Managing data Flashcards

(60 cards)

1
Q

backup plan and test plan

A

backup -organises how equipment will continue information processing.
test -A test plan contains information for simulating various levels of disasters and recording an organisation’s ability to recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The emergency plan

A

 Computer procedures
 Employee evacuation
 Return procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The recovery plan

A

The recovery plan specifies the actions to be taken to restore full information processing operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audit trail

A

For the Information Technology industry, the term is used to track computer activity by also using data in paper and digital form.In computer and network terms, an audit trail is a time-stamped record of significant activities on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Audit trail keeps what?

A

record of data accesses - - logging file creation, reading, updating and deleting (“CRUD” activities) for each user. Particularly useful for tracing unauthorized users and uses. They can also be used to assist with information recovery in the event of a system failure.
Audit trails can be used to investigate cybercrimes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

full backup

A

Full backup is the starting point for all other backups and contains all the data in the folders and files that are selected to be backed up. It would be ideal to make full backups all the time, because they are the most comprehensive and are self-contained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key points of full backup

A

 A full backup is a duplicate of your existing data storage system
 It contains the same folders and the same files
 It takes up the most amount of space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pros of full backup

A

Restoration is fast, since you only need one set of backup data.
 You can restore your data from one location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cons of full backup

A

The backing up process is slow and requires high storage requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Differential

A

A differential backup is a copy of al the files or part of files that have changed since the last full backup, even if you identical copies of those files in a previous differential backup. For restoring all data, you will only need the last full backup and the last differential backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

pros of differential

A

 The main advantage if incremental backups are that fewer files are backed up daily, allowing for shorter backup windows.
 The least storage space is needed.
 Quick.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cons of differential

A

 Restoring from incremental backups is the slowest because it may require several sets of data to fully restore all the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Daily

A

Most businesses or organisations would typically do a full backup once a week and then differential or incremental backups on each day in between.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Online data storage

A

Saving data online is very convenient, especially if you use different devices in different locations.It is also very reliable for ease of access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data warehouse

A
  • is a system used for reporting and data analysis. Data Warehouses are central storage places of combined data from one or more different sources.
  • They store current and historical data and are used for creating analytical reports for the company.
    -The data stored in the warehouse is uploaded from the operational systems (such as marketing, sales)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

points about data warehouse

A

 they collect large amounts of data
 they store and manage data for a company
 they work alongside and with data mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data marts

A

Data marts are often built and controlled by a single department within an organisation. Given their single-subject focus, data marts usually draw data from only a few sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Points about data marts

A

 sub-sets of a data warehouse
 a collection point of data from a data warehouse
 usually has data for a specific topic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data in the cloud

A

Instead of installing software and storing files on your device, it is now possible to use cloud computing through central remote servers and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IaaS

A

In this model, a company outsources (rents) the servers and storage they need from a cloud provider. This is usually billed on usage and how much of the resources is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SaaS

A

Instead of users installing an application on their device, SaaS applications are hosted on cloud servers, and users access them over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PaaS

A

In this model, companies don’t pay for hosted applications; instead they pay for the things they need to build their own applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FaaS

A

known as serverless computing, breaks cloud applications down into even smaller components that only run when they’re needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Cloud infrastructure advantage

A

The advantage of this is that we can access our programs and files from any device anywhere in the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cloud infrastructure disadvantage
Disadvantages include data security and privacy of your important files and the dependency on internet services to be able to access your apps and files.
26
Storing data requires
 an internet connection  a username and password  accepting a user agreement.
27
Advantage of data in cloud
- Lower cost - less physical space to house hardware - Easy group collaboration
28
Disadvantage of data in cloud
- Data security - data privacy - loss of data
29
Data mining
 is finding specific data from a large collection of data  is done for business use  is done to find the information, analyse it and then gain financially from it  is related to data warehouses and data marts  is the process of finding information in a data mart or data warehouse  is a source of business intelligence.
30
Data mining has ethical implications
- violation of privacy - exposure of information - junk email
31
Application of data mining
- medical imaging - advertising - antiterrorism
32
Why use data mining
Retailers, banks, manufacturers, telecommunications providers and insurers, among others, are using data mining to discover relationships among everything from pricing, promotions and demographics
33
data security
Data security is hiding your data from other people. It is also protecting your data so only authorised people can see it.
34
Passwords
Passwords grant access to IT resources such as your data, computer, bank account, email, or a server on a network and are designed to limit access to only those individuals who are authorized. In this way they help protect your privacy and identity.
35
Firewalls
A firewall is a barrier between the internet and your own computer or network. Protects against hackers, worms, and viruses.
36
Firewall does not deal with
- spam - most viruses - spyware
37
Personal firewall
Personal firewalls should be installed on each computer that is connected to the internet and monitors (and blocks, where necessary) internet traffic.
38
Hardware firewalls
Your internal or external IT support resource will be able to recommend, source, install and configure the most suitable one for your business needs.
39
Biometrics
Biometrics involves the use of physical characteristics of the human body to positively identify individuals. Hands, fingerprints, voice. Harder to lose.
40
Antivirus software
anti-virus software scans files or your computer's memory for certain patterns that may indicate an infection.
41
automatic scans
automatically scan specific files or directories and prompt you at set intervals to perform complete scans.
42
manual scans
It is also a good idea to manually scan files you receive from an outside source before opening them.
43
Encryption
 is the translation of a file or document into a secret code  if encrypted, it is called cypher text  if not encrypted, it is called plain text
44
Digital signatures
A digital signature is a technology that is used to verify the authenticity of a specific digital document, message, or transaction. Authentication, integrity, and reliability.
45
Digital certificates
When someone requests it, the authority checks the identity of the requesting person, certifies that it meets all the requirements for obtaining the certificate, and then issues it.
46
User interface
is the way humans interact or engage with a computing device Command line and graphical user interface (WIMP).
47
Device interface
has an interface that people use in order to 'work' the device
48
GUI design
design it to support users and not hinder them, and select the right controls for the user consisting of buttons, navigation controls, and information components.
49
Logical and hierarchical organization
User Interfaces should be well set out, not cluttered, easy to follow User Interfaces should have a flow that is easy to understand.
50
Online software tool advantage
Flexibility, allows collaboration
51
online software tool disadvantage
heavily dependent on internet, privacy issues
52
Features associated with video application
multilayer track editing, titles, transitions, effects
53
Sound effects do what
stimulate reality, create illusion, create mood
54
Digital publication advantages and disadvantages
ePub- delivered as one zip file but not easy to create. pdf - can be opened by most computers however may not be displayed correctly. a- Speed, accessibility d- time and cost
55
Publishing features add
colour schemes, typography, layers
56
Code of conduct
A code of conduct is a set of rules outlining the social norms and rules and responsibilities of, or proper practices for, an individual, party or organisation. Track employee work hours, internet use and email use.
57
Internet censorship
Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet
58
Planning tools
Gantt charts and storyboards
59
Web 2.0
Pros- more friends, online promotion, customer engagement Cons- information overload, negative comments
60
Web 3.0
pros- better information, relevant searches cons- accès to private information, needs privacy policy