• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/104

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

104 Cards in this Set

  • Front
  • Back

there are methods to designing and developing business applications, which of the following is not one of those methods?

Net Sourcing 

which of the following system developing techniques requires IT specialists that are in house to developing the software application?

Insourcing

Which person leads the SDLC?

the project manager 

In which of the following SDLC phases do you gather the business requirements for the proposed project?

Analysis 

Which of the following is considered a technical architecture for the proposed system?

Service Oriented Architecture 

If you were the marketing director and you were involved in the design and development of a new marketing application,which phase would your responsibilities begin to lessen with this new project?

Phase 4, development 

Which of the following methodology breaks a project into tiny phases, programmersmust develop a code in each phase before they continue to the next phase?

Extreme Programming 

Why is prototyping a valuable tool?

Make changes and improve it 

How is outsourcing different from developing software internally?

Cheaper  

If you are a US based company and your going to hire a vendor located in NYC, you would be using?

On Shore 

What type of IT infrastructure involves distributing the information and processingpower of ITsystems UIA network?

Distributed 

What is the term that explains the structure beneath a structure?

infrastructure 

If you were performing an impact analysis, threat analysis, and impact scenairo analysis you would be the _____________ phase of business continuity planning.

Analysis--> Phase 2

In what phase of business continuity planning would you create a disaster recovery plan?

Design 

What is the last phase of the business continuity planning phases?

Maintenance 

What are the principles and standards that guide our behavior toward other people?

Ethics 

your decisions regarding ethics are influenced by a number of factors, which is not one of those factors?

age, gender, education, social economic status

Which type of law allows people to use copyrighted material in teaching environments?

Fair Use 

Which of the following is the unauthorized use of application, distribution, or sale of copyrighted software?

Piracy 

What hardware device captures key strokes moving from the keyboard to the motherboard?

Hardware key logging 

Which of the following is a small file that contains information aboutyou and your web activities?

Cookies 

What is unsolisited email from businesses that advertise goods and services?

Spam

What is a malicious software that secretly collects information about you?

Spyware 

If you were trying to access you campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus?

Denial of service 

What type of technology would allow a customer in a SOA environment to connect to any communications channel?

plug and play

What is the main disadvantage of a centralized infrastructure?

inflexibility 

In what type of yered infrastructure do all the computing resources sit on one computer?

Tier 1

Whattypeof tiered infrastructure does the client handle the display and the server handles the request?

Tier 2

Self Sourcing 

do-it yourself approach many end users take with little or no help from IT specialists 

waterfall methodology

Must finish the first phase before moving on

Phase 1: The planning phase 

create a solid plan for developing your information system. 3 activities: define the system to be developed, set the project scope, and develop the project plan

Phase 2: Analysis

involves end users and IT specialists working together to gather, understand,and document the business requirements for the proposed system. 

Phase 3: Design 

Build a technical blueprint of how the proposed system will work. 2 primary activities; Design the technical architecture, and design system models.

Phase 4: The development 

take all you detailed design documents from the design phase and transform them into an actual system. 2 activities; build the technical architecture, and build the database and programs 

Phase 5: Testing 

Verifies that the system works and meets all of the business requirements defined in the analysis phase. 2 activities; Write the test conditions, perform the testing of the system. 

Phase 6: Implementation 

Distribute the system to all of the knowledge workers and they begin using the system to perform their everyday jobs

Parallel implementation

use both the old and new system simultanelously

Plunge implementation

discard the old system completely and use the new 

pilot implementation 

start with small groups of people on the new system and gradually add more users

phased implementation

implement the new system in phases

Phase 7: Maintenance 

Monitor and support the new system to ensure it continues to meet the business goals

There are ___ methodologies 

5

RAD

Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to acceletrate the systems development process 

Agile

Similar to XP, aims for satisifaction by continuous delivery of useful components 

Types of outsourcing 

Onshore (in the same country), Nearshore (in a country nearby), Offshore (in a different country)

From the video: What are the 2 types of learning

Book learning, expansive 

What were the 2 things they spoke about

Google glass (took a day to make), and how the movement of your hands will control the computer (45 minutes to make)

using, reusing, small codes, small software systems

service oriented architecture 

Customers should be able to 

Plug and play into your organization 

End users

should have access to whatever infor and software they need 

Decentralized 

involves little or no sharing of IT and other resources 

Centralized

sharing info systems in one central area 

Distributed

distributing info and processing network of IT via network 

Client/server infrastructure

one or more computers that are servers which provide services to other computers, called clients

Tiered

the IT system is partitioned into tiers (layers) where each tier performs a specific type of functionality
•1-tier – single machine
•2-tier – basic client/server relationship
•3-tier – client, application server, data or database server
•N-tier – scalable 3-tier structure with more servers

Benchmarking 

process of continuously measuring system results and comparing them to benchmarks

Efficiency Vs Effectiveness

Doing something right vs doing the right thing 

How many metrics are there 

4

Infrastructure- Centric Mertic 

measure efficiency, speed, and/or capacity of technology 

Throughput

amount of information that can pass through a system in a given amount of time

Transaction speed

speed at which a system can process a transaction 

System availability 

measured inversely as a downtime, or the average amount of time a system is down or unavailable 

Accuracy

measured inversely as error rate, or the number of errors per thousand/million that a system generates

response time

average time to respond to a user-generated event, such as a mouse click

scalability 

conceptual metric related to how well a system can be adapted to increased demands 

Web centric metric 

measure of the success of your Web and e-business initiatives

Unique visitors

# of unique visitors to a site 

click through 

# of people who click on an add and are taken to another site 

cost-per- thousand 

sales dollars generated per dollar of advertising 

abandoned registrations

# who start to register at your site and then abandon the process

abandoned shopping carts

# who create a shopping cart and then abandon it 

Call center metric 

measures the success of call center efforts 

abandon rate

% number of callers who hand up while waiting for their call to be answered

average speed to answer 

average time, usually in seconds, that it takes for a call to be answered by an actual person

Time service factor

% of calls answered within a specific time frame, such as 30 or 90 seconds

First call resolution

% of calls that can be resolved without having to call back 

Business continuity planning 

rigorous and well-infomred organizational methodology for developing a business continuity plan, a step-by-step guideline defining how the organization will recover from a disaster or extended disruption 

Important Ilities 

Availability (when the system will be available)


Accessibility (who can access the system)


Reliability (assurance that the system provides correct information)


Scalability (how well systems can adapt)


Flexibility (ability to change)

This type of infrastructure partitions applications into multiple layers where each performas a specific type of function

Tiered 

This type of infrastructure leaves little to no sharing of IT or information 

Decentralized 

This type of architecture is based on small services that do one thing and do it well 

SOA 

Intellectual Property

is intangible creative work that is embodied in physical form. 

Copyright

is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents

Fair use doctrine 

says that you may use copyrighted material in certain situations.

Pirated software

is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Privacy

is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. 

Key logger 

a program that, when installed on a computer, records every keystroke and mouse click

Screen capture programs

periodically record whats on the screen 

event data recorders

located in the airbag control module and collects data from your car as you are driving 

hardware key logger

hardware devices that captures keystrokes moving between keyboard and motherboard

identity theft 

the forging of someones identity for the purpose of fraud

Spear phishing 

targeted to a specific individual

Whaling 

targeted at a high profile individual

Pharming 

rerouting your request for a legitimate web site by sending it to a slightly different Web address or by redirecting you after you are already on the legitimate site 

Cookies 

a small file that contains information about you and your web activities which a web site places on your computer

spam

unsolicited e-mail from businesses advertising goods and services 

Adware

software to generate ads that installs itself when you download some other program from the web

spyware 

malicious software

web log 

consists of one line of information for every visitior to a website and is usually stored on a web server 

clickstream 

records information about you during a web surfing session such as what websites you visited, how long you were there, what ads you looked at, and what you bought. 

hackers

knowledgable computer users who use their knowledge to invade other peoples computers

Computer virus

software that is written with malicious intent to cause annoyance or damage

worm 

type of virus that spreads itself from computer to computer usually via email

denial of service

floods a website with so many requests for service tht it slows down or crashes.