Digital Solutions External

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/118

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:01 AM on 11/3/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

119 Terms

1
New cards

Synchronous Data Exchange

the sender and receiver take turns sending and acknowledging data exchanges

2
New cards

Asynchronous Data Exchange

the sender sends data but does not wait for a response

3
New cards

REST

Representational State Transfer. Set of rules for building web applications/APIs. Stateless - The server provides whatever information the client needs to interact with the service. 

4
New cards

Stateless Services

A client/browser can interact with a server in complex ways by following a uniform and predefined set of stateless operations.

5
New cards

Stateless Meaning

The client will send any relevant information to the server within a query, so the server does not need to know the exact state of the client to respond to the client’s queries.

6
New cards

API

data exchange application that enables two software components to communicate with each other using a set of definitions and protocols. Request → API → Server → API → Client

7
New cards

API Key

Unique code provided to a user which identifies them and authenticates their use of an API. Used to control and track an API’s usage.

8
New cards

JSON

Javascript Object Notation. Does not use end tags. Quicker to read and write. Easier to parse values.

9
New cards

XML

Similar to HTML. All elements must be closed, no built-in tags. Easily readable but requires an XML parser to access.

10
New cards

Network Transmission Principles

Elements of sending data between two networked devices

11
New cards

Latency

delay between the time an application requests data and the time it receives it. influenced by serialisation, propagation, switching and queuing

12
New cards

Jitter

irregular latency in data transmission (lag/stuttering) caused by irregular packet transmission and network congestion. Often noticeable in synchronous exchanges.

13
New cards

Jitter examples

Stuttering when streaming videos, delays in voice/video calls, distortion or choppy audio, lag and stuttering when online gaming

14
New cards

Guarantee

Quality of service guarantee – some packets are prioritised over others to reduce latency or variance in packet delay.

15
New cards

Best-Effort Services

no guarantee of timeliness

16
New cards

Differentiated Services

some traffic is treated better than other traffic

17
New cards

Guaranteed Services

some network bandwidth is reserved for critical applications

18
New cards

Timeliness

timeliness of delivery - how long it takes for a data packet to be transmitted to a recipient. Data processing can be adjusted for time sensitive applications.

19
New cards

Hard deadline

late data is discarded

20
New cards

Soft deadline

late data is used but is not as accurate

21
New cards

No deadlines

data delivered via best-effort approach

22
New cards

Network Transmission Protocols

rules that define the exchange of data packets between networked devices

23
New cards

Communication Protocols

Protocols that determine rules and formats to transfer data across networks. Relate to syntax, authentication, semantics, and error detection e.g. HTTP, TCP, IP, FTP, VPN

24
New cards

HTTP

Hyper-text transfer protocol. Request-response stateless transmission protocol that allows communication between a server and client. Sends data as plain text. No encryption or authentication.

25
New cards

HTTP Request

Contains a method type (GET/POST/ PUT/DELETE) and URI (Uniform Resource Identifier).

26
New cards

HTTP Response

Contains success or error code and messages containing requested data

27
New cards

HTTPS

Secure version of HTTP. Uses Transport Layer Security (TLS) or Secure Socket Layer (SSL) to encrypt transmission using public key encryption methods.

28
New cards

SSL

When data is requested via HTTPS, the web server sends an SSL certificate to the client which contains a public encryption key. Public key is used in an SSL handshake to establish secure session.

29
New cards

Transmission Control Protocol (TCP)

Protocol that guarantees that all data packets received will be identical to and in the same order as those sent. Times packet transmission in case of corruption or loss (packet re-transmitted)

30
New cards

Internet Protocol (IP)

Facilitates routing data packets across networks using addressing and control information. Works along with TCP in delivering packets.

31
New cards

File Transfer Protocol (FTP)

Allows for the transfer of computer files between a server and a client on a computer network by establishing two TCP connections, one for data transfer and the other for control. Slow (one control connection used for multiple transfers) and stateful. Usually requires sign in.

32
New cards

Virtual Private Network (VPN)

Encrypted connection between two network devices. Adds extra protection to data packets (e.g. SSL) – known as ‘tunnelling’. Most use public key encryption which ensures data integrity and authentication during data exchanges

33
New cards

Hashing

Operation that takes any string of text, regardless of length or size, as an input and provides a fixed-length indistinguishable string as an output. One way.

34
New cards

Purpose of Hashing

Protects data from unauthorized access in the case of a data breach

35
New cards

Data Compression

Reduces file size by getting rid of unnecessary data. Compress using ZIP, GZIP

36
New cards

Benefits of Data Compression

Conserves storage capacity, faster file transfers, minimises costs for hardware storage and network capacity

37
New cards

Lossy Compression

Data is lost. Used for graphics, audio files etc. where deletion of some data has little effects

38
New cards

Lossless Compression

Does not lose data. Can be returned to original file size. Used for executable files, text, spreadsheet files etc. where loss of data would change information

39
New cards

Full Disk Encryption (FDE)

Encryption of data at rest. When you save a file on disk/hard drive, it is automatically encrypted.

40
New cards

File Encryption

the manual encryption of an individual file

41
New cards

End to End Encryption

Encrypts data on the sender's device and decrypts it only on the recipient's device, ensuring that the data is unreadable to intermediaries, including the service provider. Other encryption methods only encrypt data at rest or in transit.

42
New cards

Confidentiality

Preventing unauthorised access to data

43
New cards

Integrity

Preventing data from unauthorised changes (errors, malicious intercepting/altering) to maintain accuracy, completeness and consistency across its life cycle, ensuring reliability

44
New cards

Availability

Preventing the malicious interference with data transmission which stops data reaching its required destination e.g. preventing DDoS attacks

45
New cards

Encryption

Encoding (converting) data using mathematical formulas into a form that only an intended recipient can decode. Prevents unauthorised access to data in transit and storage.

46
New cards

Authentication

Verifying the identity of a sender or receiver of data using a digital signature or authentication code

47
New cards

Checksum

data ‘fingerprint’ which ensures data is transmitted accurately without corruption or loss

48
New cards

Block Cipher

Encrypts plaintext symbols in blocks (more secure)

49
New cards

Stream Cipher

Convert each symbol of plaintext into ciphertext one by one (faster)

50
New cards

Symmetric Encryption

Uses the same key to encrypt/decrypt

51
New cards

Asymmetric Encryption

Uses receiver’s public key for encryption and private key for decryption - secure from users without private key

52
New cards

Feistel Network

Used in the construction of block ciphers. Very similar or identical set of iterative structural processes to encrypt or decrypt the same block of data.

53
New cards

Sequence

a series of steps or instructions that follow one after the other

54
New cards

Iteration

a number of instructions or a process is repeated in a loop to avoid redundancy in written code

55
New cards

Condition

logical expression that is true or false

56
New cards

Selection

Choosing whether code runs or not based on a condition e.g. if statement

57
New cards

Functions

Defining a sequence of code with a name that can be called by other code. Used to avoid repeating code.

58
New cards

Variables

Containers that store (remember) data so it can be used elsewhere in a sequence of code

59
New cards

Assignment

Storing a data value (stated or calculated) in a variable location

60
New cards

Modularisation

Reducing a systems complexity by breaking its code into smaller seperate sections thus allowing different sections to be used in different parts of the application.

61
New cards

Substitution Cipher

Text is encrypted by replacing each letter in the plaintext with another character based on a secret key

62
New cards

Caesar cipher

simple substitution cipher. each letter is shifted by a constant amount.

63
New cards

Polyalphabetic Cipher

Substitution cipher where the amount each letter is shifted by changes over the course of the message

64
New cards

Vigenere Cipher

A random keyword is created and repeated to match the length of the message. Each letter in the message is shifted by the numerical value of its corresponding letter in the keyword, or a cipher table can be used.

65
New cards

Gronsfeld Cipher

A numeric key is created and repeated to match the length of the message. Each letter in the message is shifted by its corresponding numerical value.

66
New cards

One-Time Pad Encryption

A one-time key the length of the message is randomly generated and given to both the sender and receiver. Each letter in plaintext is combined with its corresponding character in the key using an XOR operation allowing it to be decrypted by the receiver performing the same operation with the ciphertext and the key. The key is then discarded.

67
New cards

Issues with Ciphers

Easily broken computationally allowing unauthorised access

68
New cards

Elements of Visual Communication

Line, space, colour, shape, tone, texture, form, scale, proportion

69
New cards

Principles of Visual Communication

Hierarchy, balance, contrast, alignment, proximity, harmony, repetition

70
New cards

Accessibility

Ability to be used by many different people, including those with disabilities

71
New cards

Effectiveness

Ability of users to use the system to do the work they need to do, includes reliability

72
New cards

Utility

Ability of the system to provide all the functionality that users need

73
New cards

Safety

Ability for users to make mistakes and recover from them

74
New cards

Learnability

How easy a system is to learn

75
New cards

APP 1

Personal information must be managed in an open and transparent way. Have a clearly expressed and up to date privacy policy.

76
New cards

APP 2

Individuals should have the option of not identifying themselves or using a pseudonym unless the entity is required or authorised by law to deal with identified individuals

77
New cards

APP 3

Organisations can only solicit and collect personal information that is reasonably necessary and from the individual concerned and it must be collected lawfully and fairly.

78
New cards

APP 4

Most unsolicited personal information must be destroyed or de-identified ASAP unless it is from a Commonwealth record. If the organisation is not required to destroy the information, they can manage it using APPS 5-13

79
New cards

APP 5

An organisation must notify an individual about the collection of their personal information, before or at the time of collection as well as inform them of the purposes of collection, the privacy policy, and consequences if information is not collected.

80
New cards

APP 6

Organisation can only use or disclose personal information for the reason it was collected

81
New cards

APP 7

An organisation must not use or disclose personal information for the purpose of direct marketing.

82
New cards

APP 8

Before an organisation discloses personal information to an overseas recipient, they must ensure that the overseas recipient does not breach the APPs in relation to the information

83
New cards

APP 9

An organisation should not use a government related identifier as its own identifier of an individual or disclose any government related identifiers

84
New cards

APP 10

Personal information should be accurate, up to date, and complete

85
New cards

APP 11

An organisation must protect personal information from misuse, interference, loss and unauthorised access, modification, or disclosure.

86
New cards

APP 12

An individual must be given access to their personal information if requested

87
New cards

APP 13

Organisations should correct personal information that is not accurate, up to date, complete, relevant or is misleading

88
New cards

%

for zero or more unknown characters

89
New cards

_

for a single unknown character

90
New cards

WHERE

filter rows of a select query based on a specific condition

91
New cards

LIKE

used for partial matching

92
New cards

IN

allows you to specify multiple conditions in a where statement

93
New cards

HAVING

filter grouped rows in a select query (calculation functions)

94
New cards

GROUP BY

used with calculation functions to group results by a matching condition

95
New cards

inner-join

uses a matching field to select data from multiple tables

96
New cards

create a new table

CREATE TABLE table name (

column name datatype null value

primary key (column name)

)

97
New cards

delete a table

DROP TABLE table name

98
New cards

add/delete/modify columns

ALTER TABLE table name, ADD column name datatype DROP/RENAME/ALTER column name

99
New cards

add a new record to a table

INSERT INTO table name (column1, column2, column3, ...) VALUES (value1, value2, value3, ...)

100
New cards

modify an existing record

UPDATE table name
SET column1 = value1
WHERE condition