IB DS Content

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:13 PM on 5/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

What is the Data hierarchy?

DIKW → Data, Information, Knowledge, Wisdom

2
New cards

What is Data in the data hierarchy?

Raw and unorganized facts that lack context or meaning. Eg, Test score of 75

3
New cards

What is Information in the data hierarchy?

The output after data has been processed, organized, or structured. It is now ready to visualize or analyse. Eg, somebody got 75% on a test

4
New cards

What is Knowledge in the data hierarchy?

When more meaning can be derived from information, which is then applied to do something. Eg, tests were used to determine how successful students are

5
New cards

What is Wisdom in the data hierarchy?

Wisdom is the application of knowledge. When knowledge and insight are used to make decisions, find patterns, and make predictions. Eg, a teacher using previous grades to submit an IB predicted one

6
New cards

What are some types of data?

Medical, financial, meteorological, geographic, scientific, metadata

7
New cards

What is Data mining?

The process of finding patterns and correlations as well as anomalies, within large sets of data

8
New cards

What is data matching?

The process of comparing two different sets of data with the aim of finding data about the same entity

9
New cards

What are the stages of the data life cycle?

Data creation → Storage → Usage → Preservation → Destruction

10
New cards

What is data creation?

Simply the creation / finding of data. It can take many forms and can enter systems through various ways.

11
New cards

What is data storage?

Once data has been created, it is stored in places with different levels of security. It must also be configured to set its formatting, and who it can be accessed by. (Read, modify, full control)

12
New cards

What is data usage?

Once data is stored, it can be viewed in its raw format, or be processed and presented. This can then be analysed and shared with others to find patterns or extract out information.

13
New cards

What is data preservation?

After it is analysed, it is important that this data is preserved by an organization for various reasons, namely to be reused for checking or future unseen purposes.

14
New cards

What is data destruction?

Data cannot be kept forver, as it has costs associated with it. It must be destroyed and can be done so physically (shredding), or internally (software wiping). There are also regulations associated with data protection that may require destruction.

15
New cards

What is primary and secondary data?

Primary data is original and collected for the first time for your purpose. Secondary data is data that has already been collected by someone else for a different purpose, but that may be usefyul to you.

16
New cards

What is validation and verification in database design?

Validation means that only suitable data can be entered. This could look like only taking certain formats, and configuring checks, minimizing errors. Verification checks that the data that is entered is the actual data that you want, or that it matches the original source. This could look like double entry of your password.

17
New cards

Explain encryption.

Encryption is the process of masking readable data into unreadable characters to prevent unauthorized access. These use encryption keys which are used to cypher and decypher the data. This can be done symmetrically, where a the same key is used to encode and decode, or asymmetrically, where a private key is kept secret for decryption, but the public key is widely distributed for encryption.

18
New cards

What is the blockchain?

A blockchain is a shared digital ledger where a global network of computers keeps identical copies of the exact same record history, meaning no single person or company controls the data. Every time new information is added, it is permanently locked to the previous entries like links in a chain, making it completely impossible for anyone to secretly alter or fake past records.

19
New cards

What are the 4 Vs (Characteristics of big data)

Volume, velocity, variety, veracity.

20
New cards

What are some data dilemmas?

Biased data from collection, viruses and malware, reliability and validity of sources, outdated data.

21
New cards

What are the characteristics of an algorithm

Unambiguous, finite, well defined, inputs, outputs, feasible, independent

22
New cards

What are some components of an algorithm

Instructions, variables, conditionals, loops

23
New cards

How can algorithms be represented?

Natural language, flowcharts, code and programming languages.

24
New cards

What are some uses of algorithms?

Searching, filtering, counting, sorting → Prioritization in social media, Page Rank

25
New cards

What are some algorithmic dilemmas?

Algorithms replacing human judgements, algorithmic bias in the data or in the algorithm itself, black boxes and lack of transparency

26
New cards

What are the types of computers?

Embedded computers (computers in kitchen appliences), personal computers (PCs), mainframe computers / servers

27
New cards

What is Moore’s Law?

The number of transistors in a dense integrated circuit (CPU, RAM, storage) doubles every two years.

28
New cards

What is the general model of every computer?

Input → Process → Output

29
New cards

What are some hardware components of a computer?

Motherboard, CPU, RAM, secondary storage (HDD or SSD), power (PSU)

30
New cards

What are some components of computer software?

Operating systems (OS such as ChromeOS, Apple MacOS, Windows, Linux), user interfaces (GUIs)

31
New cards

What are some classifications of software?

Utility (perform specific tasks that help maintain the computer), application (other programs that serve a purpose), open-source, proprietary, malicious.

32
New cards

What are some forms of copmuter coding

Machine code, assembly language, high-level languages, compilers

33
New cards

What are the stages of the evolution of computing?

  • First generation: vacuum tubes (1940-46)

  • Second generation: transistors (1956-63)

  • Third generation: integrated circuits (1964-71)

  • Fourth generation: microprocessors (1971-2010)

  • Fifth generation: artificial intelligence (2010-present)

  • Quantum computing is also a thing, could be a big deal going forward

34
New cards

What is unique to the first generation of computing? (1940-1946)

Vacuum tubes were used and they serve the same function as transistors now. Memory used metal drums. These were inefficient, took days, and would frequently overheat.

35
New cards

What is unique to the second generation of computing? (1956-1963)

The first transistors were developped. Punch cards and paper tapes were still used, although computers were slightly smaller and more reliable. Assembly was introduced and so were the first high-level languages (COBOL and FORTRAN).

36
New cards

What is unique to the third generation of computing? (1964-1971)

Transistors were finally made using silicon, allowing for integrated circuits rather than bulky machines. THey were more efficient, reliable, faster, and were able to multitask. Input devices such as keyboards and mouses were finally installed. High-level languages such as BASIC and Pascal were introduced.

37
New cards

What is unique to the fourth generation of computing? (1971-2010)

Chips got much smaller and more efficient, with even more processing power. PCs were also standardized to have RAM, CPU, HDD. Personal computers gained prevalence, and languages such as Python, C#, and JS were popularized.

38
New cards

What is unique to the fifth generation of computing? (2010-present)

Although the computers themselves are similar, the introduction of superchips has lead to artificial intelligence, and computing is still changing radically. Natural language is also becoming more prevalent as input.

39
New cards

What is unique to quantum computing?

Unlike binary bits, quantum computing uses qubits, which can be placed in superposition to be both 0 and 1 and anywhere inbetween. This allows for the computation of multiple options at the same time, making certain problems magnitudes faster. Its important in cybersecurity, drug development, financing, weather, and more.

40
New cards