Upgrade to remove ads
FBLA Introduction to Information Technology
Terms in this set (124)
A formula or procedure that is simple for solving a problem with clear stopping point.
A program that is designed to perform a specific task.
Length in code in assembly and machine are the same and uses words.
Batch driven data warehouse
Prepare the data in advance, and then when the computer system is not busy, the information can be processed all in one batch. Payroll and credit card bills are examples.
Binary numbering system
1s and 0s
Compiled and interpreted languages are written in ?
hubs, switches, routers, WAPs
Both the authentication proof and the encryption information.
Path exist during the entire conversation, communication in either direction can occur simultaneously.
As a Service, Platform or Software
Translates the entire program, creating an executable, which can be run at a later time.
Information that an organization will keep secret, such as patent-able information and business plans. The government classified tags such as confidential, secret and top secret.
The Controller - MCV
Facilitates communication between the model and the view.
Database Admin Roles
Integration, security for remote access, procedures associated with DBMS
Database Management System Manufacturers
Microsoft Access, SQL, and its variations (MySQL, Microsoft SQL, PostgreSQL, etc..
Records (rows) are called tuplets. All records of the relation share the same attributes. Attributes are characteristics which are used to describe a record, and are the column headings. A field contains the data of an attribute for a record within a relation.
A query return of ALL records for the relation, but only selected attributes and fields.
A search of data in relation to selected parameters
The horizontal row
Database record functionality terms
Record, Query, projection, update or modify , insert, delete and join
The means by which users obtain data or information out of the warehouse.
In software architecture n-tier or multi-tier development -- this tier is where data are stored, retrieved and updated from database tables. The data can scale more easily.
Uses an ETL (Extract, Transform, Load) Process
Data, Information, Knowledge and Wisdom
Data Query Language
Event Driven Data Warehouse
Processing uses business events, such as submitting an order to a vendor. receiving goods, or creating new employee records to trigger messages to send by middleware between software modules that are completely independent of one another.
Comes from various sources. These sources must be identified, understood and tapped
A collection of databases
Given the data come from different sources. it is likely that the data are not organized using the same collection attributes. Therefore, the data must be transformed to fit the model(s) of the data warehouse. This includes altering data to relations or objects, recognizing the unique identifiers and selecting the appropriate attributes.
Into the storage facility, that is the transformed data must be stored in the data warehouse using the appropriate representation format.
Fields in SQL
Select, From, Where
Vacuum tubes, ENIAC, punch cards, connected through cables.
Flat file database
one large single table without the relations between tables that a relational format provides
Unique Identifier or Primary key
For a database to work it must have this.
1974 IBM single chip processor, microprocessor/ microcomputer. Miniaturization still in this generation today.
Freeware or public domain
Has become obsolete or company no longer provides support
Illustrated project schedule
In project management; problem definition, resource allocation and Risk assessment takes place in this phase.
In project management; Objectives and activities, organize activities, time estimation and cost estimation takes place in this phase.
Executing and controlling phase
In project management; Variance reports, status reports and resource allocation takes place in this phase.
In project management; once all deliverables have been met, a project is consider to have reached this phase.
An inter-networking system or device capable of joining together two networks that use different base protocols.
format organizes data using a tree-like or organization chart type structure. Main data points can have multiple sub-data points associated with them referred to as parent child model.
To conclude from evidence or by reasoning. Ways to process data so it becomes information.
Takes the most recently entered instruction, translates it into machine language and executes it.
The hardware, software and people
Oversees staff, communicate with upper management, understands both sides, hires and fires.
Manager, Training, help desk
Java Database Connectivity (JDBC)
For applications written in Java, Oracle has developed this driver. This driver is orientated toward interactions with relational databases. Anyone developing in Java can use this driver in conjunction with ODBC (via a bridge) to have an application interact with any database.
Withdraws information from multiple relations or field values
Contains the core components of the operating system. Its loaded when the computer is first booted. This includes components that handle process management, resource management and memory management. It sits between the hardware and software.
Information that has been put to use.
Assemblers, compilers and interpreters
For this operating systems the users prefer to use the command line.
In software architecture sits between the user and the data. This is where the system performs its logic processing, it resides on the server where the processing occurs.
Firewall, anti-viral, anti-malware software
In software architecture this layer can take different forms depending on the complexity of the application. In certain instances its an actual object that is an actual implementation of the application. This is used to retrieve information about the product. It is in this layer that the business logic is designed.
In software architecture this layer is part of an application that interacts with the user and passes along the user requests to the model layer. It is in this layer that the input logic is designed.
In software architecture this layer is the part of the application that represents the user interface. This is used to capture the input from the user to be passed via the controller to the model. It is in this layer of the application that the user interface logic is designed.
High level languages
Basic, C, C++ and java
Network engineer or network architects
Network admin roles
Design, edit configuration files, write shell scripts and install software and updates
Online Analytical Processing
OLAP(Online analytical processing)
Data are processed through a suite of analysis software tools.
Online data processing
It deals with data in real time. its a "live" database
workstation, mobile and server
Program evaluation and review technique
A threat if disclosed to others such as social security and credit card numbers or health and educational information.
Initiation, planning, executing and controlling and closing
Temporary, unique and ends
brings a unique focus shaped by the goals, resources and schedule of each project
Public key encryption
uses two keys, a public, and a private
Public information might include names and addresses
Relevance, timely, accurate and reliable
multiple tables with interrelated fields
Data collection from a specific client history
Stable and consistent collection process across points over time.
An analysis of assets, vulnerabilities, threats, prioritize risks, develop and enact policies.
public, sensitive, private and confidential
adding to the scope of the project in this way can impact allocation of resources and put the project at risk
introduction of transistors and magnetic core memory
Security admin roles
Prevent DoS, DDos, key encryption, buffer overloads and hackers.
Security best practices
What you know, what you have and what you are
Not a threat to a person's privacy
Services or Daemons
System software that consists of programs that will run in the background
SQL injection into a network and buffer overflow using unused buffer space.
Symmetric key encryption
Same key for performing the encryption and decryption
System development life cycle
Preliminary investigation, analysis, logical design, physical design, implementation and maintenance.
Silicon chips, printed circuit boards, integrated circuits, 1950s
Types of data
alphanumeric, number integer, date/time, text, boolean/logical
Types of databases
flat, hierarchical, relational
The combination of knowledge and experience
known as a webmaster and administers a web server
Specific interpreted programming languages
Programming language that can be executed faster
Contains a few lines of code
What type of data type is the following? The home address of an attendee.
In data type: Whether the attendee is a member of the association hosting the conference.
in data type: the date the registration was received.
in data type: the amount of money paid for field trips held in conjunction with the conference.
Multiple tables with interrelated fields can be queried to generate and provide information to users.
Sub-tables contain data related to a single main data point
An organized collection of data
Specific characteristics or properties of a record
A data value of a records' attribute
Record or tuple
All of the data listed for a single person or entity
Expected to play a role in application design and development.
Provides the ability to analyze raw data in greater depth
Helps to capture the knowledge contained in various information systems within the company for making strategic decisions.
One of its main purpose is to improve the timeliness and quality of the information that goes into making strategic decisions.
Type of processing: Online registration
type of processing: updating accounts in a bank with the account holder transactions
type of processing: registration for events happening in the near future.
Resides between the application and the database and servers to translate functions used by application into appropriate queries to the database.
In SQL; used to inform the DBMS what fields or attributes are of interest ( and where they are located, i.e, Which table/relation they can be found in.
In SQL; used to inform the DBMS what tables are to be interrogated by the query and , if more than one table contains the data of interest. how they are to be combined or joined.
is used to inform the DBMS of the specific criteria the data should match to be returned as the output of the query.
Inserts a new table in your database
Modifies an existing table in your database
Removes a table from your database
THIS SET IS OFTEN IN FOLDERS WITH...
Art History Exam 1
Art History 101 Final
Webpages, Blogs, Wikis, and Email
Italian & Northern Renaissance
YOU MIGHT ALSO LIKE...
Information Systems Chapter 4
MCIS ch. 6
IT Chapter 6
IS BOOK Ch. 4 Review Questions
OTHER SETS BY THIS CREATOR
Christmas Carol Vocab Stave 1
Combo with "The Giver Ch. 17-19 Vocabulary" and 3…
Science Chp. 8 Vocab
PSAT Vocabulary Words 5