Data Analytics M - R Flashcards

1
Q

Malware

A

Malcious software that is designed to either damage, disrupt or gain unauthorised access to an information system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mandatory Convention

A

A convention required by law or -by-laws which must be adhered to without exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Manipulation

A

Raw data is charged and processed to become information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Manual validation

A

the process of visually inspecting (proofreading) data to check if any mistakes have been made in copying the data; generally completed by a data-entry operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

many-to-many relationship

A

when each record in the first table can be connected to multiple records in a second table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

map-based visualisations

A

using location to place data and information to compare regional and global information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

matrix visualisation

A

a diagram that shows the composition of individual items in the sample size; in this regard, they can be considered similar to pie charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mean Time Between Failures

A

A statistical estimate of the expected reliability of a computer component usually read/write actions for drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

mind mapping

A

Visually organising information into a diagram that shows links between the infromation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mission statement

A

Basis for establishing a set of common goals that will help accomplish an organizations Aims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mobile network

A

(cellular network) - telecommunications networks that allow users to communicate using their mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

mock-up

A

a sketch up of a solutions appearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Modem

A

A device that is used to connect a network to the internet; most internet connections use a telephone line to communicate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Naming Convention

A

The way files/folders/ database parts are names for ease of use. NormanBurkeDocumentv1_2024.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network

A

Consists of two or more digital system devices connected together using transmission media to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Network architecture

A

The layout of the network, including the hardware, software, protocols and transmission media used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Attached Storage (NAS)

A

A device that offers data storage capabilities; users of the network can save or retrieve data from the NAS (think mini server in a local place)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network interface card (NIC)

A

A device that slots into the motherboard of a device and then provides ports to allow the device to connect to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Network operating system (NOS)

A

Software that controls and manages the operation of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network visualisation

A

Depecting relationships between different data items and relationships between different data sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Node

A

A connection point (one) in a network that can create, retrieve, store and send data along network routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Non Functional Requirement (NFR)

A

Other requirements that the user or client would like the solution to have but that do not affect what the solution does (aesthetics, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Non-Technical Restraint

A

A limitation that relates to areas other than hardware and software such as usability and users level of expertise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Normalisation

A

Removing redundant data and arranging it into appropriate tables to improve data integrity and reduce redundancy involves following a systematic set of rules to check for anomalies or deviate in in data structure, which ensures fields area in the correct tables. (3rd Normal Form, 2nd Normal Form, 1st Normal Form, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Null field

A

A field that is empty when a value is expected. which can generate an error in the manipulation software (excel, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Numeric Data

A

Any data made up exclusively of numbers; includes integer and date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Objective

A

Fact-based, measurable; a type of study that requires the participant to remain detached from the activity and apply previously agreed behaviours, rules and protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ObjectiveS

A

Small achievable tasks undertaken to accomplish a big task (think objectives to successfully achieve a goal, such as a mission statement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Observation

A

Data acquisition technique that involves watching and gathering data in real time

30
Q

One to Many Relationship

A

When a single record in the first table can be connected to multiple records in the second table (I.E. Several workers in an office with the same phone number extension). The opposite is many to one relationship

31
Q

Optional Convention

A

A convention where a degree of choice is available, and the rules may or may not necessarily be followed

32
Q

Organisational Goal

A

How an organization intends to go about achieving its mission (statement)

33
Q

Output hardware

A

Devices that allow computer-generated information to be converted to human readable form, such as text, graphics, touch, audio and video.

34
Q

Paraphrasing

A

Using another persons’s ideas but putting them into your own words, rather than directly quoting them

35
Q

payload

A

Cargo to be delivered or content that is delivered

36
Q

peer-to-peer (p2p) network

A

a network where all the devices are equal; all devices store and share data with other devices without a centralized element.

37
Q

phishing

A

sending hoax-emails or messages to users pretending that the communication is from a legitimate source with the aim of extracting sensitive information

38
Q

pie chart

A

visual representation showing an item broken up into its relative segments

39
Q

plagarism

A

submissing or claiming someone elses’ work as your own

40
Q

plug-in

A

a piece of software that adds onto an existing computer program

41
Q

power loss

A

any times the power to an information system is lost

42
Q

power surge

A

one type event-based threat; an abnormally high voltage of electricity received at a location in a short amount of time

43
Q

predecessor

A

a task that must be completed before another task can begin in a gantt chart

44
Q

preferred convention

A

a convention where some choice is available, though some are more preferrred than others

45
Q

Pretty good privacy (PGP)

A

An encryption program that provides privacy and authentication for data communications

46
Q

primary data

A

new facts collected personally by a researcher to answer a specific question

47
Q

Primary Key

A

A field attached to each record in a database; the value of this key should be unique for each record in the database (I.E. Numberplates on cars, Tax file Numbers, and even a student number) It’s purpose is to identify data related to each record, which may be stored across multiple tables

48
Q

Private Key

A

Encrypts or decrypts data by a user that has the key installed on their device

49
Q

Problem Solving Methodology (PSM)

A

Appraoche - Analyse, Design, Develop and Evaluate projects or solutions

50
Q

Process

A

A procedure or instruction that is followed

51
Q

Process infographic

A

A flowchart that shows sequence in a decision-making progress

52
Q

Protocol

A

A set of rules /guidelines outlining how data will be communicated between devices on a network

53
Q

public key

A

Used to convert a message into a unreadable format; decryption of the message is done by a different private key

54
Q

Public Key Encryption

A

Data is transmitted confidentially using a combination of a publicly known key and a private key known only to your computer

55
Q

Qualitative data

A

expressed in words - concerned with opinions, feelings etc

56
Q

Quantitative data

A

Data that is expressed as numbers, categories or labels and is easy to process

57
Q

Query

A

To select specific data based on one or a series of criteria in order to answer questions and make links between data; the criteria are the results of questions about the data (I.E. “How many of our customers are Female between ages 25-30”

58
Q

Range Check

A

Validation techniques rule to ensure that data falls within an acceptable limit

59
Q

Readability

A

The ease with which the reader can understand a specific text

60
Q

Reasonableness

A

Data that is believable, but not necessarily accurate (Data Integrity)

61
Q

Record

A

A set of data about one entity (I.E. A person, event, or object)

62
Q

Redundancy

A

Repeated identical data entries (Whole name, then First and Last name fields)

63
Q

Relational database

A

a database that stores data tables that are arranged in rows and columns, with tables linked by a common field; relationships may be one-toone, one - to many or many-to-many

64
Q

relationship

A

Connections between data in a relational database

65
Q

relative referencing

A

cell references that change when copied across multiple cells

66
Q

relevance

A

data that produces useful information required by the information need; if the data is not useful, it is not relevant (which contributes to data integrity)

67
Q

report

A

The results of a query converted into a format that is usable and easier to read and understand that also allows you to add headings and summary statistics such as Total, etc.

68
Q

Risk assessment

A

Analysing the probability of different risks to data and information, and the potential consequences of each of those risks

69
Q

Router

A

A device used to connect two separate networks together; often used in a home network to connect the LAN to the internet

70
Q

Row

A

Horizontal series of cells in a spreadsheet