applied AOS 2

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/104

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

105 Terms

1
New cards

Encryption

a security control where data is encoded or scrambled so it is unreadable by unauthorised people

2
New cards

Types of Encryption

Symmetric Key Encryption, Asymmetric Key Encryption

3
New cards

Symmetric Key Encryption

where the same key is used to encrypt and decrypt the data such as RC4, Blowfish

4
New cards

Asymmetric Key Encryption

where the data is encrypted using a public key, but is decrypted using a private key, known only by the receiver. Such as RSA

5
New cards

Use of Encryption

to protect sensitive data (credit card numbers, personal details) and to prevent any unauthorised access to the system.

6
New cards

Authentication

the method of proving that a user has the right to access the system.

7
New cards

Types of Authentication

Single Factor authentication, Two Factor authentication, Multi factor authentication

8
New cards

Single Factor Authentication

involves ‘something you know’, typically a username and password, to enter into a system.

9
New cards

Two Factor Authentication

involves ‘something you know’ and ‘something you have’. At least two pieces of evidence is required to sign in. Such as a verification code sent to your phone.

10
New cards

Multi Factor Authentication

requires the user to provide 3 or more pieces of evidence to prove their identity. These involve ‘something you know, have and are’. The third element typically uses physical characteristics known as biometric data to further verify your identity.

11
New cards

Data Collection

The act of collecting data help determine project scope, functional and non-functional requirements and constraints.

12
New cards

Methods of Data Collection

Survey, Interview, Report, Observation

13
New cards

Survey

a set of questions asking the user to select from different answers

14
New cards

Advantages of Survey

Inexpensive, immediate results, large sample size.

15
New cards

Disadvantage of Survey

if open ended questions are asked data analysis may take time. Interest may be lost

16
New cards

Interview

A face-to-face meeting for consultative purposes.

17
New cards

Advanatge of Interview

Insightful, primary and in-depth information is collected.

18
New cards

Disadvatge of Interview

Time consuming

19
New cards

Report

A document that provides a summary of findings.

20
New cards

Advantages of Report

Quick, easy and cheap to find.

21
New cards

Disadvantge of Report

Might be unreliable and biased.

22
New cards

Observation

Physically observing how a system operates and how it is used.

23
New cards

Advantage of Observation

Provide an unbiased view. Does not need interaction with people.

24
New cards

Disadvantage of Observation

Time consuming, expensive, people might change behaviour

25
New cards

Functional Requirements

are directly related to what the project will do. E.g. Perform a calculation.

26
New cards

Non Functional Requirements

things that the program should have but does not affect what the program does. These include Usability, Reliability, Portablility, Robustness, Maintainability

27
New cards

Usability

how easy the system is to learn and use.

28
New cards

Reliability

how much it can be depended on to function as designed.

29
New cards

Portability

How easily it can be used in different operating environment

30
New cards

Robustness

How well it responds to errors

31
New cards

Maintainability

How easy it is to look after a software once made

32
New cards

Constraints

Factors that may limit or restrict solution requirements such as economic, technical and Non technical

33
New cards

Economic Constraint

Time and money

34
New cards

Techincal Constraint

technological reason for interuptions in the project

35
New cards

Non technical Constraint

Social, Legal, Usability

36
New cards

Scope

Outlines what the project will and will not do. (Requirements/constraints)

37
New cards

Software Requirements Specification (SRS)

comprises all the elements in the analysis stage, requirements, scope and constraints.

38
New cards

Use of SRS

provides all of the required info about the proposed system in one place. It ensures that the client’s needs are understood, and potential issues have been identified.

39
New cards

Use Case Diagram

Method of describing how a user interacts with a system

40
New cards

Context Diagram

41
New cards

Data Flow Diagram

Indicates the data that is passed in and out of a system.

42
New cards

Convergent thinking

involves coming up with a single, well-established answer to a problem. The design ideas are based on other proven ideas.

43
New cards

Divergent Thinking

involves exploring many possible solutions, using spontaneous free flowing techniques.

44
New cards

Brainstorming

is the process where ideas are presented in a non- judgemental, spontaneous and unstructured way.

45
New cards

Consult End users

Consult those who will be using the product

46
New cards

Generating design ideas

Brainstroming, Consult End users, Mindmapping, Graphic Organisers

47
New cards

Mind Mapping

involves quickly generating and linking ideas

48
New cards

Graphic Organisers

are visual methods of organising ideas. E.g. PMI

49
New cards

Evaluating Deisgn Ideas

Criteria for choosing best design could include ease of use, time it will take, cost, scope for modification, requirement satisfaction etc.

50
New cards

Efficency

concerns how much time, cost and effort has been applied to the achieve the intended results

51
New cards

Effectivenss

how well a solution achieves its intended goals

52
New cards

Criteriia for Effectiveness

Completeness, Readability, Attractiveness, Clariity, Functionality, Accuracy, Accessability, Timeliness, Report Formats, Relavence, Usability, Communication of message

53
New cards

Completeness

were all functional and non functional requirements met

54
New cards

Readability

Can every part of the software be easily read by users, including font size and colour choices

55
New cards

Attractiveness

Are the colours chosen nice looking and work together

56
New cards

Clarity

are the language chosen age appropriate and are headings and labels used throughout

57
New cards

Functionality

does the system react well to user input errors

58
New cards

Accuracy

is data stored accurately, are calculations made 100%

59
New cards

Accessability

how well the system can be used by those with disabilities

60
New cards

Timeliness

does the softwarre respond to requests within an accepetable timeframe

61
New cards

Report formats

Are all the search/sort reports produced by the system appropriate their context

62
New cards

Relevance

is all the information provided and shown by the software relavant

63
New cards

Usability

is the software easy to use

64
New cards

Communciation of message

have approprate conversions/time been used for sppecific places

65
New cards

User Experience (UX)

focuses on providing a relevant and meaningful experience for all users.

66
New cards

User Interface (UI)

focuses on appearance

67
New cards

Factors that influence design and UI/UX

Usability, Affordance, Security, Interoperabilty, Marketabilty

68
New cards

Affordance

ptoviding possible actions for the users

69
New cards

Security

refers to factors such as consent and privacy

70
New cards

Interoperabilty

the abilty of the software tow work across different operating systems

71
New cards

Marketability

refers to the appeal marketing abilty

72
New cards

Elements of UI

Clarity, Concise, Familiar. Responsive, Consistent, Attrative, Efficient, Tolerant

73
New cards

Consice

Provide enough guidance

74
New cards

Familiar

Recognise how features work

75
New cards

Responsive

Quick loading and software giving feedback

76
New cards

Consistent

Develop patterns of use and use in different context

77
New cards

Waterfall Model

has identified stages of production and there is no going back once a stage is completed. This is best for small, well-defined projects as the process cannot be altered

78
New cards

Agile Model

allows for flexibility and simplicity as there are ‘sprints’ of each stage and they are repeated multiple times and improved after each cycle. This is best for changing projects, and it also reduces risks.

79
New cards

Spiral Model

has repeated iterations of processes and aims to eliminate risks. This is best for uncertain clients as risks can be prevented with quick responsive actions.

80
New cards

Project Management

The process of planning, organising and monitoring a project to ensure that it is completed on time, within budget, and in scope

81
New cards

Gant Chart

graphical representation of a project plan. That lists all tasks in order to show dependiecies allowing people to be allocated and able to track progress

82
New cards

Use of Gantt Chart

used to outline each stage and task within a project so that that progress could be monitored, and changes could be made accordingly

83
New cards

Milestones in Gantt Chart

represent the completion of a significant stage. Indicated with a diamond.

84
New cards

Dependicies

also known as predecessors, are tasks that must be completed before another task can be started. Indicated with arrows.

85
New cards

Processes

include task identification, sequencing, critical path and documentation

86
New cards

Crtitical Path

indicates tasks that will delay the whole project if they are delayed.

87
New cards

Goals

help define an organisation’s purpose, assist its growth and achieve its financial objectives.

88
New cards

Organisational Goal

how an organisation intends to go about achieving its mission.

89
New cards

System Goal

how the specific role of an information system will help in achieving an organisational goal.

90
New cards

Objectives

small, achievable tasks undertaken to complete a larger task

91
New cards

Privacy Act 1988

protects personal data of individuals around australia from governments and organisatiosn woth a turnover more than 3 million.

92
New cards

How many Austalian priavcy principles are there

10

93
New cards

APP 1

Open and transparent management of personal infromation

94
New cards

APP 2

gives individuals the option of being anonymous or using a fake name

95
New cards

APP 3

Collection of solicitied personal info

96
New cards

APP 4

How entities must deal with unsolicited info

97
New cards

APP 5

Must notify individuals when perosnal information has been collected

98
New cards

APP 6

Use or diclosure of information

99
New cards

APP 7

Organisation may only use or dislcose information fro marketing purpose if certain conditions are met

100
New cards

APP 8

Outliens steps to protect info before it is dislosed overseas