IS BOOK Ch. 4 Review Questions

Ace your homework & exams now with Quizwiz!

4-9) what is the typical strategy to access a database? How do users access an Access database? Are there other strategies to access database systems?

A data access strategy is the manner in which applications store, retrieve and manage data. Performance, deployment, and scalability, which factor into the planning and implementation of a data access strategy, can ultimately affect the architectural model. An alternative strategy is to perform operations directly against the database. In this model, you use a data command object that includes an SQL statement or a reference to a stored procedure. You can then open a connection, execute the command to perform the operation, and then close the connection. If the command returns a result set — that is, if the command performs a Select statement — you can fetch the data using a data reader, which acts like a highly efficient read-only cursor. The data reader can then act as a source for data binding.

4-12) what is IVR? How is it used to query a database?

An IVR assists the user through a series of pre-programmed prompts. These prompts are pre-recorded and can also further direct the caller to a live customer service representative. In some cases, it may be forwarded to a voicemail box or even a message from the customer recorded and emailed to the customer service team. Most of the time, IVRs are used by small and large businesses to reduce their labor costs by using automated systems to answers routine queries by customers. It also extends the hours of operation by making your service options available 24/7. IVR systems can also be designed to recognize human voice and respond accordingly. Depending on the level of speech recognition sophistication needed by the business, IVRs can be How an IVR System Worksprogrammed to recognize names, locations, and can also take a string of numbers, making IVRs convenient for bookings and credit card transactions.

4-20) what are examples of databases without boundaries?

Another example of how the human element interacts with information management involves database without boundaries, in which people outside the enterprise enter and manage most of the record. These contributors feel strong ownership over their records. Instagram, for example, heard howls of protest when the company changed its term of service so that it could sell the photos people upload without their permission, and without any compensation. Databases without boundaries are also part of emergency disaster relief. Online databases can help victims find missing family members, organize volunteers, or link people who can provide shelter to those who need it.

4-18) what is big data? What are the defining features of dig data?

Big Data refers to collections of data that are so enormous in size, so varied and content, and so fast to accumulate that they are difficult to store and analyze using traditional approaches. The three V's are the defining features for big data: Volume, Velocity, Variety.

4-21) how do ownership issues affect information management? How do information management needs differ among stakeholder groups?

Craigslist.com illustrates other ways in which the human element affects information management. Founder Craig Newmark initially sought to help people in San Francisco find apartments and jobs. The site soon became the world's largest database of classified ads, and this major revenue source for print newspapers dried up. Newmark's concerns are less about the database technology than about the health of the community and the relentless threats from spammers and fraudsters who can destroy trust in the site.

4-19) what is data mining? What is the difference between data mining and data drudging? What is the goal of data mining?

Data mining is a type of intelligence gathering that uses statistical techniques to explore large data sets, hunting for hidden patterns and relationships that are undetectable in routine reports. The difference between data mining, which leads to important findings, and "data drudging," which sniffs out relationships that might just occur by accident and that have little value.

4-3) what are the characteristics of information that affect quality? What are examples of each?

Five characteristics of high quality information are accuracy, completeness, consistency, uniqueness, and timeliness. Information needs to be of high quality to be useful and accurate. The information that is input into a data base is presumed to be perfect as well as accurate. The information that is accessed is deemed reliable. Flaws do arise with database design but do not let something in your control, accurate and reliable data, be one of them. A database design that is accurate and reliable will help achieve the development of new business ideas as well as promoting the organizational goals. Completeness is another attribute of high quality information. Partial information may as well be incomplete information because it is only a small part of the picture. Completeness is as necessary as accuracy when inputting data into a database.Consistency is key when entering information into a database. For example, with a column for a phone number entry 10 digits is the expected length of the field. Once the fields have been set in the database, a number more or less than 10 digits will not be accepted. The same applies for any field, whether it is an entry that requires a number, a series of numbers, an address, or a name, etc. If the fields are not set to a specific limit for information then consistency is even more important. Uniqueness is the fourth component of high quality information. In order to add value to any organization, information must be unique and distinctive. Information is a very essential part of any organization and if used properly can make a company competitive or can keep a company competitive. A fifth important aspect of information is timeliness. New and current data is more valuable to organizations than old outdated information. Especially now, in this era of high technological advances, out-of-date information can keep a company from achieving their goals or from surviving in a competitive arena. The information does not necessarily need to be out of date to have effect, it just needs to not be the most current. Real-time information is an element of timeliness.

4-7) what are the steps in planning a relational data model? Are there benefits to the planning stage?

Identify the purpose of the database. Review existing database. Make a preliminary list of fields. Make a preliminary list of tables and enter the fields. Identify the key fields. Draft the table relationships. Enter sample data and normalize the data. Review and finalize the design. Before a project starts the project manager must make sure the project goals, objectives, scope, risks, issues, budget, timescale and approach have been defined. This must be communicated to all the stakeholders to get their agreement. Any differences of opinion must be resolved before work starts.

4-14) what is master data management? What is a data steward? What is the role of Master data management in an organization's integration strategy?

Master data management (MDM) is a comprehensive method of enabling an enterprise to link all of its critical data to one file, called a master file, that provides a common point of reference. When properly done, MDM streamlines data sharing among personnel and departments. A data steward is a person responsible for the management and fitness of data elements (also known as critical data elements) - both the content and metadata. Integration supports standard messaging formats across multiple protocols as well, as workflow management, cross-referencing, and data sharing. The integration layer is a key component for the different data integration processes, like EAI/EII/ETL, workflow management, and messaging.

4-2) what is metadata? What does metadata describe four structured information? For unstructured information? Give an example of each type of metadata?

Metadata are "data that provide information about other data".Metadata were traditionally used in the card catalogs of libraries. As information has become increasingly digital, metadata are also used to describe digital data using metadata standards specific to a particular discipline. Describing the contents and context of data or data files increases their usefulness. For example, a web page may include metadata specifying what language the page is written in, what tools were used to create it, and where to find more information about the subject; this metadata can automatically improve the reader's experience. A principal purpose of metadata is to facilitate in the discovery of relevant information.

4-16) what are examples of internal sources of data for a data warehouse? What are examples of external sources of data for a data warehouse?

Most companies collect data from several sources, such as past transactions, clicks, shipments, and more. The data scientist's job is to transform this data into business intelligence and then into actionable results. Most of this data falls into one category of data: internal and easy-to-collect. The three other categories of data—internal and difficult-to-collect, external and easy-to-collect, and external and difficult-to-collect—are usually not in the data warehouse. And some of the most important predictors are in these three categories. Internal and difficult-to-collect data External and easy-to-collect data External and difficult-to-collect data

4-8) what are primary keys and foreign keys? How are they used to create links between tables in a relational database?

Primary Key Constraints. A table typically has a column or combination of columns that contain values that uniquely identify each row in the table. This column, or columns, is called the primary key (PK) of the table and enforces the entity integrity of the table. When you create a relationship between tables, the related fields do not have to have the same names. However, related fields must have the same data type unless the primary key field is an AutoNumber field. You can match an AutoNumber field with a Number field only if the FieldSize property of both of the matching fields is the same. For example, you can match an AutoNumber field and a Number field if the FieldSize property of both fields is Long Integer. Even when both matching fields are Number fields, they must have the same FieldSize property setting.

4-11) what is SQL? How is it used to query a database?

SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for relational database management systems. SQL statements are used to perform tasks such as update data on a database, or retrieve data from a database.

4-13) what is a shadow system? Why are Shadow systems sometimes used in organizations? How are they managed? What are the advantages of shadow systems? What are the disadvantages?

Shadow System is a term used in information services for any application relied upon for business processes that is not under the jurisdiction of a centralized information systems department. That is, the information systems department did not create it, was not aware of it, and does not support it. The design and development process for these systems tends to fall into one of two categories. In the first case, these systems are developed on an adhoc basis rather than as part of a formal project and are not tested, documented or secured with the same rigor as more formally engineered reporting solutions. This makes them comparatively quick and cheap to develop, but unsuitable in most cases for long term use. In the second case, the systems are developed by experienced software developers that are not part of the organizations's information systems department. These systems may be off-the-shelf software products or custom solutions developed by contract programmers. FinLab[2] and IT Works[3] are examples of companies that produce off-the shelf shadow systems. Depending on the expertise of the developers, these solutions may exceed the reliability of those created by the organizations's information systems department. The term can also refer to legitimate, managed replicas of operational databases that are isolated from the user base of the main system. These sub-systems can be used to track illegitimate changes to the primary data-store by 'back doors' exploited by expert but un-authorized users. When Shadow Data Systems are created by an experienced programmer or software engineer with significant input from departmental management, the resulting solution frequently exceeds the capability of those created by the organizations centralized information systems department. The experience of the programmer / software engineer easily removes most of the previously stated problems. And, when combined with input of departmental management, the resulting product actually meets the needs of the end user. When Shadow Data Systems are created by end users whose main area of expertise is something other than software engineering, they are subject to the following problems: Poorly designed, Not scalable, Poorly documented, Untested, and may allow unauthorized access to sensitive information.

4-10) what is the role of the database administrator and managing the database? What is the career outlook for this job?

The DBA role naturally divides into three major activities: ongoing maintenance of production databases (operations DBA); planning, design, and development of new database applications, or major changes to existing applications (development DBA, or architect); and management of an organisation's data and metadata (data administrator). One person may perform all three roles, but each is profoundly different.

4-15) what is a data warehouse? What are the three steps in building a data warehouse?

The data warehouse is a central data repository containing information drawn from multiple sources that can be used for analysis, intelligence gathering, and strategic planning. Extract, transform, and load The first step is to extract data from its home database, and then transform and cleanse it so that it adheres to common data definitions.

4-6) following the file processing model of data management, what three architectures emerged for integrated databases? What are the advantages of each? Are there disadvantages?

The external level defines how each group of end-users sees the organization of data in the database. A single database can have any number of views at the external level. The conceptual level unifies the various external views into a compatible global view.[31] It provides the synthesis of all the external views. It is out of the scope of the various database end-users, and is rather of interest to database application developers and database administrators. The internal level (or physical level) is the internal organization of data inside a DBMS. It is concerned with cost, performance, scalability and other operational matters. It deals with storage layout of the data, using storage structures such as indexes to enhance performance. Occasionally it stores data of individual views, computed from generic data, if performance justification exists for such redundancy. It balances all the external views' performance requirements, possibly conflicting, in an attempt to optimize overall performance across all activities.

4-5) what are the major disadvantages of file processing systems? What are four specific problems associated with file processing systems?

The file processing system has the following major disadvantages: Data redundancy and inconsistency.Integrity Problems.Security ProblemsDifficulty in accessing data.Data isolation. a) Data redundancy and inconsistency: Data redundancy means duplication of data and inconsistency means that the duplicated values are different. b) Integrity problems: Data integrity means that the data values in the data base should be accurate in the sense that the value must satisfy some rules. c) Security Problem: Data security means prevention of data accession by unauthorized users. d) Difficulty in accessing data: Difficulty in accessing data arises whenever there is no application program for a specific task. e) Data isolation: This problem arises due to the scattering of data in various files with various formats. Due to the above disadvantages of the earlier data processing system, the necessity for an effective data processing system arises. Only at that time the concept of DBMS emerges for the rescue of a large number of organizations.

4-17) what are four examples of data warehouse architectures? Which approach is suitable to meet today's growing demand for real-time information?

The technical architecture of data warehouses is somewhat similar to other systems, but does have some special characteristics. There are two border areas in data warehouse architecture - the single-layer architecture and the N-layer architecture. The difference here is the number of middleware between the operational systems and the analytical tools. The data warehouse architecture described here is a high level architecture and the parts in the architectures mentioned are full bodied systems and not system-parts. Components of Data Warehouse Architecture ° Source Data Component 1. Production Data 2. Internal Data 3. Archived Data 4. External Data ° Data Staging Component 1. Data Extraction 2. Data Transformation 3. Data Loading ° Data Storage Component ° Information Deliver Component ° Metadata Component ° Management and Control Component

4-4) what were the early design approaches to managing information resources?

Traditionally, design management was seen as limited to the management of design projects, but over time, it evolved to include other aspects of an organization at the functional and strategic level. A more recent debate concerns the integration of design thinking into strategic management as a cross-disciplinary and human-centered approach to management.

4-1) what are three categories that describe the nature of information resources? Give an example of each. How do you characterise the relationships within each category of information?

structure information: a sale transaction with clearly defined field for date, customer, number, item number, and amount Unstructured information: manilla folder containing assorted items about a lawsuit, such as photos, handwritten notes, newspaper article, or affidavitSemi-structured information: a Wed pages with title,subtitle,content,and a few images.


Related study sets

Descripciones de las enfermedades

View Set

(BUS 256) Ch. 4 - Strategic Job Analysis & Competency Modeling (Quiz Questions)

View Set

Macroeconomics - Chapter 9: Long-Run Economic Growth

View Set

SEJPME II - Introduction To Joint Fundamentals

View Set

Team Quizzes (Chapters 14, 16, 17, 18, 19, 20)

View Set

Principles of Macroeconomics - Ch. 12-15

View Set