1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Problems with traditional file systems
Data redundancy and inconsistency, Program-data dependence, Lack of flexibility, Poor data security, Difficulty in accessing and sharing data
Database
A collection of logically related data stored to serve multiple applications.
DBMS (Database Management System)
Software that allows creation, storage, and manipulation of data in a database.
Main capabilities of a DBMS
Data definition (schema creation), Data manipulation (queries, updates), Data security and access control, Backup and recovery, Data integrity enforcement
Relational DBMS
A type of DBMS that stores data in tables (relations) with rows and columns.
Key features of Relational DBMS
Tables with rows (tuples) and columns (attributes), Primary keys: uniquely identify records, Foreign keys: link related tables, Uses SQL (Structured Query Language)
Business Intelligence (BI) infrastructure
A framework of technologies and tools to collect, store, analyze, and visualize data.
Data Governance
Policies and procedures for managing availability, integrity, security, and usability of data.
Information system security
Policies and technologies that protect systems from unauthorized access, disruption, or destruction.
Need for information system security
To protect confidentiality, integrity, and availability (CIA Triad) of data. To prevent financial losses, legal consequences, and reputational damage.
Malware
Malicious software designed to damage, disrupt, or gain unauthorized access.
Trojan Horse
A program that appears legitimate but performs malicious functions once activated.
Denial of Service (DoS)
An attack that floods a server or network to disrupt service and deny access to users.
SQL Injection
A code injection technique that allows attackers to manipulate SQL queries and access or destroy data.
Identity Management
Techniques and tools to identify, authenticate, and authorize users.
Disaster Recovery
Plans and strategies to restore IT systems and data after unexpected failures or disasters.
Auditing in IS security
The process of reviewing logs and system activity to detect issues, breaches, or non-compliance.
Walkthrough
A structured review of system design or code with peers to find defects early.
Debugging
The process of finding and fixing errors or bugs in software code.
Types of decisions
Structured: Routine and repetitive (e.g., reorder stock); Semi-structured: Some rules, some human judgment (e.g., approving loans); Unstructured: Complex, non-routine, requires intuition (e.g., strategic planning).
Steps in the decision-making process
Intelligence - Identify the problem; Design - Develop possible solutions; Choice - Select the best option; Implementation - Put the solution into action.
Classic Model of Management
Focuses on the roles of planning, organizing, coordinating, deciding, and controlling.
Invest in information systems
To improve decision-making, efficiency, customer service, and gain competitive advantage.
Main functions of Business Intelligence systems
Data collection; Storage and integration; Analysis and modeling (e.g., dashboards, reports); Decision support for strategic, tactical, and operational goals.
Systems Development Lifecycle (SDLC)
A structured process for developing information systems.
Phases of SDLC
Systems Analysis - Determine requirements; Systems Design - Create technical blueprint; Programming - Write code; Testing - Check for errors (unit, system, acceptance); Conversion - Implement the system (parallel, direct, phased); Production & Maintenance - Ongoing support and updates.
Prototyping
Building a preliminary version of a system quickly to test concepts and gather user feedback. Useful for refining unclear requirements and supports iterative development.
Common types of system failures
Cost overruns, schedule delays, unmet requirements, poor user acceptance.
Consequences of poor project management
Budget issues, reduced quality, project cancellation, stakeholder dissatisfaction.
Project Management
Application of skills, tools, and techniques to meet project objectives and constraints.
5 key variables of project management
Scope - What is being delivered; Time - Project timeline; Cost - Budget; Quality - Meeting performance standards; Risk - Managing potential problems.
Risk Management in projects
Identifying, analyzing, and planning for potential project risks to minimize impact.
User Involvement
Ensures requirements are met, increases system acceptance, reduces resistance, and improves satisfaction.