Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
data modeling 585
|
is the process of defining a databse so that it faithfully represents all aspects of the organization, including its interatctions with the external environment.
|
|
entity-relationship (E-R) diagram pg 585
|
is a graphical technique for portarying a database schema
|
|
REA data model pg 587
|
was developed specifically for use in desingning AIS.
|
|
resources pg 587
|
are those things that have economic value to the organization
|
|
events pg 587
|
are the various business activities about which management wants to collect infoirmation for planning or control purposes.
|
|
agents pg 587
|
are the people and organizaitons that participate in events and about whom informatin is desired for planning control, and evaluation purposes.
|
|
cardinalities pg 594
|
describe the nature of the relationship between two entities by indicating how many instances of one entity can be linked to each specific instance of another entity.
|
|
minimum cardinality pg 594
|
can be either zero or one, depending upon whether the relationship between the two entities is optional or mandatory cardinality is one.
|
|
maximum cardinality pg 596
|
can be either one or may depending upon whter each instance of entiy A can be linked to at most one instance or potentially many nstances of entity B
|
|
one-to-one (1:1) relationship pg 596
|
exists when the maximum cardinality for each entity in the relationship is 1.
|
|
one to many relationship
|
exist when the maximum cardinality of one entity in the relationship is 1 and the maximum cardinality for the other entity in that relationship is many
|
|
many to many relationship
|
exists when the maximum cardinaltity for both entities in the relationship is many.
|
|
entity
|
is anything about which the organization wants to collect and store information
|
|
concatenated keys
|
multiple -attribute primary keys
|
|
database management system (DBMS) pg 127
|
acts as an interface between the database and the various application programs
|
|
database system pg 127
|
the combination of the database, the DBMS, and the application programs that access the databse throught the DBMS
|
|
databse administrator (DBA) pg 127
|
the person responsible for the database
|
|
data warehouse pg 127
|
as technolgy improves many companies are developing very large databases called
|
|
data mining pg 127
|
the process of analyszing data repositories for new knowledge about the company's data and business processes
|
|
record layout pg 129
|
how the record is made up of ie record positons throu 10 fo rcutomer numbers, format of each fields.
|
|
logical view pg 129
|
is how the user or programmer conceptuallly organizes and understands the data
|
|
physical view pg 129
|
refers to how and where the data are physically arranged and stored in the computer system.
|
|
schema pg 129
|
describes the logical structure of a database.
|
|
conceptual - level schema pg 129
|
is the organizationwide view of fthe entire database.
|
|
external level schema pg 129
|
consists of a set of individual user views of portions of the databse,
|
|
subschema pg 131
|
refered to as external level schema
|
|
internal-level schema pg 131
|
provides a low-level view of the database.
|
|
data dictionary pg 131
|
which contains information about the structure of the database.
|
|
data definition language (DDL) pg 131
|
is used to (1) build the data dicitonary, (2) intialize or create the database, (3) describe the logical views for each individual user or programmer, and (4) specify any limitations or constraints on security imposed on database records or fields.
|
|
data manipulation language (DML) pg 133
|
is used for data maintenance, which includes such operations as updating, inserting, and deleting portions of the database.
|
|
data query language (DQL) pg 133
|
is used to interrogate the database. DQL retrieves, sorts,orders, and presents subsets fo the database in response to user queries.
|
|
report writer pg 133
|
which is a language that simplifies reprot creation.
|
|
data model pg 133
|
is an abstract representation of the contents of a database.
|
|
relational data model pg 133
|
represents everything in the database as being stored in the form of tables.
|
|
relation pg 133
|
also known as tables
|
|
tuple pg 133
|
each row in a relation
|
|
primary key pg 134
|
is the attribute or combination of attributes, that uniquely identifies a specific row in a table.
|
|
foreign key pg 134
|
is an attribute in a table that is primary key in another table.
|
|
update anomaly pg 134
|
changes (updates)to data bvalues are not correctly recorded.
|
|
insert anomaly pg 136
|
which occurs when trying to store data of customers which can only be mad euntil a customer actually makes a purchase.
|
|
delete anomaly pg 136
|
error that results when trying to delete a row from a table.
|
|
relational database
|
A relational database matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand.
|
|
entity integrity rule
|
which states that every table must have a primary key and that the column or columns chosen to be the primary key should be unique and not null.[1] A direct consequence of this integrity rule is that duplicate rows are forbidden in a table
|
|
referential intergrity rule
|
is a property of data which, when satisfied, requires every value of one attribute (column) of a relation (table) to exist as a value of another attribute in a different (or the same) relation (table).
|
|
normalization
|
In the design of a relational database management system (RDBMS), the process of organizing data to minimize redundancy is called normalization. The goal of database normalization is to decompose relations with anomalies in order to produce smaller, well-structured relations. Normalization usually involves dividing large, badly-formed tables into smaller, well-formed tables and defining relationships between them. The objective is to isolate data so that additions, deletions, and modifications of a field can be made in just one table and then propagated through the rest of the database via the defined relationships.
|
|
sabotage
|
the intenten is to destory or harm a system or some of its components
|
|
cookie
|
is a piece of text stored on a user's computer by their web browser. A cookie can be used for authentication, storing site preferences, shopping cart contents, the identifier for a server-based session, or anything else that can be accomplished through storing text data.
|
|
fraud
|
can be defined as gaining an unfair advantage over another person.
1. false statement, representation, or disclosure 2. a material fact, which is osmehting that induces a person to act 3. An intent ot deceive 4. A justifiable reliance; that is the person relies on the msirepresenation to take an action 5. An injury or loss suffered by the victim. |
|
white-collar criminal
|
a crime committed by a person of respectability and high social status in the course of his occupation"
|
|
misappropriation of assets
|
theft of company assets
|