1/129
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
System Implementation Strategies
Methods for switching from an old system to a new one: parallel, direct cutover, pilot, phased.
Parallel Implementation
Old and new systems run at the same time; safest but most expensive.
Direct Cutover Implementation
Old system stops and new system starts immediately; fastest but riskiest.
Pilot Implementation
New system is rolled out to one department or location first.
Phased Implementation
New system is introduced in stages or modules.
Degrees of Organizational Change
Levels of business transformation: automation, rationalization, BPR, paradigm shift.
Automation
Using technology to speed up existing processes without changing them.
Rationalization
Streamlining processes to remove inefficiencies.
Business Process Reengineering
Radical redesign of business processes from scratch.
Paradigm Shift
Complete change in business model or strategy.
Entity
A thing you store data about in a database (e.g., Student, Course).
Attribute
A property or characteristic of an entity (e.g., Name, GPA).
Primary Key
A field that uniquely identifies a record in a table.
Foreign Key
A primary key from another table used to create relationships.
1:1 Relationship
One record in A matches one record in B; usually merged into one table.
1:N Relationship
One record in A relates to many in B; foreign key goes on the many side.
M:N Relationship
Many records in A relate to many in B; requires an intersection table.
Intersection Table
A table created to resolve an M:N relationship; contains foreign keys from both tables.
Normalization
Process of organizing data to reduce redundancy and improve integrity.
First Normal Form
Remove repeating groups; each field holds one value.
Second Normal Form
Remove fields dependent on only part of a composite key.
Third Normal Form
Remove fields dependent on other non-key fields.
Query
A question you ask a database to return specific records.
Select Query
Retrieves data that matches criteria.
Crosstab Query
Summarizes data in rows and columns.
Make Table Query
Creates a new table from query results.
Update Query
Changes data in existing records based on criteria.
Append Query
Adds records to an existing table.
Delete Query
Removes records that match criteria.
Wildcard *
Represents many characters or none in a query.
Wildcard ?
Represents a single character in a query.
Like Operator
Used for pattern matching in queries.
Between Operator
Used to specify a range of values.
Null
Indicates a missing value.
Not Null
Indicates a value is present.
IIF Function
Conditional expression: IIF(condition, value_if_true, value_if_false).
Concatenation
Combining fields or text using the & operator.
Unmatched Query
Finds records in one table with no matching record in another.
Parameterized Query
Prompts the user for input each time the query runs.
Network Interface Card
Hardware that connects a computer to a network.
Hub
Sends data to all devices on a network; outdated.
Switch
Sends data only to the intended device; faster and more secure.
Router
Connects networks and routes data between them.
Twisted Pair Cable
Common Ethernet cable; inexpensive and flexible.
Coaxial Cable
Shielded cable used in cable TV and older networks.
Fiber Optic Cable
Uses light to transmit data; fastest and most secure.
LAN
Local Area Network; covers a small area like a building.
MAN
Metropolitan Area Network; covers a city.
WAN
Wide Area Network; covers large geographic areas.
IP Address
Numerical label assigned to devices on a network.
DNS
System that translates domain names into IP addresses.
Protocol
Rules for communication between devices (e.g., TCP/IP).
Ethics
Principles guiding behavior toward others.
Intellectual Property
Creative work protected by copyright or licensing.
Copyright
Legal protection for expressions of ideas.
Fair Use Doctrine
Allows limited use of copyrighted material for teaching or new work.
Pirated Software
Unauthorized use or distribution of software.
Counterfeit Software
Fake software sold as legitimate.
Data Breach
Unauthorized access to sensitive information.
Threat Actor
Person or group responsible for a cyberattack.
Phishing
Fraudulent attempt to obtain information by pretending to be a trusted source.
Spear Phishing
Targeted phishing attack aimed at a specific person.
Social Engineering
Manipulating people into revealing information or performing actions.
Password Best Practices
Use MFA, long passphrases, unique passwords, and password managers.
CIA Triad
Confidentiality, Integrity, Availability.
Confidentiality
Ensuring only authorized users access information.
Integrity
Ensuring information is accurate and unaltered.
Availability
Ensuring information is accessible when needed.
Virus
Malicious software that attaches to files and spreads when executed.
Worm
Self-spreading malware that moves across networks.
Trojan Horse
Malicious software hidden inside legitimate software.
Spyware
Software that secretly tracks user activity.
Keylogger
Records keystrokes and mouse clicks.
Ransomware
Malware that encrypts files and demands payment.
DDoS Attack
Flooding a system with traffic to crash or slow it.
Authentication
Verifying identity using passwords, MFA, or biometrics.
Authorization
Determining what a user is allowed to access.
Firewall
Hardware or software that filters network traffic.
Intrusion Detection System
Monitors network for suspicious activity.
Encryption
Scrambling data so only authorized users can read it.
Plaintext
Readable, unencrypted data.
Ciphertext
Encrypted, unreadable data.
Cipher
Method used to encrypt or decrypt data.
Key
Secret value used in encryption and decryption.
Public Key Encryption
Uses a public key to encrypt and a private key to decrypt.
Backup
Copy of data used to restore information after loss.
Full Backup
Copies all data.
Incremental Backup
Copies only data changed since the last backup.
Salesforce Object
Table that stores data in Salesforce.
List View
Filtered view of records; similar to a query.
Page Layout
Controls how fields appear on a record page.
Report
Summarizes and presents data.
Dashboard
Visual display of multiple reports.
Flow Builder
Salesforce automation tool for advanced logic.
SDLC
Systems Development Life Cycle; structured method for building systems.
Systems Analysis
Gathering and documenting business requirements.
Systems Design
Creating the technical blueprint for a system.
Programming
Writing code and building system components.
Testing
Ensuring the system works correctly.
Maintenance
Supporting and updating the system after implementation.