Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
94 Cards in this Set
- Front
- Back
DNS stands for
|
1. Domain name service
2. Domain name server 3. Domain name system |
|
Non-functional requirements pertain to what the system does. (True or False)
|
False
|
|
In which stage of the SDLC do we identify the business value of the system?
|
Planning
|
|
What are characteristics of a project?
|
1. Creates a new product or service
2. Brings about beneficial change or added value |
|
In a multi-tier system, the client responds to requests and presents results (True or False)
|
False
|
|
The World Wide Web uses the html and http technologies (True or False)
|
True
|
|
A WAN covers a larger geographic region than a LAN? (True or False)
|
True
|
|
Web 2.0 treats the network as a platform? (True or False)
|
True
|
|
A Foreign key is a primary key in another table? (True or False)
|
True
|
|
Why is it important to have a complete understanding of requirements?
|
1. Need to know where you're going before you can figure out how to get there.
2. Requirements are the foundation on which everything else rests. 3. Get requirements wrong, and the entire system will be wrong. 4. Requirement – Statement of what the system must do or characteristics it must have. |
|
Do requirements focus on "what" or "how?"
|
Focus on what
1. What the system is to do, not how to do it. • GOOD EXAMPLE: The system shall allow participants to view a race schedule. • BAD EXAMPLE: The system will use a drop-down box to allow participants to view a race schedule. |
|
What do use cases show?
|
1. Use cases show activities that are performed in order to produce some output.
2. Used to model/understand business processes. 3. Shows how actors interact with the system. 4. Business process |
|
Define the term "business process."
|
A collection of related, structured activities--a chain of events--that produce a specific service or product for a particular customer or customers.
|
|
Name three types of activities in requirements analysis
|
1. Eliciting requirements
2. Analyzing requirements 3. Recording requirements |
|
Define eliciting requirements
|
The task of communicating with customers and users to determine what their requirements are. This is sometimes also called requirements gathering
|
|
Define Analyzing requirements
|
Determining whether the stated requirements are unclear, incomplete, ambiguous, or contradictory, and then resolving these issues
|
|
Define recording requirements
|
Requirements may be documented in various forms, such as natural language documents, use cases, user stories, or process specifications
|
|
Define LAN
|
Local Area Network
|
|
Define WAN
|
Wide Area Network
|
|
Define VPN
|
Virtual Private Network
|
|
Define protocol
|
set of rules that govern the operation of a network
|
|
Define bandwidth
|
the speed of your connection/network (kbps, mbps)
|
|
Define internet
|
global "network of networks" using TCP (Transmission Control Protocol)/IP (Internet Protocol)
|
|
Define world wide web
|
way of organizing and accessing information stored on the computers of the Internet (http, html are protocols)
|
|
Name the three architectures discussed in class
|
1. Single-tier
2. Client/ Server 3. Multi-tier |
|
Define single-tier
|
terminal communicates to a computer – mainframe
|
|
Define Client/server
|
some processing on PC, some on a server
|
|
Define Multi-tier
|
some processing on PC, some on one of multiple servers
|
|
In client/server architecture, what functions are performed by the client? The server?
|
The client requests something from the server and presents response. \ The server responds to the client.
|
|
What are the three tiers of three-tier architecture?
|
1. Presentation tier
2. Logic tier 3. Data tier |
|
Define presentation tier
|
topmost level of the application is the user interface, main function of interface is to translate tasks and results to something the user can understand
|
|
Define logic tier
|
coordinates the application, processes commands, makes logical decisions and evaluations, and performs calculations, moves and processes data between the two surrounding layers
|
|
Define data tier
|
information is stored and retrieved from a database or file system, then passed back to the logic tier for processing, then back to the user
|
|
Contrast the Internet and the World Wide Web
|
1. The Internet is a global "network of networks", while the World Wide Web is a way of organizing and accessing information stored on the computers of the Internet.
2. The Web "runs" on the Internet. The Web is a program, the Internet is a tool or machine that runs the program. 3. The Web is a way of organizing the information on the Internet. The Internet is a vehicle or storage system for the Internet. |
|
List Web 2.0 examples
|
1. Google docs
2. Facebook, My Space 3. Blogs 4. Wikis |
|
List the five characteristics of a Web 2.0 application
|
1. Network as a platform
2. Users own and control the data on the site 3. Architecture of participation 4. Rich, interactive interface 5. Social networking aspects |
|
What are the two most important protocols related to the Internet?
|
http and html
|
|
Define http
|
HyperText Transfer Protocol
|
|
Define html
|
HyperText Markup Language
|
|
What is TCP
|
(Transmission control protocol)
-Protocol (rules) for communicating over the Internet (along with TCP). TCP is in charge of keeping track of data packets that make up the message being sent over the Internet. Messages are broken up into packets for efficient transmission. |
|
What is IP
|
(Internet protocol)
-IP specifies the format of packets, also called datagrams, and the addressing scheme. IP address is a set of four numbers, separated by periods. 128.173.171.63 |
|
What is ISP
|
(Internet Service Provider)
-Company that gives an individual or organization access to the Internet |
|
What is PMI
|
(project management Institute)
-PMI has more than 200,000 members in over 150 countries. According to the PMI Website, PMI "… is the world's foremost advocate for the project management profession." |
|
What is dns?
|
(domain name system (service or server )
-An Internet-related service that translates domain names into Internet Protocol (IP) numeric addresses |
|
What is SSL?
|
(security sockets layer)
-A protocol (set of rules) used for transmitting sensitive data (such as credit card info) over the Internet. Web pages using SSL typically start with https:// |
|
What is a weblog?
|
Web log
A Web page that is like a personal journal that the author makes available to the public. |
|
What is a portal?
|
Web site or service that is an entry to other Web sites or systems.
|
|
What is the SOX (Sarbanes-Oxley Act of 2002)
|
Enacted in response to the financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices
Includes provisions for oversight and regulation of accounting firms, auditor independence, corporate governance and financial disclosure |
|
What are the three constraints of the project triangle?
|
time, cost, and scope
|
|
Define time
|
1. Not considered a cost nor a resource since the project manager cannot control the rate at which it is expended. This makes it different from all other resources and cost categories
2. For analytical purposes, the time required to produce a deliverable is estimated using several techniques. One method is to identify tasks needed to produce the deliverables documented in a work breakdown structure or WBS. The work effort for each task is estimated and those estimates are rolled up into the final deliverable estimate. |
|
Define cost
|
To develop a project depends on several variables including (chiefly): resource quantities, labor rates, material rates, risk management (i.e.cost contingency), Earned value management, plant (buildings, machines, etc.), equipment, cost escalation, indirect costs, and profit.
|
|
Define scope
|
Requirements specified for the end result. The overall definition of what the project is supposed to accomplish, and a specific description of what the end result should be or accomplish. A major component of scope is the quality of the final product. The amount of time put into individual tasks determines the overall quality of the project.
|
|
Define: project
|
"Temporary endeavor undertaken to produce a unique product or service".
Has definite beginning and end |
|
Define project management
|
"… application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations …"
|
|
What are the five project activities discussed in class?
|
1. Initiating
2. Planning 3. Controlling 4. Executing 5. Closing |
|
What is a Work Breakdown Structure? What is it's purpose?
|
1. Divides a project into tasks/activities 2. ID major tasks
3. Break down into subtasks 4. Well defined 5. Can be estimated and tracked 6. Identify task dependencies --> E.g. Task B requires completion of Task A 7. Assign responsibility for each (sub)task 8. Results are measured in terms of progress/completion of tasks |
|
What are the five steps in creating a WBS?
|
1. Familiarize yourself with the project.
2. ID all major tasks required to achieve goals. 3. Break into subtasks (repeat until you have manageable granularity) 4. ID responsibility for each lower level task. 5. Determine resource (time & personnel) requirements for each lowest level task |
|
Name five types of feasibility considered in a business case?
|
1. Economic feasibility
2. Technical feasibility 3. Organizational feasibility 4. Legal feasibility 5. Ethical feasibility |
|
Define TCO
|
(Total cost of ownership)
1. Direct costs 2. Hardware, software, consultants 3. Indirect costs 4. Productivity loss during project/changeover 5. Quality assurance 6. Ongoing costs 7. Training, maintenance, upgrades, etc. |
|
Define TBO
|
(Total benefits of ownership)
1. Tangible benefits 2. Costs savings 3. Increased accuracy (reduced errors) 4. Improved workflow 5. Improved decision making 6. Intangible benefits 7. Increased customer satisfaction 8. Increased employee satisfaction 9. Reputation |
|
What are the five characteristics of a S.M.A.R.T. project objective?
|
1. Specific
2. Mesureable 3. Acheivable 4. Relevant 5. Time-bound |
|
Define entity
|
a person, place, thing, transaction, or event about which information is stored
The rows in each table contain the entities (Entity class a collection of similar entities) |
|
Define attribute
|
Characteristics or properties of an entity class
-The columns in each table contain the attributes |
|
Define relationship
|
an association among two or more entities. For example, a STUDENTS entity might be related to a COURSES entity, or an EMPLOYEES entity might be related to an OFFICES entity
|
|
Define primary key
|
field(s) that uniquely identifies a given entity in a table
|
|
Define foreign key
|
attribute in a table that references a primary key in a related table
|
|
In what form does a relational database store information?
|
Stores information in the form of logically related two-dimensional tables
|
|
How are primary keys and foreign keys related?
|
Primary keys and foreign keys identify the various entity classes (tables) in the database
|
|
What are ethics?
|
The principles and standards that guide our behavior toward other people
|
|
What are the five important ethical issues related to IT?
|
1. Intellectual property
2. Copyright 3. Fair use doctrine 4. Pirated software 5. Counterfit software |
|
What is privacy?
|
"The right to be left alone".
|
|
What are Mason's four areas of managerial concern?
|
1. Privacy
2. Accuracy 3. Property 4. Accessibility |
|
Define privacy
|
What information must a person reveal about one's self to others?
What information should others be able to access about you – with or without your permission? What safeguards exist for your protection? |
|
Define accuracy
|
Who is responsible for the reliability and accuracy of information? Who will be accountable for errors?
|
|
Define property
|
Who is responsible for the reliability and accuracy of information? Who will be accountable for errors?
|
|
define accessibility
|
What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
|
|
Describe the workplace monitoring dilemma faced by managers
|
1. Not monitoring puts the organization at risk, but some find monitoring unethical.
2. If you monitor, inform employees of when, where and how you will monitor. |
|
Name the 9 characteristics of a system
|
1. Components
2. Interrelated components 3. Boundary 4. Purpose 5. Environment 6. Interfaces 7. Constraints 8. Input 9. Output |
|
What is the general purpose for most business systems?
|
For most business systems the general purpose is activities aimed at creating value for customers or building valuable assets for future use.
|
|
Name the five phases in the SDLC
|
1. Planning
2. Analysis 3. Design 4. Implementation 5. Use |
|
Describe Planning
|
Why build the system?
|
|
Describe Analysis
|
Who, what, when, where will the system be?
|
|
Describe Design
|
How will the system work?
|
|
Describe implementation
|
System delivery and operation
|
|
Describe use
|
Actually use and maintain the system
|
|
What are the seven major attributes of the SDLC?
|
1. Phases are not necessarily sequential
2. Each phase has a specific outcome 3. Individual companies use customized life cycle (methodology) 4. Moves systematically through phases where each phase has a standard set of outputs 5. Produces project deliverables 6. Results in actual information system 7. Uses gradual refinement |
|
Name the three activities that occur in the implementation phase of the SDLC
|
1. Construction
2. Installation 3. Training |
|
What is an enterprise system
|
An enterprise system is one which attempts to integrate all departments and functions across a company into a single computer system that can serve all those departments' particular needs.
|
|
Name three large ERP Vendors
|
1. SAP (Systems, Analysis and Products in Data Processing)
2. Oracle/PeopleSoft/J. D. Edwards (J.D. Orisoft) 3. Microsoft Great Plains, aimed at smaller companies SAP Business One is competing product |
|
Name five major reasons companies implement enterprise systems
|
The Benefits of ERP
1. Integrate financial information 2. Integrate customer information 3. Standardize and speed up manufacturing processes 4. Reduce inventory 5. Standardize HR information |
|
Name ten hidden costs of enterprise system implementation
|
1. Training
2. Integration and testing 3. Customization 4. Data conversion 5. Data analysis 6. Consultants ad infinitum 7. Replacing your best and brightest 8. Implementation teams can never stop 9. Waiting for ROI (Return on Investment) 10.Post- ERP depression |
|
Name the components of a use case diagram
|
• Actor
• Use Case • System Boundary |
|
Contrast functional and non-functional requirements
|
Functional – what the system does
- The system shall … 2. Non-functional – how well the system meets the functional requirements - Usability - Speed - Reliability - We're focusing on functional requirements |
|
List the five characteristics of a "good" requirement
|
1. Correct & Complete – Who determines if correct?
2. Feasible – Feasible in terms of what? 3. Necessary – How can we determine? 4. Unambiguous – Who's the audience? 5. Verifiable – What is the basis for testing? |