UNTIS 2 EXAM FINAL Flashcards

1
Q

Verification

A

The process of checking that data entered matches the original source (e.g., proofreading).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Validation

A

Ensuring the reasonableness and completeness of data, using existence, range, and type checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Testing

A

Ensuring the solution operates as intended, using test data and testing methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Testing

A

Informal Testing: Ongoing testing done while working.
Formal Testing: Pre-planned and documented tests, including testing tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Evaluation

A

Determining how well the solution meets the set requirements after implementation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Evaluation Criteria

A

Measures of efficiency (time, cost, effort) and effectiveness (accessibility, accuracy, usability).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Types

A

Binary Data: Data represented as 0s and 1s, used in images and sound.
Boolean Data: True or False data (e.g., Yes/No answers).
Character Data: Letters, numbers, or symbols.
Numeric Data: Includes integers and floating-point numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Design Principles

A

Usability: Flexibility, accessibility, robustness.
Appearance: Contrast, alignment, balance, space, text and table formatting and image use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Effectiveness

A

Definition: How well a solution achieves its goals, including factors like accuracy, usability, and completeness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Efficiency

A

How well time, cost, and effort are used to achieve intended results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Databases - DO IT AT THE END/ EMAIL TO ASK IF THIS ON TEST.

A

Flat File: A database with no links between tables (single table).
Relational Database: A database where tables are linked via keys (e.g., primary keys).
One-to-One Relationship: One record in one table is linked to one record in another.
One-to-Many Relationship: One record in one table links to multiple records in another table.
Primary Key: A unique identifier for records in a table.
Secondary Key: Used for searching but not unique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Query, Forms, and Reports

A

Query: A request for data retrieval from a database.
Form: An interface for entering or displaying data.
Report: Structured output, usually formatted for printing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spreadsheets

A

Setup: Includes multiple worksheets, tables, graphs, and data manipulation.
Formats and Conventions: Presentation of data, alignment, and correct data types.
Manipulation of data: Formula, coding data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Webpages

A

Setup: Requires proper file structure, templates, and folders for assets (CSS, images).
Formats and Conventions: Aligning content, presenting data correctly.
Manipulation of data: Edit text, create links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Website Design Tools

A

IPO Charts: Define inputs, processes, and outputs.
Storyboards: Visual layouts of web content.
Sitemaps: Hierarchical structure of the website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Qualitative Data

A

Descriptive data (e.g., interview responses, observations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Quantitative Data

A

Measurable data, usually numeric (e.g., survey statistics).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Primary Data

A

Data collected firsthand by the user.

19
Q

Secondary Data

A

Data collected by someone else, such as reports and articles.

20
Q

Data Integrity

A

Ensures data is accurate, authentic, and timely.

21
Q

Bias

A

Factors that may affect the quality and reliability of data.

22
Q

Guidelines for Creating Charts

A

Ensure clarity, label axes, use appropriate colors and scales.

23
Q

Types of Graphs

A

Bar charts, pie charts, line graphs, scatter plots—all serve different data visualization purposes.

24
Q

Data Collection Techniques

A

Surveys: Collect responses through questions.
Interviews: In-depth, qualitative responses.
Direct Observation: Monitoring behaviors or data collection directly.

25
Project Management ( Gantt Chart, Milestones, Critical Path).
Gantt Chart: Shows project timelines and task dependencies. Milestones: Key events or deliverables within the project. Critical Path: A sequence of tasks that determine the minimum time needed to complete the project.
26
Acts
Privacy and Data Protection Act 2014: Governs the handling of personal data in Victoria. anyomonity, use and discloscure of personal information. Health Records Act 2001: Protects personal health information. Copyright Act: Governs intellectual property rights over created works. use and disclosure and anyomninity. Privacy Act 1988 - Australia-wide and for business with turnover of more than 3 mil. anayoninity and pseudominity, use and disclousre of personal information.
27
Ethical Dilemma ( How to Solve)
Identify the problem. Identify stakeholders and consequences. Identify ethical standards. Evaluate options. Make a decision.
28
APA Referencing (6th or 7th Edition) For websites and books.
Books: Author, A. A. (Year). Title. Publisher. Webpages: Author, A. A. (Year). Title. Retrieved from URL.
29
Network Advantages and Disadvantages
Advantages: Sharing data. Disadvantages: Requires skilled staff, expensive to maintain.
30
Types of Networks
LAN: Local Area Network, for small areas. WAN: Wide Area Network, covering larger geographical areas.
31
Network Architecture
Peer-to-Peer: All devices have equal status in the network. Client-Server: Centralized control, where clients request resources from servers.
32
Wired Networks
Advantages: Faster data transfer. Disadvantages: Lack of mobility.
33
Types of Cable
UTP: Unshielded twisted pair, used for most local networks. Fibre Optic: High-speed cable, used for long-distance data transmission.
34
Network Hardware
NIC: Network Interface Card, allows devices to connect to a network. Router: Routes data between networks. Switch: Connects devices within a network.
35
Network Software
Network Operating System: Software that manages network resources and connectivity.
36
Internet Protocols
TCP: Breaks data into packets and reassembles them. IP: Routes data packets to the correct destination.
37
VPN
(Virtual Private Network)- A secure, encrypted connection over the internet.
38
NAS
(Network-Attached Storage)-A dedicated file storage device that provides data access over a network.
39
Data Security- Threats
Accidental (data loss), deliberate (hacking), event-based (disasters).
40
Data Security- Controls
Software security (encryption) and physical controls (locks, surveillance)
41
Disaster Recovery Plan (DRP)
Emergency Plan: Defines procedures for handling immediate threats. Backup Plan: Ensures data backups are stored and can be restored. Restoration Plan: Outlines steps for restoring data and systems.
42
Existence, Range and Type Check.
Existence check: Ensuring required fields are not empty, for example a valid coupon code must be recorderd in the copoun field. Range check: Data falls within a certain range. Type check: Data is of the correct type.
43
Network Hardware and Software
Hardware: NIC, routers, switches, modems, firewalls. Software: Operating systems, protocols like TCP/IP and FTP.
44
Problem Solving Methodology
Analysis: Solution ( requiremnets, constraints and scope). Design: Solution design and evaluvation crieteria. Development: Manipulation, validation, testing and documentation. Evaluation: Solution evaluvation and evluavtion stradegy.