1/48
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Software as a Service (SaaS)
accessible via web browser
priced on a pay-per-use basis / subscription fee
Platform as a Service (PaaS)
Development and deployment environment
Infrastructure as a Service (IaaS)
servers, storage, and networking
common uses: business continuity, disaster recovery, big data
Application Programming Interface (API)
Facilitates app communication
CIA Triad
Confidentiality, Integrity, Availability in data security.
Cost of Quality
Prevention costs $1, correction $10, failure $100.
ETL
Extract, Transform, Load: data processing method.
Data Lake
Stores raw data until needed for analysis.
Null Testing
Checks for absent values in data.
Django
Web framework for building applications in Python.
Blockchain
Decentralized digital ledger that records transactions across a network of computers.
Each record (block) is linked to the previous one, ensuring security and transparency
Privacy Principles
Privacy, confidentiality, transparency, free will, fairness.
Natural Language Processing
Interprets and analyzes human language.
Neural Network
Machine learning model mimicking human brain functions.
Agile Methodology
Manage a project by breaking it up into several phases
Involves constant collaboration with stakeholders and continuous improvement at every stage
Once the work begins, teams’ cycle through a process of planning, executing, and evaluating
1st tier evolution
keep the doors open (support transactions and maintain operations)
2nd tier evolution
know the past & current operations
3rd tier evolution
combine internal/external data to provide insight to future operations/probabilities and help set strategy
Spear phishing
Malicious email or text messaging sent to a specific person
Criminals already have some information about the victim
Angler phishing
Tricking victim by way of using info the victim has posted on social media
Advanced Persistent Threats (APT)
Sophisticated, long-term cyber-attacks targeting specific entities, such as governments or large organizations
Denial-of-Service (DoS)
Make system unusable so denies access/disrupts workflow
Master Data Management (MDM)
Who
What
Where
Object-oriented databases (OODB)
Storage of all data types
Stored in the form of objects
Each object contains both data (attributes or fields) and the methods (functions) that can operate on that data
SQL - Structured Query Language
Commands to access and manipulate databases
It is queries to INSERT, DELETE, SEARCH, ALTER, and more, with the database
Data warehouse
Facilitate a single version of truth for a company for decision making and forecasting
Contains historical commutative data from single or multiple sources
Data mesh
Decentralization and distribution of data ownership, both at a technical and organizational level
Extract
Before data can be moved to a new destination, it must first be extracted from its source
Structured and unstructured data is imported and consolidated into a single repository. Volumes of data can be extracted from a wide range of data sources
Transform
CLEANSE Resolve inconsistencies and missing values
STANDARDIZE Apply formatting rules
DE-DUPLICATE Discard redundant data
VERIFY Remove unusable data, flag anomalies
SORT Organize data according to type
Load
Load newly transformed data into a new destination (data lake or data warehouse)
Full loading
Everything reloaded; Can grow exponentially if old not dropped; Can take a long time to load
Incremental loading
only produces additional records if new and unique information is found
Syntax-ruled command statements
Structure of programming statements that direct action (input, output, print, assign value, compute value)
Network protocols
Rules that define how data is transmitted between devices on a network
Ensure communication and compatibility
Govern data exchange, security, and error handling
How data travels in a network
Data is broken into packets
Packets are sent through routers and switches
Reassembled at the destination device
How IoT works
Sensors and Devices:
Collect data from the environment
Connectivity:
Use Wi-Fi, Bluetooth, or cellular networks to send data
Data Processing:
Analyze data using cloud or local systems
User Interface:
Deliver insights or control options to users
Distributed Ledger Technology (DLT)
Decentralized database managed by multiple participants.
Blockchain is a type of DLT, but not all DLTs use the block-based structure of blockchain.
Key features of blockchain and DLT
Decentralization: No single authority controls the system
Transparency: Transactions are visible to all participants
Immutability: Data, once written, cannot be altered
Security: Uses cryptographic algorithms to ensure data integrity
Ledger
Records classified and summarized transactional data
Hash
function that converts an input of letters and numbers into an encrypted output
Blocks
data structure containing a hash, previous hash and data
Blockchain
A type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper—proof record of transactional data
Ethereum
decentralized, open source blockchain platform with smart contract functionality
Data privacy
Responsible collecting, using and storing data about people, in line with their expectations, regulations, and laws
Intellectual property
Creative work in physical form
Fair Information Practice (FIP)
set standards governing the collection and use of personal data, addressing issues of privacy and accuracy
Natural Learning Processing (NLP)
machine learning that can interpret and respond to human language
NLP techniques select a sequence of words based on their probability of satisfying a goal, such as summarization, question and answering, or translation
Applications:
Text classification and sentiment analysis
Language translation
Named entity recognition: identify and extract named entities such as people, places, and organizations from text
Text summarization
Question answering Chatbot
Deep learning
Employs neural networks and learns continuously
Agile manifesto - four values
Individuals and interactions over processes and tools
Working software over comprehensive documentation
Customer collaboration over contract negotiation
Responding to change over following a plan