Finalising Flashcards
Insertion anomaly
The inability to add data to the database due to the absence of other data.
Deletion anomaly
Occurs when you delete a record that may contain attributes that shouldn’t be deleted
Modification/Update anomaly
Caused by the addition of, change to, or deletion of data from a database table
Factors that impact the performance of a database
- workload
- throughput
- resources
- optimisation
- contention
Importance of adding comments to code
Not always easy to remember program code written some time ago. Comments let the reader know what the source is meant to do
Declare a list of strings items
Dim lstProgLanguages As New List (Of String)
Add items to list
lstProgLanguages.Add
Remove items to list
lstProgLanguages.Remove
HTTP
Protocol allowing unencrypted info to flow from server to client’s browser allowing sensitive info to be stolen
HTTPS
Protocol creating secure encrypted connection between server and client’s browser, thereby protecting sensitive info
Tags used to create a drop down list
<selection>
<option>
</option></selection>
<optgroup>
</optgroup>
Used to group together related items within a selected list. Makes it easier for users to make choices when looking at large lists
Internal CSS
Requires that CSS rules be placed inside the <style> and </style> tags within the <head> section of the page
External CSS
CSS rules are placed in a text file with file extension .css and the <link></link> tag is used to link test file to the HTML code
Inline CSS
CSS rules are placed inside the style attribute of each html tag
Performance testing
Tests how an application would work when used by the expected number of users
Stress testing
Tests how the application would work when used by more than the expected number of users
Portability testing
Tests the application to see how it works when moved to another device
Objectives a database driven software app must satisfy
Supporting concurrency:
The app should allow multiple users access but be able to handle concurrent updating of same data
Data integrity:
The app should allow valid and well formatted data
Security/Authentication:
the app should allow authorised users only
Fault tolerance:
The app should be able to handle potential problems gracefully
2D array
Dim int ICASS_MArks(,) As Integer
{
{68,56,76,45,79}
{34,50,57,70,60}
}
<textarea>
</textarea>
allows the user to enter multiple lines of text
<input></input>
allows only one line of text to be entered
Process that occurs when an internet user enters a URL with a domain name in a web browser
- DNS looks up the IP address of the domain name
- Web browser uses HTTP/HTTPS to send the request to the web server
- Web server responds with necessary HTML document
-Web browser then translates the HTML document into a webpage
Methods to manage security issues
- Make sure that antivirus software is installed and regularly updated
- Ensure that computers and servers are password protected
- Restricted entrance to key computer resources with unauthorised access
WYSIGWYG editor
- Allows a developer to see what the webpage looks as the coding progresses
- Similiar to VB.NET software where developers drag and drop
- Generates source code for the developer and beginners lose the opportunity to learn
Advanced HTML editor
- Coding stops for developer to view what the webpage looks like
- No drag and drop facilities, developers type the source code from scratch
- Takes longer to complete tying the source code
Hypertext
text that can be clicked on to move on to another webpage
Hyperlink
Path to a specific webpage
Constructor
Special method used to initialise the data members to default values whenever an object is instantiated
Class
Blueprint of the method and variable in a particular kind of object
Superclass
Class where other classes inherit data members and methods
Encapsulation
Hiding the code and data in a single unit such as a class
Inheritance
OOP mechanism that enables a class or object to inherit attributes and methods from class
Constructors
special sub class that is automatically called when an object of a specified class is created
Polymorphism
OOP concept that allows methods with the same name to behave in different ways depending on the requirements
Overloading
refers to creating many methods with the same name but with different parameter lists
Overriding
refers to the use of two methods wit the same name and parameter list but each method must perform different sets of tasks
Inbuilt methods of the List, ArrayList and Array classes.
Add: adds items in an array list
Insert: inserts items into a specified position
Remove: remove an item from an array list
RemoveAt: remove an item from a specified position
Sort: sort items in an array list
WWW
World Wide Web
DNS
Domain Name System
HTTP
hyper text transfer protocol
HTTPS
hyper text transfer protocol secure
FTP
File transfer protocol
TCP
transmission control protocol
IP
internet protocol
Internet Message Access Protocol
allows you to access your emails from wherever you are
POP
procedural oriented programming
focuses on processes that we apply to the data to produce the required outcomes from the given inputs
SMTP
Simple Mail Transfer Protocol
TCP/IP protocol used in sending and receiving email.
Royalties
payment made to the owner of the content in return for being able to use that content
copyright
the legal right to ownership of content