Data Analytics Exam
Across
- 3. Techniques to plan and execute a project efficiently, including tasks, timelines, and dependencies.
- 4. A system involving digital hardware, software, data, and processes to create solutions.
- 9. Analyzing how components of systems interact and influence the whole.
- 10. Generating and evaluating creative solutions, using both divergent and convergent thinking.
- 14. Measures how well a solution or system meets intended outcomes (e.g., accessibility, accuracy).
- 15. Checking data for completeness, correctness, and consistency during entry.
- 19. The appearance and presentation style of data (e.g., images, text, tables).
- 22. Organizing data for efficient algorithms and optimized program performance.
- 23. Laws governing the ownership, privacy, and security of information.
- 25. Consistent rules for naming entities in software and data management.
- 26. Recognizing computational aspects in problems, using logic, algorithms, and programming to solve them.
- 27. Creating digital output by transforming data into information, like websites or apps.
- 30. Rules for consistency and clarity in digital systems, like program and file naming.
- 31. Using software to represent data graphically (charts, maps) for pattern recognition.
- 32. Actions or events that threaten data security (e.g., malware, phishing).
- 33. Different forms of data (e.g., binary, Boolean, numeric) for specific operations.
Down
- 1. Guidelines for functional, usable, and visually appealing digital solutions.
- 2. A visual language for modeling system requirements and interactions.
- 5. A document outlining functional, technical, and system requirements.
- 6. Hardware and software interconnected to create digital solutions.
- 7. English-like statements representing algorithms without adhering to formal coding syntax.
- 8. Organizing, naming, and storing files systematically for easy access and backup.
- 11. Methods to ensure a solution works as intended, with rigorous testing.
- 12. Software methods to protect information (e.g., encryption, firewalls).
- 13. Equipment and procedures to protect digital information systems physically.
- 16. Proofreading and confirming data accuracy after it has been entered.
- 17. Devices connected via the internet, communicating data between themselves.
- 18. Elements of programming languages, like functions and control structures.
- 20. General categories like image, number, and text data.
- 21. Acquiring, analyzing, and presenting data patterns to draw conclusions.
- 24. Measures the time, cost, and effort required to achieve results in a system.
- 28. Visual elements to communicate data patterns and trends quickly.
- 29. Protecting digital systems from threats using policies, ethics, and defensive techniques.