Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/234

Click to flip

234 Cards in this Set

  • Front
  • Back
A feature in some browsers that places a marker of a Web site's Uniform Resource Locator (URL) in an easily retrievable list (called Favorites in Microsoft Internet Explorer)
bookmark
a list that shows the hierarchy of previously viewed Web pages within the Web site that you are currently visiting. Shown at the top of some Web pages, it aids Web site navigation
breadcrumb list
Software installed on a computer system that allows individuals to locate, view, and navigate the Web
Web browser
a list of contacts set up in an instant messaging program
buddy list
A device that enables a computer to send data over cable lines. A modem modulates and demodulates the signal into digital data and back again
cable modem
A small text file that some Web sites automatically store on a client computer's hard drive when a user visits the site
cookie
A connection to the Internet using a standard telephone line
dial-up connection
A type of connection that uses telephone lines to connect to the Internet and that allows both phone and data transmissions to share the same line
DSL
A type of specially coded text that, when clicked, enables a user to jump from one location, or Web page, to another within a Web site or to another Web site altogether
hyperlink
A program that enables users to communicate online in real time with others who are also online
instant messaging
(1) A specific word a user wishes to query (or look for) in an Internet search. (2) A specific word that has a predefined meaning for a particular programming language.
keyword
A company that connects individuals, groups, and other companies to the Internet
Internet service provider
A way to connect to the Internet using a small satellite dish, which is place outside the home and connects to a computer with coaxial cable. The company then sends the data to a satellite orbiting the Earth. The satellite, in turn, sends the data back to the satellite dish and to the computer
satellite Internet
A set of programs that searches the Web for specific words (or keywords) you wish to query (or look for) and then returns a list of the Web sites on which those keywords are found
search engine
Unwanted or junk e-mail
spam
A structured outline of Web sites organized by topics and subtopics
subject directory
A Web site's unique address such as www.microsoft.com
Uniform Resource Locator
Which one of the following statements is NOT true about instant messaging?
a. It is a popular form of communication.
b. You communicate in real time.
c. More than two people can IM at the same time.
d. Unlike e-mail, IM is good for private conversations.
d. Unlike e-mail, IM is good for private conversations.
When shopping online, which of the following does NOT indicate that you have a secure connection displays?
a. A closed padlock icon in the status bar.
b. The URL begins with https.
c. The word “secure” in the title bar.
d. The VeriSign seal on the Web page.
c. The word “secure” in the title bar.
With a podcast, you can
a. subscribe to video and audio content.
b. have the most recent content “delivered” automatically.
c. play the video and audio content on an MP3 player.
d. All of the above.
d. All of the above.
A Web page that enables online collaboration is a(n)
a. podcast.
b. wiki.
c. blog.
d. IM chat.
b. wiki.
Which of the following is annoying, but really doesn’t render any harm to your computer?
a. Virus
b. Spyware
c. Sneakware
d. Malware
b. Spyware
One scam that lures Internet users into revealing personal information is
a. malware.
b. phishing.
c. spam.
d. Internet hoax.
b. phishing.
When searching the Internet, which of the following is true?
a. It doesn’t matter which search engine you use; they all provide the same results.
b. A subject directory is best to use when you can provide keywords.
c. Boolean operators and advanced search pages will help to narrow your results.
d. Search engines are best to use when you need to narrow the search by specific topics.
c. Boolean operators and advanced search pages will help to narrow your results.
In the Web address http://www.irs.gov, which part is considered the top-level domain?
a. www
b. .gov
c. http
d. www.irs.gov
b. .gov
Which of the following provides the fastest broadband Internet connection by transmitting data at the speed of light?
a. Cable
b. DSL
c. Fiber-optics
d. Satellite
c. Fiber-optics
The primary disadvantage to cable Internet access is the quality and effectiveness of the service
a. are affected by the number of users on the same cableline at any time.
b. depend on your proximity to a phone company central office.
c. can be affected by adverse weather conditions.
d. depend on the Internet service provider you select.
a. are affected by the number of users on the same cableline at any time.
The Web and the Internet are interchangeable terms.
False
DSL service is not affected by the number of users on the line at the same time.
True
Because Google generates the most search results of any of the search engines, it is called a meta search engine.
False
Cookies store personal information to help customize Web pages for users.
True
You cannot connect to the Internet wirelessly unless you’re in a WiFi hotspot.
False
Software that is specifically designed to detect viruses and protect a computer and files from harm
antivirus software
An automated attack that is launched from more than one zombie computer at the same time
distributed denial of service
A software program or hardware device designed to prevent unauthorized access to computers or networks
firewall
Anyone who unlawfully breaks into a computer system (whether an individual computer or a network)
hacker
The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding others
identity theft
As defined by the NAS, "the set of measures intended to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation."
information assurance
A virtual communications gateway or path that enables a computer to organize requests for information (such as Web page downloads and e-mail routing) from other networks or computers
logical port
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol
network adapter
A network in which each node connected to the network can communicate directly with every other node on the network
peer-to-peer network
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems
zombie
A device that is installed on a long cable run to amplify a signal
repeater
A device that routes packets of data between two or more networks
router
A device for transmitting data on a network.
switch
The actual speed of data transfer that is achieved. It is usually less than the data transfer rate and is measured in megabits per second (Mbps)
throughput
A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged
virus
Which type of sharing is NOT a benefit of installing a home network?
a. Peripheral
b. Internet connection
c. CPU
d. File
c. CPU
Which of the following is NOT a reason peer-to-peer networks are generally installed in homes?
a. Client/server networks are less expandable than peer-to-peer networks.
b. Client/server networks are designed for larger numbers of users..
c. Client/server networks provide more security than is needed in a home network.
d. Servers are too difficult for most home users to set up.
a. Client/server networks are less expandable than peer-to-peer networks.
All networks contain the following elements except
a. network adapters.
b. transmission media.
c. networking software.
d. wireless connectivity.
d. wireless connectivity.
Which is an example of a network navigation device required to move data between two networks?
a. Wireless signal sender
b. Switch
c. Router
d. 5E cable.
c. Router
Wireless Ethernet networks are more challenging to set up than wired networks because
a. the navigation devices they use are more complicated to set up.
b. they have more security vulnerabilities.
c. there are many sources of signal interference in most houses.
d. None of the above
b. they have more security vulnerabilities.
Power-line networks are viable alternatives to Ethernet networks because they
a. are less expensive than Ethernet networks.
b. don’t require running any new wires to install.
c. provide six times the throughput of wired Ethernet networks.
d. All of the above.
b. don’t require running any new wires to install.
When hackers use a program that controls many other computers and uses them to launch an attack on another computer, this is called a(n)
a. Zero-day attack.
b. Trojan Horse attack.
c. Distributed Denial of Service attack.
d. Boot Sector Virus attack.
c. Distributed Denial of Service attack.
Which is NOT a benefit of firewalls?
a. They make it harder for a hacker to locate specific computers on a network.
b. They repeatedly change the IP address of the router.
c. They close unused logical ports to decrease network vulnerability.
d. They filter out unauthorized requests for data.
b. They repeatedly change the IP address of the router.
Wireless Ethernet networks are attractive to hackers because
a. The 802.11 protocol has weak security rules.
b. You can’t install a firewall on a wireless Ethernet network.
c. Wireless Ethernet networks have much greater bandwidth than wired.
d. It is much easier for a hacker to establish a connection with a wireless network.
d. It is much easier for a hacker to establish a connection with a wireless network.
Viruses that are triggered by a certain event (such as a date) or condition being achieved are called
a. worms.
b. stealth viruses.
c. logic bombs
d. macro viruses.
c. logic bombs
Actual data throughput is usually higher on wireless networks.
False
All home networks require each computer on the network to be equipped with its own network adapter.
True
Installing a firewall on your network will stop most viruses from being planted on your network.
False
Never opening e-mail attachments will ensure a computer never catches a virus.
False
Some wireless Ethernet networks are subject to interference from cordless phones.
True
A type of wireless technology that uses radio waves to transmit data over short distances. Often used to connect peripherals such as printers and keyboards to computers or headsets to cell phones
Bluetooth
A telephone that operates over a wireless network.
cell phone
Connects a personal digital assistant (PDA) to a computer using either a universal serial bus (USB) port or a serial port
cradle
A form of portable storage
flash memory card
A system of 21 satellites (plus three working spares), built and operated by the U.S. military, that constantly orbit the Earth. They provide information to GPS-capable devices to pinpoint locations on the Earth
GPS
Software that makes it possible to access the Internet from a PDA/smartphone
microbrowser
An extension of short message service (SMS) that enables messages that include text, sound, images, and video clips to be sent from a cell phone or PDA to other phones or e-mail addresses
multimedia message service
A portable electronic tool such as a cell phone, personal digital assistant (PDA), or notebook
mobile computing devices
A small portable device (such as an Ipod) that enables you to carry your MP3 or other media files around with you
portable media player
A powerful mobile computing solution that offers a large display and all of the computing power of a full desktop system
notebook computer
A category of computers consisting of notebooks that weigh 2 pounds or less
ultraportable
A mobile phone with advanced capabilities as a result of a convergence (or combination) of features such as camera, PMP, and PC-like features
PDA / Smartphone
The number of operations (or cycles) the processor completes each second, measured in hertz (Hz)
processor speed
Technology that enables short text messages (up to 160 characters) to be sent over mobile networks
short message service
A pen-shaped device used to tap or write on touch-sensitive screens
stylus
The process of updating data so that the files on different systems are the same
synchronizing
A notebook computer designed specifically to work with handwriting recognition technology
tablet notebook
Mobile computing is useful only in professions that
a. don’t rely on Internet access.
b. where work requires intensive graphics and large display screens.
c. where work requires intensive computer processing power.
d. None of the above.
d. None of the above.
Currently, cell phones contain ALL of the following except
a. a CPU.
b. output devices.
c. hard drives.
d. input devices.
c. hard drives.
Cell phones store data
a. on a memory cards.
b. in RAM.
c. in ROM.
d. all of the above.
d. all of the above.
To fit more songs on a personal media player you can
a. decrease the sampling rate of digitized music files.
b. install additional RAM in the PMP.
c. increase the sampling rate of digitized music files.
d. install a larger hard drive in the PMP.
a. decrease the sampling rate of digitized music files.
b. install additional RAM in the PMP.
d. install a larger hard drive in the PMP.
Flash memory is
a. nonvolatile and is not erased when power is disconnected.
b. volatile and is erased when power is disconnected.
c. used only in PDA/smartphones and tablet computers.
d. the main storage medium in notebook computers.
a. nonvolatile and is not erased when power is disconnected.
The device best suited for a salesperson who has to demonstrate processor-intensive multimedia to clients is a
a. smartphone with Internet capabilities.
b. PDA/smartphone with an external monitor.
c. Tablet PC.
d. notebook computer.
c. Tablet PC.
d. notebook computer.
GPS chips are
a. installed in all newly manufactured automobiles.
b. installed in all newly manufactured cell phones.
c. reliable only when installed in Tablet PCs.
d. available only for PDAs and smartphones.
b. installed in all newly manufactured cell phones.
For Internet access, you should obtain:
a. a Tablet PC.
b. a PDA/smartphone.
c. an Internet tablet.
d. All of the above can have Internet capability.
d. All of the above can have Internet capability.
When a notebook does not have enough USB ports, you
a. can have two devices share one USB port.
b. can add ports only if the notebook is configured with flash memory.
c. can’t add ports unless your computer uses Windows Vista.
d. can add ports using a PC card or external hub.
d. can add ports using a PC card or external hub.
Portable devices that can be synchronized with your home computer are
a. PDAs and GPS units.
b. iPods and PDA/smartphones.
c. ultramobiles and GPS units.
d. any device with Bluetooth.
b. iPods and PDA/smartphones.
Hard drives are found only in desktops, notebooks, and tablet notebooks.
False
PMPs with a hard drive are able to carry fewer songs than those with flash memory.
False
A PDA/smartphone and a notebook can exchange data wirelessly if they both have Bluetooth.
True
Tablet notebooks are commonly used for text messaging.
False
Smartphones run Windows Vista as an operating system.
False
fully describes each field in the database and its attributes
data dictionary
When individual databases are not sufficient to maintain all the data that needs to be tracked, this should be created
data warehouse
utilizes databases and other related systems to assist management with building business models and making critical decisions.
decision support
This should be used for displaying related information that is stored in multiple tables
join query
Extremely lengthy textual data is stored in a
memo field
Data used to describe other data
metadata
digits such as 1234 are normally stored in a
numeric field
video files are appropriately stored in a
object field
should be established as a unique field to be included with each record
primary key
Queries generated by this language make use of English-language statements driven by the mathematical principles of
relational algebra
usually displays requested information from only one table
select query
The most popular query language in use today is
SQL
it is important to ensure each record is identified uniquely, when creating this
table
They could be stored in this, if calculations do not have to be performed on the number
text field
systems which record routine business activities
transaction processing
Two lists reflecting different data about the same person is an example of
a. data redundancy.
b. data inconsistency.
c. data disparity.
d. data duplication errors.
b. data inconsistency.
Which of the following is NOT an advantage of using a database versus lists?
a. Information can be easily shared among users.
b. Data entry errors can be minimized with databases.
c. Data integrity can be assured with a database..
d. Databases are easier to build and maintain than lists.
d. Databases are easier to build and maintain than lists.
A group of related fields in a relational database is called a
a. primary key.
b. record.
c. master key.
d. table.
b. record.
In databases, tables are related using
a. primary keys and foreign keys.
b. Boolean logic.
c. data marts.
d. database logic.
a. primary keys and foreign keys.
A field that has a unique value for each record in a database is called the
a. logical key.
b. master field.
c. key field.
d. primary key.
d. primary key.
A primary key of one table that is also found in a related table is a
a. linked key.
b. foreign key.
c. secondary key.
d. subordinate key.
b. foreign key.
Which of the following is one of the four main operations of a database management system?
a. Querying data
b. Dissecting data
c. Structuring data
d. Consolidating data
a. Querying data
Ensuring that a field must contain a number that is between two valuesis an example of a(n)
a. existence check.
b. completeness check.
c. range check.
d. consistency check.
c. range check.
A system that is designed to help perform routine daily tasks is known as a(n)
a. decision support system.
b. office support system.
c. data warehouse.
d. management information system.
b. office support system.
An electronic system used to record sales of products through Web site is an example of a
a. transaction processing system.
b. decision support system.
c. management information system.
d. knowledge-based system.
a. transaction processing system.
A query is designed to make data entry into a database easier.
False
Consistency checks ensure that only reasonable data values are entered into a database.
True
Reducing data redundancy by recording data only once is called data normalization.
True
A data warehouse is a smaller slice of a data mart.
False
The main reason businesses use data mining is to simplify transaction processing systems.
False
Compressed audio/video files distributed on the Internet
podcasts
allows constant updates for subscribers
Really Simple Syndication
Available to the public

Simple to create, read, and manage

Entries listed on a single page, with most recent entry at the top

Searchable
blogs
Digital video clips playable on media player software
vlogs
Broadcasts of audio/visual content over the Internet

Not updated automatically

Use streaming media
webcasts
Web sites that allow anyone to change their content

Provide source for collaborative writing
wikis
Using the Internet to place phone calls

Uses technology similar to e-mail to send voice data digitally

Requires speakers, a microphone, an Internet connection, and a VoIP provider
VoIP
Internet social networks

Multiplayer online game services

Chat rooms

Newsgroups

Listservs
Group Communication
Members share common interests.

Members communicate by voice, chat, IM, video, and blogs.

Members create personalized profiles.

Growth has been explosive.

Risks must be recognized and reduced.
Social Networks
Play occurs over the Internet among many other players

Persistent or ever-on game environment

Some games let you interact with other players
Multiplayer online games
Real-time, text-based conversations

Rooms can focus on specific topics or interests or be general interest

Identity protection
-Username

Netiquette: rules of polite interaction
Chat Rooms
Online discussion forums

Members post and reply to messages

Create or respond to “threads”
Newsgroups
Electronic mailing lists of e-mail addresses of people interested in a topic

Threads are sent as e-mails

Less public than newsgroups
Listservs
Multimedia:

Involves forms of media and text
-Graphics
-Audio
-Video

Streaming audio and video

Some files require a plug-in program
Web Entertainment
Conducting business online
-Business-to-consumer (B2C)
-Business-to-business (B2B)
-Consumer-to-consumer (C2C)
E-commerce
Online transactions can be safer than traditional retail shopping.

VeriSign is a company that certifies that online transactions are secure.

A closed padlock icon indicates a secure Web site.

The URL changes from http:// to https://.
E-Commerce Safeguards
Shop at well-known, reputable sites.

Pay by credit card, not debit card.

Check the return policy.
Online Shopping Guidelines
Spam

Cookies

Adware/pop-ups

Spyware

Malware

Phishing and hoaxes
Online Annoyances
Junk e-mail

Avoid spam:
-Separate e-mail account
-Spam filters
-Antispam practices
Spam
Text files stored on client computers when visiting Web sites

Used on return visits to Web sites

Unique ID number

Personal information remembered

Privacy risk
Cookies
Software that has a malicious intent

Spyware is a form of malware

Other forms are viruses, worms, and Trojan horses

Designed to render a computer useless or to penetrate it completely
Malware
Programs that download on your PC when you install/use other software

Enable sponsored ads to appear in your browser window or as pop-ups
Adware
Added as a program piggybacked with a requested program

Gathers information, usually about surfing habits

Antivirus software doesn’t detect it

Spyware removal programs are required
Spyware
Phony communication that attempts to scam someone into revealing personal information

Often looks very official
Phishing
Contain information that is untrue

May request that people send money
Hoaxes
Computer software

Graphical

Enables Web navigation

Popular browsers:
-Internet Explorer
-Mozilla’s Firefox
-Apple’s Safari
-Opera
-Camino (Mac OS X)
Web Browsers
Quick tabs: Show thumbnail images of all open Web pages in open tabs

Tabbed browsing: Multiple pages available in same browser window
Browser Features
Collection of related Web pages

First page known as home or index page
Website
HTML document
-Text and graphics

Unique address

Hyperlinks
Web page
Uniform Resource Locator

Unique Web site address
URL
Easy method of returning to Web pages
bookmarks
User keys word or phrase in search box

“Spider” or “Web crawler” program scans Web pages

Results are indexed and sent to the client
Search Engines
Web pages organized by topics and subtopics

Do not use keywords to search

Narrow search by clicking on subfolders
Subject Directories
Used to refine searches
Boolean operators
Who is the author of the article or Web site sponsor?

Is the site biased?

Is the information current?

Toward what audience is the site geared?

Are links available?
Evaluating Web Sites
Users connected to the Internet

Requests data and Web pages
Client computer
Stores Web pages and data

Returns the requested data to the client
Server computer
Dial-up connections

Broadband connections
-Cable
-Satellite
-DSL
Connecting to the Internet
Uses coaxial cable and a cable modem

Fast connection speed

Speed depends on number of users

Not available in all areas
Cable
Uses telephone lines

Faster than dial-up

Doesn’t tie up phone line

Requires special DSL modem
Digital Subscriber Line
Sends light through fiber optics

Fast

Expensive

Available only in certain areas
Fiber-Optic Service
Use standard telephone line

Require a modem to convert analog and digital signals

Slowest connection speed (56K)
Dial-Up Connections
Provide user access to the Internet

National, regional, or local companies

Broadband connection: broadband provider is your ISP

Dial-up connection: need to determine ISPs available in your area
Internet Service Providers
Research and development of cutting-edge networking and wireless technologies
Large Scale Networking
Project sponsored by universities, government, and industry to develop new Internet technologies
Internet2
Social networking sites

Wikis

Podcasts

User content databases
Web 2.0
Two or more computers connected together

Devices connected to networks: nodes
Computer network
Sharing resources and peripherals

Transferring files

Sharing of broadband connection with use of a router
Benefits of a network
Nodes communicate with each other
-Peers

Share peripheral devices

Used in home and small office networks
Peer-to-Peer Networks
A large, multi-server, multi-client network
Internet
Nodes are within a small geographic region:
-Homes
-Schools
-Small businesses
Local Area Network
LANs connected over long distances
-A few miles to thousands of miles
-Use telecommunications lines
Wide area Network
Nodes are within a specific geographic region, such as a city

Sponsored by a government entity to provide access to city residents and/or visitors
Metropolitan area network
Provide communications channel between nodes
Transmission Media
-Twisted pair
-Coaxial cable
-Fiber-optic cable
-Radio waves
(wireless)
Forms of Media
-Data transfer rate
-Throughput
Bandwidth
Devices connected to or installed in nodes
-Network interface cards (NICs)
-External or internal network adapters

Enable communication between nodes
Network Adapters
Devices that help make data flow possible
Network Navigation Devices
Route data between networks
Router
Receive data and retransmit it to nodes on the same network
Switches
Built into operating systems that support networking
-Windows
-Mac OS
Peer-to-peer software
Network operating system (NOS) software
-Windows Server 2008
-SUSE Linux Enterprise
Client/Server software
Wired Ethernet networks

Wireless Ethernet networks

Power-line networks
Types of Peer-to-Peer Networks
Ethernet network adapters are used to connect nodes
-NIC card
-PC card
-USB adapter

Computers are connected to each other using unshielded twisted pair cable
Wired Ethernet Networks
Keep track of data packets

Amplify and retransmit signals

Keep the network running efficiently
Ethernet Switches
Transfer packets from one network to another

Home Internet routers transfer data from the Internet to the home network.

Allows for network-ready devices such as network printers or NAS (network attached storage)
Ethernet Routers
Use radio waves to connect nodes

Basically Ethernet networks that use radio waves instead of wires

Based on the IEEE 802.11 standard, also known as Wi-Fi (Wireless Fidelity)

Each node requires a wireless network adapter
-Transceivers
Wireless Ethernet Networks
Device added to a wireless network to extend the range of the network

Must connect to either a switch, a router, or a node on the network
Wireless Access Point
Computers are connected to a house’s electrical wiring to create a network.
Power-Line Networks
Programs designed to detect viruses
-Scan files looking for virus signatures (unique code)
-Provide options for deleting or fixing infected files
-Inoculate files against further infection

Detects known viruses

Needs to be updated frequently
Antivirus Software
Full-featured communication and information storage devices

Features include:
-Auto-redial
-Call timers
-Voice mail
-Voice-activated dialing
-Internet access
-Text messaging
-Personal information management
Cellular Phones
Coordinates sending data between components

Runs the operating system
Microprocessor (CPU)
ROM stores the operating system

Internal memory chips
Memory
Input devices:
-Microphone
-Keypad
-Graffiti pad
-Touch screen
-Digital camera

Output devices:
-Speaker
-LCD display
Cell Phone Hardware
Translate the user’s commands into instructions for the processor
-Symbian
-Windows Mobile
-OS X
Cell Phone Operating Systems
Format for storing music
MP3
Used to add additional memory to portable media players

Nonvolatile

Noiseless

Uses very little power

Software enables transfer of audio and video files
PMP Flash Memory
Music without any digital rights

Can be moved freely from system to system

May be part of a subscription service
DRM Music
Input devices:
-Touch screen with stylus
-Keyboards
-Graffiti text system

Output devices:
-LCD displays
PDA/Smartphone Input and Output Devices
Also called laptops

Computing power of a desktop

Weigh more than tablet PCs
Notebooks
Gives details on

Display brightness

Battery status

Power management plant

Wireless network connections

External displays

Presentation systems (projectors) connected
Windows Mobility Center
Collections of related data

Easily stored, sorted, organized, and queried

Turn data into information
Database
Category of information, displayed in columns
field
Type of data that can be stored in a field
data type
A group of related fields
record
A group of related records
table
A field value unique to a record
primary key
Organize data in tables

Link tables to each other through their primary keys
relational database
Store data in objects

Also store methods for processing data

Handle unstructured data
object-oriented databases
Store data in multiple dimensions

Organize data in a cube format

Can easily be customized

Process data much faster
multidimensional databases
Application software designed to capture and analyze data
Database Management Systems
Process of ensuring that data entered into the database is correct (or at least reasonable) and complete
Data Validation
Organize data into tables

Relationships are links between tables with related data

Common fields need to exist between fields
Relational Database Operations
For each record in a table, only one corresponding record in a related table
One-to-one
Only one instance of a record in one table; many instances in a related table
one-to-many
Records in one table related to many records in another
many-to-many
The primary key of one table is included in another to establish relationships with that other table
foreign key
Large-scale repository of data

Organizes all the data related to an organization

Data organized by subject
Data warehouse
Extract data from source

Reformat the data

Store the data
Data Staging
Small slices of data

Data for a single department
Data Marts
Software-based solutions used to gather and analyze information
Information Systems
Assist employees in day-to-day tasks

Improve communications

Example: Microsoft Office

Include e-mail, word-processing, spreadsheet, database, and presentation programs
Office Support Systems
Keep track of everyday business activities

Batch processing

Real-time processing
Transaction Processing Systems
Provide timely and accurate information for managers in making business decisions
Management Information Systems
Help managers develop solutions for specific problems
Decision Support Systems
Software that assists in building management models in DSSs

Can be built to describe any business situation

Typically contain financial and statistical analysis tools
Model Management Systems
Enables users to communicate with computers using a natural spoken or written language
Natural language processing (NLP) system
Branch of computer science that deals with attempting to create computers that think like humans
Artificial intelligence (AI)
Integrate multiple data sources

Enable smooth flow of information

Allow information to be used across multiple areas of an enterprise

Accumulate all information in a central location
Enterprise Resource Planning Systems
Process by which great amounts of data are analyzed and investigated

Objective is to spot patterns or trends within the data
Data Mining