managing data Flashcards

1
Q

image size?

A
  • dimensioned in pixels
  • megapixels is the total image area
  • each pixel is a colour
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

print v screens?

A

print
- dimensioned in inches or cm
- image needs to match paper shape

screens
- shows image based on size of screen
- automatically resampled to fit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

aspect ratio?

A
  • shape of image, shape of paper
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cropping v resampling?

A

cropping
- trimming edges to resize
-discards trimmed pixels

resampling
- changing number of pixels to resize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

lossy compression?

A

compression method that reduces file size by permanently discarding some data, resulting in some loss of quality\
- JPEG, TIFF, WME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

lossless compression?

A

compression method that reduces file size without loosing data, allowing the original file to be perfectly reconstructed
- BMP, PNG, GIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

image file compression methods?

A
  1. reduce number of pixels (resolution)
  2. reduce bit depth for each pixel (number of available colours
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

pixel definition?

A

the tiny dots that make up an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

bit depth?

A

the number of bits used to represent each pixel in an image, determining the number of available colours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is online data management?

A
  • ensures data is acquired, validated, stored and protected in a standard way
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is metadata?

A
  • the descriptive information about the data youre using
    e.g. structure, content, permissions, author, date, location, purpose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the 321 storage method?

A
  1. store three copies
  2. use two types of storage methods
  3. one storage method should be offsite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data storage locations examples?

A
  • desktop
  • network drives
  • hard drives
  • optical storage
  • cloud storage
  • flash drive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is documentation levels?

A

produce multiple levels of documentation that provides full context to why it exists + how it can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is data management software (DMS)?

A
  • software that takes in data and converts to single storage containers
    e.g. microsoft sharepoint, google drive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

why DMS?

A
  • data quality (fills gaps)
  • data control (records when altered0
  • data security (access control)
  • risk management (controlled processes)
  • automation (repetitive tasks)
17
Q

DMS uses?

A
  • data warehousing
  • data analytics
  • data compliance
  • data governance
18
Q

what is cloud computing?

A

the delivery of computing services over the internet to offer faster innovation, flexible resources and economies of scale.
- uses network of remote servers to store, manage, and process data rather than a local server

19
Q

what is the cloud?

A

the internet

20
Q

benefits of cloud computing?

A
  • cost (all in one)
  • speed (fast)
  • global scale
  • productivity (quicker, easier,
  • performance
  • reliability
  • security
21
Q

what is the public cloud?

A
  • a cloud computing environment owned and operated by a third-party providers, delivering services over the internet
  • available to anyone
  • free or subscription
  • most popular
  • everything managed by provider
    e.g. microsoft azure
22
Q

private cloud?

A
  • used exclusively by one business/organization
  • physically located at organization
  • everything maintained on private network, solely dedicated to organization
    e.g. amazon vpc
23
Q

hybrid cloud?

A
  • combo of private and public
  • allow data to move between both environments
  • greater flexibility
  • used by big global organizations e.g. netflix, airbnb, uber
    e.g. google anthos
24
Q

uses of cloud computing?

A
  • widely utilized in everyday activities
  • cloud computing helps operate everything
    -apps run and hosted in cloud
  • infrastructure easily scaled
  • store, back up and recover data
  • cloud annalyses data
25
Q

what is disk fragmentation?

A
  • the process of files breaking into smaller pieces, scattered across a HD to fit
25
Q

what is disk clean up?

A
  • a computer maintenance utility that frees up disk space by removing unnecessary files
26
Q

cloud storage?

A
  • is a networked storage abailable over the internet
  • everything stored there
    e.g. onedrive, google drive, dropbox, icloud
    benefits- lots of storage, portability, back up
    disadvantages-stability of providers, cost, security, performance
27
Q

what is defragmentation?

A
  • the process of rearranging the data on a storage medium, for efficient storage and easy access
28
Q

what is malware?

A

malicious (dangerous) software designed to harm computers

29
Q

what is a virus and a worm?

A

virus - spreads by attaching itself to other programs
worm - replicates itself and spreads to other computers

30
Q

what is a trojan and spyware?

A

trojan - program that disguises as legit software to trick users
spyware - secretly monitors user activity + collect personal data

31
Q

what is rootkit and adware?

A

rootkit - hides its presence on a computer and grants controll
adware - displays itself as unwanted ads

32
Q

what is ransomware?

A

encrypts a users file and demands a payment to decrypt

33
Q

whats cryptojacking and malvertising?

A

crptojacking - users computer resources to mine cryptocurrency without usres knowledge
malvertising - use of legit ads to deliver malware

34
Q

what is signature based and behaviour based detection?

A

signature - uses a database of known malware signatures to identify matching signatures and malware
behaviour - analyses behaviour of programs

35
Q

what is sandboxing?

A

a security feature that isolates potentially malicious files from the rest of the system. they run programs in virtual environments

36
Q

What is privacy laws?

A

A set of regulations that governs the collection, use and storage of an individuals personal information