Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/55

Click to flip

55 Cards in this Set

  • Front
  • Back
The process we would follow to build an info system
Systems Development Methodology
1-planning 2-sys analysis 3-sys design 4-development 5-testing 6-implementation 7- maintenance
Systems Development Life Cycle
Use a top-down approach to show how data flows through the organization
Data Flow Diagrams
Software programs that ease the systems development process by providing graphical tools that systems analysts can use to develop diagrams
CASE tools
A document that details a systems functionality, meaning what the system should do
Logical Systems Design
Document that dexcribes the actual componets the team will use to achieve that funcionality
Physical Systems Design
Shows the overall, top-down representation of the modules that make up the entire system
Structure Chart
The expansion of a project beyond the frozen specification
Scope Creep
Occurs when the client asks for additional features and upgrades to the frozen design
Feature Creep
Implementation when it quickly changes an old system to a new one
Direct Cutover
A company installs a new system alongside its old system
Parallel Conversion
A company installs a new system at only one location or in one department
Pilot Testing
A company only implements parts of its new system
Staged Conversion
Is a systems development approach in which a team quickly gathers a limited set of user requirements and then builds a working model of the proposed system
Prototyping
Brings together end users and a development team in workshop
Joint Application Development (JAD)
Is a methodology that combines JAD , prototyping, and integrated CASE tools to decrease the time required for systems development
Rapid Application Developmen (RAD)
Users creating a system by themselves
User End Development
Sytems analyst attempts to understand an org. in terms of its objects (customers, products, employees, and so on)
Object-oriented analysis and design
A document that details the requirements of the new system and invites interested parties to submit a proposal.
Request for Proposals (RFP)
The process of running a system with sample data to see how it preforms
Benchmarking
A compnay Transfers responsibility for a specific information technology function to an external vendor
Outsourcing
A contract that outlines what functions and products the outsourcing company will provide and at what levels
Service Level Agreement
A virus that spreads itself over a computer network, most often the internet
Worm
Refers to a clever programer who might break into a computer system to learn about it, not to cause damage or steal information
Hacker
A programmer who breaches systems to cause damage and steal info
Cracker
A hacker or cracker uses computer programs to analyze systems, identify vulnerabilities, and execute attack
Technical Attack
Tries millions of user names and passwords until it eventually finds a match
Brute Force Attack
Process of tricking a person into doing something they would not ordinarly do, such as revealing a password
social Engineering
A person with little or no programming skill who used publicly available software to breach systems
Script Kiddie
Securing the actual space where a computer system resides
Physical Access Control
Software programs that usually run on a special server, and that constantly monitor corporate systems for patterns of suspicious user behavior
Intrusion Detection Systems
A computer system that is specifically set up to trap intruders
Honey Pot
Describes any event that might disrupt a business, including security breaches
Business Continuity
Specifies how an organization will reduce the risk of a disaster and how it will recover when one occurs
Disaster Recovery Plan
To assign a level of risk and priority to each componet of a companies info system
Business impact analyisis
A battery that takes over when the power fails and allows system admins to shut down computers without losing data
Uniteruptable Power Supply (UPS)
Usually owned by a third party, that already has some hardware and network cabling installed
Cold SIte
A Facility that already has info systems installed and running
Hot Site
Powerful tool for analyzing the activities within an org. that bring products and services to market
Value Chain Analysis
A 5 part technique that is used for analyzing industry structure and competition
Competitive Forces Model
Consists of qualities such as low costs or a unique product, that allow a company to earn above-average profits within an industry
Competitive Advantage
Focuses on providing high quality goods and services at the lowest price
Cost Leadership Strategy
Provide unique products and services taht customers value
Differentiation Strategy
To find or develop a niche market and use either a cost leadership or differentiation strategy to dominate it
Focus Strategy
A strategic planning method that translates business strategy into a comprehensive set of performance measures
Balanced Scorecard
Uses costs and benfits of an investment to determine by what percent the benefits will exceed costs
Return on Investments (ROI)
Method that attempts to quantify long term direct and indirect costs of informal systems
Total Cost of Ownership
those that can b expressed as a monetary figure, such a cost savings
Tangible Measures
Measures that cannot be expressed monetairly, such as improved customer service
Intangible Measures
Treats info systems assets like a portfolio of financil assets
Information Systems Portfolio
The process by which organizations extract value from knowledge assets
Knowledge Management
Formilized and stored in a searchable manner, such as paper or computer files
Explicit Knowledge
Informal, consisting of memory, experience and people skills
Tacit Knowledge
Information technologies that enable the exchange of knowledge anong employees and the storage of knowledge repositories
knowledge management systems
An electronic phonebook that includes employees contact info as well as their expertise
Expert Directory