Monday, January 14, 2013

Exercise Chapter 12 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   False
2.   True
3.   False
4.   False
5.   False
6.   True
7.   False
8.   False
9.   False
10. True
11. False


Multiple Choice

1. A ( Extreme project management )
2. B ( PERT chart )
3. C ( project request )
4. A ( mandated by management or some other governing body )
5. C ( decision table )
6. D ( system proposal )
7. A ( Computer-aided software engineering (CASE) )
8. D ( acceptance )


Matching

1.   d
2.   e
3.   a
4.   b
5.   i
6.   g
7.   f
8.   j
9.   c
10.  k


Short Answer

1. * System Development is a general term applied to a variety of structured organized processes for developing information technology and embedded software systems.
    * The five phases of the System Development Life Cycle (SLDC) :
       - Analyze ~ the main output is the Business Requirement Document. It would also define test scripts.
       - Design ~ the functional designs and technical designs are the deliverable created in design. It describe how the system will behave and what functions it will contain. It also describe what systems, tables and programs will be created or impacted.
       - Build ~ the main deliverable in this phase are the actual programs and any required documentation.
       - Test ~ the main output is a fully tested system ready for production.
       - Deploy ~ the main output of this phase is a product application now being used by the users to perform their job functions more efficiently.

2. * Four types of feasibility :
       - Operational feasibility : measures how well the proposed information system will work. Will the users like the new system? Will they use it? Will it meet their requirements? Will it cause any changes in their work environment? Is it secure?
       - Schedule feasibility : measures whether the established deadlines for the project are reasonable. If a deadline is not reasonable, the project leader might make a new schedule. If a deadline cannot be extended, then the scope of the project might be reduced to meet a mandatory deadline.
       - Technical feasibility : measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
       - Economic feasibility : measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs. A systems analyst often consults the advice of a business analyst, who uses many financial techniques, such as return on investment (ROI) and payback analyst, to perform the cost/benefits analysis.
    * Six techniques to gather data and information :
       1. Identify the areas for which information is required
       2. Created the necessary research questions
       3. Determine the sources of data
       4. Research to gather the raw data
       5. Confirm that the data is correct
       6. Process the data to derive meaningful information and then translate into goals and requirements

3. * Unified Modeling Language (UML) is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development.
    * Use case diagrams : represent the functions of a system from the user's point of view.
       Class diagrams : represent the static structure in terms of classes and relationships.

4. * The operations, support, and security phase consists of three major activities :
       1. perform maintenance activities
       2. monitor system performance
       3. assess system security
    * Type of maintenance activity :
       - Corrective maintenance : the process of diagnosing and correcting errors in an information system.
       - Adaptive maintenance : the process of including new features of capabilities in an information system.
       - Performance monitoring : the process to determine whether the system is inefficient or unstable at any point.
       - Perfectible maintenance is the process to investigate solutions to make the information system more efficient and reliable.

5. * Summarizes in writing all of the safeguards that are in place to protect an organization's information assets.
    * Three things should a computer security plan do :
       - Identify all information assets of an organization, including hardware, software documentation, procedures, people, data, facilities, and supplies.
       - Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur.
       - Identify the safeguards that exist to detect, prevent, and recover from a loss for each risk.

No comments:

Post a Comment