3-Information System Architecture and Software Flashcards

1
Q

Function performed by OS

A

•Access to peripheral devices • Storage management• process management • Resource allocation• Communication • Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cluster mode

A

active-passive mode : One computer is active, and the remaining stay passive.

active-active : All computers are active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is failover

A

When in active-passive mode, a passive computer takes over when a active computer fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Directory

A

A structure that is used to store files. A file system contains one or more directories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A file

A

A sequence of zero or more characters that are stored as a whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What control are contained in DBMS

A

Authentication and access control - permitting control over which users may access what data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Definition Language (DDL)

A

Used to define the structure of the data contained in a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of DBMSs

A

Relational object, hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Primary Key

A

field in the table whose values are unique in the table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Foreign Key

A

A field in a record in one that can reference a primary key in another table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Referential Integrity

A

In relational database, a row cannot be deleted from a table if there are records in other tables whose foreign keys reference the row to be deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Relational Database Security

A
  • Access Controls -limit read and write access
  • encryption - to encrypt some field of the data
  • audit logging- to permit an admin to view some or all activities that take place in a database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Utility software

A

broad class of programs that support the development or use networks, information systems, OS and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of networks

A
  • Personal area network (PAN) : Used by a single individual.
  • Local area network (LAN) : Connect computers and devices together in a small building or residence.
  • Campus Area Network (CAN) : Interconnection of LANs of an organization that has buildings in close proximity.
  • Metropolitan Area Network (MAN) : A network that spans a city or regional area.
  • Wide Area Network (WAN) ;Network whose size ranges from regional to international.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network based services

A

Protocols and utilities that facilitate system-and network resource utilization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Email servers

A

Collect, store, and transmit e-mail message from person to person

17
Q

File servers

A

provide centralized storage of files for use among groups of users.

18
Q

Two dominant network model in use

A

OSI and TCP/IP

19
Q

OSI model

A

Open Systems Interconnection Model, consist of seven layers:

20
Q

What are the seven layers

Please Do Not Throw Sausage Pizza Away

A
1• Physical
2• Data link
3• Network
3• Transport 
4• Session
5• Presentation
7 • Application