Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
112 Cards in this Set
- Front
- Back
part of a DBMS that contains facilities to help you develop transaction-intensive applications.
|
Application Generation Subsystem
|
|
a copy of the information stored on a computer
|
Backup
|
|
collective information about your customers, your competitors, your business partners, your competitive environment, and your own internal operations that gives you the ability to make effective, important, and often strategic business decisions.
|
Business Intelligence (BI)
|
|
business intelligence focused on the external competitive environment
|
Competitive Intelligence
|
|
the function in an organization that plans for, oversees the development of, and monitors the information resource
|
Data Administration
|
|
part of a DBMS that helps you manage the overall database environment by providing facilities for backup and recovery, security management, query optimization, concurrency control, and change management
|
Data Administration Subsystem
|
|
a collection of information that you organize and access according to the logical structure of that information
|
Database
|
|
the function in an organization that is responsible for the more technical and operational aspects of managing the information contained in organizational information repositories (databases, data warehouses, and data marts).
|
Database Administration
|
|
helps you specify the logical organization for a database and access and use the information within a database. Contains five important software components – DBMS engine, data definition subsystem, data manipulation subsystem, application generation subsystem, data administration subsystem
|
Database Management System (DBMS)
|
|
part of a DBMS that helps you create and maintain the data dictionary and define the structure of the files in a database
|
Data Definition Subsystem
|
|
contains the logical structure for the information in a database
|
Data Dictionary
|
|
part of a DBMS that helps you add, change, and delete information in a database and query it for valuable information
|
Data Manipulation Subsystem
|
|
a subset of a data warehouse in which only a focused portion of the data warehouse information is kept
|
Data Mart
|
|
the software tool you use to query information in a data warehouse
|
Data-Mining Tool
|
|
a logical collection of information – gathered from many different operational databases – used to create business intelligence that supports business analysis activities and decision-making tasks
|
Data Warehouse
|
|
accepts logical requests from the various other DMBS subsystems, converts them into their physical equivalent, and actually accesses the database and data dictionary as they exist on a storage device
|
DBMS Engine
|
|
displays key information gathered from several sources on a computer screen in a format tailored to the needs and wants of an individual knowledge worker. Can provide up-to-the-minute snapshots of any type of information
|
Digital Dashboard
|
|
a primary key of one file that appears in another file
|
Foreign Key
|
|
a rule that helps ensure the quality of the information
|
Integrity Constraint
|
|
focuses on how you as a knowledge worker need to arrange and access information to meet your particular business needs
|
Logical View
|
|
slice-and-dice techniques that allow you to view multidimensional information from different perspectives
|
Multidimensional Analysis (MDA) Tool
|
|
the manipulation of information to support decision making
|
Online Analytical Processing (OLAP
|
|
the gathering of input information, processing that information, and updating existing information to reflect the gathered and processed information
Operational Database: databases that support OLTP |
Online Transaction Processing (OLTP)
|
|
deals with how information is physically arranged, stored, and accessed on some type of storage device such as a hard disk
|
Physical View
|
|
a field (or group of fields in some case) that uniquely describes each record
|
Primary Key
|
|
similar to QBE tools, SQL, and report generators in the typical database environment. Data warehouses users use these types of tools to generate simple queries and reports
|
Query-and-Reporting Tool
|
|
helps you graphically design the answer to a question
Recovery: the process of reinstalling the backup information in the event the information was lost |
Query-by-Example (QBE) Tool
|
|
describes each two-dimensional table or file in the relational model
|
Relation
|
|
uses a series of logically related two-dimensional tables or files to store information in the form of a database
|
Relational Database
|
|
helps you quickly define formats of reports and what information you want to see in a report
|
Report Generator
|
|
a standardized fourth-generation query language found in most DBMS. Performs the same function as QBE, except you perform the query by creating a statement
|
Structured Query Language (SQL
|
|
allows you to see the contents of a database file, make whatever changes you want, perform simple sorting, and query to find the location of specific information
|
View
|
|
form of XP, aims for customer satisfaction through early continuous delivery of useful software components. Agile is similar to XP buy with less focus on team coding and more on limiting project scope
|
Agile Methodology
|
|
this is the second part of the SDLC, which involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system. There are two parts to the Analysis phase, gathering the business requirements and prioritize the requirements
|
Analysis Phase
|
|
are the detailed set of end user requests that the system must meet to be successful. It states what the system must do from the business perspective and drives the entire system.
|
Business Requirement
|
|
It is a general approach to systems development that focuses on building small self contained blocks of code (components) that can be reused across a variety of applications within an organization. Example: Write software once, place it in a library of software components, and then allow software development teams to plug in that component.
|
Component-based development (CBD)
|
|
factor critical to you organization’s success, and allows an organization to strategically decide which system to build. Is used in the defining the system to be developed activity of the planning phase of the SDLC
|
Critical Success Factor (CSF)
|
|
third part of the SDLC and the goal is to build a technical blueprint of how the proposed system will work. Take the business requirements generated during the analysis phase and define the supporting technical architecture in the design phase.
|
Design Phase
|
|
breaks a project into tiny phases and developers cannot continue on to the next phase until the current phase is complete. There are many small pieces that make no sense individually but when they are combined together an organization can gain visibility into the entire system. XP divides its phases into iterations.
|
Extreme Programming methodology (XP)
|
|
Part of the set the project scope part of the planning phase of SDLC. It occurs when developers and end users add extra features that were not part of the initial requirements
|
Feature Creep
|
|
part of the Maintenance phase of SDLC and is a way to support users. Help Desk is a group of people who respond to users’ questions.
|
Help Desk
|
|
is a phase of SDLC in which you distribute the system to all the users and they begin using the system to perform their everyday jobs. It includes writing detailed user documentation and providing training for the system users
|
Implementation Phase
|
|
in house IT specialists within the organization is tasked with developing the system
|
Insourcing
|
|
Verifies that separate systems can work together
|
Integration Testing
|
|
list of all systems that an organization needs to develop but – because of the prioritization of systems development needs – never get funded because of the lack of organizational resources. (Benefit of Selfsourcing)
|
Invisible Backlog
|
|
users and IT specialists meet to define and review the business requirements of a system
|
Joint Application Development (JAD)
|
|
is the seventh and last part of the SDLC, in which you monitor and support the new system to ensure it, continue to meet the business goals.
|
Maintenance Phase
|
|
is contracting an outsourcing arrangement with a company in a nearby country, usually this country will share a border
|
Nearshore outsourcing
|
|
is contracting with a company that is geographically far away, usually for certain IT services like application development, maintenance, and help desk support. Is a growing trend and not only cost effective but provides sophisticated and highly efficient quality services
|
Offshore outsourcing
|
|
runs over the internet or off CD or DVD. Employees perform the training at any time, on their own computers, at their own pace and are convenient because they can set their own schedule to undergo training.
|
Online training
|
|
process of engaging another company in the same country for services
|
Onshore outsourcing
|
|
Third Party is delegated a specific work for a specified length of time, at a specific cost, and at a specified level of service
|
Outsourcing
|
|
uses both the old and new systems until you’re sure that the new system performs correctly.
|
Parallel implementation
|
|
installs the new system in phases until you’re sure it works correctly and then the remaining phases of the new system are implemented.
|
Phased implementation
|
|
has only a small group of people using the new system until you know it works correctly and then the remaining people are added to the system
|
Pilot implementation
|
|
is the First part of the SDLC in which you create a solid plan for developing your information system. The three primary activities are defining the system to be developed, setting the project scope, and develop the project plan.
|
Planning phase
|
|
discards the old system completely and immediately uses the new system
|
Plunge implementation
|
|
is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that all key project milestones are completed on time.
|
Project manager
|
|
represent key dates by which you need a certain group of activities performed.
|
Project milestones
|
|
defines what, when, and who questions of systems development including all activates to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity. It is the guiding force behind ensuring the onetime delivery of a complete and successful information system
|
Project plan
|
|
– is a written document of the project scope, which defines the high level requirements and is the basic definition of the system
|
Project scope document
|
|
is prototype you use to prove the technical feasibility of a proposed system
|
Proof-of-concept prototype
|
|
is a model of a proposed product, service, or system
|
Prototype
|
|
emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process
|
Rapid Application Development methodology (RAD) (Rapid Prototyping)
|
|
is a formal document that describes in excruciating detail your logical requirements for a proposed system and invites outsourcing organizations to submit bids for its development.
|
Request for proposal (RFP)
|
|
Prioritize all the business requirements in order of business importance and place them in a formal comprehensive document
|
Requirements Definition Document
|
|
development and support of the IT systems by end users (knowledge workers) with little or no help from IT specialists
|
Selfsourcing (End-User Development)
|
|
is a prototype that you use to convince people of the worth of a proposed system
|
Selling prototype
|
|
is a formal contractually obligated agreement between two parties, usually for systems, defines the work to be done, the time frame, the metrics that will be used to measure the success of the systems development effort, and the costs.
|
Service level agreement (SLA)
|
|
same as SLS
|
Service level objective (SLO)
|
|
technical specifications are included in a supporting document (similar to a contract addendum)
|
Service level specifications (SLS)
|
|
is the users’ actual signatures indicating they approve all the business requirements
|
Sign Off
|
|
is a structured step by step approach for developing information systems that includes seven key phases and numerous activities in each. (Planning – Analysis – Design – Development – Testing – Implementation – Maintenance)
|
Systems development life cycle (SDLC)
|
|
Verifies that the units or pieces of code written for a system function correctly when integrated into the total system
|
System Testing
|
|
in the design phase, defines the hardware, software, and telecommunications equipment required to run the system
|
Technical Architecture
|
|
is the fifth part of SDLC and it verifies that the system works and meets all the business requirements defined in the analysis phase. It includes writing the test conditions and performing the testing of the systems.
|
Testing Phase
|
|
Tests individual units or pieces of code for a system
|
Unit Testing
|
|
determines if the system satisfies the business requirements and enables users to perform their jobs correctly
|
User Acceptance Testing (UAT)
|
|
this is something provided to employees when you install the system, it highlights how to use the system.
|
User documentation
|
|
is a sequential, activity based process in which one phase of the SDLC is followed by another, from planning through implementation.
|
Waterfall methodology
|
|
is held in a classroom environment and is led by an instructor, more suitable for difficult systems.
|
Workshop Training
|
|
infrastructure is the most basic setup because it involves a single tier on a single machine. An example of a 1-tiered application is a basic word processor or desktop file utility program.
|
1-tier
|
|
infrastructure is the basic client/server relationship. The client handles the display, the server handles the request and the application tier is contained on one or both of the two tiers.
|
2-tier
|
|
infrastructure is the most common approach used for Web applications today. An example is the Web browser that acts as the client, an application server that handles the business logic and a separate tier that handles database functions.
|
3-tier
|
|
percentage of callers who hang up while waitin for their call to be answered
|
Abandon rate
|
|
number of visitors who start the process f completing a registration page and then abandon
|
Abandoned registration
|
|
the number of visitors who create a shopping cart and start shopping and then abandon the activity before paying for the merchandise
|
Abandoned shopping carts
|
|
also usually measured inversely as error rate, or the number of errors per thousand that a system generates.
|
Accuracy
|
|
supplies software applications over the inernet that would otherwise reside on customers; computers
|
Application service provider (ASP)
|
|
the average time to get answered by a real person
|
Average Speed to Answer (ASA)
|
|
baseline values a system seeks to attain
|
Benchmark
|
|
is the process of continuously measuring system results and comparing those to benchmarks
|
Benchmarking
|
|
a step by step guideline defining how the organization will recover from a disaster or extended disruption of its business process
|
Business continuity plan
|
|
a rigorous and ell informed organizational methodology for developing a business continuity plan
|
Business continuity planning (BCP)
|
|
measure the success of call center efforts
|
Call center metrics
|
|
involves sharing information systems in one central area or on one central mainframe.
|
Centralized infrastructure
|
|
count the number of people who visit a site, click on an ad, and are taken to the site of the advertiser
|
Click through
|
|
has one or more computers that are servers which provide services to other computers called clients
|
Client/server infrastructure
|
|
is a separate facility that does not have any computer equipment but is a place where employees can move after the disaster
|
Cold Site
|
|
is available to a company that rents space and telecommunications equipment from another company.
|
Collocation facility
|
|
percentage of potential customers who visit your site who actually buy something
|
Conversion rate
|
|
sales dollars generated per dollar of advertising
|
Cost Per Thousand (CPM)
|
|
involves little or no sharing of IT and other resources such as information.
|
Decentralized infrastructure
|
|
charts the cost to your organization of the unavailability of information and technology and the cost to your organization of recovering from a disaster over time
|
Disaster recovery cost curve
|
|
involves distributing the information and processing power of IT systems via a network
|
Distributed infrastructure
|
|
doing the right thing
|
Effectiveness
|
|
doing something right
|
Efficiency means
|
|
the percentage of calls that can be resolved without have to call back
|
First Call Resolution (FCR)
|
|
is a separate fully equipped facility where the company can move immediately after a disaster and resume business
|
Hot Site
|
|
is a relative term meaning the structure beneath a structure
|
Infrastructure
|
|
centric metric measures of efficiency, speed and/or capacity for technology
|
Infrastructure
|
|
refers to the capability of two or more computing components to share information and other resources, even if they are made by different manufacturers
|
Interoperability
|