Final Exam Flashcards
data
recorded facts or figures
is data information?
no
information is what humans glean
from interpretation of data
asking a data system for specific info is a
query
information
knowledge derived from data
URL stands for
Uniform Resource Locator
URL is the
address of a specific document on the internet
SDLC stands for
Systems Development Life Cycle
SDLC process is called
the waterfall method (ex. farmer needs to decide what he needs done and the expense)
SDLC process steps:
- define the system
- determining the requirements
- implement the system
- maintain the system
denial of service attack
floods a web server with to many (fake) service requirements
hacking is
evading security or breaking security protocols
hacking is also
intercepting packets of information on other apps and servers exchange
software components
operating systems and applications
operating systems (OS)
this is the brain, but it is not hardware. Manages the computer’s resources
applications
specific purposes, opened by the OS
is data information?
no
information is what humans
glean from interpretation of data
although AI is gaining, currently only humans can create and understand information
where computers deal in data and use algorithms to decide what to do based on data points
knowledge derived from data
information
URL stands for
Uniform Resource Locator
the address of a specific document on the internet
URL
SDLC stands for
Systems Development Life Cycle
SDLC process is also called
the waterfall method (farmer needs to decide what he needs done and the expense)
SDLC process steps
- define system
- determining the requirements
- implement the system
- maintain the system
Hacking is
- evading security or breaking security protocols
- intercepting packets of information on other apps and servers exchange
denial of service attack
floods a web server with to many (fake) service requests
software components
- operating system (OS)
- Applications
operating system (OS)
this is the brain, but it is not hardware. manages the computer’s resources
applications
specific purposes, opened by the OS
when to use an absolute reference in excel
- when you don’t want your formula reference to change in a flash fill
- use the $ sign to create an absolute
data warehousing
the “data about data” contained in every warehouse that describes the content and outlines the data’s source, history, constraints
metadata
- source
- history
- constraints
indicators you have adware
- pop-up advertisements
- new cookies reflecting your history
- slower run time
- you didn’t install the program
adware is unwanted software designed to
throw advertisements up on your screen, most often within a web browser
5 components of an information system
- hardware
- software
- data
- procedures
- people
computer side of IS
- hardware
- software
human side of IS
- procedures
- people
actors of IS
- hardware
- people
instructions of IS
- software
- procedures
bridge of IS
data
database management system
program used to create process and admin a database
a DBMS is an application
not hardware
security response is best handled:
- by making contingency plans ahead of time
- by responding in real time and hoc
- by calling the authorities
- crowdsourcing your best plan
make all response plans ahead of time
- having a plan in place
- centralized reporting
- don’t waste time on blam
- specific responses
- practice
business process
a business process is a network of activities that generate value by transforming inputs and outputs
order fulfillment business process
- check inventory
- check customer credit
- approve special terms