Data Analytics M - R Flashcards

1
Q

Malware

A

Malcious software that is designed to either damage, disrupt or gain unauthorised access to an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mandatory Convention

A

A convention required by law or -by-laws which must be adhered to without exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Manipulation

A

Raw data is charged and processed to become information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Manual validation

A

the process of visually inspecting (proofreading) data to check if any mistakes have been made in copying the data; generally completed by a data-entry operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

many-to-many relationship

A

when each record in the first table can be connected to multiple records in a second table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

map-based visualisations

A

using location to place data and information to compare regional and global information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

matrix visualisation

A

a diagram that shows the composition of individual items in the sample size; in this regard, they can be considered similar to pie charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mean Time Between Failures

A

A statistical estimate of the expected reliability of a computer component usually read/write actions for drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

mind mapping

A

Visually organising information into a diagram that shows links between the infromation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mission statement

A

Basis for establishing a set of common goals that will help accomplish an organizations Aims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mobile network

A

(cellular network) - telecommunications networks that allow users to communicate using their mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

mock-up

A

a sketch up of a solutions appearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Modem

A

A device that is used to connect a network to the internet; most internet connections use a telephone line to communicate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Naming Convention

A

The way files/folders/ database parts are names for ease of use. NormanBurkeDocumentv1_2024.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network

A

Consists of two or more digital system devices connected together using transmission media to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network architecture

A

The layout of the network, including the hardware, software, protocols and transmission media used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Attached Storage (NAS)

A

A device that offers data storage capabilities; users of the network can save or retrieve data from the NAS (think mini server in a local place)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network interface card (NIC)

A

A device that slots into the motherboard of a device and then provides ports to allow the device to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network operating system (NOS)

A

Software that controls and manages the operation of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network visualisation

A

Depecting relationships between different data items and relationships between different data sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Node

A

A connection point (one) in a network that can create, retrieve, store and send data along network routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Non Functional Requirement (NFR)

A

Other requirements that the user or client would like the solution to have but that do not affect what the solution does (aesthetics, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Non-Technical Restraint

A

A limitation that relates to areas other than hardware and software such as usability and users level of expertise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Normalisation

A

Removing redundant data and arranging it into appropriate tables to improve data integrity and reduce redundancy involves following a systematic set of rules to check for anomalies or deviate in in data structure, which ensures fields area in the correct tables. (3rd Normal Form, 2nd Normal Form, 1st Normal Form, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Null field
A field that is empty when a value is expected. which can generate an error in the manipulation software (excel, etc)
26
Numeric Data
Any data made up exclusively of numbers; includes integer and date
27
Objective
Fact-based, measurable; a type of study that requires the participant to remain detached from the activity and apply previously agreed behaviours, rules and protocols
28
ObjectiveS
Small achievable tasks undertaken to accomplish a big task (think objectives to successfully achieve a goal, such as a mission statement)
29
Observation
Data acquisition technique that involves watching and gathering data in real time
30
One to Many Relationship
When a single record in the first table can be connected to multiple records in the second table (I.E. Several workers in an office with the same phone number extension). The opposite is many to one relationship
31
Optional Convention
A convention where a degree of choice is available, and the rules may or may not necessarily be followed
32
Organisational Goal
How an organization intends to go about achieving its mission (statement)
33
Output hardware
Devices that allow computer-generated information to be converted to human readable form, such as text, graphics, touch, audio and video.
34
Paraphrasing
Using another persons's ideas but putting them into your own words, rather than directly quoting them
35
payload
Cargo to be delivered or content that is delivered
36
peer-to-peer (p2p) network
a network where all the devices are equal; all devices store and share data with other devices without a centralized element.
37
phishing
sending hoax-emails or messages to users pretending that the communication is from a legitimate source with the aim of extracting sensitive information
38
pie chart
visual representation showing an item broken up into its relative segments
39
plagarism
submissing or claiming someone elses' work as your own
40
plug-in
a piece of software that adds onto an existing computer program
41
power loss
any times the power to an information system is lost
42
power surge
one type event-based threat; an abnormally high voltage of electricity received at a location in a short amount of time
43
predecessor
a task that must be completed before another task can begin in a gantt chart
44
preferred convention
a convention where some choice is available, though some are more preferrred than others
45
Pretty good privacy (PGP)
An encryption program that provides privacy and authentication for data communications
46
primary data
new facts collected personally by a researcher to answer a specific question
47
Primary Key
A field attached to each record in a database; the value of this key should be unique for each record in the database (I.E. Numberplates on cars, Tax file Numbers, and even a student number) It's purpose is to identify data related to each record, which may be stored across multiple tables
48
Private Key
Encrypts or decrypts data by a user that has the key installed on their device
49
Problem Solving Methodology (PSM)
Appraoche - Analyse, Design, Develop and Evaluate projects or solutions
50
Process
A procedure or instruction that is followed
51
Process infographic
A flowchart that shows sequence in a decision-making progress
52
Protocol
A set of rules /guidelines outlining how data will be communicated between devices on a network
53
public key
Used to convert a message into a unreadable format; decryption of the message is done by a different private key
54
Public Key Encryption
Data is transmitted confidentially using a combination of a publicly known key and a private key known only to your computer
55
Qualitative data
expressed in words - concerned with opinions, feelings etc
56
Quantitative data
Data that is expressed as numbers, categories or labels and is easy to process
57
Query
To select specific data based on one or a series of criteria in order to answer questions and make links between data; the criteria are the results of questions about the data (I.E. "How many of our customers are Female between ages 25-30"
58
Range Check
Validation techniques rule to ensure that data falls within an acceptable limit
59
Readability
The ease with which the reader can understand a specific text
60
Reasonableness
Data that is believable, but not necessarily accurate (Data Integrity)
61
Record
A set of data about one entity (I.E. A person, event, or object)
62
Redundancy
Repeated identical data entries (Whole name, then First and Last name fields)
63
Relational database
a database that stores data tables that are arranged in rows and columns, with tables linked by a common field; relationships may be one-toone, one - to many or many-to-many
64
relationship
Connections between data in a relational database
65
relative referencing
cell references that change when copied across multiple cells
66
relevance
data that produces useful information required by the information need; if the data is not useful, it is not relevant (which contributes to data integrity)
67
report
The results of a query converted into a format that is usable and easier to read and understand that also allows you to add headings and summary statistics such as Total, etc.
68
Risk assessment
Analysing the probability of different risks to data and information, and the potential consequences of each of those risks
69
Router
A device used to connect two separate networks together; often used in a home network to connect the LAN to the internet
70
Row
Horizontal series of cells in a spreadsheet