• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/41

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

41 Cards in this Set

  • Front
  • Back
Analysis paralysis
When too much time is spent documenting project requirements.
Beta testing
The process of allowing future system users to tr out the new system on their own. Used to locate program failures just prior to product shipment.
Brooks's law
"Adding more people to a late project makes the project later."
Component design phase
The third phase in the SDLC, in which developers determine hardware and software specifications, design the database (if applicable), design procedures, and create job descriptions for users and operations personnel.
Cost feasibility
One of four dimensions of feasibility
Implementation phase
The fourth phase in the SDLC, in which developers build and integrate new system components, test the system, and convert to the new system.
Maintenance phase
The fifth and final phas of the SDLC, in which developers record requests for changes, includiing both enhancements and failures, and fix failures by means of patches, service packs, and new releases.
Organization feasibility
One of the four dimensions of feasibility.
Parallel installation
A type of system conversion in which the new system runs in parallel with the old one for a while. Parallel installation is expensive because the organization incurs the costs of running both systems.
Patch
A group of fixes for high-priority failures that can be applied to existing copies of a particular product. Software vendors supply patches to fix security and other critical problems.
Phased installation
A type of system conversion in which the new system is installed in pieces across the organization(s). Once a given piece works, then the organization installs and tests another piece of the system, until the entire system has been installed.
Pilot installation
A type of system conversion in which the organization implements the entire system on a limited portion of the business.
Plunge, direct, or big-bang installation
A type of system conversion in which the organization shuts down the old system and starts the new system. Because of the risk of failure in the new system, organizations should avoid this conversion style if possible.
Product quality assurance (PQA)
The testing of a system. PQA personnel usualy construct a test plan with the advice and assistance of users.
Requirements analysis phase
The second phase in the SDLC, in which developers conduct user interviews, evaluate existing systems, determine new forms/reports/queries, identify new features and functions, including security, and create the data model.
Schedule feasibility
One of the four dimensions of feasibility
Service pack
A large group of fixes that solve low-priority software problems. Users apply service packs in much the same way as they would apply patches, except that service packs sometimes have hundreds to thousands of fixes in them.
System analysts
IS professionals that understand both business and technology. They are active throughout the systems development process and play a key role in moving the project from conception to conversion and, ultimately, maintenance. They integrate the work of programmers, testers, and users.
System conversion
The process of converting business actuvuty from the old system to the new.
System definition phase
the first phase in the SDLC, in which developers, with the help of eventual users, define the new system's goals and scope, assess its feasibility, form a project team, and plan the project.
Technical feasibility
One of the four dimensions of feasibility.
Test plan
Groups of sequences of actions that users will take using the new system.
Waterfall
The fiction that one phase of the SDLC can be completed in its entirety and the project can progress, without any backtracking, to the next phase of the SDLC. Projects are seldom that simple.
System development life cycle (SDLC)
The classical process used to develop information systems. These basic tasks of systems development are combined into the following phases: system definition, requirements analysis, component design, implementation, and system maintenance (fix or enhance).
Systems development / System analysis and design
The process of creating and maintaining information systems.
Agile enterprise
An organization that can quickly adapt to changes in the market, industry, product, law, or other significant external factors; the term was coined by Microsoft.
Chief information officer (CIO)
The title of the principal manager of the IT department.
Chief technology officer (CTO)
The head of the technology group. The CTO sorts through new ideas and products to identify those that are most relevant to the organization.
Intangible benefit
A benefit of an IS for which it impossible to compute a dollar value.
Tangible benefit
A benefit of an IS that can be measured by a dollar value.
Tuning
Adjusting information systems from time to time to changes in the workload.
Adware
Programs installed on the user's computer without the user's knowledge or permission that reside in the background and, unknown to the user, observes the user's actions and keystrokes, modify computer activity, and report the user's activity to sponsoring organizations.
Authentication
The process whereby an information system approves a user by checking the user's password.
Biometric authentication
Authentication via fingerprints, facial scans, retina scans, etc.
Cold site
A remote processing center that provides office space, but no computer equipment, for use by a company that needs to continue operations after a natural disaster.
Data administration
A staff function that pertains to ALL of an organization's data assets. Typical data administration tasks are setting data standards, developing data policies, and providing for data security.
Database administration
The management, development, operation, and maintenance of the database so as to achieve the organization's objectives. This staff function requires balancing conflicting goals: protecting the database while maximizing its availability for authorized use,. Size of the company effects the size of the team responsible for this task.
Data safeguards
Steps taken to protect databases and other organizational data, by means of data administration and database administration.
Denial of service (DOS)
Security problem in which users cannot access an IS; can be caused by human errors, natural disasters, or malicious activity.
Drive-by sniffer
People who take computers with wireless connections through an area and search for unprotected wireless networks in an attempt to gain free internet access. (Logan)
Email spoofing
A synonym for phishing A technique for obtaining unauthorized data that uses pretexting via email. ie. fake business asks you for your SSN.