2602 - Basic Information System Acquisitions Flashcards

1
Q

What is the capability to collect, process and disseminate an uninterrupted flow of precise and reliable information, while exploiting or denying the ability of an adversary to do the same.

A

Information superiority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The best approach to manage a complex DoD software-system is with a_______________________.

A

multi-disciplinary Integrated Product Team (IPT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The common development approaches include:

A
  • Waterfall
  • Spiral
  • Incremental
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___________is the most commonly-used indicator of software quality and impact members of the Program Management Office IPT in various ways.

A

Error Density

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a method of counting or otherwise quantifying characteristics of a process or product. For example counts of lines of code or percent resource utilization

A

Measure:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______________is sometimes referred to as a ‘Once-Through’ or ‘Single-Step to Full Capability’ strategy.

A

Grand Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What provides an organization with a set of processes that, if done by qualified persons using appropriate tools and methods, will provide a capability to do effective and efficient engineering of systems, including their software components.

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a process improvement model with widespread name recognition that is developed by industry and government experts, divides process maturity into five levels and is based on the principles of Continuous Process Improvement

A

Capability Maturity Model Integrated (CMMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Performance metrics are traceable to user-defined____________.

A

capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software Risk Unique Factors that make risk management difficult include:

A
  • Multi-dimensionality
  • Complexity Issues
  • Dynamic Processes
  • People Factors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______________, is the protection of information against unauthorized access or modification.

A

Information Security, INFOSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key among these security technologies are:

A
  • Firewalls
  • Encryption
  • Anti-Virus Software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The _____________for an Information System (IS) acquisition should address IS-specific topics.

A

CDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ______________is a grouping of software that satisfies an end-use function. It is specifically designated as an SI for purposes of specification, qualification testing, interfacing or other purposes.

A

Software Item (SI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two software testing categories:

A
  • Human-based testing

* Computer-based testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _________________is a supplier-produced plan that provides the foundation for all the supplier’s software testing activities.

A

Software Test Plan (STP)

17
Q

Software quality is often measured in terms of the number of______________, present in a product.

A

faults, or bugs

18
Q

______________________is defined as the systematic evaluation of software products and activities by an agency that is not responsible for developing the product or performing the activity being evaluated.

A

Independent Verification and Validation (IV&V)

19
Q

Software development can be broken down into three general life-cycle phases. These phases are:

A
  • Requirements Analysis & Design
  • Coding
  • Test & Integration
20
Q

For many types of software-intensive systems, _____________________ contracting approaches are best.

A

Cost Plus Award Fee (CPAF)