Data Analytics S - Z Flashcards

1
Q

Sample size

A

The number of completed responses that you collect from interviews or surveys; the more responces completed, the more likely the data being collected is accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sans Serif

A

Literally (without serif), which are the small lines at the end of typefaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scatter graph

A

visualisation to show a series of points on a graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scope

A

statement made about what WILL and WILLNOT be included in a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Search

A

Finding relevant records in a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Second Normal Form (2NF)

A

A table that is in 1NF and any column that is not part of the primary key is dependent on the whole primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secondary Data

A

data collected by someone other than the researcher, which has often been processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Control

A

A measure to protect data and information from threats, either accidental, deliverate, or event-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security protocol

A

A set of rules or guidelines for communicating data securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sensor

A

A data gathering method to electronically obtain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sensor data

A

data acquired or generated by machines monitoring particular conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

serif

A

The small lines at the end of letters in typefaces like TimesNewRoman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Server

A

A device that is used to provide services to other devices connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shredding

A

Cutting documents OR HARDWARE into strips or pieces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Skewed result

A

The frequency of responces by the population is not evenly distributed, rather it ‘leans’ in a direction on the x or y axis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Slack time

A

The length of time that a task runs overtime before it affects other tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social Constraint

A

Limitation imposed by social considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Software security controls

A

Software based measures that are used to protect data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Solid State Drives (SSD)

A

A disk with no moving parts; SSDs have an estimated lifetime dependent on the number of read/write actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Solution Requirements

A

What the client wants from the solution; can be broken down into functional and non functional requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Sort

A

Arranging all records in order (a-Z, Z-A) either descending or ascending numerally or alphabetically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Sound Data

A

Any audio capture being used in a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Spreadsheet

A

Software tool for performing calculations and generating charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Standalone device

A

A piece of computing equipment that can perform its function without the need of another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Static Visualisation

A

A visualisation that does not change after the initial analysis and development of the presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Statistical Infographic

A

A visual that combines images with statistics to improve visual appeal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Storage Hardware

A

The physical location for your files to be held for later access; this may now include cloud storage where the storage drives are remote from your computer device (RAID, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Stream graph

A

Visualisation that shows the relative levels of several variables over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Subjective

A

Based on opinion, emotion or personal judgement; (I.E. Is that salesperson friendly?)
Opposite of objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Successor

A

Task that must be completed after another task in gantt chart

31
Q

Survey

A

Data Acquisition technique involving a series of set questions, often completed online by large numbers of respondants

32
Q

survey distortion

A

when survey results are influenced by external factors

33
Q

Switch

A

A device used to connect multiple devices to a network

34
Q

Symmetric encryption

A

Requires both the sender and the receiver to use the same private key

35
Q

System Goal

A

The specific role of the information system in achieving the organizational goal, and ultimately the company’s mission

36
Q

System Protection Software

A

Contains a number of smaller software applications, that combined will assist in protecting an information system or device from a range of threats (malware, etc)

37
Q

Table

A

A place in a database that holds data about a single person, place or thing

38
Q

Technical Constraints

A

A limitation imposed by hardware or software on the solution

39
Q

Technical Protocol

A

A protocol that is used to ensure that devices on a network can communicate with each other

40
Q

Test Data

A

A set of data that has been specifically formulated to reveal defect in software solutions

41
Q

Test plan

A

A techniques for recording tests to be carried out and the results of the tests; typically, a test plan states the type of test, what test data will be used, what results are expected and ultimately, the actual results

42
Q

testing

A

Ensuring that something works as intended and checking the accuracy of information outputs; that they are correct with no errors, or that any errors can be dealt with without inconveniencing the user

43
Q

testing table

A

A table set up to record functionality testing (what will be tested, how it will be tested and what the expected result will be if the elements work as expected)

44
Q

text data type

A

data that consists of a string of Characters

45
Q

theoretical coding

A

The means by which labels are applied to transcripts of text

46
Q

Third Normal Form (3NF)

A

A table that is in 2ND and any column that is not part of the primary key is dependant only on the primary key and no other column

47
Q

Threat

A

Anything with the potential to cause harm to data and information stored and communicated between information systems

48
Q

Time Visualisation

A

A visual that represents a data item or data set over a period of time

49
Q

Timeliness

A

Data that has been collected in a reasonable timeframe(not too old) and information that has been produced in time to be useful

50
Q

TCP/IP Transmission Control Protocol/Internet Protocol

A

The protocol used to connect devices on the internet; some cabled networks also use TCP/IP rather than Ethernet; TCP/IP sends data in packets.

51
Q

Type Check

A

A validation Rules that checks that only the correct data type is accepted

52
Q

Unshielded twisted pair (UTP)

A

Used in most wired networks; wires are twisted into pairs to reduce signal interference

53
Q

Usability

A

A measure of how useful and usable a solution is

54
Q

User Acceptance Testing (UAT)

A

The phase of software testing where it is determined whether the solution functions according to specifications using real-world scenarios

55
Q

User Error

A

Any error that has been caused by the user, rather than due to the hardware or software not working as expected

56
Q

Username and Password

A

Also known as login, a unique combination of characters/words/phrases that identifies someone on a computer system

57
Q

Validation

A

Checking that data input is reasonable

58
Q

Validation Technique

A

Checking that data input is reasonable, which is an activity within the development state of the PSM Problem solving methodology - Analysis Design Development and Evaluation). Typically used for existence, range and type checking

59
Q

Verification

A

The process of checking that the final product software meets the requirements detailed in the Design state of the PSM

60
Q

Version Control

A

Management of files and software so only one version of the most up-to-date file is in existence at a time and so that major reworkings can be reversed if needed

61
Q

Vested Interest

A

Where an individual, group or organisation has an investment or interest in an issue and stands to gain or lose from it

62
Q

Weather data

A

Data produced about weather or climate or water

63
Q

Web Map Service (WMS) file

A

File format that provides map images over the internet

64
Q

Weblog / Blog

A

An online journal or diary with date and timestamps; files and images can be uploaded as evidence of progress

65
Q

Wide Area Network (WAN)

A

A network that is located in more than one geographical location

66
Q

Wiped

A

When data is scrubbed and overwritten with 1’s and 0’s

67
Q

Wired Network

A

A network where the devices are connected using a physical cable(s)

68
Q

Wireless access points (WAP)

A

A device that allows other devices to wirelessly connect to an existing wired network

69
Q

Wireless network

A

A computer network that uses wireless data transfer between networked devices

70
Q

Word Cloud

A

A visualisation technique of data that is word based (qualitative)

71
Q

Work Breakdown Structure (WBS)

A

Breaking down your project into achievable tasks

72
Q

XLM or XLSX File

A

An excel spreadsheet file format

73
Q

Zoned Security Strategy

A

Security Protocol that involves breaking down a network into discrete sections or zones to limit damage caused by security threats

74
Q

802.11 protocol

A

A protocol used on wireless networks ; data travels in Frames ( like ethernet ; not packets)