1/83
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Business intelligence systems
An IS that processes operational, social, and other data to identify patterns, relationships, and trends, or business intelligence, for use by business professionals or knowledge workers.
BI application
The software component of a BI system.
Primary Activities in the BI Process (Data)
Obtain, Cleanse, Organize & Relate, Catalog.
Primary Activities in the BI Process (Analysis)
Reporting, Data mining, BigData, Knowledge management.
Primary Activities in the BI Process (Publish)
Print, Web servers, Report servers, Automation.
Data Sources for BI
Operational databases, Social data, Purchased data, Employee knowledge.
Data Warehouse
A repository for an organization's BI data.
Data Mart
A data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.
Basic Operations for processing BI Data
Sorting, Filtering, Grouping, Calculating, Formatting
RFM Analysis
Recently, Frequently, Money (amount).
Online Analytical Processing (OLAP)
A category of software tools that provides analysis of data stored in a data warehouse, enabling users to analyze different dimensions of multidimensional data.
Supervised Data Mining
Uses a priori model for prediction.
Unsupervised Data Mining
No a priori hypothesis or model. Findings obtained solely by data analysis.
Market-Basket Analysis
Identify sales patterns in large volumes of data, identifying what products customers tend to buy together to compute probabilities of purchases.
Decision Trees
Unsupervised data mining technique involving a hierarchical arrangement of criteria to predict a value or classification.
BigData
Huge volume, rapid velocity, great variety of data.
Hadoop
Open-source program supported by Apache Software Foundation that manages thousands of computers and implements MapReduce.
Alternatives for Publishing BI
Email or collaboration tool, Web server, SharePoint, BI server.
Content Management Systems (CMS)
Support management and delivery of documents and other expressions of employee knowledge.
Knowledge Management (KM)
Creating value from intellectual capital and sharing knowledge with those who need that capital, preserving organizational memory.
Expert Systems
Rule-based systems that encode human knowledge, processing IF side of rules to report values of all variables.
Artificial Intelligence (AI)
The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal.
Goal of AI
Weak AI focuses on completing a single specific task, while Strong AI can complete all of the same tasks a human can, and superintelligence is capable of intelligence more advanced than human intelligence.
Singularity
Computer systems adapt and create their own software without human assistance, possessing and creating information for themselves.
Purpose of a Database
To organize, keep track of things, and track multiple themes.
Database Components
Columns, also called fields, and rows, also called records, as well as characters, also called bytes.
Database Management System (DBMS)
A program used to create, process, and administer a database; examples include DB2, Access, SQL Server, and Oracle Database.
SQL (Structured Query Language)
International standard language used by nearly all DBMS to process a database.
DBMS Process Operations
Read, insert, modify, and delete data.
Forms
View data; insert new, update existing, delete existing data.
Queries
Search using values provided by user.
Reports
Structured presentation of data using sorting, grouping, filtering, other operations.
Application programs
Provide security, data consistency, special purpose processing, e.g., handle out-of-stock situations.
Entities
Something to track, e.g., order, customer, salesperson, item.
Attributes
Describe characteristics of entity, e.g., OrderNumber, CustomerNumber, VolunteerName.
Identifier
Uniquely identifies one entity instance from other instances, e.g., StudentIDNumber
Maximum cardinality
Maximum number of entities in a relationship.
Minimum cardinality
Minimum number of entities in a relationship.
Normalization
Converting a poorly structured table into two or more well-structured tables to minimize data integrity problems.
How to represent each entity with a table
Entity identifier becomes table key; Entity attributes become table columns.
eHermes Chooses Option 1
Uses SQL Server to store metadata and creates E-R diagram.
NoSQL DBMS (NotRelational DBMS)
Supports very high transaction rates, processing relatively simple data structures, replicated on many servers in the cloud, without ACID transaction support.
NewSQL DBMS
Process very high levels of transactions, like NoSQL DBMS, but provide ACID support; may or may not support relational model.
ACID Transactions
Atomic, Consistent, Isolated, Durable transactions.
Elastic Leasing
Automatically adjusts for unpredictable demand and limits financial risks associated with cloud resources.
Pooled Resources
Physical hardware is shared in the cloud, leading to economies of scale.
Economies of Scale
The average cost decreases as the size of the operation increases.
Virtualization
A driver for cloud technology. Enables standardized processing.
SaaS (Software as a Service)
A cloud service where vendors provide software applications over the internet (e.g., Salesforce.com, Office 365).
PaaS (Platform as a Service)
A cloud service where vendors provide a platform allowing customers to develop, run, and manage applications (e.g., Microsoft Azure).
IaaS (Infrastructure as a Service)
A cloud service where vendors provide basic computing infrastructure like servers and storage (e.g., Amazon EC2).
Personal Area Network (PAN)
Devices connected around a single person.
Local Area Network (LAN)
Computers connected at a single physical site.
Wide Area Network (WAN)
Computers connected between two or more separated sites.
Internet
Networks of networks.
IEEE 802.3
Wired LAN protocol; Ethernet.
IEEE 802.11
Wireless LAN protocol.
Bluetooth
Transmits data short distances for personal networks.
Public IP address
Identifies a unique device on the Internet.
Private IP address
Identifies a device on a private network, usually a LAN.
DNS (Domain Name System)
Translates domain names to IP addresses.
URL (Uniform Resource Locator)
Internet address protocol, such as http://.
Three-Tier Architecture
Architecture with User Tier(Web Browsers), Server Tier (Web Server), and Database Tier(DBMS computer).
VPN (Virtual Private Network)
Technology used to establish a secure connection to a private network over the internet.
WSDL (Web Services Description Language)
Standard for describing the services, inputs, outputs, and other data supported by a web service.
SOAP
Communication protocol for requesting Web services and for sending responses to Web service requests.
XML (eXtensible Markup Language)
Used for transmitting documents with more overhead.
JSON (JavaScript Object Notation)
Markup language used for transmitting documents; preferred for transmitting volumes of data between servers and browsers.
Safeguards
Protective actions to minimize loss from threats and vulnerabilities.
Threats
Sources of danger that seek to undermine data and other assets.
Vulnerabilities
Weaknesses in systems that make them susceptible to threats.
Pretexting
Attempting to obtain unauthorized data by posing as someone else.
Phishing
Obtaining unauthorized data through email spoofing and phishing sites.
Spoofing
Pretending to be someone else via a false IP or email address.
Sniffing
Intercepting computer communications.
Hacking
Breaking into systems to steal data.
Usurpation
Occurs when someone deceives by pretending to be someone else
Faulty Service
When systems do not operate correctly because of incorrect data modification, systems working incorrectly, faulty service, and denial of service.
Denial of Service (DoS)
Attacks meant to shut down a web site or computer resource.
SQL Injection Attack
Entering a user SQL statement into a form instead of name or other data resulting in data disclosure, damage and loss.
Key Escrow
A symmetric key is encrypted for secure communication.
Hardening
Special versions of operating system, lock down or eliminate operating systems features and functions not required by application.
Firewall Log
Lists of all dropped packets, infiltration attempts, unauthorized access, attempts from within the firewall.
Honeypots
Computers setup to attract and detect computer criminals.