Cheat Sheet
Cheat Sheet
some need.
Information is the output displayed by an information system
There are laws to protect us (In Australia, privacy is legally protected under the Privacy Act 1988)
Privacy Act 1988 must -
explain why personal information is being collected --provide individuals with access to their records
describe to individuals the purpose of holding the information --describe the information held and how it is manage
Copyright laws (Copyright Act 1968) protect authors and their original works.
Privacy Act 1988: This law regulates the collection, use, storage, and disclosure of personal information by Australian government
agencies and private sector organizations.
Notifiable Data Breaches Scheme: This scheme requires organizations to notify individuals and the Office of the Australian
Information Commissioner (OAIC) in the event of an eligible data breach that is likely to result in serious harm to affected
individuals.
Spam Act 2003: This law regulates the sending of unsolicited commercial electronic messages, including emails, SMS, and
instant messages. It sets rules for obtaining consent, providing opt-out mechanisms, and includes penalties for non-compliance.
A Privacy Impact Assessment (PIA) is like a safety check for personal information. When organizations want to use or collect your
data, they do a PIA to see if it's safe and respects your privacy
Participants are the people involved in developing and implementing information systems.
Users are the individuals who utilize the information systems to perform tasks or access information
Collecting: The process of gathering data from a variety of sources. Methods include surveys, interviews, observations, and data
mining. Hardware and software include sensors, cameras, and computers.
Non-computer tools include paper and pencil. Social and ethical issues include privacy, security, and bias.
Organizing: The process of arranging data in a way that makes it easy to understand and use. Methods include data modeling,
data mining, and data visualization. Hardware and software include databases, spreadsheets, and statistical software.
Non-computer tools include charts and graphs. Social and ethical issues include bias and discrimination.
Analyzing: The process of extracting meaning from data. Methods include statistical analysis, machine learning, and data mining.
Hardware and software include statistical software, machine learning algorithms, and databases. Non-computer tools include pen
and paper. Social and ethical issues include privacy, security, and bias.
Storing: The process of preserving data for future use. Methods include data backup, data archiving, and data encryption.
Hardware and software include data storage devices, such as hard drives and cloud storage. Non-computer tools include paper
and pencil. Social and ethical issues include privacy, security, and data loss.
Retrieving: The process of accessing data that has been stored. Methods include data search, data filtering, and data mining.
Hardware and software include data storage devices, such as hard drives and cloud storage. Non-computer tools include paper
and pencil. Social and ethical issues include privacy, security, and data loss.
Transmitting: The process of sending data from one location to another. Methods include wired communication, wireless
communication, and optical communication. Hardware and software include communication devices, such as routers, switches,
and modems. Non-computer tools include paper and pencil. Social and ethical issues include privacy, security, and data loss.
Displaying: The process of presenting data in a way that is easy to understand. Methods include data visualization, data
storytelling, and data dashboards. Hardware and software include data visualization tools, such as Tableau and Power BI.
Non-computer tools include paper and pencil. Social and ethical issues include privacy, security, and bias.
Text files are the simplest type of file format: Lines of text. Human-readable.
Data files are used to store data that is not easily human-readable. . Used by programs.
Audio files are used to store digital audio content. Music, voice, sounds.
Image files are used to store digital images. Photos, drawings.
Video files are used to store digital video content Movies, TV shows.
Here are some specific file formats for different data types:
Text files: TXT, CSV, JSON, XML
Data files: CSV, JSON, XML, XLS, XLSX, MDB, DBF
Audio files: MP3, WAV, FLAC, AAC
Image files: JPG, PNG, GIF, BMP
Video files: MP4, AVI, MOV, MKV
Row-based databases: Store data as rows. Each row represents a single record.
Column-based databases: Store data as columns. Each column represents a single attribute of a record.
Clock speed: How fast the CPU can execute instructions.
Instruction set: The number of operations the CPU can perform per clock cycle.
Number of cores: The number of independent processors in the CPU.
Cache: A small, fast memory that stores frequently accessed data.
Pipelining: A technique that allows the CPU to start executing the next instruction before the current instruction has finished.
Superscalar execution: A technique that allows the CPU to execute multiple instructions in parallel.
Out-of-order execution: A technique that allows the CPU to execute instructions out of the order in which they are received.
Instruction-level parallelism (ILP): The degree to which instructions in a program can be executed in parallel.
Data-level parallelism (DLP): The degree to which data accesses in a program can be overlapped.
Inter-process communication (IPC): This is a way for two or more processes to communicate with each other.
Network communication: This is a way for computers to communicate with each other over a network.
Serial communication: This is a way for two devices to communicate with each other one bit at a time.
Parallel communication: This is a way for two devices to communicate with each other multiple bits at a time.
Modem: A modem is a device that allows computers to communicate over a telephone line.
Backup: A process of making a copy of data to a separate location to protect it from loss.
Recovery: A process of restoring data from a backup copy.
Full backup: This copies all the data in a system to a backup location.
Differential backup: This copies the data that has changed since the last full backup.
Incremental backup: This copies the data that has changed since the last full or differential backup.
Benefits of backup:
Protects data from loss due to hardware failure, software errors, or malicious attacks.
Allows for quick recovery of data in the event of a loss.
Reduces downtime and costs associated with data loss.
The fetch-execute cycle is a process that the CPU uses to read instructions from memory and execute them.
The cycle is divided into two parts: instruction time (I-time) and execution time (E-time).
In I-time, the CPU fetches the instruction from memory and decodes it.
In E-time, the CPU executes the instruction and stores the results back in memory.
Here are the four steps of the fetch-execute cycle:
Fetch: The CPU fetches the instruction from memory and stores it in a register.
Decode: The CPU decodes the instruction and determines what it needs to do.
Execute: The CPU executes the instruction and performs the necessary actions.
Store: The CPU stores the results of the instruction back in memory
Registers: Small, fast memory locations that are used to store data and instructions that are being processed by the CPU.
RAM: Random access memory is a type of memory that can be accessed randomly. It is used to store data and instructions that
are being used by the CPU.
System Clock: A device that generates a regular pulse of electrical signals that synchronizes the operations of all the components
of a computer system.
Bus: A system of pathways that allows data to be transferred between different components of a computer system.
Cache Memory: A small, fast memory that is used to store recently accessed data and instructions.
Registers: Registers are the fastest type of memory in a computer. They are located on the CPU and are used to store data and
instructions that are being processed by the CPU. Registers are typically much smaller than RAM, but they are much faster.
RAM: RAM is the main memory of a computer. It is used to store data and instructions that are being used by the CPU. RAM is
volatile, which means that it loses its contents when the power is turned off.
System Clock: The system clock is a device that generates a regular pulse of electrical signals. The frequency of the clock
determines how fast the CPU and other components of the computer can operate.
Bus: A bus is a system of pathways that allows data to be transferred between different components of a computer system. The
bus is typically made up of a set of wires that connect the CPU, memory, and other devices.
Cache Memory: Cache memory is a small, fast memory that is used to store recently accessed data and instructions. Cache
memory is located closer to the CPU than RAM, which makes it faster for the CPU to access.