Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
119 Cards in this Set
- Front
- Back
Purpose of database
|
organize and keep track of multiple themes
|
|
General Rule for databases
|
Single theme you store it in a spreadsheet
Multiple themed requires a database |
|
Database definition
|
a self describing collection of integrated records
|
|
Fields/columns
|
stores data
|
|
Record/row
|
groups of fields
|
|
Table/file
|
group of records
|
|
Metadata
|
describes the structure of the database
|
|
Key
|
a column or group of columns that identifies a unique record/row in a table
|
|
Components of a database
|
Tables or Files
Relationships among rows in tables Metadata |
|
Components of database application system
|
User
Forms, reports, queires, application, program, (database applications) Database management system Database (table, relationship, metadata) |
|
Why are database application programs needed?
|
Process logic specific for a business need
Enable processing via internet |
|
DBMS process
|
Read
Insert Modify Delete |
|
DBMS
|
a program used to create a process and administer a database
|
|
3 main functions of DBMS
|
Creating the database
process administer |
|
How do database applications make databases more useful?
|
The allow all information to be accessed in one place
|
|
Forms
|
screens you enter information into a field on
|
|
Report
|
something generated
|
|
Query
|
search for something
|
|
Why do we need databases?
|
To hold customer information
to analyze information to have a competitive advantage to improve the company |
|
Personal DBMS
|
smaller databases
1-100 users |
|
Enterprise DBMS
|
large organizations, use very large databases
100-1000 users |
|
Model
|
representation of something in the real world
|
|
Why do we bother model?
|
create blueprint before you start building the database
gets the story straight-easy for non-tech people to understand minimize having to go back and make changes in the implementation stage |
|
Database model
|
collection of entities,
relationship among entities |
|
Database systems are modeled using...
|
an Entity Relationship (ER) diagram as the blueprint from which the actual data is stored
|
|
ER model allows us to...
|
sketch database designs
|
|
ERD is a graphical tool for...
|
modeling data
|
|
ERD is used in...
|
database design
|
|
ERD is a graphical representation of...
|
the logical structure of a database
|
|
ERD is a model that...
|
identifies the concepts or entities that exist in a system and the relationships between those entities
|
|
ERD rectangle represents..
|
a uniquely identifiable thing (person, order)
|
|
ERD diamond describes...
|
how two entities relate to one another
|
|
ERD circle, oval represents...
|
a characteristic of an entity or relationship (first name, order number)
|
|
Purpose of ERD
|
analyst gains a better understanding of the information to be contained in the database through the process of constructing the ERD
The ERD serves as a documentation tool The ERD us used to communicate the logical structure of the database to users It communicates the logic of the database to users |
|
Components of an ERD
|
Entity
Relationship Cardinality Attribute |
|
Optional relationship
|
an employee may or may not be assigned to a department
a patient may or may not be assigned to a bed |
|
Mandatory relationship
|
every course must be taught by at least one teacher
every mother have at least a child |
|
Cardinality constraints express...
|
the number of entities to which another entity can be associated via a relationship set
|
|
Cardinality constraints
|
the number of instances of one entity that can or must be associated with each instance of another entity
|
|
Minimum cardinality
|
if zero, then optional
if one or more, then mandatory |
|
Maximum cardinality
|
the maximum number
|
|
One to one
|
a manager head one department and vice versa
|
|
One to many
|
an employee works in one department or one department has may employees
|
|
Many to many
|
a teacher teaches many students and a student is taught by many teachers
|
|
The primary key
|
entities need to be uniquely identifiable
|
|
Normalization
|
organizing data to minimize any repeated data
if you want to make a change to a record you only have to make it in one place, the relationship will take care of the rest |
|
Normalization is good for two reasons
|
the database takes up less space
you have a lower chance of inconsistencies in your data |
|
Users role in the development of databases
|
define what data database must contain
user review of data model is crucial final approval of data models devote time to do it right |
|
LAN
|
Local area network
computers connected at a single physical site |
|
WAN
|
Wide area network
computers connected between two or more separate sites |
|
ISP functions
|
provide a legit internet address
gateway to the internet pay for the internet by collection money from customers and paying access fees and other charges to telecom |
|
HTTP
|
Hypertext transport protocol
|
|
HTTPS
|
Secure HTTP data transmission
|
|
SMTP
|
Simple mail transfer protocol
|
|
FTP
|
File transfer protocol
|
|
TCP
|
Transfer control protocol
Breaks traffic up into packets and dents each one along its way |
|
IP
|
Internet protocols
|
|
Public IP addressing
|
identify a particular device on public internet
Public IP addresses must by unique, worldwide assignment controlled by ICANN |
|
ICANN
|
Internet Corporation for assigned names and numbers
|
|
Private IP addressing
|
Identify a particular device on a private network
|
|
Benefits of public IP
|
all devices on LAN share a public IP address
|
|
Benefits of private IP
|
need not register computer with ICANN approved agencies
|
|
Functions of LAN device
|
switch processing-IEEE 802.3 wired LAN traffic
access point processing-IEEE 802.11 wireless LAN traffic translating between the two converting between analog and digital assigning private IP addresses converting IP address between private and public |
|
IPv4
|
Four decimal dotted notation
165.193.123.253 |
|
Domain name
|
world wide unique name affiliated with a public IP address
affiliation of domain names with IP addresses is dynamic |
|
URL
|
Uniform resource locator
|
|
Could computing
|
represents computing solutions that have:
on demand service broad network access resource pooling rapid elasticity measure service |
|
SaaS
|
software as a service
use providers application over a network |
|
Paas
|
Platform as a service
deploy customer created applications to a cloud |
|
IaaS
|
Infrastructure as a service
rent processing, storage, network capacity, and other fundamental computing resources |
|
Financial benefits of cloud computing
|
reduce capital expenses
create more consistent management of costs easier to integrate into service catalog and track costs |
|
Service focused benefits of cloud computing
|
Don't have to worry about constant infrastructure updates
Able to concentrate on innovation and effective delivery of IT services |
|
Flexibility and agility benefits of cloud computing
|
Improves IT ability to respond to business changes by enabling the delivery of rapidly recoverable consistent services
|
|
Formal cloud definition
|
elastic leasing of pooled computer resources over the internet
|
|
Elastic
|
dynamically increasing/decreasing of leased resources in short time span, and only pay for resources used
|
|
Why is cloud preferred to in-house hosting?
|
small capital requirements
speedy development superior flexibility known cost structure possibility best of breed security/disaster preparations industry wide economies of scale |
|
Why now?
|
Technology supports construction and use of enormous data centers
Processors, data communication, data storage are cheap |
|
When does the cloud not make sense?
|
law or industry standard practices require physical control over the data
private cloud (in house hosting) |
|
IT Department
|
Formal group within company that manages the technology
|
|
Why does IT dept exist?
|
Make sure everything runs right
Keep things up to date To roll out information systems |
|
Information system
|
an assembly of hardware, software, data, procedures and people that interact to produce information
|
|
Information technology
|
refers to the products, methods, inventions, and standards that are used for the purpose of producing information
Pertains to the hardware, software and data components |
|
Purpose of IT department
|
plan how to use IS to accomplish goals
manage outsourcing relationships protect information assets develop, operate, and maintain organizations computing infrastructure develop operate and maintain enterprise applications |
|
Infrastructure
|
Router, IP, servers, network, hardware
|
|
Governance
|
rules that apply security, project management
|
|
CTO
|
Chief technology officer
looks at trees in the technology, how can we be more efficient |
|
IS/IT strategy
|
should be directly inline with the company's
Many methods to do this |
|
IS planning functions
|
develop priorities and enforce them within the IS department
periodic meetings |
|
Steering committees
|
brings together members of different groups to discus priorities
|
|
Outsourcing
|
Process of hiring another organization to perform services
|
|
Reasons to outsource IT
|
management expertise, they know more
risk reduction cost reduction |
|
Risk reduction
|
caps financial risk
lower labor costs less likely to pick wrong technology easier to fire a vendor then internal staff |
|
International outsourcing
|
India- labor costs pretty equal
china and other countries customer support modern telephone technology and internet enabled service databases |
|
Outsourcing alternatives
|
Hardware-IaaS cloud hosting
Software- Outsourced development Data- can outsource data storage Procedures- to an extent People- to a degree |
|
Risk of outsourcing
|
loss of control
no easy exit you forget things |
|
Benefits outweighed by long term costs
|
dealing with one vendor makes it easier
unit fixed cost contract could stop price changes no easy exit- vendors don't give you up easily you don't know if vendor works good |
|
Expectations from IT department
|
hardware/programs allow you to perform your job
reliable/ secure network reliable systems/ maintenance effective training |
|
User responsibilities
|
basic computer skills
learn the programs protect your passwords |
|
Future of IT management
|
see more outsourcing
becomes a governance |
|
information systems security
|
process of protecting information systems vulnerabilities from threats by creating safeguards
goal is to find an appropriate trade off between the risk of loss and the cost of implementing safeguards |
|
Types of security loss
|
unauthorized data disclosure
incorrect data faulty service denial of service loss of infrastructure |
|
Pretexting
|
social hacking
|
|
Phishing
|
email pretending to be something looking like someone else
|
|
Spoofing
|
pretending to be another IP address
|
|
drive by sniffers
|
listens on radio waves, captures data
|
|
Incorrect data modification
|
procedures not followed or incorrectly designed
placing information incorrectly on website system errors faulty recovery actions after a disaster |
|
Faulty service
|
entering wrong information
systems not working someone typed something wrong Usurpation- a code to work differently service keeps failing |
|
Loss of infrastructure
|
human accidents
theft or terrist events disgruntled employee natural disasters cyber warfare |
|
Security breaches
|
Heartland payment systems- loss 134 mill credit cards
TJX- exposed 34 mil credit cards Epsilon- names and email exposed RSA- 40 million employee records stolen |
|
Intrusion detection system
|
(IDS) computer program senses when another computer attempting to scan disk or other wise access computer
|
|
Security policy
|
establish company wide security policy
|
|
Technical safeguards
|
Hardware/software
identification and authorization encryption firewalls malware protection application design |
|
Data safeguards
|
Data
data rights and responsibilities passwords encryption backup and recovery physical security |
|
Human safeguards
|
Procedures/people
hiring training education procedure design administration assessment compliance accountability |
|
Firewalls
|
protect area
protects outside from coming in |
|
Malware
|
different viruses that spread different ways
popups, computer runs slow |
|
Malware safeguards
|
use antivirus and anti spyware programs
scan frequently update malware definitions instal updates |
|
Human safeguards
|
hire the right people
change passwords often monitor peoples activity |
|
Operations department
|
department that keeps things up and running, management of all the computer devices
|