MANAGING INFORMATION SYSTEMS Flashcards

1
Q

Systems Development Life Cycle is also known as?

A

Software life cycle or Application life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the stages in the conception, design, creation, and implementation of an information system

A

Systems Development Life Cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describes a formal, integrated, and usually time-limited process of gathering data about the needs and opportunities of end users and their manager

A

Needs Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Considers one or more alternate designs and
analyzes their advantages and disadvantages

A

Alternative Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Creation of detailed specifications for the
proposed system

A

Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Creation or purchase of the hardware and software necessary to implement the design and testing to ensure that it meets specifications

A

Development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deactivating the old system and activating
the new one

A

Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fixing errors, or bugs, in the way that the system operates

A

Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Systems Development Life Cycle stages (NADDIM)

A

Needs Assessment
Alternative Analysis
Design
Development
Implementation
Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Output Analysis?

A

Describes the systematic identification of ways people in an organization use information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refers to formal cataloguing and review of the information an organization collects, stores, and uses

A

Input Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attempts to determine whether the organization collects the information it needs, uses the information it collects, and has efficient process to address the organization’s information needs

A

Procedure Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A person who provides an interface between information systems users and information systems developers

A

Systems Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Methodologies and Tools for needs assessment (IOQSDR)

A

Interviews
Onsite Observation
Questionnaires
Structured Analysis
Data dictionary
Reverse engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

determining ROI (ratio of the benefits of an
investment to the amount of the investment)

A

ROI Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

identifying where risks might arise and trade risk
against cost and benefits

A

Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

– the specification of the media, content, and
form of input and output

A

Interface Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The model of data supporting the system

A

Data design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The design of both the computational and logical processes underlying the system

A

Process design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The generation of an object model

A

Object Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Decisions about the hardware used to deliver the system

A

Physical Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Creation of tests that ensure the proper operation of developed systems

A

Test Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Means for communicating the design to the programmers who will implement it

A

Design Specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Development activities include:

A
  1. Making a develop-or-purchase decision
  2. Selecting and procuring hardware
  3. Selecting an appropriate language
  4. Testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what are the three development tools (SRC)
1. Screen generators 2. Report generators 3. Code generators
26
What are the levels of testing? (UCIS)
1. Unit testing 2. Component testing 3. Integration testing 4. System Testing
27
What are the two stages of systems testing?
1st stage - performance 2nd stage - usability
28
What are the implementation Strategies?
Direct cut-over Pilot Implementation Phased Implementation Parallel Implementation
29
Replaces old system with new system overnight
Direct cut-over
30
Uses the new system in one or more parts of the organization and later in entire company
Pilot Implementation
31
Introduces components of the new system one at a time
Phased Implementation
32
Refers to all activities related to a system after its implementation and before a full-fledged needs assessment
Maintenance
33
Maintenance includes activities such as
Fixing Software that does not operate properly Adding features to systems in response to new user demands Performing periodic post-implementation reviews
34
What do post-implementation reviews entail? (ESD)
Evaluate how well the system meets user needs Sets priorities for new development Determine when to begin a new needs assessment
35
Four different development pathways (WSPA)
- Waterfall model - Spiral approach - Prototyping - Agile Programming
36
This development pathway follows SDLC in sequence, moves in only one direction, highly inflexible, and no component of the system is delivered until the near end of the project
Waterfall model
37
This development pathway: - implements systems according to the 80/20 rule of greatest need - often use a time-box concept to pace development - delivers the product rapidly -constant rework of existing versions
Spiral approach
38
This development pathway: - Focuses on the user interface through repetition of design and development stages
Prototyping
39
This development pathway has Several methodologies that focus on being reactive to changing user demands and that target small development and projects requiring minimal documentation. It assesses needs and develops specifications during development
Agile Programming
40
This development pathway will be used on large, complex projects with many stakeholders
Waterfall
41
This development pathway will be used for dynamic organizations that can tolerate ambiguity and need results fast
Spiral approach
42
This development pathway will be used for small-to-medium orihects where the requirements are vague or unclear
Prototyping
43
This development pathway is used for small projects with experienced, competent developers and users willing to take part in the development process
Agile programming
44
Advantages of waterfall
no rework easy to manage
45
Disadvantages of Waterfall
highly inflexible; no interim deliveries
46
Advantages of spiral
rapid product delivery; progress easy to see
47
Disadvantages of spiral
constant rework; high costs
48
Advantages of prototyping (SSAI)
Short time between analysis and implementation System better meets needs Avoids unnecessary costs Increased interaction between users and developers
49
Disadvantages of prototyping (RCD)
Raises user expectations Cost savings not guaranteed Delays system functionality
50
Advantages of Agile Programming
Rapid product delivery; Responsiveness to user needs
51
Disadvantages of agile programming
Harder to apply quality concepts such as process measurement and improvement Can fail dramatically with weak developers
52
describe the relationship among the elements of data that an organization uses
Data Models
53
Divide a process into its parts, show how these parts relate to one another, and indicate which outputs of one process are input to other processes
Process Models
54
Examples of process models
Structure charts; Function boxes; Data-flow diagrams
55
Describe the properties of objects, their relationship to one another, and the functions they perform
Object Models
56
Shows the relationship among the programs and subprograms that will comprise the finished system
Structure Charts
57
Lines show the relationships between the inputs and outputs of the procedures
Function boxes
58
This models the data flow between processes
Data-flow diagrams
59
Why Systems Development Projects Succeed or Fail? (RSMPR)
Risk Scope Management Process Resources
60
Types of organizational structures for locating control and resources (CDH)
Centralized Decentralized Hybrid
61
Advantages of outsourcing
Reduce costs Allows more rapid or timely development Consolidates operations Frees management to focus on business Offers improved reliability and stability
62
Disadvantages of Outsourcing
Locks company into a provider Fails to guarantee responsiveness Reduces control Removes knowledge of processes from the company Decreases ability to use IT strategically
63
Three different allocation methods
Unallocated cost center Allocated cost center Profit Center
64
All IS costs are considered in organizational expense
Unallocated cost center
65
IS department allocates costs to departments that use its services
Allocated cost center
66
IS charges internal and external users the same and attempts to get both kinds of businesses
Profit center
67
All staffs involved in technical functions
Chief Information Officer Strategic Planner and Technology Assessment Specialist Data Administrator and Database Administrator Network Administrator Web Master Project Manager Applications Development Manager Systems Analyst Software Engineer Programmer User Trainer and User Assistant Operations and Technical Support Staff Data Entry Clerks
68
help business managers trade off cost against the level of service they want from their technology support staff
Service level agreements (SLAs)
69
a statement of the objectives of the agreement
Service objectives
70
The department, customers, vendors involved
Parties
71
The people who serve as the liaisons to the parties involved
Points of contact
72
The specific responsibilities of each jobholder
Responsibilities
73
The metric that reflect whether the objectives have been accomplished
Performance measures
74
The procedures for changing the contract or expediting the process
Escalation guidelines
75
The provisions for negotiating the service level agreement
Renegotiation
76
Ways in which organizations easily compromise their security (POLICY FAULTS)
 Failing to create a security policy  Maintaining email and login accounts of terminal employees  Failing to assess importance of information assets and cost of their compromise  Failing to educate employees about proper security practices  Failing to install and use firewall hardware and software
77
Ways in which organizations easily compromise their security (FAULTY OPERATIONAL PRACTICES)
 Failing to back up data regularly  Failing to secure servers and networks physically  Failing to update virus software regularly  Failing to install software patches regularly  Using easy-to-guess passwords and leaving passwords in easily found locations  Leaving the default passwords on newly installed systems  Leaving workstations logged in while unattended