Big Idea 5

studied byStudied by 3 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 64

65 Terms

1

Digital Data

Various types of information including text, numbers, images, and audio

New cards
2

Big Data

Extremely large and complex sets of data that are beyond the ability of traditional data processing methods to handle

New cards
3

Name an example of Big Data

  • Social Media: User Posts, Comments, Likes, Shares, and Interactions

  • E-commerce: Customer Browsing Behavior, Purchase History, Reviews, Preferences

  • Healthcare: Electronic Health Records, Medial Imaging, Genomic Data, Patient Monitoring Systems

New cards
4

Structured Data

Type of data that follows a specific organization or format and has a clear and well-defined structure that makes it easy to understand and process

New cards
5

Unstructured Data

Information that doesn’t have a specific organization or format

New cards
6

Semi-Structured Data

Information that falls somewhere between structure and unstructured data; It has some organizational elements but doesn’t adhere to a strict structure like structured data

New cards
7

Distributed Files Systems

Similar to a virtual storage system that spreads your files across multiple computers or servers; Files are also divided into smaller pieces and stored on different machines

New cards
8

Node

Each computer that stores a piece of your data

New cards
9

Data Warehouse

Like a library where you organize and store all your data in a structured way (tables) which make it easier to search, filter, and compare; It is designed to handle lots of data from different sources and make it easier to analyze

New cards
10

Cloud Storage

A virtual storage space that exists on the internet; It’s not a physical place you can touch but rather a network of powerful computers located in different places around the world

New cards
11

Why do we process big data?

To extract meaningful insights and valuable information

New cards
12

Data Collection

Gathering big data from various sources, including social media platforms, sensors, transactions, publicly available data, and crowdsourcing

New cards
13

Crowdsourcing

Concept that involves obtaining ideas, services, or contributions from a large group of people

New cards
14

Data Cleaning

“Cleaning” (Getting rid of the errors, noise, or inconsistencies) in big data

New cards
15

What are the five cleaning steps?

  1. Removing Mistakes

  2. Fixing Missing Parts

  3. Getting Rid of Duplicates

  4. Standardizing Formats

  5. Checking for Inconsistencies

New cards
16

Data Storage

Efficiently storing big data

New cards
17

Data Processing

Applying various techniques and algorithms to extract insights and patterns

New cards
18

What are some examples of data processing?

  • Statistical Analysis

  • Machine Learning

  • Data Mining

New cards
19

Descriptive Statistics

Help us understand the basic characteristics of big data

New cards
20

Correlation Analysis

Helps us understand how two or more variables are related

New cards
21

Regression Analysis

Helps us predict one variable based off of another variable

New cards
22

Hypothesis Testing

Determine if there is a significant difference or relationship between groups or variables

New cards
23

Machine Learning

Teaching computers to learn and make decisions on their own based off the patterns found in the data

New cards
24

What could go wrong with machine learning?

  • Biased Results

  • Limited Generalization

  • Data Dependency

  • Ethical Concerns

New cards
25

Data Mining

Finding valuable patterns or insights from large amounts of data

New cards
26

What could go wrong with data mining?

  • Privacy Concerns

  • Bias and Discrimination

  • False Discoveries and Misinterpretation

  • Data Quality and Integrity

  • Ethical Considerations

New cards
27

Data Visualization

Insights derived from big data being visual presented using charts, graphs, or dashboards

New cards
28

Decision Making

Utilizing the insights gained from big data to make informed decisions

New cards
29

Metadata

Data about data

New cards
30

How is metadata useful?

  • Organization

  • Searchability

  • Data Integrity

  • Data Sharing

New cards
31

Data security is crucial for protecting information from… and it ensures data…

  • unauthorized access, breaches, or misuse

  • confidentiality, integrity, and availability

New cards
32

Privacy refers to an individual’s right to control their what>

Personal Information

New cards
33

What does PII stand for?

Personal Identifying Information

New cards
34

Computing Innovation

Includes hardware or software innovations, networking, user interfaces, or analytical innovations

New cards
35

What kind of biases can exist in computing innovations?

  • Biased Data

  • Algorithmic Bias

  • Human Bias

  • Lack of Diversity

New cards
36

What efforts can help control and reduce bias in computing innovations?

  • Diverse and Inclusive Teams

  • Data Scrutiny

  • Algorithmic Transparency

  • Ongoing Evaluation and Testing

New cards
37

Name some of the beneficial effects of computing innovations.

  • Speed and Efficiency

  • Information Access

  • Automation and Productivity

  • Connectivity

New cards
38

Name some of the harmful of computing innovations.

  • Security Risks

  • Dependency and Addiction

  • Job Displacement

  • Privacy Concerns

New cards
39

Name some of the legal concerns in computing.

  • Data Privacy

  • Intellectual Property

  • Cybersecurity

New cards
40

Name some of the ethical concerns in computing.

  • Bias and Discrimination

  • AI Ethics

  • Autonomy and Consent

New cards
41

How can you legally use the work of others?

  • Creative Commons

  • Open Source

  • Open Access

New cards
42

Creative Commons

Public copyright license that enables the free distribution of an otherwise copyrighted work

New cards
43

Cybersecurity

Practice of protecting computer systems, networks, and data from unauthorized access, attacks, and damage

New cards
44

Phishing

Attempt to trick a user into divulging their private information

New cards
45

How can you protect yourself from phishing attacks?

  • Suspicious email address

  • Suspicious URL

  • Non-secured HTTP connections

  • Requests for sensitive information

  • Urgency and scare tactics

New cards
46

Rogue Access Points

Unauthorized wireless access point set up by attackers to intercept network traffic and gain unauthorized access to you data

New cards
47

Why are rogue access points bad?

Hackers can use a rogue access point to capture sensitive data that is flowing through a network

New cards
48

How can you protect yourself from rogue access points?

  • Use secure and trusted networks

  • Verify network names (SSIDs)

  • Be cautious with sensitive activities

New cards
49

Malware

Malicious software that is unknowingly installed onto a computer

New cards
50

Trojan Malware

Malware disguised as a legitimate software with the purpose of tricking you into executing malicious software on your computer

New cards
51

Spyware

Type of malicious software that is designed to covertly collect information froma user’s device without their knowledge or consent

New cards
52

Adware

Software designed to display advertisements on a user’s device

New cards
53

Ransomware

Type of malware that encrypts a victims’s files or locks their entire computing sustem, making it inaccessible

New cards
54

Keylogger

Keeps track of your keystrokes on your keyboard in an attempt to capture sensitive information like users and passwords

New cards
55

How can you protect yourself from malware attacks?

  • Antivirus Software

  • Update Software

  • Beware of Phishing Attacks

  • Enable a Pop-Up Blocker

  • Enable Your Firewall

New cards
56

What does DDoS stand for?

Distributed Denial of Service

New cards
57

Botnet

Created by users downloading malware, and the malware being programed to conduct an attack on the server by sending fake traffic at a coordinated time

New cards
58

Why is cybersecurity important?

  • Protecting personal information

  • Prevents theft or fraud

  • Maintain privacy online

New cards
59

What are some of the potential consequences of cyber attacks?

  • Identity Theft

  • Financial Loss

  • Reputational Damage

  • Disruption of Services

New cards
60

Data Breaches

Encryption helps safeguard sensitive data from data breaches

New cards
61

Encrypted data is useless without the

Decryption Key

New cards
62

What are the first line of defense against unauthorized access to your computer and personal information?

Passwords

New cards
63

Brute Force Attack

Hackers use automated software that systemically tries all possible combinations of characters until the correct password is found. This method is time consuming.

New cards
64

Man-in-the-Middle Attacks

When an attacker intercepts and alters communication between two parties

New cards
65

Dictionary Attacks

Hackers use software that systemically checks common words, phrases, and dictionary terms as passwords.

New cards
robot