Applied Exam Revision AOS2

0.0(0)
studied byStudied by 9 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:14 PM on 11/10/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

40 Terms

1
New cards

LAN (Local Area Network)

It’s a network of computers within small area like room, buildings or colleges. LAN where wireless media are used is known as Wireless Local Area Network

2
New cards

WAN (Wide Area Network)

WAN is a a network of a computers in a wide geographical area such as a country, neighboring countries continent. A WAN can be formed by joining LANs. E.g. the internet is the largest WAN.

3
New cards

WPAN (Wireless personal network)

A personal area network is a computer network for connecting individuals within a limited range.A WPAN is a type of personal network that uses wireless transmission media to transfer data between a users personal device.Common devices found within a WPAN includes laptops, smart TVs, wearable tech, phones and speakers.

image.png

4
New cards

Network Architecture

Specifies how computers on the networks interacts and communicates with each other.

5
New cards

Client Server Network

  • Computers are connected to a central server and communication is done through it.

  • Server is the main computer and gives services to the work station

  • Serve runs the NOS (network operating system) controls LAN

6
New cards

Peer to Peer Network

Every computer in the network has equal right

Does not contain a file server to control the LAN

Has trust in the users and a small number of users

7
New cards

Virtual Private network (VPN)

A network that is constructed by using the internet to connect to a private network, such as a company’s internal network.

8
New cards

NIC (network interface card)

Is a component of the computer which allows it to connect to the network and “interface with it”

9
New cards

Hub

Serves as a central connection point for multiple computers and devices linking them together in a LAN.

10
New cards

Switch

A switch can read the address of of the data and send the data to the correct device. Like traffic lights.

11
New cards

Connectors

cables and connectors are used to transfer data

12
New cards

Routers

Routers used to connect to other networks also may allow wireless access to the network.

13
New cards

Wireless Access Point

any point which you can access a network E.g. modem or router

14
New cards

File Server

Server specifically set up to share documents and digital resources e.g. videos, programs

15
New cards

Network Protocol

Established set of rules that dictate how to format, transmit and receive data so computer network devices can communicate regardless of the differences in their underlying infrastructures, design.

16
New cards

TCP/IP

The TCP/IP (Transmission Control Protocol/Internet Protocol)

is a set of rules that allow communication between two

networked devices.

17
New cards

DDoS

a DDoS attack is an attack in which multiple compromised computer systems attack a target, such as a server, website

18
New cards

Security Threat

Anything that has potential to cause harm to data and information stored and in communication between information systems.

19
New cards

Malware

software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

20
New cards

Virus

A computer program that reproduces it self on the same computer

21
New cards

Worms

Is a self replicating malware that can spread across computer systems, which can modify, corrupt or detect data and information

22
New cards

Trojans

Take the form of ‘free virus checking software’ when in fact they are malware and can be virus propagators

23
New cards

Spyware

Collects data about a users activity and sends that data to another location without the users knowledge

24
New cards

Brute Force Attacks

Making repetitive attempts to access an information system using variations of possible usernames and/or passwords

25
New cards

Encryption

Involves encoding or changing data so that it can only be decrypted by the receiver if they have the correct key.

26
New cards

Encryption Key

A series of bits that is used to apply an algorithm to the data packets to scramble and unscramble the data.

27
New cards

Symmetric Encryption

Both sender and receiver use the same private key. Sender encrypts using that private key and the receiver decrypts using that private key.

28
New cards

Full Backup

Copies all of the files from a device to a storage medium.  It takes a long time and only performed once over a time period.

29
New cards

Differential Backup

Copies only the files that have been modified or changed since the last full backup.

30
New cards

Incremental Backup

Only copies files that have been changed since the last incremental backup.

31
New cards

Location of backup files

Backups should be stored in a location that is safe from theft and damage. Furthermore, backups can also be stored on the cloud away from the onsite location.

32
New cards

APP1

Open and transparent management of personal information. Organizations must have a clear and accessible privacy policy.

33
New cards

APP6

Use or disclosure of personal information. Can only use or disclose personal info for the primary purpose it was collected.

34
New cards

APP11

Security of personal information. Organizations are required to take reasonable measures to prevent breach.

35
New cards

IPP2

Personal information can only be used and disclosed for the primary purpose for which it was collected, or for a secondary purpose that be expected.

36
New cards

IPP4

Information must be protected from misuse. Reasonable steps must be taken to destroy or de identify personal info that is not needed anymore.

37
New cards

IPP5

The organization needs to be transparent about what it does with information

38
New cards

HPP2

Only use or disclose health info for the primary purpose for which it was collected or directly related secondary purpose. Or you would need consent.

39
New cards

HPP4

Safe guard the health info you hold against misuse, loss, unauthorized access and modification.

40
New cards

HPP5

Document clearly expressed policies on your management of health information and make this statement available to anyone who asks for it.