• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/72

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

72 Cards in this Set

  • Front
  • Back
What is the difference between insourcing and self-sourcing?
Self-sourcing allows for end user development; insourcing requires internal IT staff.
What is the waterfall methodology?
A sequential, activity based SDLC
What document defines the what, when, and who questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity?
Project Plan
If you were the marketing director and involved in the design and development of a new marketing application, which phase would your responsibilities begin to lessen with this new project?
Development
If you were to allow only a select group of people to use the new system so that you could determine if it was working correctly, what type of implementation method would you be following?
Pilot Implementation
Which of the following greatly accelerates the collecting of business requirements and the development of the software?
End-User Involvement
What are the 3 “who” choices when developing a new system?
1) Insourcing – IT specialists inside your organization
2) Self-sourcing – do-it-yourself approach many end users take with little or no help from IT specialists
3) Outsourcing – a third-party organization (i.e., let someone do the work and pay them for it)
What is the Systems Development Life Cycle (SDLC)?
A structured step-by-step approach for developing information systems
What is a project scoop?
The project scoop is what are we trying to accomplish, how much will it cost, what schedule should we use.
Which of the following IT tools are often used for self-sourcing?
Spreadsheets, database management and Web development are all common self-sourcing tools
Does self-sourcing encompass prototyping?
Yes
What is a formal document that describes in detail your logical requirements for a proposed system and invites vendors to submit bids for its development?
Request for Proposal (RFP)
What is the Planning Phase
It Creates a solid plan for developing your information system
What are the three primary planning activities?
1) Define the System to be developed
2) Set the Project Scope
3) Develop the project plan including tasks, resources, and timeframes
What is Scope Creep?
Occurs when the scope of the project increases
What is Feature Creep?
Occurs when developers add extra features that were not part of the initial requirements
What are Project Milestones?
They represent key dates for which you need a certain group of activities performed
What is the trend called when a U.S. company outsources IT functions to other countries?
Offshore Outsourcing
What is the Analysis phase?
Involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system
What are the two Primary analysis activities?
1) Gather the business requirements
2) Joint application development (JAD)
What are the SDLC Phases & Major Activities?
Planning, Analysis, Design, Development, Testing, Implementation, Maintenance
What is a Prototype?
A Model of a proposed product, service, or system
What is Prototyping?
The Process of building a model that demonstrates the features of a proposed product, service, or system
What is Proof-of-Concept Prototyping?
Used to prove the technical feasibility of a proposed system
What is Selling Prototype?
Used to convince people of the worth of a proposed system
What are the four steps of the prototyping process?
1) Identify basic requirements
2) Develop initial prototype
3) User Review
4) Revise and enhance the prototype
What is Outsourcing?
The delegation of specified work to a third party for a specified length of time, at a specified cost, and at a specified level of service
What are the main reasons behind the rapid growth of the outsourcing industry?
Globalization, The Internet, Growing economy and low unemployment rate, Technology, and Deregulation
What is Request for Proposal?
A formal document that describes in excruciating detail your logical requirements for a proposed system and invites outsourcing organizations (vendors) to submit bids for its development
What are the three different forms of outsourcing?
Onshore Outsourcing, Near-shore Outsourcing, and Offshore Outsourcing
What is Back Shoring?
Partnered with someone else in an offshoring or a near-shoring environment and bringing it back to the main country
What are the Primary Outsourcing countries
India, China, Eastern Europe, Ireland, Israel, Philippines
What are the Different Tiers of the IT system?
1) 1-tier - single machine
2) 2-tier - basic client/server relationship
3) 3-tier - Client, application server, data or database server
4) N-tier - Scalable 3-tier structure with more servers
What is Cloud Computing
Model in which any and all IT resources are delivered as a set of services via the Internet
What is Efficiency?
Doing something right
What is Effectiveness?
Doing the right things
Which category of business application satisfies the SOA philosophy for the end user?
ERP
According to the SOA philosophy, what is the most important organizational resource?
Information
Which of the following is not a reason for the rapid increase in ERP systems?
Increase investments in data warehousing and mining
What type of technology would allow a customer in a SOA environment to connect to any communications channel (e.g., fax or Web) in an organization?
Plug-and-Play
Which type of infrastructure must determine the location of specific applications and information before it can respond to requests from end users or applications?
Distributed
Which metric assesses whether or not some function or task is completed the fastest? 
Efficiency
Which metric assesses whether or not the right functions or tasks were executed?
Effectiveness
If you were to determine the number of people who bought some item from your Web site and compare this to the number of visitors, what metric would you measure?
Conversion Rate
If you were to call your health insurance company about a medical procedure you needed, and your questions were answered immediately, what metric would your call apply to?
First Call Resolution (FCR)
What organizational methodology develops detailed guidelines for disaster and recovery efforts?
Business Continuity Planning
There are two fundamental factors that determine your ethical reaction to dilemmas. What is one of them?
Your Basic Ethical Structure
There are different levels of uncertainty when faced with ethical decisions; each creates a sort of ring around the dilemma. What is true of the outside level or ring?
The behavior or actions aren't considered awful and are more accepted by society.
Your decisions regarding ethics are influenced by a number of factors. Which is not one of these factors?
Your age, gender, education, and socio-economic status
Which type of law allows people to use copyrighted material in teaching environments without obtaining the consent of the owner of this material?
Fair Use Doctrine
If you were to download a computer game from the Internet and then sell this game to your friends, what would you be doing to the person who developed the game?
Pirating their software
If an auto insurance company wanted to determine actions of the driver during an accident, what device could they examine during their investigation?
The EDR
How can you block a business' attempt to store information about your Web activities?
Block Cookies
What is the difference between spam and phishing?
Phishing attempts to get your personal information; spam does not
What type of hardware and/or software should you install to protect your computer from intruders entering into your system from your network connection?
Firewall
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
Public Key Encryption
What is pirated software?
The unauthorized use, duplication, distribution, or sale of copyrighted software
What is privacy?
The right to be left alone when you want to be, to have control over your own personal possissions, and not to be observed without your consent
What is identity theft?
The forging of someone's identity for the purpose of fraud
What is pharming?
Rerouting your request for a legitimate web site sending it to a slightly different web address or by redirecting you after you are already on the legitimate site
What is a cookie?
A small file that contains information about you and your Web activities, which a Web site places on your computer
What is Spam
Unsolicited e-mail from businesses advertising goods and services
If you were traveling abroad and needed to use some software that you did not currently have, and did not want to purchase, what type of software could you rent during this trip?
Software-as-a-Service (SaaS)
What is push technology?
Businesses come to you with information, services, and product offerings
Which of the following is an e-commerce model in which a consumer communicates through an Internet company with a manufacturer to create customized products?
F2B2C (Factory to Business to Customer)
What new Web environment features online collaboration, dynamic and customized feeds, and greater control of Web content by users?
Web 2.0
If you were reading an article located on a Web site and were able to update the article based on information that you discovered from your work, what type of Web site would you be working on?
Wiki
What is the difference between a social networking site and a blog?
Social networking sites create a community of people; blogs keep people informed
How do CAVEs create, capture, and display images?
Holographic devices
Fingerprints are an example of which form of biometric security?
Who you are
Passive RFID chip have specific characteristics. Which of the following is not one of these?
A constant flow radio signal emit from it
What discipline seeks to control matter at the atomic and subatomic levels for the purpose of building devices on the same small scale? 
Nanotechnology