Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
72 Cards in this Set
- Front
- Back
What is the difference between insourcing and self-sourcing?
|
Self-sourcing allows for end user development; insourcing requires internal IT staff.
|
|
What is the waterfall methodology?
|
A sequential, activity based SDLC
|
|
What document defines the what, when, and who questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity?
|
Project Plan
|
|
If you were the marketing director and involved in the design and development of a new marketing application, which phase would your responsibilities begin to lessen with this new project?
|
Development
|
|
If you were to allow only a select group of people to use the new system so that you could determine if it was working correctly, what type of implementation method would you be following?
|
Pilot Implementation
|
|
Which of the following greatly accelerates the collecting of business requirements and the development of the software?
|
End-User Involvement
|
|
What are the 3 “who” choices when developing a new system?
|
1) Insourcing – IT specialists inside your organization
2) Self-sourcing – do-it-yourself approach many end users take with little or no help from IT specialists 3) Outsourcing – a third-party organization (i.e., let someone do the work and pay them for it) |
|
What is the Systems Development Life Cycle (SDLC)?
|
A structured step-by-step approach for developing information systems
|
|
What is a project scoop?
|
The project scoop is what are we trying to accomplish, how much will it cost, what schedule should we use.
|
|
Which of the following IT tools are often used for self-sourcing?
|
Spreadsheets, database management and Web development are all common self-sourcing tools
|
|
Does self-sourcing encompass prototyping?
|
Yes
|
|
What is a formal document that describes in detail your logical requirements for a proposed system and invites vendors to submit bids for its development?
|
Request for Proposal (RFP)
|
|
What is the Planning Phase
|
It Creates a solid plan for developing your information system
|
|
What are the three primary planning activities?
|
1) Define the System to be developed
2) Set the Project Scope 3) Develop the project plan including tasks, resources, and timeframes |
|
What is Scope Creep?
|
Occurs when the scope of the project increases
|
|
What is Feature Creep?
|
Occurs when developers add extra features that were not part of the initial requirements
|
|
What are Project Milestones?
|
They represent key dates for which you need a certain group of activities performed
|
|
What is the trend called when a U.S. company outsources IT functions to other countries?
|
Offshore Outsourcing
|
|
What is the Analysis phase?
|
Involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system
|
|
What are the two Primary analysis activities?
|
1) Gather the business requirements
2) Joint application development (JAD) |
|
What are the SDLC Phases & Major Activities?
|
Planning, Analysis, Design, Development, Testing, Implementation, Maintenance
|
|
What is a Prototype?
|
A Model of a proposed product, service, or system
|
|
What is Prototyping?
|
The Process of building a model that demonstrates the features of a proposed product, service, or system
|
|
What is Proof-of-Concept Prototyping?
|
Used to prove the technical feasibility of a proposed system
|
|
What is Selling Prototype?
|
Used to convince people of the worth of a proposed system
|
|
What are the four steps of the prototyping process?
|
1) Identify basic requirements
2) Develop initial prototype 3) User Review 4) Revise and enhance the prototype |
|
What is Outsourcing?
|
The delegation of specified work to a third party for a specified length of time, at a specified cost, and at a specified level of service
|
|
What are the main reasons behind the rapid growth of the outsourcing industry?
|
Globalization, The Internet, Growing economy and low unemployment rate, Technology, and Deregulation
|
|
What is Request for Proposal?
|
A formal document that describes in excruciating detail your logical requirements for a proposed system and invites outsourcing organizations (vendors) to submit bids for its development
|
|
What are the three different forms of outsourcing?
|
Onshore Outsourcing, Near-shore Outsourcing, and Offshore Outsourcing
|
|
What is Back Shoring?
|
Partnered with someone else in an offshoring or a near-shoring environment and bringing it back to the main country
|
|
What are the Primary Outsourcing countries
|
India, China, Eastern Europe, Ireland, Israel, Philippines
|
|
What are the Different Tiers of the IT system?
|
1) 1-tier - single machine
2) 2-tier - basic client/server relationship 3) 3-tier - Client, application server, data or database server 4) N-tier - Scalable 3-tier structure with more servers |
|
What is Cloud Computing
|
Model in which any and all IT resources are delivered as a set of services via the Internet
|
|
What is Efficiency?
|
Doing something right
|
|
What is Effectiveness?
|
Doing the right things
|
|
Which category of business application satisfies the SOA philosophy for the end user?
|
ERP
|
|
According to the SOA philosophy, what is the most important organizational resource?
|
Information
|
|
Which of the following is not a reason for the rapid increase in ERP systems?
|
Increase investments in data warehousing and mining
|
|
What type of technology would allow a customer in a SOA environment to connect to any communications channel (e.g., fax or Web) in an organization?
|
Plug-and-Play
|
|
Which type of infrastructure must determine the location of specific applications and information before it can respond to requests from end users or applications?
|
Distributed
|
|
Which metric assesses whether or not some function or task is completed the fastest?
|
Efficiency
|
|
Which metric assesses whether or not the right functions or tasks were executed?
|
Effectiveness
|
|
If you were to determine the number of people who bought some item from your Web site and compare this to the number of visitors, what metric would you measure?
|
Conversion Rate
|
|
If you were to call your health insurance company about a medical procedure you needed, and your questions were answered immediately, what metric would your call apply to?
|
First Call Resolution (FCR)
|
|
What organizational methodology develops detailed guidelines for disaster and recovery efforts?
|
Business Continuity Planning
|
|
There are two fundamental factors that determine your ethical reaction to dilemmas. What is one of them?
|
Your Basic Ethical Structure
|
|
There are different levels of uncertainty when faced with ethical decisions; each creates a sort of ring around the dilemma. What is true of the outside level or ring?
|
The behavior or actions aren't considered awful and are more accepted by society.
|
|
Your decisions regarding ethics are influenced by a number of factors. Which is not one of these factors?
|
Your age, gender, education, and socio-economic status
|
|
Which type of law allows people to use copyrighted material in teaching environments without obtaining the consent of the owner of this material?
|
Fair Use Doctrine
|
|
If you were to download a computer game from the Internet and then sell this game to your friends, what would you be doing to the person who developed the game?
|
Pirating their software
|
|
If an auto insurance company wanted to determine actions of the driver during an accident, what device could they examine during their investigation?
|
The EDR
|
|
How can you block a business' attempt to store information about your Web activities?
|
Block Cookies
|
|
What is the difference between spam and phishing?
|
Phishing attempts to get your personal information; spam does not
|
|
What type of hardware and/or software should you install to protect your computer from intruders entering into your system from your network connection?
|
Firewall
|
|
What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
|
Public Key Encryption
|
|
What is pirated software?
|
The unauthorized use, duplication, distribution, or sale of copyrighted software
|
|
What is privacy?
|
The right to be left alone when you want to be, to have control over your own personal possissions, and not to be observed without your consent
|
|
What is identity theft?
|
The forging of someone's identity for the purpose of fraud
|
|
What is pharming?
|
Rerouting your request for a legitimate web site sending it to a slightly different web address or by redirecting you after you are already on the legitimate site
|
|
What is a cookie?
|
A small file that contains information about you and your Web activities, which a Web site places on your computer
|
|
What is Spam
|
Unsolicited e-mail from businesses advertising goods and services
|
|
If you were traveling abroad and needed to use some software that you did not currently have, and did not want to purchase, what type of software could you rent during this trip?
|
Software-as-a-Service (SaaS)
|
|
What is push technology?
|
Businesses come to you with information, services, and product offerings
|
|
Which of the following is an e-commerce model in which a consumer communicates through an Internet company with a manufacturer to create customized products?
|
F2B2C (Factory to Business to Customer)
|
|
What new Web environment features online collaboration, dynamic and customized feeds, and greater control of Web content by users?
|
Web 2.0
|
|
If you were reading an article located on a Web site and were able to update the article based on information that you discovered from your work, what type of Web site would you be working on?
|
Wiki
|
|
What is the difference between a social networking site and a blog?
|
Social networking sites create a community of people; blogs keep people informed
|
|
How do CAVEs create, capture, and display images?
|
Holographic devices
|
|
Fingerprints are an example of which form of biometric security?
|
Who you are
|
|
Passive RFID chip have specific characteristics. Which of the following is not one of these?
|
A constant flow radio signal emit from it
|
|
What discipline seeks to control matter at the atomic and subatomic levels for the purpose of building devices on the same small scale?
|
Nanotechnology
|