Info Systems FINAL

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Software as a Service (SaaS)

  • accessible via web browser  

  • priced on a pay-per-use basis / subscription fee

2
New cards

Platform as a Service (PaaS)

Development and deployment environment

3
New cards

Infrastructure as a Service (IaaS)

  • servers, storage, and networking

  • common uses: business continuity, disaster recovery, big data

4
New cards

Application Programming Interface (API)

Facilitates app communication

5
New cards

CIA Triad

Confidentiality, Integrity, Availability in data security.

6
New cards

Cost of Quality

Prevention costs $1, correction $10, failure $100.

7
New cards

ETL

Extract, Transform, Load: data processing method.

8
New cards

Data Lake

Stores raw data until needed for analysis.

9
New cards

Null Testing

Checks for absent values in data.

10
New cards

Django

Web framework for building applications in Python.

11
New cards

Blockchain

  • Decentralized digital ledger that records transactions across a network of computers.

  • Each record (block) is linked to the previous one, ensuring security and transparency

12
New cards

Privacy Principles

Privacy, confidentiality, transparency, free will, fairness.

13
New cards

Natural Language Processing

Interprets and analyzes human language.

14
New cards

Neural Network

Machine learning model mimicking human brain functions.

15
New cards

Agile Methodology

  • Manage a project by breaking it up into several phases

    • Involves constant collaboration with stakeholders and continuous improvement at every stage

    • Once the work begins, teams’ cycle through a process of planning, executing, and evaluating

16
New cards

1st tier evolution

 keep the doors open (support transactions and maintain operations)

17
New cards

2nd tier evolution

know the past & current operations

18
New cards

3rd tier evolution

combine internal/external data to provide insight to future operations/probabilities and help set strategy

19
New cards

Spear phishing

  • Malicious email or text messaging sent to a specific person

  • Criminals already have some information about the victim

20
New cards

Angler phishing

Tricking victim by way of using info the victim has posted on social media

21
New cards

Advanced Persistent Threats (APT)

Sophisticated, long-term cyber-attacks targeting specific entities, such as governments or large organizations

22
New cards

Denial-of-Service (DoS)

Make system unusable so denies access/disrupts workflow

23
New cards

Master Data Management (MDM)

  • Who

  • What

  • Where

24
New cards

Object-oriented databases (OODB)

  • Storage of all data types

  • Stored in the form of objects

  • Each object contains both data (attributes or fields) and the methods (functions) that can operate on that data

25
New cards

SQL - Structured Query Language

  • Commands to access and manipulate databases

    • It is queries to INSERT, DELETE, SEARCH, ALTER, and more, with the database

26
New cards

Data warehouse

  • Facilitate a single version of truth for a company for decision making and forecasting

  • Contains historical commutative data from single or multiple sources

27
New cards

Data mesh

Decentralization and distribution of data ownership, both at a technical and organizational level

28
New cards

Extract

  • Before data can be moved to a new destination, it must first be extracted from its source

  • Structured and unstructured data is imported and consolidated into a single repository. Volumes of data can be extracted from a wide range of data sources

29
New cards

Transform

  • CLEANSE Resolve inconsistencies and missing values

  • STANDARDIZE Apply formatting rules

  • DE-DUPLICATE Discard redundant data

  • VERIFY Remove unusable data, flag anomalies

  • SORT Organize data according to type

30
New cards

Load

Load newly transformed data into a new destination (data lake or data warehouse)

31
New cards

Full loading

Everything reloaded; Can grow exponentially if old not dropped; Can take a long time to load

32
New cards

Incremental loading

  • only produces additional records if new and unique information is found 

33
New cards

Syntax-ruled command statements

Structure of programming statements that direct action (input, output, print, assign value, compute value)

34
New cards

Network protocols

  • Rules that define how data is transmitted between devices on a network

  • Ensure communication and compatibility

  • Govern data exchange, security, and error handling

35
New cards

How data travels in a network

  • Data is broken into packets

  • Packets are sent through routers and switches

  • Reassembled at the destination device

36
New cards

How IoT works

  • Sensors and Devices:

    • Collect data from the environment

  • Connectivity: 

    • Use Wi-Fi, Bluetooth, or cellular networks to send data

  • Data Processing: 

    • Analyze data using cloud or local systems

  • User Interface:

    • Deliver insights or control options to users


37
New cards

Distributed Ledger Technology (DLT)

  • Decentralized database managed by multiple participants.

  • Blockchain is a type of DLT, but not all DLTs use the block-based structure of blockchain.

38
New cards

Key features of blockchain and DLT

  • Decentralization: No single authority controls the system

  • Transparency: Transactions are visible to all participants

  • Immutability: Data, once written, cannot be altered

  • Security: Uses cryptographic algorithms to ensure data integrity

39
New cards

Ledger

Records classified and summarized transactional data

40
New cards

Hash

function that converts an input of letters and numbers into an encrypted output

41
New cards

Blocks

data structure containing a hash, previous hash and data

42
New cards

Blockchain

A type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper—proof record of transactional data

43
New cards

Ethereum

decentralized, open source blockchain platform with smart contract functionality

44
New cards

Data privacy

Responsible collecting, using and storing data about people, in line with their expectations, regulations, and laws

45
New cards

Intellectual property

Creative work in physical form

46
New cards

Fair Information Practice (FIP)

set standards governing the collection and use of personal data, addressing issues of privacy and accuracy

47
New cards

Natural Learning Processing (NLP)

  • machine learning that can interpret and respond to human language 

  • NLP techniques select a sequence of words based on their probability of satisfying a goal, such as summarization, question and answering, or translation

  • Applications:

    • Text classification and sentiment analysis

    • Language translation

    • Named entity recognition: identify and extract named entities such as people, places, and organizations from text

    • Text summarization

    • Question answering Chatbot

48
New cards

Deep learning

Employs neural networks and learns continuously

49
New cards

Agile manifesto - four values

  • Individuals and interactions over processes and tools

  • Working software over comprehensive documentation

  • Customer collaboration over contract negotiation

  • Responding to change over following a plan