• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/72

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

72 Cards in this Set

  • Front
  • Back
near the end of the design stage, an org prohibits further changes in the design of the sys, knonw as:
freezing design specs
software can be purchased from external developers or developed in-house. this decision is called,
make-or-buy
what type of documentation is used by computer operators to execute a program and by analysts and programmers?
technical documentation
_______testing involves testing the entire sys of programs
system
a ______ is a minor change to correct a problem or make a small enhancement to a program or system
patch
a systems review that is caused by a problem with an existing system is called:
event-driven review
monitoring a system after it has been implemented is called:
system performance measures
computer related waste and mistakes are major causes of computer problems, contributing to unnecessarily high ________ and lost_____
costs, profits
preventing waste and mistakes involves establishing, implementing, _________, and reviewing effective policies and procedures
monitoring
_____ is a federall funded reasearcg nd development center and Carnegie Mellon charged with coordinating comm among experts during emergenices
CERT/CC
______ is a crime in which an imposter obtains key pieces of personal id info to impersonate someone else
identity theft
Somone who intimidates or coerces a govt to advance his poticial objectivces by launching computer based attacks is called a:
cyberterrorist
malware capable of spreading itself from one computer to another is called:
worm
a___ is a modified version of a virus that is produced by the virus' author or another person ammending the original virus code
variant
CTS, or _________, is the aggravation of the pathway of nerves that travel through the wrist
carpal tunnel syndrome
the study of designing and positioning computer equipment to improve worker productivity and minimize worker injuries is called:
ergonomics
Which of the following is the last stage of the systems development life cycle?
Systems Maintenance and Review
Major reengineering projects tend to have a(n) ____ degree of risk but a high potential for major business benefits.
high
____ work on the premise that for every activity there must be some data transference, communication, or flow that can be described as a data element.
Data-flow diagrams
Ned uses a straightforward approach to gathering data from his stakeholders, users, and other managers. He learns what they want and expect from the new system using a technique called ____.
asking directly
Tomorrow was the big day. Al Darcy would shut down the old COBOL legacy system and start up the new Peoplesoft Enterprise Resource Planning system. Al was using a(n) ____.
direct conversion
The ____ is a formal agreement that states that the user has approved a phase of system installation.
user acceptance document
Many organizations have separate ____ teams responsible for modifying, fixing, and updating existing software.
maintenance
Which of the following is an example of a computer-related mistake?
Hard disk is not working
Frank bought one copy of MS-Word and installed it on twelve of his friends’ computers for half price. He is a(n) ____.
software pirate
In 1890, U.S. Supreme Court Justice Louis Brandeis stated that ____.
the right to be left alone is of fundamental importance
a technique that allows a designer to quickly and efficiently design the features, layout and format of a display scree
screen layout
allows designers to diagram and format printed reports
report layout
a database of system descriptions, parameters and objectives
CASE repository
determination of user, stakeholder, and org needs
requirement analyis
arrows that show the direction of date element movement
data flow line
representation of a function that is performed
process symbol
rep. of either a source or destination of a data element
entity symbol
rep of a storage location for data
data store
diagrams that show the relationships among applications or systems
application flow charts
a table the shows rel. among the vaiours aspects of a systems dev effort
grid chart
watching the existing sys in action by 1+ member of the analysis team
direct observation
gathering date whne the data sources are spread over a wide geographical are
questionnares
selecting a random sample of ata and applying the characteristics of the sample to the whoel group
statistical sampling
manipulation of data collected so that the dev team member who are participating in sys analysis can use the data
data analysis
interview where thw wuestions are written in advance
structured interview
interview where the questions arent written in advance
unstructed interiew
determination of whether the project can be completed in a reasonable amt of time
schedule feasibility
am advisory group consisting of senior management and users from the IS department and other functional areas
steering committee
a document filled out by someone who wants the is dept to initate sys investigation
sys request form
assessment of the tech, econ, legal, op, and schedule feasibility of a project
feasibility analysis
the preffered approach for ranking competing projects and determining econ feasibility
net present value
tools that automate many of the tasks required in a sys deve effort and encourage adherence to the SDLC
computer-aided software engineering
object-orieneted sys dev
combines the logic of the sys dev life cycle with the power of object-oriented modeling and programming
detailed description of what is to be done
project schedule
critical date for the completion of a major part of the project
project milestone
the date the entire project is done
project deadline
a graphical tool used for planning, monitoring and coordinating projects
ganntt chart
access real data files, edits input data, makes computations and comparisons and produces real output
operational prototype
a sys dev approach that employs tools, techniques, and methodolgies designed to speed app dev
rapid app dev (RAD)
sys that play a pivotal role in an org's continued ops and goal attainment
mission-critical sys
people who will interact with the sys regularly
users
using one social skills to get computer users to provide you with info...
social engineering
going through trach cans of orgs...
dumpster diving
a computer savvy person who attempts to gain the unauthorizes access to comp sys...
criminal hacker (cracker)
a cracker with little tech savvy who dloads progams called scripts, w
script bunny
an employee working solo or in concert with outsiders to compromise corp sys
insider
a malicous program that disguises itself as a useful app and purposefully does something the user does not expet
trojan horse
the measure of one's personal traits
biometrics
software the monitors sys and network resources...
intrusion detection system(IDS)
aa description of the functional reqs of a sys
logical design
the specs of the characteristcs of the sys components necessary to put the logical design into action
physical design
simplified processes to access an app from where it stopped
restart proceudres
a duplicate, op hardware sys or immediate access to one through a specialized vendor
hot site
a seperate file that contains only changes to apps
image log
prevent probs before occur
deterrence control
testing an incomplete version
alpha