2602 - Basic Information System Acquisitions Flashcards Preview

AIPM Test 2 > 2602 - Basic Information System Acquisitions > Flashcards

Flashcards in 2602 - Basic Information System Acquisitions Deck (20)
Loading flashcards...
1

What is the capability to collect, process and disseminate an uninterrupted flow of precise and reliable information, while exploiting or denying the ability of an adversary to do the same.

Information superiority

2

The best approach to manage a complex DoD software-system is with a_______________________.

multi-disciplinary Integrated Product Team (IPT)

3

The common development approaches include:

• Waterfall
• Spiral
• Incremental

4

___________is the most commonly-used indicator of software quality and impact members of the Program Management Office IPT in various ways.

Error Density

5

What is a method of counting or otherwise quantifying characteristics of a process or product. For example counts of lines of code or percent resource utilization

Measure:

6

______________is sometimes referred to as a 'Once-Through' or 'Single-Step to Full Capability' strategy.

Grand Design

7

What provides an organization with a set of processes that, if done by qualified persons using appropriate tools and methods, will provide a capability to do effective and efficient engineering of systems, including their software components.

Standards

8

What is a process improvement model with widespread name recognition that is developed by industry and government experts, divides process maturity into five levels and is based on the principles of Continuous Process Improvement

Capability Maturity Model Integrated (CMMI)

9

Performance metrics are traceable to user-defined____________.

capabilities

10

Software Risk Unique Factors that make risk management difficult include:

• Multi-dimensionality
• Complexity Issues
• Dynamic Processes
• People Factors

11

_______________, is the protection of information against unauthorized access or modification.

Information Security, INFOSEC

12

Key among these security technologies are:

• Firewalls
• Encryption
• Anti-Virus Software

13

The _____________for an Information System (IS) acquisition should address IS-specific topics.

CDD

14

A ______________is a grouping of software that satisfies an end-use function. It is specifically designated as an SI for purposes of specification, qualification testing, interfacing or other purposes.

Software Item (SI)

15

Two software testing categories:

• Human-based testing
• Computer-based testing

16

A _________________is a supplier-produced plan that provides the foundation for all the supplier's software testing activities.

Software Test Plan (STP)

17

Software quality is often measured in terms of the number of______________, present in a product.

faults, or bugs

18

______________________is defined as the systematic evaluation of software products and activities by an agency that is not responsible for developing the product or performing the activity being evaluated.

Independent Verification and Validation (IV&V)

19

Software development can be broken down into three general life-cycle phases. These phases are:

• Requirements Analysis & Design
• Coding
• Test & Integration

20

For many types of software-intensive systems, _____________________ contracting approaches are best.

Cost Plus Award Fee (CPAF)