Test 2 Flashcards

1
Q

Describe what is meant by an enterprise architecture

A

Specifies the connections between the IT systems of an organisation - applications, data and infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is EA used for?

A

Ensure technology investment is aligned with business goals; ensure technology environment is integrated, secure, robust and flexible; help prioritise IT initiatives; help procure value-for-money and reusable solutions; avoid problems associated with reactive IT decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the average life spans of a business strategy vs IT infrastructure?

A

BS - 12 months or less, IT infrastructure = 5-7 years, often more than 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the EA corporate view

A

Group-wide rather than divisional view of IT investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the EA Long view

A

Long-term view of investment in IT, rather than implement short-term point solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the EA end-to-end

A

Includes all elements of technology in the design (applications, data, infrastructure, connections)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the EA standards based

A

Standards based components and common products/services where possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the benefits of a business with EA

A

Reduced cost (standard components < customised solutions); faster, increased flexibility and time to market; better availability, security, performance and reliability; connected systems sharing functions & data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whats are the cons of no EA

A

Expensive, point solutions; Isolated data; hard to connect internally and externally; difficult to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Architecture principles: business focused

A

Align the architecture with business needs and make it comprehensible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Architecture principles: independent

A

Make the architecture independent of the organisational structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Architecture principles: Standards based

A

Use industry based, web - enabled standard components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Architecture principles: State of the market

A

Use proven solutions as opposed to leading edge solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Architecture principles: Robust, reliable and supported

A

Adopt solutions with a well-defined owner, product map and maintenance commitment (limit use of free-ware and open source)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Architecture principles: Flexible

A

Allows business to accommodate change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Architecture principles: Reuse technology

A

Exploit value of existing IT investment where possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Architecture principles: buy service first

A

Select ‘on-demand’ services (SaaS) as first choice, then off-the-shelf (COTS) products; custom solutions are last resort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List the limitations of IT systems and networks

A

Costly, unreliable (many elements - difficult to fix when they fails), most are inflexible and slow, limited connectivity to external parties, some systems are legacy, poor quality data, data can be replicated (different “version of the truth” in different systems), many systems/data sources so difficult to ensure security, unstructured - IT for a while was unprioritised, reactive - prone to responding to requests as opposed to planning long term, under-resourced (manpower), limited IT skills wrt. supporting future business requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is meant by migration scenario

A

Planning to guide the business to the ‘target’ environment (basis for planning short term and medium term investment) - normally over a 5 year period. Complements normal business and IT planning cycles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List the migration principles

A

Evolutionary approach - gradual replacement of technology; business driven prioritisation - scale and timing determined by business (thus each investment justified by its own business case), IT infrastructure investment; shared components introduced; migration towards standard environment - moves the environment towards use of industry standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why use a TA?

A

Helps the designer make informed decisions about solutions (understand how software and hardware components fit together, determine which application component run on which hardware platform, assess what standards are appropriate, determine where cost trade offs can be made, deploy adequate control points and interfaces, identify where systems integration is required)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

List some TA components

A

Software (data storage, data access logic, application logic, presentation logic), hardware (clients eg computers, tablets, phones etc, servers eg mainframes, networks eg LAN, WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is client based architecture?

A

Client performs most of the processing activity, server stores data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is server based architecture?

A

Server performs all four application functions (DS, DA, AL, PL), client captures keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Pros/cons of client based
Simple to develop, but quickly overloaded
26
Describe client server architecture
Balanced processing between client/server. Highly scalable at incremental cost. Application must be written for both client and server. Thin clients do only PL. Thick clients do AL and PL
27
What is a 2 tier CSA?
One server for DS and DA, client does AL and PL
28
What is a 3 tier CSA?
DS and AL on one server, AL on another, client does PL
29
What is n tier CSA?
AL split between 2 servers, DL on another
30
Why use n tier CSA?
(Common in e-commerce applications) Better load balancing, more scalable than 2 or 3 tier systems. Places higher demands on the network
31
What is a service?
Discrete unit of functionality that can be accessed remotely and acted upon, updated independently
32
Service oriented architecture
Style of software design where services are provided by application components over a network
33
Infrastructure as a service IaaS
Virtualized computing resources (hardware, software, servers, storage) over the internet
34
Platform as a service PaaS
Resources and tools over the internet allowing customers to develop, run and manage applications
35
SaaS
Software applications over the internet
36
Business as a service BaaS
Complete business processes over the internet
37
What is involved in infrastructure design?
Components - network, hardware, OS, storage, resilience (redundancy, business continuity, disaster recovery), security
38
What is involved in network design?
Network design contains major components (routers, switches, nodes, geographical routes, firewalls etc). Purpose is to illustrate how system's software components will fit together
39
What is involved in storage design?
Cables, host bus adapters, and switches. Includes storage devices - purpose is to provide fast, efficient, secure and resilient shared storage
40
What are the three phases of implementation?
Construct, install, support
41
What does the construction phase of implementation entail?
Development of all parts of the system: software, hardware, network configuration, documentation, procedures
42
What is usually the cause of project failure?
Poor analysis, design, testing
43
What is the most important activity in Construction?
Project management
44
What does this Project management entail?
Plan activities and resources, plan and manage the schedule, plan and manage budget, track Actions, Risks, Issues (ARI), report on progress, manage people
45
What is the purpose of testing?
Uncover as many errors as feasible (differences between what the system does and what it should do. Not about proving that the system is error free)
46
What does the test plan include?
Tests to be conducted and expected results of tests
47
What types of testing are there?
Unit, integration, system and user acceptance tests
48
Describe each type of testing
Unit - focuses on single component or class. Integration - tests whether system components/classes work together properly. System - tests operation of system end to end: functional and non-functional. User acceptance (UAT) - tests conducted by users to determine that system does what it was meant to do
49
Describe black box testing
Specification bases - tests the functionality of an application
50
Describe white box testing
Tests internal workings of an application - tests that the code does what it is supposed to do
51
What is meant by regression testing?
Verification that software which has been changed/integrated still works correctly (no new faults introduced/new software does not break old software)
52
How does UAT take place?
Goal is to confirm that the system meets the business needs/is acceptance to users. Involves alpha testing (data is artificial) and beta testing (data is real but monitored for errors)
53
What takes place during the Post-Implementation Review (PIR)
Determine what was successful/unsuccessful. Project team list what worked and what produced mistakes were made (repeat the good, eliminate the bad in future). Systems review - assess to what extent costs & estimated benefits actually accrue, determine whether or not the system provides the expected value (informs baseline costs for future projects)
54
Why use automated software testing?
Allows for testing of large numbers of test conditions. Helps eliminate human error
55
TCO stands for
Total cost of ownership
56
What is meant by agile implementation?
Discovery -> alpha -> beta -> live -> discovery ->…... : live phase used to improve service based on user feedback, analytics, ongoing user research
57
What is a contract?
Voluntary agreement between two or more parties enforceable by law (IS examples - build bespoke software, software licence, consulting contracts, outsourcing contracts)
58
Name three versions of IS contracts, naming the predominant 'risk-taker' in each one
Fixed price - supplier (lump sum for work), Time and materials - shared risk (hourly rate), Usage based - Consumer (payment based on number of users/resources)
59
How are contracts made flexible wrt. requirements?
Contracts often contain a 'change control mechanism' to account for change in requirements (this deals with a change in process/terms)
60
What does a contract with a consultant in IT often provide, what does it deliver, and how is it payed?
Assignment of a specialist/team of specialists to complete a specific engagement such as developing an IT strategy. Deliverable can be a report or presentation - sometimes can be undefined. Payment basis is usually time and materials
61
What is involved with an IT outsourcing contract?
Provision of IT services (possibly including people) to a client by a third party - development, operations, maintenance. Can be 3-5 years - exit conditions are difficult to define and implement
62
What is involved with a packaged software contract
Buying a licence to use the software (not own it) - restrictions on number of users, server or desktop deployment, site usage
63
What does the consumer rights act 2015 ensure?
Repair or replacement of digital products if faulty (includes digital content such as online films, games, music etc.)
64
What is a business plan used for?
Management and planning, raising funds from investors, benchmarking progress
65
Describe a limited company
Shareholder risk ('liability') limited to invested capital
66
Describe a private limited company (ltd.)
Shares not available for public trading; must provide company details to Companies House a file annual report and accounts
67
Describe a public limited company (plc)
Company that trades on a stock exchange; publicly traded shares; governed by strict regulations; must publish true financial position regularly
68
What is meant by an Initial Public Offering IPO
Allows private company to sell its shares to the public - used to raise funds for expansion efforts of pay back debt, provide exit for investors, raise company profile or reward employees. Time consuming, and incurs ongoing compliance and governance costs
69
What are the advantages of IT (for example) being a profession?
Ensures a standard of training is met, allows job title and/or function to be reserved
70
What is a cookie?
Small file (letters/numbers) download to a device when user accesses certain websites - allows website to recognize user's device
71
What caused computer misuse to escalate?
Remote access - allowed misuse of internet networks and internet-connected computers
72
What types of cybercrime are there?
Cyber-enabled crime ('traditional' crimes conducted online), advanced cybercrime (attacks against computer hardware and software), attack sources (formally individuals/small groups, now large interconnected cybercriminal networks), cyber defence (law enforcement agencies - no physical/virtual borders)
73
What is malware?
Program inserted covertly inside another program with intent to destroy data, run intrusive or destructive programs, or otherwise compromise confidentiality, integrity, or availability of victims data, applications or OS
74
What are APTs?
Advanced Persistent Threats - well-resourced, persistent application of intrusion technology and malware to selected targets
75
Copyright
Protects literary and creative works including software
76
Patent
Protects inventions
77
Trade mark
Protects product names, logos, corporate symbols
78
Confidence
Protects confidential information such as an idea for a film, or secret list of customer prospects
79
Design rights
Protects new and original designs, such as a distinctive keyboard shape
80
How does a piece of work qualify for copyright
Regarded as original, and exhibit a degree of labour, skill or judgement
81
How does one apply for copyright
Don't have to - comes into existence automatically
82
When did software first come under copyright law
1992 amendment to cover computer programs; 1997 databases regulations, 2003
83
What are the rights of a copyright owner
Give copies of you work to the public (free or not); give permission for someone to make copies; give permission to adapt a work (eg. Translation); make variations or derivatives of a work; sell or licence rights
84
Databases were added to copyright law in 1997 - how long do database rights last for
15 years - database must be original/'substantial investment in obtaining, verifying or presenting the contents'.
85
What is the difference between primary and secondary infringement
Primary - breach of exclusive rights of the owner (owner claims damages or injunction to refrain), Secondary - breach of rights in commercial/business context (eg. Pirated software for commercial purposes) (results in fine, imprisonment, confiscation of material)
86
How can copyright material fall under 'fair dealing'
Decided case by case eg. Research, criticism, review, quotation, reporting, parody, teaching (as long as not commercial), libraries, archives, museum, galleries (can make copies of all types of works in their collections)
87
Define DMCA and OSP
Digital millennium copyright act; online service providers
88
OSP is safe from DMCA as long as they do what?
Must immediately block access to or removed alleged infringing material should a notification be received of infringement
89
Are ISPs liable for copyright infringement
Only if they are aware of the infringement and have not acted expeditiously to remove or disable access to said infringing information
90
Digital single market copyright directive forces internet platforms that host large amounts of user-generated content to do what?
Platforms such as google or facebook are responsible themselves for policing and enforcing copyright and taking down any infringing content
91
What is the difference between package software and tailor-made software copyright
Package - customer buys a licence to use software, not the actual software; Tailor made - creator of content is first legal owner of copyright, customer gets copyright as well but creator may retain overall copyright on certain parts/may be open source elements/may be third party products build in
92
Describe what is meant by 'creative commons'
CC licences allow copyright owners to share their work while keeping copyright
93
What types of CC licences are there
Attribution (copied, modified, distributed, displayed and performed if owner credited), non-commercial (all but no profit allowed to be made), no derivative works (all bar modification), share-alike (can be modified and distributed but must be covered by an identical licence)
94
What is meant by copyleft?
Method for making a program and all derivatives of it free
95
What does a patent apply to, and how long does it last?
Inventions, around 20 years
96
How can one patent software
In US - if it part of a patentable device, controls a process that has some physical effects, or processing data arising from the physical world
97
What qualifies something as a trademark
Graphical sign - cannot describe goods/services, must be distinctive, cannot be 3d, cannot have function or add value to goods, cannot be specially protected emblems (eg flag), cannot be deceptive
98
Why was the freedom of information act brought in
To make public organisations more open and accountable
99
Who does the freedom of information act apply to
Central and local government departments; NHS; education authorities; military services etc
100
Why might certain information by exempt from the freedom of information act?
E.g. BBC is journalistic - protect sources of information
101
Difference between absolute exemption and qualified exemptions
Qualified may under certain conditions by overruled, absolute may never be released
102
2000 Protection of freedoms act did what?
Required public authorities to publish any requested data sets as part of their publication scheme
103
Give examples of absolute exemptions
Information that is - accessible by other means, relates to or deals with security matters, release could breach data protections principles, confidential
104
Describe the purpose of the environmental information regulations 2004
Right of access to environmental information held by uk authorities (info about air, water soil, emissions as well as decisions, policies, activities that affect the environment)
105
What is a publication scheme
Public commitment to make certain information available; a guide to how that information can be obtained
106
How long does a body have to provide requested information
Within 20 days (can delay with suitable explanation)
107
What does GDPR stand for
General data protection regulation
108
What is the purpose of GDPR
Give control to data subjects (people) over their personal data; govern circumstances when personal data is exported outside EU/EEA
109
What does GDPR cover
Personal data - info that relates to an identified or identifiable individual
110
GDPR - what is a controller
Determines the purposes and means of processing personal data
111
GDPR - what is processor
Responsible for processing personal data on behalf of controller
112
What is special category data?
Data that needs greater protection (eg. Information about an individuls race, ethnic origin, politics, sexual orientation etc.) - can be used to discriminate
113
What are the seven principles of GDPR
Lawfulness, fairness and transparency; purpose limitation; data minimisation(only what you need); accuracy(not incorrect/misleading); storage limitation; integrity and confidentiality; accountability
114
What rights does GDPR give an individual
Right to be informated, rights of access, right to rectification, right to erasure, right to restrict processing, right to data portability, right to object, rights in relation to automated decision making and profiling
115
What are some of the global ethical impacts of computer networks?
Easy to present and spread false information - cas cause significant social and global unrest
116
What are some more typical ethical issues with IT industry?
Gender imbalance in jobs, computer technology impact on the environment, tax avoidance by large IT corporations
117
Describe the rough ethical analysis process
Identify all those affected (stakeholders), list all possible actions, consider the impact on each affected individual (risks, benefits, harms, costs), identify responsibilties of decision makers and rights of stakeholders, decide which choices are ethically wrong, ethically obligatory, or acceptable but not required (if several acceptable, consider the merits of each)