Send a link to your students to track their progress
103 Terms
1
New cards
"Ordinary" OS Files
An ordinary file is a file on the system that contains data, text, or program instructions. In this tutorial, you look at working with ordinary files.
2
New cards
Advantages of Objects
Reduced Maintenance, Real-World Modeling, Improved Reliability, High Code Re-usability.
3
New cards
Apache HTTP Server
The most common Web server today, controlling 46 percent of the market.
4
New cards
Characteristics of Data Quality
Accuracy, accessibility, comprehensiveness, consistency, timelessness, precision, and relevancy.
5
New cards
Computer Based Information System
A complementary network of computer-based hardware or software used to collect, filter and process data or other relevant information.
6
New cards
Data Cleanup
The process of detecting and correcting (or removing) corrupt or inaccurate records from a record set, table, or database.
7
New cards
Data Dictionary
A centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.
8
New cards
Data Flow Diagram
A graphical representation of the "flow" of data through an information system, modeling its process aspects. Often they are a preliminary step used to create an overview of the system which can later be elaborated.
9
New cards
Data Modeling
The process of creating a data model for an information system by applying formal data modeling techniques.
10
New cards
Data Redundancy
Data redundancy occurs in database systems which have a field that is repeated in two or more tables.
11
New cards
Deterrence Controls
Safeguards or countermeasures to avoid, counteract or minimize security risks relating to personal property, or computer software.
12
New cards
File Management
The manipulation of documents and data in files on a computer.
13
New cards
HTML
The main markup language for creating web pages and other information that can be displayed in a web browser.
14
New cards
DHTML
is an umbrella term for a collection of technologies used together to create interactive and animated web sites by using a combination of a static markup language (such as HTML), a client-side scripting language (such as JavaScript), a presentation definition language (such as CSS), and the Document Object Model.
15
New cards
XML
a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
16
New cards
Management Information System
The MIS provides information that organizations require to manage themselves efficiently and effectively.
17
New cards
Non-CGI Gateway
A gateway that does not utilize dynamic content on web pages and web applications.
18
New cards
Object Oriented Data Models
(OODM) has been defined for logical database design and database access. The OODM accommodates three types of relationship - aggregation, generalisation and particularisation - and provides four types of data operations for defining schema, creating database, retrieving objects and expanding objects.
19
New cards
Object Privileges
A system privilege is the right to perform a particular action or to perform an action on any object of a particular type. Objects include tables, views, materialized views, indexes, sequences, cache groups, replication schemes and PL/SQL functions, procedures and packages.
20
New cards
Object-Oriented Software Approach
(OOSE) It is the first object-oriented design methodology to employ use cases to drive software design.
21
New cards
Parts of the Expert System
An expert system is typically composed of at least three primary components. These are the inference engine, the knowledge base, and the working memory.
22
New cards
Physical Database Design
The process of producing a detailed data model of a database. This logical data model contains all the needed logical and physical design choices and physical storage parameters needed to generate a design in a Data Definition Language, which can then be used to create a database.
23
New cards
Primary Key
A key that uniquely defines the characteristics of each row. The primary key has to consist of characteristics that cannot collectively be duplicated by any other row.
24
New cards
Process Modeling
The activity of representing processes of an enterprise, so that the current process may be analyzed and improved.
25
New cards
Recursive Relationship
It connects a single class type (serving in one role) to itself (serving in another role)
26
New cards
Relational Table
A set of data elements (values) that is organized using a model of vertical columns (which are identified by their name) and horizontal rows, the cell being the unit where a row and column intersect.
27
New cards
Schema
A structure described in a formal language supported by the database management system (DBMS) and refers to the organization of data as a blueprint of how a database is constructed (divided into database tables in case of Relational Databases).
28
New cards
SDLC Project
A term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
29
New cards
System-Level Security
The application of a computer system to process information with incompatible classifications (i.e., at different security levels), permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization.
30
New cards
Virtual Memory
A memory management technique that is implemented using both hardware and software. It maps memory addresses used by a program, called virtual addresses, into physical addresses in computer memory.
31
New cards
Forms
Forms are sometimes referred to as "data entry screens." They are the interfaces you use to work with your data, and they often contain command buttons that perform various commands.
32
New cards
Reports
Reports are what you use to summarize and present data in the tables. A report usually answers a specific question, such as "How much money did we receive from each customer this year?" or "What cities are our customers located in?"
33
New cards
Queries
Their most common function is to retrieve specific data from the tables. The data you want to see is usually spread across several tables, and queries allow you to view it in a single datasheet.
34
New cards
Macros
A simplified programming language which you can use to add functionality to your database. For example, you can attach a macro to a command button on a form so that the macro runs whenever the button is clicked.
35
New cards
Modules
A module is a collection of declarations, statements, and procedures that are stored together as a unit. A module can be either a class module or a standard module. Class modules are attached to forms or reports, and usually contain procedures that are specific to the form or report they're attached to. Standard modules contain general procedures that aren't associated with any other object.
36
New cards
Knowledge Base
The knowledge base is a collection of rules or other information structures derived from the human expert. Rules are typically structured as If/Then statements.
37
New cards
Interface Engine
The inference engine is the main processing element of the expert system. The inference engine chooses rules from the agenda to fire. If there are no rules on the agenda, the inference engine must obtain information from the user in order to add more rules to the agenda. It makes use of knowledge base, in order to draw conclusions for situations. It is responsible for gathering the information from the user, by asking various questions and applying it wherever necessary.
38
New cards
Working Memory
Working memory contains the data that is received from the user during the expert system session. Values in working memory are used to evaluate antecedents in the knowledge base. Consequences from rules in the knowledge base may create new values in working memory, update old values, or remove existing values.
39
New cards
Preliminary analysis
The objective of phase 1 is to conduct a preliminary analysis, propose alternative solutions, describe costs and benefits and submit a preliminary plan with recommendations.
40
New cards
Systems analysis, requirements definition
Defines project goals into defined functions and operation of the intended application. Analyzes end-user information needs.
41
New cards
Systems design
Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudocode and other documentation.
42
New cards
Development
The real code is written here.
43
New cards
Integration and testing
Brings all the pieces together into a special testing environment, then checks for errors, bugs and interoperability.
44
New cards
Acceptance, installation, deployment
The final stage of initial development, where the software is put into production and runs actual business.
45
New cards
Maintenance
During the maintenance stage of the SDLC, the system is assessed to ensure it does not become obsolete. This is also where changes are made to initial software. It involves continuous evaluation of the system in terms of its performance.
46
New cards
Evaluation
Some companies do not view this as an official stage of the SDLC, but is it an important part of the life cycle.
47
New cards
Disposal
In this phase, plans are developed for discarding system information, hardware and software in making the transition to a new system.
48
New cards
DSS
name for software that organizations uses to make decisions
49
New cards
Which computer-based information system is concerned with improving efficiency by
50
New cards
applying technology to common administrative tasks such as creating documents?
office automation system
51
New cards
In which phase does the actual programming of software code take place?
development and documentation
52
New cards
What type of error will a modulus-11 check digit detect?
single transcription errors and single transposition errors
53
New cards
An advantage of a database program is:
data can be added or deleted easily
54
New cards
What does the term "encapsulation" mean?
hiding implementation details of methods from the users
55
New cards
What are data input terminal commands normally used for?
add and/or delete data
56
New cards
When are errors more likely to occur?
when data is handwritten by users and then entered by the operator
57
New cards
When defining the operational process of your RDBMS, which one of the following is a
58
New cards
valid ongoing "operational process"?
performance monitoring
59
New cards
Which one of the following is an important consideration when tuning an SQL statement?
the quality of the SQL optimization
60
New cards
What do technical writers provide for the new system?
documentation
61
New cards
Characteristics of Data
accuracy, completeness, consistency, uniqueness, and timeliness
62
New cards
Quality
reflects how well it complies with or conforms to a given design, based on functional requirements or specifications. That attribute can also be described as the fitness for purpose of a piece of software or how it compares to competitors in the marketplace as a worthwhile product.It is the degree to which the correct software was produced.
63
New cards
Closed Shops
a place of work where membership in a union is a condition for being hired and for continued employment.
64
New cards
Computer Based
any course of instruction whose primary means of delivery is a computer. A CBT course (sometimes called courseware ) may be delivered via a software product installed on a single computer, through a corporate or educational intranet, or over the Internet as Web-based training .
65
New cards
Information System
A method of gathering, storing, and analyzing data for the purpose of making business decisions
66
New cards
Data Analysis Report
The process of evaluating data using analytical and logical reasoning to examine each component of the data provided. There are a variety of specific data analysis method, some of which include data mining, text analytics, business intelligence, and data visualizations.
67
New cards
Effective Interfaces
makes it easy for users to tell the computer what they want to do, for the computer to request information from the users, and for the computer to present understandable information. Clear communication between the user and the computer is the working premise of good UI design
68
New cards
Firewall Wireless Networks
security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic. ... This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied
69
New cards
HTML vs. DHTML
Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.
70
New cards
VS
71
New cards
Dynamic HyerText Markup Language (DHTML) is a combination of Web development technologies used to create dynamically changing websites. Web pages may include animation, dynamic menus and text effects. The technologies used include a combination of HTML, JavaScript or VB Script, CSS and the document object model (DOM).
72
New cards
Indicators
a device providing specific information on the state or condition of something, in particular.
73
New cards
a gauge or meter of a specified kind. ????
74
New cards
Management Information
activities of company or organizational management
75
New cards
System
a computerized information-processing system designed to support management information
76
New cards
Non-Spatial Data
numbers, characters or logical type
77
New cards
Object Oriented Data
database management system in which information is represented in the form of objects as used in object-oriented programming
78
New cards
Models
a representation of a system using mathematical concepts and language
79
New cards
Object-Oriented Software
software such that it is broken up into manageable chunks called classes. A class is a unit of code that contains information and defines behaviors that manage that information. In this way, the information managed by the class can only be changed by the outside world in the ways defined by the class. The world outside that class need not understand the details of how such information must be manipulated; ensuring that the information is complete and consistent is managed within the class itself, greatly simplifying the task of working with that information for the outside world.
80
New cards
Approach
A line of thought in the management field which stresses the interactive nature and interdependence of external and internal factors in an organization. A systems approach is commonly used to evaluate market elements which affect the profitability of a business.
81
New cards
Object-Oriented System
The system is conceived as a set of interacting subsystems that in turn is composed of a hierarchy of interacting objects, grouped into classes. System design is done according to both the system analysis model and the proposed system architecture. Here, the emphasis is on the objects comprising the system rather than the processes in the system.
82
New cards
Investigation
the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
83
New cards
Parts of a Database
Tables, Records, and Fields. A database table is composed of records and fields that hold data. Tables are also called datasheets. Each table in a database holds data about a different, but related, subject.
84
New cards
Performance Goals
short-term objectives set for specific duties or tasks in your current job position. These goals are usually related to the overall company goals or specific department goals where you work. They help you know what is expected of you in your position.
85
New cards
wc Primary Key
This occurs when a single column can't contain enough unique values. For example, a two column primary key might consist of a "FirstName" and "LastName" column. Because primary keys can be made up of more than one column, the PrimaryKey property consists of an array of DataColumn objects.
86
New cards
Security
the protection of data, networks and computing power. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for illegal purposes.
87
New cards
Steps of the System
The System Development Life Cycle (SDLC) is a series of six steps that a project team works through in order to conceptualize, analyze, design, construct and implement a new information technology system. Adhering to a SDLC increases efficiency and accuracy and reduces the risk of product failure.
88
New cards
Development Process
System of defined steps and tasks such as strategy, organization, concept generation, marketing plan creation, evaluation, and commercialization of a new product. It is a cycle by means of which an innovative firm routinely converts ideas into commercially viable goods or services.
89
New cards
Steps to Database Design
Step 1: Define the Purpose of the Database (Requirement Analysis) Gather the requirements and define the objective of your database
90
New cards
Step 2: Gather Data, Organize in tables and Specify the Primary Keys.
91
New cards
Step 3: Create Relationships among Tables.
92
New cards
Step 4: Refine & Normalize the Design.
93
New cards
System Analysis
the act, process, or profession of studying an activity (such as a procedure, a business, or a physiological function) typically by mathematical means in order to define its goals or purposes and to discover operations and procedures for accomplishing them most efficiently.
94
New cards
System Analysis Team
a group of IT professionals who specialize in analyzing, designing and implementing information systems. Systems analysts assess the suitability of information systems in terms of their intended outcomes and liaise with end users, software vendors and programmers in order to achieve these outcomes A systems analyst is a person who uses analysis and design techniques to solve business problems using information technology. Systems analysts may serve as change agents who identify the organizational improvements needed, design systems to implement those changes, and train and motivate others to use the systems
95
New cards
System Controls
manages, commands, directs or regulates the behaviour of other devices or systems using control loops. It can range from a single home heating controller using a thermostat controlling a domestic boiler to large Industrial control systems which are used for controlling processes or machines.
96
New cards
System Design
the process of defining the architecture, modules, interfaces, and data for a system to satisfy specified requirements. Systems design could be seen as the application of systems theory to product development.
97
New cards
System Design Team
Uses information about user goals and behavior to design processes and functions that help users interact with the system and achieve their goals. Responsible for identifying those key interactions and wire framing and prototyping them.
98
New cards
System Development
the process of defining, designing, testing, and implementing a new software application or program. It could include the internal development of customized systems, the creation of database systems, or the acquisition of third party developed software.
99
New cards
System Software
a type of computer program that is designed to run a computer's hardware and application programs. If we think of the computer system as a layered model, the system software is the interface between the hardware and user applications.