Rickvian Aldi / 01PBT / 1601253441
True/False
1. True
2. True
3. False
4. False
5. False
6. True
7. False
8. False
9. True
10. True
11. False
Multiple choice
1. A
2. B
3. C
4. A
5. C
6. D
7. A
8. D
Matching
1. H
2. D
3. A
4. B
5. I
6. G
7. F
8. J
9. C
10. K
Short Answer
1.
System development is a set of activities used to
build an information system.
Five phases of the system development life
cycle :
1) Planning, Establishes a high-level view of
the intended project and determines its goals.
2) Analysis, Refines project goals into
defined functions and operation of the intended application. Analyzes end-user
information needs.
3) Design, Describes desired features and
operations in detail, including screen layouts, business rules, process
diagrams, pseudocode and other documentation.
4) Implementation to construct, or build, the
new or modified system and then deliver it to the users.
5) Operation, Support, and Security, perform
maintenance activities, monitor system performance, assess system security.
2. Four types of feasibility are:
- Operational feasibility measures how well
the proposed information system will work.
- Schedule feasibility measures whether the
established deadlines for the project are reasonable.
- Technical feasibility measures whether the
organization has or can obtain the hardware, software, and people needed to
deliver and then support the proposed information system.
- Economic feasibility, also called
cost/benefit feasibility, measures whether the lifetime benefits of the
proposed information system will be greater than its lifetime costs.
Six techniques used to gather data and
information are:
-Review Documentation, -Observe
-Survey
-Interview
-JAD Sessions (Joint-application design
sessions).
-Research.
3. Unified Modeling Language is used to
specify, visualize, modify, construct and document the artifacts of an
object-oriented software-intensive system under development.
Difference of use case diagram and class
diagram are that an use case diagram graphically shows how actors interact with
the information system. An actor is a user or other entity such as a
program. A class diagram graphically
shows classes and subclasses in a system. On a class diagram, objects are
grouped into classes.
4. The three major activities of the
operation, support, and security phase are Perform maintenance activities,
Monitor system performance, and Assess system security.
Type of maintenance activity.
1) Corrective maintenance, which is the
process of diagnosing and correcting errors in an information system.
2) Adaptive maintenance is the process of
including new features or capabilities in an information system.
3) Performance monitoring is the process to
determine whether the system is inefficient or unstable at any point.
4) Perfective maintenance is the process to
investigate solutions to make the information system more efficient and
reliable.
5. Security planning for IT may involve the
development of security policies (ie, acceptable use, disaster recovery, breach
notification), implementation of security controls (to include hardware,
software, and personnel), risk assessment, cryptographic use and controls, and
legal/ethical considerations.
Three things should a computer security plan
do :
1) Identify all information assets of an
organization, including hardware, software documentation, procedures, people,
data, facilities, and
supplies.
2) Identify all security risks that may cause
an information asset loss. Rank risks from most likely to least likely to
occur.
3) For each risk, identify the safeguards
that exist to detect, prevent, and recover from a loss.