Upgrade to remove ads
SDD HSC Exam Terms 2018
Terms in this set (32)
Malware is software designed to damage or perform unwanted actions on computer
The defining characteristic of viruses is that they are self-replicating computer programs which install
themselves without the user's consent.
A standalone malware computer program that replicates itself in order to spread to other computers.
Generally non-self-replicating type of malware program
containing malicious code that, when executed, carries
out actions determined by the nature of the Trojan,
typically causing loss or theft of data, and possible system
Restricts access to the computer system that it
infects, and demands a ransom paid to the
creator(s) of the malware in order for the
restriction to be removed.
Aids in gathering information about a person or organisation without their
knowledge and that may send such information to another entity without
the consumer's consent, or that asserts control over a computer without
the consumer's knowledge.
Any software package which automatically renders advertisements in order to generate revenue for its author.
Comprises several classes of ransomware or scam software with malicious
payloads, usually of limited or no benefit, that are sold to consumers via
certain unethical marketing practices.
Examples of software maintenance
corrective: deals with the repair of faults or defects found in day-today system functions.
adaptive: the implementation of changes in a part of the system, which has been affected by a change that occurred in some other part of the system.
perfective: deals with implementing new or changed user requirements. Perfective maintenance involves making functional enhancements to the system in addition to the activities to increase the system's performance even when the changes have not been suggested by faults.
preventive: involves performing activities to prevent the occurrence of errors. It tends to reduce the software complexity thereby improving program understandability and increasing software maintainability.
What is the code of conduct?
Standards by which software developers agree to abide. These standards increase the quality of developed software across the industry.
Examples of good coding practice
The use of in code commenting to describe what and how an algorithm works
Using meaningful variable, function and object names.
Only having a single logical process or purpose per subroutine/function.
Having a clear and logical mainline/root program.
Defined as the property resulting from the fruits of mental labour
Owner of Intellectual Property can protect it through copyright Laws
Is the appropriating or imitating of another's ideas and claiming them as your own.
In terms of software plagiarism becomes less clear because of collaboration in the creation
All work done should be acknowledged
Copyright laws are in place to safeguard the intellectual property rights of the authors
Provides economic incentives for creative activity.
Copyright doesn't protect you against another software developer making a similar program.
Multi-user licences: similar to site licences but have a set number of computers allowed to be
Single User License
Single User License: allows customer to make one installation and one backup. Sometimes more may be permitted
Site licences: permit organisations to install the site licences on a large number of computers
Copyrighted software that can be sampled before it is purchased, once accessed, developers can make their own copies and distribute them.
Software becomes public domain when the copyrights holder relinquishes all rights to the
Covered by copyright laws but removes many traditional copyrights.
Its main purpose is to encourage collaboration whilst developing the source code.
implies you have rights to do as you wish the property.
specify the framework in which the program may be used
The act of running software to assess the relative performance of a system.
They are usually standard tests to compare other systems.
This approach is used for large projects in large
companies, and have the advantage of producing
high quality, or highly complex products.
Places emphasis on the system being developed, rather than the structured development process being followed.
A beta version is designed with basic features, from this the
Rapid Application Approach
Main purpose of reducing time, and also
less money if possible.
End user approach
Is usually created to address a specific problem that the end user needs a solution for,
but does not need the extensive functions and capabilities that another approach would
provide, or does not have the budget to afford it.
A piece of code used to stand in for some other programming functionality. A stub may simulate the behavior of existing code such as a procedure on a remote machine
A piece of code used to replace a module, a stub may simulate the behavior of existing code such as a procedure on a remote machine
Modules a team of developers send to a third party to design, this allows less time to be used whilst developing software however this is a risk of a lower quality output
At what level of testing does acceptance occur?
A register that holds the address of the next machine code instruction to be executed
THIS SET IS OFTEN IN FOLDERS WITH...
Approaches #3: Prototyping Approach
Defining and Planning #4: Data Types
SDD - Language types
Object Oriented Programming
YOU MIGHT ALSO LIKE...
Information Security Management Chapter 6
Management Information Systems: Software Terms
Midterm Chapter 6
Chapter 4: Malware
OTHER SETS BY THIS CREATOR
Defining and Planning #1 and #2 Combined
Implementation #4 - Techniques used in developing…
The Translation Process
Programming Paradigms - HSC SDD Terms