BA 370H

Ace your homework & exams now with Quizwiz!

RDBMS

Relational DataBase Management System (i.e. Access)

RDBMS

Relational Database Management System

Business Processes (are driven by data- existing data is used, new data stored)

Sales process (grocery/clothes), car rental and return process, insurance (claim handling process)

Which of the following is a technique for intercepting computer communications?

Sniffing

strengthen customer and supplier relationships

use IS to create strong linkages between business and suppliers/customers to increase loyalty and switching costs

product differentiation

use information systems to enable new products and services or change customer experience using existing products and services (ex. Nike ID, iTunes)

attributes

characteristics/properties of entities, vertical columns in tables

Database

collection of data organized to serve many applications efficiently by centralizing the data and controlling redundant data

advantages of database systems

controlled redundancy of data, data integrity and consistency, sharing of data, improved security, enforcement of standards

table

each type of entity gets its own table

The persons, places, things or events associated with a business process about which we record data in our systems are referred to as

entities

effectiveness

evaluating a process on how well it produces the expected output measured by consistency and reduction in number of errors

Computer processing

every computer has at least one processing element (CPU), and mainly two types of memory, secondary storage and primary memory (RAM)

IT and IS are synonymous terms

false

each table in a database must have one or more foreign keys

false

Contrasting authentication and authorization, which of the following statements is true?

fingerprint scanners support authentication

efficiency

looks at whether or not a process creates more output with the same/less input, or the same/more output with less input measured by the reduction in the use of resources

How information systems help in executing business strategies and provide competitive advantage

low cost leadership, product differentiation, strengthen customer and supplier relationships, automating business processes by reducing/eliminating manpower

secondary storage device examples

magnetic (hard) disks, solid state drives, optical disks. USB flash/thumb/pen drives

Ability to experiment

make a reasoned analysis of an opportunity, envision potential solutions, evaluate those possibilities, and develop the most promising ones consistent with available resources

Exponential Growth in IS

many scaling trends are strongly linked to exponential trend (moore's law), i.e. processing speed, memory capacity, pixels in digital cameras, hardware miniaturization, overall cost of computing

Cycles

measure of the speed of a CPU is cycles per second, aka Hertz (Hz)

metadata

metadata refers to data about data, it can help in understanding the purpose served by the database elements in the database schema

Systems Thinking

model system components and show how those components relate to each other

query

queries are a way of searching for and compiling data from one or more tables, running a query is like asking a detailed question of your database, the database gets the answer by specifying the criteria on the attributes

Data

raw facts which are collected in many functional areas like accounting, manufacturing, sales, HR, etc

Transaction Data

record events (i.e. Invoices, shipments, payment, receipts)

Which of the following best describes data?

recorded facts or figures

report

reports give us the ability to present our data in the desired format,

Master Data/ Object Data

represent people or things (i.e. customer rewards programs, products, vendors, projects)

In the database context, in a table for customers, all the data about a single customer would reside in a single:

row

referential integrity

rules that enforce defined relationships between tables

Database management system (DBMS)

software that permits an organization to centralize data, manage them efficiently, and provide access to the stored data by application programs

Information System

group of components that interact and work together with the purpose to store data and to produce and disseminate information

Attributes

specific characteristics of entities, the smallest unit of data with meaning to a user

Matching: Table- Attribute- Primary Key- Foreign Key- Record-

- a list of all customers and their data - a column labeled customer zip code in a customer table - "customer account # that uniquely identifies a customer - a column labeled "sales rep ID" used as a cross reference - information pertaining to 100th customer/100th row

Computer Hardware

- input/ouput: human interaction devices (mouse, keyboard, printers, etc.) - CPU: central processing unit, the "thinking brain" of the computer, fastest hardware component -RAM/primary storage: random access memory, where the computer holds its current 'thoughts' - secondary storage/hard disk: recall old memories from here, everything is stored here

three ways IS improve business processes

-improve efficiency -improve effectiveness -provide linkages across processes

Informations

-usefully organized facts -data presented in a meaningful context -data processed by summing, ordering, averaging, grouping, comparing or similar operation (accurate, timely, relevant, just barely sufficient, worth its cost)

Bytes

1 byte is 8 bits ie 10100110

An example of raw data from a national chain of automobile stores would be

1 toyota RAv4 sold March 3, 2016 in Louisville, Kentucky

Advantages of Databases

1. they can be shared by thousands of users overs the network (single-version of truth) 2. Databases can find buried information more quickly and elegantly 3. No more "dirty data". rule of databases restrict type of data that can be entered into any given field, resulting in cleaner more reliable outputs

foreign key (FK)

A primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables

Referential Integrity (uses FKs)

A set of rules that Access uses to ensure that the data between related tables is valid.

ANSI

American national standards institute

entities

Anything and everything data is stored about. People, things, transactions, etc.

Which of the following statements is true about the security of our day to day online business transactions?

Asymmetric key cryptography uses a public/private key pair

A malicious hacker can use several computers as bots to flood a web server and hinder regular service to legitimate requests. This is referred to in technical terms as:

DDoS (distributed denial of service)

IS hardware

CPU- central processing unit RAM- random access memory Secondary storage- data here has to be moved into RAM for processing Input devices-accessories (keyboard, mouse, mic) Ouput- video displays, printers, projectors

Abstract reasoning

Construct a model or representation -ability to make and manipulate models

moore's law

The number of transistors per square inch on an integrated chip doubles every 18 months, allows a computer to store and process more data faster at a lower cost

Entity Integrity (uses PKs)

The property of a relational table that guarantees each entity has a unique value in a primary key and that the key has no null values.

Which of the following statements is TRUE of all business users of information systems?

They are expected to take an active role in the design and evaluation of information systems.

low cost leadership

Use information systems to achieve the lowest operational costs and the lowest prices

As a business professional, what is one of the reasons you have to be involved in information systems (IS) design and evaluation?

You understand the business requirements and can convey them correctly to the developers.

Database

a collection of related lists (tables) containing facts (raw data) about entities provides an organizational structure for data provides a mechanism to interact with the data

Which of the following is an example of computer hardware?

a computer monitor/screen

Database Management System (DBMS)

a computer program that controls the creation, maintenance, and the use of a database

schema or data model

a database schema or a data model is the way to logically structure data in the form of related tables

A foreign key refers to:

a field in one table that refers to the primary key of another

foreign key

a field in one table that refers to the primary key of another table, a lookup field

primary key (PK)

a field that uniquely identifies a record in a table, first column in table, always different (person name, thing name)

form

a form is a window or screen that contains numerous fields, or spaces to enter data, a form provides a user-friendly way to enter or modify data into tables

Information System

a group of components that interact to produce information for decision making, coordination, and control

Cores

a mostly independent processor able to ingest and manipulate a stream of ones and zeros, today's CPU chips can have multiple cores, a multi-core CPU can be 'thinking' about several things at once instead of focusing on one thing at a time

Entity

a person or place or things, or event on which we store and maintain data

record

a row in a table, corresponds to one item

The hardware components of an information system will act as a(n) ________.

actor on the computer side

hardware/people

actors, where the work gets done

ASCII

american standard code for information interchange, binary numbers are used to encode ASCII characters, each number represents a different character,

primary key

an attribute that uniquely identifies a record of an entity

Which of the following operational problems is NOT something an organization could address using a Referential Integrity constraint in a database?

an incorrect DOB has been saved for a student

Bits, binary digits, 0 and 1

another measure of speed of a CPU is the number of bits processed in each cycle. standard CPUS today process 32 or 64 bits at a time

Each entity in a database has ________ that describe the characteristics of the entity.

attributes

Three types of "hats" associated with hackers are:

black, white, grey

First General Purpose Computer (ENIAC) us army 1946

could compare for equality, add, subtract, multiply, divide, and extract square roots, stored a max of 20 10-digit decimal numbers, used 20 accumulators connected by patch cords to process data, contained 17,468 vacuum tubes-1,500 relays-and weighed more than 30 tons

relationships

customers:sales (1:M) sales:customers (1:1) salary:employee (1:M) employee:salary (1:1) students:class (M:M) products:invoices (M:M)

A Customer Relationship Management (CRM) system contains the names and phone numbers of customers. Such details stored in a CRM system are part of the ________ component of the IS.

data

The ________ component in the five-component model of information systems is considered a bridge that connects the computer side and the human side.

data

record

data about one person (row in table)

Which of the following descriptions, by definition, characterize a DBMS as an RDBMS

data are stored in tables which are connected using primary keys and foreign keys

The special type of database configured for business intelligence applications is called a _____?

data warehouse

Collaboration

develop ideas and plans with others, provide and receive critical feedback

Assume a database with two tables. One table is named "Departments" with attributes Dept_Code, Dept_Name, Building, and Budget. The other table is named "Employees" with attributes Employee_Id, Name, Dept_Code, and Salary.Here the Dept_Code attribute in the "Employees" table acts as a/an:

foreign key

First fully transistorized computer (TRADIC) 1955

from vacuum tubes to transistors

Which of the following statements is TRUE of good information?

good information should be based on correct and complete data

Which of the following components of an information system is the easiest to change and results in the least amount of organizational disruption?

hardware

Five-Component Framework

hardware (machine), software (operating system, programs), data (unique to each business process), procedures (what kind of data needs to be stored/processed), people (business people, IT people) they all work together, all are necessary to create an IS

Difference between hardware and software

hardware (visible): the actual machinery made up of complex electronic circuitry, software (not visible): the list of instructions, both are vital to the business

IS components

hardware and people (actors), programs and procedures (instructions), data (bridge) IT=HW+SW+Data IS= IT+processes+people

Which of the following pairs of components constitutes the computer side of information systems?

hardware and software

IT

hardware, software, data without IT there is not IS, is one component of information systems

A system which has been improved so that it consumes fewer resources in accomplishing the same tasks:

has become more efficient than it was before

transaction table

holds a list of a particular kind of event which we want to record

master table

holds a list of a particular kind of things, these things exist independently over time and can participate in many transactions

Three ways IS improves business processes

improve efficiency, improve effectiveness, provide linkages across processes

software/procedures

instructions,

integrated circuits 1967

integrated circuits drastically reduces the size and cost of electronics

by definition, if we say that a piece of information is accurate we mean that:

it is based on correct and complete data and processed correctly as expected

IS exist to help businesses execute strategies and achieve goals, Period.

not for sheer joy of exploring technology, not to avoid falling behind the technology curve

The CEO of a large company asks the sales manager to report the sales figures of the previous quarter. The manager immediately sends her the list of products sold in the previous quarter. These details do NOT qualify as good information because they are ________.

not relevant

Solid state drives

nothing moves, that can make a system much faster, no moving parts, solid state drives are more expensive than magnetic hard disks

Relational database

organize data into 2D tables

Relational Database

organizes data into 2d tables, columns store attributes or fields, rows store records, one table for each entity

The ____________ component of the five-comp framework of an info system includes individuals who maintain and support the hardware and software

people

Which of the following pairs of components constitutes the human side of information systems?

people and procedures

You get an email from someone claiming to be from the marketing department of your bank saying that the bank wanted to honor loyal customers. It further says that since you had an account with them for more than three years, you qualified to be entered for a draw and have been selected as one of the ten lucky customers who were being given a cash award of $200 by the bank. The email asks you to provide your complete bank account details so that they can transfer $200 to your account as the prize money. This email is an example of:

phising

IT infrastructure

platform to support all information systems in a business

Albert creates a database table to store employee performance statistics. He stores each employee's data in independent rows and creates a column named "Employee Number" to assign unique numbers to each employee. This column is referred to as a(n)

primary key

According to the five-component model of information systems, the ________ component provides instructions for the people.

procedure

IS helps businesses achieve competitive advantage through

product differentiation, cost leadership, increasing customer/supplier intimacy, automating business processes by reducing/eliminating manpower

tables

tables store data about entities (things/services and people [independent], transactions [dependent])

a business needs a database instead of a spreadsheet when

the business involves data with multiple entities

In the five-component model, the process of automation is a process of moving work from ________.

the human side to the computer side

The concept of connecting, controlling or monitoring common everyday objects such as home security cameras, refrigerators etc., over the Internet is known as__________

the internet of things

Moore's Law

the number of transistors per square inch on an integrated chip doubles every 18 months, this has held true for more than 5 decades

Data mining is primarily used for allowing users to find hidden relationships in large data sets.

true

Obtaining or developing new programs is more difficult than ordering additional hardware.

true

Restricting access of users to specific portions of the system as well as specific tasks, is an example of authorization.

true

The five-component framework applies to both simple and complex information systems.

true


Related study sets

Chapter 13 Psychological Disorders

View Set

9.3: Conjugation - F+ and F- Cells

View Set

HIST 1302 - Unit 2 - Study Guide

View Set

12: Altered Somatic and Special Sensory Function

View Set

Unit 1 (1.1 overview of anatomy and physiology)

View Set