Data Analytics S - Z Flashcards
Sample size
The number of completed responses that you collect from interviews or surveys; the more responces completed, the more likely the data being collected is accurate
Sans Serif
Literally (without serif), which are the small lines at the end of typefaces.
Scatter graph
visualisation to show a series of points on a graph
Scope
statement made about what WILL and WILLNOT be included in a project
Search
Finding relevant records in a database
Second Normal Form (2NF)
A table that is in 1NF and any column that is not part of the primary key is dependent on the whole primary key
Secondary Data
data collected by someone other than the researcher, which has often been processed
Security Control
A measure to protect data and information from threats, either accidental, deliverate, or event-based
Security protocol
A set of rules or guidelines for communicating data securely
Sensor
A data gathering method to electronically obtain data
sensor data
data acquired or generated by machines monitoring particular conditions
serif
The small lines at the end of letters in typefaces like TimesNewRoman
Server
A device that is used to provide services to other devices connected to a network
Shredding
Cutting documents OR HARDWARE into strips or pieces
Skewed result
The frequency of responces by the population is not evenly distributed, rather it ‘leans’ in a direction on the x or y axis
Slack time
The length of time that a task runs overtime before it affects other tasks
Social Constraint
Limitation imposed by social considerations
Software security controls
Software based measures that are used to protect data and information
Solid State Drives (SSD)
A disk with no moving parts; SSDs have an estimated lifetime dependent on the number of read/write actions
Solution Requirements
What the client wants from the solution; can be broken down into functional and non functional requirements
Sort
Arranging all records in order (a-Z, Z-A) either descending or ascending numerally or alphabetically
Sound Data
Any audio capture being used in a project
Spreadsheet
Software tool for performing calculations and generating charts
Standalone device
A piece of computing equipment that can perform its function without the need of another device
Static Visualisation
A visualisation that does not change after the initial analysis and development of the presentation
Statistical Infographic
A visual that combines images with statistics to improve visual appeal
Storage Hardware
The physical location for your files to be held for later access; this may now include cloud storage where the storage drives are remote from your computer device (RAID, etc)
Stream graph
Visualisation that shows the relative levels of several variables over time
Subjective
Based on opinion, emotion or personal judgement; (I.E. Is that salesperson friendly?)
Opposite of objective
Successor
Task that must be completed after another task in gantt chart
Survey
Data Acquisition technique involving a series of set questions, often completed online by large numbers of respondants
survey distortion
when survey results are influenced by external factors
Switch
A device used to connect multiple devices to a network
Symmetric encryption
Requires both the sender and the receiver to use the same private key
System Goal
The specific role of the information system in achieving the organizational goal, and ultimately the company’s mission
System Protection Software
Contains a number of smaller software applications, that combined will assist in protecting an information system or device from a range of threats (malware, etc)
Table
A place in a database that holds data about a single person, place or thing
Technical Constraints
A limitation imposed by hardware or software on the solution
Technical Protocol
A protocol that is used to ensure that devices on a network can communicate with each other
Test Data
A set of data that has been specifically formulated to reveal defect in software solutions
Test plan
A techniques for recording tests to be carried out and the results of the tests; typically, a test plan states the type of test, what test data will be used, what results are expected and ultimately, the actual results
testing
Ensuring that something works as intended and checking the accuracy of information outputs; that they are correct with no errors, or that any errors can be dealt with without inconveniencing the user
testing table
A table set up to record functionality testing (what will be tested, how it will be tested and what the expected result will be if the elements work as expected)
text data type
data that consists of a string of Characters
theoretical coding
The means by which labels are applied to transcripts of text
Third Normal Form (3NF)
A table that is in 2ND and any column that is not part of the primary key is dependant only on the primary key and no other column
Threat
Anything with the potential to cause harm to data and information stored and communicated between information systems
Time Visualisation
A visual that represents a data item or data set over a period of time
Timeliness
Data that has been collected in a reasonable timeframe(not too old) and information that has been produced in time to be useful
TCP/IP Transmission Control Protocol/Internet Protocol
The protocol used to connect devices on the internet; some cabled networks also use TCP/IP rather than Ethernet; TCP/IP sends data in packets.
Type Check
A validation Rules that checks that only the correct data type is accepted
Unshielded twisted pair (UTP)
Used in most wired networks; wires are twisted into pairs to reduce signal interference
Usability
A measure of how useful and usable a solution is
User Acceptance Testing (UAT)
The phase of software testing where it is determined whether the solution functions according to specifications using real-world scenarios
User Error
Any error that has been caused by the user, rather than due to the hardware or software not working as expected
Username and Password
Also known as login, a unique combination of characters/words/phrases that identifies someone on a computer system
Validation
Checking that data input is reasonable
Validation Technique
Checking that data input is reasonable, which is an activity within the development state of the PSM Problem solving methodology - Analysis Design Development and Evaluation). Typically used for existence, range and type checking
Verification
The process of checking that the final product software meets the requirements detailed in the Design state of the PSM
Version Control
Management of files and software so only one version of the most up-to-date file is in existence at a time and so that major reworkings can be reversed if needed
Vested Interest
Where an individual, group or organisation has an investment or interest in an issue and stands to gain or lose from it
Weather data
Data produced about weather or climate or water
Web Map Service (WMS) file
File format that provides map images over the internet
Weblog / Blog
An online journal or diary with date and timestamps; files and images can be uploaded as evidence of progress
Wide Area Network (WAN)
A network that is located in more than one geographical location
Wiped
When data is scrubbed and overwritten with 1’s and 0’s
Wired Network
A network where the devices are connected using a physical cable(s)
Wireless access points (WAP)
A device that allows other devices to wirelessly connect to an existing wired network
Wireless network
A computer network that uses wireless data transfer between networked devices
Word Cloud
A visualisation technique of data that is word based (qualitative)
Work Breakdown Structure (WBS)
Breaking down your project into achievable tasks
XLM or XLSX File
An excel spreadsheet file format
Zoned Security Strategy
Security Protocol that involves breaking down a network into discrete sections or zones to limit damage caused by security threats
802.11 protocol
A protocol used on wireless networks ; data travels in Frames ( like ethernet ; not packets)