Exam 2 Chs 5-8 Study Guide
Database
a collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data.
Data mining in business
a process used by companies to turn raw data into useful information. By using software to look for patterns in large batches of data, businesses can learn more about their customers to develop more effective marketing strategies, increase sales and decrease costs
data mart
a subset of a data warehouse in which a summarized or highly focused portion of the organization data is placed in a separate databased for a specific population of user, bookseller Barnes & Noble use this by a one point of sale data in retail stores, another for college bookstores sales, and a third for online sales
Cyber attacks
any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source
data dictionary
automated or manual file storing definitions of data elements and their characteristics, for large corporate databased may capture additional info such as usage, ownership authorization, security, and the individuals, business function, program, and report that use each data element
data definition
capability to specify the structure of the content of the database, it would be used to create databased tables and to define the characteristic of the field in each table
Data Cleansing
detects and corrects incorrect, incomplete, improperly formatted, and redundant data, not only correct error but also enforce consistency among different set of data that originate in separate info system
Outsourcing
enables a firm to contract custom software development or maintenance of existing legacy program to outside firms which often operate offshore in low wage area of the world
data governance
encompasses policies and procedures through which data can be managed as an organizational resource, it established the organization rules for sharing, disseminating, acquiring, standardizing, classifying and inventorying info.
Malware
include a variety of threats such as computer viruses, worm, and trojan horses
networking equipment
includes the wires, modems, routers, and cables that are used to connect the system
data warehouse
is a databased that stores current and historical data of potential interest to decision makers throughout the company, the data originated in many core operational transaction systems such as systems for sales, customer account, and manufacturing and may include data from website transaction
Databased Management System (DBMS)
is software that enables an organization to centralized data, manage, them efficiently, and provide access to the stored data by application programs, the DBMS act as an interface between application programs and the physical data files.
data redundancy
is the presence of duplicate data in multiple data files so that the same data are stored in more than one place or location. this data occur when different groups in an organization independently collect the same piece of data and store it independently
Virtualization
is the process of presenting a set of computing resources (such as computing power or data storage) so that they can tell be accessed in ways that are not restricted by physical or geographical location
data inconsistency
occurs when the same data element has different values
Legacy systems
older Transaction Processing System created for mainframes computers that continue to be used to avoid the high cost of replacing or redesigning them
Scalability
refer to the ability of a computer, product, or system to expand to serve a large number of user without breaking down
Cloud computing
refers to a model of computing that provided access to a shared pool of computing resources (computer, storage, application, and services) over the network often the internet. allows organizations to avoid the expenses of maintaining their own hardware and software, relying on the cloud instead
Network Topologies
represents a network's physical layout, including the arrangement of computers and cables
Challenges in system building
the challenge is to maintain it
Net neutrality
the principle that all Internet traffic should be treated equally by Internet Service Providers.
data quality audit
which is a structured survey of the accuracy and level of completeness of the data in an information system. can be performed by surveying entire data files surveying samples from data files or surveying end user for their perceptions of data quality
Types of software
•Software outsourcing and cloud services -Software packages and enterprise software -Software outsourcing -Cloud-based software services and tools Service Level Agreements (SLAs): formal agreement with service providers -Mashups and apps
Moore's law
-Computing power doubles every 2 years -Nanotechnology the number of transistors on a chip doubles ever 18 months; computing power doubles every 18 months; and the price of computing falls by half every 18 months
Metcalfe's law
-Value or power of a network grows exponentially as a function of the number of network members
Importance of standards
1) To provide a uniform set of standards specifying minimum acceptable accuracies of control survey for various purposes. 2) To establish specifications for instruments, field procedures, and misclosure checks to ensure that the intended level of accuracy is achieved.
database server
A computer in a client/server environment that is responsible for running a DBMS to process SQL statements and perform database management tasks, the DBMS receives the SQL request and provides the required data.
Network protocols
A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design
Benefits/risks of cloud computing
Benefits: Productive, Collaborate, Reduce cost, respond quickly to market change, Mining insights from data, expand scope of operations, customize Risk: Legacy, Reliability, Privacy, Security, Legal, not knowing location of your data, weak restoration, unable to investigate provider, provider might go out of business, outsourcing corporate security measures, may no use audits or security certifications, using shared environment
Data Manipulation Language (DML)
DBMS language that changes, delete, and retrieve data from the database. content, including data element creations, updates, insertions, and deletions
Network Configuration
Determining the number and location of suppliers, warehouses, production/operations facilities, and distribution centers
data lake
Repository for raw unstructured data or structured data that for the most part have not yet been analyzed and the data can e accessed in many ways. It stores these data in their native format until they are needed.