• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/88

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

88 Cards in this Set

  • Front
  • Back
Six Phases of the SDLC?
1. Planning
2. System Anylsis
3. System Desgin
4. Progmramming Delveopment
5. Testing
6. Convestion & Implementation of Product
7. Maintinenace
SDLC
the overall process for developing information systems from planning and analysis through implementation and maintenance
planning phase
involves establishing a high-level plan of the intended project and determining project goals
System design?
user interface design
data design
process design
Alpha testing?
User testing of a information system using simulated data
Beta testing?
User testing of a completed information system using real data
User acceptance testing (UAT)
tests if a system satisfies its acceptance criteria
Conversion / Implementatoin Process?
Installtion
Minor Adjustmetns
System Testing
End User Training
System Documentation
Conversion
Conversion / Implementatin Plans?
Parallel
Pilot
Phased
Plunge
Type of Maintenance?
Adaptive maintenance
Corrective maintenance
Perfective maintenance
Preventative maintenance
Alternative Approaches to System Building ?
Prototyping
Rapid application development (RAD)
Joint Application Development (JAD)
End-user development
Prototyping?
building an experimental system rapidly and inexpensively for users to evaluate
JAD?
(Joint Application Development)
Process to speed up the generation of informational requirements by having end-users and information systems specialist work together in interactive design meetings.
Input from stakeholders in orchestrated, joint meetings
RAD?
(Rapid Application Development)
RAD = JAD + Prototyping
ASP or Application Software Packages?

Application Service Provider
process of purchasing and/or leasing software that meets the organizations informational requirements.
Outsourcing benifits?
Focus on core competencies
Exploitation of best practices
Control of costs
Reduced Operating Cost
Leading-edge technology
Accountability
Scalability
Flexibility
Outsourcing Disadvantages?
Reduction in technical know-how
Loss of control
Vulnerability
Dependency
DFD are used to?
understanding and representing the “Processing” needs of an Information System
Uses the logical notion of breaking down (decomposing) processes to understand how the system will perform the functions it is expected to deliver
DFD Building Blocks?
v
External Agents?
An External Agent is an actor that is outside the information system being designed
An External Agent is also outside the control of the information system being designed
Any processing that might take place within an External Agent is beyond the scope of the system
Any processing that might take place directly between External Agents is beyond the scope of the system
An External Agent is shown as a rectangle with the Agent’s name (singular) inside it
External Agent is almost always?
Office, department, division inside the business but outside the system scope
An external organization or agency
Another business or another information system
A system’s end-users or managers (a class not an individual)
Dataflow?
A Data Flow represents both the data and the direction in which the data “move” in the information system
Two Data Flows may have the same name if the following conditions are satisfied:?
the data elements are identical in each, and
each Data Flow has a different source or sink
Process?
A Process is work performed on, or in response to, incoming Data Flow(s) or conditions. It either transforms input (creates new data) or transfers it (redirects it based on some logic) and produces some output(s). A Process may perform several functions.
A System is a?
Process
Data Store?
a place where data are held within an information system.
A data store must have?
1. at least one input Data Flow and one output Data Flow.

2. Data Store should be shared by at least two Processes or commented if shared across systems.
Decomposition?
Decomposition is the act of breaking a system into its component subsystems, processes, and sub-processes. The further down you go, the more detail is revealed.
Level 0 DFD?
“breaks-down” (called decomposition) the single Process of the Context Diagram into a number of smaller modules or sub-processes which contain more detail
System Software?
Generalized programs, manages computer’s resources
Application Software?
Programs written to perform functions specified by end users
Functions of Operating System?
v
Utility Software?
Routine Operations (ie. sort, print, list)
Data management (ie. create, merge, delete)
ERP?




Enterprise Resource Planning
integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make enterprisewide decisions by viewing enterprisewide information on all business operations
Middleware?
several different types of software which sit in the middle of and provide connectivity between two or more software applications
Enterprise application integration (EAI) middleware?
Ties together multiple disparate applications to support enterprise wide functionality
Sucessful ERP attributes?
Overall fit
Proper business analysis
Solid Implementation plans
TOC?
The cost of owning technology resources over its useful life
How to choose a software package?
Cost
Functionality
Vendor Support
Viability of Vendor
Flexibility
Documentation
Response Time
Ease of Installation
Computer?
an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data
Hardware Components Include?
Central processing unit (CPU)
Primary storage
Secondary storage
Input device
Output device
Communication device
ALU?
Arithmetric-Logic Unit

Arithmetic-logic unit (ALU) performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers)
Control Unit?
coordinates and controls the other parts of the computer system
interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions
Register?
Where data is stored in CPU while processed
Primary Storage?
the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU
Secondary Storage?
consists of equipment designed to store large volumes of data for long-term storage
System Software?
controls how the various technology tools work together along with the application software
Types of Software?
OS
Utility
Application
Disaster Recovery Plan?
a detailed process for recovering information or an IT system in the event of a catastrophic disaster
Five primary characteristics of a solid infrastructure architecture?
Flexibility
Scalability
Reliability
Availability
Performance
Scalability?
Ability of a computer, product, or system to expand and to serve without breaking down
All computer networks require three items?
Senders and receivers that have something to share
A pathway or transmission medium, such as a cable, to send the message
Rules or protocols dictating communication between senders and receivers
Network?
a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
Telecom Systems do the folowiing?
Establishes a path for moving information between sender and receiver (called a channel)
Bandwidth?
a measure of the transmission capacity of a communication channel.
Protocol?
a standard that specifies the format of data as well as the set of rules/procedures to be followed during data transmission
Latency?
the time delay between the moment data are transmitted by the sender and the moment in which those transmitted data are available to the intended receiver
Attenuation?
results when the power of an electrical signal weakens as it is sent over increasing distance.
P2P?
any network without a central file server and in which all computers in the network have access to the public files located on all other workstations
Client?
computer that is designed to request information from a server
Client?
computer that is designed to request information from a server
Server?
computer that is dedicated to providing information in response to external requests
Client/Server network?
model for applications in which the bulk of the back-end processing takes place on a server, while the front-end processing is handled by the clients
LAN?
Computer network that uses cables or radio signals to link two or more computers within a geographically limited area, generally one building or a group of buildings in close proximity.
WAN?
Computer network that provides data communication services for business in large geographically dispersed areas (such as across a country or around the world). The internet is a WAN that spans the world.
Star Topology?
All devices are connected to a central device, called a hub. All messages being sent must go through the hub. Star networks are relatively easy to install and manage, but bottlenecks cable called the bus or backbone.
BUS Topology?
All devices are connected to a central cable called the bus or backbone. Bus networks are fairly inexpensive and easy to install for small networks.
Ring Topology?
all devices are connected to one another in the shape of a closed loop so that each device is connected directly to two other devices, one on either side. Ring topologies are relatively expensive and difficult to install, but they offer high bandwidth and can span large distances.
Network transmission media?
refers to the various types of media used to carry the signal between computers
RFID?
use active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers
NOS?
the operating system that runs a network, steering information between computers and managing security and users
Packet Switching?
occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
Router?
an intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
Interoperability?
the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
HUB / Repeater?
cleans and boots the signal
Switch?
intellignet repeater boots and switches signals
Bridge?
connects two networks of the same kind
Gateway?
connects networks of different types
Social engineering
using one’s social skills to trick people into revealing access credentials or other information valuable to the attacker
The three primary information technology security areas?
Authentication and authorization
Prevention and resistance
Detection and response
Authentication?
a method for confirming users’ identities
Authorization?
the process of giving someone permission to do or have something
Content Filitering?
occurs when organizations use software that filters content to prevent the transmission of unauthorized information
Encription?
scrambles information into an alternative form that requires a key or password to decrypt the information
Firewall?
hardware and/or software that guards a private network by analyzing the information leaving and entering the network
The most common type of detection and response technology?
Anti-Virus Software
Monitoring?
tracking people’s activities by such measures as number of keystrokes, error rate, and number of transactions processed
Intellectual Property?
intangible property created by people or corporations