CGS2060 Concept Exams #2 Study Guide Chapter 7 Topics: - DBMS - functions are Protecting data, organizing data, storing important data, and performing routine tasks. - Individuals use personal databases to store addresses/contact information/keep track of important dates/keep track of valuables. - A table in a Relational Database has rows and columns. - Attribute is a column in a table and contains values of the same type. Key - A field in a record that is used to identify the record Primary key - A field that uniquely identifies a record prevents duplicate records from occurring in a table.- The Relational Model is the most popular type model that links tables through common fields. uses One-to-many(most common); one-to-one; many-to-one- Data Manipulation Language - specific language provided with the DBMS that allows people and other database users to access, modify, and make queries about data contained in the database, and to generate reports.- Data mining - process of extracting data from a data warehouse - Distributed database – Data Base that extends from Head Quarters to Warehouses/Retail Outlets etc.Chapter 8 Topics: - Wi-Fi technologies helped move e-commerce from desktops to mobile devices. - The iPhone is credited with having created a market for online mobile apps. - Examples of Transaction Processing Systems (TPS) : Cash register/Atm, anything that supports/records transactions- examples of Business-to-Business : Global supply chain management (GSM) Business-to-Consumer : Retail storesConsumer-to-Consumer : Ebay/Cragslist/other trading- Shopping by the web allows consumers to comparison shop and read customer reviews - Near Field Communications (NFC), RFID, Infared, and Bluetooth All private, close range communications. - M-Commerce - form of e-commerce that takes place over wireless mobile devices such as handheld computers and cell phones.Chapter 9 Topics: - Decision making involves three steps - Intelligence, Design, and Choice. - Stages of design - Intelligence Stage > Design Stage > Choice Stage > Implementation > Monitoring- Programmed decisions - involve routine situations with known solutions - Non-Programmed decisions - involve unusual or exceptional situations - Optimization model - finds the best solution - MIS - pulls data from one or more databases, sifts through the data and produces useful reports. - Another term for MIS is Business Intelligence - Decision Support System (DSS) - focuses on unstructured and semistructured problems. Chapter 10 Topics: - Project Leader , Project Coordinator, Project Manager - plan, monitor, and control necessary development activities.- Offshoring - relocates an entire production line to another location, typically in another country with cheaper labor, lower taxes, or other financial benefits.Outsourcing - business’ use of an outside company to take over portions of its workload. Globalization – When a company makes the product available internationally- Request for Proposal - generated when an organization wants in IT Vendor to submit a bid for a new or modified system Chapter 11 Topics: - Total Information Security – involves securing all components of the global digital information infrastructure. Personal Computers. Business Computer Systems. Government Systems International Systems- Credit Card fraud - makes up 20 percent of the ID theft cases - Protection of individual property can take many forms including copyrights, trademarks, trade secrets, and patents. - Copyright protects the rights of an individual for life plus 70 years - Trademark/Patent/Trade secret – Establishes intellectual property (product of the mind or intellect over which the owner holds legal entitlement.)- Software patches - corrections to software errors or vulnerabilities- The most common cause of data loss is hardware failure - incremental - A backup that stores the files that have changed since the last - War driving – Driving around fishing for Wifi to commit identity fraudChapter 12 Topics: - Carpal Tunnel Syndrome - example of Repetitive Stress Disorder. - Solid State Drives - have no moving parts and are faster and use less energy than regular hard drives. - Censorship - when a government or authority controls speech and other forms of expression.- Content filtering software - works with a web browser to limit what a user can access. - Privacy issues that you should be concerned with include freedom from intrusion, freedom from surveillance, and control over the information collected about one’s self. - Cookies – Programs that record search information and incorporating it into advertisement- Know the P2P (peer-to-peer) - networks used to share files - Digital divides can be based upon sex, ethnicity, race, age, income, location, and disability Chapter 7 OUTLINE/SUMMARY Databases and Database Management Systems (DBMS) - transform large quantities of data into specific/valuable info DBMS - group of programs that manipulate the database and provide an interface between the database and the user or the database and application programs. Fields are set to hold specific types of data. Characters > Fields > Records > Files > Database Primary key: A field that uniquely identifies a record relational database - tables are linked (related) through common fields. One-to-many, Most typical, Makes use of primary key* One-to-one *Many-to-many Data analysis is a process that involves evaluating data to identify problems with the content of a database. Data Integrity refers to the accuracy of the data in a database. Database Types: Single User vs. Multiuser General-Purpose vs. Special-Purpose schema - outline of the logical and physical structure of the data and relationships among the data in the database. data dictionary - provides a detailed description of all data used in the database. power of a database and DBMS lies in the user’s ability to manipulate the data to turn up useful information Data can be sifted, sorted and queried through the use of data manipulation languages Data Manipulation Language (DML) is a Structured Query Language (SQL): The most popular DML Data Warehouse: A database that holds important information from a variety of sources. Data Mart: A small data warehouse, often developed for a specific person or purpose. Data Mining: the process of extracting information from a data warehouse. Business Intelligence is the use of data mining to
View Full Document