Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
Term sometimes used to identify audio and video ports.
communicates with a satellite dish to provide high-speed Internet connections via satellite.
The converted document, which mirrors the original document's appearance, can be viewed and printed without the software that created the original document.
Some of them allow users to edit content and add comments to the converted document.
Retail- Mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or company.
Custom- Software that performs functions specific to a business or industry.
Web Application- An application stored on a web serer that you access through a browser.
Open Source- Software that provided for use, modification, and redistribution.
Shareware- Copyrighted software provided for use, modification, and redistribution.
1.hybrid 2.analog 3.digital 4.laptop 5.mini.
organizations that select and bring together an assortment of media texts in order to sell them to exhibitors or consumers
-evidence of ownership
-can only file for infringement if registered
-ability to block importation of pirated copies
DSL, cable modem, Fiber optics, satellites and broadband over power lines.
News, Weather, Sports, and other mass media....ESPN, Yahoo, Weather Channel
Careers and Employment...Monster, Indeed
Shopping and Auctions....ebay, Quibids
1. Craves computer time.
2. Overjoyed when using a computer or mobile device.
3. Unable to stop using technology.
4. Irritable when not using technology.
5. Neglects family and friends.
1. Take frequent breaks to exercise your hands and arms.
2. Do not rest your wrists on the edge of a desk. Instead, place a wrist between the keyboard and the edge of your desk.
3. Place the mouse at least 6 inches from the edge of the desk. Your wrist will be flat on the desk.
4. Minimize the number of times you switch between the mouse and the keyboard..
5. Keep your forearms and wrists level so that your wrists do not bend.
2. Appointment book
3. Address book
Sufficient outlets to accommodate each device needing protection.
Individual on/off switch for each device.
Warranty for damages to any connected equipment
Enables users with an Internet connection to access and view webpages on computers or mobile devices.
Firefox because it's layout is simple and seems to be compatible with just about anything.
Safari comes with Apple products.
Application- Program designed to make users more productive and/or assist them with personal tasks.
Utility- Enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices.
Systems- The operating system and other tools. They consist of the programs that control or maintain the operations of the computer and its devices.
Central Processing Unit
The unit that transforms input into output is known as the:
Denial of Service attack
An assault whose purpose is to disrupt computer access to an Internet service such as the web or email.
Digital Video Interface – Connection for displays and other video devices
Redundant Array of Inexpensive Disks- a group of 2 or more integrated hard disks.
Database Management System is a computer program used to create, process, and administer the database. They receive requests encoded in SQL and translates those requests into actions on the database.
Near field communications- Type of wireless connection that uses close-range radio signals to transmit data between 2 NFC-enabled devices.
Real-time Operating System: Operating system used by an embedded computer.
Structured Query Language is an internationally recognized standard language that is understood by all commercial DBMS products.
It’s a wildcard character to indicate that we want all the columns to be displayed.
Programs that accomplish common tasks (assorting records, locating files, and managing memory usage)
Needs to be re-created under the new name, tested, and the old table is dropped.
When would it be good to use a dependency graph?
To understand consequences before proceeding with a change. Need to know all of the dependencies many database redesign projects begin.
The process of reading and producing a data model from a database schema. Provides a basis for redesign, usually missing information.
Correlated subquery example
A row from an upper query statement is used in comparison with rows in a lower level query.
Looks similar to a regular subquery. Processing is nested, a row from an upper query statement is used in comparison with rows in a lower level query.
SELECT W1.Title, W1.Copy
FROM WORK W1
WHERE W1.Title IN
FROM WORK W2
WHERE W1.Title = W2.Title
AND W1.WorkID <> W2.WorkID);
When there is no data.
By third party report generation and digital dashboard products from vendor.
Data Manipulation Language are statements, which are used for querying, inserting, modifying, and deleting data.
Displays the rows in a particular order “ORDER BY”
It adds the values in a column.
Are tables. A 2 dimensional array containing single value entries and no duplicate rows. Values for a given entity are shown in rows; values of attributes of that entity are shown in columns.
Attributes and tuples
Describes the right hand side of a functional dependency. The right hand side values of a functional dependency are said to be functionally dependent upon the left hadn side values of the functional dependency.
A key is a combination of one or more columns that is used to identify particular rows in a relation. Composite keys have two or more columns.
A column or composite of columns that is the primary key of a table other than the one in which it appears.
Controls how many rows an SQL query displays. To limit the number of rows retrieved.
Eliminate modification anomalies, reduce duplicated data, eliminate data integrity problems and save file space.
Boyce Codd Normal Form that design tables so that every determinant is a candidate key.
Used in business intelligence systems for querying, reporting, and data mining applications. To be updated carefully controlled and timed procedures are different than operational databases that are frequently updated.
Relationship classes: associations among entity classes
Relationship instances: associations among entity instances.
What can Attributes be?
Composite identifiers if identifiers consist of two or more attributes.
As either Zero or one. If zero, the entity is optional and no entity instance must participate in the relationship. If one the entity is mandatory and at least one entity instance must participate in the releationship.
1. Create a table for each entity. (specify Primary, candidate keys and properties for each column.
2. Create relationships by placing foreign keys (Strong and weak relationships )
3. Specify logic for enforcing minimum cardinality (M-O, O-M, M-M relationships)
Is an artificial column added to a relation to serve as a primary key.
Short, numeric, and never changes
Has artificial values that are meaningless to users
Normally hidden in forms and reports.
Used to be called ellipses. Property in an entity.
When is database redesign easy?a.) information systems and organizations influence each other
NUMBER This type has a fixed number of decimal places, which you can specify.
For example "number(7,2)" would define a numeric field with a total of 7 digits, 2 of them being decimal places. The default size is approximately 125 digits with "floating" precision. If no decimal places are required, we can use either “number(7,0)” or simply “number(7)”.
Parent N:M Child
ALTER TABLE CUSTOMER ADD MyColumn Char(5) NULL;
How do you represent an association in an E-R model?
A set of concepts and graphical symbols that can be used to create conceptual schemas.
Terminal dialogs and syntax -
Language base syntax is built around a widely accepted command language that can be used by the user to invoke actions.
Mnemonic syntax is built around commands defined for the custom information system applications.
Natural language syntax allows users to enter questions and commands in their own native language.
Type of System Support
When the project schedule and project plan are accepted and will be used as a benchmark to track the project’s progress.
Common to help deal efficiently with project planning. Can plan overall summary plan, master schedule to develop schedules for a few weeks or months at a time.
Idea that people build safety by adding time estimates / safety buffers
costs incurred prior to the current project. (failed systems in the past)
Inexperience people will make mistakes resulting in wasted time and effort.
Provides a cushion for unexpected situations
Based on risk and provide the project manager with a degree of flexibility.
Steps in managing IT project risk:
risk monitoring and control
Tools for identifying project risks:
Nominal Group Technique
An understanding how to deal with project risks.
Components of project communications management:
manage stakeholder expectations
Outside review of how the project was managed and executed.
Internal, that should be done before the team leaves. Should ID what they did right and documented.
What is the most important requirement for project closure under normal circumstances?
Obtaining the projects sponsor’s acceptance of the project.
Sign up for free and study better.
Get started today!