Applied computing Flashcards

for sac purposes and exam

1
Q

ethernet

A

a widely used networking technology that connects devices in a local area network for high speed data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAN(Wide Area Network)

A

Connects computer and LANs over large geographical distances (such as cities, countries, and even globally)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LAN(local area network)

A

a network that connects computers and devices within a limited geographical area (such as home, schools, office)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

difference of WAN to LAN(geographically)

A

WAN covers larger areas such as cities, and LAN covers a small area like a building or office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

difference of WAN to LAN (in terms of speed)

A

LAN is generally faster due to limited distance and less connected devices, this is different to WAN as they are slower due to large distances and network congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The cost difference between LAN and WAN

A

LAN requires much cheaper costs and maintenance. and WAN on the other hand requires higher costs due to the distances and network congestion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of connection type, what are the differences between WAN and LAN

A

LAN uses ethernet cables, wifi, while that of WANs uses leased lines and satelite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how about security, what are the difference between WAN and LAN

A

LANs are easier to secure with internal controls, and WAN is more complex to secure and vulnerable to external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAP (wireless access point)

A

this is a networking device that allows wireless-capable devices to connect to a LAN using Wi-fi or related wireless standards. As we can refer to that the WAP serves as a bridge in between the wired network to wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wi-Fi

A

a wireless network technology that uses radio waves to provide high speed internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Switch

A

a switch connects network devices (printers, computers, and wireless devices/access points and enables users to exchange data packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Back-up

A

the process of creating a copy of data and storing it separately to protect against data loss, corruption or disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Full Back-up

A

A complete copy of all data in a system or selected location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental backup

A

only back up data that has changed since the last backup, whether is was a full or another incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mirror back up

A

Creates an exact copy of selected data at a point in time, continuously updated to reflect any changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud backup

A

back up data to remote servers managed by cloud providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virus (computer virus)

A

Attaches itself to legitimate files or programs and spreads to other files, causing damage and disrupting system functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Worm

A

self-replacates and spreads across networks without user intervention, often causing network slowdowns or failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Trojan House

A

It cannot be duplicated, where it disguises itself as legit software to trick users into installing it, the performs malicious actions stealing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

spyware

A

Monitors user activities and collects personal information without consent, often used for tracking browser behavior or gathering sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Adware

A

Displays unwanted advertisements and may track browsing habits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ransomware

A

encrypts or locks user data, demanding a random payment to restore access, frequently targeting businesses and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Rootkit

A

Hides within an operating system to gain unauthorized access, enabling attackers to control the system while evading* detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Backdoor

A

creates an unauthorized entry point to a system, allowing attackers to bypass normal authentication and gain remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Phishing malware

A

delivers malicious links or attachments through deceptive emails or messages, aiming to steal personal or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

internet

A

Global public network connecting Millions of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Intranet

A

private network for internal use within an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

internet access and security

A

As it is open to everyone, it is less secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

intranet access and security

A

authorized users only and therefore more secure as access is controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

key purpose of VPN

A

there is a remote access which enables employees to securely access the company network from any location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

key purpose of VPN (2)

A

encrypts sensitive data and protect it from interception or unauthorized access especially on public or insecure networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

key purpose of VPN (3)

A

reduces the need for expensive leased line by allowing secure access over public internet infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Validation

A

Validation is important in computing because it helps ensure the accuracy and reliability of data, and protects against security threats

34
Q

validation types

A

existence, type, range

35
Q

existence (validation)

A

a function to determine if something is valid

36
Q

type (validation)

A

type validation is a description of a set of values and the operations that can be performed on them

37
Q

range (validation)

A

the set of possible values that a variable can hold or the interval that includes the upper and lower bounds of an array

38
Q

Hungarian Notation

A

a preflix that indicates the type or purpose of the variable, followed by variable name

39
Q

Camel case (camelCase)

A

the first word is lowercase, and each subsequent word starts with an uppercase letter

40
Q

Pascal Case (PascalCase)

A

Every word starts with an uppercase letter

41
Q

Snake Case (snake_case)

A

Words are lowercase and separated by underscores

42
Q

Upper Snake Case (UPPER_SNAKE_CASE)

A

a variable naming convention where each word is in upper case and separated by underscores

43
Q

Train Case (Train-Case)

A

a naming convention in computing where words are written in Pascal Case style (where each word starts with an uppercase letter)

44
Q

Hungarian Notation (purpose)

A

Makes the type or role of a variable clear, and helping with debugging and maintenence

45
Q

camelCase (purpose)

A

Improves the readability and compactness by visually separating words without underscores or spaces

46
Q

snake_case (purpose)

A

enhances the readability in languages or environments where underscores are the preferred separator

47
Q

Train-case (purpose)

A

provides clear separation of words, often in titles, file names or documentation

48
Q

Pascal case (purpose)

A

often used to name classes, constructors, or components to distinguish them from variables

49
Q

UPPER_SNAKE_CASE (purpose)

A

indicates constant values that do not change during program execution

50
Q

internal documentation

A

internal documentation is the written explanations, instructions, or comments that is embedded in the code or kept in separate files within a codebase

51
Q

why internal documentation is important

A
  1. it helps clarify code logic
  2. aids debugging and maintenence
  3. speeds up onboarding
52
Q

cloud network

A

cloud-based services to deploy a corporate network that connects an organization’s employees, resources and applications

53
Q

firewall

A

a network security system that that monitors and controls incoming and outgoing network traffic based on fixed security rules.

54
Q

VPN gateway

A

might need change a VPN gateway is a network device that enables encrypted communication between different networks over the internet

55
Q

802.11ax (Wi-Fi 6)

A

the speed of it is around 9.6 Gbps

56
Q

network switch

A

connects network devices such as printers, computers and wireless devices / access points, which this enables users to exchange data packets

57
Q

ethernet

A

the ethernet is a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information to avoid simultaneous transmissions by two or more systems

58
Q

strong password

A
  1. be at least 8 characters
  2. contain both upper and lower cases
  3. have at least one numerical character
59
Q

different acts for computing

A
60
Q

the use of consent forms

A

the purpose of consent forms is to protect the rights of the individual and give them control over their choices

61
Q

the four different kinds of data collection methods

A

Survey, interview, questionnaire, and Forms

62
Q

Forms

A

structured documents for collecting specific data inputs with standardized collection and easy storage. However lacking flexibility and technical issues

63
Q

Questionnaire

A

Written or digital questions to collect specific information that is easy to use and scalable, thus anonymous. However it lacks interactive levels and a risk of misinterpretation by users

64
Q

Interview

A

There is direct interaction to gather detailed information, and that it provides rich insights and personalized interactions. However it is time-consuming and costly

65
Q

Survery

A

there is systematic data collection from a group through structured questions with a wide reach and being cost-effective, but it has limited depth and response bias

66
Q

the two types of data sources

A

Primary data sources and secondary data sources

67
Q

PRIMARY DATA SOURCES

A

is the data that is being collected directly by a researcher for a specific purpose, where examples of this can be surveys, interviews, experiments and observation

Cons: it is time-consuming and costly, thus requires significant effort

68
Q

secondary data sources

A

it is the data collected by others, re-purposed for a different analysis or research, examples of this can be books and articles which make this cost effective. However it may be outdated and less specific to the researcher needs

69
Q

Data

A

data are raw, unprocessed facts and figures

70
Q

Information

A

data that has been processed and given meaning

71
Q

pseudocode

A

Pseudocode is a tool that is used to describe algorithms and processes without using a specific programming language

72
Q

wireframes

A

Wireframes are simple, visual representations of a user interface, focusing on structure and functionality rather than design details

73
Q

the four constraints

A

technical, economic, social, legal

74
Q

Technical constraints

A

there are limitations related to hardware, software, or technological capabilities that affect coding decisions

75
Q

Economic Constraints

A

these are budgetary limitations, including the costs for development, maintenance, tools and resources that influence coding choices and project scope

76
Q

Social constraints

A

there are considerations for user expectations, cultural differences, accessibility, and ethical implications when developing software

77
Q

Legal constraints

A

this is the compliance with laws, regulations

78
Q

functional requirement

A

functional requirements look at the features and operations for users tasks, examples for this can be payment processes, login and data retrieval

79
Q

Non-functional requirement

A

this is more on the decorations and things that do not build up the actual program itself

80
Q

C# (coding language)

A

an enterprise level coding software for games and different applications

81
Q

Bit(8 bits in a byte)

A

contains binary value, usually 0 or 1