IT Chapter 1 Flashcards

information technology (81 cards)

1
Q

what is data

A

raw data has no meaning , has no context, isnt pocessed yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is information

A

it is data that has been given meaning, has context and is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how is data stored

A

in binary digits 1=8bites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is direct data

A

data that is collected for a purpose and used for that purpose only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is indirect data

A

data collected from a third party and used for a different purpose from what it was collected for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the direct data sources

A

questionnaire, interview ,data logging , observation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe questionnaires

A

consists of questions on a specific issue
questions could be closed end or open ended
easy to distribute
complete
easy familiar process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe interviews

A

It’s a formal meeting usually between 2 people, done face to face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

observation

A

data collectors watch what is happening in a given situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data logging

A

the use of sensors to collect data
Data is collected over a period of time
faster and more accurate than humans
could be put in dangerous areas
the data is directly sent to the computer automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the factors that affect the quality of the information?

A

Accuracy, Age of data, completeness, relevance & level of detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the accuracy of information

A

it depends on the accuracy of the data and how it was collected
transposed errors and transcript error could affect the data accuracy
validation & verification is used to reduce errors and increase accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is transposed error

A

when data copied there was an error in coping down the information in the correct way
ex.26 was copied as 62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is transcript error?

A

when transfering data from one medium to another an error happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Relevance of information.

A

data must meet requirements
relevance Matters if data collected was irrelevent then there was a waste of time & money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Age of data/ info

A

Data needs to be updated inorder not to cause inaccuracy
the data needs to be updated regularly
old info causes wrong decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Level of detail

A

the details should be in the right amount not too much nor too less.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

completeness

A

the data needs to be complete to avoid gaps collecting more data could be a great decision to avoid these gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

need of encryption

A
  1. to avoid fraud
  2. to avoid identity theft
  3. to avoid black Mailing
  4. to avoid ransom
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

describe encryption

A

it is away of scrambling data in a way that only authorised people can understand the information
it is a process of converting info. to a code that is imposible to understand without a decryption key
it is used when storing data or when transmitting data across the internet.
Doesnt prevent hackers from intercepting the data it only stops them from understanding it
it is a Process of converting plaintext to cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

where the “authorised” people

A

they’re people who have the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

encrypting the data

A

to encrypt the data we need encryption key and encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

to decrypt the data

A

we need decryption key and decryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is encryption algorithm

A

it is a program that converts plain text to cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what is decryption algorithm
it is a program that converts cipher text to plain text
26
what are the 2 types of encryption
symmetric & asymmetric
27
what is symmetric encryption
the sender & reciever have the same key to encrypt & decrypt the data it is mostly used when storing On a harddisk key private key
28
what is asymmetric encryption
an encryption that uses I different keys 1. public key to encrypt data 2. private key to decrypt the data used mostly for encrypting emails it is more secure yet slow process
29
2 other names for symmetric encryption
secret key encryption private key encryption
30
what happens in an SSL / TLS handshake
1. client sends a message to the server to set connection & to agree on the rules of communication and on what ss L/ TLS version should be used 2, server shows digital certificate to the Client 3. client checks if certificate is valid and authentic 4. client obtains servers public key to encrypt a new random secret key (session key) . to be used throughout the session 5. the server decrypts the session key by the private key
31
encrypting a hard disk
1. backup the data before the encryption process 2. choose the encryption software that meets the security needs and is compatable with your os 3. select if you want to encrypt the whole hard disk or specific partitions only 4. set a strong password (private key) 5. Begin the encryption process& wait till complete 6. store the recovery key.
32
Adv of encryption
avoid ransom ,identity theft, fraud company secrets wont be hacked & sold to competitors
33
DISADV of encryption
it takes time to load the encrypted data & requires additional processing power uses more valuable memory for both client& sever if private key is lost it is difficult to recover the data(may be cost perminantly)
34
SSL /TLS VS Ipsec
digital certificate only needed in sst ItIs for sever only while both certificates are needed in ipsec so ipsec is more secure VPN is Only for lP sec SSL /TLS saves Money because Client doesnt need digital Certificate
35
the purpose of SSL/ TL S
enable protection/ encryption make sure that the businesses say who they say they are ensures data integrity
36
what information does a digital certificate hold?
1. Domain name 2. which org was the certificate issued for 3. expiery date 4. public key
37
what is the purpose of a digital certificate?
to verify the ownership of the website to avoid fraud
38
what are the types of data
1- Numeric 2. Boolean 3- Alphanumeric 4. Date/ time 5. currency
39
what is validation?
the process to ensure the data being entered is sensible , meets certain criteria or standards
40
what is verification
the process of confirming the accuracy& consistancy & integrity of the data When it is entered into the computer or transfered from 1 medium to another to ensure it is reliable & free of error
41
What are the validation methods
presence check Range check Type/ character check length checks format / picture check limit check Lookup check consistancy check check digit
42
presence check
Data must not be skipped or left out applied on any datatype
43
Range check
checks if the data is within a specified range of values/2 boundaries on numeric & Date/ time
44
Type/ character check
ensures that the data entered is of a particular type numeric & Date/ time
45
length check
ensures that the data has the correct number of characters Alphanumeric
46
format or Picture check
ensures a specific combination of characters that must be followed Alphanumeric & Date /time
47
Limit check
checks that the date is greater than or less than a preset valve One boundary, One boundary numiric& date/ time
48
Lookup check
compares data that has been entered witha limited set of valid entries. if it matches one of these then it is allowed if it doesnt then an error isge will be displayed any data type
49
consistancy check
when the valve of 2 different lds depend on each other it checks that the data across the two field is consistant Any datatype
50
digit check
a single digit added to a numerical value or alphanumeric code to verify the accuracy of the code to detect to check errors numeric/ alphanumeric
51
differance between validation & verification
validation checks if data is sensible or not- verification checks if the dat has been copied or entered correctly validation caried out by computer- verification done by computer/ human validation doesnt tell if the data has been copied correctly or not verification could alert the user if an error occurs
52
what are the methods of verification.
visual checking double data entry parity check checksum Hash total control total
53
visual checking
the user checks visually if the data entered Matches the original source
54
weakness for visual check
it doesnt ensure if data entered is correct
55
Double data entry (DDE)
inputting the data into the system twice the data will be compared by the system if they match then it. verified
56
weakness of DDE
the data could be entered incorrectly twice
57
parity check
used to find errors during data transmission
58
what are the 2 types of parity check
1. even parity : a bit is added to parity making even numbers of 1's at the endat the end 2. odd parity: bit added to the end ofthe byte making an odd number of 1 's
59
weakness of parity check
an error will not apear if the data is transposed
60
check sum
calculation result of entire file to check it has been transmitted Or copied correctly
61
weakness of checksum
wouldn't notice if2 or more bytes were swapped.
62
what are the types of algorithm in checksum
1. MD5 2. SHA-1 3. SHA-2 4. SHA-3
63
Hash total
A calculation calculated bll adding together values from an input field for all the correct records that need to be input
64
control total
same as hash total but only carried on numeric fields.
65
weakness of hash & control total
if 2 numbers are transposed an error will occur but will not be picked up by them (controls)
66
Data processing
an activity that manipulates or carries out operation on data (delete, add, change)
67
the 3 types of data processing
1. Batch processing 2. online processing 3. real time processing
68
what is batch processing
transactions that need to be preformed on the data are collected together into a batch , the system automatically carries out all the transactions & uplates the data file
69
ADV's of batch processing
- effective for processing large volumes of data - data is processed all together & not one by one - Requires very little /no human interaction
70
Examples of batch
1. automated backups 2- employee wages 3. customer order & stock control 4.customer billing(bills at end of month) 5. processing checks
71
what's a master file
a file that stores data that doesnt change often
72
what's a transaction file?
a file that usually stores data that changes every day or week
73
Algorithm example⇒ Batch
a. validate b. sort according to master file C. read records d. compare e. if match do calculation if don't match copy as is f.read next until EOF g. copy any of data remaining in old master file to new.
74
another name for online processing
interactive processing
75
online processing
user inputs data the computer responds until the user saves the data (almost immediately) one transaction at a time.
76
Differance between batch & online processing
Data searching: Batch: sequential access online: direct access when does the process begin: Batch: gathering data and process it all together in batches online: process is done almost immediately amount of data: batch: huge amount of data online: one transaction at a time
77
Example of online processing
1. online booking 2. EFT (electronic funds transfer) 3.online stores 4. Automatic stock control 5. electronic data exchange 6. B2B buying & selling
78
Real-time- processing
system processes data as soon as it has been input used when immediacy of data is vital usually found in systems that use sensors
79
Examples of real time processing
1. Air traffic control 2. online computer games 3. Rocket guidance systems
80
ADV of real time p
no delay information always upto date instant data collection
81
Dis ADV of real time P
needs expensive & complex computer systems continuously occupies cpu⇒ very expensive