Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
55 Cards in this Set
- Front
- Back
The process we would follow to build an info system
|
Systems Development Methodology
|
|
1-planning 2-sys analysis 3-sys design 4-development 5-testing 6-implementation 7- maintenance
|
Systems Development Life Cycle
|
|
Use a top-down approach to show how data flows through the organization
|
Data Flow Diagrams
|
|
Software programs that ease the systems development process by providing graphical tools that systems analysts can use to develop diagrams
|
CASE tools
|
|
A document that details a systems functionality, meaning what the system should do
|
Logical Systems Design
|
|
Document that dexcribes the actual componets the team will use to achieve that funcionality
|
Physical Systems Design
|
|
Shows the overall, top-down representation of the modules that make up the entire system
|
Structure Chart
|
|
The expansion of a project beyond the frozen specification
|
Scope Creep
|
|
Occurs when the client asks for additional features and upgrades to the frozen design
|
Feature Creep
|
|
Implementation when it quickly changes an old system to a new one
|
Direct Cutover
|
|
A company installs a new system alongside its old system
|
Parallel Conversion
|
|
A company installs a new system at only one location or in one department
|
Pilot Testing
|
|
A company only implements parts of its new system
|
Staged Conversion
|
|
Is a systems development approach in which a team quickly gathers a limited set of user requirements and then builds a working model of the proposed system
|
Prototyping
|
|
Brings together end users and a development team in workshop
|
Joint Application Development (JAD)
|
|
Is a methodology that combines JAD , prototyping, and integrated CASE tools to decrease the time required for systems development
|
Rapid Application Developmen (RAD)
|
|
Users creating a system by themselves
|
User End Development
|
|
Sytems analyst attempts to understand an org. in terms of its objects (customers, products, employees, and so on)
|
Object-oriented analysis and design
|
|
A document that details the requirements of the new system and invites interested parties to submit a proposal.
|
Request for Proposals (RFP)
|
|
The process of running a system with sample data to see how it preforms
|
Benchmarking
|
|
A compnay Transfers responsibility for a specific information technology function to an external vendor
|
Outsourcing
|
|
A contract that outlines what functions and products the outsourcing company will provide and at what levels
|
Service Level Agreement
|
|
A virus that spreads itself over a computer network, most often the internet
|
Worm
|
|
Refers to a clever programer who might break into a computer system to learn about it, not to cause damage or steal information
|
Hacker
|
|
A programmer who breaches systems to cause damage and steal info
|
Cracker
|
|
A hacker or cracker uses computer programs to analyze systems, identify vulnerabilities, and execute attack
|
Technical Attack
|
|
Tries millions of user names and passwords until it eventually finds a match
|
Brute Force Attack
|
|
Process of tricking a person into doing something they would not ordinarly do, such as revealing a password
|
social Engineering
|
|
A person with little or no programming skill who used publicly available software to breach systems
|
Script Kiddie
|
|
Securing the actual space where a computer system resides
|
Physical Access Control
|
|
Software programs that usually run on a special server, and that constantly monitor corporate systems for patterns of suspicious user behavior
|
Intrusion Detection Systems
|
|
A computer system that is specifically set up to trap intruders
|
Honey Pot
|
|
Describes any event that might disrupt a business, including security breaches
|
Business Continuity
|
|
Specifies how an organization will reduce the risk of a disaster and how it will recover when one occurs
|
Disaster Recovery Plan
|
|
To assign a level of risk and priority to each componet of a companies info system
|
Business impact analyisis
|
|
A battery that takes over when the power fails and allows system admins to shut down computers without losing data
|
Uniteruptable Power Supply (UPS)
|
|
Usually owned by a third party, that already has some hardware and network cabling installed
|
Cold SIte
|
|
A Facility that already has info systems installed and running
|
Hot Site
|
|
Powerful tool for analyzing the activities within an org. that bring products and services to market
|
Value Chain Analysis
|
|
A 5 part technique that is used for analyzing industry structure and competition
|
Competitive Forces Model
|
|
Consists of qualities such as low costs or a unique product, that allow a company to earn above-average profits within an industry
|
Competitive Advantage
|
|
Focuses on providing high quality goods and services at the lowest price
|
Cost Leadership Strategy
|
|
Provide unique products and services taht customers value
|
Differentiation Strategy
|
|
To find or develop a niche market and use either a cost leadership or differentiation strategy to dominate it
|
Focus Strategy
|
|
A strategic planning method that translates business strategy into a comprehensive set of performance measures
|
Balanced Scorecard
|
|
Uses costs and benfits of an investment to determine by what percent the benefits will exceed costs
|
Return on Investments (ROI)
|
|
Method that attempts to quantify long term direct and indirect costs of informal systems
|
Total Cost of Ownership
|
|
those that can b expressed as a monetary figure, such a cost savings
|
Tangible Measures
|
|
Measures that cannot be expressed monetairly, such as improved customer service
|
Intangible Measures
|
|
Treats info systems assets like a portfolio of financil assets
|
Information Systems Portfolio
|
|
The process by which organizations extract value from knowledge assets
|
Knowledge Management
|
|
Formilized and stored in a searchable manner, such as paper or computer files
|
Explicit Knowledge
|
|
Informal, consisting of memory, experience and people skills
|
Tacit Knowledge
|
|
Information technologies that enable the exchange of knowledge anong employees and the storage of knowledge repositories
|
knowledge management systems
|
|
An electronic phonebook that includes employees contact info as well as their expertise
|
Expert Directory
|