Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
59 Cards in this Set
- Front
- Back
What is a database?
|
a set of computer files that minimizes data redundancy and is accessed by one or more applicatiaon programs for data processing
|
|
What is a database management system (DBMS)?
|
A database program that enables users to create, modify, and utilize database information efficiently
|
|
What are the two key things to Database Management?
|
Database Design
Query Creation |
|
What does database design focus on?
|
Focuses on how to set up the tables to eliminate redundancy and facilitate queries.
|
|
What does Query creation focus on?
|
Focuses on how to use the tables to generate summary information from detailed activities.
|
|
What is data captured in? summarized in? and presented in?
|
Captured in Tables
Summarized in Queries Presented in Reports |
|
What are keys?
|
primary and foreign keys link tables
|
|
What does referential integrity refer to?
What are three facts about referential integrity? What rule is this known as? |
It refers to the relationship between data within tables
1. No secondary key can be entered into table without the referenced primary key existing in the referenced table 2. No primary key can be deleted from its table where there are existing secondary keys in other tables which use the referenced primary key 3. Ensure that master record exists before detail is added in another table Known as the no Child Left Behind rule |
|
What is normalization?
|
eliminating redundancy from different tables
|
|
Waht are anomolies?
|
potential errors
|
|
What are cardinalities?
|
relationship between tables
|
|
Idenfities a unique record within the table, may only exist once in the table
|
Primary Key
|
|
What does referential integrity say about secondary keys and primary keys? (i.e. the no child left behind drule)
|
No SECONDARY KEY can be entered into a table without the referenced primary key already existing in the referenced table
No PRIMARY KEY can be deleted from its table where there are existing secondary keys in other tables which use the referenced primary key |
|
What is the normalization process?
|
It is a process which systematically splits unnoramlized complex tables into smaller tables that meet two conditions:
all nonkey (secondary) attributes in the table are dependent on the primary key all nonkey attributes are independent of the other nonkey attributes |
|
When unnormalized tables are split they must be what?
|
They must be linked together by foreign keys.
When unnormalized tabels are split and dreduced to third normal form, they must then be linked together by foreign keys |
|
What does normalization reduce the chances of?
|
Anomolies
|
|
What is an Insertion Anomoly?
|
A new item cannont be added to the table until at least one entity uses a particular attribute item.
Can a potential supplier be inserted w/o adding an item #? |
|
What is a Deletion Anomoly?
|
If an attribute item used by only one entity is deleted, all information about that attribute item is lost.
Can an item be deleted and the supplier information maintained? |
|
What is an Update Anomoly?
|
A modification on an attribute must be made in each of the rows in which the attribute appears.
Is it possible for a supplier to be listed with two different addresses? |
|
What are the four different cardinalities?
|
1 : 1 one to one
1 : M one to many M : 1 many to one M : M many to many |
|
A cardinality in which each piece of information relates to one and only one of the other pieces of information
|
1 : 1
Ex. Name and Social Security #. |
|
A cardinality in which one entity relates to potentially multiple second entities, while the second entity relates to only ofne of the first entity.
|
1 : M
Ex. Mother may have mulitple children. While a child has only one mother. |
|
A cardinality in which each entity may relate to multiples of the second entity
|
M : M
Ex. Students to Classes |
|
In a 1 : 1 relationship where is the foreign key placed?
|
The foreign key could be put in either table.
|
|
In a 1 : M relationship where is the foreign key placed?
|
The foreign key is put in the many table.
|
|
When working with a M : M cardinality what needs to be created?
|
A junction table needs to be created.
|
|
What are the steps to create a Data base design?
|
1. Idnetify entities (master tables)
2. Connect entities through transaction tables (event) 3. Add resources (other information) and agents (people) 4. Add cardinalities 5. Replace M : M with 1 : M and M : 1 6. Add prmary and foreign key information 7. Add other detailed information to each table |
|
What does the From query term do?
|
This term identifies the tables to be used for the query
|
|
What does the Join query term do?
|
This term connects two tables based on keys
|
|
What does the Where query term do?
|
This term is a criteria which selects which rows to include in the output
|
|
What does the Select query term do?
|
This term identifies the columns to be included in the display
|
|
For Database Implementation you should not store information that is:
|
Do not store information that is known.
Do not store information that can be created. |
|
The query term in which each record is married with every record with the same value
|
Join
|
|
The query term that allows the ability to restrict output to only certain RECORDS
|
Where
|
|
The query term that allows the ability to restrict output to only certain FIELDS
|
Select
|
|
What are the five myths Ackoff identifies?
|
1. The critical deficiency under which most managers operate is the lack of relevant information
2. The manager needs the information he wants 3. If a manager has the information he needs his decision making will improve 4. Better communication between managers improves organizational performance 5. A manager does not have to understand how his information system works, only how to use it |
|
A counter measure for solving the wrong problem would be..
|
Establish a clear connection between the project and organizational goals
|
|
A counter measure for poor problem definition and analysis would be...
|
Follow a standard systems development approach
|
|
A counter measure for poor communication would be...
|
Communicate often.
|
|
A counter measure for a project being to ambitious would be...
|
narrow the project focus to address only the most important business opportunities
|
|
A counter measure for lack of top management support would be...
|
Identify the senior manager who has most to gain from the success of the project, and recruit this individual to champion the project
|
|
The countermeasure for the lack of management and user involvement would be ...
|
Identify and recruit key stakeholders to be active participants in the project
|
|
The countermeasure for inadequate or improper system design would be...
|
Follow a standard systems development approach
|
|
The countermeasure for poor testing and implementation would be..
|
Plan sufficient time for this activity
|
|
The countermeasure for users being unable to use the system effectively would be..
|
Develop a rigorous user training program and budget sufficient time in the schedule to execute it
|
|
The countermeasure for lack of concern for maintenance would be..
|
Include an estimate of peoploe effort and costs for maintenance in the original project justification
|
|
Why do we have a Systems Development Methodology?
|
To break down system development into manageable phases
To give each phase clearly defined objectives / deliverables So specific tasks, tools and standards apply to each phase So users/ managers can provide feedback and sign off on deliverables To ensure that recent technologies are used in the process |
|
The Systems Development Life Cycle has a logical sequence of activities which are used to:
|
Identify new systems needs
and to Develop new systems to support those needs |
|
The Systems Development Life Cycle is a model:
|
for reducing risk through planning, execution, control, and documentation
|
|
What are the five cycles in the Systems Development Life Cycle?
|
1. Systems Strategy
2. Project Initiation 3. In House Development 4. Commercial Packages 5. Maintenance & Support |
|
The systems steering committee usually consists of these individuals of the company...
|
CEO
CIO CFO Senior Management from user areas and computer services Auditors |
|
What are the responsibilities of the systems steering committee:
|
Provide guidance
Resolve conflicts Review projects and assigning priorities Budget and allocate funds Review the status of projects Determine whether projects should be continued |
|
Who are the Systems Development Participants?
|
Systems Professionals
End Users Stakeholders |
|
What is the systems professionals role in the systems development process?
|
To analyze problems in current systems and formulate solutions
These individuals include: Systems Analysts Systems Designers Programmers |
|
What is the End Users role in the systems development process?
|
Primary users of the system
Addressing their needs is critical to success |
|
What is the stakeholders role in the systems development process?
|
Individuals who have an interest in the system but are not end users
|
|
What are two tools used by management for the systems development?
|
Gantt Chart
Pert Chart |
|
This chart represents time horizontally and activities vertically
|
Gantt Chart
|
|
This chart shows the relationships among key activities that constitute the construct and delivery process
|
PERT chart
|