Study Guide CIS

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

One-To-One Relationship

is between two entities in which an instance of on entity can be related to only one instance of a related entity

One-To-Many Relationship

is between two entities in which an instance of one entity can be related to many instances of a related entity.

Many-To-Many Relatonship

is between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity.

Metadata

provides detail about data. For example, an image may include metadata that describes how large the picture is, the color depth, the image resolution, when the image was created, and other data.

Development Testing

test the system to ensure it is bug-free

Attribute

(aka columns or fields) data elements associated with an entity

Attributes

(aka columns or fields) data elements associated with an entity.

Data Element

(aka data field) the smallest or basic unit of data. Examples: customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, etc.

Entity

(aka table) stores data about a person, place, thing, transaction, or event

Entity

(aka table) stores data about a person, place, thing, transaction, or event.

Blocks

A block contains the transactional data that transfers digital assets between the blocks or parties.

Digital Ledger

A digital ledger is a bookkeeping list of assets (money, property, ideas...), identified ownership, and transactions that record the transfer of ownership among participants. It is a linear list to which information can only be added, with older records retained to preserve the full history of each asset.

Miners

A group/network of computers/actors(an entity that can participate in an action or in a blockchain network) that validate new blockchain transactions and record them on the blockchain by solving a difficult mathematical problem based on a cryptographic hash algorithm.

Expression

A math operation to calculate a new value based on other values

Structured Query Language (SQL)

A tool used for retrieving data from a DBMS (database management system). It asks users to write lines of code to answer questions against a database. Lets you access and manipulate databases. Example actions: execute queries, retrieve data, insert/update/delete records, create databases/tables/procedures/views.

IF Statements

IF (condition is true) THEN (run code block) ELSE (optional, but otherwise run code block) Example code: if (condition) { expr1 // RUN IF CONDITION IS TRUE } else { expr2 // RUN IF CONDITION IS FALSE }

Setup

Preparing the data or information needed for a task. For a loop, this establishes the initial values of variables for the condition and loop work

Project

Temporary activity a company undertakes to create a unique product, service, or result.

Loop Work

The instructions you want repeated

Triple Constraint

The relationship among time, cost, and scope. If one changes, at least one other is likely to be affected.

Identity Management

a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

Neural Networks

a category of AI that attempts to emulate the way the human brain works.

Field

a characteristic of a table

Record

a collection of related data elements. Each record in an entity (table) occupies one row.

Virtual Reality

a computer-simulated environment that can be a simulation of the real world or an imaginary world.

Bitcoin

a decentralized digital currency, without a central bank or single administrator, that can be sent from user to user on the peer-to-peer bitcoin network without the need for intermediaries.

Cryptocurrency

a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.

Software Engineering

a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.

Primary Key

a field (or group of fields) that uniquely identifies a given record in a table. They are a critical piece of a relational database b/c they provide a way of distinguishing each record in a table. Ex. Searching for a customer Steve Smith. There could be multiple Steve Smiths, therefore, a primary key could be Steve Smith's unique ID.

Hash

a function that converts an input of letters and numbers into an encrypted output of a fixed length. Hashes are the links in the blockchain.

Fuzzy Logic

a mathematical method of handling imprecise or subjective information. Basic approach is to assign values b/w 0 and 1 to vague or ambiguous information. Zero represents information not included, whereas 1 represents inclusion or membership.

Functions

a named set of computer logic to accomplish a specific task. Sometimes called procedures. Functions typically contain the software logic for a single algorithm

Real Number

a number that does contain decimal positions or fractions.

Variables

a place to store a value and that storage location can be changed to a different value at a later time if you want to do the calculation with different data

Foreign Key

a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

System Development Lifecycle

a process for planning, creating, testing, and deploying an information system.

Deep Learning

a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets.Trains from each layer then uses that learning in the next layer to learn more, until the learning reaches its full stage through cumulative learning in multiple layers. Requires thousands of data records for the models to become good at classification tasks and millions to perform at the level of a human.

Proof-Of-Work

a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain. PoW has two goals: (1) verify the legitimacy of a transaction (to avoid the double-spend problem where a single unit of currency is sent to two recipients at the same time), and (2) create new digital currency units by rewarding miners for performing the proof-of-work task.

Sequences

a series of actions done in a specific order to complete a task

Program

a series of coded software instructions to control the operation of a computer or other machine

Algorithm

a set of instructions (codes) that complete a task

Machine Learning

a type of artificial intelligence that enables computers to both understand concepts in the environment and to learn.

Blockchain

a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data.

Constant

a value that does not change

Integer

a whole number without decimals or fractions

General Algorithm

an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. It finds the combination of inputs that gives the best outputs.

Data Types

an attribute associated with a piece of data that tells a computer system how to interpret its value (ex. "hello" → string, 3 → integer)

Conditions

answering a true/false question based on data and calculation, then pursuing one set of actions if the answer is true, or a different set of actions if false

Conditions

answering a true/false question based on data and calculation, then pursuing one set of actions if the answer is true, or a different set of actions if false.

Relational Integrity Constraints

are rules that enforce basic and fundamental information-based constraints. (ex. would not allow someone to create an order for a nonexistent customer, provide a markup percentage that was negative, or order zero pounds of raw materials from a supplier)

Alpha Testing

assess if the entire system meets the design requirements of the users

Testing Phase

brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.

Exit Strategy

changing variables associated with the condition so the loop eventually stops

Expert Systems

computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.

DBMS

creates, reads, updates, and deletes data in a database while controlling access and security

Equations

declare that the value of the expression is the same as the value in the destination variable

Bugs

defects in the code of an information system

User Acceptance Testing

determine if the system satisfies the user and business requirements

Intangible Benefits

difficult to quantify or measure

Analysis Phase

during this phase, the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.

Tangible Benefits

easy to quantify and typically measured to determine the success of failure of a project

Business-Critical Integrity Constraints

enforce business rules (ex. returns only allowed within 10 days of purchase) vital to an organization's success and often require more insight and knowledge than relational integrity contraints. Business-critical constraints tend to mirror the rules by which an organization achieves success.

Planning Phase

establishes a high-level plan of the intended project and determines project goals

Design Phase

establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudocode, and other documentation.

Psuedocode

fake code that is an informal description of how the computer program should work. It is intended for human reading rather than machine reading

Loops

instruct the computer to repeat a set of actions over and over again until a condition becomes false

Code

instructions for a computer

After-Party

instructions to finalize the task after the loop ends (this component is optional and is not always provided)

Algorithms

involve a sequence of steps or actions needed to accomplish some task

General AI

machines that have all the senses (maybe more), all the reason, and think just like people do

Database

maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

Preventive Maintenance

makes system changes to reduce the chance of future system failure

Corrective Maintenance

makes system changes to repair design flaws, coding errors, or implementation issues

Distributed Computing

processes and manages algorithms across many machines in a computing environment. Individual computers are networked together across geographical areas and work together to execute a workload or computing process as if they were one single computing environment.

Programming Language

refers to a unique set of keywords along with a special syntax for organizing program instructions that execute computer commands.

Integrity Constraints

rules that help ensure the quality of data. Two types of constraints: (1) relational and (2) business critical.

Implementation Phase

the organization places the system into production so users can begin to perform actual business operations with it

Artificial Intelligence

simulates human thinking and behavior, such as the ability to reason and learn. Ultimate goal is to build a system that can mimic human intelligence.

Business Requirements

specific business requests the system must meet to be successful

Relational Database Model

stores data in the form of logically related two-dimensional tables

Development Phase

takes all the detailed design documents from the design phase and transforms them into the actual system. In this phase, the project transitions from preliminary designs to actual physical implementation. The company purchases and implements the equipment necessary to support the architecture.

Narrow AI

technologies that can perform specific tasks as well as, or better than, humans

Unit Testing

test individual units or pieces of code for a system

Immutability

the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions. Immutability has the potential to transform the auditing process into a quick, efficient, and cost-effective procedure.

Data Redundancy

the duplication of data, or the storage of the same data in multiple places. Redundant data can cause storage issues along with data integrity issues, making it difficult to determine which values are the most current or most accurate.A primary goal of a database is to eliminate data redundancy by recording each piece of data in only one place in the database. This saves disk space, makes performing data updates easier, and improves data quality.

Assignment

the instruction that puts a new value into a variable

Feasibility

the measure of the tangible and intangible benefits of an information system.

Maintenance Phase

the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals.

Double-Spend

the risk that a digital currency can be spent twice. Happens when a blockchain network is disrupted and cryptocurrency is essentially stolen. The thief would send a copy of the currency transaction to make it look legitimate, or might erase the transaction altogether. Most common method of double-spending is the thief will send multiple packets to the network, reversing the transaction so that it looks like they never happened.

Reinforcement Learning

the training of machine learning models to make a sequence of decisions. The model uses trial and error to find a solution to the problem. To train the model, the programmer uses either rewards or penalties for the actions it performs. Goal is to maximize the total reward.

Decentralization

the transfer of control and decision-making from a centralized entity to a distributed network.

Augmented Reality

the viewing of the physical world with computer-generated layers of information added to it

Strings

values that contain letters and symbols

Integration Testing

verify that separate systems can work together, passing data back and forth correctly

System Testing

verify that the units or pieces of code function correctly when integrated

WHILE Statement

while the condition is TRUE repeat the block of code until the condition becomes FALSE setup while (condition) { code block (loop work) exit strategy }


Set pelajaran terkait

Compensation; Compensation for Special Groups ( Chapter 14)

View Set

CH. 7 - Mutations and CH 8.1 Questions

View Set

Nursing test 2 Clinical science 3100

View Set

Algebra I - Unit 1: Foundations of Algebra Quiz 1: The Language of Algebra

View Set

Independent, Dependent and Control Variables Scientific Method

View Set

HESI Case Study-Spinal Cord Injury

View Set

Science Year 9 Semester 2-Plate Tectonic Theory Test Study

View Set

Chapter 48 Assessment of the Cardiovascular System

View Set