1/90
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
data
facts, text, graphics, images, sound, video
information
data processed to be useful in decision making
metadata
data that describes data
inaccessible dormant data
operational data may not be queryable
incompatable dormant data
legacy systems may not be compatible with newer tools
uninterpreted dormant data
simply lost, unknown, or unaddressed data
database
an organized collection of logically related data
databased management system
a data storage and retrieval system which permits data to be stored non-redundantly while making it appear to the user as if the data is well-integrated
relational databases
data is stored in multiple, related tabs
Data has to conform to a pre-defined schema
SQL
non-relational databases
doesn’t have to conform to a pre-defined schema
no SQL
entity
an abstract concept representing a type of thing you want to store information about
entity instance
one specific occurrence of that entity
attributes
defines an entity
indentifiers
keys
helps people understand which data point you are talking about
primary key
an attribute or attributes that uniquely identify individual instances of an entity type
candidate key
any attribute that could be a primary key
relationships
how entities act upon each other or are associated with each other
foreign key
a primary key from one table that appears in a related table in order to link the two
one-to-one relationship
each entity in the relationship will have exactly one related entity
one-to-many relationship
an entity on one side of the relationship can have many related entities, but an entity on the other side will have a maximum of one related entity
many-to-many relationship
entities on both sides of the relationship can have many related entities on the other side
conditional/situational cardinality constraints
the minimum number of instances of one entity that must be associated with each instance of another
entity-relationship diagram (ERD)
a graphical representation of relational databases
Brick & Mortar
a traditional street side business that deals with its customers face to face in an office or a store that the businesses own or rent
e-commerce
the buying and selling of goods online and the related businesses that facilitate it
accelerated and enhanced by information technology
the long tail
selling a large number of niche products that individually have low demand but collectively generally significant revenue, enabled by digital platforms and data-driven strategies
pareto principle
80% of sales comes from 20% products/customers
the law of the few
click & order
web presence only
click & mortar
both physical and web presence
digital pure play
products that can be digitalized and distributed without physical appearance
B2C
numerous payments for small amounts
B2B
aggregated payments for large amounts
digital transformation
the strategic use of digital technologies to fundamentally change how an organization operates, creates value, adn competes
operational processes
analyze, optimize, and automate workflows
customer experience
personalize and connect across channels
business models
create new value propositions
organize culture
upskilling and agility
infrastructure
provides scalable essential services and functionality
connectivity
connects people, objects, and systems to enable real-time data exchange
intelligence
converts decision making from art to science
virtualization
saves time and cost in modeling and testing
inversion
shifts value creation from inside to outside the firm
network effects
exist when the value of a good depends on the number of users adopting it
direct network effects
those pertaining to users on the same side of a network
indirect network effects
those pertaining to users on the other side of a network
platform
multi-sided markets and businesses
“PAPA”
four ethical issues of the information age
Privacy
Accuracy
Property
Accessibility
misinformation
false information that is spread, regardless of intent to mislead
disinformation
deliberately misleading false information that is spread
identity theft
the forging of someone’s identity for the purpose of fraud
phishing
sending official-looking correspondence for the purpose of identity theft (usually email)
smishing
using text messages for the purpose of identity theft
pharming
using an official-looking website for the purpose of identity theft
snooping
monitoring someone’s digital activity, can be legal and necessary
can be invasive and unethical
key loggers/trappers
record everything you type
screen capture programs
take screenshots of your activity
packet sniffers
monitor data traveling over a network
log analysis tools
track what users did
cookie
a small file that contains information about you and your Web activities, which a Web site you visit places on your computer
first-party cookies
created by the site you visit
third-party cookies
created by other companies than the website you’re visiting (usually advertisers)
trojan horse software
software you don’t want, hidden inside software you do want
adware
shows unwanted ads
spyware
secretly tracks you
spam
unsolicited email
confidentiality
information is accessible only by those authorized
authenticity
information really comes from its claimed source
integrity
information has not been altered
availability
service/resource is available when it is supposed to be
firewall
a hardware or software device that permits or denies network traffic based on security policy
intrusion detection/prevention system (IDS/IPS)
a device that watches network traffic for intrusion attempts and reports them
IDS
detects suspicious activity
IPS
detects and blocks suspicious activity
encryption
scrambling communication in such a way that only the intended recipient can unscramble it
copyright
protects the expression of an idea
patent
protects novel and useful inventions, and in some cases, ideas
software piracy
the unauthorized use, duplication, distribution, or sale of copyrighted software
computer virus
software that is written with malicious intent to cause annoyance or damage
benign virus
display a message on screen; slow down computer
malicious virus
corrupts or destroys a specific application or a set of file types
worm
a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic
denial-of-service attack
a type of computer attach that floods a server or network with so many requests for service that it slows down or crashes
black-hat hackers
bad people out to snoop, steal, destroy, or harm
white-hat hackers
good people paid to find vulnerabilities
hacktivists
philosophically or politically motivated hackers, often defacing websites in protest
script kiddies/bunnies
non-hacker bad people who use pre-written hacking code from the internet
crackers
bad people paid by other companies to engage in corporate espionage
cyberterrorists
really bad people out to harm or destroy
ransomware
a type of malicious software attack that denies access to a user’s system and data, demanding a payment to regain access
artificial intelligence
a field of science concerned with building computers and machines that reason, learn, and act in such a way that would normally require human intelligence