Computing 3/4 Final Exam Flashcards

1
Q

What are the 4 key concepts of data/information management Effectiveness?

A
Data Integrity
   data is consistent and accurate
Security
   Data is protected
Ease of retrieval
   Varies with data
Currency or files
   Up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 key concepts of data management efficiency?

A
Time (speed)
   Solution is not slow
Cost
   upfront and ongoing cost of operation
Labour requirements
   the number of hours needed to run the solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an information management strategy

A

they contain digital systems, people, processes and data, all working together to fulfil a businesses needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List and explain the three legislation to do with data security

A

Privacy Act 1988
Details how government, private health, businesses
>$3 million or trade information, handle your
information
Privacy and Data Protection Act 2014
essentially Privacy Act 1988 for Victorian government
agencies
Health Records Act 2001
Details how agencies can access, collect, use and
trade your medical information in Victoria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the APPs of the Privacy Act 1988

A
1 Open
2 Anonymous
3 solicited
4 Unsolicited
5 Notification 
6 Use
7 Marketing
8 Cross-border
9 identifiers 
10 Quality
11 Security
12 Access
13 Correction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four main components of a disaster recovery plan

A

1 Evacuation
2 Backing up Data
3 data restoration
4 Testing of Disaster plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is included in the Scope of a Disaster Recovery plan?

A
1 Risk Assessment
2 Allocating Emergency Responsibilities 
3 Inventory
   Eg: software and hardware of critical devices
4 Key information
   Eg: responsibilities, phone numbers, 
5 Backup scheme
6 Backup Media
7 Testing Backup scheme
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List All of the Data types and some info about them

A
Character:
Contains a single Alphanumeric value Like 'S' or 'L'.
Text or String:
Contains a mix up to 255 characters.
Numeric - integer, Floating Point:
only numbers, integer is whole numbers, floating point is decimals.
Numeric - Date:
Numbers of days since 0
Boolean:
true or false, yes or no.
Image:
Sound:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List all the design tools for data visualisations

A
Data Dictionary's:
design data base tables, establishes fields data types, field size and validation
IPO charts:
data structure diagram:
outlines tables and their relationships
Story Board:
How a user with navigate the solution
Website maps:
Layout Diagrams:
Mock-ups:
Annotated diagrams:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List some conventions of databases, spreadsheets and data visualisations

A

Titles- should be larger and above the element they are referring to.
Colours and contrast- should be used to make the solution more visible.
Hierarchical design.
Text styles: simple, no more then 3 fonts readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a format

A

How something is displayed eg: number of decimal places or dd/mm/yy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Are the Data Base Naming conventions?

A
  1. Accurate, Detailed.
  2. No Spaces
  3. Capitalization for the first letter in each word
  4. Common prefixes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is contained within a Data Base Data dictionary?

A

Field Name | Data Type | Field Size | Format | Caption | Description | Validation Rule | Validation Text |

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Input Mask

A

The format an entry has to conform to Eg DD/MM/YY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the Four types of Validation check

A
  1. Existence check
  2. Type check
  3. Range check
  4. Input Mask
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is contained within a Query Design Table?

A

Field Name | Sort | Filter | Calculation | Other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is contained within a Testing Table

A

Item Tested | How it was tested | Expected result | Actual Result | How it was fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the steps of the problem solving methodology?

A
Analysis:
-Solution requirements
-Solution constraints
-Solution Scope
Design:
-Solution Design
-Evaluation Criteria
Development:
-Manipulation
-Validation
-Testing
-Documentation
Evaluation:
-Solution Evaluation
-Evaluation Strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some strengths and weaknesses of primary data

A
\+Suits research question exactly
\+known source
\+know manipulation
\+possible follow ups
-resource intensive
-small amounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some strengths and weaknesses of secondary data

A
\+Cheap
\+huge amounts
\+historic data
\+many locations
-maybe irrelevant
-source may be unknown
-Potentially inaccurate or biased
-manipulation unknown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

list Techniques to collect data

A
Survey
Interview
Observation
Sensor
Census
Social Media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

List possible government data sources

A
Australian Bureau of statistics
DataVic
Commonwealth Scientific and industrial research organisation
Bureau of Meteorology
NASA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does APA referencing stand for?

A

American Psychological Association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the aspects of Data integrity?

A
Accuracy:
-Completeness
-Consistency
-Clarity
Authenticity
Correctness
Reasonableness
Relevance
Timeliness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are solution constraints?

A

anything that limits or constrains the solution like budget, time or equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a solution scope?

A

Where the boundaries of the solution are identified, what will and will not be included in the solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are solution requirements?

A

What the solution should do and should be. divided into functional and non-functional requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the functionality design principles?

A
Usability:
-Robustness
-Flexibility
-Ease of use
Accessibility
-Navigation
-error tolerance
29
Q

What are the appearance design principles?

A
image use
text and table formatting
Alignment
Balance
Space
Contrast
30
Q

What must be done in third normal form?

A

no records contain more then one value, no multiple fields for the same kind of data. Addition of Primary keys.
All fields must be directly related to the PK or be split into separate tables.

31
Q

List some design tools for tables and databases

A

Data dictionary’s
Query design table
Annotated diagram (forms & Reports)

32
Q

List some ways to clean data (dats cleansing)

A

Removing records
Correcting entry
Modifying formats
modifying records

33
Q

What is the difference between relative and absolute cell referencing?

A

Relative is the current cell’s position relative to the referenced one
Absolute is directly to that cell regardless of position

34
Q

What is the difference between formal and informal testing?

A

Informal testing happens throughout the development process it is not recorded and is the developer immediately checking if their formula or addition works as expected. Formal happens after it is complete and is much more in-depth documenting the process

35
Q

What aspects of a data visualisation should be tested?

A
Media and plug-ins
Hyperlinks
Readability
Calculations
Loading times
Browser compatibility
Dynamic features
efficiency
effectiveness
36
Q

What makes a good research question?

A

open ended. establishes the two or more variables. Uses specific and meaningful terminology.

37
Q

What are some ways to code qualitative data?

A

Likert scales, Grouping and counting specific terms, multiply choice answers/ drop down menus, summary terms.

38
Q

List some examples of software security controls

A

Strong passwords, biometric security, always logging out, Encryption, firewalls, Antimalware, backup files.

39
Q

List some ways to generate design ideas

A

Brainstorming, Consult end users, Mind mapping, Graphic organisers, researching other infographic formats conventions and examples.

40
Q

What are some aspects of proper file directory structure

A

folder names specify where files are to be saved
Keep folder names short
separate work in progress from finished tasks
avoid deep and wide folder structures
keep similar file types together
limit number of files

41
Q

What does the 3-2-1 rule mean?

A

backups should be stored on 3 devices using 2 different media types and 1 of site copy

42
Q

how should files be disposed of?

A

data mustn’t just be deleted but also scrubbed or wiped. this must be done 3 times.

43
Q

What is achieving and how does it differ to backups

A

achieving is the storage of data or info that is not or is not expected to be regularly used. it is like a separate place to put old documents and can be backed up like other info.

44
Q

what are the aspects of an effective infographic?

A
Completeness
Attractiveness
Clarity
Readability
Accuracy
Accessibility
Timeliness
Communication of message
Relevance
Usability
45
Q

What are some advantages of networks?

A

Sharing of data and information, allowing communication, sharing hardware and software.

46
Q

What are the differences between peer to peer and client server networks

A

peer-to-peer all devices are equal. client server is hosted by a server which allows for permission levels within the network.

47
Q

list some advantages and disadvantages of wired networks.

A
\+faster transfer speeds
\+better security
\+More reliable connection
-lack of mobility
-instillation
-maintenance
48
Q

list some advantages and disadvantages of wireless networks

A
\+cheap
\+instillation
\+mobility
\+compatibility
-slower speeds
-less secure
-less reliable connection
49
Q

what are the two common types of wired transmission media

A

unshielded twisted pair (ethernet) and fibre optic.

50
Q

list some accidental threats

A

user error
power loss (not power surge)
hardware of software malfunction
Hardware loss

51
Q

list 4 different types of malware and some info about them

A
Adware:
malware designed to deliver advertising 
Bot:
performs specific tasks autonomously like a DDoS
Bug:
malware that alters the source code of a program
Keylogger:
logs all keystrokes
Ransomware:
encrypts data and holds it for ransom
Rootkit:
controls device from remote location
Spyware:
collects data about user
Trojan:
A program that pretends to be normal
Virus:
causes a negative effect on a device or network
Worm:
replicates over and over taking device resources
52
Q

What is the difference between symmetric and Asymmetric encryption methods

A

Symmetric both the sender and receiver use the same private key. where as Asymmetric has a public key used by the sender and a private key used by the receiver

53
Q

what are the two security protocols

A

TLS and SSL. Transport Layer Security creates a secure connection using certificates. Secure Sockets Layer does the same. HTTPS uses both of these

54
Q

What are some physical security controls

A

Zoning, Barriers tactics eg locks fences, biometric, Backing up, shredding documents, authorisation credentials.

55
Q

What does the Network operating system (NOS)

A
manage:
Users
Permissions
File Access
Print jobs
Security updates
56
Q

What is TCP/IP and what does it do

A

It is a technical protocol/internet protocol that converts data into packets sends the to their destination and reassembles them.

57
Q

What does FTP (file transfer protocol) do

A

It is responsible for sharing files between devices, upload, download remove rename files on a server is done using FTP

58
Q

What are the aspects of an effective infographic?

A
Complete
Clarity
Communication of message
Attractiveness
Accuracy
Accessibility
Relevance
Readability
Usability
Timeliness
59
Q

What are the 4 types of test data?

A

Valid data:
Data that should and does work with the system
Unusual but valid data:
Data that looks as if it shouldn’t work but does
Invalid data:
Data that shouldn’t work but does
Boundary conditioning:
Testing any upper or lower bounds in the system like >0 you could put in 0

60
Q

define digital systems

A

Refers to elements such as hardware and software, and their interconnectedness, used to create digital solutions.

61
Q

What is included within an information system

A

Digital systems
People
Processes
Data

62
Q

What is within APA referencing

A

Author last name. First initial. (Year of publication). Title. Location of publisher: publisher. URL, retrieved dd/mm/yyyy

63
Q

What are some benefits and disadvantages of relational databases

A
\+Reduced data redundancy
\+Faster processes
\+Easier to maintain
\+Allow privileges = better security 
-harder to set up correctly
64
Q

define data analytics

A

The process of acquiring/extracting data from a source, analysing said data to find meaningful trends/patterns, and then presenting the data in a clear and unambiguous way.

65
Q

define data visualisation

A

The process of visualizing complex data usually in the form of different charts

66
Q

Define Design thinking

A

A way of thinking critically and creatively to generate and evaluate innovative ideas

67
Q

what are the Benefits of a DRP (disaster recovery plan)

A

+Provides a sense of security and confidence
+Prevents further problems caused by panic and disorganization
+Reduces uncertainty for additional decisions
+Neatly explains new procedures to employees
+speeds up reaction to disasters saving time and resources

68
Q

what is the internet of things (IOT)

A

A network formed by ‘smart devices’ that connect to the internet

69
Q

Targeting and Audience Includes:

A
Includes:
Being gender inclusive
Being Culturally inclusive
Applying common language
Being Age Appropriate