ITEC Flashcards

(201 cards)

1
Q

refers to the physical elements of a computer. This is also
sometimes called the machinery or the equipment of the computer.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

commonly known as programs or apps, consists of all the
instructions that tell the hardware how to perform a task. These
instructions come from a ____ developer in the form that will be
accepted by the platform (operating system + CPU) that they are based
on.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Helps run the computer hardware and computer
system itself. It includes operating systems, device
drivers, diagnostic tools and more. ______ is almost always preinstalled on your computer.

A

System software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Allows users to accomplish one or more tasks. It
includes word processing, web browsing and almost any other task for
which you might install software.

A

Application software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ______ is a type of software that manages data files in a computer system. It has limited capabilities and is designed to manage individual or group files, such as special office documents and records. It may display report details, like owner, creation date, state of completion and similar features useful in an office environment.

A

file management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A file management system is also known as a

A

file manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the process of using computing
techniques and technologies to transmit or transfer
electronic or analog data from one computer node to another.

A

Data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data is transferred in the form of _______ over a digital or analog medium, and the process enables digital or analog communications and its movement between devices

A

bits and bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data transfer is also known as

A

data transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refers to protective digital privacy measures that are applied to prevent unauthorized
access to computers, databases and websites. It also protects data from corruption. ___
is
an essential aspect
of
IT
for
organizations of every size and type.

A

Data
security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data security is also known as ____ or ____.

A

information security
(IS) or computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____, in computing, is a group of two or more
devices that can communicate. In practice, a _____
consists of a number of different computer
systems connected by physical and/or wireless
connections. The scale can range from a single PC
sharing out basic peripherals to massive data centers
located around the World, to the Internet itself.
Regardless of scope, all networks allow computers
and/or individuals to share information and resources.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

______ is a maintenance strategy
driven by predictive analytics. The solutions are
used for detecting failure patterns or anomalies,
but are only deployed when there is high
probability of imminent failure.

A

Predictive maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This helps in
deploying limited resources, maximizing device or
equipment uptime, enhancing quality and supply
chain processes, and thus improving the overall
satisfaction for all the stakeholders involved.

A

Predictive Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The process of buying and selling
online or electronically. This term may refer to
online retail as a whole, or more specifically the
transaction type.

A

E-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A business that has a physical store that customers
can go to rather than just having an online
presence.

A

Brick and Mortar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The process of selling services or products to
another business, which typically then sells to the
consumer.

A

Business to Business (B2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The process of selling services or products directly from the business to
the consumer

A

Business to Consumer (B2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Typically a slogan or phrase, this is the action you are persuading the user
to take. Sometimes it can be “shop now, buy today, get a quote,” or
typically anything that leaves the audience with something to do. The
call-to-action is often the instruction on what to do next, such as placing
an order or inquiring further

A

Call-to-Action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Arguably one of the most crucial part of E-commerce.

A

Conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The ___ is
the process of transforming or “converting” the user to a customer. This
is not always a financial transaction. Often, the ____ takes place
when a visiting user requests a quote, fills out a contact form, or places
an order. It can be revenue driven, but not necessarily. The _____
depends solely on what your organization has decided to track

A

Conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ______ often referred to as a “sales funnel,” is the path the
visitor takes until the end conversion. It is called a funnel, because there
is a larger surface area for users to enter the _____ (meaning
there are multiple entrance points) but it still takes users to the same end
point or conversion.

A

Conversion Funnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

These are text files sent to a user’s browser related to how the customer
interacts with the website. Often users will get a pop-up that requests
that the user “shares ___.” After confirmation, the information in
these text files is sent back over to the server, based on how the user
responded and interacted with the site.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The number of visitors who transformed into paying customers divided
by the total number of visits to the page overall.

A

Conversion Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
this day has more deals and discounts than any other day of the year. Some claim in the last few years that ____ has exceeded Black Friday in overall sales
Cyber Monday
26
The main page or main URL for a website. This is often the "homepage" or root portion of the web address.
Domain
27
One of the most popular eCommerce sites that allow sales to occur between consumers in an auction format. In this particular site, one consumer takes on the role of "seller," and the other user is the "buyer." There are many online merchants who also sell through ___ as an alternative sales channel to their own site
eBay
28
Engaging your audience with products and services promoted through email. These email lists usually consist of users that have signed up or expressed an interest in the site or organization
Email Marketing
29
Digital media piracy is a prominent unethical practice undertaken with computers. Piracy is the illegal distribution of music, movies, books and other intellectual media. Because the internet is such a vast network, catching pirates is not always easy. Piracy is an illegal infringement on copyrights held by the owners of the media. Businesses using information obtained through piracy may receive a cease-and-desist letter from the media owner at the very least. Fines and legal recourse may follow.
Media Piracy
30
A common example of ___ occurs when a business uses a well-known song for an instructional or promotional YouTube video without obtaining the rights or providing proper attribution.
media piracy
31
is an illegal infringement on copyrights held by the owners of the media.
Piracy
32
Thieves like to use the anonymity of the internet to attack businesses. By hacking into a company's main server, cyber attackers can hold a business hostage. This type of cyber attack can happen to any business or organization anywhere in the world. Reducing susceptibility to this unethical computer use requires constant updates to server security platforms including protection from spyware, malware and viruses.
Ransom ware Attacks
33
The hacker encrypts the entire website, shutting the business down until the business owners pay the hackers a fee – the ransom – in what is called a ____ attack.
denial-of-service
34
Along with protecting a business against ransomware, businesses must protect consumer information. ____ concerns consumers. Companies of all sizes are susceptible to data breaches. Major companies from leading industries have been hacked with consumer personal information stolen. Hackers obtain everything from names, dates of birth and Social Security information to addresses and other contact information that is used to create phony accounts. Not properly protecting private information is costly to businesses and can result in legal fines and private lawsuits.
Identify Theft
35
Some hackers don't steal the information but instead hack systems to divert financial information input away from the company to steal money. For example, a hacker might redirect the donation system of a non profit organization and have the money sent to an offshore account controlled by the hacker. This unethical practice essentially tricks a website buyer into thinking a website transaction is complete when, in fact, the business never gets notice of the sale, and the money is lost offshore
Financial Theft
36
Competitors use any number of methods to gain access to proprietary information that other companies pay millions to develop. Theft often includes patented or patent-pending information. ____ is often achieved by internal moles or contract workers who have access to a company's computer server. While security protocols with virus protection usually help prevent external theft, it is difficult to protect against internal infractions.
Intellectual Property Theft
37
allows a party who believes that his copyright has been infringed to send a notice of infringement demanding that the website host remove the content.
Digital Millennium Copyright Act
38
The "safe harbor" provisions of the DMCA protect Internet service providers and website hosts from liability associated with copyrighted material that may be posted on their website by third parties.
Digital Millennium Copyright Act
39
one of the major modern copyright laws governing the use of copyrighted material over the Internet.
Digital Millennium Copyright Act
40
The ___ provisions of the DMCA protect Internet service providers and website hosts from liability associated with copyrighted material that may be posted on their website by third parties.
"safe harbor"
41
A ,___ is an electronic device that accept data (input) and, process data arithmetically and logically, produce information (output).
computer
42
input
data
43
output
information
44
It includes not only the computer proper but also the cables, connectors, power supply units, and peripheral devices such as the keyboard, mouse, audio speakers, and printers.
Hardware
45
is also called components.
Internal Hardware
46
It includes: CPU Motherboard RAM > ROM
Internal Hardware
47
It is the brains of the computer. Most of calculations take place here. Two typical components of a are Arithmetic Logic Unit (ALU) Control Unit (CU)
Central Processing Unit (CPU)
48
Is the main circuit board of a microcomputer. It contains the CPU, memory, expansionbslots and all the controllers required to control standard hardware devices.
Motherboard
49
is the place in a computer where the operating system, application programs, and data in current use are kept. It is a temporary memory and can be compared to a person's short-term memory
RANDOM ACCESS MEMORY (RAM)
50
is a type of computer storage containing non-volatile, permanent data that, normally, can only be read, not written to. It contains the programming that allows a computer to start up or regenerate each time it is turned on.
Read-only memory, or ROM
51
consists of external devices by which we give information and instructions to the computer.
Input Hardware
52
Examples: Keyboard Mouse Scanner
Input Hardware
53
The set of typewriter-like keys that enables you to enter data into a computer
Keyboard
54
A device that controls the movement of the cursor or pointer on a display screen
Mouse
55
A device that can read text or illustrations printed on paper and translate the information into a form the computer can use.
Scanner
56
consists of internal and external devices that transfer information from the computer's CPU to the computer user.
Output Hardware
57
Examples: Monitor Printer Speaker
Output Hardware
58
A display screen used to present output from computer video camera, VCR or other video girerator
Monitor
59
a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard-size, 8.5" by 11" sheets of paper.
Printer
60
allow hardware devices to communicate with each other.
Connecting Hardware
61
Examples: Modem LAN Card
Connecting Hardware
62
connect a personal or portable computer to dial-up networks through a regular telephone line
Modems
63
A _________ card is used to provide wireless Internet access to computer users in home or roamingbnetworks.
Local Area Network (LAN)
64
A computer ______ is any type of hardware that stores data.
Storage Hardware
65
Examples: Hard disc Floppy Disc CD ROM
Storage Hardware
66
A magnetic dak on which you can store computer data. The term __ is used to distinguish it from a soft, or Floppy disk.
Hard Disc
67
A flexible plastic disk coated with magnetic material and covered by a protective jacket, used primarily by computers to store data magnetically
Floppy Disc
68
___ is a CD that can be mad by a computer with an optical drive
CD-ROM
69
A set of instructions that enables physical components of a computer to work in a synchronize way is known as .
Software
70
Computers cannot do any useful work without instructions from
Software
71
This set of instructions is often called a ____
program
72
helps in running the computer hardware and the computer system
System software
73
Examples: Operating systems Device drivers
System Software
74
is a computer program allowing higher-level computer programs to interact with a hardware device
Device Driver
75
An ___ is an interface between hardware and user; it is responsible for the management and coordination of activities and the sharing of the limited resources of the computer.
Operating System
76
is computer software designed to help the user to perform specific tasks.
Application Software
77
It allows one to surf the Web. Example Google Internet Explorer
Web Browsing Software
78
Allows users to create, edit a document. Example: MS Word
Word Processing Software
79
Allows users to create document and perform calculation Example: MS Excel etc
Spreadsheet Software
80
Allows users to store and retrieve vast amount of data. Example: MS Access etc.
Database Software
81
Allows users to create visual presentation. Example: Power Point
Presentation Graphics Software
82
helps in the management of computer hardware and application software. It performs a small range of tasks.
Utility Software
83
It detect computer files whose contents are stored on the hard disk in disjointed fragments, and move the fragments together to increase efficiency.
Disk Defragmentor
84
This utility make a copy of all information stored on a disk, and resture either the entire disk or selected files
Backup
85
can divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive
Disk Partitions
86
This is one of the most commonly known and popularly used forms of computer software. These software come in forms of tools that assist a programmer in writing computer Programs
Programming Software
87
The tools that help the programmers in instructing a computer system include
text editors compilers interpreters
88
LibreOffice Writer
• Totally Free • Full-featured word processor • Fully compatible with Word formats - can read and write both .doc and .docx files • Provides for collaboration using the Track Changes and Comments features • You must download the entire suite of products, Writer is not available separately • Works on: Windows, Mac, Linux
89
• This isn't your typical word processing software. It's kind of a cross between a word processor and notes application. Aimed primarily at authors and creative writers, it has a wide range of users, including: bloggers, students taking class notes or researching and writing reports or other written assignments, teachers organizing material for courses, etc. Windows only
SmartEdit Writer
90
• offers many applications, including , an online word processor similar to Google Docs. • The free version is very generous with its features. • Some free features: up to 25 invited collaborators, desktop synchronization, 5GB storage space with 1GB file upload limit, and more... • is primarily an online service, however it is possible to work offline as well. Changes made while offline, sync automatically the next time you connect to the internet • Works on: All OS - through web interface
Zoho Docs
91
• Another free, open source application suite • LibreOffice branched off from OpenOffice • The interface of LO and OO are so similar, that if you know one, you shouldn't have any trouble using the other • Currently, LibreOffice is more actively developed • Works on: Windows, Mac, Linux
Open Office
92
• primarily offers online software, however they do have a free desktop version. It has a nice, modern interface. • also includes spreadsheet and presentations • Works on: Windows, Linux, Mac
OnlyOffice
93
• Like LibreOffice, this is also a suite. The Word Processor, also called Writer, is one component. Others include Presentations and Spreadsheet. • The free version displays small ads • Two additional levels (which remove the ads and offer more features) are paid upgrades • has a nice, sleek interface and allows multiple documents to be opened in tabs rather than separate windows • Works on: Windows, Linux, IOS, Android
WPS Office Free
94
• is certainly a capable, widely-used option. • You must be online and have a Google account to use • It works with Google Drive cloud storage • You may invite others to view, comment, or collaborate on a document • Integrates with Google Slides and Sheets • Full integration with other Google products is only available through G Suite, a monthly subscription • Works on: All OS - through web interface
Google Docs
95
is a wide network of data centers (made up of large storage computers called file servers) throughout the world that can store your information and retrieve it for you from anywhere you can obtain an Internet connection.
cloud
96
tools that are used and accessed exclusively over the Internet rather than installed on a single computer
Cloud Computing
97
the year word processor was introduced
1970's
98
is software or a device that allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it.  Of all computer applications, _____ is the most common. Today, most ,____ are delivered either as a cloud service or as software that users can install on a PC or mobile device.
word processor
99
is an essential skill for both school and work. Students will learn to touch type using a personal computer. It speed and accuracy are emphasized. Learn to use a popularword processing program while formatting business correspondence, basic reports, and simple tables. No computer experience necessary. Additional content may include graphic design, internet, webpage production and presentation
Keyboarding
100
is a technique in computing technology by which specialized software and systems are created to identify, distinguish and authenticate the voice of an individual speaker.
Voice recognition
101
evaluates the voice biometrics of an individual, such as the frequency and flow of their voice and their natural accent.
Voice recognition
102
Voice recognition is also known as
speaker recognition
103
is usually in the form of an image such as a picture of handwritten text that is fed to a patternrecognition software, or as real-time recognition using a camera for optical scanning
input
104
is the ability of a computer or device to take as input handwriting from sources such as printed physical documents, pictures and other devices, or to use handwriting as a direct input to a touchscreen and then interpret this as text.
Handwriting recognition
105
is the ability of a computer or a mobile device to read handwriting as actual text. The most common use case in today’s mobile world is handwriting recognition as a direct input to a touchscreen through a stylus or finger. This is useful as it allows the user to quickly jot down numbers and names for contacts as compared to inputting the same information via the onscreen keyboard. This is because most people are more comfortable with writing and can do it quickly. This feature may not be native to most smartphones or tablets, but many applications for handwriting recognition are available.
Handwriting recognition
106
printed documents and using opticalcharacter-recognition (OCR) software to convert the scanned documents into text characters. Using voice-recognition software to convert spoken words into text characters.
Scanning
107
is the most mainstream technique used for handwriting recognition. This is done by scanning a handwritten document and then converting it into a basic text document. This also works by taking a picture of a handwritten text. ___ is basically a form of image recognition that is meant to recognize handwriting instead of faces or shapes such as landmarks.
Optical character recognition (OCR)
108
are typically used in multiplepage documents to display descriptive information. In addition to page numbers, a header or footer can contain information such as: The document name, the date and/or time you created or revised the document, an author name, a graphic, a draft or revision number.
Headers And Footers
109
A program that displays data (text & numbers) in a table called a worksheet
spreadsheet
110
Uses of Spreadsheet Prepare budgets Financial statements Inventory management Create charts
111
A grid with columns & rows; the term __ is used interchangeably with spreadsheet
worksheet
112
The intersection of a row and column
Cell
113
What 3 things can you type into a cell?
Label Value Formula
114
A group of cells that are closely together
cell range
115
Vertical arrangements of cells; identified by letters
columns
116
Horizontal arrangement of cells; identified by numbers
Rows
117
A tab that identifies each open worksheet in a spreadsheet program, located in the lower left corner of the screen
Worksheet tab
118
This is a column letter & row number combination, such as A1, B2
Cell Address
119
Displays the name of the active cell or range
Name Box
120
Displays the data or formula stored in the active cell
Formula Bar
121
The cell in which you are currently working (normally the cell is surrounded by a black border)
active cell
122
A built-in formula that is a shortcut for common calculations such as addition and average
Function
123
Instruct the computer as to Operations Symbol what mathematical operations to perform
124
Tool that changes the width of the columns on a spreadsheet
column width tool
125
Tool that changes the height of rows on a spreadsheet
Row height tool
126
Used to copy data & formulas to another cell; and create a series
Fill Handle Tool
127
Automatically creates a formula to add a series of numbers in a spreadsheet
Auto Sum Tool
128
Graphic representations used to compare & contrast worksheet data
Chart
129
arranges records from A to Z or smallest to largest
Sort Ascending
130
Programs that required several other machines – keyboards, monitors, disks, computers, and printers – to create documents.
Word processor
131
provides a page design layout into which you can place your content.
template
132
A ____ is a collection of data stored electronically, usually organized and structured in some form.
database
133
___ can be very simple – a text file or a CSV file
Databases
134
A _____ is the software used to interact between the database and an application that uses the database.
DataBase Management System (DBMS)
135
Data in databases is usually stired as
tables
136
Focus on display – tables have no basis of “identity” for data
HTML tables
137
• Focus on positional data – fields are arranged and calculated based on their position in the spreadsheet
Spreadsheets
138
• Focus on the data itself – metadata is used to identify data fields
Databases
139
• A file that stores all the information. The format depends on the type of the Database )text, relational, graph, etc.)
Level 1 – The actual database
140
Level 2
The DataBase Management System (DBMS)
141
– interaction between data and an application LEVEL 2
The DataBase Management System (DBMS)
142
Any software package that is built on top of the other 2 layers that provides interaction with the user. A web app, a mobile app, BI/ERP, etc
Level 3 – Application
143
Level 3
Application
144
DISADVANTAGES OF FILE STORAGE
• Redundancy • Inconsistency • Mixture of data • Hard to maintain and manage • No concurrency support
145
The actual data used by the application
User Data
146
The structure (schema) of the data, including table names, column names and types, and constraints over the column(s)
Meta data
147
Meta data on user settings or functions of the application
Application meta data
148
used for performance improvement and maintenance. Logs, tracks, security, etc
Index and other overhead data:
149
CONTENTS OF A DATABASE
• User data • Medadata • Application metadata • Index and other overhead
150
• 4 essential properties that a DBMS has to implement to effectively interact with a database
ACID
151
• A query is a result of a request to the database for information or for modification. • is the language most relational databases (the most common for of databases) use for interaction with the data
SQL
152
SQL
Structured Query Language
153
The 4 major operations performed on the database
CRUD – Create, Read, Update, Delete
154
CRUD
Create, Read, Update, Delete
155
ACID
• Atomicity • Consistency • Isolation • Durability
156
transactions are either all or none (commit/rollback
Atomicity
157
only valid data is saved
Consistency
158
transactions should not affect each other
Isolation
159
written data will not be lost
Durability
160
Example of ACID
Bank Transactions
161
Most of the challenges related to ACID compliance come from
multiple users/concurrent use of the database
162
describes the relationships among different kinds of data
relational database
163
Captures ideas like those defined in the Affinity and Collection rules • Allows software to answer queries about them
Relational Database
164
• Any relational DB can be described in • But it is not the case that every __ description defines a relational DB
XML
165
are the building blocks of relational databases
Tables (formally called ‘relations’)
166
Rows may also be called
‘tuples’
167
Columns may also be called
‘fields’
168
are theoretical constructs that help us in conceptualization of relations
Entities
169
Anything that can de identified by a fixed number of its characteristics (attributes) • Attributes have names and values • Attributes have a data type
Entities
170
A relational database table can be empty
NULL instance
171
An __ could be defined by a relation (table) or be spread across several relations
entity
172
Order of the rows and columns matter in databases T OR F
F
173
Freedom to move the data is limited to exchanging entire rows or exchanging entire columns T OR F
T
174
Properties of Entities
Uniqueness Atomic Data Keys
175
• Values stored for attributes • Not decomposable into any smaller parts. Separate fields for street, city, state, postal code • "Only ___" rule relaxed for certain types of data. Dates, times, currency
atomic data
176
• No two rows can be the same • Two rows can have the same value for some attributes, just not all attributes
Uniqueness
177
Any set of attributes for which all attribute values are different is called a
candidate key
178
Unique Identifier made of one or more columns to uniquely identify rows in a table.
Primary key
179
If the primary key contains more than one column, it can be called as well.
‘composite key’
180
is the primary key of another table, which is referenced in the current table
Foreign Key
181
It’s the key to establish the relationship between the two tables, and through DBMS, to impose referential integrity
Foreign Key
182
Surrogate key is a
unique column
183
Added to a relation to use as the primary key when there is a lack of a natural column that serves as the primary key, or when the composite key needs to be replaced for various reasons.
Surrogate Key
184
is usually in the form of an auto increment numeric value, and of no meaning to the user, and thus could often be hidden in the table, form. or other entity for internal use.
Surrogate key
185
are often used in the place of composite keys to add more flexibility to the table
Surrogate keys
186
way to define a table
Database schema
187
Collection of table definitions that gives the name of the table, lists the attributes and their data types, and identifies the primary key
Database Schema
188
A ___ is a collection of database tables
database
189
Main use of database is to
look up information
190
Five fundamental operations that can be performed on tables:
Select, Project, Union, Difference, Product
191
Combines two tables (that have the same set of attributes
Union
192
Remove from one table the rows also listed in a second table (remove from Table1 any rows also in Table2)
Difference
193
Gives the cartesian product of the two tables – one instance of a row in Table2 added to each instance of a row in Table1
Product
194
The five basic operations (select, project,+, -, x ) are all we need to make any relational table T OR F
T
195
One combination is so commonly wanted and useful that we name it and provide it as a direct operation
Join
196
• Combines two tables (like the Product operation) but doesn't necessarily produce all pairings • If the two tables each have fields with a common data type, the new table combines only the rows from the given tables that match on the fields • When match is true for a row from each table it produces a result row that is their concatenation
Joins
197
(stored on disk)
Physical database
198
is the process of restructuring a relational database in accordance with a series of so- called normal forms in order to reduce data redundancy and improve data integrity.
Database Normalization
199
NORMALIZATION was first proposed by ___ as an integral part of his relational model.
Edgar F. Codd
200
entails organizing the columns (attributes) and tables (relations) of a database to ensure that their dependencies are properly enforced by database integrity constraints. It is accomplished by applying some formal rules either by a process of synthesis (creating a new database design) or decomposition (improving an existing database design).
Normalization
201
is the process of decomposition,so all business concepts can be modeled with clear logical relationships
Normalization