Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
Adv of Traditional Approach
|
Easy to use
|
|
Disadv of Traditional Approach
|
Results in data redundancy, which lowers integrity of data, which is less accurate
|
|
Adv of Database Approach
|
Improved stategic use of corporate data, reduced data redundancy, improved integrity, easier modification and upgrading, data and program independence, better access to data and information, standardization of data access, a framework for program development, better overall protection of data, and shared data and information resources
|
|
Disadv of Database Approach
|
More complexity, more expensive, and more difficult to recover from a failure.
|
|
Enterprise Data Modeling
|
a diagram of data entities and their relationships
|
|
Database Management System (DBMS)
|
A group of programs used as an interface between a database and application programs or a database and user
|
|
Entity
|
a generalized class of people, places, or things (objects) for which data is collected, stored, and maintained
|
|
Attribute
|
a characteristic of an entity
|
|
Primary key
|
a field or set of fields that uniquely identifies the record
|
|
Data warehouse
|
a database that collects business information from many sources in the enterprise, covering all aspects of the company’s processes, products, and customers
|
|
Hierarchy of data
|
bits, characters, fields, records, files, and databases
|
|
Data mart
|
a subset of a data warehouse
|
|
Data mining
|
an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse
|
|
Business Intelligence
|
the process of gathering enough of the right information in a timely manner and usable form and analyzing it to have a positive impact on business strategy, tactics, or operations
|
|
Knowledge Management
|
the process of capturing a company’s collective expertise wherever it resides and distributing it wherever it can help produce the biggest payoff
|
|
Distributed database
|
A database in which the data may be spread across several smaller databases connected via telecommunications devices
|
|
Online Analytical Processing (OLAP)
|
Software that allows users to explore data from a number of different perspectives
|
|
Online Transaction Processing (OLTP)
|
refers to a class of systems that facilitate and manage transaction-oriented applications, typically for data entry and retrieval transaction processing.
|
|
Telecommunications
|
electronic transmission of signals for communications, via telephone, radio, television, etc.
|
|
Data communications
|
subset of telecommunications that refers to the electronic collection, processing, and distribution of data, typically between computer system hardware devices
|
|
Telecommunications medium
|
anything that carries an electronic signal and interfaces between a sending device and a receiving device
|
|
Computer network
|
the communications media, devices, and software needed to connect two or more computer systems and/or devices
|
|
Synchronous communications
|
the receiver gets the message instantaneously
|
|
Asynchronous communications
|
the receiver gets the message some period of time after it is sent
|
|
Half-duplex channel
|
can transmit data in either direction, but not simultaneously
|
|
Full-duplex channel
|
permits data transmission in both directions at the same time
|
|
Simplex channel
|
can transmit data in only one direction
|
|
Guided transmission media
|
communications signals are guided along a solid medium
|
|
Unguided transmission media
|
communications signals are sent over airwaves
|
|
Examples of Guided media
|
Coaxial cables, fiber optic cable
|
|
Examples of Unguided media
|
Microwave, cellular, infrared
|
|
Modem
|
a device that translates data from digital to analog and analog to digital
|
|
Analog signal/digital signal
|
Phones can only transmit through analog signals while the internet useds digital signals, so you need a modem
|
|
Multiplexers
|
devices that allow several telecommunications signals to be transmitted over a single communications medium at the same time
|
|
Front-end processors
|
special-purpose computers that manage communications to and from a computer system
Connect a midrange or mainframe computer to hundreds or thousands of communications lines |
|
Communication protocol
|
TCP/IP, OSI, IEEE 802.3 (Ethernet), Firewire
|
|
Network Topology
|
logical model that describes how networks are structured or configured
|
|
Electronic Data Interchange (EDI)
|
a set of standards for structuring information that is to be electronically exchanged between and within businesses, organizations, government entities and other groups.
|
|
Network-management software
|
enables a manager on a networked desktop to monitor the use of individual computers and shared hardware, scan for viruses, and ensure compliance with software licenses
|
|
Network operating system (NOS)
|
systems software that controls the computer systems and devices on a network and allows them to communicate with each other
|
|
Internet
|
a collection of interconnected networks, all freely exchanging information
|
|
Extranet
|
a network based on Web technologies that links selected resources of a company’s intranet with its customers, suppliers, or other business partners
|
|
Uniform Resource Locator (URL)
|
an assigned address on the Internet for each computer
|
|
Internet service provider (ISP)
|
any company that provides individuals or organizations with Internet access
|
|
Hypertext Markup Language (HTML)
|
the standard page description language for Web pages
|
|
Web browser
|
software that creates a unique, hypermedia-based menu on a computer screen, providing a graphical interface to the Web
|
|
Management issues of the internet
|
preventing attacks
Service and speed issues Web server computers can be overwhelmed by the amount of “hits” (requests for pages) Routers can become bottlenecks |
|
Privacy issues
|
cookies and spyware
|
|
Fraud issues
|
Phising
|
|
Cryptography
|
converting a message into a secret code and changing the encoded message back to regular text
|
|
Digital signature
|
encryption technique used to verify the identity of a message sender for processing online financial transactions
|
|
Firewall
|
a device that sits between an internal network and the Internet, limiting access into and out of a network based on access policies
|
|
Push technology
|
When companies show you stuff
|
|
What do you need to connect to the internet?
|
1. Computer
2. NIC 3. NOS 4. ISP 5. Protocol 6. Internet browser |
|
Steps to make a website?
|
1. Plan the site
2. Decide the type of hosting and domain names 3. Decide and build the site 4. Promote the site 5. Monetize 6. Monitor and Maintain the site |