Applied Computing Semester 2 Exam (*  ̄3)(ε ̄ *)

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Functional Requirements

Directly related to what the solution will do. These become the functions that the software in corporates.

2
New cards

Non-Functional Requirements

Characteristics users on clients would like the solution to have but not affect what the solution does.

3
New cards

Scope

Outlines the boundaries or parameters of the solution so all stakeholders are aware of exactly what the solution will and won't contain.

4
New cards

Solution constraints

Factors that may limit or restrict the solution requirements, both functional and non- functional.

5
New cards

Testing Table

Way to record evidence of functionality testing

6
New cards

APP 1 Open and transparent management of personal information

Ensures that App entities manage personal information in an open and transparent way.

7
New cards

APP 2 Anonymity and Pseudonymity

Requires APP entities to give individuals the option of not identifying themselves, or of using a pseudonym.

8
New cards

App 6 use or disclose of personal information

Outlines the circumstances in which an APP entity may use or disclose personal information it holds.

9
New cards

APP 11 Security of personal information

An APP entity must take reasonable steps to protect personal information it holds from misuse, interference and loss, and from unauthorised access, modification or disclosure.

10
New cards

IPP 1 Collection

An organisation can only collect personal information if it is necessary to fulfil one or more of its function

11
New cards

IPP 2 Use and disclosure

Personal information can only be used and disclosed for the primary purpose for which it was collected, or for a secondary purpose that would be reasonably expected.

12
New cards

IPP 4 Data security

Organisations need to protect the personal information they hold from misuse, loss unauthorised access, modification or disclosure.

13
New cards

IPP 5 Openness

Organisations must have clearly expressed policies on the way they manage personal information.

14
New cards

IPP 8 Anonymity

Where lawful and practicable, individuals should have the option of transacting with an organisation without identifying themselves.

15
New cards

HPP 1 Collection

Only collect health information if necessary for the performance of a function or activity, and with consent (unless consent cannot be obtained and all other criteria under HPP 1 are satisfied).

16
New cards

HPP 2 Use and Disclosure

Only use or disclose health information for the primary purpose for which it was collected or a directly related secondary purpose would reasonably expect.

17
New cards

HPP 4 Data Security and retention

Safeguard the health information you hold against misuse, loss, unauthorised access and modification.

18
New cards

HPP 5 Openness Document

Clearly expressed policies on your management of health information and make this statement available to any one who asks for it.

19
New cards

Ethical issues arising from using AI

  • Biased, discriminatory or harmful contention AI systems rely on using information published and can confuse opinions for facts.

  • Content and the potential for cyber attacks : Af can be employed to generate sophisticated phishing emails, create malware or auto mate hacking attempts making cyber attacks more efficient and harder to detect.

  • Problems with copyright: AI's capability to generate text, images, music and other forms of content that closely resemble human-created works raises copyright concerns.

20
New cards

Project Journals

Events that affect each task in the project are written down to create a history of the project

21
New cards

Gantt Charts

Standard format for displaying project schedule information.

22
New cards

Version Control

A system that records changes to a file or set of files overtime so that you can recall specific versions later.

23
New cards

Predecessor

A task that must be completed before another task can begin.

24
New cards

Dependencies

Show the relationships between tasks, when a task should begin or end in relation to another task.

25
New cards

Milestone

A diamond- shaped marker representing a significant event or deadline, not atask with a duration.

26
New cards
27
New cards

Critical Path

Shows the longest sequence of dependent tasks that directly impacts a project's completion date.

28
New cards

Survey

A set of questions that ask for a response from a list of alternatives ie. Interviews: A conversation in which questions are asked and answers are given.

29
New cards

AI

Enabling systems to learn from data, make Predictions and improve over time without explicit programming

30
New cards

Smart Devices

Enabling remote patient monitoring, reducing hospital read missions and providing Valuable data for medical research.

31
New cards

Drones, micro controllers

Expanding capabilities in areas such as logistics, environmental monitoring and space exploration.

32
New cards

Mixed Realities

Enabling new forms of communication, learning, and entertainment by blending the physical and digital worlds.

33
New cards

Blockchain

Secure, transparent and tamper-proof record - keeping in industries such as finance, supply chain management and health care.

34
New cards

Economic Issues Of Emerging Technology

  • Deskilling (when a skilled worker is replaced, or their job specification is reduced, as a result of implementing technology.)

  • Job loss

35
New cards

Social Issues Of Emerging Technology

  • Loss of human interaction

36
New cards

Effectiveness

Completeness: Everything provided, nothing left out.

Attractiveness: Presented pleasantly, eye catching format

Readability: Easy to read

Clarity: Clear, intuitive, obvious

Accuracy: No mistakes in the information

Relevance: Everything is dissociated with the tapic

Communication of message: Message is obvious and

easy to use

Accessibility: Information can be easily found even with a disability such as visually or hearing impaired.

Timeliness: Up-To-Date, ready when needed

Usability: Easy to use

Maintainability: The ease with which a software system can be modified, updated, extended, or repaired auer time,

37
New cards

Efficiency

Time, Cost, Effort

38
New cards

Design Tools

Storyboards, Pseudocode, Mockups, Site-map

39
New cards

Modem

To connect LANs to the internet, A modem converts binary into audio o signals and vice versa So data can be transmitted over a telephone line.

40
New cards

Router

Connects 2 different networks together, often joining several LAN's or a LAN to a WAN.

41
New cards

Switch

A central device which connects other devices together on a LAN.

42
New cards

WAP

A Wireless Access Point (WAP) is a networking hardware device that allows a Wi-Fi compliant device to connect to a wired network. It typically connects to a router (via a wired connection) as a standalone device, but it can also be an integral component of the router itself.

43
New cards

Server

A Server is a device that is used to provide services to other devices connected to a network.

44
New cards

Malware

Programs designed to infiltrate and cause damage, disruption or access to a device or network without the user’s knowledge or consent; includes viruses, worms, trojan horses, adware, spyware, ransomware, logic bombs and keyloggers.

45
New cards

LAN

Connects computers and devices in a limited geographical area.

46
New cards

WAN

Connects computers and devices over a large geographical area.

47
New cards

WPAN

A computer network for connecting an individual’s devices within a limited range.

48
New cards

WAP

A communications device that allows devices to wirelessly connect to an existing wired network.

49
New cards

Multi-factor Authentication

Requires the user to provide two or more verification factors to gain access to a resource, such as a network or system.

50
New cards

Encryption

Encoding or changing data so that it can only be decrypted by the receiver if they have the correct key.

51
New cards

Internet

A worldwide network in which billions of devices are connect together for the purposes of communication and data exchange.

52
New cards

Intranet

A private network accessible only to users within an organisation.

53
New cards

Firewall

A network security device or software application that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

54
New cards

White Hat Hacker

A White hat is given authorisation to hack a device or network to identify weaknesses within the current security strategy.

55
New cards

Gray Hat Hacker

A Gray hat does it for the challenge or prestige.

56
New cards

Black Hat Hacker

A Black hat aims to steal data and information to sell or ransom.