cpt Flashcards

(55 cards)

1
Q

[Database Management] What is data warehousing?

A

A system for storing and analyzing large volumes of historical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[Database Management] How does a database differ from a data warehouse?

A

Databases handle real-time transactions; data warehouses support analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

[Database Management] What is data mining?

A

The process of extracting patterns and knowledge from large data sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

[Database Management] List forms of data collection.

A

Forms, RFID tags, cookies, transaction tracking, mobile data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

[Database Management] What are examples of invisible online data collection?

A

Cookies, mobile location tracking, sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

[Database Management] List ways to protect data.

A

Validation, verification, access control, logging, warehousing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[Database Management] What is metadata?

A

Data that describes other data, such as format, time of creation, author.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[Database Design Concepts] What are key features of a good database?

A

Integrity, independence, low redundancy, security, easy maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[Database Design Concepts] What is a primary key?

A

A field that uniquely identifies a record in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

[Database Design Concepts] What is a foreign key?

A

A field in one table that refers to the primary key of another table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

[Database Design Concepts] What is normalization?

A

Organizing data to eliminate redundancy and improve integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

[Database Design Concepts] What is a composite key?

A

A primary key made up of two or more fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

[Database Design Concepts] What are anomalies in databases?

A

Problems such as redundancy or inconsistency in poorly designed databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

[Systems Technologies: Hardware] What is mobile technology?

A

Portable computing devices like smartphones, tablets, laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

[Systems Technologies: Hardware] List advantages of mobile devices.

A

Lightweight, portable, access anywhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

[Systems Technologies: Hardware] List constraints of mobile technology.

A

Limited battery, performance, and screen size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

[Systems Technologies: Hardware] What affects computer performance?

A

CPU/GPU speed, RAM, cache, storage type/speed, NIC speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

[Systems Technologies: Hardware] Why use a specific computer setup?

A

To match user needs like gaming, office work, or data analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

[Systems Technology: Software] What is cloud computing?

A

Online storage and computing services, e.g., Google Drive, OneDrive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

[Systems Technology: Software] What is SaaS?

A

Software as a Service, accessed via the Internet without installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

[Systems Technology: Software] What is virtual reality?

A

A simulated environment using hardware like headsets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

[Systems Technology: Software] What is augmented reality?

A

Overlaying digital elements onto the real world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

[Systems Technology: Software] What is virtualisation?

A

Creating virtual versions of hardware/software resources.

24
Q

[Social Implications] How does mobile tech impact privacy?

A

Data collection, tracking, data sharing without consent.

25
[Social Implications] What are cyber crimes?
Phishing, malware, identity theft, ransomware.
26
[Social Implications] Name types of internet-related attacks.
Worms, DoS, backdoors, botnets, spoofing.
27
[Social Implications] What safeguards exist for cybercrime?
Firewalls, anti-virus, encryption, passwords.
28
[Social Implications] Right to access vs. right to privacy?
Balancing public information access with personal data protection.
29
[Programming and SQL] What does SQL SELECT do?
Retrieves data from one or more tables.
30
[Programming and SQL] What is an SQL JOIN?
Combines rows from multiple tables using related columns.
31
[Programming and SQL] What is the WHERE clause used for?
Filtering records based on specific conditions.
32
[Programming and SQL] List SQL aggregate functions.
SUM, AVG, COUNT, MAX, MIN.
33
[Programming and SQL] What does GROUP BY do?
Groups rows sharing a property to apply aggregate functions.
34
[Programming and SQL] What are SQL wildcards?
Symbols like %, _ used in pattern matching with LIKE.
35
[Programming and SQL] What are parameter queries?
SQL queries that accept input from users.
36
[Programming and SQL] What are SQL date functions?
Functions like DAY(), MONTH(), YEAR(), DATE().
37
[Object-Oriented Programming] What is a constructor?
A method used to initialize an object when created.
38
[Object-Oriented Programming] Define accessor and mutator methods.
Accessors return field values; mutators modify them.
39
[Object-Oriented Programming] What is ToString used for?
Returns a string that represents the object.
40
[Object-Oriented Programming] What is encapsulation?
Hiding data by making attributes private and using methods to access.
41
[Object-Oriented Programming] What is instantiation?
Creating an actual object from a class.
42
[Arrays and Data Structures] What is a 2D array?
A grid-like structure with rows and columns.
43
[Arrays and Data Structures] How do you loop through a 2D array?
Using nested loops.
44
[Arrays and Data Structures] What operations can you perform on a 2D array?
Row/column sums, search, edit values.
45
[Networks and Internet] What is a switch?
A device that connects network devices and directs data.
46
[Networks and Internet] What is a router?
Connects networks and directs internet traffic.
47
[Networks and Internet] What is VPN?
Virtual Private Network, creates secure remote connections.
48
[Networks and Internet] What is BitTorrent?
A peer-to-peer file-sharing protocol.
49
[Networks and Internet] List online services examples.
Dropbox, GSuite, Office365, remote desktop.
50
[E-Communication and Security] What is SSL?
Secure Sockets Layer encrypts data for safe transmission.
51
[E-Communication and Security] What is a digital certificate?
Verifies a website's identity and enables encryption.
52
[E-Communication and Security] What is a firewall?
A system that prevents unauthorized access to or from a network.
53
[General Concepts] How to choose a computer?
Consider CPU, RAM, storage, usage needs.
54
[General Concepts] What are benefits of knowing IT basics?
Solve problems, make informed tech decisions, protect data.
55
[General Concepts] How can technology help career paths?
Enables remote work, automation, communication, data analysis.