DOC PREVIEW
UMSL INFSYS 2800 - Exam 1 Study Guide

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

INFSYS 2800 1st Edition Exam #1 Study GuideMid-Term Quiz ReviewA characteristic or quality describing an entity is called a(n) attribute. The type of logical database model that treats data as if they were stored in two-dimensional tables is the relational DBMS.In a table for customers, the information about a single customer would reside in a single row.The special organizational function whose responsibilities include the technical and operational aspects of managing data, including physical database design and maintenance, is called database administration.Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called data scrubbing.Policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems refers to as security.An independent computer program that copies itself from one computer to another over a network is called a worm.Software vendors correct flaws in their software after it has been distributed by issuing patches.The Health Insurance Portability and Accountability Act (HIPAA) of 1996 outlines medical security and privacy rules.Downtime refers to periods of time in which a computer system is not operational.The definition of Business Intelligence is a set of techniques and tools for the transformation of raw data into meaningful and useful information for business analysis purposesThe goal of Business Intelligence is the easy interpretation of large volumes of dataTools for analyzing data to help users find patterns, relationships, and insights and make better business decisions are known as Business intelligence.OLAP (Online Analytical Processing) is a tool for enabling users to obtain online answers to ad-hoc questions in a rapid amount of time.Text mining are tools used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships. Controls refer to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.The HIPAA Act of 1997outlines medical security and privacy rules. The Gramm-Leach-Bliley Actrequires financial institutions to ensure the security of customer data. The Sarbanes-Oxley Actimposes responsibility on companies and management to safeguard the accuracy of financial information. Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n)risk assessment.Current Value is:the Last Price * Number of SharesPortfolio Percentage isthe current value of the stock divided by the current value of all stockTotal Cost is (Purchase Price * Number of Shares) + CommissionReturn is (Current value of the stock – Cost of the Stock) divided by the Cost of the StockP/E Ratio is Last Price divided by Earnings per ShareAdvance Filter is a data analysis tool that offers the ability to summarize data.VLookup is a function to lookup a value in a listIF is a function to see if a condition that you specify is true or false and to specify what to do in either case.A Pivot Table is: a data analysis tool that offer the ability to summarize data.Conditional Formatting is a tool that lets you change the appearance of a cell based on its valueor another cell’s


View Full Document

UMSL INFSYS 2800 - Exam 1 Study Guide

Documents in this Course
Load more
Download Exam 1 Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam 1 Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam 1 Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?