Finals Flashcards

(37 cards)

1
Q

List the types of software piracy

A

Counterfeiting
Internet Piracy
End User Piracy
Keygen and serial piracy
Hard-Disk Loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List and explain practices expected from an IT professional

A
  • Personal Development

stay up to date with new technologies, methodologies and knowledge

  • Organisation and Management

plan and track objectives of teams and allocate tasks according to ability, also communicate well

  • Contracting

use formal contracts to meet the needs and protect both parties

  • Privacy, Security and Integrity

able to identify and evaluate all risks relating to privacy, security and integrity, monitor and track all risk contentiously

  • Team Working skills

have team working skills to work with other people

  • Collaboration

IT often involves working in teams , being able to communicate well is essential for an IT professional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Professionalism

A

refers to having the knowledge, competence and skills needed, and behaving in such a way to allow a person to successfully complete specific work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Employment Equity

A

Concept that strives to eliminate discrimination and promote equal opportunity for all regardless of background, race, gender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You need to be able to list and explain risks that can be expected (ICT-related)

A

Scope creep
Cyber security threats
Inside threats
Hardware and software failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Scope creep

A

occurs when new features or requirements are continuously added to the project beyond the initial scope, leading to delays and increased cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cybersecurity threats

A

These include malware, ransomware, phishing. and hacking attacks that can be compromise the confidentiality, Integrity and availability (CIA) of data and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Inside threats

A

Insufficient training among employees can lead to Security lapses and increase to risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardware and software failure

A

failure in software or hardware could result in loss of data and may be expensive to recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Principles of dialogs design as part of system.

A

Feedback -helps users to know that an action has been recognised and accepted by system

Consistent -The layout, design and behavior of dialog. Should be consistent through out the system.

Error handling-Error message should be shown when ever something. goes wrong in the system, be specific on cause of the problem and if possible, specify how to fix the problem

Clarity and simple - Dialogues should be clear and straight forward.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Concepts related to the system maintenance

A
  1. System changes
  2. System failure
  3. System crashes
  4. System backups
  5. Capacity planning
  6. System upgrades
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List and explain types of tests

A

Unit testing
Integration testing
System testing
Usability testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unit testing

A

testing parts of the system in isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integration testing

A

testing that parts of a system work together properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System testing

A

testing that the system works property as a whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Usability testing

A

testing that the system does what it is supposed to do and in the correct way

17
Q

Give reasons for reviewing a project after implementation

A

To determine whether the project met its objectives and achieved the desired outcomes
To identify any problems or issues that arose during the implementation phase
To evaluate the effectiveness of the system and identify areas for improvement
To ensure that the system is still meeting the needs of the end users and business, and to identify any new needs that may have emerged Since the system was implemented
To ensure that the system is being used in accordance with best practices and compliance standards.

18
Q

System analysts should be able to(role of SA in problem solving)

A

fully understand and define the problem
develop various possible ways of addressing or solving the problem
evaluate and propose the best approach
assist the team in designing, implementing and delivering the resulting system

19
Q

Types of Business source documents

A

Organisational: organisational charts, mission statements, business plans, strategies
Policy and procedure: invoices, receipts, application forms, reporting
Project related: Minutes of meeting, emails about problems or requested changes, customer complaints
System related: system specification, database designs, help desk logs, change requests

20
Q

Event

A

business related occurrence which can be clearly defined
occurs at a specific time and place
triggers a response from the system

21
Q

three types of events

A

External events - occurs externally to the system in the system environment

Temporal events - occur internally to the system and are triggered by time

State events - occur internally to the system and are triggered by changes in state due to another event

22
Q

List SIX data gathering techniques

A

interviews
questionnaires
business source documents
observation of people and processes
surveys

23
Q

FOUR types
of adoption/implementation strategies.

A

Big bang/Direct
Phased
Parallel
Hybrid

24
Q

Advantages of Big bang/Direct implementation

A

Simple
Saves time
Saves money

25
Disadvantages of Big bang/Direct implementation
Risk of not finding the remaining errors in the new system before going live No backup system is there to continue business operations
26
Advantages of Phased implementation
Capitalises on the same advantages Reduced risk because smaller pieces of the system are switched over
27
Disadvantages of Phased implementation
involves more effort logistical issues
28
Advantages of Parallel implementation
compare every event done on the new system with the results of the old system to find errors faster
29
Disadvantages of Parallel implementation
involves more effort logistical issues
30
Risk mitigation
analysis of the probability of a risk occurring and determining how severe it 's impact would be
31
Risk management
the planning, identifying potential risks, assessing the risks, putting place a contingency plan to deal with any risks that occur
32
Black-box testing
method of software testing that examines the functionality of an application without peering into its internal structures or workings
33
White-box testing
method of software testing that provides the tester with complete knowledge of the application being tested, including access to source code and design documents
34
SCRUM principles
Team focused Responsive Incremental
35
main function of CASE tools
designed to support the the engineering environment
36
CASE tools
Modelling tools Documentation tools Engineering tools Construction
37
examples of Agile software methodologies
eXtreme Programming Unified Process SCRUM