Browse Definitions :
Quiz

Big data analytics vocabulary quiz

How much do you know about the essential terminology of big data analytics? Take our quiz to find out. Would you like to brush up first? See our Quick Start Glossary.

1. _____ is sorting through data to identify patterns and establish relationships – digging for information.
Answer

2. _____ is data that has not been organized into a database or other type of repository.
Answer

3. _____ is data that has not been processed to yield information.
Answer

4. _____, abbreviated as DA, is the science of examining raw data with the purpose of drawing conclusions about that information.
Answer

5. _____ is data in a volume and format that makes it accessible, informative and actionable. Examples include baseball scores, inventory reports, driving records, sales data, biometric measurements, search histories, weather forecasts and usage alerts.
Answer

6. _____, abbreviated BDaaS, is the delivery of statistical analysis tools or information by an outside provider that helps organizations understand and use insights gained from large information sets.
Answer

7. _____ is the representation of data in graphic form to make its information more readily accessible.
Answer

8. _____, abbreviated “PA,” is the branch of DA involved with forecasts of future probabilities and trends.
Answer

9. _____ is Google’s cloud-based big data analytics web service for processing very large read-only data sets. It’s designed for analyzing data on the order of billions of rows, using a SQL-like syntax.
Answer

10. ____, also referred to as a data lake, is a new big data management model for big data that utilizes Hadoop as the central data repository.
Answer

This was last updated in April 2015
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close