Data
Tree-Hierarchical database problem when adding New records
stored sequentially
Flat file system Very easy to add new records
When search every records by bypass
Easier to add new records and easier to access existing records
relational database
use Rows&Columns similar to spreadsheet
Metadata Data describing other data, AKA Data Dictionaries
larger amount of data collected from various sources, structured or unstructured
Big Data
including social media
Structured Data relational data bases.
such as text, audios, videos, images, are maintained bynon-relational
Unstructured data
databases.(No-SOL)
Semi-Structured Data XML and XBRL, can be converted and stored in relational databases for analvsis
Data integrity ensure data consistent and accurate.=NO manual entry
A centralized depository for all transactions from different sources(No organization)
Operational Data Store
It's source for data warehouse
A big repository for raw, structure and unstructure data
Data lake
Data are stored in raw format, that have not been processed
Stored structured data that has been cleaned and organized
Data warehousing
Ready for quiry and analysis
Subsets for a dataware house, to segregate datasets by business activities to service
Data Mart specific purposes
sales data mart, finance data mart
Data masking
Data archives
Fixing errors in data, flushing out useless information and identifving missing
Data Scrubbing or cleaning
data.
Data Normalization-
Data fusion
Data Additions add new records to a database
Data management
Data harvesting collecting information from various sources, like websites, apps
Veracity trust-worthiness , accurate
Variety various sources
Velocity speed or Flow of the data,in real time
Volume The extreme amount of data captured over time , how much
data at rest
information that is being transmitted over a network, such as emails, web pages, and
Data in transit
instant messages
Data in memory
Data Analyze=retrieving data from data sources and then inspecting the databased on data type to facilitate the decision-making process.
using statistical technigues to extract and analyze data from large databases to
Data mining
discern patterns and trends.
Text Mining analyzes text from , customer emails, review wrtten by customer
from big picture to detail, AR, U can drill down to see the invoices and payments to
Dilling down
support AR balanc
Slicing And Dicing Ability to view single data in multiple dimensions(geographic, time period )
Descriptive analytics "what is happening"
Diagnostic analytics "why did it happen" and provides insight on the reasons
Predictive analytics Forcast "what is likely to occur"
how should we respond for the predicted future results to actually occur.
Prescriptive analytics
applies advances statistical method/Artificial intelligence/Scenario Modeling
Dat Visualization
Bar chart comparisons
Scatter plots show the relationship(correlation)
line chart trend over time
Stacked Column Charts Total comparisons with percentage breakdowns of the whole
Box Plots median
Dot plot Find frequency of the observation or dimension
Pyramid foundation or building block
Flowchart Processes
Waterfall Cumulateive effects of a series of data
Typography use of fonts
Iconography icons in visual displays = Emojis
Processing
1. input documents/transactions are collected/accumulated and grouped
Batch Processing
2. These groups are processed periodically,update files all at once.
immediate processing
OLTS=Online transaction processing
data entry, data validation, and master file update
OLAP=Online analytical processing system, analyzes data within the system using data mining and data warehousing.
All processing is perform at a central location
Centralized processing
CONs= transmission cost
Decentralized processing each remote computer performs a portion of the processin
Distributed processing
relational database
file AKA table is a collection of data
Data Value
each Row consider as "Record"
Record each row contain in one complete record,every record is stored in single row
field each single item=Cell B32
Primary Key
Foreign Key
one employee have only one drive licence
one to one each licence belong to 1 person
one to many each customer can have multiple order. but each order belong to 1 customer
many to many each student can enroll many courses.Any course can have different students
bridge table/link table link 2 table by using Forein key
Referential Integrity
Attribute
SQL Structured Query Language
SELECT column_name,column_name
Statement FROM table_name
WHERE item='kitchen'
clauses SELECT FROM WHERE
string data=text data
numeric data
IT System
TPS=transaction processing systems "Operational system"routine daily transaction
MIS=Management Information systems strategic planning and execution of tactical operations
AIS=accounting information system subset of MIS, process transaction
ES=Expert system computer uses reasoning, No human interpelation
computer provides data, require human interpretation
1. operating Mgt upper level Manager, daily decision making
2."what-if" scenarios to make projections/forecast and may utilize artificial
DSS= Decision support system
intelligence
systems help model diferent scenarios or a combination of possible outcomes
3. find relationships and patterns(data mining & data warehousing)
1. senior management, for strategic decision making
EIS=executive information system 2. immediate and easy access internal &external information=Dash-Board
3. identfy "bic-picture" insights or trends, Long-term Decision
GSS=Group support systems group collaboration
EPM-Enterprise Performance Mgmt
help executives make strategic decisions
aka BPM, CPM
1. centralized system=>integrates information across Dept,
ERP- Enterprise Resource Planning
Benefit=Data input less intensive
internal
Con= it takes time to implement , Expensive
CRM-Customer relationship management caputure information about customer to provide tailored promotion
E-commence
shipping, payroll processing, and receiving internet orders
TPS- transaction processing system
EFT systems- electronic funds transfer
SCM-supply chain management, External integrate with supplier throughout customer=plan-source- making- Delivering
INVTY Mgmt, internal track Qty&trigger reordering if fall below level,
systems Development life cycle SDLC
reviews, approves and prioritizes systems development proposals.
IT Steering Committee
need includ IT expertise to determine technologically feasible
Lead Systems Analyst Manages the development team direct contact with end users
addtional systems analysts Designcreate and test the program and implementing the controls in partnership with
Application Programmers the end users
waterfall model
Critical Success factors.
feasibility stage
Proiects milestones and responsibilities
the accountant and internal auditor may be asked to prepare or evaluate RFP(request
Analysis&requirement
for proposal)'s
technical architecture specification
Design
System model sepcification
use design specification to develop the program&data file
Development
then use development sepcification to purchase harward&Network&IT infra
correct and incorrect data,
Testing&Training
test at operational loads Not test load
implementation &data conversion user training
an approximation of a final system is built, brought to the users for any changes, and
Prototyping Model=
then tested until an acceptable prototype is finally achieved.
Agile Development
Next, the complete system is developed from theprototype,
Impementation Plunge / Big Bnag Entire New immediately
Rolling Phased Conversion=Phased Implementation Portion of New replace corresponding
A/B Testing Pilot Canary subset user gets the New system while old still in use
Blue/Green/Shadow New Fully depoloyed parallel with Old
Test
1. Unit Testing Testing the smallest level of code or software
2. Integration Testing Testing combination two or more units of code or software
3. System Testing Testing the system as whole once all parts have been combined
Functional Test Testing functions performed by the system in realistic business scenarios
Blackbox Testing
Whitebox Testing Evaluate Code & Design
GrayBox Testing testing both of design and function
Exploratory Testing Test in a less common situation with no specific test case
Performance Testing To Test the run-time(Speed) performance of the software
Recovery Testing Testing checks the system's ability to recover from failures
Security Testing Verified system protection mechanism prevent improper penetration
Regression Testing Rerun previous tests within entire app after a new feature incooprated
Test in a extreme condition or abnormal condition (ie. Large volume, high frequency, large
Stress Testing
quantity)
Sanity Testing Excercise the logical reasoning and behavior of the software
Acceptance Testing (Alpha + Beta)
- Alpha testing (V1.0) Testing with customers under the supervision of developers
-Beta testing (V3.0) Testing with customer without developers supervision
Repeaters strengthen data signals between distant computers
converts data or other communications from one protocol or format to another ,act as
Gateways
intermediaes
Bridges- Bridges connect physically separate local area networks to a larger network.
Switches divide one connection into multiple connections
Routers Help to manage/assign network's traffic and assign IP address
Servers provide computing power for other machines on the network
LANs local area networks access limited geographic area=private
WANs wide-Area Networks larger geographic area, public, or private
Web Browser The web browser translates a URL into an lP address.
The lnternet Global network of milions of computers and computer networks,
connect people within a company to each other and to the company network lntranets
Intranet
are located inside a company's firewall
a company to extend its intranet to its customers. suppliers. outside of the firewall
Extranet
have potential security risks
is a series of numbers that identifles any device on a network.
IP Address
lP stands for lnternet Protocol.
ISP provide the high-speed communication lines that allow users to connect to the
Internet Service Provider ISP
internet.
A framework for accessing linked digital resources such as documents, pictures, music,
World Wide Web- WWW
videos,
Uniform Resource locator URL A protocol for finding a document by typing in an address
Protocol set of rules for exchanging data between two computers
Transmission Control Protocol (TCP) foundation protocol for data transmission on the internet
Hypertext Transfer Protocol (HTTP) foundation of the World-Wide-Web and is used to load webpages using hyper text links
building block protocol for constructing web pages, uses tags to mark up what is
Hypertext Markup Language (HTML)
displayed on a web page. HTML is the core language for web pages.
XML is also a markup language, but it uses tags to structure the data not display it on
XML- Extensible Markup Language
the screen.
XBRL- Extensible business reporting language- XML based Protocol for encoding and tagging business and accounting information
File Transfer Protocol- (FTP) The Protocol used for uploading or downloading files to and from internet
Internet message access protocols- (lMAP) permits access to your email from any device, wherever you are
1.over a private network as opposed to the internet
2. more expensive but security
VAN Value-Added Networks
3. error detection and correction services in supply chain management (EDI) for
large companies.
privacy, anonymity, and security to users by creating a private network
VPN Virtual Private Networks connection(channel) across a public network connection
3.allows remote users secure access to a network
Cloud computing =storage of Fildes/Data on 3rd party servers over internet
Software as a serivce SAAS using cloud to access software
Infrastructure as a services IAAS access a virtual data center of resources including a network computer &storage
Platform as a service PAAS cloud to creat software
is a periodic (daily, weekly, monthly transaction processing method in which
Batch processing transactions are processed in groups.
disadvance= time delay,
Online Real time processing
continuous immediate processing
OLRT
External Private cloud managed outside of the entity but exclusively for the entity
External Public cloud managed outside of the entity and outside user
Internal Private cloud Not shared, wholly owned within entity
Internal public cloud servers are internally, back up to public
Unauthorized cloud activity procurement of cloud services without approvals
Risk Lack of CSP Transparency entity chooses a cloud vendor without a list of approved cloud vendors
CSP reliability
1. security protocos to prevent unauthorized acess
response to Cyber attack
2. Firewalls, prevent hackers from breaking into