software that perform tasks related to managing the computer's resources, file management, diagnostics, and other specialized chores

decentralization

the movement of departments of a large organization away from a single administrative center to other locations.

operating system

the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.


Set pelajaran terkait

PSYC781 - Applied Issues in Cultural and Social Psychology TEST 2

View Set

UNIT TEST (Development, Personality, Social Psych): Jeopardy Monday & Test Tuesday

View Set

Prevention & Treatment of Sport Injuries Test 3

View Set

Mutations are inherited alterations in the DNA sequence

View Set

Chapter 1: The Challenge of Economics

View Set