Applied computing Flashcards

for sac purposes and exam

1
Q

ethernet

A

a widely used networking technology that connects devices in a local area network for high speed data exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAN(Wide Area Network)

A

Connects computer and LANs over large geographical distances (such as cities, countries, and even globally)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LAN(local area network)

A

a network that connects computers and devices within a limited geographical area (such as home, schools, office)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

difference of WAN to LAN(geographically)

A

WAN covers larger areas such as cities, and LAN covers a small area like a building or office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

difference of WAN to LAN (in terms of speed)

A

LAN is generally faster due to limited distance and less connected devices, this is different to WAN as they are slower due to large distances and network congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The cost difference between LAN and WAN

A

LAN requires much cheaper costs and maintenance. and WAN on the other hand requires higher costs due to the distances and network congestion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In terms of connection type, what are the differences between WAN and LAN

A

LAN uses ethernet cables, wifi, while that of WANs uses leased lines and satelite links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how about security, what are the difference between WAN and LAN

A

LANs are easier to secure with internal controls, and WAN is more complex to secure and vulnerable to external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WAP (wireless access point)

A

this is a networking device that allows wireless-capable devices to connect to a LAN using Wi-fi or related wireless standards. As we can refer to that the WAP serves as a bridge in between the wired network to wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wi-Fi

A

a wireless network technology that uses radio waves to provide high speed internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Switch

A

a switch connects network devices (printers, computers, and wireless devices/access points and enables users to exchange data packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Back-up

A

the process of creating a copy of data and storing it separately to protect against data loss, corruption or disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Full Back-up

A

A complete copy of all data in a system or selected location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Incremental backup

A

only back up data that has changed since the last backup, whether is was a full or another incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mirror back up

A

Creates an exact copy of selected data at a point in time, continuously updated to reflect any changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud backup

A

back up data to remote servers managed by cloud providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virus (computer virus)

A

Attaches itself to legitimate files or programs and spreads to other files, causing damage and disrupting system functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Worm

A

self-replacates and spreads across networks without user intervention, often causing network slowdowns or failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Trojan House

A

It cannot be duplicated, where it disguises itself as legit software to trick users into installing it, the performs malicious actions stealing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

spyware

A

Monitors user activities and collects personal information without consent, often used for tracking browser behavior or gathering sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Adware

A

Displays unwanted advertisements and may track browsing habits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ransomware

A

encrypts or locks user data, demanding a random payment to restore access, frequently targeting businesses and individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Rootkit

A

Hides within an operating system to gain unauthorized access, enabling attackers to control the system while evading* detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Backdoor

A

creates an unauthorized entry point to a system, allowing attackers to bypass normal authentication and gain remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Phishing malware
delivers malicious links or attachments through deceptive emails or messages, aiming to steal personal or financial information.
26
internet
Global public network connecting Millions of users
27
Intranet
private network for internal use within an organization
28
internet access and security
As it is open to everyone, it is less secure
29
intranet access and security
authorized users only and therefore more secure as access is controlled
30
key purpose of VPN
there is a remote access which enables employees to securely access the company network from any location
31
key purpose of VPN (2)
encrypts sensitive data and protect it from interception or unauthorized access especially on public or insecure networks
32
key purpose of VPN (3)
reduces the need for expensive leased line by allowing secure access over public internet infrastructure
33
Validation
Validation is important in computing because it helps ensure the accuracy and reliability of data, and protects against security threats
34
validation types
existence, type, range
35
existence (validation)
a function to determine if something is valid
36
type (validation)
type validation is a description of a set of values and the operations that can be performed on them
37
range (validation)
the set of possible values that a variable can hold or the interval that includes the upper and lower bounds of an array
38
Hungarian Notation
a preflix that indicates the type or purpose of the variable, followed by variable name
39
Camel case (camelCase)
the first word is lowercase, and each subsequent word starts with an uppercase letter
40
Pascal Case (PascalCase)
Every word starts with an uppercase letter
41
Snake Case (snake_case)
Words are lowercase and separated by underscores
42
Upper Snake Case (UPPER_SNAKE_CASE)
a variable naming convention where each word is in upper case and separated by underscores
43
Train Case (Train-Case)
a naming convention in computing where words are written in Pascal Case style (where each word starts with an uppercase letter)
44
Hungarian Notation (purpose)
Makes the type or role of a variable clear, and helping with debugging and maintenence
45
camelCase (purpose)
Improves the readability and compactness by visually separating words without underscores or spaces
46
snake_case (purpose)
enhances the readability in languages or environments where underscores are the preferred separator
47
Train-case (purpose)
provides clear separation of words, often in titles, file names or documentation
48
Pascal case (purpose)
often used to name classes, constructors, or components to distinguish them from variables
49
UPPER_SNAKE_CASE (purpose)
indicates constant values that do not change during program execution
50
internal documentation
internal documentation is the written explanations, instructions, or comments that is embedded in the code or kept in separate files within a codebase
51
why internal documentation is important
1. it helps clarify code logic 2. aids debugging and maintenence 3. speeds up onboarding
52
cloud network
cloud-based services to deploy a corporate network that connects an organization's employees, resources and applications
53
firewall
a network security system that that monitors and controls incoming and outgoing network traffic based on fixed security rules.
54
VPN gateway
**might need change** a VPN gateway is a network device that enables encrypted communication between different networks over the internet
55
802.11ax (Wi-Fi 6)
the speed of it is around 9.6 Gbps
56
network switch
connects network devices such as printers, computers and wireless devices / access points, which this enables users to exchange data packets
57
ethernet
the ethernet is a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information to avoid simultaneous transmissions by two or more systems
58
strong password
1. be at least 8 characters 2. contain both upper and lower cases 3. have at least one numerical character
59
different acts for computing
60
the use of consent forms
the purpose of consent forms is to protect the rights of the individual and give them control over their choices
61
the four different kinds of data collection methods
Survey, interview, questionnaire, and Forms
62
Forms
structured documents for collecting specific data inputs with standardized collection and easy storage. However lacking flexibility and technical issues
63
Questionnaire
Written or digital questions to collect specific information that is easy to use and scalable, thus anonymous. However it lacks interactive levels and a risk of misinterpretation by users
64
Interview
There is direct interaction to gather detailed information, and that it provides rich insights and personalized interactions. However it is time-consuming and costly
65
Survery
there is systematic data collection from a group through structured questions with a wide reach and being cost-effective, but it has limited depth and response bias
66
the two types of data sources
Primary data sources and secondary data sources
67
PRIMARY DATA SOURCES
is the data that is being collected directly by a researcher for a specific purpose, where examples of this can be surveys, interviews, experiments and observation Cons: it is time-consuming and costly, thus requires significant effort
68
secondary data sources
it is the data collected by others, re-purposed for a different analysis or research, examples of this can be books and articles which make this cost effective. However it may be outdated and less specific to the researcher needs
69
Data
data are raw, unprocessed facts and figures
70
Information
data that has been processed and given meaning
71
pseudocode
Pseudocode is a tool that is used to describe algorithms and processes without using a specific programming language
72
wireframes
Wireframes are simple, visual representations of a user interface, focusing on structure and functionality rather than design details
73
the four constraints
technical, economic, social, legal
74
Technical constraints
there are limitations related to hardware, software, or technological capabilities that affect coding decisions
75
Economic Constraints
these are **budgetary** limitations, including the costs for development, maintenance, tools and resources that influence coding choices and project scope
76
Social constraints
there are considerations for user expectations, cultural differences, accessibility, and ethical implications when developing software
77
Legal constraints
this is the compliance with laws, regulations
78
functional requirement
functional requirements look at the features and operations for users tasks, examples for this can be **payment processes, login and data retrieval**
79
Non-functional requirement
this is more on the decorations and things that do not build up the actual program itself
80
C# (coding language)
an enterprise level coding software for games and different applications
81
Bit(8 bits in a byte)
contains binary value, usually 0 or 1