Digital Technology Flashcards
What is Big Data?
Big data is data that contains a large amount of information that is helpful to the viewer/reader/user.
What is Data Innovation?
Data innovation is the use of new or non-traditional data sources and methods to gain a more naunced understanding of development challenges.
What are the PROS and CONS of Big Data?
PROS: data collected is valuable, benefits for people’s necessities, quickly recognizes errors and real-time fraud detection.
CONS: tools not compatible, new approach required and possible failure.
What are the PROS and CONS of Data Innovations?
PROS: new data sources are introduced and a better understanding of development changes is made
CONS: data is not reliable and data may be incorrect
Define Cryptography
Cryptography is the art of protecting information by transforming it (encrypting it) into an inreadable form called cipher text
Define Encrytpion
Encryption is the process of encoding messages so that they cannot be read
Define Decrytion
Decryption is the process of decoding the transformed message so that it can be read
Define the term hacking
Hacking occurs when someone gains unauthorized access to data in a computer or system. Some potential issues that arise from people or groups that can hack into big data include: personal information stolen, information hacked or changed and privacy breached
What is Ceaser’s Cypher?
Ceaser’s cypher was used to protect messages he sent to his army officers. The process is used by making letters go back one spot in the alphabet. For example, B becomes A and Y would become X.
What is Symmetric Encryption?
Symmetric Encryption is the process of a sender encrypting a message with one key, sends the data and then the receiver uses the same key to decrypt the message. (Simple Form: using one key to encrypt and decrypt data)
What is Asymmetric encryption?
Asymmetric encryption is the process of using two keys to encrypt and decrypt data (public and private key).
What is hashing?
Hashing is the process of generating a value or values from a string of text using a mathematical function.
Define end-to-end encryption
End-to-end encryption means that only the sender and receiver of data is able to see it.
What is the difference between a public and private key?
A public key is available to more than two people. Whereas, a private key is used when a sender sends data to someone specific who needs to use the private key to decode the message.
What are the PROS and CONS of google trends?
PROS: choose best keywords, know latest trends and you can monitor your brand
CONS: increased risk of keyword stuffing and there is limited ranking data and insights