Unit 1 (System fundamentals) Flashcards

1
Q

What are some factors to consider when changing a new system? (6)

A
Compatibility to the old system
Infrastructure
Hardware/Software requirements
Cost
Time
Staffing
Ethical issue
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Planning transition to the new system steps

A
Hardware
Communications equipment and software
System software
Documentation and support
Running and mantaining system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SaaS. And 1 advtbnage and disatvange

A

s a software distribution model in which a cloud provider hosts applications and makes them available to end users over the internet.
Operational Management: No installation, equipment updates or traditional licensing management. Security
Loss of Control: The vendor manages everything, making you dependent upon the vendor’s capabilities
Limited Customization: Most SaaS applications offer little in the way of customization from the vendor

SaaS is a contemporary delivery method that allows software and data to be hosted and managed centrally on a remote datacenter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Changing a system can be difficult for a variety of reasons:

A

Users don’t like change (too often/at all)
There might be data loss during migration
– It might be expensive (either in terms of money or time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Important steps to change a new system

A

Plan
Communicate
Integrate (If it’s possible for the change program of your business to be adjusted)
Evaluate (•It’s crucial that the organisation, its passage through the change program, and the widere organisation’s reactions to that change program are evaluated at every feasible opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote vs local

A

A local server is located in the same machine as the one who made the request. A remote server is another machine that can receive and respond to exterior requests.
There are two competing models of distributing software:Local and Remote (also called SaaS/cloud).
You can either buy a program and install it on a particular computer or set of computers (called local)
Or you can buy/rent/use software that is installed on a computer somewhere on the internet and then use it though a browser or dedicated local application (called remote)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When implemting /installing a new system or price there are 4 ways to do it

A

Parallel: Which is that both new and old systems work together for a short prediod of time
direct: Which means unpluging old system and pluggin the new one
Pilot: This is whena business has multiple websites, and introduces the new system on one of them, and extends it to the other websites over a period of tme
Phased: Different parts of the systems are replaced one at a time over a perido of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Static vs dynamic testing

A

Static testing is about the prevention of defects whereas Dynamic testing is about finding and fixing the defects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is user documentation?

What are help files?

A

User documentation is any document that explains how to use the features and functions of a system to its end-users.
Files supplied together with the system. They can usually be called up with a button in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are Online services:

A

Special web service hosted by the system’s developer to provide user documentation.
An online service refers to any information and services provided over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evaluate different methods of delivering user training (3)

A

Self instruction:
Users can learn how to use a new system on their own, provided they have the right material to learn from.
Formal classes
Users sitting in a classroom listening to an instructor who shows and explains how to use the system.
Remote / Online training
An instructor training one user or a small group of users by some kind of remote connection (Skype, Google Hangouts, Face time, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify a range of causes of data loss (2)

A

Accidental delation
Builiding fires
Computer viruses
Data corruption (erros n computer data)
Power failure (need for UPS (uninterruptible power supply)

Unregulated power supply of any sort can damage hardware components.
Software
Hardware/software malfunctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key data loss prevention methods (4)

A

Offiste sotrage: data sotrage i two or more locations

Failover system(like a backup battery) Failover is the constant capability to automatically and seamlessly switch to a highly reliable backup system.

Redundancy (Data redundancy is when multiple copies of the same information are stored in more than one place at a time. )
Removable media (Removable media is any type of storage device that can be removed from a computer while the system is running.)
Offsite/online storage (An offsite backup is a backup process or facility that stores backup data or applications external to the organization or core IT environment.

Offsite storage is the practice of storing physical or digital data, documents, or other materials in a location that is separate from the primary location where the data is created or used.

Regular backup of files using hard disks or magnetic tapes
Installation of an Antivirus program for antivirus prOteCtlon
Firewall installation
Data storage in two or more locations (offsite storage)
Removed hard copies (printed versions of data)

)A firewall is a tool that can either be hardware or software. Its purpose is to protect computers against threats from intruders breaking into your computer or network via the Internet by:- accessing the data on your computer; running programs designed to spread malware to other computers over the Internet.

A firewall is a security network that can be either hardware or software, or both, and is meant to protect computer systems and networks from harmful intrusions. Antivirus is a software utility application that protects a system against internal attacks such as viruses, trojan horses, spyware, and so on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe strategies for managing releases and updates

What is release and updates?

A

Release
A product release is the process of launching a new productfor a specific market or user base.
Release
A product release is the process of launching a new productfor a specific market or user base.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are patches

A

Patches

– Address new security vulnerabilities
– Address software stability issues
– Upgrade the software
A patch is a software update comprised code inserted (or patched) into the code of an executable program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to get updates ( 2)

A

Manually (download and install them yourself)
– Pro: Full control
– Con: Time consuming
Automatically (software automatically contacts the developer, downloads and installs any updates)
– Pro: Don’t have to think/worry about updates, always up to date
– Con: No control – bad update might crash the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is Release Management

and what are 2 ways

A

Release management refers to the process of planning, designing, scheduling, testing, deploying, and controlling software releases.
Continuous delivery:Continuous delivery is a software engineering approach in which teams produce software in short cycles, ensuring that the software can be reliably released at any time.

Agile software development DevOps: Agile software development describes an approach to software development under which requirements and solutions evolve through the collaborative effort of self- organizing and cross-functional teams and their customers/end users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What Is TELOS

A

Telos:
Technical feasibility: Is the existing technology suffeince to implement the proposed system.
Economic feasibilityL; is the proposed system cost effective
Legal feasibility: ar thre are confilictics between the proposed system and any law
Operational feasibility: can the orgnazation maintenance and operate the new system
Scedle feasibility: How long will we wait?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A computer system includes

A

A computer system includes input, Processing, Storage, Output, and Communication devices.
A communications device is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A communications device is :

A

A communications device is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A system flowchart.:

A

refers to the description of a data processing system, including the flow of data through individual programs involved, but excluding the details of such programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A data flow diagram is

A

A data flow diagram is usually used to describe the prigram to be solved(alanzied). A DFD shows how data moves through a system and the data stores that the system uses.
data flow diagram shows the way information flows through a process or system. It includes data inputs and outputs, data stores, and the various subprocesses the data moves through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A data flow diagram is

A

A data flow diagram is usually used to describe the prigram to be solved(alanzied). A DFD shows how data moves through a system and the data stores that the system uses.
data flow diagram shows the way information flows through a process or system. It includes data inputs and outputs, data stores, and the various subprocesses the data moves through.

23
Q

System life cycle refers to

A

System life cycle refers to the stage through which the development of a new system passes through. Most systems begin with analysis stage, design, implementation, operation and maintenance

24
Q

A new system can be created in order to

A

A new system can be created in order to replace a system that is inefficient, no longer suitable for it’s original purpose. The purpose of a new system can be to increase productivity or quality of the output or to even minimze costs. The new syste, should reduce the errors or flaws of the existing one.

25
Q

Software incompatibility

A

Software incompatibility is a situation where different software entities or systems cannot operate satisfactorily, cooperatively or independently.
computer systems.

26
Q
Functional testing:
Beta testing:
Alpha testing
Dry run testing
Unit testing
Inegtration testing:
A

Fnctional testing, tests individuals commands, text input, menu functions etc. Confirms that they perform and function correctly according to the design specifications.
Beta testing includes comments and suggestions of the users.
Dry run testing is conducted using pen and apper, it is when the programmer mentally runs the algorithm.
Unit testing, indivual parts of the system being tested sperately.
Alpha testing :programmers
Beta:employees and client
lpha testing is done by testers and quality analysts inside the organization whereas Beta testing is done by real users who will be actually using the software.
Integration testing, the entire system is tested at the same time to verify that all the components can work together.

27
Q

User acceptance

A

User acceptance testing is used to determine if the entire system satisfies the customers needs.;

28
Q

Debugging

A

Debugging is a systematic process of finding and correcting the number of bugs (erros) in a computer program.

29
Q

Software:

A

Software: a series of instructions that the cpu can understand. These instructions guide the CPU to perform specific operations. Software is comprised of both programs and data.

30
Q

Computer Network

A

Computer Network: A set of computer systems that are interconnected and share resources, as well as data. For example: Local Area Network, Wide Area Network, etc.1

31
Q

A dumb terminal:

A

A dumb terminal is a device that usually consists of a keyboard, a monitor, and a network card that is connected to a server or a powerful computer.

32
Q

What is data migration process

State two stages of the “data migration process”.

A

ata migration is the process of moving data from one location to another, one format to another, or one application to another.
Answer: Plan and validate

33
Q

”internal” and “external” documentation.

A

one difference between ”internal” and “external” documentation.
Answer: Internal documentation facilitates programmers while external documentation focuses on the user of the product.

34
Q

Network vs Server

A

What is a server: A network is a collection of computers and devices connected together, often wirelessly, via communications devices and transmission media. While A server controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information..
Network: A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications.
A server is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
A client receives data via the network, whereas the server has saved data on it and offers it to clients.

35
Q

An email server is t

A

An email server is the equivalent of a post office that manages the flow of email in and out of the network, checks that an email address is valid, allows users to access their email, etc.

36
Q

What is a router

A

A router is a networking device that accepts incoming quanta of information (data packets), reads their destination address and distributes them across networks, according to a routing table or routing policy (policy based routing). A router identifies the destination of messages and sends them via an appropriate route and is used to forward data packets between networks4

37
Q

What is Domain name system server

A

A Domain Name System Server attributes names to network addresses and therefore resolves names by assigning them to the appropriate network entity (a resource that is part of the network). A DNS server allows you to type names into the address bar of your web browser like ”mit.edu” and the web browser automatically finds that address on the Internet.

38
Q

What is a client-Server

A

A client-server refers to a software network architecture system where clients request information and servers perform tasks in order to provide the information.

39
Q

What are skate holders

A

Stakeholders are individuals, teams, groups or organizations that have an interest in the realization of a project or might be affected by the outcome of a project“

40
Q

What is data processing and what are 3 types

A

Data processing is the method of collecting raw data and translating it into usable information
types of processing. The following table contains the equivalent definitions:
Online processing (interactive)
Data processing performed by a single processor through the use of equipment that it controls. For example: airline reservation.
Real-time processing

41
Q

System requirements are:

A

System requirements are specified through a document called a requirements specification document. This document defines the specific customer requirements of a computer system. It is included within the system analysis and may be later used to test the system, after implementation, in order to evaluate it.

42
Q

stepwise refinement

A

tepwise refinement” is a software design and problem solving technique that involves the partition of a problem into smaller sub-problems. Each
sub-problem is further broken down until all sub—problems are detailed enough and no more partition is required. Programmers are able to attack its sub-problem and develop the equivalent programming code.2

43
Q

What is accessibility:

A

Accessibility refers to the potential of a service, product, device or environment to serve and meet the needs of as many individuals as possible

44
Q

What is usability:

A

Usability refers to the potential of a product, application or website to accomplish user goals.

Usability is the degree to which a software can be used by specified consumers to achieve quantified objectives with effectiveness, efficiency, and satisfaction

45
Q

Depositoion

A

Breaking down a complex problem using sub procedure

46
Q

What are the stages to develop a system ?

A

What are the steps to develop a system ?
Analysis - The system analyst meets with the users to determine exactly what the user wants, and undertake feasibility studies (whether it is possible for the designers to meet the user’s expectations).
Design - In this stage, the programmers design a solution to the user’s problem. This can be the most time-consuming part of the cycle, since there are many choices that need to be made. A decision must be made on the types of software, hardware and on the algorithms that are going to be used.
Implementation - The construction (development) of the system; the system is developed based on the design laid out in the previous stage.
Operation - Also known as installation, or system launch. The system can be installed as a direct changeover, as a phased introduction, or as a parallel running.
Maintenance - Bugs and/or flaws might arise with time, thus, the system will need to be fixed and updated. However, fixing one bug may lead to another bug being created.

47
Q

Consequence of not backing up:

A

Consequence of not backing up:
Medical checkup:
Losing money
Losing data

48
Q

Methods of data collection

A

Interview
Detailed data, can change questions during process (not like questionnaire)
Time-consuming, problems classifying/quantifying data
Questionnaire
Can reach a lot of people, quickly (compared to interview/observation). Numerical analysis possible.
Questions may be mis-interpreted. People may not respond at all or may do only some questions.
Document Search
The data required for the system can be identified accurately.
Documents may be lacking, out-of-date etc (interview could discover this).
Literature Search
Can find descriptions/problems of previous implementations (saves work).
Problem may not be described (or in detail). Again, working without experienced users.
Observation
Observations are independent of user bias (unlike interview/questionnaire).
Time consuming and observer can affect process: Hawthorne Effect.

49
Q

A requirement specification contains what the system will be able to do and how it will be done. This should include:

A

A requirement specification contains what the system will be able to do and how it will be done. This should include:
The costs of building, testing and running the system (including both hardware and software)
Estimated time till completion
List of hardware and software tools needed
Description of hardware and software functions
Performance of the system
List of personnel and allocated tasks

50
Q

System life cycle stages:

A
System life cycle stages:
Exisitnv system analysis
Requirements speicifiction
Software deign
Software impmentnion 
Tetsing and bugging
New system installation
Maintnance
51
Q

Flowchart and pseduocode:

A

Flowchart and pseduocode:
Computer algothimis could be prestetned using flowchart and pseduocode

Flowchart:
Is a grpaggical represntnion of the algorithm. Flowchart uses formally agreed standard symbols connected by lines with arrows to show the flow of the algorhtim

52
Q

Num 1 to 10. what does this mean?

A

Set num1 to 10. Is the same thing as num1 = 10

If you want userniput then use (USERINPUT). In pseduocode

53
Q

Endif Statment indactes that

A

The ENDIF statement indicates the end of the IF/THEN/ELSE/ENDIF statement construct, and must be coded for each construct. Its like a THEN statment

54
Q

Syntax:
Sequence:
Selection:

A

Syntax:
Syntax is the set of rules that define what the various combinations of symbols mean
Sequence: The order of steps in an algorithm
Selection: making a decision based on a condition
Iternation: Steps or set ot stpe sare repeated until a condition is meet

55
Q

Legacy

A

Legay refers to an old technology, hardware, computer system or application program