Topic 1 - System fundamentals - 1.2 System design basics

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Hardware

The physical elements of a computer system

<p>The physical elements of a computer system</p>
2
New cards

Software

The programs and other operating information used by a computer.

<p>The programs and other operating information used by a computer.</p>
3
New cards

Peripheral

A device that is able to be attached to and used with a computer, though not an integral part of it.

<p>A device that is able to be attached to and used with a computer, though not an integral part of it.</p>
4
New cards

Network

This is a group of two or more computer systems linked together.

<p>This is a group of two or more computer systems linked together.</p>
5
New cards

Human resources

The personnel of a business or organization.

<p>The personnel of a business or organization.</p>
6
New cards

Client

This is a piece of computer hardware or software that accesses a service made available by a server.

<p>This is a piece of computer hardware or software that accesses a service made available by a server.</p>
7
New cards

Server

A computer or computer program which manages access to a centralized resource or service in a network.

<p>A computer or computer program which manages access to a centralized resource or service in a network.</p>
8
New cards

email server

An application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery

9
New cards

DNS server

This is the Internet's system for converting alphabetic names into numeric IP addresses.

10
New cards

Router

This is a device that forwards data packets between networks.

<p>This is a device that forwards data packets between networks.</p>
11
New cards

Firewall

This is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.

<p>This is a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules.</p>
12
New cards

End user

The person who actually uses a particular product.

<p>The person who actually uses a particular product.</p>
13
New cards

Stakeholder

A person or group that has an investment, share, or interest in something, as a business or industry

<p>A person or group that has an investment, share, or interest in something, as a business or industry</p>
14
New cards

Survey

To ask (many people) a question or a series of questions in order to gather information about what most people do or think about something.

<p>To ask (many people) a question or a series of questions in order to gather information about what most people do or think about something.</p>
15
New cards

Interview

A meeting of people face to face, especially for consultation.

<p>A meeting of people face to face, especially for consultation.</p>
16
New cards

Direct observation

The action or process of closely observing or monitoring something or someone.

<p>The action or process of closely observing or monitoring something or someone.</p>
17
New cards

Flow chart

A graphical representation of a computer program in relation to its sequence of functions

<p>A graphical representation of a computer program in relation to its sequence of functions</p>
18
New cards

Data Flow Diagram

This is a graphical representation of the "flow" of data through an information system, modelling its process aspects.

<p>This is a graphical representation of the "flow" of data through an information system, modelling its process aspects.</p>
19
New cards

Structure Chart

In software engineering and organizational theory, this is a chart which shows the breakdown of a system to its lowest manageable levels.

<p>In software engineering and organizational theory, this is a chart which shows the breakdown of a system to its lowest manageable levels.</p>
20
New cards

Prototype

A first or preliminary version of a device or vehicle from which other forms are developed.

<p>A first or preliminary version of a device or vehicle from which other forms are developed.</p>
21
New cards

System Development Life Cycle (SDLC)

This is a framework defining tasks performed at each step in the software development process.

<p>This is a framework defining tasks performed at each step in the software development process.</p>
22
New cards

Waterfall Development

This is a sequential design process, used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, production/implementation and maintenance.

<p>This is a sequential design process, used in software development processes, in which progress is seen as flowing steadily downwards (like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, production/implementation and maintenance.</p>
23
New cards

Agile Development

This is an alternative to traditional project management where emphasis is placed on empowering people to collaborate and make team decisions in addition to continuous planning, continuous testing and continuous integration.

<p>This is an alternative to traditional project management where emphasis is placed on empowering people to collaborate and make team decisions in addition to continuous planning, continuous testing and continuous integration.</p>
24
New cards

Usability

This is a quality attribute that assesses how easy user interfaces are to use.

<p>This is a quality attribute that assesses how easy user interfaces are to use.</p>
25
New cards

Accessibility

This refers to the design of products, devices, services, or environments for people with disabilities.

26
New cards

Privacy

This is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, this becomes anonymity

<p>This is the ability of individuals and groups to determine for themselves when, how and to what extent information about themselves is shared with others. At its extreme, this becomes anonymity</p>
27
New cards

Anonymity

The situation in which someone's name is not given or known

<p>The situation in which someone's name is not given or known</p>
28
New cards

Security

This refers to the protection of hardware, software, machines and networks from unauthorized access.

<p>This refers to the protection of hardware, software, machines and networks from unauthorized access.</p>
29
New cards

Reliability

This refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world.

<p>This refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data with the real world.</p>
30
New cards

Integrity

This refers to safeguarding the accuracy and completeness of stored data.

<p>This refers to safeguarding the accuracy and completeness of stored data.</p>
31
New cards

Intellectual Property

This includes ideas, discoveries, writings, works of art, software, collections and

presentations of data. Copyright, trademarks and patents exist to protect intellectual property.

<p>This includes ideas, discoveries, writings, works of art, software, collections and</p><p>presentations of data. Copyright, trademarks and patents exist to protect intellectual property.</p>
32
New cards

Authenticity

This means establishing a user's identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters.

<p>This means establishing a user's identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios, particularly in business and legal matters.</p>
33
New cards

Digital Divide

The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies.

<p>The growth of the use of IT systems has led to disparities in the use of, and access to, information technologies.</p>
34
New cards

Surveillance

This is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees' performance.

<p>This is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess employees' performance.</p>
35
New cards

Policies

These are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software and networks.

<p>These are enforceable measures intended to promote appropriate and discourage inappropriate use relating to information technologies. They can be developed by governments, businesses, private groups or individuals. They normally consist of rules governing access to, or use of, information, hardware, software and networks.</p>