Paper 1 - Comp Sci Topics 1-7

studied byStudied by 64 people
5.0(1)
get a hint
hint

SaaS (Software as a Service)

1 / 499

Tags and Description

500 Terms

1

SaaS (Software as a Service)

Software distribution model in which applications are hosted by a vendor or service provider and provided to customers over a network

New cards
2

Four types of system changeover

Parallel running, pilot running, direct changeover and phased conversion

New cards
3

Parallel Running

Both the old and new system run at the same time

New cards
4

Pilot Running

One section of the business is trying out the new software while one keeps using the old one

New cards
5

Direct Changeover

Moving straight from the old to new system

New cards
6

Phased Conversion

Slowly implementing the new software

New cards
7

Debugging

Identifying and removing errors from computer hardware and software

New cards
8

User documentation

Documentation to support users of computer systems including hardware and software

New cards
9

Methods of user documentation

  • Manuals

  • Live Chat

  • Remote Desktop Connection

  • Embedded Assistance

  • Email Support

  • FAQs

  • Web Portals

New cards
10

Possible causes of data loss

  • Power Outages

  • Defective Hard-Drives

  • System Crashes

  • Malicious Activities

  • Human Error

  • Physical Damage

  • Data Corruption

  • Firmware Corruption

New cards
11

Consequences of data loss to individual users

Can lose personal information (ex. address, social security number, health information or bank account information)

New cards
12

Consequences of data loss to companies

Can lose reputation/customers, may be sued/have to pay fines

New cards
13

Methods of Prevention of Data Loss

  • Failover Systems ('ready-to-go' server with backups if old one goes offline)

  • Redundancy (data duplication i.e. RAID systems)

  • Removable Media

  • Offsite Storage

  • Online Storage

  • Physical Security

  • Antivirus

New cards
14

Strategies for managing/releasing updates

Automatic updates, manual updates

New cards
15

Hardware

Anything within a computer that you can physically touch

New cards
16

Software

A collection of programs and instruction that control the computer

New cards
17

Peripheral

Devices attached to the computer that allow interation and the exchange of information (ex. keyboard, mouse, screen)

New cards
18

Network

A group of computers connected together to share resources such as documents and printers

New cards
19

Human Resources

The humans operating the computer

New cards
20

Operating system

Help people interact with the computer system and manage how the hardware, programs and data interact

New cards
21

Client

A computer accessing resources hosted by another computer/the server

New cards
22

Server

A computer hosting resources to be shared across the network

New cards
23

Firewall

Protects the network traffic, decides what gets access and what doesn't

New cards
24

Benefits of surveys

(Research) Little time, simple, large amounts of data

New cards
25

Drawbacks of surveys

(Research) Hard to ask the right questions

New cards
26

Benefits of interviews

(Research) Detailed information, customizable questioning

New cards
27

Drawbacks of interviews

(Research) Time consuming, demand characteristics

New cards
28

Benefits of direct observations

(Research) First hand, unbiased information

New cards
29

Ergonomics

The study of people's efficiency in their working environment

New cards
30

Accessibility

How the system can be accessed for information exchange and operation

New cards
31

Ways to improve the accessibility of a system

Touch screens, voice recognition, text to speech, braille keyboards, braille printers

New cards
32

System

A set of interacting parts that operate together to achieve some objective or purpose.

New cards
33

Three Stages of a System

Input Process Output

<p>Input Process Output</p>
New cards
34

Factors organizations need to consider when changing computer systems

needs, limitations, user roles, cost, underlying technologies.

New cards
35

Why change management is required

Accomplishes change in the most efficient manner while minimizing the impact on an organization. Provides training and support for staff. Ensures that a consistent approach to change is used. Ensures that proper planning, designing, and testing of proposed change has occurred. Lowers the total cost of IT services.

New cards
36

Legacy system

Is an outdated computer system, programming language or application software that is used instead of available upgraded versions

New cards
37

Legacy system compatibility issues

Will legacy software run on new hardware? Is the format of the legacy system data compatible with new software? Can the legacy system be used with new technologies?

New cards
38

Business merger compatibility issues

Is the data from each company compatible? How is the data from each system going to be integrated? Transformation of data from one system to another. Companies may not be using same application software. Businesses may not have same change management policies.

New cards
39

Considerations for Systems Analysts

  • legacy system & its flaws

  • purpose of new system

  • hardware/software requirements

  • ethical implications

New cards
40

Change Management

a structured approach to ensure that changes to a system are thoroughly and smoothly implemented and focuses on the impacts on change on the end user in order to minimise any issues related to the change

New cards
41

On-premise Software

unlike SaaS, this type of systems implementation involves the software being installed / hosted locally on company machines located within their facility as opposed to externally

New cards
42

Two categories of Documentation

  • User Documentation

  • Technical Documentation

New cards
43

Types of Data Testing

  • Normal (regular, should be accepted)

  • Boundary (at the limits of acceptability)

  • Extreme (unacceptable to system, should fail)

  • Abnormal (data in a wrong form i.e. a string instead of integer)

New cards
44

Types of System Testing

Alpha, Beta, Dry-run, Unit, Integration, User Acceptance

New cards
45

Alpha Testing

Carried out by the developer in a 'laboratory type' environment on test subjects, not real end users

New cards
46

Beta Testing

Having potential consumers examine a product prototype in a real-use setting to determine its functionality, performance, potential problems, and other issues specific to its use

New cards
47

Dry-run Testing

Pen-and-paper method by the programmer that mentally runs the algorithm in the source code to check if the program achieves the same result

New cards
48

Integration Testing

Verifies that separate parts of the system can work together

New cards
49

User Acceptance Testing

To determine if the system satisfies the user and business requirements

New cards
50

Methods of user training

  • Self-instruction

  • Formal classes

  • Remote/online training

New cards
51

Release

The initial launch / version of a software package

New cards
52

Update

A software file that contains fixes for problems found by users or the software developer or small improvements

New cards
53

Patch

Type of software update that fixes problems in an existing software program. Usually meant as a temporary solution until a more comprehensive update can be released

New cards
54

Continuous Delivery

A methodology that focuses on making sure software is always in a releasable state throughout its lifecycle

New cards
55

Agile Development

A software development methodology that delivers functionality in rapid iterations, measured in weeks, requiring frequent communication, development, testing, and delivery

New cards
56

DevOps

The practice of blending the tasks performed by the development and IT operations groups to enable faster and more reliable software releases

New cards
57

Server

A computer that provides client stations with access to files and printers as shared resources to a computer network

New cards
58

Client

A computer that requests data stored on a server.

New cards
59

Hub

the connection point for devices on a single network. network devices and computer systems connect to a hub using Ethernet cables that attach to a port.

New cards
60

Switch

the connection point for multiple devices on a single network. unlike a hub, the switch can identify which network device is connected to which port.

New cards
61

Router

a more sophisticated device than both a hub and a switch. its use is to join multiple networks and serve as an intermediary between these networks so that data can be exchanged effectively.

New cards
62

LAN

Local Area Network. A small group of computers connected, usually over a very small area. Copper cables. high data transfer rates

New cards
63

MAN

Metropolitan Area Network. Networks over a larger area, city-size, connecting computers and LANs. Sometimes with fibre optics.

New cards
64

WAN

Wide Area Network. Network over large geographical areas, often across continents. Most common WAN is the internet. Connects to many computers.

New cards
65

VLAN

Virtual Local Area Network. Computers behave as if in LAN but in reality they are far apart in different network, where they tunnel into a virtual LAN. Done when playing online computer games.

New cards
66

WLAN

Wireless LAN, just with radio wave connections instead of wires. Slower than LAN.

New cards
67

GAN

Global Area Network. The nodes are spread out globally.

New cards
68

WPAN

Wireless Personal Area Network. (Bluetooth). Consists of computers, phones, tablets, etc.

New cards
69

Extranet

Your home computer can access your work network. Can be considered a restricted internet in a certain environment.

New cards
70

Intranet

In a school. We can see out to internet, but internet cannot see in. (Like one way mirror)

New cards
71

Internet

The name for world wide web.

New cards
72

P2P

Peer to peer. All computer systems in the network are decentralized and are both clients and servers at the same time, consuming and supplying resources from and to the other computer systems on the network.

New cards
73

SAN

Storage Area Network. Network which provides dedicated access to storage. (own storage device, not wider network) appears as a device to OS.

New cards
74

LAN vs WLAN Similarities

Both act on a local level. Both allow communication. Both used to connect devices. Both allow sharing of resources.

New cards
75

LAN vs WLAN Differences

They use different transmission medium. LAN is safer. LAN is faster. WLANs offer greater flexibility.

New cards
76

LAN vs VLAN Similarities

Both act on a local level. Both have same attributes. Both allow communication. Both used to connect devices. Both allow sharing of resources.

New cards
77

LAN vs VLAN Differences

VLAN delivers better performance. VLAN is safer. Formation of virtual workgroups is easy. VLANs offer greater flexibility. VLANs are independent on the medium and the physical topology. Sometimes the management/administration of a VLAN is complex.

New cards
78

Standards

Common rules providing "international language" enables compatibility for all computer systems around the world

New cards
79

OSI Model

Open system interconnection model defines a networking framework to implement protocols in seven layers. (to communicate)

New cards
80

Physical (Layer One)

Provides mechanic, electric and functional help to activate and deactivate physical connections. How a bit is transferred across a medium, transmits as 0s and 1s.

New cards
81

Data Link (Layer Two)

Ensure faultless transmission of data. Error handling of physical transmission. Amends transmission rates according to buffer of receiver.

New cards
82

Network (Layer Three)

Handles routing of packets across a network through devices to reach destination.

New cards
83

Transport (Layer Four)

End to end connections. Definition of data segments - assignment of numbers - data transfer - reassemble of data at the destination.

New cards
84

Session (Layer Five)

Manages sessions between two users.

New cards
85

Presentation (Layer Six)

Provides data format information, data compression information and data encryption information to the application.

New cards
86

Application (Layer Seven)

Performs various services for the applications used by the end users.

New cards
87

Please Do Not Teach Students Pointless Acronyms

Physical, Data (Link), Network, Transport, Session, Presentation, Application

New cards
88

TCP/IP Model

Describes all the functions that take place at each layer of protocols within the TCP/IP suite. Hierarchical model protocol that models and represents all the functionality required for successful communication between users.

New cards
89

OSI and TCP/IP

The OSI Model and the TCP/IP Model are two separate network protocol models. They can be used separately or together.

New cards
90

VPN

A virtual private network makes a "tunnelled" connection through the Internet or any other public network.

New cards
91

Hardware and Software of VPN

Internet Access, VPN Software, VPN Routers, VPN Appliances, VPN Concentrators.

New cards
92

Secure VPN

All traffic must be encrypted, authenticated and then sent along virtual tunnels.

New cards
93

Internet protocol security protocol (IPsec)

Secure transmission over public IPs. Standard encryption algorithm provide confidentiality Authentication via digital certificates.

New cards
94

Secure Socket Layer or Transport Layer Security

Doesn't need special client software. All web servers and browsers support this method of providing a VPN.

New cards
95

Remote access VPN

Connects individual hosts to private networks and facilitate teleworkers who need to access their company's network securely using the Internet.

New cards
96

Use of a VPN

VPNs gave rise to home offices as it allowed workers to connect to a company's internal network. For example, a mother can work from home that their own speed in time to pick her kids up from school.

New cards
97

Benefits of a VPN

Communication is easier, companies take advantage to provide secure connections, improves overall productivity, offers flexibility to remote offices.

New cards
98

Protocol

a set of rules that defines the rule and conventions for communication between network devices.

New cards
99

Data packet

A unit of data in a form suittransfer between computers that communicate on a network.

New cards
100

Source integrity

  • Identity of sender has been validated

  • Digital signatures verify identity.

New cards

Explore top notes

note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 37 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 38 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11743 people
Updated ... ago
4.7 Stars(89)

Explore top flashcards

flashcards Flashcard81 terms
studied byStudied by 225 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard337 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard83 terms
studied byStudied by 2 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard105 terms
studied byStudied by 137 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard41 terms
studied byStudied by 34 people
Updated ... ago
5.0 Stars(5)
flashcards Flashcard65 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard69 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard545 terms
studied byStudied by 59443 people
Updated ... ago
4.3 Stars(604)