• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back
What is the purpose of a database?
To keep track of things that involve more than one theme
Database
self-describing collection of integrated records
Metadata
Data that describes data
Relationships among records
values in one table relate to row of that table to rows in a second table
What is a DBMS
a program used to create, process, and administer a database
What does a DBMS do
?
Examples of DBMS
IBM, Microsoft, Oracle Corporation, Open source
Database application
a collection of forms, reports, queries and application programs that process a database
Form
used to read, insert, modify and delete data
Report
shows data in a structured context
Queries
a means of getting data from a database
Database Application Programs
enable database processing over the internet
Multiuser Processing Considerations
-Lost-update problem
-Multiuser processing
Lost-update problem
issue in multi-user database processing in which 2 or more users try to make changes to the data but the database cannot make changes b/c it was not designed to process changes from multiple users
Multiuser processing
when multiple users process the database at the same time
What is the difference between an Enterprise DBMS and a Personal DBMS?
the size and difficulty capabilities of the database
Enterprise DBMS
Support many users and different database applications
ex. IBM
Personal DBMS
products designed for smaller, simpler database applications
E-Commerce Merchant Companies
those that take the title to the goods they sell
Nonmerchant E-commerce
those that arrange for the purchase and sale of goods without ever owning or taking title to those goods
How does E-commerce improve Market Efficiency
by decreasing the costs, improving information flow
Disintermediation
the elimination of the middle layers in the supply chain
ex. delta.com
Reintermediation
when the offline middle man is replaced by an online site
ex. itunes
Three Tier Architecture
user tier, server tier, database tier
user tier
computers that have browsers that request and process web pages
server tier
computers that run web servers and process application programs
database tier
computers that run a DBMS that processes SQL requests to retrieve and store data
Hypertext Transfer Protocol (HTTP)
a set of rules for transferring documents and data over the internet
How can you watch the 3 tiers in action?
by going to a Website, placing something in a shopping cart
Web 2.0
Harnessing collective intelligence and network effects
Software As a (Free) Service
SaaS
applications that run on a server somewhere in Internet cloud
ex. banner web
Viral marketing
no active marketing, new features released and wait for user to spread word
What increases the value of a site
the more users and use
Mashup
occur when the output from 2 or more web sites is combined into a single user experience
ex. Google's My Maps
Participation
traditional site are about publishing, web 2.0 is about participation
Ownership
Web 2.0 only locks down some rights
Advertising
specific to user interests
ex. Adwords and AdSense
Social Networking
the interaction of people connected by interests, friendship, business associations etc.
User Generated Content
ex. product recommendation, user reviews
Who is in control?
Not all companies benefit from flexibility and organic growth
Exabyte
1,000 petabytes
Why does it matter how big an Exabyte is?
because the more you can store the more information you have available to use to ultimately help make successful business decisions
How Do Business Intelligence (BI) Systems Provide Competitive Advantages
because it provides information for improving decision making
What Problems Do Operational Data Pose for BI Systems?
1. Dirty Data
2. Missing values
3. Inconsistent data
4. Data not integrated
5. Wrong granularity
Unauthorized Data Disclosure
occurs by human error when someone inadvertently releases data in violation of policy
Incorrect Data Modification
occurs by human error, when an employee follow procedures incorrectly or when procedures have been incorrectly designed
Faulty Service
problems that result b/c of incorrect system operation
ex. incorrect data modification
Denial of Service
human error in following procedures or a lack of procedures
ex. accidently shutting down web servers
Loss of infrastructure
can be cause by human accidents, natural disasters etc.
What Are the Elements of a Security Program?
1. Senior management involved
2. Safeguards of various kinds
3. Incident response
Identification and Authentication
user name and password
Single Sign-on for Multiple Systems
Provide authentication data once allowing you to gain access to the rest of the information/data
Encryption
the process of transforming clear text into coded unintelligible text for secure storage or communication
Firewalls
computing device located between a firms internal/external networks that prevents unauthorized access to or from the internal network
Malware Safeguards
1. Install antivirus/antispyware programs on your computer
2. Set up your anti-malware programs to scan your computer frequently
3. Update malware definitions
4. Open email attachments only from known sources