IT Chapter 1 Flashcards

information technology

1
Q

what is data

A

raw data has no meaning , has no context, isnt pocessed yet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is information

A

it is data that has been given meaning, has context and is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how is data stored

A

in binary digits 1=8bites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is direct data

A

data that is collected for a purpose and used for that purpose only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is indirect data

A

data collected from a third party and used for a different purpose from what it was collected for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the direct data sources

A

questionnaire, interview ,data logging , observation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

describe questionnaires

A

consists of questions on a specific issue
questions could be closed end or open ended
easy to distribute
complete
easy familiar process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe interviews

A

It’s a formal meeting usually between 2 people, done face to face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

observation

A

data collectors watch what is happening in a given situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data logging

A

the use of sensors to collect data
Data is collected over a period of time
faster and more accurate than humans
could be put in dangerous areas
the data is directly sent to the computer automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the factors that affect the quality of the information?

A

Accuracy, Age of data, completeness, relevance & level of detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe the accuracy of information

A

it depends on the accuracy of the data and how it was collected
transposed errors and transcript error could affect the data accuracy
validation & verification is used to reduce errors and increase accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is transposed error

A

when data copied there was an error in coping down the information in the correct way
ex.26 was copied as 62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is transcript error?

A

when transfering data from one medium to another an error happens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Relevance of information.

A

data must meet requirements
relevance Matters if data collected was irrelevent then there was a waste of time & money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Age of data/ info

A

Data needs to be updated inorder not to cause inaccuracy
the data needs to be updated regularly
old info causes wrong decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Level of detail

A

the details should be in the right amount not too much nor too less.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

completeness

A

the data needs to be complete to avoid gaps collecting more data could be a great decision to avoid these gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

need of encryption

A
  1. to avoid fraud
  2. to avoid identity theft
  3. to avoid black Mailing
  4. to avoid ransom
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

describe encryption

A

it is away of scrambling data in a way that only authorised people can understand the information
it is a process of converting info. to a code that is imposible to understand without a decryption key
it is used when storing data or when transmitting data across the internet.
Doesnt prevent hackers from intercepting the data it only stops them from understanding it
it is a Process of converting plaintext to cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

where the “authorised” people

A

they’re people who have the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

encrypting the data

A

to encrypt the data we need encryption key and encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

to decrypt the data

A

we need decryption key and decryption algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is encryption algorithm

A

it is a program that converts plain text to cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is decryption algorithm

A

it is a program that converts cipher text to plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what are the 2 types of encryption

A

symmetric & asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is symmetric encryption

A

the sender & reciever have the same key to encrypt & decrypt the data
it is mostly used when storing On a harddisk
key private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is asymmetric encryption

A

an encryption that uses I different keys
1. public key to encrypt data
2. private key to decrypt the data
used mostly for encrypting emails
it is more secure yet slow process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

2 other names for symmetric encryption

A

secret key encryption
private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what happens in an SSL / TLS handshake

A
  1. client sends a message to the server to set connection & to agree on the rules of communication and on what ss L/ TLS version should be used
    2, server shows digital certificate to the Client
  2. client checks if certificate is valid and authentic
  3. client obtains servers public key to encrypt a new random secret key (session key) . to be used throughout the session
  4. the server decrypts the session key by the private key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

encrypting a hard disk

A
  1. backup the data before the encryption process
  2. choose the encryption software that meets the security needs and is compatable with your os
  3. select if you want to encrypt the whole hard disk or specific partitions only
  4. set a strong password (private key)
  5. Begin the encryption process& wait till complete
  6. store the recovery key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Adv of encryption

A

avoid ransom ,identity theft, fraud
company secrets wont be hacked & sold to competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DISADV of encryption

A

it takes time to load the encrypted data & requires additional processing power
uses more valuable memory for both client& sever
if private key is lost it is difficult to recover the data(may be cost perminantly)

34
Q

SSL /TLS VS Ipsec

A

digital certificate only needed in sst ItIs for sever only while both certificates are needed in ipsec
so ipsec is more secure
VPN is Only for lP sec
SSL /TLS saves Money because Client doesnt need digital Certificate

35
Q

the purpose of SSL/ TL S

A

enable protection/ encryption
make sure that the businesses say who they say they are
ensures data integrity

36
Q

what information does a digital certificate hold?

A
  1. Domain name
  2. which org was the certificate issued for
  3. expiery date
  4. public key
37
Q

what is the purpose of a digital certificate?

A

to verify the ownership of the website to avoid fraud

38
Q

what are the types of data

A

1- Numeric
2. Boolean
3- Alphanumeric
4. Date/ time
5. currency

39
Q

what is validation?

A

the process to ensure the data being entered is sensible , meets certain criteria or standards

40
Q

what is verification

A

the process of confirming the accuracy& consistancy & integrity of the data When it is entered into the computer or transfered from 1 medium to another to ensure it is reliable & free of error

41
Q

What are the validation methods

A

presence check
Range check
Type/ character check
length checks
format / picture check
limit check
Lookup check
consistancy check
check digit

42
Q

presence check

A

Data must not be skipped or left out
applied on any datatype

43
Q

Range check

A

checks if the data is within a specified range of values/2 boundaries
on numeric & Date/ time

44
Q

Type/ character check

A

ensures that the data entered is of a particular type
numeric & Date/ time

45
Q

length check

A

ensures that the data has the correct number of characters
Alphanumeric

46
Q

format or Picture check

A

ensures a specific combination of characters that must be followed
Alphanumeric & Date /time

47
Q

Limit check

A

checks that the date is greater than or less than a preset valve One boundary, One boundary
numiric& date/ time

48
Q

Lookup check

A

compares data that has been entered witha limited set of valid entries. if it matches one of these then it is allowed if it doesnt then an error isge will be displayed
any data type

49
Q

consistancy check

A

when the valve of 2 different lds depend on each other it checks that the data across the two field is consistant
Any datatype

50
Q

digit check

A

a single digit added to a numerical value or alphanumeric code to verify the accuracy of the code to detect to check errors
numeric/ alphanumeric

51
Q

differance between validation & verification

A

validation checks if data is sensible or not- verification checks if the dat has been copied or entered correctly
validation caried out by computer- verification done by computer/ human
validation doesnt tell if the data has been copied correctly or not verification could alert the user if an error occurs

52
Q

what are the methods of verification.

A

visual checking
double data entry
parity check
checksum
Hash total
control total

53
Q

visual checking

A

the user checks visually if the data entered Matches the original source

54
Q

weakness for visual check

A

it doesnt ensure if data entered is correct

55
Q

Double data entry (DDE)

A

inputting the data into the system twice
the data will be compared by the system if they match then it. verified

56
Q

weakness of DDE

A

the data could be entered incorrectly twice

57
Q

parity check

A

used to find errors during data transmission

58
Q

what are the 2 types of parity check

A
  1. even parity : a bit is added to parity making even numbers of 1’s at the endat the end
  2. odd parity: bit added to the end ofthe byte making an odd number of 1 ‘s
59
Q

weakness of parity check

A

an error will not apear if the data is transposed

60
Q

check sum

A

calculation result of entire file to check it has been transmitted Or copied correctly

61
Q

weakness of checksum

A

wouldn’t notice if2 or more bytes were swapped.

62
Q

what are the types of algorithm in checksum

A
  1. MD5
  2. SHA-1
  3. SHA-2
  4. SHA-3
63
Q

Hash total

A

A calculation calculated bll adding together values from an input field for all the correct records that need to be input

64
Q

control total

A

same as hash total but only carried on numeric fields.

65
Q

weakness of hash & control total

A

if 2 numbers are transposed an error will occur but will not be picked up by them (controls)

66
Q

Data processing

A

an activity that manipulates or carries out operation on data (delete, add, change)

67
Q

the 3 types of data processing

A
  1. Batch processing
  2. online processing
  3. real time processing
68
Q

what is batch processing

A

transactions that need to be preformed on the data are collected together into a batch , the system automatically carries out all the transactions & uplates the data file

69
Q

ADV’s of batch processing

A
  • effective for processing large volumes of data
  • data is processed all together & not one by one
  • Requires very little /no human interaction
70
Q

Examples of batch

A
  1. automated backups
    2- employee wages
  2. customer order & stock control
    4.customer billing(bills at end of month)
  3. processing checks
71
Q

what’s a master file

A

a file that stores data that doesnt change often

72
Q

what’s a transaction file?

A

a file that usually stores data that changes every day or week

73
Q

Algorithm example⇒ Batch

A

a. validate
b. sort according to master file
C. read records
d. compare
e. if match do calculation
if don’t match copy as is
f.read next until EOF
g. copy any of data remaining in old master file to new.

74
Q

another name for online processing

A

interactive processing

75
Q

online processing

A

user inputs data the computer responds until the user saves the data (almost immediately)
one transaction at a time.

76
Q

Differance between batch & online processing

A

Data searching:
Batch: sequential access
online: direct access
when does the process begin:
Batch: gathering data and process it all together in batches
online: process is done almost immediately
amount of data:
batch: huge amount of data
online: one transaction at a time

77
Q

Example of online processing

A
  1. online booking
  2. EFT (electronic funds transfer)
    3.online stores
  3. Automatic stock control
  4. electronic data exchange
  5. B2B buying & selling
78
Q

Real-time- processing

A

system processes data as soon as it has been input
used when immediacy of data is vital
usually found in systems that use sensors

79
Q

Examples of real time processing

A
  1. Air traffic control
  2. online computer games
  3. Rocket guidance systems
80
Q

ADV of real time p

A

no delay
information always upto date
instant data collection

81
Q

Dis ADV of real time P

A

needs expensive & complex computer systems
continuously occupies cpu⇒ very expensive