Applied computing 1/2 exam

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Non functional requirement

A characteristic of what the user would want like custom fonts etc.

2
New cards

Functional requirement

A function in the code that is necessary for it to run

3
New cards

Scope

The boundaries of the solution/ what it will do and what it won’t

4
New cards

Constraints

What the solution will not be able to do

5
New cards

Data collection methods:

Interviews, surveys

6
New cards

Malware

Trojan, spyware, virus, worms

7
New cards

Ciphers

Protects data by using something called encryption turning readable data into an unreadable format.

8
New cards

Polyalphabetic cipher

used to substitute alphabets

9
New cards

Vigener cipher

shifts positions in the alphabet

10
New cards

Machine learning

Ai analyses various data traffic identifying patterns allowing to authenticate malicious activities.

11
New cards

Ethical hacking/ white hat hacking

Professionals who purposely try to hack a system trying to figure out possible vulnerabilities 

12
New cards

LAN

local area network connects device in a limited geographical location

13
New cards

WAN

wide area network is in more than 1 geographical location often consisted of 2 lans able to communicate using the internet.

14
New cards

Router

a device used to connect multiple lans or a wan allowing them connect to the internet.

15
New cards

switch

A device that uses physical device signals to send it to the right place. It chooses where to send it opposite to a hub.

16
New cards

Hub

A device that takes signals then distributes it to the entire network.

17
New cards

Federal parliment

responsible for creating legistrations that applies to all individuals and organisations in Australia.

18
New cards

State parliment

responsible for creating legistrations for individuals in a specific state.

19
New cards

Act of parliment

document that contains a set of rules for a particular area

20
New cards

HPP2

Only disclose health information for the primary purpose it was collected for or directly related to the secondary purpose.

21
New cards

HPP4

Safeguard the information you hold against misuse

22
New cards

HPP5

Documents should clearly express polices in your management of health. Make this available for anyone who asks.

23
New cards

APP1

Open and transparent management of personal information. Clear privacy policy

24
New cards

APP6

use or disclose personal information for the primary purpose

25
New cards

APP11

Take reasonable steps to protect the data from threats.

26
New cards

IPP2

Personal information should only be disclosed for the primary purpose

27
New cards

IPP4

Organisations should protect personal information from misuse.

28
New cards

IPP5

Organisations must have clearly expressed polices

29
New cards

Sequence

A set of instructions that executes line by line

30
New cards

Selection

Allows applications to make decisions 

31
New cards

Iteration

also known as a loop is used to repeat code multiple times.

32
New cards

Software maintenance

making change to the software after they have been installed to improve performance.

33
New cards

operating system updates

keeping the software updated to improve usability functionaility and security

34
New cards

Staff procedures

Steps staff should take when dealing with data and information.

35
New cards

encription

involves changing data so it can only be decrypted with a key.

36
New cards

symmetric encryption

both sender and user use the same private key.

37
New cards

asymmetric encryption

The sender uses a public key to encrypt the message where as the receiver uses a private key to decrypt the information.