19 Vocabulary Words
Defined simply, information is the stuff we want to consume (music, video, sound, writing.
Information comes in types. For example, the main type of information on Facebook is person, but they also have events, locations, and companies.
Information types have attributes associated with them. These can be optional or a requirement for that type of information. For example, Facebook requires the person type to have a name and gender. But birthday is optional.
Attributes have values. For example, on Facebook the person type has an attribute called “name.” In my account the name attribute has a value of “Bob Boiko.” Values usually have a certain pattern or form. For example, a “date of birth” attribute must have a date pattern in the value.
An information item is one complete set of values. For example, on Facebook one complete person includes values for name (“Bob Boiko”), birthday, city of birth, likes, status updates, etc.
The lifecycle of information is the way information is originated, used and finally retired.
In general, information is stored in databases. Think of them like a spreadsheet or table containing columns and rows of data.
The first way we organize is by indexing (alphabetical and/or numerical lists of names). For people, the more traditional method is by last name (Boiko, Bob); a newer way that reflects how many people think about names organizes by first name (“Bob”).
The second way to organize information is to link it to other pieces of information. Social graphs are just a representation of all people in your social network organized by links.
A third way to organize information is by sequences. For example Facebook can put your friends in order, indicating that you should look at one friend before another. The friend list on Facebook profile pages might be arranged by who is most important, who you contact most, or something similar (not alphabetically). Google search results are arranged by what result Google thinks you should see first.
The fourth choice for organization is hierarchies, or outlines. Family trees or Tables of Contents are examples of this. They organize information by levels, or , you can say, by parents and children.
Your identity on the Net, all the data that is collected about who you are, is tied together with an identifier. It is a unique token, a string, a picture, or something else that is specific only to you. This is how we distinguish between identities, and know who is who.
We can use sequential numbers as identifiers if we never go backwards or reuse numbers. This can be simple and effective (unless you’re spanning different systems). Systems can’t keep track of other system’s assignments of numbers.
We can use random numbers as identifiers if you have a high enough maximum identifier number and choose identifiers randomly, it can be very improbable that the same number twice will be chosen twice.
In global unique identifiers (GUIDs) systems choose a random number from a very large pool and be almost positive that no other system at no other time has chosen the same number.
Web addresses (which are unique identifiers for your organization) and many other identifiers on the Web are assured to be unique by the use of a directory. Someone in charge of keeps a list of all the ids people have chosen. When someone requests a new id, they check it against the list to see if it’s already been taken.
Your online identity can be more or less true to who you actually are. You can create fake profiles, or lie about yourself, your identity is malleable. It’s not as simple as saying there is a “real” and a “fake” you.
What does it mean for you to be “data mined”? It means that someone is collecting information about you and drawing conclusions from it.
If in the process of data mining the data collected on you is anonymized it cannot be tied back to your true identity. In that case, any conclusions that can be made are general conclusions about people and cannot be used to target you. But this does not always happen and even if it does, it may still be possible to tie the conclusions made back to you.
By now you should be pretty familiar with the vocab words of this module. So, you should be able to use them properly and creatively
Read over the vocabulary words one more time
Compose and type in a story that shows you really understand each of the words
Be creative but be sure what you type shows you understand (not just can type) the words
Use all the vocabulary words
Type them exactly as they are typed above (same pluralization, capitalization, tense, etc.)
Protagonist should be included in the story!
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more