• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/119

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

119 Cards in this Set

  • Front
  • Back
Purpose of database
organize and keep track of multiple themes
General Rule for databases
Single theme you store it in a spreadsheet
Multiple themed requires a database
Database definition
a self describing collection of integrated records
Fields/columns
stores data
Record/row
groups of fields
Table/file
group of records
Metadata
describes the structure of the database
Key
a column or group of columns that identifies a unique record/row in a table
Components of a database
Tables or Files
Relationships among rows in tables
Metadata
Components of database application system
User
Forms, reports, queires, application, program, (database applications)
Database management system
Database (table, relationship, metadata)
Why are database application programs needed?
Process logic specific for a business need
Enable processing via internet
DBMS process
Read
Insert
Modify
Delete
DBMS
a program used to create a process and administer a database
3 main functions of DBMS
Creating the database
process
administer
How do database applications make databases more useful?
The allow all information to be accessed in one place
Forms
screens you enter information into a field on
Report
something generated
Query
search for something
Why do we need databases?
To hold customer information
to analyze information
to have a competitive advantage to improve the company
Personal DBMS
smaller databases
1-100 users
Enterprise DBMS
large organizations, use very large databases
100-1000 users
Model
representation of something in the real world
Why do we bother model?
create blueprint before you start building the database
gets the story straight-easy for non-tech people to understand
minimize having to go back and make changes in the implementation stage
Database model
collection of entities,
relationship among entities
Database systems are modeled using...
an Entity Relationship (ER) diagram as the blueprint from which the actual data is stored
ER model allows us to...
sketch database designs
ERD is a graphical tool for...
modeling data
ERD is used in...
database design
ERD is a graphical representation of...
the logical structure of a database
ERD is a model that...
identifies the concepts or entities that exist in a system and the relationships between those entities
ERD rectangle represents..
a uniquely identifiable thing (person, order)
ERD diamond describes...
how two entities relate to one another
ERD circle, oval represents...
a characteristic of an entity or relationship (first name, order number)
Purpose of ERD
analyst gains a better understanding of the information to be contained in the database through the process of constructing the ERD
The ERD serves as a documentation tool
The ERD us used to communicate the logical structure of the database to users
It communicates the logic of the database to users
Components of an ERD
Entity
Relationship
Cardinality
Attribute
Optional relationship
an employee may or may not be assigned to a department
a patient may or may not be assigned to a bed
Mandatory relationship
every course must be taught by at least one teacher
every mother have at least a child
Cardinality constraints express...
the number of entities to which another entity can be associated via a relationship set
Cardinality constraints
the number of instances of one entity that can or must be associated with each instance of another entity
Minimum cardinality
if zero, then optional
if one or more, then mandatory
Maximum cardinality
the maximum number
One to one
a manager head one department and vice versa
One to many
an employee works in one department or one department has may employees
Many to many
a teacher teaches many students and a student is taught by many teachers
The primary key
entities need to be uniquely identifiable
Normalization
organizing data to minimize any repeated data
if you want to make a change to a record you only have to make it in one place, the relationship will take care of the rest
Normalization is good for two reasons
the database takes up less space
you have a lower chance of inconsistencies in your data
Users role in the development of databases
define what data database must contain
user review of data model is crucial
final approval of data models
devote time to do it right
LAN
Local area network
computers connected at a single physical site
WAN
Wide area network
computers connected between two or more separate sites
ISP functions
provide a legit internet address
gateway to the internet
pay for the internet by collection money from customers and paying access fees and other charges to telecom
HTTP
Hypertext transport protocol
HTTPS
Secure HTTP data transmission
SMTP
Simple mail transfer protocol
FTP
File transfer protocol
TCP
Transfer control protocol
Breaks traffic up into packets and dents each one along its way
IP
Internet protocols
Public IP addressing
identify a particular device on public internet
Public IP addresses must by unique, worldwide
assignment controlled by ICANN
ICANN
Internet Corporation for assigned names and numbers
Private IP addressing
Identify a particular device on a private network
Benefits of public IP
all devices on LAN share a public IP address
Benefits of private IP
need not register computer with ICANN approved agencies
Functions of LAN device
switch processing-IEEE 802.3 wired LAN traffic
access point processing-IEEE 802.11 wireless LAN traffic
translating between the two
converting between analog and digital
assigning private IP addresses
converting IP address between private and public
IPv4
Four decimal dotted notation
165.193.123.253
Domain name
world wide unique name affiliated with a public IP address
affiliation of domain names with IP addresses is dynamic
URL
Uniform resource locator
Could computing
represents computing solutions that have:
on demand service
broad network access
resource pooling
rapid elasticity
measure service
SaaS
software as a service
use providers application over a network
Paas
Platform as a service
deploy customer created applications to a cloud
IaaS
Infrastructure as a service
rent processing, storage, network capacity, and other fundamental computing resources
Financial benefits of cloud computing
reduce capital expenses
create more consistent management of costs
easier to integrate into service catalog and track costs
Service focused benefits of cloud computing
Don't have to worry about constant infrastructure updates
Able to concentrate on innovation and effective delivery of IT services
Flexibility and agility benefits of cloud computing
Improves IT ability to respond to business changes by enabling the delivery of rapidly recoverable consistent services
Formal cloud definition
elastic leasing of pooled computer resources over the internet
Elastic
dynamically increasing/decreasing of leased resources in short time span, and only pay for resources used
Why is cloud preferred to in-house hosting?
small capital requirements
speedy development
superior flexibility
known cost structure
possibility best of breed security/disaster preparations
industry wide economies of scale
Why now?
Technology supports construction and use of enormous data centers
Processors, data communication, data storage are cheap
When does the cloud not make sense?
law or industry standard practices require physical control over the data
private cloud (in house hosting)
IT Department
Formal group within company that manages the technology
Why does IT dept exist?
Make sure everything runs right
Keep things up to date
To roll out information systems
Information system
an assembly of hardware, software, data, procedures and people that interact to produce information
Information technology
refers to the products, methods, inventions, and standards that are used for the purpose of producing information

Pertains to the hardware, software and data components
Purpose of IT department
plan how to use IS to accomplish goals
manage outsourcing relationships
protect information assets
develop, operate, and maintain organizations computing infrastructure
develop operate and maintain enterprise applications
Infrastructure
Router, IP, servers, network, hardware
Governance
rules that apply security, project management
CTO
Chief technology officer

looks at trees in the technology, how can we be more efficient
IS/IT strategy
should be directly inline with the company's
Many methods to do this
IS planning functions
develop priorities and enforce them within the IS department
periodic meetings
Steering committees
brings together members of different groups to discus priorities
Outsourcing
Process of hiring another organization to perform services
Reasons to outsource IT
management expertise, they know more
risk reduction
cost reduction
Risk reduction
caps financial risk
lower labor costs
less likely to pick wrong technology
easier to fire a vendor then internal staff
International outsourcing
India- labor costs pretty equal
china and other countries
customer support
modern telephone technology and internet enabled service databases
Outsourcing alternatives
Hardware-IaaS cloud hosting
Software- Outsourced development
Data- can outsource data storage
Procedures- to an extent
People- to a degree
Risk of outsourcing
loss of control
no easy exit
you forget things
Benefits outweighed by long term costs
dealing with one vendor makes it easier
unit fixed cost contract could stop price changes
no easy exit- vendors don't give you up easily
you don't know if vendor works good
Expectations from IT department
hardware/programs allow you to perform your job
reliable/ secure network
reliable systems/ maintenance
effective training
User responsibilities
basic computer skills
learn the programs
protect your passwords
Future of IT management
see more outsourcing
becomes a governance
information systems security
process of protecting information systems vulnerabilities from threats by creating safeguards

goal is to find an appropriate trade off between the risk of loss and the cost of implementing safeguards
Types of security loss
unauthorized data disclosure
incorrect data
faulty service
denial of service
loss of infrastructure
Pretexting
social hacking
Phishing
email pretending to be something looking like someone else
Spoofing
pretending to be another IP address
drive by sniffers
listens on radio waves, captures data
Incorrect data modification
procedures not followed or incorrectly designed
placing information incorrectly on website
system errors
faulty recovery actions after a disaster
Faulty service
entering wrong information
systems not working
someone typed something wrong
Usurpation- a code to work differently
service keeps failing
Loss of infrastructure
human accidents
theft or terrist events
disgruntled employee
natural disasters
cyber warfare
Security breaches
Heartland payment systems- loss 134 mill credit cards
TJX- exposed 34 mil credit cards
Epsilon- names and email exposed
RSA- 40 million employee records stolen
Intrusion detection system
(IDS) computer program senses when another computer attempting to scan disk or other wise access computer
Security policy
establish company wide security policy
Technical safeguards
Hardware/software

identification and authorization
encryption
firewalls
malware protection
application design
Data safeguards
Data

data rights and responsibilities
passwords
encryption
backup and recovery
physical security
Human safeguards
Procedures/people

hiring
training
education
procedure design
administration
assessment
compliance
accountability
Firewalls
protect area
protects outside from coming in
Malware
different viruses that spread different ways
popups, computer runs slow
Malware safeguards
use antivirus and anti spyware programs
scan frequently
update malware definitions
instal updates
Human safeguards
hire the right people
change passwords often
monitor peoples activity
Operations department
department that keeps things up and running, management of all the computer devices