Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
72 Cards in this Set
- Front
- Back
near the end of the design stage, an org prohibits further changes in the design of the sys, knonw as:
|
freezing design specs
|
|
software can be purchased from external developers or developed in-house. this decision is called,
|
make-or-buy
|
|
what type of documentation is used by computer operators to execute a program and by analysts and programmers?
|
technical documentation
|
|
_______testing involves testing the entire sys of programs
|
system
|
|
a ______ is a minor change to correct a problem or make a small enhancement to a program or system
|
patch
|
|
a systems review that is caused by a problem with an existing system is called:
|
event-driven review
|
|
monitoring a system after it has been implemented is called:
|
system performance measures
|
|
computer related waste and mistakes are major causes of computer problems, contributing to unnecessarily high ________ and lost_____
|
costs, profits
|
|
preventing waste and mistakes involves establishing, implementing, _________, and reviewing effective policies and procedures
|
monitoring
|
|
_____ is a federall funded reasearcg nd development center and Carnegie Mellon charged with coordinating comm among experts during emergenices
|
CERT/CC
|
|
______ is a crime in which an imposter obtains key pieces of personal id info to impersonate someone else
|
identity theft
|
|
Somone who intimidates or coerces a govt to advance his poticial objectivces by launching computer based attacks is called a:
|
cyberterrorist
|
|
malware capable of spreading itself from one computer to another is called:
|
worm
|
|
a___ is a modified version of a virus that is produced by the virus' author or another person ammending the original virus code
|
variant
|
|
CTS, or _________, is the aggravation of the pathway of nerves that travel through the wrist
|
carpal tunnel syndrome
|
|
the study of designing and positioning computer equipment to improve worker productivity and minimize worker injuries is called:
|
ergonomics
|
|
Which of the following is the last stage of the systems development life cycle?
|
Systems Maintenance and Review
|
|
Major reengineering projects tend to have a(n) ____ degree of risk but a high potential for major business benefits.
|
high
|
|
____ work on the premise that for every activity there must be some data transference, communication, or flow that can be described as a data element.
|
Data-flow diagrams
|
|
Ned uses a straightforward approach to gathering data from his stakeholders, users, and other managers. He learns what they want and expect from the new system using a technique called ____.
|
asking directly
|
|
Tomorrow was the big day. Al Darcy would shut down the old COBOL legacy system and start up the new Peoplesoft Enterprise Resource Planning system. Al was using a(n) ____.
|
direct conversion
|
|
The ____ is a formal agreement that states that the user has approved a phase of system installation.
|
user acceptance document
|
|
Many organizations have separate ____ teams responsible for modifying, fixing, and updating existing software.
|
maintenance
|
|
Which of the following is an example of a computer-related mistake?
|
Hard disk is not working
|
|
Frank bought one copy of MS-Word and installed it on twelve of his friends’ computers for half price. He is a(n) ____.
|
software pirate
|
|
In 1890, U.S. Supreme Court Justice Louis Brandeis stated that ____.
|
the right to be left alone is of fundamental importance
|
|
a technique that allows a designer to quickly and efficiently design the features, layout and format of a display scree
|
screen layout
|
|
allows designers to diagram and format printed reports
|
report layout
|
|
a database of system descriptions, parameters and objectives
|
CASE repository
|
|
determination of user, stakeholder, and org needs
|
requirement analyis
|
|
arrows that show the direction of date element movement
|
data flow line
|
|
representation of a function that is performed
|
process symbol
|
|
rep. of either a source or destination of a data element
|
entity symbol
|
|
rep of a storage location for data
|
data store
|
|
diagrams that show the relationships among applications or systems
|
application flow charts
|
|
a table the shows rel. among the vaiours aspects of a systems dev effort
|
grid chart
|
|
watching the existing sys in action by 1+ member of the analysis team
|
direct observation
|
|
gathering date whne the data sources are spread over a wide geographical are
|
questionnares
|
|
selecting a random sample of ata and applying the characteristics of the sample to the whoel group
|
statistical sampling
|
|
manipulation of data collected so that the dev team member who are participating in sys analysis can use the data
|
data analysis
|
|
interview where thw wuestions are written in advance
|
structured interview
|
|
interview where the questions arent written in advance
|
unstructed interiew
|
|
determination of whether the project can be completed in a reasonable amt of time
|
schedule feasibility
|
|
am advisory group consisting of senior management and users from the IS department and other functional areas
|
steering committee
|
|
a document filled out by someone who wants the is dept to initate sys investigation
|
sys request form
|
|
assessment of the tech, econ, legal, op, and schedule feasibility of a project
|
feasibility analysis
|
|
the preffered approach for ranking competing projects and determining econ feasibility
|
net present value
|
|
tools that automate many of the tasks required in a sys deve effort and encourage adherence to the SDLC
|
computer-aided software engineering
|
|
object-orieneted sys dev
|
combines the logic of the sys dev life cycle with the power of object-oriented modeling and programming
|
|
detailed description of what is to be done
|
project schedule
|
|
critical date for the completion of a major part of the project
|
project milestone
|
|
the date the entire project is done
|
project deadline
|
|
a graphical tool used for planning, monitoring and coordinating projects
|
ganntt chart
|
|
access real data files, edits input data, makes computations and comparisons and produces real output
|
operational prototype
|
|
a sys dev approach that employs tools, techniques, and methodolgies designed to speed app dev
|
rapid app dev (RAD)
|
|
sys that play a pivotal role in an org's continued ops and goal attainment
|
mission-critical sys
|
|
people who will interact with the sys regularly
|
users
|
|
using one social skills to get computer users to provide you with info...
|
social engineering
|
|
going through trach cans of orgs...
|
dumpster diving
|
|
a computer savvy person who attempts to gain the unauthorizes access to comp sys...
|
criminal hacker (cracker)
|
|
a cracker with little tech savvy who dloads progams called scripts, w
|
script bunny
|
|
an employee working solo or in concert with outsiders to compromise corp sys
|
insider
|
|
a malicous program that disguises itself as a useful app and purposefully does something the user does not expet
|
trojan horse
|
|
the measure of one's personal traits
|
biometrics
|
|
software the monitors sys and network resources...
|
intrusion detection system(IDS)
|
|
aa description of the functional reqs of a sys
|
logical design
|
|
the specs of the characteristcs of the sys components necessary to put the logical design into action
|
physical design
|
|
simplified processes to access an app from where it stopped
|
restart proceudres
|
|
a duplicate, op hardware sys or immediate access to one through a specialized vendor
|
hot site
|
|
a seperate file that contains only changes to apps
|
image log
|
|
prevent probs before occur
|
deterrence control
|
|
testing an incomplete version
|
alpha
|