1/31
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Primary Key vs. Foreign Key
A primary key is a unique identifier for each record in a database table, while a foreign key is a field/attribute linking to the primary key in another table.
Data Governance
The process of managing the availability, usability, integrity, and security of data in an organization. This includes Master Data Management, ensuring a single consistent version of core organizational data.
Traditional File vs. Database Management Systems
Feature | Traditional File System | Database Management System |
Data storage | Separate files per application | Centralized database |
Data duplication | Very common | Reduced duplication |
Data consistency | Often inconsistent | High consistency |
Flexibility | Limited | Highly flexible |
Data sharing | Difficult | Easy across organization |
Main problem with file systems:
Data redundancy and inconsistency
Example:
Customer address stored in sales, billing, and shipping systems separately.
Data Hierarchy
How data is organized from smallest to largest: (bit, byte, field, record, file, and database)
Relational Databases
A relational database stores data in tables composed of rows and columns. Each table represents an entity (object or concept). It provides easy data comparison, structured format, and efficient querying with SQL, but can become complex with many tables and large databases may have slow queries.
Knowledge Management Systems
KMS capture, store, and distribute organizational knowledge, also known as intellectual capital. Knowledge itself is information combined with experience, context, and insight.
Data Warehouse vs. Data Mart
A data warehouse stores an entire organization’s data. It is very large, sources data from multiple enterprise systems, and is used for strategic decision making. A data mart is a subset of the data warehouse, representing a single department or specific area of interest within the organization, allowing for focused analysis and reporting.
Data Lakes/Lakehouses
A data lake is a storage system for raw, unstructured data (videos, sensor data, logs, etc.) A data lakehouse is a hybrid system that combines data lake flexibility and data warehouse structure, allowing for analytics and machine learning.
Tacit vs. Explicit Knowledge
Tacit knowledge is personal, hard to formalize knowledge, such as the experience of a skilled worker, while explicit knowledge is easily articulated and shared, such as documented procedures, manuals, or reports.
Crowdsourcing
Collecting ideas, services, or information from large groups of people online. It benefits from having a large, diverse pool of expertise and faster innovation. Some examples are wikipedia, open-source software, and customer idea/feedback platforms.
HTTP Layer
HTTP operates in the application layer. It stands for hypertext transfer protocol, and is used to transfer web pages between browsers and servers.
Computer Network
A system that connects multiple devices so they can share data and resources. Shared resources include files, printers, and internet connections.
Enterprise Network
A network that connects multiple LANs (local area networks) using a backbone WAN (wide-area network). It is used to connect branch offices, share corporate resources, and enable enterprise applications.
Software-defined network (SDN)
Centralizes network control using software. Instead of each device controlling traffic independently, a central controller manages data flow.
TCP/IP (transmission control protocol, internet protocol) Basic Functions
The protocol suite that powers the internet. it powers data transmission, packet routing, error detection, and connection management.
TCP/IP Layers
Application - User services, HTTP
Transport - Reliable data transfer, TCP
Internet - Routing packets, IP
Network Interface - Physical transmission, ethernet
Three-Way Handshake
Establishes a connection between client and server.
Step 1: SYN
Client sends SYN packet requesting connection.
Step 2: SYN-ACK
Server replies with SYN-ACK acknowledging request.
Step 3: ACK
Client sends ACK confirming connection.
Connection is now established.
Internet, Intranet, Extranet
Internet - Global public network, Google
Intranet - Private internal company network, Employee portal
Extranet - Intranet accessible to external partners, Supplier portal
Surface, Deep & Dark Web
Different layers of the internet that vary in accessibility and indexing.
Surface Web consists of easily accessible sites indexed by search engines; Deep Web includes private databases and content not indexed; Dark Web hosts anonymous sites requiring special software for access.
WWW vs. Internet
The internet is the global network infrastructure, while the worldwide web (WWW) is the system of websites accessed through the internet.
Internet is the roads, WWW is the cars.
E-Commerce
E-Commerce is the buying, selling, transferring, or exchanging products, services, or information via computer networks.
E-Commerce Revenue Models
B2C - Business to Consumer (Amazon)
B2B - Business to Business (Alibaba)
C2C - Consumer to Consumer (eBay)
B2E - Business to Employee (HR portals)
G2C - Government to Citizens (Tax filing sites)
M-Commerce - Mobile transactions (Apple Pay)
Social Commerce - Transactions via social media (Facebook Marketplace)
Conversational Commerce - Sales through chat-based platforms (WhatsApp, Messenger)
Forward vs. Reverse Auction
Forward Auction - One seller, many buyers (eBay item bidding)
Reverse Auction - One buyer, many sellers (company seeking lowest contract/supplier bid)
Near Field Communication (NFC)
A short-range wireless communication technology allowing devices to exchange data when close together (contactless payments, mobile wallets, transit passes).
Payment Gateways
A security technology that securely processes online payments. It encrypts payment data, authorizes transactions, and communicates with banks.
Blockchain
A disrtributed digital ledger that records transactions across many computers. It’s decentralized, tamper-resistant, transparent, and typically used for cryptocurrency transactions.
Fintech (financial technology)
Integration of technology into financial services, using tech to deliver financial services (mobile banking, online trading, payment apps). FinTech companies can act as marketplace intermediaries connecting buyers and sellers (Paypal, Robinhood).
Bluetooth
A short-range wireless technology used in Personal Area Networks (PANs, 10-100 feet).
Mobile Computing
Ubiquity | Access services anywhere |
Convenience | Easy to use anywhere |
Instant Connectivity | Always connected |
Personalization | Tailored content |
Localization | Services based on location |
Radio Frequency Identification (RFID)
RFID uses radio waves to identify and track objects with embedded tags.
Components
RFID tag
RFID reader
database system
Examples
retail inventory tracking
warehouse logistics
toll road systems
Evil Twin Attack
An Evil Twin Attack occurs when a hacker creates a fake Wi-Fi access point that looks legitimate.
Goal
trick users into connecting
steal passwords or data
Internet of Things (IoT)
The Internet of Things (IoT) is a network of physical devices connected to the Internet that can collect and exchange data automatically. Smart UMBC campus buildings use IoT devices. They can detect things like movement and temperature, and will automatically adjust A/C or turn lights off/on in direct response.