Study Guide CIS
One-To-One Relationship
is between two entities in which an instance of on entity can be related to only one instance of a related entity
One-To-Many Relationship
is between two entities in which an instance of one entity can be related to many instances of a related entity.
Many-To-Many Relatonship
is between two entities in which an instance of one entity is related to many instances of another and one instance of the other can be related to many instances of the first entity.
Metadata
provides detail about data. For example, an image may include metadata that describes how large the picture is, the color depth, the image resolution, when the image was created, and other data.
Development Testing
test the system to ensure it is bug-free
Attribute
(aka columns or fields) data elements associated with an entity
Attributes
(aka columns or fields) data elements associated with an entity.
Data Element
(aka data field) the smallest or basic unit of data. Examples: customer's name, address, email, discount rate, preferred shipping method, product name, quantity ordered, etc.
Entity
(aka table) stores data about a person, place, thing, transaction, or event
Entity
(aka table) stores data about a person, place, thing, transaction, or event.
Blocks
A block contains the transactional data that transfers digital assets between the blocks or parties.
Digital Ledger
A digital ledger is a bookkeeping list of assets (money, property, ideas...), identified ownership, and transactions that record the transfer of ownership among participants. It is a linear list to which information can only be added, with older records retained to preserve the full history of each asset.
Miners
A group/network of computers/actors(an entity that can participate in an action or in a blockchain network) that validate new blockchain transactions and record them on the blockchain by solving a difficult mathematical problem based on a cryptographic hash algorithm.
Expression
A math operation to calculate a new value based on other values
Structured Query Language (SQL)
A tool used for retrieving data from a DBMS (database management system). It asks users to write lines of code to answer questions against a database. Lets you access and manipulate databases. Example actions: execute queries, retrieve data, insert/update/delete records, create databases/tables/procedures/views.
IF Statements
IF (condition is true) THEN (run code block) ELSE (optional, but otherwise run code block) Example code: if (condition) { expr1 // RUN IF CONDITION IS TRUE } else { expr2 // RUN IF CONDITION IS FALSE }
Setup
Preparing the data or information needed for a task. For a loop, this establishes the initial values of variables for the condition and loop work
Project
Temporary activity a company undertakes to create a unique product, service, or result.
Loop Work
The instructions you want repeated
Triple Constraint
The relationship among time, cost, and scope. If one changes, at least one other is likely to be affected.
Identity Management
a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
Neural Networks
a category of AI that attempts to emulate the way the human brain works.
Field
a characteristic of a table
Record
a collection of related data elements. Each record in an entity (table) occupies one row.
Virtual Reality
a computer-simulated environment that can be a simulation of the real world or an imaginary world.
Bitcoin
a decentralized digital currency, without a central bank or single administrator, that can be sent from user to user on the peer-to-peer bitcoin network without the need for intermediaries.
Cryptocurrency
a digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
Software Engineering
a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.
Primary Key
a field (or group of fields) that uniquely identifies a given record in a table. They are a critical piece of a relational database b/c they provide a way of distinguishing each record in a table. Ex. Searching for a customer Steve Smith. There could be multiple Steve Smiths, therefore, a primary key could be Steve Smith's unique ID.
Hash
a function that converts an input of letters and numbers into an encrypted output of a fixed length. Hashes are the links in the blockchain.
Fuzzy Logic
a mathematical method of handling imprecise or subjective information. Basic approach is to assign values b/w 0 and 1 to vague or ambiguous information. Zero represents information not included, whereas 1 represents inclusion or membership.
Functions
a named set of computer logic to accomplish a specific task. Sometimes called procedures. Functions typically contain the software logic for a single algorithm
Real Number
a number that does contain decimal positions or fractions.
Variables
a place to store a value and that storage location can be changed to a different value at a later time if you want to do the calculation with different data
Foreign Key
a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
System Development Lifecycle
a process for planning, creating, testing, and deploying an information system.
Deep Learning
a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets.Trains from each layer then uses that learning in the next layer to learn more, until the learning reaches its full stage through cumulative learning in multiple layers. Requires thousands of data records for the models to become good at classification tasks and millions to perform at the level of a human.
Proof-Of-Work
a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain. PoW has two goals: (1) verify the legitimacy of a transaction (to avoid the double-spend problem where a single unit of currency is sent to two recipients at the same time), and (2) create new digital currency units by rewarding miners for performing the proof-of-work task.
Sequences
a series of actions done in a specific order to complete a task
Program
a series of coded software instructions to control the operation of a computer or other machine
Algorithm
a set of instructions (codes) that complete a task
Machine Learning
a type of artificial intelligence that enables computers to both understand concepts in the environment and to learn.
Blockchain
a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data.
Constant
a value that does not change
Integer
a whole number without decimals or fractions
General Algorithm
an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. It finds the combination of inputs that gives the best outputs.
Data Types
an attribute associated with a piece of data that tells a computer system how to interpret its value (ex. "hello" → string, 3 → integer)
Conditions
answering a true/false question based on data and calculation, then pursuing one set of actions if the answer is true, or a different set of actions if false
Conditions
answering a true/false question based on data and calculation, then pursuing one set of actions if the answer is true, or a different set of actions if false.
Relational Integrity Constraints
are rules that enforce basic and fundamental information-based constraints. (ex. would not allow someone to create an order for a nonexistent customer, provide a markup percentage that was negative, or order zero pounds of raw materials from a supplier)
Alpha Testing
assess if the entire system meets the design requirements of the users
Testing Phase
brings all the project pieces together into a special testing environment to eliminate errors and bugs and verify that the system meets all the business requirements defined in the analysis phase.
Exit Strategy
changing variables associated with the condition so the loop eventually stops
Expert Systems
computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
DBMS
creates, reads, updates, and deletes data in a database while controlling access and security
Equations
declare that the value of the expression is the same as the value in the destination variable
Bugs
defects in the code of an information system
User Acceptance Testing
determine if the system satisfies the user and business requirements
Intangible Benefits
difficult to quantify or measure
Analysis Phase
during this phase, the firm analyzes its end-user business requirements and refines project goals into defined functions and operations of the intended system.
Tangible Benefits
easy to quantify and typically measured to determine the success of failure of a project
Business-Critical Integrity Constraints
enforce business rules (ex. returns only allowed within 10 days of purchase) vital to an organization's success and often require more insight and knowledge than relational integrity contraints. Business-critical constraints tend to mirror the rules by which an organization achieves success.
Planning Phase
establishes a high-level plan of the intended project and determines project goals
Design Phase
establishes descriptions of the desired features and operations of the system, including screen layouts, business rules, process diagrams, pseudocode, and other documentation.
Psuedocode
fake code that is an informal description of how the computer program should work. It is intended for human reading rather than machine reading
Loops
instruct the computer to repeat a set of actions over and over again until a condition becomes false
Code
instructions for a computer
After-Party
instructions to finalize the task after the loop ends (this component is optional and is not always provided)
Algorithms
involve a sequence of steps or actions needed to accomplish some task
General AI
machines that have all the senses (maybe more), all the reason, and think just like people do
Database
maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
Preventive Maintenance
makes system changes to reduce the chance of future system failure
Corrective Maintenance
makes system changes to repair design flaws, coding errors, or implementation issues
Distributed Computing
processes and manages algorithms across many machines in a computing environment. Individual computers are networked together across geographical areas and work together to execute a workload or computing process as if they were one single computing environment.
Programming Language
refers to a unique set of keywords along with a special syntax for organizing program instructions that execute computer commands.
Integrity Constraints
rules that help ensure the quality of data. Two types of constraints: (1) relational and (2) business critical.
Implementation Phase
the organization places the system into production so users can begin to perform actual business operations with it
Artificial Intelligence
simulates human thinking and behavior, such as the ability to reason and learn. Ultimate goal is to build a system that can mimic human intelligence.
Business Requirements
specific business requests the system must meet to be successful
Relational Database Model
stores data in the form of logically related two-dimensional tables
Development Phase
takes all the detailed design documents from the design phase and transforms them into the actual system. In this phase, the project transitions from preliminary designs to actual physical implementation. The company purchases and implements the equipment necessary to support the architecture.
Narrow AI
technologies that can perform specific tasks as well as, or better than, humans
Unit Testing
test individual units or pieces of code for a system
Immutability
the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions. Immutability has the potential to transform the auditing process into a quick, efficient, and cost-effective procedure.
Data Redundancy
the duplication of data, or the storage of the same data in multiple places. Redundant data can cause storage issues along with data integrity issues, making it difficult to determine which values are the most current or most accurate.A primary goal of a database is to eliminate data redundancy by recording each piece of data in only one place in the database. This saves disk space, makes performing data updates easier, and improves data quality.
Assignment
the instruction that puts a new value into a variable
Feasibility
the measure of the tangible and intangible benefits of an information system.
Maintenance Phase
the organization performs changes, corrections, additions, and upgrades to ensure the system continues to meet business goals.
Double-Spend
the risk that a digital currency can be spent twice. Happens when a blockchain network is disrupted and cryptocurrency is essentially stolen. The thief would send a copy of the currency transaction to make it look legitimate, or might erase the transaction altogether. Most common method of double-spending is the thief will send multiple packets to the network, reversing the transaction so that it looks like they never happened.
Reinforcement Learning
the training of machine learning models to make a sequence of decisions. The model uses trial and error to find a solution to the problem. To train the model, the programmer uses either rewards or penalties for the actions it performs. Goal is to maximize the total reward.
Decentralization
the transfer of control and decision-making from a centralized entity to a distributed network.
Augmented Reality
the viewing of the physical world with computer-generated layers of information added to it
Strings
values that contain letters and symbols
Integration Testing
verify that separate systems can work together, passing data back and forth correctly
System Testing
verify that the units or pieces of code function correctly when integrated
WHILE Statement
while the condition is TRUE repeat the block of code until the condition becomes FALSE setup while (condition) { code block (loop work) exit strategy }