OpenILIAS Uni Göttingen
  • Anmelden

Brotkrumen-Navigation

Reiter

Funktionen

(1 - 10 von 22)    zurück  |  weiter     Filter anzeigen
Begriff Definitionen
Authorisation system The authorisation system in a database regulates which users may perform which operations in the system. Typical access rights are e.g. view, read, edit, admin. It makes sense that not all users have …
Bibliographic data Bibliographic data includes the descriptive data of a book or other medium, such as author, title or year of publication. These data are needed, for example, to create a bibliography in a term paper o…
Character Characters are the smallest element used to represent information. Examples of characters are alphabetical characters (letters), numeric characters (digits), and alphanumeric characters (combinations …
Compression Compression is a process in which the amount of digital data is compressed and thus reduced. Thus the amount of storage space required is reduced and the time required to transfer the data (e.g. when …
Data analysis In data analysis, statistical methods are used to extract information from collected data. For more information on the graphical analysis of data, see the Selbstlernkurs zur Informationsvisualisierung…
Data processing Data processing describes a process in which data is collected, ordered, processed and edited using a computer. In this way, further information about this data can be obtained.
Data redundancy Redundancies are duplicate information in a database or database table.
Data Scientists Data Scientist is the term used to describe scientists who deal with the preparation, statistical analysis and visualisation of data. Data Science is becoming more and more widespread as a field of st…
Hacker In computer security, hackers deal with security mechanisms and their weaknesses. They try to get into systems and obtain data. Depending on their motivation, a distinction can be made between legal t…
Hackers In computer security, hackers deal with security mechanisms and their weaknesses. They try to get into systems and obtain data. Depending on their motivation, a distinction can be made between legal t…
(1 - 10 von 22)    zurück  |  weiter