unit 2 It Flashcards

(97 cards)

1
Q

What is optical media?

A

Optical media are methods of digital information storage, such as CDs and DVDs, that can hold various types of data. They are called optical media because they are written and read by laser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the characteristics of paper as a storage medium?

A

Paper is a traditional form of information storage, including forms, handwritten notes, and maps. However, it is easily damaged, costly to transport, and can be hard to keep secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is magnetic media?

A

Magnetic media uses magnetic patterns to store data, with common examples being magnetic hard drives and tapes, often used for backup or archiving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is solid state media?

A

Solid state media stores data in circuitry rather than on a magnetized disk or tape. An example is an SSD card, which is popular for its speed and does not require air cooling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of storage media?

A

Characteristics include mutability, robustness, access to data, cost, and storage capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What defines handheld devices?

A

Handheld devices are smaller portable devices that can be handheld or worn, such as smartphones and smartwatches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are portable devices?

A

Portable devices can be easily transported, like laptops and tablets, which differ from desktop machines primarily in their portability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are fixed devices?

A

Fixed devices are not designed to be portable, including desktop computers, smart TVs, and game consoles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are shared devices?

A

Shared devices may be accessed by multiple users at a time, such as database servers and cloud storage services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of information storage?

A

Characteristics include processing power, versatility, and storage capacity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the internet?

A

The internet is a worldwide network of interconnected networks that is publicly accessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an intranet?

A

An intranet is a private network not connected to the internet, available only to those within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an extranet?

A

An extranet is a website providing restricted access to resources for authorized users outside an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are web pages?

A

Web pages are fundamental information formats on the internet, which can be static or dynamic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are blogs?

A

Blogs are originally personal web pages that have evolved into themed platforms used by individuals and organizations to share content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are podcasts?

A

Podcasts are audio or video files that can be downloaded or streamed, often produced as standalone presentations or series.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is streamed audio and video?

A

Streamed audio and video are features on the internet that allow real-time or catch-up access to content, requiring high bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are social media channels?

A

Social media channels are platforms that allow users to interact and share content, serving as significant sources of data for marketing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are document stores?

A

Document stores, also known as cloud storage, allow users to upload, download, and sync files online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are RSS feeds?

A

RSS feeds provide small amounts of information that can be relevant for a short time, enabling easy dissemination of updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an animated graphic?

A

An animated graphic is an image with moving elements, useful for instructions and presentations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is braille text?

A

Braille text is a writing system using dots that can be read by touch, aiding visually impaired individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are tactile images?

A

Tactile images allow viewers to feel shapes through touch, used in various educational and sensory applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Boolean information?

A

Boolean information can only exist in one of two forms, such as yes/no or true/false.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is sensitive information?
Sensitive information should not be publicly available as it could cause harm if released.
26
What is non-sensitive information?
Non-sensitive information includes data that does not pose a risk if disclosed, such as business addresses.
27
What is private information?
Private information pertains to individuals or organizations and is protected under data protection laws.
28
What is public information?
Public information includes data about government and publicly owned organizations.
29
What is personal information?
Personal information is private data about an individual, such as their phone number.
30
What is business information?
Business information includes data about organizations, such as annual sales figures.
31
What is confidential information?
Confidential information is private data that must be kept secure and has more restrictions than sensitive information.
32
What is classified information?
Classified information is public data that should be kept private, such as patient databases.
33
What is anonymized information?
Anonymized information has had all links to the source removed, while partially anonymized data retains some identifying elements.
34
Who are stakeholders?
Stakeholders are individuals or groups impacted by an organization's actions, both internal and external.
35
What are the impacts of information quality on stakeholders?
Good quality information leads to better decisions and clear objectives, while poor quality can result in bad decisions and damage to reputation.
36
What is information management?
Information management involves collecting, storing, retrieving, manipulating, and analyzing data.
37
What is information?
Information is data processed within a context to give it meaning.
38
What is data?
Data consists of raw facts and figures that lack meaning on their own.
39
What are data tables?
Data tables use primary and foreign keys to link related information, allowing for queries and cross-referencing.
40
What is data visualization?
Data visualization uses charts and graphs to present data visually, making patterns and trends easier to understand.
41
What is data location mapping/tracking?
Data location mapping allows tracking of parcels or staff, enhancing customer service and planning.
42
What is data organization, manipulation, and cleansing?
Data organization involves sorting, while cleansing removes unnecessary data to improve efficiency.
43
What is a data set?
A data set is a group of related data, often used in database tables.
44
What is data analysis?
Data analysis is the process of examining, cleansing, and transforming data into a model.
45
What is big data?
Big data refers to large sets of data analyzed to produce information, such as trends.
46
What are categories of information used by individuals?
Categories include communication, education, entertainment, planning, financial, research, and location-dependent information.
47
What are categories of information used by organizations?
Categories include knowledge management, MIS, marketing, financial analysis, contact management, decision making, and big data.
48
What does the Data Protection Act 1998 govern?
It governs how organizations collect, process, and store private data, ensuring fair and lawful processing.
49
What does the Regulation of Investigatory Powers Act 2000 cover?
It covers the powers of public bodies to conduct investigations and surveillance, including communication interception.
50
What is the Protection of Freedoms Act 2012?
This act strengthens the Freedom of Information Act and regulates the handling of DNA and other personal data.
51
What does the Freedom of Information Act 2000 provide?
It grants the public the right to access information about activities carried out by public authorities.
52
What do the Privacy and Electronic Communications Regulations 2003 govern?
They govern how organizations can use electronic communications to contact customers, focusing on privacy.
53
What does the Computer Misuse Act 1990 cover?
It addresses unauthorized access to computer material and systems, and unauthorized modification of computer data.
54
What are the Information Commissioner's Office codes of practice?
These codes interpret the Data Protection Act and apply it to specific practices, such as CCTV usage.
55
What does the Copyright Designs and Patents Act 1998 provide?
It grants creators control over their work and restricts others from using it without permission.
56
What is the Equality Act 2001?
This act protects UK citizens from discrimination and consolidates previous legislation into one comprehensive act.
57
What is the Safe Harbor Scheme?
A U.S. Department of Commerce initiative that provides protection for UK data stored in the U.S. under certain conditions.
58
What does the UN Convention on the Rights of Persons with Disabilities recognize?
It recognizes the right to access information systems and use digital means for expression.
59
What is green IT?
Green IT aims to make computing more environmentally friendly.
60
What are UN climate change summits?
Annual meetings to discuss and manage climate change threats.
61
What is the UK government policy on green ICT?
The 2001 Greening Government ICT strategy commits to adopting greener policies across government departments.
62
What is a carbon footprint?
The environmental impact of organizations and individuals.
63
What is a digital footprint?
Any traceable action taken on the internet by individuals or others.
64
What is an internal source of information?
Information that comes from within an organization.
65
What is an external source of information?
Information that comes from outside the organization.
66
What is primary data?
Primary data is original data collected for a specific purpose.
67
What is the purpose of UN climate change summits?
Annual meetings that discuss climate change and ways in which the threat can be reduced and managed.
68
What commitment did the UK government make in 2001 regarding ICT?
The greening government ICT strategy made a commitment to adopt more green policies across government departments.
69
What is a carbon footprint?
The impact of organisations and individuals on the environment.
70
What is a digital footprint?
Any traceable action you or others take on the internet.
71
What is an internal source?
Information that comes from within an organisation.
72
What is an external source?
Information that comes from outside the organisation.
73
What is primary data?
Data that you collect, rather than buy from a third party.
74
What is secondary data?
Data that has been collected by others outside of the organisation.
75
What is qualitative data?
Data that can be captured that is not numerical in nature. ## Footnote Example: the hair colours of your classmates.
76
What is quantitative data?
Data that has been gathered by measurement. ## Footnote Example: the number of staff working in an organisation.
77
What are data flow diagrams?
Models that show how data flows through a system.
78
What is a level 0 DFD?
Sometimes called 'context diagrams', they show a data system in little detail but allow the user to get an idea of how data flows through a system as a whole.
79
What is a level 1 DFD?
DFDs that focus on one system and are therefore in more detail than a level 0 DFD.
80
What are external entities in a DFD?
Sources of the data that is inputted into the system and those to whom data is output is sent and who are also external to the system itself.
81
What are processes in a DFD?
Ways in which the data system is collated.
82
What are data stores in a DFD?
Represent any real-world store of data held in the system.
83
What are data flows in a DFD?
The flows of data between the entities and the processes.
84
What are the standard symbols used in DFDs?
External entity, process, data flow, data store.
85
What are the connectivity rules for drawing level 1 DFDs?
At least one input or output for each external entity; data only flows in one direction; every data flow is labelled; every data flow connects to at least one data process; at least one input data flow and/or at least one output data flow for each process.
86
What does CIA stand for in data security?
Confidentiality, Integrity, Availability.
87
What is confidentiality in data security?
Information can only be accessed by individuals, groups or processes authorized to do so.
88
What is integrity in data security?
Information is maintained so that it is up to date, accurate, complete and fit for purpose.
89
What is availability in data security?
Information is always available to and usable by individuals, groups or processes that need to use it.
90
What are risks to data security?
Unauthorized or unintended access to data, accidental loss of data, intentional destruction of data, intentional tampering with data.
91
What are the impacts to data security?
Loss of intellectual property, loss of service and access, failure in security of confidential information, loss of information belonging to a cloud party, loss of reputation, threat to national security.
92
What are data protection measures?
Policies that allow for data to be protected, including staff access rights and training on data handling.
93
What is a data recovery policy?
How data should be backed up to protect against deletion or corruption and is a part of a disaster recovery policy.
94
What are physical protection measures?
Locks, keypads, and biometrics; placing computers above known flood levels; backup systems in other locations; security staff; shredding old paper-based records.
95
What are logical protection measures?
Tiered levels of access to data; firewalls; antimalware applications; obfuscation; encryption of data in transit; password protection.
96
What do firewalls do?
Monitor traffic in and out of a network and refuse passage of any that does not meet rules.
97
What is obfuscation?
Purposefully making something unintelligible so it cannot be understood.