1.
Useful terms and explanation
# Terms Explanation Memorable Tips!
1 Binary code …a system of representing data and programming Eg: A light switch is an example of a binary
codes in a digital form using only two symbols: 0 and device in everyday life. It has only two possible
1. This binary system forms the basis of all digital states: on (1) or off (0)
operations, including the creation of software and Each 0 and 1 is a signal that the computer can
the execution of logic within computer systems. read. The combination of these numbers tells
the computer exactly which letter or action to
process.
2 Robotic …uses tools – software robots – which replicate Eg: Moving huge volumes of data to another
process human actions in software space. system or simply updating backups can be time-
automation consuming. However, RPA can automate the
(RPA) entire transfer.
Imagine a company that receives hundreds of
customer support emails every day. Normally, a
human employee would read each email,
categorize it, and then forward it to the
appropriate department. This process can be
time-consuming and repetitive.
With RPA, the company can use software robots
to handle this task.
3 Sensor …a device that can detect and measure changes in Eg: Cameras, Temperature Sensors, Air Quality
the physical world, such as temperature, motion, Sensors
light, sound, air quality, and others.
4 The Internet of …uses sensors to allow digital systems to gather One way to think about IoT is in terms of human
Things (IOT) data from the physical world, & may use actuation to senses. If humans have five senses, IoT is like a
control physical things. system of cameras and recording devices that
can gather various types of data such as video,
…Internet-based networking of physical and digital audio, images, and more.
products, services, machines, sensors, and humans.
5 Big Data …data which, because of issues like large volume, Example: Amazon's Customer recommendation
velocity, or variety, requires alternative approaches system
[5]. Amazon collects vast amounts of data from its
customers, including:
…any data that, by virtue of its characteristics,
cannot be treated in the traditional manner regarding Browsing history (which pages are visited, how
collection, storage, processing, or analysis [6]. long they stay on each page)
Purchase history (items bought, frequency of
purchases)
… processing of large and often complex data Product reviews and ratings
volumes in real time [14] . Wishlists and cart data
6 5V five main and innate characteristics of big data:
velocity, volume, value, variety and veracity
7 Data velocity …the speed at which data is generated, processed, Eg: A traffic monitoring system in a bustling
and transferred metropolis. The data about the traffic condition,
speed, congestion, etc. is pouring in every
second from multiple sources. The system
needs to analyse this data in real time to provide
accurate, up-to-the-minute traffic information to
commuters.
8 Data volume …the quantity or size of the data Eg: by 2016 Facebook was reported to be
holding 250 billion images and 2.5 trillion posts
Twitter generates approximately 500 million
tweets per day
9 Data variety …the diversity of the collected data and data formats Eg: In a smart city project, various IoT sensors
collect data from different sources such as traffic
cameras, weather stations. The data collected
comes in various formats like images, text, and
numerical values.
10 Data value …the benefits that data can provide, and it relates Eg: Netflix analyzes billions of user interactions
directly to what organizations can do with that daily to provide personalized recommendations,
collected data. increasing user engagement by 30%.
11 Data veracity …the quality, accuracy, integrity and credibility of Eg: Data from a medical experiment is typically
data an example of a high veracity dataset. It
involves quality control measures at various
stages, including data collection, processing,
and analysis.
However, Twitter data can include spam, bots,
fake news, or misleading information, making it
difficult to assess the accuracy of the content.
12 Structured …a predefined format and can be easily processed Eg: transaction data (date, name, age, quantity,
data and price)
13 Unstructured …have no formalized structure, and their processing Eg: Digital photos, audio, and video files
data is difficult
14 Semi- …lies between these two extremes forms of data Eg: Email messages are considered semi-
structured and only shows a formalized structure to a certain structured data.
data extent ● Structured Elements: email address,
subject, date, and time
● Unstructured Elements: message (can vary
widely in format, length, and language)
15 Descriptive Analytics that help in understanding e.g. "What Eg: A retail store looks at its sales data from the
analytics happened in the business?" [5, p139] past year. By using descriptive analytics, they
create reports and charts showing:
Total sales for each month.
Best-selling products during different
seasons.
Customer purchase trends, like peak
shopping times..
16 Inquisitive Analytics that help in comprehending e.g. "Why is Eg: A retail company notices a sudden drop in
analytics something happening in the business?" sales for one of its product lines. Instead of just
reporting the decline, inquisitive analytics would
dig deeper to understand why this is happening.
17 Predictive Analytics that help in anticipating e.g. "What is likely Eg: Using past sales data and considering
analytics to happen in the future?" upcoming events in the area, the coffee shop
Forecast potential future outcomes owner predicts higher foot traffic over the
weekend and decides to increase the order of
coffee beans and pastries accordingly.
18 Prescriptive Analytics that help in responding "So What?" and Eg: After analyzing customer preferences and
analytics "Now What?" purchase history, the coffee shop owner
Gives recommendations for the next step implements a loyalty program that offers
discounts on popular items to regular
customers, leading to increased customer
retention and satisfaction.
19 Artificial …a leading 4IR technology, allowing for algorithms If IoT is likened to the human senses, then AI
intelligence that can learn & adapt. [6] would resemble our cognitive abilities. This
(AI) means that AI possesses the capacity to
…the capability of a computer system to show understand, perceive, and learn similarly to
human-like intelligent behavior [14] humans.
20 Cybersecurity …the practice of protecting systems, networks, and Example: The bank has implemented multi-
programs from digital attacks. factor authentication (MFA) to ensure that users
are who they claim to be by requiring an
additional verification method (e.g., SMS code,
fingerprint scan).
21 Cloud …allows remote access to computer resources in Eg: Google Drive, iCloud
Computing public or private data centers [5]
…the provision of servers, databases, software,
network components, and storage via the Internet
[14]
22 Virtual and …VR/AR involves the creation & viewing of digitally- Example of AR
Augmented rendered 3D images.
Reality
Example of VR
23 Additive …creation of physical things based on digital Eg: 3D printing offers a fast solution for housing
Manufacturing designs. and infrastructure reconstruction post-natural
/ 3D disasters like hurricanes and wildfires, providing
printing quick construction of essential buildings such as
homes and hospitals.
24 Encryption …the process of changing electronic information or Eg: The bank also uses encryption to secure
signals into a secret code that people cannot data in transit, meaning that even if someone
understand or use without special equipment: tries to steal it, they can’t read it without a
special key.
25 Blockchain …provides a digital record keeping system that has Eg: In Europe, blockchain is used to track food
the ability to make records more secure & from farm to table. Every step, like growing
decentralized [5]. crops and harvesting, is saved as a block on the
blockchain. Consumers can scan a QR code on
…an encryption approach (cryptography) for the the product to access detailed information about
secure transmission of data [14] its journey, including where it was grown or
produced, processed, and distributed.