Computing 3/4 Final Exam Flashcards

(69 cards)

1
Q

What are the 4 key concepts of data/information management Effectiveness?

A
Data Integrity
   data is consistent and accurate
Security
   Data is protected
Ease of retrieval
   Varies with data
Currency or files
   Up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 key concepts of data management efficiency?

A
Time (speed)
   Solution is not slow
Cost
   upfront and ongoing cost of operation
Labour requirements
   the number of hours needed to run the solution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an information management strategy

A

they contain digital systems, people, processes and data, all working together to fulfil a businesses needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List and explain the three legislation to do with data security

A

Privacy Act 1988
Details how government, private health, businesses
>$3 million or trade information, handle your
information
Privacy and Data Protection Act 2014
essentially Privacy Act 1988 for Victorian government
agencies
Health Records Act 2001
Details how agencies can access, collect, use and
trade your medical information in Victoria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the APPs of the Privacy Act 1988

A
1 Open
2 Anonymous
3 solicited
4 Unsolicited
5 Notification 
6 Use
7 Marketing
8 Cross-border
9 identifiers 
10 Quality
11 Security
12 Access
13 Correction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four main components of a disaster recovery plan

A

1 Evacuation
2 Backing up Data
3 data restoration
4 Testing of Disaster plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is included in the Scope of a Disaster Recovery plan?

A
1 Risk Assessment
2 Allocating Emergency Responsibilities 
3 Inventory
   Eg: software and hardware of critical devices
4 Key information
   Eg: responsibilities, phone numbers, 
5 Backup scheme
6 Backup Media
7 Testing Backup scheme
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List All of the Data types and some info about them

A
Character:
Contains a single Alphanumeric value Like 'S' or 'L'.
Text or String:
Contains a mix up to 255 characters.
Numeric - integer, Floating Point:
only numbers, integer is whole numbers, floating point is decimals.
Numeric - Date:
Numbers of days since 0
Boolean:
true or false, yes or no.
Image:
Sound:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List all the design tools for data visualisations

A
Data Dictionary's:
design data base tables, establishes fields data types, field size and validation
IPO charts:
data structure diagram:
outlines tables and their relationships
Story Board:
How a user with navigate the solution
Website maps:
Layout Diagrams:
Mock-ups:
Annotated diagrams:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List some conventions of databases, spreadsheets and data visualisations

A

Titles- should be larger and above the element they are referring to.
Colours and contrast- should be used to make the solution more visible.
Hierarchical design.
Text styles: simple, no more then 3 fonts readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a format

A

How something is displayed eg: number of decimal places or dd/mm/yy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Are the Data Base Naming conventions?

A
  1. Accurate, Detailed.
  2. No Spaces
  3. Capitalization for the first letter in each word
  4. Common prefixes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is contained within a Data Base Data dictionary?

A

Field Name | Data Type | Field Size | Format | Caption | Description | Validation Rule | Validation Text |

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Input Mask

A

The format an entry has to conform to Eg DD/MM/YY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the Four types of Validation check

A
  1. Existence check
  2. Type check
  3. Range check
  4. Input Mask
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is contained within a Query Design Table?

A

Field Name | Sort | Filter | Calculation | Other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is contained within a Testing Table

A

Item Tested | How it was tested | Expected result | Actual Result | How it was fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the steps of the problem solving methodology?

A
Analysis:
-Solution requirements
-Solution constraints
-Solution Scope
Design:
-Solution Design
-Evaluation Criteria
Development:
-Manipulation
-Validation
-Testing
-Documentation
Evaluation:
-Solution Evaluation
-Evaluation Strategy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are some strengths and weaknesses of primary data

A
\+Suits research question exactly
\+known source
\+know manipulation
\+possible follow ups
-resource intensive
-small amounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some strengths and weaknesses of secondary data

A
\+Cheap
\+huge amounts
\+historic data
\+many locations
-maybe irrelevant
-source may be unknown
-Potentially inaccurate or biased
-manipulation unknown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

list Techniques to collect data

A
Survey
Interview
Observation
Sensor
Census
Social Media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

List possible government data sources

A
Australian Bureau of statistics
DataVic
Commonwealth Scientific and industrial research organisation
Bureau of Meteorology
NASA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does APA referencing stand for?

A

American Psychological Association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the aspects of Data integrity?

A
Accuracy:
-Completeness
-Consistency
-Clarity
Authenticity
Correctness
Reasonableness
Relevance
Timeliness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are solution constraints?
anything that limits or constrains the solution like budget, time or equipment
26
What is a solution scope?
Where the boundaries of the solution are identified, what will and will not be included in the solution
27
What are solution requirements?
What the solution should do and should be. divided into functional and non-functional requirements.
28
What are the functionality design principles?
``` Usability: -Robustness -Flexibility -Ease of use Accessibility -Navigation -error tolerance ```
29
What are the appearance design principles?
``` image use text and table formatting Alignment Balance Space Contrast ```
30
What must be done in third normal form?
no records contain more then one value, no multiple fields for the same kind of data. Addition of Primary keys. All fields must be directly related to the PK or be split into separate tables.
31
List some design tools for tables and databases
Data dictionary's Query design table Annotated diagram (forms & Reports)
32
List some ways to clean data (dats cleansing)
Removing records Correcting entry Modifying formats modifying records
33
What is the difference between relative and absolute cell referencing?
Relative is the current cell's position relative to the referenced one Absolute is directly to that cell regardless of position
34
What is the difference between formal and informal testing?
Informal testing happens throughout the development process it is not recorded and is the developer immediately checking if their formula or addition works as expected. Formal happens after it is complete and is much more in-depth documenting the process
35
What aspects of a data visualisation should be tested?
``` Media and plug-ins Hyperlinks Readability Calculations Loading times Browser compatibility Dynamic features efficiency effectiveness ```
36
What makes a good research question?
open ended. establishes the two or more variables. Uses specific and meaningful terminology.
37
What are some ways to code qualitative data?
Likert scales, Grouping and counting specific terms, multiply choice answers/ drop down menus, summary terms.
38
List some examples of software security controls
Strong passwords, biometric security, always logging out, Encryption, firewalls, Antimalware, backup files.
39
List some ways to generate design ideas
Brainstorming, Consult end users, Mind mapping, Graphic organisers, researching other infographic formats conventions and examples.
40
What are some aspects of proper file directory structure
folder names specify where files are to be saved Keep folder names short separate work in progress from finished tasks avoid deep and wide folder structures keep similar file types together limit number of files
41
What does the 3-2-1 rule mean?
backups should be stored on 3 devices using 2 different media types and 1 of site copy
42
how should files be disposed of?
data mustn't just be deleted but also scrubbed or wiped. this must be done 3 times.
43
What is achieving and how does it differ to backups
achieving is the storage of data or info that is not or is not expected to be regularly used. it is like a separate place to put old documents and can be backed up like other info.
44
what are the aspects of an effective infographic?
``` Completeness Attractiveness Clarity Readability Accuracy Accessibility Timeliness Communication of message Relevance Usability ```
45
What are some advantages of networks?
Sharing of data and information, allowing communication, sharing hardware and software.
46
What are the differences between peer to peer and client server networks
peer-to-peer all devices are equal. client server is hosted by a server which allows for permission levels within the network.
47
list some advantages and disadvantages of wired networks.
``` +faster transfer speeds +better security +More reliable connection -lack of mobility -instillation -maintenance ```
48
list some advantages and disadvantages of wireless networks
``` +cheap +instillation +mobility +compatibility -slower speeds -less secure -less reliable connection ```
49
what are the two common types of wired transmission media
unshielded twisted pair (ethernet) and fibre optic.
50
list some accidental threats
user error power loss (not power surge) hardware of software malfunction Hardware loss
51
list 4 different types of malware and some info about them
``` Adware: malware designed to deliver advertising Bot: performs specific tasks autonomously like a DDoS Bug: malware that alters the source code of a program Keylogger: logs all keystrokes Ransomware: encrypts data and holds it for ransom Rootkit: controls device from remote location Spyware: collects data about user Trojan: A program that pretends to be normal Virus: causes a negative effect on a device or network Worm: replicates over and over taking device resources ```
52
What is the difference between symmetric and Asymmetric encryption methods
Symmetric both the sender and receiver use the same private key. where as Asymmetric has a public key used by the sender and a private key used by the receiver
53
what are the two security protocols
TLS and SSL. Transport Layer Security creates a secure connection using certificates. Secure Sockets Layer does the same. HTTPS uses both of these
54
What are some physical security controls
Zoning, Barriers tactics eg locks fences, biometric, Backing up, shredding documents, authorisation credentials.
55
What does the Network operating system (NOS)
``` manage: Users Permissions File Access Print jobs Security updates ```
56
What is TCP/IP and what does it do
It is a technical protocol/internet protocol that converts data into packets sends the to their destination and reassembles them.
57
What does FTP (file transfer protocol) do
It is responsible for sharing files between devices, upload, download remove rename files on a server is done using FTP
58
What are the aspects of an effective infographic?
``` Complete Clarity Communication of message Attractiveness Accuracy Accessibility Relevance Readability Usability Timeliness ```
59
What are the 4 types of test data?
Valid data: Data that should and does work with the system Unusual but valid data: Data that looks as if it shouldn’t work but does Invalid data: Data that shouldn’t work but does Boundary conditioning: Testing any upper or lower bounds in the system like >0 you could put in 0
60
define digital systems
Refers to elements such as hardware and software, and their interconnectedness, used to create digital solutions.
61
What is included within an information system
Digital systems People Processes Data
62
What is within APA referencing
Author last name. First initial. (Year of publication). Title. Location of publisher: publisher. URL, retrieved dd/mm/yyyy
63
What are some benefits and disadvantages of relational databases
``` +Reduced data redundancy +Faster processes +Easier to maintain +Allow privileges = better security -harder to set up correctly ```
64
define data analytics
The process of acquiring/extracting data from a source, analysing said data to find meaningful trends/patterns, and then presenting the data in a clear and unambiguous way.
65
define data visualisation
The process of visualizing complex data usually in the form of different charts
66
Define Design thinking
A way of thinking critically and creatively to generate and evaluate innovative ideas
67
what are the Benefits of a DRP (disaster recovery plan)
+Provides a sense of security and confidence +Prevents further problems caused by panic and disorganization +Reduces uncertainty for additional decisions +Neatly explains new procedures to employees +speeds up reaction to disasters saving time and resources
68
what is the internet of things (IOT)
A network formed by 'smart devices' that connect to the internet
69
Targeting and Audience Includes:
``` Includes: Being gender inclusive Being Culturally inclusive Applying common language Being Age Appropriate ```