Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
88 Cards in this Set
- Front
- Back
Six Phases of the SDLC?
|
1. Planning
2. System Anylsis 3. System Desgin 4. Progmramming Delveopment 5. Testing 6. Convestion & Implementation of Product 7. Maintinenace |
|
SDLC
|
the overall process for developing information systems from planning and analysis through implementation and maintenance
|
|
planning phase
|
involves establishing a high-level plan of the intended project and determining project goals
|
|
System design?
|
user interface design
data design process design |
|
Alpha testing?
|
User testing of a information system using simulated data
|
|
Beta testing?
|
User testing of a completed information system using real data
|
|
User acceptance testing (UAT)
|
tests if a system satisfies its acceptance criteria
|
|
Conversion / Implementatoin Process?
|
Installtion
Minor Adjustmetns System Testing End User Training System Documentation Conversion |
|
Conversion / Implementatin Plans?
|
Parallel
Pilot Phased Plunge |
|
Type of Maintenance?
|
Adaptive maintenance
Corrective maintenance Perfective maintenance Preventative maintenance |
|
Alternative Approaches to System Building ?
|
Prototyping
Rapid application development (RAD) Joint Application Development (JAD) End-user development |
|
Prototyping?
|
building an experimental system rapidly and inexpensively for users to evaluate
|
|
JAD?
|
(Joint Application Development)
Process to speed up the generation of informational requirements by having end-users and information systems specialist work together in interactive design meetings. Input from stakeholders in orchestrated, joint meetings |
|
RAD?
|
(Rapid Application Development)
RAD = JAD + Prototyping |
|
ASP or Application Software Packages?
Application Service Provider |
process of purchasing and/or leasing software that meets the organizations informational requirements.
|
|
Outsourcing benifits?
|
Focus on core competencies
Exploitation of best practices Control of costs Reduced Operating Cost Leading-edge technology Accountability Scalability Flexibility |
|
Outsourcing Disadvantages?
|
Reduction in technical know-how
Loss of control Vulnerability Dependency |
|
DFD are used to?
|
understanding and representing the “Processing” needs of an Information System
Uses the logical notion of breaking down (decomposing) processes to understand how the system will perform the functions it is expected to deliver |
|
DFD Building Blocks?
|
v
|
|
External Agents?
|
An External Agent is an actor that is outside the information system being designed
An External Agent is also outside the control of the information system being designed Any processing that might take place within an External Agent is beyond the scope of the system Any processing that might take place directly between External Agents is beyond the scope of the system An External Agent is shown as a rectangle with the Agent’s name (singular) inside it |
|
External Agent is almost always?
|
Office, department, division inside the business but outside the system scope
An external organization or agency Another business or another information system A system’s end-users or managers (a class not an individual) |
|
Dataflow?
|
A Data Flow represents both the data and the direction in which the data “move” in the information system
|
|
Two Data Flows may have the same name if the following conditions are satisfied:?
|
the data elements are identical in each, and
each Data Flow has a different source or sink |
|
Process?
|
A Process is work performed on, or in response to, incoming Data Flow(s) or conditions. It either transforms input (creates new data) or transfers it (redirects it based on some logic) and produces some output(s). A Process may perform several functions.
|
|
A System is a?
|
Process
|
|
Data Store?
|
a place where data are held within an information system.
|
|
A data store must have?
|
1. at least one input Data Flow and one output Data Flow.
2. Data Store should be shared by at least two Processes or commented if shared across systems. |
|
Decomposition?
|
Decomposition is the act of breaking a system into its component subsystems, processes, and sub-processes. The further down you go, the more detail is revealed.
|
|
Level 0 DFD?
|
“breaks-down” (called decomposition) the single Process of the Context Diagram into a number of smaller modules or sub-processes which contain more detail
|
|
System Software?
|
Generalized programs, manages computer’s resources
|
|
Application Software?
|
Programs written to perform functions specified by end users
|
|
Functions of Operating System?
|
v
|
|
Utility Software?
|
Routine Operations (ie. sort, print, list)
Data management (ie. create, merge, delete) |
|
ERP?
Enterprise Resource Planning |
integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprisewide decisions by viewing enterprisewide information on all business operations
|
|
Middleware?
|
several different types of software which sit in the middle of and provide connectivity between two or more software applications
|
|
Enterprise application integration (EAI) middleware?
|
Ties together multiple disparate applications to support enterprise wide functionality
|
|
Sucessful ERP attributes?
|
Overall fit
Proper business analysis Solid Implementation plans |
|
TOC?
|
The cost of owning technology resources over its useful life
|
|
How to choose a software package?
|
Cost
Functionality Vendor Support Viability of Vendor Flexibility Documentation Response Time Ease of Installation |
|
Computer?
|
an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data
|
|
Hardware Components Include?
|
Central processing unit (CPU)
Primary storage Secondary storage Input device Output device Communication device |
|
ALU?
|
Arithmetric-Logic Unit
Arithmetic-logic unit (ALU) performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers) |
|
Control Unit?
|
coordinates and controls the other parts of the computer system
interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions |
|
Register?
|
Where data is stored in CPU while processed
|
|
Primary Storage?
|
the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU
|
|
Secondary Storage?
|
consists of equipment designed to store large volumes of data for long-term storage
|
|
System Software?
|
controls how the various technology tools work together along with the application software
|
|
Types of Software?
|
OS
Utility Application |
|
Disaster Recovery Plan?
|
a detailed process for recovering information or an IT system in the event of a catastrophic disaster
|
|
Five primary characteristics of a solid infrastructure architecture?
|
Flexibility
Scalability Reliability Availability Performance |
|
Scalability?
|
Ability of a computer, product, or system to expand and to serve without breaking down
|
|
All computer networks require three items?
|
Senders and receivers that have something to share
A pathway or transmission medium, such as a cable, to send the message Rules or protocols dictating communication between senders and receivers |
|
Network?
|
a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
|
|
Telecom Systems do the folowiing?
|
Establishes a path for moving information between sender and receiver (called a channel)
|
|
Bandwidth?
|
a measure of the transmission capacity of a communication channel.
|
|
Protocol?
|
a standard that specifies the format of data as well as the set of rules/procedures to be followed during data transmission
|
|
Latency?
|
the time delay between the moment data are transmitted by the sender and the moment in which those transmitted data are available to the intended receiver
|
|
Attenuation?
|
results when the power of an electrical signal weakens as it is sent over increasing distance.
|
|
P2P?
|
any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
|
|
Client?
|
computer that is designed to request information from a server
|
|
Client?
|
computer that is designed to request information from a server
|
|
Server?
|
computer that is dedicated to providing information in response to external requests
|
|
Client/Server network?
|
model for applications in which the bulk of the back-end processing takes place on a server, while the front-end processing is handled by the clients
|
|
LAN?
|
Computer network that uses cables or radio signals to link two or more computers within a geographically limited area, generally one building or a group of buildings in close proximity.
|
|
WAN?
|
Computer network that provides data communication services for business in large geographically dispersed areas (such as across a country or around the world). The internet is a WAN that spans the world.
|
|
Star Topology?
|
All devices are connected to a central device, called a hub. All messages being sent must go through the hub. Star networks are relatively easy to install and manage, but bottlenecks cable called the bus or backbone.
|
|
BUS Topology?
|
All devices are connected to a central cable called the bus or backbone. Bus networks are fairly inexpensive and easy to install for small networks.
|
|
Ring Topology?
|
all devices are connected to one another in the shape of a closed loop so that each device is connected directly to two other devices, one on either side. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.
|
|
Network transmission media?
|
refers to the various types of media used to carry the signal between computers
|
|
RFID?
|
use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers
|
|
NOS?
|
the operating system that runs a network, steering information between computers and managing security and users
|
|
Packet Switching?
|
occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
|
|
Router?
|
an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
|
|
Interoperability?
|
the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
|
|
HUB / Repeater?
|
cleans and boots the signal
|
|
Switch?
|
intellignet repeater boots and switches signals
|
|
Bridge?
|
connects two networks of the same kind
|
|
Gateway?
|
connects networks of different types
|
|
Social engineering
|
using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
|
|
The three primary information technology security areas?
|
Authentication and authorization
Prevention and resistance Detection and response |
|
Authentication?
|
a method for confirming users’ identities
|
|
Authorization?
|
the process of giving someone permission to do or have something
|
|
Content Filitering?
|
occurs when organizations use software that filters content to prevent the transmission of unauthorized information
|
|
Encription?
|
scrambles information into an alternative form that requires a key or password to decrypt the information
|
|
Firewall?
|
hardware and/or software that guards a private network by analyzing the information leaving and entering the network
|
|
The most common type of detection and response technology?
|
Anti-Virus Software
|
|
Monitoring?
|
tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed
|
|
Intellectual Property?
|
intangible property created by people or corporations
|