C175 Data Management - Terms
Big Data - ANS-Refers to data sets whose sizes are beyond the capability of commonly
used software tools to capture, store, manage and process within acceptable time limits.
Data - ANS-Facts gathered together for analysis - Collection of raw facts from which
conclusions might be drawn.
Data Center - ANS-A facility that contains information storage and other physical
information technology (IT) resources for computing, networking, and storing
information.
Data Explosion - ANS-Inexpensive and easier ways to create, collect, and store all
types of data, coupled with increasing individual and business needs, have led to
accelerated growth.
Data Science - ANS-Enables organizations to derive business value from Big Data.
Data Storage - ANS-Devices designed for storing data
Digital Data - ANS-Stored as things of binary numbers (0s and 1s)
Flat Files - ANS-A file having no internal hierarchy
Hashed Files - ANS-A file that has been encrypted for security purposes.
Heap Files - ANS-An unsorted set of records
Information - ANS-The transformation of raw data into useful facts.
Punch card - ANS-A card that is perforated and can hold commands or data.
Structured Data - ANS-Information with a high degree of organization. Organized in
rows and columns in a rigidly defined format. Typically stored using a database
management system (DBMS).
Unstructured Data - ANS-Information that does not have structure (such as text).
, Attribute - ANS-A property or characteristic of an entity. Employee number, weight of an
automobile, company's address, or date of sales meeting.
Binary Relationship - ANS-It is a relationship between two entity types.
Cardinality - ANS-It is the maximum number of entities that can be involved in a
particular relationship.
E-R Model - ANS-It is well named, as it diagram entities (together with their attributes)
and the relationships among them.
Entity - ANS-Object or event in our environment that we want to keep track of. Person,
building, piece of inventory on a shelf, finished product ready for sale, sales meeting or
an event.
Intersection data - ANS-The combination of or the association between a particular
entity and another.
Modality - ANS-It is a minimum number of entity occurrences that can be involved in a
relationship.
One-to-One Binary Relationship - ANS-It means that a single occurrence of one entity
type can be associated with a single occurrence of the other entity type and vice versa.
Ternary Relationship - ANS-A ternary relationship involves three different entity types.
Unary Relationship - ANS-It is an associate occurrence of an entity type with other
occurrences of the same entity type.
Unique Identifier - ANS-It is used to uniquely identify each record in a database table.
Candidate Key - ANS-If a relation has more than one attribute or minimum group of
attributes that represents a way of uniquely identifying the entities, then they are each
called a candidate key.
Computer Security - ANS-It includes protecting the physical hardware environment,
defending against hacker attacks, encrypting data transmitted over networks, educating
employees on the important of protecting the company's data, and many more.
Big Data - ANS-Refers to data sets whose sizes are beyond the capability of commonly
used software tools to capture, store, manage and process within acceptable time limits.
Data - ANS-Facts gathered together for analysis - Collection of raw facts from which
conclusions might be drawn.
Data Center - ANS-A facility that contains information storage and other physical
information technology (IT) resources for computing, networking, and storing
information.
Data Explosion - ANS-Inexpensive and easier ways to create, collect, and store all
types of data, coupled with increasing individual and business needs, have led to
accelerated growth.
Data Science - ANS-Enables organizations to derive business value from Big Data.
Data Storage - ANS-Devices designed for storing data
Digital Data - ANS-Stored as things of binary numbers (0s and 1s)
Flat Files - ANS-A file having no internal hierarchy
Hashed Files - ANS-A file that has been encrypted for security purposes.
Heap Files - ANS-An unsorted set of records
Information - ANS-The transformation of raw data into useful facts.
Punch card - ANS-A card that is perforated and can hold commands or data.
Structured Data - ANS-Information with a high degree of organization. Organized in
rows and columns in a rigidly defined format. Typically stored using a database
management system (DBMS).
Unstructured Data - ANS-Information that does not have structure (such as text).
, Attribute - ANS-A property or characteristic of an entity. Employee number, weight of an
automobile, company's address, or date of sales meeting.
Binary Relationship - ANS-It is a relationship between two entity types.
Cardinality - ANS-It is the maximum number of entities that can be involved in a
particular relationship.
E-R Model - ANS-It is well named, as it diagram entities (together with their attributes)
and the relationships among them.
Entity - ANS-Object or event in our environment that we want to keep track of. Person,
building, piece of inventory on a shelf, finished product ready for sale, sales meeting or
an event.
Intersection data - ANS-The combination of or the association between a particular
entity and another.
Modality - ANS-It is a minimum number of entity occurrences that can be involved in a
relationship.
One-to-One Binary Relationship - ANS-It means that a single occurrence of one entity
type can be associated with a single occurrence of the other entity type and vice versa.
Ternary Relationship - ANS-A ternary relationship involves three different entity types.
Unary Relationship - ANS-It is an associate occurrence of an entity type with other
occurrences of the same entity type.
Unique Identifier - ANS-It is used to uniquely identify each record in a database table.
Candidate Key - ANS-If a relation has more than one attribute or minimum group of
attributes that represents a way of uniquely identifying the entities, then they are each
called a candidate key.
Computer Security - ANS-It includes protecting the physical hardware environment,
defending against hacker attacks, encrypting data transmitted over networks, educating
employees on the important of protecting the company's data, and many more.