Applied computing Flashcards
for sac purposes and exam
ethernet
a widely used networking technology that connects devices in a local area network for high speed data exchange.
WAN(Wide Area Network)
Connects computer and LANs over large geographical distances (such as cities, countries, and even globally)
LAN(local area network)
a network that connects computers and devices within a limited geographical area (such as home, schools, office)
difference of WAN to LAN(geographically)
WAN covers larger areas such as cities, and LAN covers a small area like a building or office
difference of WAN to LAN (in terms of speed)
LAN is generally faster due to limited distance and less connected devices, this is different to WAN as they are slower due to large distances and network congestion
The cost difference between LAN and WAN
LAN requires much cheaper costs and maintenance. and WAN on the other hand requires higher costs due to the distances and network congestion.
In terms of connection type, what are the differences between WAN and LAN
LAN uses ethernet cables, wifi, while that of WANs uses leased lines and satelite links
how about security, what are the difference between WAN and LAN
LANs are easier to secure with internal controls, and WAN is more complex to secure and vulnerable to external threats.
WAP (wireless access point)
this is a networking device that allows wireless-capable devices to connect to a LAN using Wi-fi or related wireless standards. As we can refer to that the WAP serves as a bridge in between the wired network to wireless devices.
Wi-Fi
a wireless network technology that uses radio waves to provide high speed internet
Switch
a switch connects network devices (printers, computers, and wireless devices/access points and enables users to exchange data packets)
Back-up
the process of creating a copy of data and storing it separately to protect against data loss, corruption or disaster
Full Back-up
A complete copy of all data in a system or selected location
Incremental backup
only back up data that has changed since the last backup, whether is was a full or another incremental
Mirror back up
Creates an exact copy of selected data at a point in time, continuously updated to reflect any changes
Cloud backup
back up data to remote servers managed by cloud providers
Virus (computer virus)
Attaches itself to legitimate files or programs and spreads to other files, causing damage and disrupting system functions.
Worm
self-replacates and spreads across networks without user intervention, often causing network slowdowns or failures
Trojan House
It cannot be duplicated, where it disguises itself as legit software to trick users into installing it, the performs malicious actions stealing data
spyware
Monitors user activities and collects personal information without consent, often used for tracking browser behavior or gathering sensitive data
Adware
Displays unwanted advertisements and may track browsing habits
Ransomware
encrypts or locks user data, demanding a random payment to restore access, frequently targeting businesses and individuals.
Rootkit
Hides within an operating system to gain unauthorized access, enabling attackers to control the system while evading* detection
Backdoor
creates an unauthorized entry point to a system, allowing attackers to bypass normal authentication and gain remote access
Phishing malware
delivers malicious links or attachments through deceptive emails or messages, aiming to steal personal or financial information.
internet
Global public network connecting Millions of users
Intranet
private network for internal use within an organization
internet access and security
As it is open to everyone, it is less secure
intranet access and security
authorized users only and therefore more secure as access is controlled
key purpose of VPN
there is a remote access which enables employees to securely access the company network from any location
key purpose of VPN (2)
encrypts sensitive data and protect it from interception or unauthorized access especially on public or insecure networks
key purpose of VPN (3)
reduces the need for expensive leased line by allowing secure access over public internet infrastructure
Validation
Validation is important in computing because it helps ensure the accuracy and reliability of data, and protects against security threats
validation types
existence, type, range
existence (validation)
a function to determine if something is valid
type (validation)
type validation is a description of a set of values and the operations that can be performed on them
range (validation)
the set of possible values that a variable can hold or the interval that includes the upper and lower bounds of an array
Hungarian Notation
a preflix that indicates the type or purpose of the variable, followed by variable name
Camel case (camelCase)
the first word is lowercase, and each subsequent word starts with an uppercase letter
Pascal Case (PascalCase)
Every word starts with an uppercase letter
Snake Case (snake_case)
Words are lowercase and separated by underscores
Upper Snake Case (UPPER_SNAKE_CASE)
a variable naming convention where each word is in upper case and separated by underscores
Train Case (Train-Case)
a naming convention in computing where words are written in Pascal Case style (where each word starts with an uppercase letter)
Hungarian Notation (purpose)
Makes the type or role of a variable clear, and helping with debugging and maintenence
camelCase (purpose)
Improves the readability and compactness by visually separating words without underscores or spaces
snake_case (purpose)
enhances the readability in languages or environments where underscores are the preferred separator
Train-case (purpose)
provides clear separation of words, often in titles, file names or documentation
Pascal case (purpose)
often used to name classes, constructors, or components to distinguish them from variables
UPPER_SNAKE_CASE (purpose)
indicates constant values that do not change during program execution
internal documentation
internal documentation is the written explanations, instructions, or comments that is embedded in the code or kept in separate files within a codebase
why internal documentation is important
- it helps clarify code logic
- aids debugging and maintenence
- speeds up onboarding
cloud network
cloud-based services to deploy a corporate network that connects an organization’s employees, resources and applications
firewall
a network security system that that monitors and controls incoming and outgoing network traffic based on fixed security rules.
VPN gateway
might need change a VPN gateway is a network device that enables encrypted communication between different networks over the internet
802.11ax (Wi-Fi 6)
the speed of it is around 9.6 Gbps
network switch
connects network devices such as printers, computers and wireless devices / access points, which this enables users to exchange data packets
ethernet
the ethernet is a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information to avoid simultaneous transmissions by two or more systems
strong password
- be at least 8 characters
- contain both upper and lower cases
- have at least one numerical character
different acts for computing
the use of consent forms
the purpose of consent forms is to protect the rights of the individual and give them control over their choices
the four different kinds of data collection methods
Survey, interview, questionnaire, and Forms
Forms
structured documents for collecting specific data inputs with standardized collection and easy storage. However lacking flexibility and technical issues
Questionnaire
Written or digital questions to collect specific information that is easy to use and scalable, thus anonymous. However it lacks interactive levels and a risk of misinterpretation by users
Interview
There is direct interaction to gather detailed information, and that it provides rich insights and personalized interactions. However it is time-consuming and costly
Survery
there is systematic data collection from a group through structured questions with a wide reach and being cost-effective, but it has limited depth and response bias
the two types of data sources
Primary data sources and secondary data sources
PRIMARY DATA SOURCES
is the data that is being collected directly by a researcher for a specific purpose, where examples of this can be surveys, interviews, experiments and observation
Cons: it is time-consuming and costly, thus requires significant effort
secondary data sources
it is the data collected by others, re-purposed for a different analysis or research, examples of this can be books and articles which make this cost effective. However it may be outdated and less specific to the researcher needs
Data
data are raw, unprocessed facts and figures
Information
data that has been processed and given meaning
pseudocode
Pseudocode is a tool that is used to describe algorithms and processes without using a specific programming language
wireframes
Wireframes are simple, visual representations of a user interface, focusing on structure and functionality rather than design details
the four constraints
technical, economic, social, legal
Technical constraints
there are limitations related to hardware, software, or technological capabilities that affect coding decisions
Economic Constraints
these are budgetary limitations, including the costs for development, maintenance, tools and resources that influence coding choices and project scope
Social constraints
there are considerations for user expectations, cultural differences, accessibility, and ethical implications when developing software
Legal constraints
this is the compliance with laws, regulations
functional requirement
functional requirements look at the features and operations for users tasks, examples for this can be payment processes, login and data retrieval
Non-functional requirement
this is more on the decorations and things that do not build up the actual program itself
C# (coding language)
an enterprise level coding software for games and different applications
Bit(8 bits in a byte)
contains binary value, usually 0 or 1