• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
Why is rapid application development rapid?
The basic idea is to break up the design and implementation phases of the SDLC into smaller chunks and to design and implement those chunks using as much computer assistance as possible.
What are the main RAD characteristics?
1. The design/implementation/fix development process
2. Continuous user involvement throughout
3. Extensive use of prototypes
4. Joint application design
5. Use of CASE tools
What is object-oriented development?
A system of development methodology that arose from the discipline of object-oriented programming. OOD develops programs using the object-oriented programming (OOP) techniques. Programs developed using OOP are easier to maintain than those developed using traditional techniques.
What are the phases and principles of the Unified Process?
1. inception
2. transition
3. maintenance
4. elaboration
5. construction
What is extreme about extreme programming?
Programmers create only features and functions of the new program that they can complete in two weeks or less.

Distinguished by 3 characteristics:
1. It is customer centric
2. It uses just-in-time design
3. It involves paired programming
What is outsourcing?
Outsourcing is the process of hiring an organization to perform a service.
Why do organizations outsource IT and IS services?
Management advantages: obtain expertise, avoid management problems, free management time
Cost reduction: obtain part-time services, gain economies of scale
Risk reduction: cap financial risk, improve quality, reduce implementation risk
What are popular outsourcing alternatives?
One can outsource the acquisition and operation of computer hardware (hardware). Acquiring licensed software (software). Outsource an entire system (hardware, software, data, and some procedures). Outsourcing an entire business function (hardware, software, data, procedures, people)
What are the risks of outsourcing?
Loss of control, benefits outweighed by long-term costs, no easy exit
What are the costs in a typical IT budget?
hardware, software license fees, operations, maintenance, personnel, training, deployment and systems development, procurement, backup/recovery/disaster preparedness
Who pays IT costs?
Small organizations: IT costs are just accumulated and not assigned to departments or users. IT costs are just an overhead expense
Large organizations: IT costs are allocated to the users, sometimes called a chargeback expense.
What are tangible costs and benefits?
Costs: Computer hardware, software licensing fees, IT department personnel, WAN and ISP communication fees.
Benefit: labor savings, material savings, service cost savings
What are intangible costs and benefits?
Cost: Management reviews, lost user time, lost opportunities, customer badwill
Benefit: improved morale, more information, customer goodwill
How are IT projects evaluated?
Choose the cheapest alternative that will do the job. Be sure to consider total cost of ownership. Small or cheap systems can use back-of-the envelope assessment.
How is total cost of ownership used to compare alternatives?
(TCO= sum of all costs of the system)
Estimate lifetime costs, choose alternative with lowest cost. (Ex. Microsoft charges license fees not charged by linux, but offers training support that you have to pay a lot for with linux)
What are the elements of a security policy?
The first is a general statement of the organization's security program. The second is issue-specific policy. The third is system-specific policy.
What is the difference between risk and uncertainty?
Risk is the likelihood of an adverse occurrence. Uncertainty refers to the things we don't know we don't know.
How do managers assess risk?
Assess what the threats are, how likely they are to occur, and the consequences. Assess the threats to which they are exposed. Determine what safeguards are in place to protect company assets from the identified threats.
Why are risk management decisions difficult?
Management must decide if the costs of the safeguard are worth the benefit of probable loss reduction.