Module 4: Systems Performance Management Flashcards
refers to the study of an entire system, including physical hardware and components and software, and how it operates
System Performance
What does the enterprise want to ensure with regard to system performance?
- The system is performing as expected
- Issued are identified and addressed
IS Architecture: What is the hierarchy of the IS architecture?
Base: Computer Hardware and Firmware
Middle: Kernel/ Nucleus
Top: Operating System
IS Architecture: Is a highly privileged area where access by most users is restricted
Nucleus
IS Architecture: What do you also call OS processes?
System software
IS Architecture: are a collection of computer programs used in the design, processing and control of all computer applications used to operate and maintain the computer system
OS processes
IS Architecture: What is the most important part of the architecture?
The OS and Nucleus/Kernel
IS Architecture: The software developed must be compatible with the OS (T or F)
T
IS Architecture: What are the components of the system software?
- System Utilities.
- Programs
IS Architecture: What are the functions of system software?
- Ensure integrity
- Controls the flow of programs
- Events in the computer
- Manage interfaces with the computer
Operating System: The OS contains programs that interface between the ___, ____ and ___ ___
user , processor, applications software.
Operating System: What are the main functions of the operating system?
- Scheduler
- Traffic Controller
Operating System: all past
OSs possess a virtual storage memory capability that allows programs to use and reference a range of addresses greater than the real memory. (T or F)
False. Modern OS
Operating System: Match the description with the type of computer.
capable of managing extensive resources and
many concurrent operations
capable of cataloging files and loading
programs to be effective
capable of accommodating multiprocessing,
multitasking and multithreading
- Mainframe computer
- Single-user computer/ Microcomputer
- Server with multiple users
Operating System: Virtual servers can use different types of OS (True or False)
True. Once a physical server is partitioned into different virtual servers. They act as physical servers
Software Integrity Issues: What should the hardware and software have to address the integrity issues?
- Ensure that privileged programs cannot be interfered with by user programs
- Protect itself from deliberate and inadvertent modification
- Process Isolation (Traffic Control)
- Enforcement of least privilege
Software Integrity Issues: Who is responsible for implementing authorization techniques?
IS management
Activity logging and reporting options: What is a common way to secure logs, centralize, and analyze?
Security Information and Event Management (SIEM) Software
Operating System Reviews: What are the areas to review?
- System software selection procedure
- Feasibility Study and selection process
- System software Security
- IT Asset Management
- System Software Implementation
- Authorization Documentation
- System Documentation
- System Software Maintenance Activities
- System software change controls
- Controls over the installation of changed system software
is designed to prevent unauthorized access to data, unauthorized use of system functions and programs, and unauthorized updates/changes to data, and to detect or prevent unauthorized attempts to access computer resources.
Access Control Software
is used to transmit messages or data from one point to another either locally or remotely. Likewise,
responses back to the user are handled in the same manner
Data communications software
Data communications software: Prioritize message transmissions locally
False. Either remotely or locally.
Data communications software: A typical simple data communications system has three components:
- The transmitter (source)
- The transmission path (channel or line)
- The receiver
Data communications software: it is responsible for maintaining integrity of the message passed (T or F)
False. Data communications software is only focused on correct transmission between 2 points
Data communications software: They operate in both LAN and WAN (T or F)
True.
Data communications software: What does the data communication application support?
- Electronic Fund Transfer
- Database Management System
- Electronic Data Interchange
- Internet forums and email
are system software used to
perform maintenance and routines that are frequently required during normal processing operations.
Utility Programs
Utility Programs: What are the five functional areas of utility programs?
- Understanding application systems
- Assessing or testing data quality
- Testing a program’s ability to function correctly and maintain data integrity
- Assisting in faster program development
- Improving operational efficiency
Utility Programs: Determine the functional area based on the example programs - CPU and memory utilization monitors
Improving operational efficiency
Utility Programs: Determine the functional area based on the example programs - text editor, library copy, report generators
Assisting in faster program development
Utility Programs: Determine the functional area based on the example programs - output analyzer and network simulator
Testing a program’s ability to function correctly and maintain data integrity
Utility Programs: Determine the functional area based on the example programs - data manipulation utilities, query facility
Assessing or testing data quality
Utility Programs: Determine the functional area based on the example programs - executive path analyzer and data dictionary
Understanding application systems
Utility Programs: Utility programs have the functionality of audit trails (T or F)
False. They usually function without producing audit trails
Software Licensing Issues: Identify which license type the definition describes - The software may be used, copied, studied, modified and
redistributed as required. Open source is usually accompanied by
the program source and a copy of the software license.
Open source
is a contract that establishes the terms and conditions under which a piece of software is being licensed (i.e., made legally available for use) from the software developer (owner) to the user.
Software licensing agreement
Software Licensing Issues: Identify which license type the definition describes - The software is free, but the source code cannot be redistributed.
freeware
Software Licensing Issues: Identify which license type the definition describes - The software may be free initially; however, this may only be on a trial basis or have limited functionality compared to the full,
commercial version.
Shareware
Software Licensing Issues: Identify which license type the definition describes - Depends on the power of the server, specifically the number of the CPUs; could include the number of CPU cores
Per central
processing unit
(CPU)
Software Licensing Issues: Identify which license type the definition describes - Depends on the number of unique users of the system
per seat
Software Licensing Issues: Identify which license type the definition describes - Depends on the total number of users using the software within a predefined period of time
Concurrent users
Software Licensing Issues: Identify which license type the definition describes - Depends on how busy the CPU is or the number of users that are active at any one time
Utilization
Software Licensing Issues: Identify which license type the definition describes - Depends on the number of individual workstations (NOT users) that connect to the software
Per Workstation
Software Licensing Issues: Identify which license type the definition describes - Usually allows unlimited use of the software throughout an
organization without the need to apply any of the rules above, although there may be some restrictions
Enterprise
Software Licensing Issues: Scan only the physical networks to check for installed software (T or F)
False. Check the entire network to make an inventory of all installed software
Software Licensing Issues: Is locking down usb ports and disabling software installation ethical
Yes because it prevents the users to install new software in the computers.
is the language in which a program
is written.
Source code
Source code management: Source code is translated into what and by who?
Object code; Assemblers and compilers
Source code management: Source code is not an intellectual property (T or F)
False. IT is and should be protected
Source code management: What do you use to manage source code?
Version control system or revision control system
the planning and monitoring of computing and network resources to ensure that the available resources are used efficiently and effectively
Capacity Management
Capacity Management: What should be developed based on input from user and IS management to ensure that the business goals are achieved in the most efficient and effective way.
Capacity plan
Capacity Management: Whose input should be considered when making the capacity plan?
User and IS management
Capacity Management: How often should the capacity plan be updated?
At least annually
Capacity Management: Capacity management aims to consistently provide the presently required it resource (T or F)
False. Inlcudes future resource requirements
Capacity Management: How does capacity management save companies costs?
By deferring replacement expenses