INSY 5341 C11

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/102

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

Architectural Components

Software and Hardware

2
New cards

Software Components

Data Storage

Data Access Logic - SQL

Application logic

Presentation logic

3
New cards

Data storage

Associated with the object persistence located on the data management

4
New cards

Data Access Logic - SQL 

Associated with the data access and manipulation classes location on the management layer 

5
New cards

Application logic

Located on the problem domain layer

Can be simple or complex, depending on the application

6
New cards

Presentation logic - user interface

Located on the human computer interaction layer

The presentation of information to the user, and the acceptance of the user’s commands

7
New cards

Hardware Components 

Client computers 

Servers 

Connecting Network 

8
New cards

Client computers 

Laptops, desktops, cellphones 

Input/output devices employed by the user and are usually desktop or laptop computers 

9
New cards

Servers

Typically larger computers that are used to store software and hardware that can be accessed by anyone who has permission

10
New cards

Connecting network

Can very in speed from a slow cell phone, to medium speed always on frame relay networks, to fast always on broadband connections such as cable modem, DSL, or T1 circuits, to high speed always on ethernet, T3, or ATM circuits

11
New cards

Server Based Architecture 

One point of control 

Client is a terminal 

Server has functions 

12
New cards

Server has functions

Presentation logic

Application logic

Data access logic

Data storage

13
New cards

Client-Based Architecture

Server is only for storage

Middleware

Thin Client/Fat Server

Fat (thick) Client/ Thin Server

Total cost of ownership

14
New cards

Middleware 

A type of system software designed to translate between different vendors’ software 

Installed on both the client computer and the server computer 

15
New cards

Total cost of ownership

Includes factors other than obvious hardware and software costs

16
New cards

Client-Server Architecture-Server has Data

2-Tiered Architecture

17
New cards

2-Tiered Architecture 

Two sets of computers, clients, servers 

18
New cards

Client-Server Architectures -Client has Presentation Logic

3-Tiered architecture

19
New cards

3-Tiered architecture

Three sets of computers

20
New cards

Client-Server Architectures

N-tiered Architecture

21
New cards

N-tiered Architecture

Uses more than three sets of computers

22
New cards

Characteristics

Cost of infrastructure

Cost of development

Ease of development

Interface capabilities

Control and security

Scalability

23
New cards

Cost of infrastructure

Server-based: Very High

Client-Based: Medium

Client-Server: Low

24
New cards

Cost of development 

Server-based: Medium

Client-based: Low 

Client-Server: High 

25
New cards

Ease of Development

Server-Based: Low

Client-Based: High

Client-Server: Low to medium

Graphical user interface (GUI)

26
New cards

Interface capabilities

Server-based: Low

Client-based: High

Client-Server: High

27
New cards

Control and Security

Server-based: Low

Client-Based: Low

Client-Server: Medium

28
New cards

Scalability 

Refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs  

29
New cards

Cloud Computing

The idea of treating IT as a utility or commodity

Latest approach to support distributed computing in client-server type of architecture where the server is in the cloud and the client is on the desktop

30
New cards

Multitenancy

Multiple users use same underlying hardware + software

31
New cards

Private Cloud

Dedicated to single org (available only to employees)

32
New cards

Public Cloud

Third-party providers multiple customers shared infrastructure (available to general public)

33
New cards

Hybrid 

Both

34
New cards

SaaS

MS 365

35
New cards

PaaS

IDEs (AWS)

The cloud vendor not only provides hardware support to a customer but also provides the customer with either package-based solutions, different services that can be combined to create a solution or the development tools necessary to create custom solutions in the PaaS vendor’s cloud

36
New cards

IaaS 

Hardware + Software (AWS)

Refers to the cloud providing the computing hardware to the firm as a remote service

37
New cards

Virtualization

The idea of treating any computing resource, regardless of where it is located

38
New cards

Virtual memory

Allowed the user/programmer to act as if the amount of main memory in the computer was unlimited

Done by swapping “pages” of main memory out to disk when the content of the pages were not being used and by swapping a page from disk back to main memory when it was needed

39
New cards

Web services 

Basically support connections between different services to form service oriented architectures 

40
New cards

Business process

Services can be combined 

41
New cards

Grid computing

Tends to be the underlying hardware technology that supports the cloud

A large set of networked computers that tend to be geographically dispersed

42
New cards

Ubiquitous

All aspects of life

43
New cards

IOT 

Everyday things connected to computing and internet 

44
New cards

Enchanted Objects

Umbrella, wallet

An everyday object that has a very specializes processor embedded in it that augments the object such that the object seems to be magical

45
New cards

Green IT

Reducing environmental impact of IT

46
New cards

E-Waster

Old computers 

Reuse: Remove Windows and install Linux 

47
New cards

Green Data Centers

Lower electricity Usage

Windfarms, energy compliant computers

48
New cards

Paperless office

Advent of multiuse tablets, such as Apple’s iPad

Considering the cloud and the apps available on the iPad, it is possible not only to create a paperless office but also to have the paperless office effectively be a portable office

49
New cards

Infrastructure Design - Deployment Diagram 

Relationships between the hardware components used in the physical infrastructure of an information system 

Nodes 

Artifacts 

Communication paths 

50
New cards

Nodes

Any piece of hardware in the model

Is computational resource ( a client computer, server, separate network, or individual network device)

51
New cards

Artifacts

Piece of the information system such as software component, database table 

Is a specification of a piece of software or database 

Is labeled by its name 

May contain a stereotype to specifically label the type of artifact 

52
New cards

Communication paths 

Links between nodes of the network 

Represents an association between two nodes 

Allows nodes to exchange messages 

May contain a stereotype to specifically label the type of communication path being represented ( Internet, serial, parallel) 

53
New cards

Network Model

A diagram that shows the major components of the information system and their geographic locations throughout the organization

54
New cards

Non-Functional requirements and physical architecture layer design - Operational Requirements

Specify the operating environments in which the system must perform and how those might change over time

55
New cards

Technical Environment Requirements 

Special hardware, software, and network requirements imposed by business requirements 

56
New cards

System Integrations Requirements

The extent to which the system will operate with other systems

57
New cards

Portability Requirements

The extent to which the system will need to operate in other environments

58
New cards

Maintainability Requirements

Expected business changes to which the system should be able to adapt

59
New cards

Technical environment requirements

Specify the type of hardware and software system on which the system will work

60
New cards

Non-Functional requirements and physical architecture layer design - Performance 

Speed Requirements 

Capacity Requirements 

Availability and Reliability Requirements  

61
New cards

Speed Requirements

The time within which the system must perform its functions

62
New cards

Capacity Requirements

The total and peak number of users and the volume of data expected

63
New cards

Availability and Reliability Requirements 

The extent to which the system will be available to the users and the permissible failure rate due to errors  

64
New cards

Non-Functional Requirements and Physical Architecture Layer Design - Security Requirements

System Value Estimates

Access Control Requirements

Encryption and the Authentication Requirements

Virus Control Requirements

Symmetric

Asymmetric

Certificate Authority

65
New cards

System Value Estimates

Estimated business value of the system and its data

66
New cards

Access Control Requirements 

Limitations on who can access what data 

Access control list 

Capabilities List 

Role based access control

67
New cards

Access Control list

List of users with CRUD access on a file (becomes precondition)

Associated with the asset for which you want to control access

68
New cards

Capabilities List

List of files that a user has CRUD access to

Show that the user had read access to the file 

69
New cards

Encryption and Authentication Requirements

Define what data will be encrypted where and whether authentication will be needed for user access

70
New cards

Virus Control Requirements

Requirements to control the spread of viruses

71
New cards

Asymmetric 

Public key 

Private key 

72
New cards

Certificate Authority

Verisign

73
New cards

Non-Functional requirements and physical architecture layer design - Cultural and Political Requirements

Customization Requirements

Legal Requirements

74
New cards

Customization Requirements

Specification of what aspects of the system can be changed by local users

75
New cards

Legal Requirements

The laws and regulations that impose requirements on the system

76
New cards

Hardware and System Software Specifications

A document that describes what hardware and software are needed to support an application

Alternative Matrix

Benchmark

Parkinson’s Law

77
New cards

Alternative Matrix 

Should include all architectural requirements, both optional and mandatory, and each criterion should be weighted 

78
New cards

Benchmark

Essentially a sample of programs that would be expected to run on the new physical architecture

79
New cards

Parkinson’s Law

Implies that regardless of the users’ real needs, their imagined needs will always fill up whatever capacity the system has

80
New cards

System Integration Requirements 

That require the system to operate with other information systems, either inside or outside the company 

81
New cards

Portability Requirements

Define how the technical operating environments might change over time and how the system must respond

Refer to potential changes in business requirements that drive technical environment changes

82
New cards

Maintainability Requirements

Specify the business requirement changes that can be anticipated

83
New cards

Performance requirements 

Focus on performance issues, such as response time, capacity, and reliability 

84
New cards

Speed requirements

How fast should the system operate?

85
New cards

Response time

How long it takes the system to respond to user request

86
New cards

Capacity requirements 

Attempt to predict how many users the system will have to support, both in total and simultaneously

Are important in understanding the size of the databases, the processing power needed, and so on 

87
New cards

Availability and Reliability Requirements

Focus on the extent to which users can assume that the system will be available for them to use

88
New cards

24/7

Requirement means that users might need help or have questions at any time, and a support desk that is available eight hours a day will not be sufficient support

89
New cards

Mission-Critical System

For an Internet bank that has no brick and mortar branches

If the website crashes, the bank cannot conduct business with its customers

90
New cards

Access Control Matrix

Could combine the access control and capabilities list approaches and require that access is only granted to an IT asset if both the access control list and the capabilities list match

91
New cards

Role-based access controls 

Access is limited by the role that the user is assigned 

Instead of keeping track of the level of access being granted by the individual user, the controls are maintained at the role level

92
New cards

Encryption

Means of disguising information by the use of mathematical algorithms (or formulas)

Can be used to protect data stored in databases or data that are in transit over a network from a database to a computer

93
New cards

Symmetric encryption algorithm

Data Encryption Standard (DES) / Advanced Encryption Standard (AES)

One in which the key used to encrypt to a message is the same as the one used to decrypt it, which means it is essential to protect the key and that a separate key must be used for each person or organization with whom the system shares information

94
New cards

Asymmetric Encryption

Such as public key encryption

One in which the key used to encrypt data is different from the one used to decrypt it

95
New cards

Public Key 

Key used to encrypt data 

Reduces the key-management problem 

Each user has its public key that is used to encrypt messages sent to it 

96
New cards

Private Key 

Key to decrypt it 

97
New cards

Authentication

Digital signatures

98
New cards

Invertible

Public key encryption are invertible meaning that text encrypted with either key can be decrypted by the other

99
New cards

Certificate authority 

A trusted organization that can vouch for the authenticity of the person or organization 

100
New cards

Virus Control Requirements

Addresses the single most common security: viruses

Explore top flashcards

25/7/2023 (PLS)
Updated 888d ago
flashcards Flashcards (108)
Groep 25
Updated 446d ago
flashcards Flashcards (25)
AP HUG UNIT 1
Updated 833d ago
flashcards Flashcards (51)
Le Passé Composé
Updated 97d ago
flashcards Flashcards (24)
green book
Updated 112d ago
flashcards Flashcards (38)
25/7/2023 (PLS)
Updated 888d ago
flashcards Flashcards (108)
Groep 25
Updated 446d ago
flashcards Flashcards (25)
AP HUG UNIT 1
Updated 833d ago
flashcards Flashcards (51)
Le Passé Composé
Updated 97d ago
flashcards Flashcards (24)
green book
Updated 112d ago
flashcards Flashcards (38)