Legacy systems & Ethics & Closing Flashcards

(25 cards)

1
Q

How do Brodie & Stonebraker define a legacy information system?

A

“Any information system that significantly resists modification and evolution.” :contentReference[oaicite:26]{index=26}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What developer-centric definition of legacy code does Michael Feathers give?

A

“Code without tests.” :contentReference[oaicite:27]{index=27}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List the four strategic responses to ageing systems covered in the lecture.

A

Maintenance, Wrapping, Migration, Redevelopment. :contentReference[oaicite:28]{index=28}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which strategy often allocates up to 80 % of effort to testing?

A

Data migration. :contentReference[oaicite:29]{index=29}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the first step in Feathers’ “cover-and-modify” workflow?

A

Identify change points and test points, then break dependencies so tests can be inserted. :contentReference[oaicite:30]{index=30}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two risks of the “big-bang” redevelopment approach.

A

High upfront cost and high failure risk due to massive requirements elicitation. :contentReference[oaicite:31]{index=31}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are behaviour-preserving pilots or parallel runs important during migration?

A

They let teams validate that the new system matches legacy behaviour before cut-over. :contentReference[oaicite:32]{index=32}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give one business reason organisations keep legacy systems alive.

A

Core data and business rules are embedded and difficult or risky to extract. :contentReference[oaicite:33]{index=33}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State one technical barrier that turns modern code into future legacy.

A

Obsolete third-party libraries that are no longer maintained. :contentReference[oaicite:34]{index=34}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which three ethical principles are repeatedly challenged in software case studies?

A

User safety, privacy, and informed consent. :contentReference[oaicite:35]{index=35}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Summarise the Zoom COVID-19 ethics issue in one sentence.

A

Weak encryption and hidden servers undermined user privacy amid rapid user growth. :contentReference[oaicite:36]{index=36}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What data-privacy lesson comes from the Tinder 800-page data dump?

A

“Consent” can hide asymmetrical power; users seldom foresee long-term use of collected data. :contentReference[oaicite:37]{index=37}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the key failure in the Danish ambulance record tablet pilot.

A

Realtime data entry clashed with patient care, forcing medics to choose between treatment and legal documentation—pilot was shut down. :contentReference[oaicite:38]{index=38}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many principles make up the ACM Software Engineering Code of Ethics?

A

Eight: public, client, product, judgment, management, profession, colleagues, self. :contentReference[oaicite:39]{index=39}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give one example of the “public” principle in action.

A

Refusing to ship a feature that puts user safety at known risk. :contentReference[oaicite:40]{index=40}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What organisational factor often blocks legacy modernisation?

A

Competing business priorities that underfund non-visible infrastructure work. :contentReference[oaicite:41]{index=41}

17
Q

Explain “stewardship of the past” in one line.

A

Respecting the investment and tacit knowledge embodied in existing systems while changing them responsibly. :contentReference[oaicite:42]{index=42}

18
Q

What are the two final duties the closing slide assigns to architects?

A

Stewardship of the past and stewardship of society. :contentReference[oaicite:43]{index=43}

19
Q

Which ethics case involved an encryption firm pivoting to spyware?

A

The lecture’s “encryption-turned-spyware” cautionary tale—betrayed user trust for profit. :contentReference[oaicite:44]{index=44}

20
Q

Why is formal ethics training still rare among engineers?

A

University curricula and company onboarding often prioritise technical skill over ethical reflection, despite societal impact. :contentReference[oaicite:45]{index=45}

21
Q

List two red flags that a legacy system may soon become an operational risk.

A

Few remaining experts understand it (truck factor ≈ 1) and vendor hardware/support is nearing end-of-life. :contentReference[oaicite:46]{index=46}

22
Q

How can wrapping a legacy system create new maintenance burdens?

A

It introduces a second technology stack—the wrapper—requiring its own updates and monitoring. :contentReference[oaicite:47]{index=47}

23
Q

What KPI can indicate ethical health for data-heavy apps?

A

Number of user-requested data deletions successfully fulfilled per quarter (GDPR Right-to-Erase compliance). :contentReference[oaicite:48]{index=48}

24
Q

Give a concise exam definition of a legacy system.

A

A software system that significantly resists modification and evolution, often due to obsolete technology, missing tests, or business entanglement. :contentReference[oaicite:49]{index=49}

25
Provide a concise exam definition of professional software ethics.
The disciplined application of principles that balance employer goals with user welfare and societal good, as captured by the ACM Code. :contentReference[oaicite:50]{index=50}