Vous êtes sur la page 1sur 4

Chapter 7 Topics:

Database Management Systems (DBMS) transform large quantities of data into specific and valuable information for accomplishing some goal. A DBMS consists of a group of programs that manipulate the database and provide an interface between the database and the user or the database and application programs. DBMS are in charge of protecting data, organizing data, storing important data, and performing routine tasks. Individuals use personal databases to store addresses and contact information, keep track of important dates, and keep track of valuables. A table in a Relational Database has rows and columns. An attribute is a column in a table and contains values of the same type. A key is a field in a record that is used to identify the record. A primary key is a field that uniquely identifies a record. It also prevents duplicate records from occurring in a table. The Relational Model is the most popular type.

A Data Manipulation Language (DML) is a specific language provided with the DBMS that allows people and other database users to access, modify, and make queries about data contained in the database, and to generate reports. Data mining is the process of extracting data from a data warehouse A distributed database is a database in which the actual data may be spread across several databases at different locations, connected via telecommunications devices. (AKA virtualized database)

Chapter 8 Topics:
Wi-Fi technologies helped move e-commerce from desktops to mobile devices. The iPhone is credited with having created a market for online mobile apps. A Transaction Processing Systems (TPS) is an information system used to support and record transactions, such as paying for products or paying an employee. Be able to recognize examples of Business-to-Business, Business-to-Consumer, and Consumerto-Consumer systems. Shopping by the web allows consumers to comparison shop and read customer reviews. Near Field Communications (NFC), RFID, Infrared, and Bluetooth are all examples of private, close range communications. M-commerce is a form of e-commerce that takes place over wireless mobile devices such as handheld computers and cell phones. Examples include ring tones, games, music, videos, messaging services, etc.

Chapter 9 Topics:
Decision making involves three steps - Intelligence, Design, and Choice. Design stage: Alternative solutions to the problem are developed. The feasibility and implications of these alternatives are evaluated. Programmed decisions involve routine situations with known solutions Non-Programmed decisions involve unusual or exceptional situations An optimization model finds the best solution An MIS pulls data from one or more databases, sifts through the data and produces useful reports. Another term for MIS is Business Intelligence A Decision Support System (DSS) focuses on unstructured and semistructured problems.

Chapter 10 Topics:
A project leader is the individual in charge of the systems development effort, who coordinates all aspects and is responsible for its success. A Project Manager plans, monitors, and controls necessary development activities. Project Coordinator?? A Software Engineer is a software developer, an individual who designs and modifies software (AKA computer programmer) Offshoring relocates an entire production line to another location, typically in another country with cheaper labor, lower taxes, or other financial benefits. Outsourcing is a business use of an outside company to take over portions of its workload. Globalization is he changes in society and the world economy resulting from dramatically increased international trade and cultural change. A Request for Proposal is generated when an organization wants in IT Vendor to submit a bid for a new or modified system

Chapter 11 Topics:
Information Security involves securing all components of the global digital information infrastructure, such as personal computers, business computer systems, government systems, and international systems. Credit Card fraud makes up for 20 percent of the ID theft cases. Protection of individual property can take many forms including copyrights, trademarks, trade secrets, and patents. A copyright projects the rights of an individual for life plus 70 years. A trademark protects a unique symbol or word used by a business to identify a product or service. A trade secret protects secrets or proprietary information of individuals and organizations as long as the trade secret is adequately protected. Patent protects an invention by giving the patent holder a monopoly on the use of the invention for 20 years after the patent application has been applied. Software patches are corrections to software errors or vulnerabilities. The most common cause of data loss is hardware failure. A backup that stores the files that have changed since the last backup is called an incremental War driving is the act of driving through neighborhoods with a wireless notebook or handheld computer looking for unsecured Wi-Fi networks.

Chapter 12 Topics:
Carpal Tunnel Syndrome is an example of Repetitive Stress Disorder. Solid State Drives have no moving parts and are faster and use less energy than regular hard drives. Censorship is when a government or authority controls speech and other forms of expression. Content filtering software works with a web browser to limit the material a user can access (allows only decent web pages to be displayed, not indecent. Privacy issues that you should be concerned with include freedom from intrusion, freedom from surveillance, and control over the information collected about ones self. Through the use of cookies, web companies can accumulate immense amounts of information about customers visiting their web sites. This type of computer profiling is the primary service provided by private information service companies. P2P (peer-to-peer) networks are used to share files.

Digital divides can be based upon sex, ethnicity, race, age, income, location, and disability.

Vous aimerez peut-être aussi