IT Theory Grade 12 - Flashcards (Question and Answer)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

flashcard set

Earn XP

Description and Tags

A set of Question-and-Answer flashcards covering key concepts from IT Theory Grade 12 notes, including databases, data warehousing/mining, data quality, security, cloud services, and networking.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

What does DBMS stand for and what is its role?

Database Management Software; software responsible for creating, maintaining and administering databases, including managing data security and access (examples: Microsoft SQL Server, Microsoft Access, MySQL, SQLite).

2
New cards

What is data warehousing?

A technique for storing data from more than one database in a non-normalised form, often containing redundancies, designed to make data available for analysis and business intelligence.

3
New cards

How does a data warehouse differ from a database?

A data warehouse stores historical data from multiple sources for analysis; a database stores current transactions for ongoing business processes.

4
New cards

Define a primary key in a database.

A field that holds a unique identifier for each record in a table, enabling precise identification and referential integrity.

5
New cards

What is data mining?

A process to identify trends and patterns in large databases (big data) to extract knowledge for better decision making.

6
New cards

List the three main steps of the data mining process.

1) Extract the relevant data, 2) Look for patterns in the data, 3) Discover knowledge from the patterns.

7
New cards

Name the five characteristics of high-quality data.

Accurate, Consistent, Current, Complete, Relevant.

8
New cards

Differentiate data validation from data verification.

Data validation checks data at entry for correct format/type; data verification manually checks accuracy (full or sample).

9
New cards

What is an audit trail in databases?

A record of who changed data, what was changed, and when the changes were made.

10
New cards

Define data redundancy and why it is a problem.

Storing the same data in multiple places; wastes space and can cause integrity problems and anomalies.

11
New cards

What is First Normal Form (1NF) in database design?

A table must have atomic column values, each column has a unique name, and values in a column are of the same type; no repeating groups.

12
New cards

What does 2NF imply about dependencies?

The table is in 1NF and has no partial dependency—no non-key attribute depends on only part of the primary key.

13
New cards

What does 3NF require?

The table is in 2NF and has no transitive dependency—non-key attributes do not depend on other non-key attributes.

14
New cards

How is data warehousing linked to business intelligence (BI)?

Data warehousing is a key BI tool used to improve business decision making by enabling analytics across multiple data sources.

15
New cards

What is a cookie in web technologies?

A small text file stored by a browser that identifies users and can store preferences for personalization.

16
New cards

What is location-based data (LBS)?

Data that provides information about a user’s location (GPS-based); used in services like weather, ride-hailing, and mapping.

17
New cards

What does RFID stand for and what is its use?

Radio Frequency Identification; tiny chips storing data that can be scanned by readers to identify and track items.

18
New cards

Why is a data warehouse often denormalised?

To optimise analytics and reporting by reducing the need for complex joins, though it may introduce redundancy.

19
New cards

Differentiate data and a database’s basic terms 'field' and 'record'.

Field is a single attribute/column; a record is a row containing related fields.

20
New cards

What is a VPN and its purpose?

Virtual Private Network; a private network over the internet that encrypts traffic and allows secure access to private resources.

21
New cards

What is SaaS?

Software as a Service; cloud-hosted applications accessed via a web browser; users pay a subscription and do not own the software.

22
New cards

What is cloud computing?

Providing computing resources (storage, processing, applications) over the internet; scalable, affordable, reliable and maintained by providers.

23
New cards

Explain SSL and its certificates.

SSL (Secure Sockets Layer) encrypts data in transit; certificates from a Certification Authority prove a website’s identity and enable trusted encryption.

24
New cards

What is a firewall?

A security device/software that blocks unauthorized network access; can be software, hardware, or a combination.

25
New cards

Define BitTorrent.

A peer-to-peer file sharing method where pieces of a file are shared among many peers to speed up distribution.