cis unit 3 study guide

Ace your homework & exams now with Quizwiz!

common comparison operators used in condition statements

== TRUE when the value on the left is equal to the value on the right, otherwise FALSE > TRUE when the value on the left is greater than the value on the right, otherwise FALSE < TRUE when the value on the left is less than the value on the right, otherwise FALSE >= <= !== NOT EQUAL TO

authentication

a method for confirming users identities. once a system determines the authentication of a user, it can then determine the access privileges (or authorization) for that user.

algorithm

a set of instructions (code) that complete a task mathematical formulas places in software that perform an analysis on a dataset.

password

a string of alphanumeric characters used to authenticate a user and provide access to a system.

BPMN: activity

a task in a business process. any work that is being performed in a process. an activity is represented by a rounded-corner rectangle in a business process model. (checking availability, picking up the customers, and confirming the booking)

bitcoin

a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of central bank.

blockchain

a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data.

distributed ledger

allows many different parties around the world to access and verify the same data

conditions (selections)

answers a true/false question based on data and calculation, then pursuing one set of actions if the answer is true or a different set of actions over and over until a condition becomes false.

BPMN: event

anything that happens during the course of a business process. represented by a circle in a business process model. (customer requests, time requests, end of the process)

structured query language (SQL)

asks users to write lines of code to answer questions against a database

rule-based access control

- allows system owners/admin to set rules and limitations on permissions as needed - might restrict access during certain times of day, require a user to be in a certain location, or limit access based on the device being used - good for enforcing accountability and controlling - permissions can be dynamic and customizable (countless configurations for any number of unique situations

role-based access control

- assigns permission based on the position or role a user holds within the organization - predefined role determines access - simple to set up and use - if a user needs permissions they dont have, the administrator needs to grant it to them, which may or may not be possible

business advantages of relational databases

- increased flexibility - increased scalability and performance - reduced data redundance - increased data integrity - increased data security

discretionary access control

- least restrictive - allows the owner/administrator complete control over who has access and permissions throughout the system - easy to configure and control - administrator can easily and quickly configure permissions, deciding who gets in, when and where - often gives too much authority to the administrator of the list.

mandatory access control

- most restrictive form - only gives access to owner/administrator - even the owner is restricted by the systems parameters, which are programmed as such and cannot be circumvented - military + government securities

differentiate physical view of data from logical view of data

- physical view: deals with the physical storage of data on a storage device - logical view: focuses on how individual users logically access data to meet their own particular business needs

record

collection of related data elements. each record in an entire occupies one row in its respective table

attributes

columns/fields. data elements associated with an entity

JOIN

combine rows from two or more tables, based on a related column between them

data dictionary

compiles all of the metadata about the data elements in the data model.

literal

constant values

real number

contains decimals or fractions. (pi) also could be called float

characteristics of a database management system (DBMS)

creates, reads, updates and deletes data in a database while controlling access and security.

digital fingerprint

digital identifier. important example uses for these are described for password files and blockchain. hash values serve as digital fingerprints that uniquely identify the message. change the original message in any way, even a single bit, and the altered message will have a different digital fingerprint and a different unique Transaction ID (diff hash value).

BPMN: flow

display the path in which the process flows. represented by arrows. (arrows show the path the customer rakes through the taxi can booking process).

DISTINCT

eliminates all duplicated entries

intrusion detection system/software

features full-time monitoring tools that search for patterns in network traffic to identify intruders.

comparison of pseudocode and flowcharts as a preliminary step to coding an algorithm

flowcharts shows a step by step process by using boxes and arrows. elongated circle (beginning or end of process), rectangle (instructions or actions), diamonds (decision needs to be made, conditional), parallelogram (inputs or outputs). pseudocode is a simple way of writing programming code in English. informal language

hashing

generates an encoded value that cannot be converted back into the original message. **one way encryption**

firewall

hardware and/or software that guards a private network by analyzing incoming and outgoing information for the correct markings.

transaction ID

hash value

tables

in a relational database, where data is organized and stored.

workflow

includes the tasks, activities, and responsibilities required to execute each step in a business process.

loops

instruct the computer to repeat a set of actions over and over again until a condition becomes false.

assignment

instruction that puts a new value into a variable (location of memory)

code (coding)

instructions for a computer. act of writing computer codes is coding.

boolean mathematics

involves combining test conditions using OR, AND, NOT (logical operators)

data models

logical data structures that detail the relationships among data elements by using graphics or pictures

database

maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

FROM

names one or more tables from which data values are retrieved by the query

intrusion prevention system

network security appliance that monitors network and system activities to detect possible intrusions. also prevent them by sending alarms, block malicious network messages and their responses so that they dont reach their destination and reset network connections. also log and report information about an instrusion

content filtering

occurs when organizations use software that filters content such as emails, to prevent the accidental or malicious transmission of unauthorized information.

primary concepts of the relational database model

1. attributes: columns or fields 2. records: each record in an entity occupies one row in its respective table. 3. primary keys: a field that uniquely identifies a given record in a table. 4. foreign key: primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables 5. entity: also referred to as a table. stores data about a person placed thing or transaction

three advantages of blockchain: immutability, digital trust, IoT integration

1. immutability: the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions 2. ledger is not stored in a single location nor managed by any particular company. 3. iot integration: iot devices linked wirelessly to a blockchain network are able to automatically update a distributed ledger of multiway transactions automatically and deliver data internally to other devices in the network or external to operators entitled to access the data by previous agreement or on demand.

4 access control models

1. mandatory access control 2. discretionary access control 3. role-based access control 4. rule-based access control

differentiate between the three areas of information security

1. people: authentication and authorization 2. data: prevention and resistance 3. attacks: detection and response

five components of a FOR loop: setup, sequence, item, work, after party

1. setup: preparing the data or information needed for a task 2. sequence: a string or list or some other data with multiple items 3. item: a variable that holds one element of sequence each time through the loop. when there are no more items, the loop stops. 4. work: the instructions you want repeated. in python these are indented 5. after party: instructions to finalize the task after the loop ends (optional)

common logical operators: AND, OR, and NOT

AND: a conjunction combines two distinct tests. uses AND operator to combine questions OR: disjunction companies two separate tests with the or statement. NOT: a negation that flips the answer from True to False.

common SQL commands

SELECT, WHERE

identify common calculation functions available in SQL including SUM, AVG, COUNT, MIN and MAX

SUM: adds together all the values AVG: averages the group of selected values COUNT: counts how many rows in a particular column MIN: returns the lowest value in a column MAX: returns the highest value in a column

condition statements

IF statements, the work performed is dependent on the condition being tested; the work is conditional.

comparison (logical) operators

OR, AND NOT

how is sorting done in SQL

ORDER BY clause

integer

whole number without decimal positions or fraction

identity management

a broad administrative area that deals with identifying individuals in a system (such as a country, network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

record

a collection of fields that describe a single instance of the entity

nonrepudiation

a contractual stipulation to ensure that business participants do not deny (repudiate) their online actions.

FOR loop

a control instruction used for iteration and repetition

ethereum

a decentralized, open-source blockchain with smart contract functionality. native cryptocurrency of the platform, second largest by market capitalization, after bitcoin. **most actively used blockchain**

non fungible token

a digital signature backed by a blockchain technology that proves ownership of something

primary key

a field or group of fields that uniquely identifies a given record in a table

business process model

a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.

business process model and notation (BPMN)

a graphical notation that depicts the steps in a business process.

hash value

only uniquely encoded value, also known as Transaction ID

types of business change

operational (automation), managerial (streamlining), strategic (reengineering)

repetition

performs an operation more than once

iteration

performs same operation on different items, one item at a time

distributed computing

processes and manages algorithms across many machines in a computing environment

metadata

provides details about data

as-is process model

represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.

SELECT

returns a result set of records, from one or more tables

integrity constraints

rules that help ensure the quality of data

encryption

scrambles information into an alternative form that requires a key or password to decrypt.

codeblock

set of programming statements that are put together in a syntactic way

three components of IF conditions: setup, condition, work

setup: preparing the data or information needed for a task. for a loop, this establishes the initial values of variables for the condition and loop work. condition: a test that determines tru or false work: the instructions you want to run

to-be process model

shows the results of applying change improvement opportunities to the current (as-is) process model.

tokens

small electronic devices that change users passwords automatically. the user enters his or her user ID and token-displayed password to gain access to the network.

fields

specific categories that provide additional organization by placing like data in a single column.

SQL

structured query language

attributes

the data elements associated with an entity.

data redundancy

the duplication of data, or the storage of the same data in multiple places

biometrics

the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice or handwriting.

automation

the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs.

authorization

the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocates storage space.

normalizing

the process of separating entities and removing redundant data to as few copies as possible

IF condition/ Condition statement

the program chooses between two alternate sets of programming instructions (one set of instructions when the condition is true or a different set when the condition is false).

data element

the smallest or basic unit of data

data latency

the time it takes for data to be stored or retrieved

boolean

true or false values

qualities that make cryptographic hash functions useful

unique, quick, secure

LIKE

used in a WHERE clause to search for a specified pattern in a column

BPMN: gateway

used to control the flow of a process. handle the forking, merging, and joining of paths within a process. represented by a diamond shape in a business model. (determining availability status or accepting/declining the request)

cardinality

used to describe the type of relationships that are possible between entities (data tables)

ORDER BY

used to sort result set from ascending or descending order.

public key encryption (PKE)

uses two keys: a public key that everyone can have and a private key for only the recipient.

how is filtering done in SQL

using the WHERE clause

constant

value that does not change

strings

values that contain letters and symbols

differentiate assignments, constants, expressions, equations, & variables.

variable: a data characteristic that stands for a value that changes or varies over time


Related study sets

PrepU Ch 17: Drug Therapy with Corticosteroids

View Set

Chapter 7 The Atmosphere Key Concepts

View Set

FRCS Fifth grade science chapter 6 checkup

View Set

Brunner Chapter 17: Assessment of Respiratory Function

View Set