Data Analytics S - Z Flashcards

1
Q

Sample size

A

The number of completed responses that you collect from interviews or surveys; the more responces completed, the more likely the data being collected is accurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sans Serif

A

Literally (without serif), which are the small lines at the end of typefaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scatter graph

A

visualisation to show a series of points on a graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Scope

A

statement made about what WILL and WILLNOT be included in a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Search

A

Finding relevant records in a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Second Normal Form (2NF)

A

A table that is in 1NF and any column that is not part of the primary key is dependent on the whole primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secondary Data

A

data collected by someone other than the researcher, which has often been processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Control

A

A measure to protect data and information from threats, either accidental, deliverate, or event-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security protocol

A

A set of rules or guidelines for communicating data securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sensor

A

A data gathering method to electronically obtain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sensor data

A

data acquired or generated by machines monitoring particular conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

serif

A

The small lines at the end of letters in typefaces like TimesNewRoman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Server

A

A device that is used to provide services to other devices connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shredding

A

Cutting documents OR HARDWARE into strips or pieces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Skewed result

A

The frequency of responces by the population is not evenly distributed, rather it ‘leans’ in a direction on the x or y axis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Slack time

A

The length of time that a task runs overtime before it affects other tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social Constraint

A

Limitation imposed by social considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Software security controls

A

Software based measures that are used to protect data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Solid State Drives (SSD)

A

A disk with no moving parts; SSDs have an estimated lifetime dependent on the number of read/write actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Solution Requirements

A

What the client wants from the solution; can be broken down into functional and non functional requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Sort

A

Arranging all records in order (a-Z, Z-A) either descending or ascending numerally or alphabetically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Sound Data

A

Any audio capture being used in a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Spreadsheet

A

Software tool for performing calculations and generating charts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Standalone device

A

A piece of computing equipment that can perform its function without the need of another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Static Visualisation
A visualisation that does not change after the initial analysis and development of the presentation
26
Statistical Infographic
A visual that combines images with statistics to improve visual appeal
27
Storage Hardware
The physical location for your files to be held for later access; this may now include cloud storage where the storage drives are remote from your computer device (RAID, etc)
28
Stream graph
Visualisation that shows the relative levels of several variables over time
29
Subjective
Based on opinion, emotion or personal judgement; (I.E. Is that salesperson friendly?) Opposite of objective
30
Successor
Task that must be completed after another task in gantt chart
31
Survey
Data Acquisition technique involving a series of set questions, often completed online by large numbers of respondants
32
survey distortion
when survey results are influenced by external factors
33
Switch
A device used to connect multiple devices to a network
34
Symmetric encryption
Requires both the sender and the receiver to use the same private key
35
System Goal
The specific role of the information system in achieving the organizational goal, and ultimately the company's mission
36
System Protection Software
Contains a number of smaller software applications, that combined will assist in protecting an information system or device from a range of threats (malware, etc)
37
Table
A place in a database that holds data about a single person, place or thing
38
Technical Constraints
A limitation imposed by hardware or software on the solution
39
Technical Protocol
A protocol that is used to ensure that devices on a network can communicate with each other
40
Test Data
A set of data that has been specifically formulated to reveal defect in software solutions
41
Test plan
A techniques for recording tests to be carried out and the results of the tests; typically, a test plan states the type of test, what test data will be used, what results are expected and ultimately, the actual results
42
testing
Ensuring that something works as intended and checking the accuracy of information outputs; that they are correct with no errors, or that any errors can be dealt with without inconveniencing the user
43
testing table
A table set up to record functionality testing (what will be tested, how it will be tested and what the expected result will be if the elements work as expected)
44
text data type
data that consists of a string of Characters
45
theoretical coding
The means by which labels are applied to transcripts of text
46
Third Normal Form (3NF)
A table that is in 2ND and any column that is not part of the primary key is dependant only on the primary key and no other column
47
Threat
Anything with the potential to cause harm to data and information stored and communicated between information systems
48
Time Visualisation
A visual that represents a data item or data set over a period of time
49
Timeliness
Data that has been collected in a reasonable timeframe(not too old) and information that has been produced in time to be useful
50
TCP/IP Transmission Control Protocol/Internet Protocol
The protocol used to connect devices on the internet; some cabled networks also use TCP/IP rather than Ethernet; TCP/IP sends data in packets.
51
Type Check
A validation Rules that checks that only the correct data type is accepted
52
Unshielded twisted pair (UTP)
Used in most wired networks; wires are twisted into pairs to reduce signal interference
53
Usability
A measure of how useful and usable a solution is
54
User Acceptance Testing (UAT)
The phase of software testing where it is determined whether the solution functions according to specifications using real-world scenarios
55
User Error
Any error that has been caused by the user, rather than due to the hardware or software not working as expected
56
Username and Password
Also known as login, a unique combination of characters/words/phrases that identifies someone on a computer system
57
Validation
Checking that data input is reasonable
58
Validation Technique
Checking that data input is reasonable, which is an activity within the development state of the PSM Problem solving methodology - Analysis Design Development and Evaluation). Typically used for existence, range and type checking
59
Verification
The process of checking that the final product software meets the requirements detailed in the Design state of the PSM
60
Version Control
Management of files and software so only one version of the most up-to-date file is in existence at a time and so that major reworkings can be reversed if needed
61
Vested Interest
Where an individual, group or organisation has an investment or interest in an issue and stands to gain or lose from it
62
Weather data
Data produced about weather or climate or water
63
Web Map Service (WMS) file
File format that provides map images over the internet
64
Weblog / Blog
An online journal or diary with date and timestamps; files and images can be uploaded as evidence of progress
65
Wide Area Network (WAN)
A network that is located in more than one geographical location
66
Wiped
When data is scrubbed and overwritten with 1's and 0's
67
Wired Network
A network where the devices are connected using a physical cable(s)
68
Wireless access points (WAP)
A device that allows other devices to wirelessly connect to an existing wired network
69
Wireless network
A computer network that uses wireless data transfer between networked devices
70
Word Cloud
A visualisation technique of data that is word based (qualitative)
71
Work Breakdown Structure (WBS)
Breaking down your project into achievable tasks
72
XLM or XLSX File
An excel spreadsheet file format
73
Zoned Security Strategy
Security Protocol that involves breaking down a network into discrete sections or zones to limit damage caused by security threats
74
802.11 protocol
A protocol used on wireless networks ; data travels in Frames ( like ethernet ; not packets)