ITEC79 (Ma'am Karen) Flashcards
are powerful tools in which you can easily view,
add, or modify data that is stored in the Access database.
Forms
can be used as an organizational tool for the form, such
as creating different areas on the form.
Lines
focused on generating a business benefit.
the intent is to generate new or additional revenue where it is
relatively easy to calculate the ROI(Return on Investment).
Business-Centric
often seek to
improve a process or provide an analytical or data
capability that previously didn’t exist.
These projects provide infrastructure cost savings and an
indirect business benefit and are more difficult to calculate
ROI.
IT-centric
Ingest (obtain, import, and process) data from different sources
at various expectancies (for example, including real-time), in an
efficient usable manner leveraging pre-built connectors to
simplify the data ingestion process.
Data Ingestion
The end-to-end tools and processes used to integrate, govern,
secure, and administer the transformation of source data into
data that is “fit-for purpose” and in compliance with corporate
and regulatory policies.
Data Management
Combine data from different sources using a variety of
transformations such as filtering, joining, sorting, and
aggregating while establishing relationships within the datasets
to provide a unified view.
Data Integration
Clean up data to ensure it’s fit for its intended purposes to
appropriately address incomplete or irrelevant entries, eliminate
duplications, standardize and normalize data, and ensure data
exceptions are handled properly, preferably in an automated
and repeatable fashion.
Data Quality:
A dedicated repository to collect, manage, and report on data
assets, their relationships, and the processes used to integrate,
govern, and secure those assets.
Metadata Catalog
Enforce and ensure the accuracy and accountability of the
critical data in an organization to provide a common point of
reference and truth.
Master Data Management
De-identify, obfuscate, or otherwise obscure sensitive data,
such as credit card numbers, so relational integrity is
maintained, yet key sensitive values aren’t accessible.
Data Masking
Analyze and assess the risk of a data security breach by
identifying the location and proliferation, and tracking the usage
of sensitive data.
Data Security Analytics
Collect, process, and analyze multilatency data (including real-
time) to provide event-based insights and alerts within a time-
interval of maximum business impact (often in real-time or near real-time).
Streaming Analytics
Apply analytical formulas and algorithms to datasets to answer
questions based on big data; these algorithms are employed by
data experts to test hypotheses and validate analytic models
used to improve business outcomes.
Big Data Analytics
Collect and store all types of data as originally sourced for use
as a live archive, data exploration, and an operational data
store for pre-processing and preparing data for big data
analytics.
Data Lakes