Definitions and Key Terms Flashcards

1
Q

Data Integrity

A

Accuracy
Authenticity
Reasonableness
Relevance
Correctness
Timeliness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Effectiveness

A

Accessibility
Accuracy
Attractiveness
Clarity
Communication of message
Completeness
Readability
Relevance
Timeliness
Usability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Efficiency

A

Time, cost and effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data

A

Raw, unmanipulated, unorganised fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information

A

Organized and manipulated data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristics of information for educating targeted audiences

A

Age
Gender
Commonality of language
Culture inclusiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data types

A

Character
Numeric
Boolean (true or false/ yes or no / 1 or 0)
Binary (images and sounds)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Design Principles - Functionality and Usability

A

Robustness
Flexibility
Ease of use
Accessibility - including navigation and error tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Design Principles - Appearance

A

Alignment
Balance
Contrast
Image use
Space
Text and table formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Design Tools

A

Data dictionary
IPO (Input-process-output) charts,
Object descriptions
Pseudocode
For an infographic - mockups, layout diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Design Idea Tools

A

Brainstorming
Mind maps
PMI (plus, minus, interesting) charts
POOCH (problem, options, outcomes, choices) charts
Venn diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Disaster Recovery Plan

A

Evacuation Plan
Backup Plan
Restoration Plan
Test Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accidental Threats

A

Unintentional and unexpected threats.

  • User error
  • Power loss
  • Hardware/Software malfunction
  • Hardware loss
  • Lack of security/knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Deliberate Threats

A

Threats that are created to cause loss or damage to the data or information system.

  • Malware
  • Hacking
  • Phishing
  • Denial of Service (Ddos) Attacks
  • Theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Event-Based Threat

A

Threats to data and information that are a result of a natural, uncontrollable event.

  • Extreme weather events such as fires, floods, heatwaves, storms, earthquakes
  • Power surges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Software Security Controls

A
  • Usernames and Passwords
  • Access Logs
  • Audit Trails
  • Access restrictions
  • Firewalls
  • Two factor authentication
  • Encryption
  • Firewalls
  • System protection eg: antivirus
  • Security Protocols (Transport Layer Security (TLS))
17
Q

Physical Security Controls

A
  • Zone Security Strategies: Involves breaking down network into discreate sections or zones (Damage caused by security threats can be limited to one zone and the zone can be blocked off)
  • Barrier techniques: Fences, gates, bars on windows, doors with locks using swipe cards, password touch pads, active badges, voice recognition and biometrics, guards, CCTV
  • Biometrics: unique physical attribute of an individual e.g. fingerprint
  • Uninterrupted Power Supply (UPS): Battery backup, provides backup power when your main power cuts out; stops everything from cutting out at the same time
18
Q

Physical Procedures

A

Backups
Shredding Documents
Checking Authorization Credentials

19
Q

Solution Constraints

A

The conditions or limitations that must be taken into account when designing a solution.
* Economic – time and cost
* Technical – speed of processing, capacity, availability of equipment, compatibility and security
* Social – level of expertise of user
* Legal – ownership and privacy of data requirements
* Usability – usefulness and ease of use of a solution

20
Q

Validation

A

Checks that data is reasonable and complete
- Existence check
- Data type check
- Range check

21
Q

Verification

A

Proofreading and checking against the source data

22
Q

Archiving

A

Removing the files from the everyday file storage system to store in an archiving system

23
Q

Flat file database

A

One or more unlinked tables

24
Q

Relational database

A

Multiple tables linked together in structures such as one to one, one to many, many to one, many to many

25
Q

Spreadsheet Functions/Techniques

A
  • Create worksheets
  • Create links between worksheets
  • Use a range of data types
  • Validate data
  • Create, edit and use charts
  • Perform calculations using a range of functions
  • Use LOOKUP functions
  • Conditional formatting
  • Sort and filter data
  • Import and export data
26
Q

Database Functions/Techniques

A
  • Create tables
  • Create relationships between tables
  • Use a range of data types
  • Validate data
  • Create, edit and use queries
  • Search and filter records
  • Perform calculations
  • Sort records
  • Import and export data
27
Q

Data Visualisation Functions/Techniques

A
  • Create/Select a range of shapes
  • Create/Select a range of chart types
  • Use symbols/images/charts
  • Show relationships and patterns
  • Enter, edit and format text and other content
  • Use colour/shading
28
Q

Advantages of Networks

A
  • Sharing of data and information
  • Allowing communication
  • Sharing of Hardware and Software