1/84
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Responsive Design:
Helps to ensure a common look and feel for the site across all devices by rearranging content
Website design for a company always requires:
A careful analysis of the functionality needed by users
A mobile website for a company:
Sometimes trims down on content and features
Which of the following is true about structured data from an Online Transaction Processing System?
Each transaction is processed at the time of entry
Closing tag
CSS
Describes how HTML elements are to be displayed on screen
Div
A generic container element you can put other HTML elements inside
Class
Specifies a style for a select group of HTML elements
Media query
Lets you create CSS styles that are only activated under certain conditions (for example, if the browser is smaller than 500px wide)
Article
Meant to go around blog posts, news articles, essays, and any other bit of content that could stand alone and is meant to be read
Ul
This tag makes bulleted lists
Style
An HTML tag that you can use to include CSS directly in your HTML file, rather than linking to an external CSS file.
Javascript
Can hide a
Text
Which of the following describes structured data?
-a defined length, type, and format
-includes numbers, dates, or strings such as Customer Address
-is typically stored in a relational database
What of the following are characteristics of unstructured data?
-does not follow a specified format
-free-form text
-emails and Twitter tweets are examples
A transaction processing system (TPS) is the basic business system that assists operational level analysts when making data driven decisions. Which of the following is not an example of a TPS?
Comfort Dental 's x-ray pictures
The primary purpose of a data warehouse is to
combine strategic information
Why were data warehouses created?
-Numbers and types of operational databases increased as businesses grew.
-Many companies had information scattered across multiple systems with different formats.
-Completing reporting requests from numerous operational systems took days or weeks.
What is extraction, transformation, and loading?
It is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
Which of the following occurs during data cleansing?
-Clean missing records
-Clean redundant record
-Clean inaccurate data
Which of the following statements is true?
The more complete and accurate an organization wants to get its information, the more it costs.
Business analysis is often difficult to achieve from operational (TPS) databases. Which of the following is not a reason why:
effective direct data access like QBE is not available
Business analytics can provide managers with the ability to make better decisions. Which of the following is not an example of how different industries use business analytics?
Identify the primary locations where data is collected
What is Big Data?
a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools
What is web analytics?
unstructured data associated with websites to identify consumer behavior and website navigation
T or F: Web/Screen scraped data in not used by an organization for any analysis purpose because it cannot be obtained from your transaction processing system
False
Scraping of data from the web can be accomplished by using which of the following methods:
-An RTO website
-Software tools designed for scraping data
-A responsive web site design
-A software tool that grabs data and downloads the data as a csv file
-2 of the above are correct****
The Google Chrome web scraper extension:
Uses a sitemap that defines the pages you scrape and the data you scrape
In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?
entity
Why do relational databases use both primary keys and foreign keys?
to create relationships between entities
What is a primary key?
a field (or group of fields) that uniquely identifies a given record in a table
What is a foreign key?
a primary key of one table that appears as an attribute in another table and acts to provide a relationship among the two tables
Which of the following is used to write lines of code to answer questions against a database
structured query language
What is a tool that retrieves information and helps end users graphically design the answer to a question?
query-by-example tool
What is the primary difference between an entity and an attribute?
An entity is a table that stores information about people, places, or events, whereas an attribute is a column or specific field of the data elements associated with an entity.
What is the role of a foreign key?
It is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
Suppose you have a database table named INVENTORY that contains all the products a company sells. The table contains the inventory item # (primary key), item description, and the sales price for each inventory item. The database also contains a table named SALES that contains data about every point-of-sale made (at a brick and mortar store) and each inventory item # sold on that sale. as a foreign key. I want a Sales-Item report that lists all Sales, each and every inventory item # sold on the sale, and the description for each item on each Sale. Which of the following are true - select all that are correct.
--the report will require 2 tables to be linked together
--the 2 tables will be linked together with the inventory item # field
Transaction processing system data might be used for:
-Doing analysis on future student enrollment
-Creating reports/queries for evaluating revenue amounts in an e-commerce sales system
-Input into a BI analysis tool
Which of the following, (1) money deposited in a bank account, (2) student registering for a class, (3) customer adding an item to an online shopping cart, are considered transactions in an information system?
All of them
Which of the following is NOT a part of a database?
Worksheets
A database for a company's transaction processing system for recording sales; should reflect:
The company's specific business process rules
T or F: BandID is the primary key in the Band table. The Bookings table needs BandID as a foreign key. You will not need to create an attribute in the Bookings table that will hold the BandID value; since Access will automatically create the foreign key attribute for you.
False
A foreign key in a database table:
is an attribute in a table; its value must be a value from a primary key in another table
Suppose that you have an Access database with a table named Sale Orders with the fields "OrderID", "TotalOrder$Value", "CustomerID (fk from customer table.)"; and; a table named Customer with the fields "CustomerID", CustomerName", "CurrentARBalance", and "CurrentCrediLimit".. I want a Customer-Sales query that lists all Sale Orders, and the CustomerName for each Sale Order.
Which of the following are true?
The 2 tables will be linked together with the CustomerID field
Suppose that you have an Access database with a table named Sale Orders with the fields "OrderID", "Order$Value", "CustomerID (fk from customer table.)"; and; a table named Customer with the fields "CustomerID", CurrentARBalance", and "CurrentCrediLimit".
How might you design a query to calculate the total $ value of all orders placed by each customer?
Use a GroupBy and Sum for the Sale Orders table
Suppose you are running a mid-sized business; and it is using cloud-based SaaS ERP software.
Which of the following will not be an issue that you will he worried about?
employing full-time IT professionals to manage your hardware and servers
A benefit of using a CRM system would be:
Customer data is available for use by all customer facing departments
Data used in business intelligence (BI) analysis could come from which of the following sources:
--A cloud based application
--Data from sources outside the company
--Structured data from sources inside the company
A key feature of an enterprise system is that _________.
it will help a business coordinate between business processes
Which of the following is used by the Google Chrome web scraper extension to scrape the data:
A Text selector type
Structured Data
Information displayed in titled columns and rows which can easily be ordered and processes; can be visualized as a perfectly organized filing cabinet where everything is identified, labeled, and easy to access
Transaction Processing Systems (TPSs)
-Capture and process detailed data necessary to update the organization's records about fundamental business operations
-Include order entry, inventory control, payroll, accounts payable/receivable, general ledgers, etc.
-Provides valuable input to data analytic efforts
Online transaction processing (OLTP)
-Data processing in which each transaction is processed immediately
-At any time, the data in an online system reflects the current status
What is an Information System?
Technology that collects, processes, stores, analyzes, and disseminates information for a specific purpose
-Solves business problems, perform data analysis, and supports decision-making
--Example: Expedia.com collects information on flights, analyzes customer requests, and returns info on matching flights so that customer can make a purchase decision
Information Technology (IT) vs Information Systems (IS)
Information Technology (IT): the hardware, software and media used to store, organize, retrieve and communicate information
Information System (IS): an organized combination of hardware, software, infrastructure, data and people that is used to accomplish a specified organizational or personal objective
Computerized IS builds on top of IT infrastructure**
HTML (Hypertext Markup Language)
-Marks up the content of a site.
-You can call up functionality by using certain HTML tags.
-Is simple in its structure. (No programming logic, no loops or functions.)
-Was NEVER really intended to contain tags for formatting a web page.
-Was created to describe the content of a web page
CSS (Cascading Style Sheets)
-Describes how HTML elements are to be displayed on screen
-Can control the layout of multiple web pages all at once
-External stylesheets are stored in CSS files
-Used to define styles for different devices and screen sizes
Javascript
There are many things that JavaScript can do that HTML and CSS cannot do:
-Can Change HTML Content.
-Can Hide HTML Elements.
-Programs the behavior of web pages
Responsive Design
Creates web pages that look good on all devices
-Will automatically adjust for different screen sizes and devices
-Helps to furnish a full experience at the mobile and desktop levels; site design changes as the display used by the user increases in screen size
-Helps to avoid an inconsistent experience for users on different devices
Data Analysis Steps (ETL)
1. Extract
-Obtaining data is the first step in data analytics.
-Data is often stored in different systems and in multiple formats.
-Canned reports often lack complete data, such as date, time, etc. Be sure to include all the fields you will need to get a complete set of data.
-Query Design Tool (QBE)
2. Transform
-Data wrangling, sometimes referred to as data munging, is the process of transforming and mapping data from one "raw" data form into another format with the intent of making it more appropriate and valuable for a variety of downstream purposes such as analytics.
-The process of detecting and then correcting or deleting incomplete, incorrect, inaccurate, irrelevant records that reside in a database
-Extracting the data in a raw form from the data source,
-"Munging" the raw data using algorithms (e.g. sorting) or parsing the data into predefined data structures.
-Depositing the resulting content into storage for future use or using it yourself
3. Load
-Depositing the resulting transformed data into a database for future analysis by a tool
-Depositing the resulting transformed data into a file for future analysis by a tool
-Then you do the analysis
Business Analytics
The use of data and quantitative analysis to support fact-based decision making within organizations
Can be used to:
-Gain a better understanding of current business performance
-Reveal new business patterns and relationships
-Explain why certain results occurred
-Optimize current operations
-Forecast future business results
What is Web Scraping?
-Process of extracting data from websites
--You could go website to website and copy and paste data into Excel or word; clean it; then use it
--You could automate the extraction with software; clean it; then use it
Relational Database
Stores data in connected tables
-Connections (Joins) are accomplished via common attribute fields called Join Fields (often a Foreign Key)
-In order to accomplish queries across multiple tables there must be Join Fields
Creating Relationships Through Keys
Primary key - A field (or group of fields) that uniquely identifies a given record in a table
Foreign key - A primary key of one table that appears an attribute in another table and acts to provide a logical relationship among the two tables
The Hierarchy of a Relational Database
1. Database
2. A table is a collection of related records
3. A record is a group of related fields
4. An attribute/field
APIs
API's- very much the same thing as a UI, except that it is geared for consumption by software instead of humans.
-Often explained as a technology that allows applications (software programs) to talk to one another
-The terms "software," "applications," "machines" and "computers" are virtually interchangeable
-Came in to existence to satisfy a demand for access to valuable content, data and resources
-Enable websites, web and mobile applications to build applications, using resources that were completely out of reach in even the recent past.
-Some API resources, like a simple city look-up by postal code, might be simple enough that a developer could recreate, but other resources such as global satellite imagery is something the average developer does not have the resources, or the time to create—the more API resources available, the cooler the apps we build.
-API consumers have a need, a problem they need to solve.
Scrum
An agile process that allows us to focus on delivering the highest business value in the shortest time.
-It allows us to rapidly and repeatedly inspect actual working software (every two weeks to one month).
-The business sets the priorities. Teams self-organize to determine the best way to deliver the highest priority features.
-Every two weeks to a month anyone can see real working software and decide to release it as is or continue to enhance it for another sprint.
Sprints
Scrum projects make progress in a series of "sprints"
-Typical duration is 2-4 weeks or a calendar month at most
-A constant duration leads to a better rhythm
-Product is designed, coded, and tested during the sprint
Scrum Framework
1. Roles
-Product owner
-ScrumMaster
-Team
2. Ceremonies
-Spring planning
-Spring review
-Sprint retrospective
-Daily scrum meeting
3. Artifacts
-Product backlog
-Spring backlog
-Burndown charts
Robotic Process Automation (RPA)
Software robot or "bot" that replicates the actions of a human to execute tasks across computer systems.
-Configurable software that sits on top of a company's existing IT infrastructure, pulling data, performing algorithms, and creating reports.
-The "robot" is configured to complete the same process steps, follow the business rules, and use the same systems that a human does today.
-RPA makes the most significant impact on manual work processes that are repetitive and recurring, and often have high human error rates.
-Automate tasks that you'd normally spend time doing yourself, freeing you up to focus on the things that require your human touch.
Jupyter Notebooks
A free, open-source, interactive web tool known as a computational notebook
-Data analysts can use it to combine software code, computational output, and explanatory text in a single document
-Users write code, execute code, and see what happens
-Modify and repeat in a kind of iterative conversation between the analyst and data
Virus
Software written with malicious intent to cause annoyance or damage
-Worm
-Malware
-Adware
-Spyware
-Ransomware
-Scareware
-Backdoor program
-Denial-of-service attack (DoS)
-Distributed denial-of-service attack (DDoS)
-Trojan-horse virus
3 Primary IT Security Areas
1. People (Authentication and Authorization)
2. Data (Prevention and Resistance)
3. Attacks (Detection and Response)
Internet of Things (IoT) -
A network of physical objects (things) embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, other connected devices, and cloud-based software.
-RFID inventory tracking chips, traditional in-store infrared foot-traffic counters, cellular and Wi-Fi tracking systems, digital signage, a kiosk, or a customer's mobile device
-Sensor: a device that is capable of sensing something about its surroundings (Pressure, temperature, humidity, pH level, motion, vibration, or level of light)
The Cloud
The on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the internet with pay-as-you-go pricing
Enterprise Systems
Provide enterprise-wide support and data access for a firm's operations and business processes.
-Supply chain management
-Customer relationship management
-Enterprise resource planning
Unstructured Data
-Raw and unorganized
-NO pre-defined data model; often text; and relationships are ambiguous
-There is sometimes some structure in this data but the structure is not neatly spelled out for us
-Need to extract elements that matter and figure out how they are related
Worm
Spreads itself not only from file to file but also from computer to computer
Malware
Software that is intended to damage or disable computes and computer systems
Adware
Software, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Spyware
A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Ransomware
A form of malicious software that infects your computers and asks for money
Scareware
Type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software
Backdoor program
Opens a way into the network for future attacks
Denial-of-service attack (DoS)
Floods a website with so many requests for service that it slows down or crashes the site
Distributed denial-of-service attack (DDoS)
From multiple computers floods a website with so many requests for service that it slows down or crashes (Ping of Death)
Trojan-horse virus
Hides inside other software, usually as an attachment or a downloadable file