IT Chapter 1 Flashcards
information technology
what is data
raw data has no meaning , has no context, isnt pocessed yet
what is information
it is data that has been given meaning, has context and is processed
how is data stored
in binary digits 1=8bites
what is direct data
data that is collected for a purpose and used for that purpose only
what is indirect data
data collected from a third party and used for a different purpose from what it was collected for
what are the direct data sources
questionnaire, interview ,data logging , observation
describe questionnaires
consists of questions on a specific issue
questions could be closed end or open ended
easy to distribute
complete
easy familiar process
describe interviews
It’s a formal meeting usually between 2 people, done face to face
observation
data collectors watch what is happening in a given situation
data logging
the use of sensors to collect data
Data is collected over a period of time
faster and more accurate than humans
could be put in dangerous areas
the data is directly sent to the computer automatically
what are the factors that affect the quality of the information?
Accuracy, Age of data, completeness, relevance & level of detail
Describe the accuracy of information
it depends on the accuracy of the data and how it was collected
transposed errors and transcript error could affect the data accuracy
validation & verification is used to reduce errors and increase accuracy
what is transposed error
when data copied there was an error in coping down the information in the correct way
ex.26 was copied as 62
what is transcript error?
when transfering data from one medium to another an error happens.
Relevance of information.
data must meet requirements
relevance Matters if data collected was irrelevent then there was a waste of time & money
Age of data/ info
Data needs to be updated inorder not to cause inaccuracy
the data needs to be updated regularly
old info causes wrong decision making
Level of detail
the details should be in the right amount not too much nor too less.
completeness
the data needs to be complete to avoid gaps collecting more data could be a great decision to avoid these gaps
need of encryption
- to avoid fraud
- to avoid identity theft
- to avoid black Mailing
- to avoid ransom
describe encryption
it is away of scrambling data in a way that only authorised people can understand the information
it is a process of converting info. to a code that is imposible to understand without a decryption key
it is used when storing data or when transmitting data across the internet.
Doesnt prevent hackers from intercepting the data it only stops them from understanding it
it is a Process of converting plaintext to cipher text
where the “authorised” people
they’re people who have the decryption key
encrypting the data
to encrypt the data we need encryption key and encryption algorithm
to decrypt the data
we need decryption key and decryption algorithm.
what is encryption algorithm
it is a program that converts plain text to cipher text
what is decryption algorithm
it is a program that converts cipher text to plain text
what are the 2 types of encryption
symmetric & asymmetric
what is symmetric encryption
the sender & reciever have the same key to encrypt & decrypt the data
it is mostly used when storing On a harddisk
key private key
what is asymmetric encryption
an encryption that uses I different keys
1. public key to encrypt data
2. private key to decrypt the data
used mostly for encrypting emails
it is more secure yet slow process
2 other names for symmetric encryption
secret key encryption
private key encryption
what happens in an SSL / TLS handshake
- client sends a message to the server to set connection & to agree on the rules of communication and on what ss L/ TLS version should be used
2, server shows digital certificate to the Client - client checks if certificate is valid and authentic
- client obtains servers public key to encrypt a new random secret key (session key) . to be used throughout the session
- the server decrypts the session key by the private key
encrypting a hard disk
- backup the data before the encryption process
- choose the encryption software that meets the security needs and is compatable with your os
- select if you want to encrypt the whole hard disk or specific partitions only
- set a strong password (private key)
- Begin the encryption process& wait till complete
- store the recovery key.
Adv of encryption
avoid ransom ,identity theft, fraud
company secrets wont be hacked & sold to competitors