Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
What is the purpose of a database?
|
To keep track of things that involve more than one theme
|
|
Database
|
self-describing collection of integrated records
|
|
Metadata
|
Data that describes data
|
|
Relationships among records
|
values in one table relate to row of that table to rows in a second table
|
|
What is a DBMS
|
a program used to create, process, and administer a database
|
|
What does a DBMS do
|
?
|
|
Examples of DBMS
|
IBM, Microsoft, Oracle Corporation, Open source
|
|
Database application
|
a collection of forms, reports, queries and application programs that process a database
|
|
Form
|
used to read, insert, modify and delete data
|
|
Report
|
shows data in a structured context
|
|
Queries
|
a means of getting data from a database
|
|
Database Application Programs
|
enable database processing over the internet
|
|
Multiuser Processing Considerations
|
-Lost-update problem
-Multiuser processing |
|
Lost-update problem
|
issue in multi-user database processing in which 2 or more users try to make changes to the data but the database cannot make changes b/c it was not designed to process changes from multiple users
|
|
Multiuser processing
|
when multiple users process the database at the same time
|
|
What is the difference between an Enterprise DBMS and a Personal DBMS?
|
the size and difficulty capabilities of the database
|
|
Enterprise DBMS
|
Support many users and different database applications
ex. IBM |
|
Personal DBMS
|
products designed for smaller, simpler database applications
|
|
E-Commerce Merchant Companies
|
those that take the title to the goods they sell
|
|
Nonmerchant E-commerce
|
those that arrange for the purchase and sale of goods without ever owning or taking title to those goods
|
|
How does E-commerce improve Market Efficiency
|
by decreasing the costs, improving information flow
|
|
Disintermediation
|
the elimination of the middle layers in the supply chain
ex. delta.com |
|
Reintermediation
|
when the offline middle man is replaced by an online site
ex. itunes |
|
Three Tier Architecture
|
user tier, server tier, database tier
|
|
user tier
|
computers that have browsers that request and process web pages
|
|
server tier
|
computers that run web servers and process application programs
|
|
database tier
|
computers that run a DBMS that processes SQL requests to retrieve and store data
|
|
Hypertext Transfer Protocol (HTTP)
|
a set of rules for transferring documents and data over the internet
|
|
How can you watch the 3 tiers in action?
|
by going to a Website, placing something in a shopping cart
|
|
Web 2.0
|
Harnessing collective intelligence and network effects
|
|
Software As a (Free) Service
SaaS |
applications that run on a server somewhere in Internet cloud
ex. banner web |
|
Viral marketing
|
no active marketing, new features released and wait for user to spread word
|
|
What increases the value of a site
|
the more users and use
|
|
Mashup
|
occur when the output from 2 or more web sites is combined into a single user experience
ex. Google's My Maps |
|
Participation
|
traditional site are about publishing, web 2.0 is about participation
|
|
Ownership
|
Web 2.0 only locks down some rights
|
|
Advertising
|
specific to user interests
ex. Adwords and AdSense |
|
Social Networking
|
the interaction of people connected by interests, friendship, business associations etc.
|
|
User Generated Content
|
ex. product recommendation, user reviews
|
|
Who is in control?
|
Not all companies benefit from flexibility and organic growth
|
|
Exabyte
|
1,000 petabytes
|
|
Why does it matter how big an Exabyte is?
|
because the more you can store the more information you have available to use to ultimately help make successful business decisions
|
|
How Do Business Intelligence (BI) Systems Provide Competitive Advantages
|
because it provides information for improving decision making
|
|
What Problems Do Operational Data Pose for BI Systems?
|
1. Dirty Data
2. Missing values 3. Inconsistent data 4. Data not integrated 5. Wrong granularity |
|
Unauthorized Data Disclosure
|
occurs by human error when someone inadvertently releases data in violation of policy
|
|
Incorrect Data Modification
|
occurs by human error, when an employee follow procedures incorrectly or when procedures have been incorrectly designed
|
|
Faulty Service
|
problems that result b/c of incorrect system operation
ex. incorrect data modification |
|
Denial of Service
|
human error in following procedures or a lack of procedures
ex. accidently shutting down web servers |
|
Loss of infrastructure
|
can be cause by human accidents, natural disasters etc.
|
|
What Are the Elements of a Security Program?
|
1. Senior management involved
2. Safeguards of various kinds 3. Incident response |
|
Identification and Authentication
|
user name and password
|
|
Single Sign-on for Multiple Systems
|
Provide authentication data once allowing you to gain access to the rest of the information/data
|
|
Encryption
|
the process of transforming clear text into coded unintelligible text for secure storage or communication
|
|
Firewalls
|
computing device located between a firms internal/external networks that prevents unauthorized access to or from the internal network
|
|
Malware Safeguards
|
1. Install antivirus/antispyware programs on your computer
2. Set up your anti-malware programs to scan your computer frequently 3. Update malware definitions 4. Open email attachments only from known sources |