Chapter 6 Information Technology Systems Flashcards

1
Q

Programming

A

-the technique by which we tell computers what we expect of them
-from physical (electronic) standpoint, all information in the computer must be represented by a series circuits which are either “on” or “off”; by convention we far to these values as 1’s and 0’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hexadecimal notation

A

Base 16 to express numbers (versus base 10 - decimal), it’s more compact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bit, byte, kilobyte, megabyte

A

Bit = binary digit
Byte=eight bits
Kilobyte=string of 1024 bytes
Megabyte=1024 kilobytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Assembly language

A

-Type of computer language
-Machine code is hard to understand
-Uses words and abbreviation in place of long strings and numbers to make programming easier
-Needs another program called an assembler to translate it into machine code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compiled language

A

-Type of computer language
-Evolved after assembly language
-Higher-order language
-Needs another program called a compiler to convert the source code into machine code
-Con: needs entire program to be complete before compiler can begin
-Example of compiled language is FORTRAN (Formula Translator), developed by IBM in 1950s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Interpreted language

A

-Type of computer language
-Evolved after compiled language
-Each line of program is passed through an interpreter for execution and only the part of the program that is immediately needed will be translated
-Con: cost of flexibility is speed
-Example of interpreted language: BASIC (Beginner’s All-purpose Symbolic Instruction Code), appeared on most home computers in the 1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control structures (and example)

A

linguistic mechanisms that programmers use to tell a computer what to do in a given circumstance
-if/then/else
-for/next: loop
-while loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Waterfall

A

-Type of software development
-Origins in manufacturing
-Sequential method where each phase has to be complete before proceeding to next level
-50% of project is spend on Requirements and Design phase
-And then proceed to Implementation (write code), Verification (debugging), and Maintenance
-Type of top-down method
-Critique: project requirement rare remains stationary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rapid prototyping

A

-Type of software development
-Start with user interface and then work backwards
-Type of bottom-up approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spiral model

A

-Type of software development
-Developed by Barry Boehm
-Combines waterfall and rapid prototyping
-4 parts: 1) analysis of objectives, alternatives and constraints; 2) evaluation of alternatives and identification of risks, 3) development and verification, 4) planning for the next cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rapid application development (RAD)

A

-Type of software development
-Like spiral, attempts to break project into smaller chunks
-Adhere to strict timelines or timeboxes
-Involves building completely function models rather than prototypes
-If changes are needed, reduce requirement rather than postpone deadline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Agile software

A

-Type of software development
-Another iterative method that advocates for a more lightweight and people=centric approach
-Stresses short cycles of continuously improving software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scrum

A

-Type of software development
-Variation of agile theme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extreme Programming (XP)

A

-Type of software development
-Variation of agile theme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Test-driven Development (TDD)

A

-Type of software development
-Before any feature is added to project, programmer writes an automated test
-Has library of internal tests
-Critique: not uncommon for the testing code to be much larger than application code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System integration

A

-process of enabling disparate systems to communicate
-software used to bind two systems is called interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Vertical integration

A

-process of integrating systems based on similar functionality
-Tightly integrated systems are called silos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Star integration (or spaghetti integration)

A

type of system integration where every system talks to everyone else
-expensive but provides best inter-system communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Horizontal integration (or bus or enterprise service bus)

A

-when there is a new system created that provides dedicated communication between other systems
-high cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What standard dictates quality in computer systems

A

International organization for Standards document (25010)
8 categories:
-functional suitability, performance efficiency, compatibility, usability, reliability, security, maintainability, portability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Schema

A

rules that enforces what sort of data a database will accept
-The rules or constraints ensure greater data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Normalization

A

-process of organizing database to reduce data redundancy and improve data integrity
-database is normalized when each row refers to a single indivisible idea “atomic”
-no duplicate information, takes up less storage space, generally easier to modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Denormalized

A

-when table is intentionally designed to keep redundant data for performance purposes
-faster to query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Update anomaly

A

-type of data anomaly
-when an incomplete update causes anomalous data

25
Q

Insertion anomaly

A

-type of data anomaly
-inability to add new data to a table because of absence of other data

26
Q

Deletion anomaly

A

-type of data anomaly
-deletion of one piece of data causes unintentional loss of other data

27
Q

Relational DataBase Management System (RDBMS)

A

-when tables relate to each other
-usually maintain a single, centralized data store and can provide ACID guarantees

28
Q

NoSQL or object-oriented database

A

-No schema
-contains document store, each section of the database (often called a collection) contains numerous arbitrary objects called documents
-Often represented in XML or JSON
-No predefined format of documents, designed to easily scale horizontally
-usually distributed over commodity machines in order to provide high availability while sacrificing consistency but not always

29
Q

ACID (used to describe reliability of database)

A

-Atomicity: used to describe database transactions that must be done completely or fail completely
-Consistency: any transaction will bring the database from one valid state to another
-Isolation: provides that if the database allows transactions to run concurrently, the database must ensure that the same state would be achieved if they had run sequentially
-Durability: once the transaction is complete, the change has to be permanent, even if there is power loss or computer crashes

30
Q

Data warehouse

A

intentional abstraction of a database designed for analytics

31
Q

Data mart

A

smaller size of the original data, usually restricted to a particular line of business

32
Q

OLAP cube

A

a multidimensional array used for gathering business intelligence
-each axis is called a dimension
-no limit to number of dimensions in an OLAP cube
-the data in each cell is referred to as facts or measures

33
Q

Types of OLAP operations

A

-Drill down: break one category into smaller chunks
-Roll up: combining categories into larger chunks
-Slice: holding one dimension constant
-Dice: limiting data based on more than on dimension
-Pivot: rotating data by changing axes

34
Q

Computer network

A

-set of protocols and transmission media which allow two or more computers to interact with one another

35
Q

Node

A

Any device in a computer network that can send or receive data

36
Q

Link

A

The path in a computer network along which data travels

37
Q

Hub

A

Is a node in a computer network that allows many other nodes to connect to it

38
Q

Switch

A

Similar to a hub in a computer network but more selective

39
Q

Router

A

Network device that functions similar to a switch, but sits at junction of two networks and devices which signals should be allowed to pass through

40
Q

Network Address Translation

A

Provided by some routers that allows computers to high their actual identity

41
Q

Layers of computer network

A

-Lowest levels deal with physical aspects of the network, and higher levels relate to interactions between programs

42
Q

Open System Interconnect (OSI) model

A

One of the models to describe networks
-1: physical layer: transmission media, common ones include radio frequency, copper wire, fiber optic
-2: data link: correcting errors in the physical layer and provides synchronization of data transport
(work access layer in TCP/IP model)
-3: network layer: provides routing and switching capabilities
(internet layer in TCP/IP model)
-4: transport layer: employs error-checking algorithms to ensure that data is transported completely and correctly
(transport layer in TCP/IP model)
-5 session layer: responsible for opening and closing communications between software applications
-6 presentation layer: transforms data into usable formats
-7 application layer: higher order interactions (for example authentication, user interaction, quality of service), all application specific
(application layer in TCP/IP model)

43
Q

Transmission Control Protocol/Internet Protocol (TCP/IP) model

A

One of the models to describe networks
-Network access: incorporates physical layer, data link in OSI model
-Internet: incorporates network layer in OSI model
-Transport: same as transport layer in OSI model
-Application: incorporates session, presentation, application in OSI model

44
Q

Network topologies

A

-Refers to map of connections between different nodes (there’s physical topology that represents physical locations of nodes and interconnects, and logical topology that refers to the way that signals pass from one node to another)

45
Q

Types of network topologies

A

-point-to-point: example telephone
-bus: all nodes connected to single wire
-star: all nodes connected to single central node called hub
-ring: every node functions as repeater
-mesh network: each node connected to multiple other nodes, example internet
-tree: star networks linked by a bus, example of hybrid network
-star-ring: series of star connected by a ring, example of hybrid network
-star-star: aka snowflake, example of hybrid network

46
Q

Public Switched Telephone Network (Plain Old Telephone Service)

A

global network of telephones and switching

47
Q

circuit switching

A

process of sharing finite number of circuits

48
Q

Cellular phones and Voice-over-IP (VOIP) networks

A

uses packet switching

49
Q

Rules of HIPAA

A

Privacy Rule: defines characteristics of PHI (Protected Health Information): any individually identifiable information
Security Rule: protects e-PHI which includes all health information that a covered entity creates, receives, maintains or transmits in electronic form

50
Q

Business Associates Agreement

A

Agreement between Business Associate and a covered entity

51
Q

Security Rule

A

-Part of HIPAA
-Has 3 categories:
-Administrative: policies and procedures within an organization to protect PHI
-Physical: limit physical access to data or workstations
-Technical: hardware, software, and other technology that limits access to PHI, categories include
=Aduti controls, access controls, integrity controls, transmission security

52
Q

Firewall

A

-device that sits at the junction between 2 networks and devices what kinds of information is allowed to pass through
-packet filter: firewall inspects each packeg
-Stateful inspection: packets are temporarily reassembled on the firewall and examined for prohibited information

53
Q

Data integrity

A

-reflects degree to which we can trust our data
-Physical integrity: refers to the way information is stored on various media
-Logical integrity: means that the data makes sense and is appropriate to our needs

54
Q

Database integrity

A

-includes 3 requirements
-Entity integrity: requires that every table in the database to have a unique primary key
-Referential integrity: whenever a database column refers to a row in another table, that row exists
-Domain integrity: specifies a specific list of values that are acceptable for a particular column

55
Q

Data mapping

A

process by which data is compared or transferred between 2 different data models

56
Q

4 basic functions for manipulating data

A

CRUD: Create, Read, Update, Delete

57
Q

Data mining

A

Process meant to explore large columns of data
-Includes 3 stages: exploration, model building, and deployment

58
Q

2 Methods for sharing data between software applications

A

-Integration: 2 applications share the same data store
-Interfacing: able to communicate with one another and can synchronize data when needed

59
Q

Methods to meet HIPAA Privacy rule

A

-de-identification via expert determination method
-de-identification via Safe Harbor Method (remove many identifiers including names, geographic subdivisions smaller than state, dates expect for years, ages over 89, etc.)