Digital Solutions External

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/116

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

117 Terms

1
New cards

Synchronous Data Exchange

the sender and receiver take turns sending and acknowledging data exchanges

2
New cards

Asynchronous Data Exchange

the sender sends data but does not wait for a response

3
New cards

REST

Representational State Transfer. Set of rules for building web applications/APIs. Stateless - The server provides whatever information the client needs to interact with the service. 

4
New cards

Stateless Services

A requesting system (client/browser) can interact with a server in complex ways by following a uniform and predefined set of stateless operations. The client will send any relevant information to the server within a query, so the server does not need to know the exact state of the client to respond to the client’s queries.

5
New cards

API

data exchange application that enables two software components to communicate with each other using a set of definitions and protocols. Request → API → Server → API → Client

6
New cards

API Key

Unique code provided to a user which identifies them and authenticates their use of an API. Used to control and track an API’s usage.

7
New cards

JSON

Javascript Object Notation. Does not use end tags. Quicker to read and write. Easier to parse values.

8
New cards

XML

Similar to HTML. All elements must be closed, no built-in tags. Easily readable but requires an XML parser to access.

9
New cards

Network Transmission Principles

Elements of sending data between two networked devices

10
New cards

Latency

delay between the time an application requests data and the time it receives it. influenced by serialisation, propagation, switching and queuing

11
New cards

Jitter

irregular latency in data transmission (lag/stuttering) caused by irregular packet transmission and network congestion. Often noticeable in synchronous exchanges.

12
New cards

Jitter examples

Stuttering when streaming videos, delays in voice/video calls, distortion or choppy audio, lag and stuttering when online gaming

13
New cards

Guarantee

Quality of service guarantee – some packets are prioritised over others to reduce latency or variance in packet delay.

14
New cards

Best-Effort Services

no guarantee of timeliness

15
New cards

Differentiated Services

some traffic is treated better than other traffic

16
New cards

Guaranteed Services

some network bandwidth is reserved for critical applications

17
New cards

Timeliness

timeliness of delivery - how current a data packet is at the time it is received. Data processing can be adjusted if the application is time sensitive.

18
New cards

Hard deadline

late data is discarded

19
New cards

Soft deadline

late data is used but is not as accurate

20
New cards

No deadlines

data delivered via best-effort approach

21
New cards

Network Transmission Protocols

rules that define the exchange of data packets between networked devices

22
New cards

Communication Protocols

Protocols that determine rules and formats to transfer data across networks. Relate to syntax, authentication, semantics, and error detection e.g. HTTP, TCP, IP, FTP, VPN

23
New cards

HTTP

Hyper-text transfer protocol. Request-response stateless transmission protocol that allows communication between a server and client. Sends data as plain text. No encryption or authentication.

24
New cards

HTTP Request

Contains a method type (GET/POST/ PUT/DELETE) and URI (Uniform Resource Identifier).

25
New cards

HTTP Response

Contains success or error code and messages containing requested data

26
New cards

HTTPS

Secure version of HTTP. Uses Transport Layer Security (TLS) or Secure Socket Layer (SSL) to encrypt transmission using public key encryption methods.

27
New cards

SSL

When data is requested via HTTPS, the web server sends an SSL certificate to the client which contains a public encryption key. Public key is used in an SSL handshake to establish secure session.

28
New cards

Transmission Control Protocol (TCP)

Protocol that guarantees that all data packets received will be identical to and in the same order as those sent. Times packet transmission in case of corruption or loss (packet re-transmitted)

29
New cards

Internet Protocol (IP)

Facilitates routing data packets across networks using addressing and control information. Works along with TCP in delivering packets.

30
New cards

File Transfer Protocol (FTP)

Allows for the transfer of computer files between a server and a client on a computer network by establishing two TCP connections, one for data transfer and the other for control. Slow (one control connection used for multiple transfers) and stateful. Usually requires sign in.

31
New cards

Virtual Private Network (VPN)

Encrypted connection between two network devices. Adds extra protection to data packets (e.g. SSL) – known as ‘tunnelling’. Most use public key encryption which ensures data integrity and authentication during data exchanges

32
New cards

Hashing

Operation that takes any string of text, regardless of length or size, as an input and provides a fixed-length indistinguishable string as an output. One way.

33
New cards

Purpose of Hashing

Protects data from unauthorized access in the case of a data breach

34
New cards

Data Compression

Reduces file size by getting rid of unnecessary data. Compress using ZIP, GZIP

35
New cards

Benefits of Data Compression

Conserves storage capacity, faster file transfers, minimises costs for hardware storage and network capacity

36
New cards

Lossy Compression

Data is lost. Used for graphics, audio files etc. where deletion of some data has little effects

37
New cards

Lossless Compression

Does not lose data. Can be returned to original file size. Used for executable files, text, spreadsheet files etc. where loss of data would change information

38
New cards

Full Disk Encryption (FDE)

Encryption of data at rest. When you save a file on disk/hard drive, it is automatically encrypted.

39
New cards

File Encryption

the manual encryption of an individual file

40
New cards

End to End Encryption

Original data only understandable to sender and receiver. Encrypts communication chain and the message all the way.

41
New cards

Confidentiality

Preventing the possibility of unauthorized access to data in transit

42
New cards

Integrity

Preventing the possibility of the malicious intercepting and altering of data to maintain accuracy and trustworthiness across its life cycle

43
New cards

Availability

Preventing the possibility that someone may interfere with data transmission to prevent the data reaching its required destination

44
New cards

Encryption

Scrambling a message so it cannot be read in transit, but decrypted by an authorised recipient with a key

45
New cards

Authentication

Verifying identification of sender/receiver using a digital signature or authentication code

46
New cards

Checksum

data ‘fingerprint’ which ensures data is transmitted accurately without corruption or loss

47
New cards

Block Cipher

Encrypts plaintext symbols in blocks (more secure)

48
New cards

Stream Cipher

Convert each symbol of plaintext into ciphertext one by one (faster)

49
New cards

Symmetric Encryption

Uses the same key to encrypt/decrypt

50
New cards

Asymmetric Encryption

Uses receiver’s public key for encryption and private key for decryption - secure from users without private key

51
New cards

Feistel Network

Used in the construction of block ciphers. Very similar or identical set of iterative structural processes to encrypt or decrypt the same block of data.

52
New cards

Sequence

a series of steps or instructions that follow one after the other

53
New cards

Iteration

using loops to avoid having to repeat code. Includes for while and do while loops.

54
New cards

Condition

logical expression that is true or false

55
New cards

Selection

Choosing whether code runs or not based on a condition e.g. if statement

56
New cards

Functions

Defining a sequence of code with a name that can be called by other code. Used to avoid repeating code.

57
New cards

Variables/Assignment

Containers that store (remember) data so it can be used elsewhere

58
New cards

Modularisation

Reducing a systems complexity by breaking it up into units/modules

59
New cards

Substitution Cipher

Plain text is converted into cipher text using a key which can be reversed to decrypt the message

60
New cards

Caesar cipher

simple substitution cipher. each letter is shifted by a constant amount.

61
New cards

Polyalphabetic Cipher

Substitution cipher where the amount each letter is shifted by changes over the course of the message

62
New cards

Vigenere Cipher

A random keyword is created and repeated to match the length of the message. Each letter in the message is shifted by the numerical value of its corresponding letter in the keyword, or a cipher table can be used.

63
New cards

Gronsfeld Cipher

A numeric key is created and repeated to match the length of the message. Each letter in the message is shifted by its corresponding numerical value.

64
New cards

One-Time Pad Encryption

A unique key the length of the message is randomly generated. Both the sender and receiver have a copy of this key. Each letter is shifted by its corresponding numerical value in the key. To decrypt, the receiver shifts the letters back using the key.

65
New cards

Issues with Ciphers

Easily broken computationally allowing unauthorised access

66
New cards

Elements of Visual Communication

Line, space, colour, shape, tone, texture, form, scale, proportion

67
New cards

Principles of Visual Communication

Hierarchy, balance, contrast, alignment, proximity, harmony, repetition

68
New cards

Accessibility

Ability to be used by many different people, including those with disabilities

69
New cards

Effectiveness

Ability of users to use the system to do the work they need to do, includes reliability

70
New cards

Utility

Ability of the system to provide all the functionality that users need

71
New cards

Safety

Ability for users to make mistakes and recover from them

72
New cards

Learnability

How easy a system is to learn

73
New cards

APP 1

Personal information must be managed in an open and transparent way. Have a clearly expressed and up to date privacy policy.

74
New cards

APP 2

Individuals should have the option of not identifying themselves or using a pseudonym unless the entity is required or authorised by law to deal with identified individuals

75
New cards

APP 3

Organisations can only solicit and collect personal information that is reasonably necessary and from the individual concerned and it must be collected lawfully and fairly.

76
New cards

APP 4

Most unsolicited personal information must be destroyed or de-identified ASAP unless it is from a Commonwealth record. If the organisation is not required to destroy the information, they can manage it using APPS 5-13

77
New cards

APP 5

An organisation must notify an individual about the collection of their personal information, before or at the time of collection as well as inform them of the purposes of collection, the privacy policy, and consequences if information is not collected.

78
New cards

APP 6

Organisation can only use or disclose personal information for the reason it was collected

79
New cards

APP 7

An organisation must not use or disclose personal information for the purpose of direct marketing.

80
New cards

APP 8

Before an organisation discloses personal information to an overseas recipient, they must ensure that the overseas recipient does not breach the APPs in relation to the information

81
New cards

APP 9

An organisation should not use a government related identifier as its own identifier of an individual or disclose any government related identifiers

82
New cards

APP 10

Personal information should be accurate, up to date, and complete

83
New cards

APP 11

An organisation must protect personal information from misuse, interference, loss and unauthorised access, modification, or disclosure.

84
New cards

APP 12

An individual must be given access to their personal information if requested

85
New cards

APP 13

Organisations should correct personal information that is not accurate, up to date, complete, relevant or is misleading

86
New cards

%

for zero or more unknown characters

87
New cards

_

for a single unknown character

88
New cards

WHERE

filter results based on a specific condition

89
New cards

LIKE

used for partial matching

90
New cards

IN


allows you to specify multiple conditions in a where statement

91
New cards

HAVING

WHERE for calculation functions

92
New cards

GROUP BY

used with calculation functions to group results by a matching condition

93
New cards

inner-join

uses a matching field to select data from multiple tables

94
New cards

create a new table

CREATE TABLE table name (

column name datatype null value

primary key (column name)

)

95
New cards

delete a table

DROP TABLE table name

96
New cards

add/delete/modify columns

ALTER TABLE table name, ADD column name datatype DROP/RENAME/ALTER column name

97
New cards

add a new record to a table

INSERT INTO table name (column1, column2, column3, ...) VALUES (value1, value2, value3, ...)

98
New cards

modify an existing record

UPDATE table name
SET column1 = value1
WHERE condition

99
New cards

delete existing record

DELETE FROM table name

WHERE condition

100
New cards

Streaming and Broadcasting Data Packets

How data is sent over the internet