Chap 10: Database Development Process – Flashcards

Unlock all answers in this set

Unlock answers
question
_______ _________ translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security. The end product of the systems design phase is the system design specification. If this document is approved, the next step is systems implementation.
answer
System architecture
question
Many companies use _______ ________ ______(ERP) software, which was described in Chapter 1. The objective of ERP is to establish a company-wide strategy for using IT resources.
answer
enterprise resource planning (ERP)
question
2. A main advantage of ERP is that it describes a specific hardware and software ___________, also called a ________ , that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.
answer
environment ,platform
question
Many companies are extending internal ERP systems to their suppliers and customers, using a concept called ______ ________ ________ (_____) . For example, in a totally integrated supply chain system, a customer order could cause a manufacturing system to schedule a work order, which in turn triggers a call for more parts from one or more suppliers. In a dynamic, highly competitive economy, SCM can help companies achieve faster response, better customer service, and lower operating costs. Most supply chain management systems depend on RFID technology for real-time input data.
answer
supply chain management
question
A ________ represents a physical device, wired or wireless, that can send, receive, or manage network data. For example, nodes can be servers, workstations, shared printers, mass storage devices, wireless access points, or mobile computers.
answer
node
question
Scalability , also called __________ , refers to a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems.
answer
extensibility
question
a __________ architecture follows Internet design protocols and enables a company to integrate the new application into its e-commerce strategy.
answer
Webcentric
question
A new system might have to interface with one or more _________ ________ , which are older systems that use outdated technology, but still are functional. For example, a new marketing information system might need to report sales data to a server-based accounting system and obtain product cost data from a legacy manufacturing system.
answer
legacy systems
question
A ________ is a computer that supplies data, processing services, or other support to one or more computers, called _______
answer
server, clients
question
A system design where the server performs all the processing sometimes is described as __________ __________ .
answer
mainframe architecture
question
In the 1960s, mainframe architecture was the only system design available. In addition to centralized data processing, early systems performed all data input and output at a central location, often called a ________ ________ _______.
answer
data processing center
question
As network technology advanced and became affordable, companies installed terminals at remote locations, so that users could enter and access data from anywhere in the organization, regardless of where the centralized computer was located. A _________ included a keyboard and display screen to handle input and output, but lacked independent processing capability.
answer
terminal
question
When an individual user works in _______ ________ ________, the workstation performs all the functions of a server by storing, accessing, and processing data, as well as providing a user interface.
answer
stand-alone mode
question
As technology became available, companies resolved the problems of stand-alone computing by joining clients into a ______ ______ ______ (____) that allows sharing of data and hardware resources
answer
local area network (LAN)
question
A ______ ______ ______ (_____) spans long distances and can connect LANs that are continents apart,
answer
wide area network (WAN)
question
2. the network is _________ because a user sees the data as if it were stored on his or her own workstation. Company-wide systems that connect one or more LANs or WANs are called ___________ ___________ .
answer
transparent,distributed systems
question
As LANs became popular, the most common LAN configuration was a file server design, as shown in Figure 10-11. In a file server design, also called a ______ _______ ______ , an individual LAN client has a copy of the application program installed locally, while the data is stored on a central file server.
answer
file sharing architecture,
question
the term _______/_______ __________ generally refers to systems that divide processing between one or more networked clients and a central server.
answer
client/server architecture
question
Data associated with an older, less technologically advanced legacy system.
answer
Legacy Data
question
many companies had an installed base of data, called ________ __________ , which was difficult to access and transport to a client/server environment.
answer
legacy data
question
A ______ _______ , also called a thick client , design locates all or most of the application processing logic at the client
answer
fat client
question
A ______ _______ design locates all or most of the processing logic at the server.
answer
thin client
question
In a ______-________ design, the user interface resides on the client, all data resides on the server, and the application logic can run either on the server or on the client, or be divided between the client and the server.
answer
two-tier
question
In a _____-________ design, the user interface runs on the client and the data is stored on the server, just as with a two-tier design. A three-tier design also has a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server,
answer
three-tier
question
You can think of the middle layer as an a _______ _________, because it provides the application logic , or business logic , required by the system. Three-tier designs also are called n-tier designs, to indicate that some designs use more than one intermediate layer.
answer
pplication server
question
In an n-tier system, special software called ___________ enables the tiers to communicate and pass data back and forth. Some IT professionals refer to middleware as the glue that holds clients and servers together.
answer
middleware
question
Another issue that affects client/server performance is data storage. Just as processing can be done at various places, data can be stored in more than one location using a ___________ __________ _________ _________
answer
distributed database management system
question
A ________ is an entrance to a multi-function Web site. After entering a portal, a user can navigate to a destination using various tools and features provided by the portal designer.
answer
portal
question
________ ________ refers to the cloud symbol that often is used to represent the Internet. The cloud computing concept envisions a cloud of remote computers that provide a total online
answer
Cloud computing
question
Cloud computing effectively eliminates compatibility issues, because the Internet itself is the platform. This architecture also provides ________ ____ __________ , which matches resources to needs at any given time.
answer
scaling on demand
question
cloud computing requires significantly more __________ (the amount of data that can be transferred in a fixed time period) than today's networks. Second, because cloud computing is Internet-based, if a user's Internet connection becomes unavailable, he or she will be unable to access any cloud-based services. In addition, there are security concerns associated with sending large amounts of data over the Internet, as well as concerns about storing it securely. Finally, there is the issue of control. Because a service provider hosts the resources and manages data storage and access, the provider has complete control of the system. Many firms are wary of handing over control of mission-critical data and systems to a third-party provider.
answer
bandwidth
question
The shift to Internet-based collaboration has been so powerful and compelling that it has been named ________. Web 2.0 is not a reference to a more technically advanced version of the current Web.
answer
Web 2. 0
question
A _______ is a Web-based repository of information that anyone can access, contribute to, or modify. In a sense, a wiki represents the collective knowledge of a group of people. One of the best-known wikis is Wikipedia.org, but smaller-scale wikis are growing rapidly at businesses, schools, and other organizations that want to compile and share information.
answer
wiki
question
As users collaborate, new layers of information are added in an overall environment known as the _______ _______ ______. These layers can contain text, sound bytes, images, and video clips that are shared with the user community.
answer
Internet operating system
question
Early computer systems relied mainly on batch processing, but the vast majority of systems today use _______ _______. An online system handles transactions when and where they occur and provides output directly to users. Because it is interactive, online processing avoids delays and allows a constant dialog between the user and the system.
answer
online processing
question
In a _________ _________ system, data is collected and processed in groups, or batches. Although online processing is used for interactive business systems that require immediate data input and output, batch processing can handle other situations more efficiently. For example, batch processing typically is used for large amounts of data that must be processed on a routine schedule, such as paychecks or credit card transactions.
answer
batch processing
question
The part of an information system that handles daily sales transactions and maintains the online inventory file.
answer
point-of-sale(POS )
question
____ (Open Systems Interconnection) model , which describes how data actually moves from an application on one computer to an application on another networked computer.
answer
OSI
question
the network must use a protocol , which is a set of standards that govern network data transmission. A popular network protocol is __________ _______ _______/______ _____ (TCP/IP)
answer
Transmission Control Protocol/Internet Protocol
question
________ ________ _________(_____) , which provides a reliable means of copying files from one computer to another over a TCP/IP network, such as the Internet or an intranet.
answer
File Transfer Protocol
question
The way a network is configured is called the _______ _______ . Topology can refer to a physical or a logical view of the network. For example, ________ topology describes the actual network cabling and connections, while topology describes the way the components interact.
answer
network topology,physical,logical
question
In a ____________ __________, as shown in Figure 10-34, one or more powerful servers control the entire network. Departmental servers control lower levels of processing and network devices. An example of a hierarchical network might be a retail clothing chain, with a central computer that stores data about sales activity and inventory levels and local computers that handle store-level operations.
answer
hierarchical network
question
In a ______ _________ , as shown in Figure 10-35, a single communication path connects the central server, departmental servers, workstations, and peripheral devices. Information is transmitted in either direction between networked devices, and all messages travel over the same central bus. Bus networks require less cabling than other topologies, because only a single cable is used.
answer
bus network
question
A ring network , as shown in Figure 10-36 on the next page, resembles a circle where the data flows in only one direction from one device to the next. In function, a ring network can be thought of as a bus network with the ends connected. One disadvantage of a ring network is that if a network device (such as a PC or a server) fails, the devices downstream from the failed device cannot communicate with the network. Although ring networks are less common than other topologies, they sometimes are used to tie local processing sites together. For example, workstations and servers in the accounting, sales, and shipping departments might perform local processing and then use a ring network to exchange data with other divisions within the company.
answer
Ring Network
question
It is interesting to note that in a ring network implementation, the physical wiring can resemble a star pattern, using a central device called a _______ _______ _______(MAU) . This unit internally wires the workstations into a logical ring, and manages the flow of data from one device to the next.
answer
Multistation Access Unit
question
2. Because of its speed and versatility, the star network is by far the most popular LAN topology today. A ____ network has a central networking device called a _______ , which manages the network and acts as a communications conduit for all network traffic.
answer
Star. switch
question
2. In the past, a device known as a _____ was used to connect star networks, but a switch offers advanced technology and much better performance. A hub functions like a familiar multi-socket power strip, but with network devices such as servers, workstations, and printers plugged in rather than electrical appliances. The hub broadcasts network traffic, called _____ ________ , to all connected devices. In contrast, a switch enhances network performance by sending traffic only to specific network devices that need to receive the data.
answer
hub,data frames
question
In the _______ _________ shown in Figure 10-38, each node connects to every other node. While this design is extremely reliable, it also is very expensive to install and maintain. A mesh network resembles the Internet in that a message can travel on more than one path.
answer
mesh network
question
Using a router, any network topology can connect to a larger, dissimilar network, such as the Internet. This connection is called a _________
answer
gateway
question
A device called a_______ ________ provides Internet connectivity for internal LAN users. The vast majority of business networks use routers to integrate the overall network architecture.
answer
proxy server
question
2. Wireless networks are based on various standards and protocols that still are evolving. The most popular of these is called IEEE _______ , which is a family of standards developed by the Institute of Electrical and Electronics Engineers (____) for wireless LANs.
answer
802.11
question
Current wireless networks are based on variations of the original 802.11 standard. Several versions, or __________ , were intended to improve bandwidth, range, and security.
answer
amendments
question
2.The more recent 802.11n uses multiple input/multiple output (______) technology to boost performance. MIMO relies on multiple data paths, also called _________ ________ , to increase bandwidth and range.
answer
MIMO,multipath design
question
The ________ _______ ______(____) , also called the infrastructure mode , is shown is Figure 10-42. In this configuration, a central wireless device called an _______ _______ or wireless access point (WAP) , is used to serve all wireless clients.
answer
The Basic Service Set (BSS) , access point
question
The second wireless topology is the _________ ________ _______ (_____) , as shown in Figure 10-43 on the next page. An Extended Service Set is made up of two or more Basic Service Set networks. Thus, using an ESS topology, wireless access can be expanded over a wide area.
answer
Extended Service Set
question
The third wireless topology is the ________ ________ ________(____) , as shown in Figure 10-44. In the ISS, also called peer-to-peer mode , no access point is used. Instead, wireless clients connect to each other directly. Most business WLANs use access points to provide wireless services, and do not utilize the Independent Service Set. However, ISS is well-suited to situations requiring quick data transfer among clients.
answer
Independent Service Set
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New