True/False
1.F
2.T
3.F
4.F
5.F
6.T
7.F
8.F
9.F
10.T
11.F
Multiple Choice
1.A
2.B
3.C
4.A
5.C
6.D
7.A
8.D
Matching
1.D
2.E
3.A
4.B
5.I
6.G
7.F
8.J
9.C
10.K
Short Answer
1. -System development is a set of activities used to build an information system.
- 1. Planning
• Review project requests
• Prioritize project requests
• Allocate resources
• Form project development Team
2. Analysis
• Conduct preliminary investigation
• Perform detailed analysis activities:
-Study current system
-Determine user requirements
-Recommend solution
3. Design
• Acquire hardware and software, if necessary
• Develop details of system
4. Implementation
• Develop programs, if necessary
• Install and test new system
• Train users
• Convert to new system
5. Operation, Support, and Security
• Perform maintenance activities
• Monitor system performance
• Assess system security
2. – • Operational feasibility measures how well the proposed information system will work.
• Schedule feasibility measures whether the established deadlines for the project are
reasonable.
• Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
• Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs.
- six techniques used to gather data and information are review documentation, observe, survey, interview, conduct joint-application design sessions, and research.
3. – The UML is a graphical tool that enables analysts to document a system. It consists of many inter related diagrams. Each diagram conveys a view of the system.
- A use case diagram graphically shows how actors interact with the information system. An actor is a user or other entity such as a program. The function that the actor can perform is called the use case.
4. – The operation, support, and security phase consists of three major activities: (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
- A.These types of errors return the analyst to the planning phase to perform corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
b. Adaptive maintenance is the process of including new features or capabilities in an information system.
c. The purpose of performance monitoring is to determine whether the system is inefficient or unstable at any point.
d. If it is, the systems analyst must investigate solutions to make the infor mation system more efficient and reliable, a process called perfective maintenance — back to the planning phase.
5.- A computer security plan summarizes in writing all of the safeguards that are in place to protect an organization’s information assets.
- 1. Identify all information assets of an organization, including hardware, software, documentation, procedures, people, data, facilities, and supplies.
2. Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur. Place an estimated value on each risk, including lost business. For example, what is the estimated loss if customers cannot access computers for one hour, one day, or one week?
3. For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.
No comments:
Post a Comment