This system is used to represent different quantities or characters
Notational System p110
This is the Data Representation format that allows for more characters using 8 Binary Bits/full Byte
Unicode p116
For organizations and individuals, computer data can be considered this
Asset p117
This is often the most valuable information asset that an organization owns
Intellectual Property p118
Using data and information to drive business decisions and strategies is called this
Analytics p121
List the 3 common Notational Systems used in the Information Technology field
Binary, Decimal & Hexadecimal p110
This special numeric data type of single bit is either TRUE or FALSE
Boolean Value p114
This process determines how much data loss or breach would impact a business
Risk Assessment p117
This system was invented to try and enforce “pay-per-use” of digital products
Digital Rights Management (DRM) p120
These are the raw values collected in a system for eventual Analytics
Data p121
What is the Base-2 Notational System
Binary p110
This data type only consists of whole numbers
Integers p114
This is the valuation of resources applied to protect data assets
Return on Security Investment (ROSI) p117
This is a legal protection for some kind of invention, and can apply to an idea so long as unique
Patents p120
This is some level of summarization of the individual data points
Information p121
This is the basic unit of computer data
Bit p112
This data type can represent a letter, number, or symbol and consumes a full BYTE of storage
Character p114
This process ensures you maintain copies of your data which can be quickly accessed and restored when needed
Backups p117
How do companies protect its name or logo to promote it’s goods and services?
Trademark p120
These are things that inform meaningful business decisions
Insights p121
Computer Memory & file sizes are measured in multiples of bits called a
Byte p112
This data type is a collection of characters
String p114
This data protection process encodes data so that only a person with the correct key can access it
Encryption p118
This legal protection granted to certain types of works lasts for a number of years after the owner’s death, and it can be transferred
Copyright p119
This IT career is focused on interpreting raw data into meaningful insights for upper management to make business decisions
Data Analytics p121