ITF + Exam Outline Flashcards
Binary
Notational system with 2 values per digit. (0,1). Computers process code in binary because the transistors in its CPU and memory components also have two states (off and on)
Hexadecimal
Notational systems with 16 values per digit. Values above 9 are represented by the letters A, B, C, D, E, F. Hex is a compact way of referring to long byte values, such as MAC and IPv6 addresses
Decimal
Decimal system is based on the principle of expressing ten different numbers using a single digit in the range 0 to 9. Once you have a value or more than ten, then you require two digits of decimal to express it. Thus, when twelve is expressed numerically in decimal as 12 that means 110 plus 21
ASCII
7-bit code page mapping binary values to character glyphs. Standard ASCII can represent 127 characters, though some values are reserved for non-printing control characters
Unicode
Extensible system of code pages capable of representing millions of character glyphs, allowing for international alphabets
Char
Data type supporting storage of a single character
Strings
Data type supporting storage of a variable length series of characters
Integers
Data type supporting storage of whole numbers
Floats
Data type supporting storage of floating point numbers (decimal fractions)
Boolean
Data type support 1-bit storage, representing FALSE and TRUE. Boolean logic is a statement that resolves to a true or false, condition and underpins the branching and looping features of computer code
Input
the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones
Output
the processed data is shown or played to the user through an output device, such as monitor or loudspeaker system
Processing
the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software
Storage
the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on
Data and information as assets
For organizations, and even for individuals, computer data can be considered an asset
Importance of investing in security
A mechanism designed to protect an information asset or processing system is called a security control. There are many types of security controls, and they can be classed in different ways. Typically there are designed to prevent, deter, detect, and/or recover from attempts to view or modify data without authorization.
Relationship of data to creating information
The process of using data in this way is usually called analytics.
Trademarks
As copyright is not given to the selection of a name, if a company wants to promote its goods it will normally trademark its name and/or logo
Copyright
is automatic legal protection granted to certain types of work indicating that the copyright holder owns the right to control the use of the work, including rights of publication, distribution, or sale
Patents
is legal protection for some kind of invention. Unlike copyright, a patent can apply to an idea so long as the idea is original, useful, and distinctive or on-trivial
Digital products
Is one that is sold or distributed as binary computer data
Data capture and collection
Data points can be collected from many different sources
Data correlation
The information layer requires software to perform data correlation. This means analyzing the whole data set and finding connections and links between data points
Meaningful reporting
To inform human decision making at the insights layer, the information identified by the analytics system must be presented in ways that humans can analyze and interpret