Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
41 Cards in this Set
- Front
- Back
Analysis paralysis
|
When too much time is spent documenting project requirements.
|
|
Beta testing
|
The process of allowing future system users to tr out the new system on their own. Used to locate program failures just prior to product shipment.
|
|
Brooks's law
|
"Adding more people to a late project makes the project later."
|
|
Component design phase
|
The third phase in the SDLC, in which developers determine hardware and software specifications, design the database (if applicable), design procedures, and create job descriptions for users and operations personnel.
|
|
Cost feasibility
|
One of four dimensions of feasibility
|
|
Implementation phase
|
The fourth phase in the SDLC, in which developers build and integrate new system components, test the system, and convert to the new system.
|
|
Maintenance phase
|
The fifth and final phas of the SDLC, in which developers record requests for changes, includiing both enhancements and failures, and fix failures by means of patches, service packs, and new releases.
|
|
Organization feasibility
|
One of the four dimensions of feasibility.
|
|
Parallel installation
|
A type of system conversion in which the new system runs in parallel with the old one for a while. Parallel installation is expensive because the organization incurs the costs of running both systems.
|
|
Patch
|
A group of fixes for high-priority failures that can be applied to existing copies of a particular product. Software vendors supply patches to fix security and other critical problems.
|
|
Phased installation
|
A type of system conversion in which the new system is installed in pieces across the organization(s). Once a given piece works, then the organization installs and tests another piece of the system, until the entire system has been installed.
|
|
Pilot installation
|
A type of system conversion in which the organization implements the entire system on a limited portion of the business.
|
|
Plunge, direct, or big-bang installation
|
A type of system conversion in which the organization shuts down the old system and starts the new system. Because of the risk of failure in the new system, organizations should avoid this conversion style if possible.
|
|
Product quality assurance (PQA)
|
The testing of a system. PQA personnel usualy construct a test plan with the advice and assistance of users.
|
|
Requirements analysis phase
|
The second phase in the SDLC, in which developers conduct user interviews, evaluate existing systems, determine new forms/reports/queries, identify new features and functions, including security, and create the data model.
|
|
Schedule feasibility
|
One of the four dimensions of feasibility
|
|
Service pack
|
A large group of fixes that solve low-priority software problems. Users apply service packs in much the same way as they would apply patches, except that service packs sometimes have hundreds to thousands of fixes in them.
|
|
System analysts
|
IS professionals that understand both business and technology. They are active throughout the systems development process and play a key role in moving the project from conception to conversion and, ultimately, maintenance. They integrate the work of programmers, testers, and users.
|
|
System conversion
|
The process of converting business actuvuty from the old system to the new.
|
|
System definition phase
|
the first phase in the SDLC, in which developers, with the help of eventual users, define the new system's goals and scope, assess its feasibility, form a project team, and plan the project.
|
|
Technical feasibility
|
One of the four dimensions of feasibility.
|
|
Test plan
|
Groups of sequences of actions that users will take using the new system.
|
|
Waterfall
|
The fiction that one phase of the SDLC can be completed in its entirety and the project can progress, without any backtracking, to the next phase of the SDLC. Projects are seldom that simple.
|
|
System development life cycle (SDLC)
|
The classical process used to develop information systems. These basic tasks of systems development are combined into the following phases: system definition, requirements analysis, component design, implementation, and system maintenance (fix or enhance).
|
|
Systems development / System analysis and design
|
The process of creating and maintaining information systems.
|
|
Agile enterprise
|
An organization that can quickly adapt to changes in the market, industry, product, law, or other significant external factors; the term was coined by Microsoft.
|
|
Chief information officer (CIO)
|
The title of the principal manager of the IT department.
|
|
Chief technology officer (CTO)
|
The head of the technology group. The CTO sorts through new ideas and products to identify those that are most relevant to the organization.
|
|
Intangible benefit
|
A benefit of an IS for which it impossible to compute a dollar value.
|
|
Tangible benefit
|
A benefit of an IS that can be measured by a dollar value.
|
|
Tuning
|
Adjusting information systems from time to time to changes in the workload.
|
|
Adware
|
Programs installed on the user's computer without the user's knowledge or permission that reside in the background and, unknown to the user, observes the user's actions and keystrokes, modify computer activity, and report the user's activity to sponsoring organizations.
|
|
Authentication
|
The process whereby an information system approves a user by checking the user's password.
|
|
Biometric authentication
|
Authentication via fingerprints, facial scans, retina scans, etc.
|
|
Cold site
|
A remote processing center that provides office space, but no computer equipment, for use by a company that needs to continue operations after a natural disaster.
|
|
Data administration
|
A staff function that pertains to ALL of an organization's data assets. Typical data administration tasks are setting data standards, developing data policies, and providing for data security.
|
|
Database administration
|
The management, development, operation, and maintenance of the database so as to achieve the organization's objectives. This staff function requires balancing conflicting goals: protecting the database while maximizing its availability for authorized use,. Size of the company effects the size of the team responsible for this task.
|
|
Data safeguards
|
Steps taken to protect databases and other organizational data, by means of data administration and database administration.
|
|
Denial of service (DOS)
|
Security problem in which users cannot access an IS; can be caused by human errors, natural disasters, or malicious activity.
|
|
Drive-by sniffer
|
People who take computers with wireless connections through an area and search for unprotected wireless networks in an attempt to gain free internet access. (Logan)
|
|
Email spoofing
|
A synonym for phishing A technique for obtaining unauthorized data that uses pretexting via email. ie. fake business asks you for your SSN.
|