Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
104 Cards in this Set
- Front
- Back
there are methods to designing and developing business applications, which of the following is not one of those methods? |
Net Sourcing |
|
which of the following system developing techniques requires IT specialists that are in house to developing the software application? |
Insourcing |
|
Which person leads the SDLC? |
the project manager |
|
In which of the following SDLC phases do you gather the business requirements for the proposed project? |
Analysis |
|
Which of the following is considered a technical architecture for the proposed system? |
Service Oriented Architecture |
|
If you were the marketing director and you were involved in the design and development of a new marketing application,which phase would your responsibilities begin to lessen with this new project? |
Phase 4, development |
|
Which of the following methodology breaks a project into tiny phases, programmersmust develop a code in each phase before they continue to the next phase? |
Extreme Programming |
|
Why is prototyping a valuable tool? |
Make changes and improve it |
|
How is outsourcing different from developing software internally? |
Cheaper |
|
If you are a US based company and your going to hire a vendor located in NYC, you would be using? |
On Shore |
|
What type of IT infrastructure involves distributing the information and processingpower of ITsystems UIA network? |
Distributed |
|
What is the term that explains the structure beneath a structure? |
infrastructure |
|
If you were performing an impact analysis, threat analysis, and impact scenairo analysis you would be the _____________ phase of business continuity planning. |
Analysis--> Phase 2 |
|
In what phase of business continuity planning would you create a disaster recovery plan? |
Design |
|
What is the last phase of the business continuity planning phases? |
Maintenance |
|
What are the principles and standards that guide our behavior toward other people? |
Ethics |
|
your decisions regarding ethics are influenced by a number of factors, which is not one of those factors? |
age, gender, education, social economic status |
|
Which type of law allows people to use copyrighted material in teaching environments? |
Fair Use |
|
Which of the following is the unauthorized use of application, distribution, or sale of copyrighted software? |
Piracy |
|
What hardware device captures key strokes moving from the keyboard to the motherboard? |
Hardware key logging |
|
Which of the following is a small file that contains information aboutyou and your web activities? |
Cookies |
|
What is unsolisited email from businesses that advertise goods and services? |
Spam |
|
What is a malicious software that secretly collects information about you? |
Spyware |
|
If you were trying to access you campus network but the system was unable to respond to you because it was overwhelmed with a flood of requests coming from some virus? |
Denial of service |
|
What type of technology would allow a customer in a SOA environment to connect to any communications channel? |
plug and play |
|
What is the main disadvantage of a centralized infrastructure? |
inflexibility |
|
In what type of yered infrastructure do all the computing resources sit on one computer? |
Tier 1 |
|
Whattypeof tiered infrastructure does the client handle the display and the server handles the request? |
Tier 2 |
|
Self Sourcing |
do-it yourself approach many end users take with little or no help from IT specialists |
|
waterfall methodology |
Must finish the first phase before moving on |
|
Phase 1: The planning phase |
create a solid plan for developing your information system. 3 activities: define the system to be developed, set the project scope, and develop the project plan |
|
Phase 2: Analysis |
involves end users and IT specialists working together to gather, understand,and document the business requirements for the proposed system. |
|
Phase 3: Design |
Build a technical blueprint of how the proposed system will work. 2 primary activities; Design the technical architecture, and design system models. |
|
Phase 4: The development |
take all you detailed design documents from the design phase and transform them into an actual system. 2 activities; build the technical architecture, and build the database and programs |
|
Phase 5: Testing |
Verifies that the system works and meets all of the business requirements defined in the analysis phase. 2 activities; Write the test conditions, perform the testing of the system. |
|
Phase 6: Implementation |
Distribute the system to all of the knowledge workers and they begin using the system to perform their everyday jobs |
|
Parallel implementation |
use both the old and new system simultanelously |
|
Plunge implementation |
discard the old system completely and use the new |
|
pilot implementation |
start with small groups of people on the new system and gradually add more users |
|
phased implementation |
implement the new system in phases |
|
Phase 7: Maintenance |
Monitor and support the new system to ensure it continues to meet the business goals |
|
There are ___ methodologies |
5 |
|
RAD |
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to acceletrate the systems development process |
|
Agile |
Similar to XP, aims for satisifaction by continuous delivery of useful components |
|
Types of outsourcing |
Onshore (in the same country), Nearshore (in a country nearby), Offshore (in a different country) |
|
From the video: What are the 2 types of learning |
Book learning, expansive |
|
What were the 2 things they spoke about |
Google glass (took a day to make), and how the movement of your hands will control the computer (45 minutes to make) |
|
using, reusing, small codes, small software systems |
service oriented architecture |
|
Customers should be able to |
Plug and play into your organization |
|
End users |
should have access to whatever infor and software they need |
|
Decentralized |
involves little or no sharing of IT and other resources |
|
Centralized |
sharing info systems in one central area |
|
Distributed |
distributing info and processing network of IT via network |
|
Client/server infrastructure |
one or more computers that are servers which provide services to other computers, called clients |
|
Tiered |
the IT system is partitioned into tiers (layers) where each tier performs a specific type of functionality |
|
Benchmarking |
process of continuously measuring system results and comparing them to benchmarks |
|
Efficiency Vs Effectiveness |
Doing something right vs doing the right thing |
|
How many metrics are there |
4 |
|
Infrastructure- Centric Mertic |
measure efficiency, speed, and/or capacity of technology |
|
Throughput |
amount of information that can pass through a system in a given amount of time |
|
Transaction speed |
speed at which a system can process a transaction |
|
System availability |
measured inversely as a downtime, or the average amount of time a system is down or unavailable |
|
Accuracy |
measured inversely as error rate, or the number of errors per thousand/million that a system generates |
|
response time |
average time to respond to a user-generated event, such as a mouse click |
|
scalability |
conceptual metric related to how well a system can be adapted to increased demands |
|
Web centric metric |
measure of the success of your Web and e-business initiatives |
|
Unique visitors |
# of unique visitors to a site |
|
click through |
# of people who click on an add and are taken to another site |
|
cost-per- thousand |
sales dollars generated per dollar of advertising |
|
abandoned registrations |
# who start to register at your site and then abandon the process |
|
abandoned shopping carts |
# who create a shopping cart and then abandon it |
|
Call center metric |
measures the success of call center efforts |
|
abandon rate |
% number of callers who hand up while waiting for their call to be answered |
|
average speed to answer |
average time, usually in seconds, that it takes for a call to be answered by an actual person |
|
Time service factor |
% of calls answered within a specific time frame, such as 30 or 90 seconds |
|
First call resolution |
% of calls that can be resolved without having to call back |
|
Business continuity planning |
rigorous and well-infomred organizational methodology for developing a business continuity plan, a step-by-step guideline defining how the organization will recover from a disaster or extended disruption |
|
Important Ilities |
Availability (when the system will be available) Accessibility (who can access the system) Reliability (assurance that the system provides correct information) Scalability (how well systems can adapt) Flexibility (ability to change) |
|
This type of infrastructure partitions applications into multiple layers where each performas a specific type of function |
Tiered |
|
This type of infrastructure leaves little to no sharing of IT or information |
Decentralized |
|
This type of architecture is based on small services that do one thing and do it well |
SOA |
|
Intellectual Property |
is intangible creative work that is embodied in physical form. |
|
Copyright |
is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents |
|
Fair use doctrine |
says that you may use copyrighted material in certain situations. |
|
Pirated software |
is the unauthorized use, duplication, distribution, or sale of copyrighted software. |
|
Privacy |
is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent. |
|
Key logger |
a program that, when installed on a computer, records every keystroke and mouse click |
|
Screen capture programs |
periodically record whats on the screen |
|
event data recorders |
located in the airbag control module and collects data from your car as you are driving |
|
hardware key logger |
hardware devices that captures keystrokes moving between keyboard and motherboard |
|
identity theft |
the forging of someones identity for the purpose of fraud |
|
Spear phishing |
targeted to a specific individual |
|
Whaling |
targeted at a high profile individual |
|
Pharming |
rerouting your request for a legitimate web site by sending it to a slightly different Web address or by redirecting you after you are already on the legitimate site |
|
Cookies |
a small file that contains information about you and your web activities which a web site places on your computer |
|
spam |
unsolicited e-mail from businesses advertising goods and services |
|
Adware |
software to generate ads that installs itself when you download some other program from the web |
|
spyware |
malicious software |
|
web log |
consists of one line of information for every visitior to a website and is usually stored on a web server |
|
clickstream |
records information about you during a web surfing session such as what websites you visited, how long you were there, what ads you looked at, and what you bought. |
|
hackers |
knowledgable computer users who use their knowledge to invade other peoples computers |
|
Computer virus |
software that is written with malicious intent to cause annoyance or damage |
|
worm |
type of virus that spreads itself from computer to computer usually via email |
|
denial of service |
floods a website with so many requests for service tht it slows down or crashes. |