1/55
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Functional Requirements
Directly related to what the solution will do. These become the functions that the software in corporates.
Non-Functional Requirements
Characteristics users on clients would like the solution to have but not affect what the solution does.
Scope
Outlines the boundaries or parameters of the solution so all stakeholders are aware of exactly what the solution will and won't contain.
Solution constraints
Factors that may limit or restrict the solution requirements, both functional and non- functional.
Testing Table
Way to record evidence of functionality testing
APP 1 Open and transparent management of personal information
Ensures that App entities manage personal information in an open and transparent way.
APP 2 Anonymity and Pseudonymity
Requires APP entities to give individuals the option of not identifying themselves, or of using a pseudonym.
App 6 use or disclose of personal information
Outlines the circumstances in which an APP entity may use or disclose personal information it holds.
APP 11 Security of personal information
An APP entity must take reasonable steps to protect personal information it holds from misuse, interference and loss, and from unauthorised access, modification or disclosure.
IPP 1 Collection
An organisation can only collect personal information if it is necessary to fulfil one or more of its function
IPP 2 Use and disclosure
Personal information can only be used and disclosed for the primary purpose for which it was collected, or for a secondary purpose that would be reasonably expected.
IPP 4 Data security
Organisations need to protect the personal information they hold from misuse, loss unauthorised access, modification or disclosure.
IPP 5 Openness
Organisations must have clearly expressed policies on the way they manage personal information.
IPP 8 Anonymity
Where lawful and practicable, individuals should have the option of transacting with an organisation without identifying themselves.
HPP 1 Collection
Only collect health information if necessary for the performance of a function or activity, and with consent (unless consent cannot be obtained and all other criteria under HPP 1 are satisfied).
HPP 2 Use and Disclosure
Only use or disclose health information for the primary purpose for which it was collected or a directly related secondary purpose would reasonably expect.
HPP 4 Data Security and retention
Safeguard the health information you hold against misuse, loss, unauthorised access and modification.
HPP 5 Openness Document
Clearly expressed policies on your management of health information and make this statement available to any one who asks for it.
Ethical issues arising from using AI
Biased, discriminatory or harmful contention AI systems rely on using information published and can confuse opinions for facts.
Content and the potential for cyber attacks : Af can be employed to generate sophisticated phishing emails, create malware or auto mate hacking attempts making cyber attacks more efficient and harder to detect.
Problems with copyright: AI's capability to generate text, images, music and other forms of content that closely resemble human-created works raises copyright concerns.
Project Journals
Events that affect each task in the project are written down to create a history of the project
Gantt Charts
Standard format for displaying project schedule information.
Version Control
A system that records changes to a file or set of files overtime so that you can recall specific versions later.
Predecessor
A task that must be completed before another task can begin.
Dependencies
Show the relationships between tasks, when a task should begin or end in relation to another task.
Milestone
A diamond- shaped marker representing a significant event or deadline, not atask with a duration.
Critical Path
Shows the longest sequence of dependent tasks that directly impacts a project's completion date.
Survey
A set of questions that ask for a response from a list of alternatives ie. Interviews: A conversation in which questions are asked and answers are given.
AI
Enabling systems to learn from data, make Predictions and improve over time without explicit programming
Smart Devices
Enabling remote patient monitoring, reducing hospital read missions and providing Valuable data for medical research.
Drones, micro controllers
Expanding capabilities in areas such as logistics, environmental monitoring and space exploration.
Mixed Realities
Enabling new forms of communication, learning, and entertainment by blending the physical and digital worlds.
Blockchain
Secure, transparent and tamper-proof record - keeping in industries such as finance, supply chain management and health care.
Economic Issues Of Emerging Technology
Deskilling (when a skilled worker is replaced, or their job specification is reduced, as a result of implementing technology.)
Job loss
Social Issues Of Emerging Technology
Loss of human interaction
Effectiveness
Completeness: Everything provided, nothing left out.
Attractiveness: Presented pleasantly, eye catching format
Readability: Easy to read
Clarity: Clear, intuitive, obvious
Accuracy: No mistakes in the information
Relevance: Everything is dissociated with the tapic
Communication of message: Message is obvious and
easy to use
Accessibility: Information can be easily found even with a disability such as visually or hearing impaired.
Timeliness: Up-To-Date, ready when needed
Usability: Easy to use
Maintainability: The ease with which a software system can be modified, updated, extended, or repaired auer time,
Efficiency
Time, Cost, Effort
Design Tools
Storyboards, Pseudocode, Mockups, Site-map
Modem
To connect LANs to the internet, A modem converts binary into audio o signals and vice versa So data can be transmitted over a telephone line.
Router
Connects 2 different networks together, often joining several LAN's or a LAN to a WAN.
Switch
A central device which connects other devices together on a LAN.
WAP
A Wireless Access Point (WAP) is a networking hardware device that allows a Wi-Fi compliant device to connect to a wired network. It typically connects to a router (via a wired connection) as a standalone device, but it can also be an integral component of the router itself.
Server
A Server is a device that is used to provide services to other devices connected to a network.
Malware
Programs designed to infiltrate and cause damage, disruption or access to a device or network without the user’s knowledge or consent; includes viruses, worms, trojan horses, adware, spyware, ransomware, logic bombs and keyloggers.
LAN
Connects computers and devices in a limited geographical area.
WAN
Connects computers and devices over a large geographical area.
WPAN
A computer network for connecting an individual’s devices within a limited range.
WAP
A communications device that allows devices to wirelessly connect to an existing wired network.
Multi-factor Authentication
Requires the user to provide two or more verification factors to gain access to a resource, such as a network or system.
Encryption
Encoding or changing data so that it can only be decrypted by the receiver if they have the correct key.
Internet
A worldwide network in which billions of devices are connect together for the purposes of communication and data exchange.
Intranet
A private network accessible only to users within an organisation.
Firewall
A network security device or software application that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
White Hat Hacker
A White hat is given authorisation to hack a device or network to identify weaknesses within the current security strategy.
Gray Hat Hacker
A Gray hat does it for the challenge or prestige.
Black Hat Hacker
A Black hat aims to steal data and information to sell or ransom.