• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/120

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

120 Cards in this Set

  • Front
  • Back
What is a Queue?
A queue data structure works on the principle of First In - First Out (FIFO) structure.
What is a Stack?
A stack is a data structure that works on teh principle of First In - First Out (FILO)
What is a Two-Dimensional Array?
A 2D array contains two indexes, and it not usually used in projects as it is beyond the scope.
An example of a 2D array may be Theatre Seating
What is a Record?
A record is a structure that can be used to group together variables for a particular purpose.
Types of Files
1. Serial Files
2. Random Access Files
What is a Serial File?
A serial file is one in which the data is accessed in the order in which it was written. This data may be sequential if wanted.
What is a Random Access File?
A random access file is one in which the data can be accessed from any point within the file. It must be stored on storage devices that allow random access (such as a Hard Disk).
What is a One-Dimensional Array?
A 1D array is a data structure in which variables are grouped together under the same name and accessed via an 'index'. The 'index' is most commonly an integer value which starts at the value 0.
Variable Types
1. Boolean
2. Character
3. Floating Point (or Decimal or Real)
4. Integer
5. String
What is Boolean? (Variable Type wise)
True or False
What is a Character? (Variable Type wise)
Any letter, number, space, punctuation mark, or symbol that can be typed on a computer
What is a Floating Point? (Variable Type wise)
Number with decimal values
What is an Integer? (Variable Type wise)
A number which can be positive, negative or zero. These CANNOT have decimal places.
What is a String?
A string is a data type used to represent text. It is comprised of a set of characters that can also contain spaces and numbers
CASE Tools
Computer Aided Software Engineering (CASE) tools are software programs that aid in the development of software at all stages from start to finish
First Generation Languages (1GL)
The first generation of programming language is often referred to as machine code (e.g. Binary)
Technical Specifications of Mobile Devices
Storage Capacity, CPU, RAM, Operating System, Battery Life, Screen Resolution, Connectivity, and Input and Output Methods
What is RAM?
Random Access Memory - Devices with a large amount of RAM are able to store more of the code that is being executed as opposed to writing to and from the storage media
Characteristics of Effective User Interfaces
Clear, Concise, Responsive, Familiar, Consistent, Efficient, Attractive, Scalable, Forgiving
Needs of Users
(and how these influence the design of solutions)
Age, Vision Impaired, Physical Impairments, Language, Education/Profession, Experience, Motivation
Efficiency vs Effectiveness
Efficiency: saving TIME, MONEY or EFFORT

EFFECTIVENESS: how well the the job gets done; how well a system achieves its intended goals. e.g. accuracy, reliability, fun, ease of use, aesthetics
Algorithmic Representations
Consists of either a Sequence, Selection, or Repetition (or Iteration)
What is a Sequence? (Algorithmic wise)
Tasks that are performed in sequence lead from one to the other in that order. Each task must be performed once - there is no possibility of skipping a task or branching off to perform a different task
What is a Selection? (Algorithmic wise)
In a selection structure, a condition is tested (or a question is asked), and depending on the answer, one of a number of courses of action is taken.

Often referred to as an if-then-else statement because of the way in which it instructs the program
What is a Repetition (or Iteration)? (Algorithmic wise)
In a repetition structure, a number of tasks are performed a set number of times or until a condition is met. Three types of repetition are available: Fixed, test at end, and test at beginning
What is a Data Dictionary?
A data dictionary is a table that lists and describes all of the variables that are being used (or planned to be used) in a program, or suite of programs.
It contains the variables' name, typee, size, scope, and description
What is a Context Diagram?
a context diagram is a special type of DFD. It focuses on the interaction between the organisation's information system and the external entities that supply data or receive information
What is a DFD?
Data Flow Diagrams provide a method by which the movement of data through a system can be visually represented. This diagram makes it easy to track the progress of data as it is input into a system, the ways in which it is processed, what information is products, how it is stores and how to information it used.
What is an Entity? (DFD wise)
An entity is a person, agent, or company outside the organisation being examined, that provides some data to the system and/or receives some information from it.
Anyone working for the organisation should not be represented as an entity.
What is a Data Store? (DFD wise)
A data store symbol represents a storage location within the organisation. It is labelled with the name of the file or the location.
What is a process? (DFD wise)
A process symbol is used to describe any activity that transforms data. The activity could be performed by someone within the organisation, or it could be an automated one.
These are numbered in the order in which they occur in, and contain a description of the task
What is a Black Hole? (DFD wise)
A black hole is a term that is used to describe the situation that occurs when data flows into a process but nothing is produced.
What is UML?
Unified Modelling Language (UML) is a standardized modelling language that encompasses a large variety of diagram types that can be used to represent many aspects of software development
What is a UCD?
A Use Case Diagram is a 'story' depicting the functional aspects of a system within an organisation. It is used to depict the goals of the system and how people/organisations interact with the system to achieve these goals
What is a Use Case? (UCD wise)
A use case is a representation of a function within the system. It is shown as an ellipse with the function written inside it.
What is a System Boundary? (UCD wise)
A system boundary is a rectangle that is drawn around all of the use case symbols and represents the confines of the system. There is typically one system boundary
What does the "Includes" symbol mean?
Showing links between use cases. Usually it indicated that the functionality of a use case is used in another case.
Shown as "<<includeds>>"
What does the "Extends" symbol mean?
Showing that the functionality of a use case contributed to (or enhances) the functionality of another use case. This can be conditional on an actor being a member of a particular group.
Shown as "<<extends>>"
What is an SRS?
A Software Requirements Specification (SRS) is a comprehensive description of what the software solution will need to do. It documents the key tasks associated with the analysing stage of the problem-solving methodology (PSM)
What is the Scope of the solution?
The scope defines what the software solution will do and what it won't do. It defines what the boundaries of the solution will be and what benefits there will be for users.
Functional Requirements
Directly related to what the software solution is required to do. What inputs it will receive, what outputs will it generate and how will it behave?
Non-Functional Requirements
Related to the characteristics of the software solution, such as response rates, user-friendliness, reliability, portability, robustness, constraints, scope and maintainability.
What are Response Rates?
the response rate of a system is a measure of how long it takes for certain actions within the system to be completed
What is User-Friendliness?
Related to how easy it is for users to make use of a software solution
What is Reliability?
Measure of how long a software solution can perform its required functions in the operating environment in which it was designed
What is Portability?
The ability for a software solution to be moved from one environment to another
What is Robustness?
Measure of how well a software solution responds to poor use or inputs
What is Maintainability?
Mostly concerned with how easily a software solution can be fixed if and when problems occur
Data Collection Methods
1. Surveys and Questionnaires
2. Interviews and Focus Groups
3. Observations
4. Document Reviews
What is a VPN?
A Virtual Private Network (VPN) utilities an existing network structure (usually the internet) to create a virtual network between devices that is both secure and acts just as a traditional wires/wireless network would.
The main advantage of a VPN using the internet is security.
In connecting to a VPN, encryption keys are used to ensure that the communication is totally secure.
Wi-Fi 802.11x Standards
802.11n, being the most recent (in 2009), has a Max Bandwidth of 150mb/s and a longer Max Range than the other standards (802.11a, 802.11b, 802.11g) - being 70m
TCP/IP
Two protocols that control communication across the internet and some networks.
TCP (Transport Control Protocol) is used to divide data that needs to be transmitted into a number of packets, each with a sequence number.
IP (Internet Protocol) defines how the data is sent between network nodes. Each node must have a unique IP Address
What is HTTP?
Method of publishing and retrieving web pages and operates on the Application Layer of the OSI model
What is FTP?
Protocol for sending and receiving files that operates on the Application Layer of the OSI model
What is the Ethernet?
Operates on the first two layers of the OSI model and works to move data across a wires network
OSI Model Layers
1. Physical layer
2. Data Link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
Layer 1: The Physical layer
Describes the method by which data is transmitted via physical media. It is concerned with the ways in which a single device interacts with the media as opposed to interacting with other devices in the network.
It is concerned with the layout of pins in sockets, voltages, the cables, the connection of hubs and NICs and network adapters.
Layer 2: The Data Link layer
Ethernet protocol operates here, as do 'intelligent' network devices such as switches and bridges. MAC addresses are passed using the data layer, and drivers also operate here.
Layer 3: The Network layer
Uses the connections established in the first two layers to establish a way to send packets between nodes on the network. IP protocol performs this function at this layer, as well as routers.
The first three layers are known as the Media Layers
Layer 4: The Transport layer
Concerned with the transmission of packets across the network. TCP operates on this layer
Layers 5-6: The Session and Presentation layer
Both of these layers are part of the mechanisms of the Internet. The session layer controls connections between computers, closing and opening sessions and managing recovery.
The Presentation layer handles encryption and translates data into a form that the application layer can understand
Layer 7: The Application layer
Application specific and protocols that operate on this layer (e.g. FTP, HTTP, POP, etc.)
Layers 4-7 are known as the Host Layers.
Way of Remembering The OSI Model
Programmers
Do
Not
Throw
Stale
Pizza
Away
What is a Network?
Two or more computers (or devices) connected together for the purpose of sharing resources and communication
What is a Network Interface Card? (NIC)
Provide the physical connetion from a computer to the network
What is a Hub?
A hub is used to forward packets of data from one device to others or from one LAN area to another. It consists of a number of ports.
What is a Switch?
A switch forwards packets from one device to another device or can be used to connect one LAN area to another. However, a switch can filter packets of data and place data packets only on the ports to which they are addressed.
What is a Router?
Routers connect multiple networks, LANs and WANs together.
What is a Bridge?
A bridge is a device that connects two different physical networks together but cannot connect ones using different protocols (as a router can)
Steps in PSM
1. Analysis
2. Design
3. Development
4. Evaluation
Analysis Activities (PSM wise)
1. Solution Requirements
2. Solution Constraints
3. Scope of Solution
Design Activities (PSM wise)
1. Solution Design
2. Evaluation Criteria
Development (PSM wise)
1. Manipulation (coding)
2. Validation
3. Testing
4. Documentation
Evaluation Activities (PSM wise)
1. Strategy
2. Report
What is a Binary Search?
A search that can be carried out on a sorted list ONLY. It works but dividing a list in half each time a comparison is made.
It's extremely fast, but the data must be sorted for best results
What is a Bubble Sort?
A sort that works by comparing array elements and swapping them if they're out out order
What is a Selection Sort?
A sorts that finds the smallest value, swaps it with the first value at the start of the array.
This continues for the other values and positions until the sort is completed.
It is more of a logical way to sort compared to the Bubble Sort
What is apart of the Privacy Act of 1988, and the Information Privacy Act 2000?
Laws that set out the ways in which organisations can collect, use or distribute personal data. The acts also outline what must be done to protect the data and the rights of individuals with respect to their own data.
What is apart of the Health Records Act 2001?
Additional Act to the Privacy Act that gives individuals protection of their own medical information regardless of the size or type of the organisation that is collecting this data.
What is apart of the Copyright Act 1968?
If you are the creator of a work, you do not have to place a "(c)" symbol on the work itself. It happens automatically if you are the creator of that work.

They have the right to choose how the piece will be distributed, published or otherwise communicated. They also have the right to incorporate any sort of technological protection devices to protect the work
What can't you do due to the Copyright Act?
You cannot copy or share the work without the permission of the author of the work, you cannot change or format the work
What is apart of the Human Rights and Responsibilities Act 2006?
Specifically enforced in Victoria:
Protects freedom of speech, freedom of religion and freedom from forced work.
What is the Spam Act 2003?
It was created to regulate the use of email and in particular to help prevent the sending of unsolicited commercial electronic messages.
These can be: By email, SMS, instant messaging, or other types of mobile messaging. Voice communication/messages are not included in this act.
What is the code of ethics?
Sets out to establish a level of ethical conduct and to raise the awareness of issues related to the profession.
What is Asymmetric Key Encryption?
Two keys instead of one - Public Key and a Private Key.
The Public Key can only be used to encrypt information and not decrypt it. The Private Key can be used to decrypt the information that has been encrypted by the Public Key.
It is slower than Symmetric Key Encryption
What is Symmetric Key Encryption?
Used to send large amounts of information across the internet. The file is encrypted using what is referred to as a 'secret key' and then sent to the recipient who then needs to decrypt it using the same key.
It's very secure, but due to there being only one key - a different method of exchanging keys is recommended due to interceptions which may occur from outside individuals.
What is Hybrid Encryption?
Combination of Symmetric Key Encryption and Asymmetric Key Encryption to allow information to be sent more securely and faster than compared to just Symmetric or Asymmetric Key Encryption.
What is RAID
A Redundant Array of Inexpensive Disks (RAID) can be used to increase the reliability of data and the speed at which it can be accessed.
It uses multiple HDDs and simply copies the contents of one to the others. If one fails, there are multiple backups that could replace it without any data loss.
What are the Validation Techniques?
1. Existence Checking
2. Type Checking
3. Range Checking
What is Existence Checking?
Used to check if the users input data been entered or not
What is Type Checking?
Used to check if the correct type of data has been input (e.g. Characters, numbers, letters, etc.).
If not checked, the program could crash or cause the GIGO effect.
What is Range Checking?
Process of determining if an inputted value is within the range of acceptable values for the program (e.g. Postcodes)
What are the Costs of Improper Testing?
Syntax Errors, Logic Errors, Run Time Errors, Memory Leak, Handle Leak, Buffer Overflow, Stack Overflow, Race Hazards
What are Syntax Errors?
Errors with the spelling or format of specific commands
What are Logic Errors?
Occur when data causes the program to operate in a way that was not intended
What are Run Time Errors?
Occur when something happens that was not planned for, thus causing the program to crash
What is Memory Leak?
As created variables are allocated momory to resources, they consume more of the processing power of the computer. If these resources are not 'freed' after use, the program may use more and more memory (thus lead to reduced performance)
What is Handle Leak?
Occurs when a program allocates a 'handle' to a resource (such as the screen, printer, etc.) and does not 'free' up this handle on completion of the task. It may slow the computer down and may eventually cause a crash
What is Buffer Overflow?
Occur when the data input into a program is not checked for size and is too big for the buffer to handle
What is Stack Overflow?
As subroutines are executed, the line number is placed on a stack. If a subroutine that in turn calls another that contains a call to the original subroutine, the stack can fill up quickly and overflow causing a program crash
What are Race Hazards?
A race hazard can occur when one process that is dependent upon the output from another process, executes before that data is retrieved
Forms of User Documentation
User Guide (or user manual), Technical Reference Manual, Installation Manual, Quick Start Guide, Help Guide
What is a User Guide (or User Manual)?
Document intended to assist the typical user of a software package. Not too technical in nature, and contains step by step instructions and screen captures. Also contains FAQ's
What is a Technical Reference Manual?
Specifically written for someone who will be maintaining the software and who has an in-depth knowledge of the way the system works.
What is an Installation Manual?
Details how to install the software package in question and get it running correctly.
What is a Quick Start Guide
List of short and easy to understand instructions that can be executed by a user of any skill level, to start the program up and produce a typical outcome
What is a Help Guide?
Takes form of a FAQ or a troubleshooting guide and could be part of another documentation type.
Aimed to provide detailed assistance so the users can solve the problems that they are having with the software
Types of Internet Threats
Worm, Conficker Worm, Trojan, Spyware, Adware, and Zombies.
What is Malware?
MALicious softWARE - includes trojans, worms, spyware, and other types.
What is a Worm?
Mainly concerned with the consumption of bandwidth. It's a program that rapidly replicates itself through a network without the need of user assistance.
What is a Conficker Worm?
Propagates, and also makes contact with a host server to receive updated code. As it's always being improved, it became more knowledgeable on how to hide itself.
Conficker.E was the first worm to download a payload
What is a Trojan?
A virus that is disguised as another software package that performs a different (although not always legitimate) purpose.
It can install spambots, allow other individuals to have access to the computer, install pop-ups,
What is Spyware?
Type of malware that is concerned primarily with the collection of information. Could be person details, email addressed, browsing activities or simple keystrokes.
It's often delivered as the payload via a worm or a trojan and is normally not self-replicating.
What is Adware?
Subset of spyware in that it performs some of the same functions.
It will display pop-up ads to the user and do so frequently. They can be targeted to the browsing habits of the user.
What are Zombies?
Zombies send spam (or act as a spambot)- thus making it harder to establish the sender of the spam (thus protecting the spammer from prosecution).
Types of Training
On-Site Training, Train The Trainer, On-Line Training, Off-Site Training
What is On-Site Training?
Training that can be conducted with staff at the organisation during, or out of, work hour.s.
If courses are conducted during work hours, some disruption may occur to the employees required work tasks.
What is Off-Site Training?
Training that can be run at an external venue that provides an environment away from work in which employees can concentrate on learning to use the new software.
What is Train The Trainer?
Selecting a number of employees who then become trainers within the organisation.
These trainers then train the rest of the employees on-site. It's cheaper to do than the other training methods.
What is On-Line Training?
Training that is conducted on a computer or mobile device is considered to be 'on-line training', even if the training itself is not being delivered by the internet. It's electronic in format, and is typically cheap and easy to implement.