F.11 Information system architecture Flashcards

Differentiate enterprise and information systems architecture components.

1
Q

What are the three main components of information technology systems?

A

Hardware, software, and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define information systems.

A

Integrated sets of components for collecting, storing, and processing data and for providing information, knowledge, and digital products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What additional components are added to information technology systems via usage?

A

Data, people, and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are input devices?

A

Devices that convert incoming data and instructions into electrical signals comprehensible to a digital computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of input devices.

A
  • Keyboards
  • Mice
  • Microphones
  • Cameras
  • Scanners
  • Sensors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are output devices?

A

Devices that convert digitized signals into forms comprehensible to a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List examples of output devices.

A
  • Video display terminals
  • Printers
  • Speakers
  • Headphones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a microprocessor?

A

Electronic circuitry imprinted on silicon chips that perform functions by executing instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of storage devices in a computer?

A

To retain data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of software exist?

A
  • Programming software
  • System software
  • Application software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malware?

A

Malicious software designed to harm or exploit any programmable device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are computer viruses?

A

Malicious programs that replicate themselves and spread from one computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Computer worms need a host program to spread.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define scareware.

A

Programs that frighten users into purchasing rogue applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ransomware?

A

Software that blocks access to a computer system and demands a ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is adware?

A

Software that extracts user information to direct specific advertisements, not necessarily harmful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is middleware?

A

Software that connects or mediates between software components in a distributed computing environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the main components of computer networks?

A
  • Nodes
  • Links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a Local Area Network (LAN)?

A

A network designed to connect computers in a specific area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does network topology refer to?

A

The arrangement of links and nodes in a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

List three types of network topologies.

A
  • Bus
  • Mesh
  • Star
22
Q

What is a database?

A

A collection of data organized for rapid search and retrieval by computers.

23
Q

Define database schema.

A

A blueprint for a particular database describing how it should be implemented.

24
Q

True or False: People are often regarded as external to information systems.

25
Q

Who are considered stakeholders in information systems?

A
  • Clinical Users
  • Non-clinical Users
  • Secondary Users
  • Designers, Developers, Vendors
  • Patients, Society
  • Operators and supporters
  • Funders
  • Architects, Strategists
  • Project Managers
  • Media
26
Q

What is a sociotechnical system?

A

An approach that emphasizes the interaction between technology and the social context in which it is used.

27
Q

Define enterprise architecture.

A

A blueprint describing how an enterprise’s data, applications, and technology infrastructures align with business goals.

28
Q

What is information system architecture?

A

The fundamental concepts or properties of an information system in its environment.

29
Q

What does IS architecture model?

A
  • System boundaries
  • Inputs
  • Processes
  • Outputs
30
Q

What is IS architecture?

A

IS architecture can be described from different perspectives to varying levels of abstraction and in terms of various components.

31
Q

What does IS architecture model?

A

IS architecture models system boundaries, inputs, processes, and outputs.

32
Q

What is critical to define in an information system?

A

It is critical to define the information system boundaries clearly.

33
Q

What does enterprise architecture consider?

A

Enterprise architecture considers the business layer and how information systems support the business.

34
Q

How can information systems be analyzed?

A

Information systems can be disaggregated into subsystems and linked to other information systems via interfaces.

35
Q

What aspect of information systems can be considered throughout their lifecycle?

A

Information systems can be considered throughout their entire lifecycles.

36
Q

What are architectural patterns?

A

Architectural patterns are abstract descriptions of recommended architectural approaches that have been tested and proven successful.

37
Q

What is an example of an architectural pattern?

A

Client-server architecture is an example.

38
Q

What does client-server architecture involve?

A

It involves processing workloads shared between servers and clients connected via a network.

39
Q

What are the three clusters of functions in tiered architectures?

A
  • Presentation
  • Applications
  • Data management
40
Q

What defines peer-to-peer architectures?

A

In peer-to-peer architectures, every node has the same capabilities and responsibilities.

41
Q

What is functional suitability in IS architecture?

A

Functional suitability is the degree to which the system provides functions that meet agreed requirements.

42
Q

What does performance measure in an IS architecture?

A

Performance measures the degree to which the system meets requirements in terms of time, resource usage, and capacity.

43
Q

What is usability in the context of IS architecture?

A

Usability is the degree to which specified users can use the system to achieve specified goals effectively and efficiently.

44
Q

What does compatibility refer to in IS architecture?

A

Compatibility refers to the degree to which the system can exchange data with other systems.

45
Q

What is meant by reliability in IS architecture?

A

Reliability is the degree to which the system continues to operate effectively over a given period.

46
Q

What does security measure in an IS architecture?

A

Security measures the degree to which the system protects data and information consistent with specified access parameters.

47
Q

What is maintainability in the context of IS architecture?

A

Maintainability is the degree of ease with which the intended maintainers can modify the system.

48
Q

What does portability refer to in IS architecture?

A

Portability refers to the ease with which a system can be transferred to different environments.

49
Q

What is reusability in IS architecture?

A

Reusability is the degree to which a system can be deployed in other systems with little or no change.

50
Q

What does scalability measure in IS architecture?

A

Scalability measures the degree to which the system can accommodate load increases without performance decreases.