Information Technology Flashcards
IT
What is Alpha Testing ?
Testing phase
- Cheeks if Modules or solutions meet all requirements
- Function as expected.
What is Archiving ?
Storing data for an extended period.
What is Backup ?
Copying data to ensure that it can recovered if lost or damaged.
What is Beta Testing ?
Limited external testing before final software release
What is Computational Thinking ?
Solving problems using computer science concepts.
What is Control Structures ?
Instructions in a computer program that guide the flow of the program like loops and conditionals.
What is Conventions?
Establish rules/practices in a field
What is Critical and Creative Thinking ?
Analysing logically and thinking innovatively.
What is Cyber Security ?
Protecting digital systems and data from attacks. 🐺
What is Data Analytics ?
Process of examining, cleaning, transforming and interpreting data to uncover useful information.
What is Data Integrity ?
-Accuracy
- Authenticity
-Correctness
- Reasonableness
-Relevance
- Timeliness.
What is Data Sources ?
An “data source” refers to the origin or location where data is collected, stored, and accessed for analysis
What is Dynamic Data Visualisations ?
Data that updates in real-time/interactive data
What is Debugging ?
Identifying, analyzing, and removing errors or bugs in a computer program/system
What is Descriptive Statistics ?
Summarises data like mean, median, mode, range, and standard deviation.
What is Design Principles ?
Guiding ideas for creating effective designs
-balance
-contrast
-emphasis
-unity
-proportion.
What is Design Thinking ?
A user-centered approach to problem-solving involves empathize, define, ideate, prototype, and test stages.
What is a Digital System?
Electronic system that uses digital signals to process and store information.
What is Dynamic Data Visualisations ?
Data that updates in real-time/interactive data
What is Efficiency ?
How well a solution maximizes productivity and resource use while minimizing costs and efforts
What is Encryption ?
Encryption is the process of converting data into a secret format using a key, so only those with the correct key can read it.
What are Errors ? When it comes to Programming ?
Errors in programming are mistakes that cause the code to not work properly. These can be syntax, runtime, or logical errors.
What are some Ethical Issues ?
Concerns about the “right” and “wrong” in technology, including
-Privacy
-Data security,
-Ethical use of AI and data
What is Formot ?
The arrangement and structure of data or documents.
What is Ideation ?
The formation of ideas or concepts.
What is Identity and access management ?
Processes for managing user identities and access permissions to protect systems and data.
What is Infographics ?
Visual representations of information or data, designed to make complex information easy to understand.
What are Legal Requirements ?
Laws and regulations that organisations must comply with.
What are Naming Conventions ?
Standardised rules for naming files, variables, or other entities to ensure consistency and clarity.
What is Primary Data ?
Data collected directly from the source for a specific purpose.
What is Project Management ?
The practice of planning, executing, and closing projects to achieve specific goals.
What is Pseudocode ?
A method of writing algorithms using plain language statements to describe logic and processes
What is Secondary Data ?
Data which is collected from an external source but is being used for analysis.
What is Security Controls ?
-Hardware
-Software
-Physical equipment
-procedures
- Electronic measures used to assist in the protection of individuals, systems
-networks
- organizations
- data that is collected communicated and stored.
What are Software Requirements Specifications ? (SRS)
Description of the functional and non-functional requirements
-Constraints
-Scope,
-User characteristics
-Technical environments
What is Systems Thinking ?
Problem solving by analysing the interactions and interrelationships between components of individual information systems.
What is User Experience ?
The overall experience and satisfaction a user have when interacting with a system or product e.g. usability, security, interoperability, security and affordance.
What is Validation ?
Checks for
-Reasonableness
-Completeness
-Existence check
-Type check
-Range check
What is Verification ?
Checking of data for accuracy and consistency
What is efficiency when it comes to networks ?
Evaluates how well a network minimises latency and maximises data throughout and resource use.
What is efficiency when it comes to solution ?
How well a network operates with -Minimal latency
-High data throughput
-Optimal resource utilisation
What may result from Security threats ?
Potential dangers that could compromise
- integrity
-Availability
-Confidentiality of information.
What is APA Referencing ?
An citation style for academic documents, like research papers and books.
What are Capabilities of software ?
Functions and features of software
What may result from organisations failing or violate security measures
Negative outcomes from not following security rules.
What are the Characteristics of information for educating targeted audiences ?
Key qualities that make information effective for teaching specific groups.
What Cloud computing
Using the internet to store and access data and applications instead of on local computers.
Outline some criteria evaluate the effectiveness of current data and information security strategies
Standards to measure how well data is protected.
What is a Critical Path ?
Key tasks that determine project completion time.
What is Data ?
Collected information used for decision-making
What are Database structures ?
Frameworks for organising and managing data in databases
What are Data structures ?
Ways to organise and store data efficiently for easy access and modification.
List some Design Tools
-Data dictionary
-Query designs
-Layout diagrams
-Input-process
-output processes (IPO) charts
What is Dependency ?
A piece of code relies on another piece of code to function properly
What is an Disaster Recovery Plan ?
a strategy to quickly resume operations after a disaster, focusing on data recovery, backup systems and emergency procedures
What is the Disposal of files ?
Secure method of deleting files
What is Effectiveness when it comes to Solution ?
a measure of how a solution achieves its intended goals and resolves a problem efficiently and satisfactorily
What is an Effectiveness – Information Management Strategy ?
How well an organisation collects, stores and uses information to support their decision making.
What is Effectiveness when it comesNetworks
How well a network supports communication, data transfer and connectivity among devices and users
What is Evaluation Criteria when it comes to Design ideas ?
Standards used to assess design ideas, focusing on creativity, feasibility, user-friendliness, and alignment with objectives.
What is Evaluation Criteria when it comes to Designs ?
Metrics to judge the quality of designs, such as aesthetics, functionality, user experience, and compliance with requirements.
What is Evaluation Criteria when it comes to Software ?
Benchmarks for assessing software, including performance, reliability, usability, and scalability.
What are some Evaluation Strategies ?
Methods for assessing the effectiveness of solutions,
-Testing
-Surveys
-Feedback
-Performance metrics.
What are some features of an research question ?
Essential traits include
-Clarity
-Focus
-Relevance
-Feasibility
-The ability to generate measurable data.
It should guide the research and be specific enough to be answered through investigation.
What is an Foreign Key ?
A primary key in another table, Links two tables
What is File Management ?
Organising, storing, and handling files effectively on a computer or network.
What are some Functions and Techniques when it comes to spreadsheets ?
Operations like
-Formulas
- Pivot tables, and
-Conditional formatting
-Data analysis and
-Visualisation
What are some Functions and Techniques for data visualisations ?
Methods like charts, graphs, and interactive dashboards to present data visually.
What is Hardware ?
Physical components of a computer system, such as CPU, memory, and storage devices.
What is an Information system ?
A system for collecting, storing, and processing data to provide useful information for decision-making.
What is Information ?
Processed data that is meaningful and useful for decision-making.
What is the Integrity of Data ?
Ensuring that data is accurate, consistent, and reliable over its lifecycle.
What is the Internet of Things ? (IoT)
A network of interconnected devices that collect and exchange data via the internet.
What is Managing files ?
Techniques for organising, naming, and storing files to ensure easy retrieval and security.
What is an Milestone ?
A significant point or event in a project timeline.
What are Networks when they are wired ?
Networks that use physical cables for connectivity, such as Ethernet.
What are Networks when they are wireless ?
Networks that use radio waves for connectivity, like Wi-Fi.
What are Networks when they are mobile ?
Cellular networks that provide wireless connectivity for mobile devices.
What is Network attached storage ?
A storage device connected to a network, providing data access to multiple devices.
What is Network hardware ?
Physical devices that enable network connectivity, such as routers, switches, and modems.
What is Physical security controls ?
Measures to protect
-Physical assets
-Infrastructure
-locks
-Surveillance
-Security personnel.
What is an Predecessor ?
A task that must be completed before another task can start.
What is Primary Key ?
Unique Identifier
What are Processing features ?
Capabilities of a system or application to manipulate and manage data.
What is QuanTITative Data ?
Numerical data that can be measured and analyzed
What is QuaLITative Data ?
Non-numerical data that describes qualities or characteristics.
What are Relational Databases ?
Databases that organise data into tables with relationships between them.
What are Security Protocols ?
Rules and procedures for protecting data during transmission, like HTTPS.
What is Software ?
Programs and applications that run on computer systems.
What is a Solution ? (digital)
An digital tool or application designed to solve a specific problem or meet an specific need.
What are Solution Constraints ?
Conditions and limitations of that are considered when creating a solution.
What are Functional Solution Requirements ?
Describes what the software should do.
What is an Non-Functional solution requirement ?
Describes the quality of the solutions.
What is Table Normalisation ?
The process of organising database tables to reduce redundancy and improve data integrity.
What are some Techniques for coding data ?
Methods for converting data into a structured format, such as
-Encoding
-Classification
-Labelling.
What is Testing techniques ?
Approaches for evaluating the functionality and performance of software, such as “unit testing”, “integration testing”, and “system testing”.
What are accidental threats ?
UNintentional actions or events that could cause harm, like human error or equipment failure.
What are deliberate threats ?
INtentional actions aimed at causing harm, like hacking or fraud.
What are some types of data ?
Various forms of data
-Structured
-Unstructured
-Qualitative
- Quantitative.
What is LAN ?
An “Local Area Network” which connects devices within an limited area.
What is WAN ?
An “Wide Area Network” which connects devices over an large geographic area.