New version page

FSU CGS 2060 - Chapter 7

Upgrade to remove ads

This preview shows page 1-2 out of 6 pages.

Save
View Full Document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Upgrade to remove ads
Unformatted text preview:

CGS2060 Concept Exams #2 Study Guide Chapter 7 Topics: - DBMS - functions are Protecting data, organizing data, storing important data, and performing routine tasks. - Individuals use personal databases to store addresses/contact information/keep track of important dates/keep track of valuables. - A table in a Relational Database has rows and columns. - Attribute is a column in a table and contains values of the same type. Key - A field in a record that is used to identify the record Primary key - A field that uniquely identifies a record prevents duplicate records from occurring in a table.- The Relational Model is the most popular type model that links tables through common fields. uses One-to-many(most common); one-to-one; many-to-one- Data Manipulation Language - specific language provided with the DBMS that allows people and other database users to access, modify, and make queries about data contained in the database, and to generate reports.- Data mining - process of extracting data from a data warehouse - Distributed database – Data Base that extends from Head Quarters to Warehouses/Retail Outlets etc.Chapter 8 Topics: - Wi-Fi technologies helped move e-commerce from desktops to mobile devices. - The iPhone is credited with having created a market for online mobile apps. - Examples of Transaction Processing Systems (TPS) : Cash register/Atm, anything that supports/records transactions- examples of Business-to-Business : Global supply chain management (GSM) Business-to-Consumer : Retail storesConsumer-to-Consumer : Ebay/Cragslist/other trading- Shopping by the web allows consumers to comparison shop and read customer reviews - Near Field Communications (NFC), RFID, Infared, and Bluetooth All private, close range communications. - M-Commerce - form of e-commerce that takes place over wireless mobile devices such as handheld computers and cell phones.Chapter 9 Topics: - Decision making involves three steps - Intelligence, Design, and Choice. - Stages of design - Intelligence Stage > Design Stage > Choice Stage > Implementation > Monitoring- Programmed decisions - involve routine situations with known solutions - Non-Programmed decisions - involve unusual or exceptional situations - Optimization model - finds the best solution - MIS - pulls data from one or more databases, sifts through the data and produces useful reports. - Another term for MIS is Business Intelligence - Decision Support System (DSS) - focuses on unstructured and semistructured problems. Chapter 10 Topics: - Project Leader , Project Coordinator, Project Manager - plan, monitor, and control necessary development activities.- Offshoring - relocates an entire production line to another location, typically in another country with cheaper labor, lower taxes, or other financial benefits.Outsourcing - business’ use of an outside company to take over portions of its workload. Globalization – When a company makes the product available internationally- Request for Proposal - generated when an organization wants in IT Vendor to submit a bid for a new or modified system Chapter 11 Topics: - Total Information Security – involves securing all components of the global digital information infrastructure. Personal Computers. Business Computer Systems. Government Systems International Systems- Credit Card fraud - makes up 20 percent of the ID theft cases - Protection of individual property can take many forms including copyrights, trademarks, trade secrets, and patents. - Copyright protects the rights of an individual for life plus 70 years - Trademark/Patent/Trade secret – Establishes intellectual property (product of the mind or intellect over which the owner holds legal entitlement.)- Software patches - corrections to software errors or vulnerabilities- The most common cause of data loss is hardware failure - incremental - A backup that stores the files that have changed since the last - War driving – Driving around fishing for Wifi to commit identity fraudChapter 12 Topics: - Carpal Tunnel Syndrome - example of Repetitive Stress Disorder. - Solid State Drives - have no moving parts and are faster and use less energy than regular hard drives. - Censorship - when a government or authority controls speech and other forms of expression.- Content filtering software - works with a web browser to limit what a user can access. - Privacy issues that you should be concerned with include freedom from intrusion, freedom from surveillance, and control over the information collected about one’s self. - Cookies – Programs that record search information and incorporating it into advertisement- Know the P2P (peer-to-peer) - networks used to share files - Digital divides can be based upon sex, ethnicity, race, age, income, location, and disability Chapter 7 OUTLINE/SUMMARY Databases and Database Management Systems (DBMS) - transform large quantities of data into specific/valuable info DBMS - group of programs that manipulate the database and provide an interface between the database and the user or the database and application programs.  Fields are set to hold specific types of data.  Characters > Fields > Records > Files > Database Primary key: A field that uniquely identifies a record relational database - tables are linked (related) through common fields. One-to-many, Most typical, Makes use of primary key* One-to-one *Many-to-many Data analysis is a process that involves evaluating data to identify problems with the content of a database. Data Integrity refers to the accuracy of the data in a database. Database Types: Single User vs. Multiuser General-Purpose vs. Special-Purpose schema - outline of the logical and physical structure of the data and relationships among the data in the database. data dictionary - provides a detailed description of all data used in the database. power of a database and DBMS lies in the user’s ability to manipulate the data to turn up useful information  Data can be sifted, sorted and queried through the use of data manipulation languages Data Manipulation Language (DML) is a  Structured Query Language (SQL): The most popular DML Data Warehouse: A database that holds important information from a variety of sources.  Data Mart: A small data warehouse, often developed for a specific person or purpose. Data Mining: the process of extracting information from a data warehouse. Business Intelligence is the use of data mining to


View Full Document
Download Chapter 7
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 7 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 7 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?