Information Management
IM 2020
IM 2020
Kartei Details
Karten | 72 |
---|---|
Sprache | English |
Kategorie | Technik |
Stufe | Universität |
Erstellt / Aktualisiert | 30.05.2020 / 19.06.2024 |
Weblink |
https://card2brain.ch/box/20200530_information_management
|
Einbinden |
<iframe src="https://card2brain.ch/box/20200530_information_management/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Explain the difference between Single and Multi Using Operation Mode and name their disadvantage
single using: only one user uses a computer, e.g. desktop and laptop computers, smartphones
--> poor utilisation of resources
multi using: several computers connected to central computers at same time
(e.g. clients connected to web server, webserver connected to applications)
--> complex, higher system requirement
Explain the difference betweeen Batch Processing and Interactive/Dialogue Processing Mode
Batch: completely defined job placed in queue --> computer processes one after the other
e.g. printing, serial email
Interactive/Dialogue: user defines oreder step by step
e.g. check out in online shop, single email, writing a document
According to size and power, name the computer system categories
- Embedded systems: small, low power (e.g. washing machined)
Common OS: Linux
- Mobile Devices: single using (e.g. smartphones, tablets)
Common OS: Android, iOS
- Personal Computers: single using (e.g. desktop, notebook)
Common OS: Windows, Mac OSX
- Mid-size Systems: multi using, 20-100 workstation (central data storage, applications servers for departments or small companies)
Common OS: Unix, Linux
- Mainframes: multi using, 1000's of terminals (centers of large companies, public authorities)
Common OS: Unix, Linux
Why do we need computer networks?
- make manual data exchange unnecessary
- allow access from everywhere
- helps avoing duplication
- enables different communication
- enables e-business: data exchange with customers, suppliers, partners
...through supporting client-server applications, protection and data security
Whats the difference between Circuit and Packet Switching?
Circuit: (e.g. telephone)
- physical connection between callers or data stations for entire transmission duration
- callers, data stations have own channel
Packet:
- virtual connection between data station --> data (incl. voice) sent in standardized packeges
- switching packets and frowarding them ---> can take different routes (routing)
- higher utilization degree of networks, delays in case of heavy usage
What is the Definition of Internet?
On what Model is Internet built?
What are Communication Protocols more exact?
- Global computer network consisting of large number of international and national subnets all using communcication protocol TCP/IP.
- Most Internet services based on client server model
- Agreements (of organizational process of data transmission) about structure, monitoring, disconenection of connections
- Goal is splitting complex communication into subtasks
- modern communication is always in layers:
--> Protocol for addressing, for common understandable representation, for operational intent
- Participants perceive communication as "horizontal" --> actually it's vertical except lowest layer
Describe the purpose of the Application layer of the TCP/IP Layer Model with an example.
Explain the different Protocols involved in the process (HTTP, SMTP, FTP)
1. Application: which kind of communication takes place? (sending email)
HTTP Hypertext transfer protocol: most used Service on web
- Transmits websites and content from web server to browser
- Connection is established for transfer, terminated after completion
SMTP Simple Mail Transfer Protocol: standard mail transfer
- Protocol used for transmission Port 25
- Transfers emails between servers (Gmail to GMX)
FTP File Transfer Protocol: transfers files over internet, oldest TCP/IP Service
- Allows upload and download of files (Port 20 for data, Port 21 for commands)
- Client/ Server Architecture
Advantage to HTTPs: allows inspection of file trees, no html code needed
Describe the purpose of the Host to Host layer of the TCP/IP Layer Model with an example.
Explain the different Protocols involved in the process (TCP, UDP)
2. Host to host: which software is used for communication? (Server)
TCP Transmission Control Protocol: provides complete transmission
- data put into correct order for recipient
- if packets lost --> TCP needs new transmission
UDP User Datagram Protocol: provides incomplete transmission
- Data processed by recipient in order of arrival
- if packets lost --> then it's lost
Describe the purpose of the Internet layer of the TCP/IP Layer Model with an example.
Explain the different Protocols involved in the process (IP)
3. Internet: Which computer is addressed (IP address 10.17.21.1 e.g.)
IP Internet Protocol: establishment, dismantlement of transmission
- Routing (find the way) --> if target not in local network, router forwards traffic to computer in direction of target destination
- Confirmation of receptivity (PING)
Describe the purpose of the Network access layer of the TCP/IP Layer Model with an example.
List the three elements involved in the process
4. Network access: How are data transmitted physically (radio link, cable etc.)
- Ethernet
- Token ring
- FDDI
Explain the difference between the IP Addresses Pv4 and Pv6
IP Version 4:
- 32 bit
- Four numbers between 0 to 255 separated by dots: e.g. 216.27.61.137
- Number of possible addresses: 2^32 = 4.3 Billion ( not enough today)
IP Version 6:
- 128 bit (increases possible addresses to 2^128)
- Eight blocks of 16 bit each, hexadecimal, separated by colons
- e.g. 2001:0db8:85a3:08d3:1319:8a2e:0370:7344
What does DNS stand for and what is its main purpose?
Domain Name System/Server: Converts easy-to understand domain names like fhnw.ch (HTTP Requests) into complete IP Address
Explain the Abbreviations HTTPS and TLS
Hypertext Transfer Protocol Secure HTTPS
- Ensures security of website ( https://)
- Supported encryption method can be used on all internet- enabled computers without other installation
--> Used on sensitive data websites (e-banking)
Transport Layer Security TLS
basis for other protocols (HTTP --> HTTPS)
encrypted and secure communication over internet
- Prevents interception of connection and manipulation of transmitted data
- Encryption alone is not sufficient for secure communication
Explain the terms Certificate and VPN
Certificate: Guarantees identity of certificate holder (domain holder)
--> like ID card
certificate is digitally signed so a change is noticeable
Virtual Private network: data transmitting over encrypted connection (secure tunnel)
- Through tunnel: computer gains access to private network and can access internal resources
- Connection gets established between VPN Server and VPN client
Explain what a primary key is?
What is a combinded primary key?
- Consists of and is assigned to one or more attributes
- Identifies a record of a relation
- Value of a primary should never be changed and cannot be empty (null)
- each attribute can be made the primary key, but it must be unique (artificial attributes like Numbers)
Combined Primary Key: primary key consists of several attributes
--> must be minimal (uniqueness lost when removing any attribute from the table)
--> often consists of secondary key
Explain what a secondary key?
How can realtionships between relations be established with the primary and secondary key?
- attribute related to primary key of another relation (Foreign key)
Relationship:
- relation can contain any number of secondary keys
- primary and secondary key must have same data type (but not same name)
- if no input required for secondary key attribute, it may also be empty (Null values)
- Secondary Keys belonging to primary key may never be empty
- Explain how to transform the 1:1 Relationship into a Relation
- Explain how to transform the 1:n Relationship into a Relation
- Explain how to transform the n:m Relationship into a Relation
What is Referential Integrity
- Two tables with 1:1 relation: either take the primary key of first table and add it as secondary key in second table or vice versa
- Primary Key in first table gets placed as secondary key in second table (secondary key is always placed in table with the n!)
- the primary keys of both tables (entity types) become secondary keys and form a new relation together.
e.g. Branches (n) sell Items (m) --> new relation: Sales (Branch No, Item No)
--> In new Relation the secondary keys can become combined primary key
Referential Integrity: prevents database changes from causing secondary key values to reference non-existing records (primary key values)
Explain what a recursive Relationship is
Is a Relationship type between same entity type --> entities of same type are related (same rules apply as for different entity types)
e.g.
1:1: persons is married to Persons --> Persons (PNo, Name, Firstname, PartnerNo)
1:n: Employee (1) leads Employees (n) --> Employees (ENo, Name, Firstname, SuperiorNo)
n:m: Products/Parts (n) contains Products/Parts (m) --> New Relation: Components (SuperiorNo, SubNo)
What are the Goals and Use of Normalisation
Designing a database where redundancies can be avoided
Use:
- detect and eliminate redundancies
- transform existing data into relational model
- create stable and flexiblie data structure that needs to be changed as little as possible
- transforms complex relations n:m into hierarchal relations 1:n
What are Normal Forms?
How can we determine the Degree of Normalization?
Normalization takes place step-by-step from one normal form to the next
the higher the normal form (1NF, 2NF etc.), the higher the degree of normalization --> meaning less redundancies
To determine the degree of normalization:
relation must be examined: value of each attribute, dependencies between attributes of each relation
What are the three types of Dependency between the attributes?
Functional Dependency: attribute of A is related to exactly one attribute of B e.g. Persons (PNo, Name, Firstname)
Full Dependency: Attributte B is functionally dependent on all Atrributes in A e.g. Sales (CNo, ANo, Salesdate)
Transitive Dependency: Non-key attribute B is dependent on A and attribute C is functionally dependent on B, But A not functionally dependent on C e.g. Persons (PNo, Name, DepNo, Department)
When is a relation in the 1NF, 2NF, 3NF?
1NF: if in each table only one value is contained and all atrributes are atomic (indivisble)
2NF: if the relation is in first normal form and every non key attribute is fully functionally dependent on the primary key
3NF: if the relation is in the second normal form and there are no transitive dependencies
How we can use models for Problem Solving?
Explain the meaning of the term Enterprise Modelling
Modifications turn the Descriptive model (ERP): business model (current state)
into..
The Prescriptive model: IT model (traget state)
EM: models digital transformation of an enterprise (Data Model)
-->generates value, promotes business efficiency, agility, durability etc.
Explain on which different views the Architecture of Integrated Information System (ARIS) is built up on
What are the three components embedded in the views
Organization view (WHO) : Org. Structure, HR, Hierarchy,
Data view (WHAT): Entity and Data Models (e.g. ER Model)
Control view (HOW): Connects other views to a time-logical schedule (e.g. Process flow diagrams)
Function view (WHERE): Activities within/across business functions (e.g. hierarchy trees)
Product and Service View (WHAT FOR): P&S portfolio (e.g. Product Models)
1. Requirements specification (standards)
2. Data Processing concept
3. Implementation: technical realization
Explain the tem Process and more specifically the term Business Process
What are the five kinds of Business Process
Process: logical sequence of activities (start and termination event)
Business Process: chain of tasks than contribute value for company--> derieved from corporate strategy
- Order-to-Cash (e.g. amazon order): customer submits order, product delivered
- Quote-to-Order: Supplier receives request for purchase quote (purchase order)
- Procure-to-Pay: need for p&s in company--> p&s delivered and payed
- Application-to-Approval (building permit etc): Application for benefit: benefit approved or denied
- Issue-to-Resolution (IT service): customer raises problem/issue --> issue resolved
What are the Activities and Benefits of Business Process Management BPM?
Activities
- Oversight of Organization Performance --> Manages entire chain of events, activities, decisions
- Improvements (reducing costs, execustion time, error rates
- Tools to design, analyze, execute, monitor business processes
Benefits
- Business-IT alignment: Process Models can be understood by both business and IT people
- Process Improvements: High quality management (cost, time, quality, flexibility), Process automation (workflow, control, efficiency), Business information system integration
What are the five levels of the Capability Maturity Model?
Whats the difference between the higher and lower levels?
1. Initial Ad-Hoc: Enterpreneurial management ( Process known but not documentet)
2. Managed Documentation: Base management (documented process, not modelled)
3. Defined Modelled Process: Process definition (standard processes)
4. Quantitatively Managed: Process measurement (measures with key-figures)
5. Optimizing: Process management, change management (quality feedback and insights from experts)--> very expensive
higher levels: Quality, Productivity
lower levels: risk not meeting customer needs
What is the Purpose of Process Modelling?
Name the two Process Modelling Methods (in which ARIS view are they?)
Purpose:
- Basis for decision making (communicating, analysis)
- Documentation of facts (knowledge, design, automation)
Methods (in control view of ARIS)
- EPC Event-driven Process Chain
- BPMN Business Process Model and Notation
Explain the four symbols/elements of the Event-driven Process Chain
What are the most important Rules when creating an EPC
Event driven Process: Mapes start and end state as well as activity, direct graph of function or tasks
1. Events (e.g. order received): does not consume time or money, passive (hexagones)
2. Task function (e.g. check stock): verb plus object, (rectangles with rounded corners)
3. Operators: connector, identify logical links (circle with < and, > and/or, x or)
4. Control flow: temporal, logical dependencies of events and functions
- at least one start and end event --> events followed by event or connector
- functions and events have exactly one incoming and outgoing edge (except start or end event)
- connectors have either several incoming and one outgoing event, or one incoming and several outgoing event
Explain the symboles, components of the Business Process Model and Notation
What is the difference between EPC and BPMN
BPMN: for business and IT, simple process notation, Representation by Business Process Diagram
1. Flow Objects: events (circles), activities (rectangles), Gateways/operators (diamonds)
2. Connecting objects
3. Participants (pool, swimlanes)
Differences to EPC:
- BPD shows how to convert charts into machine readable process descriptions
- has help of workflow engine