560 Flashcards

1
Q

Big Data

A

datasets whose size and speed are beyond the ability of typical database software tools to capture, store, manage, and analyze.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Analytics

A

the use of software and statistics to find meaningful insight in the data, or better understand the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Visualization

A

Tools that make it easier to understand data at a glance by displaying data in summarized formats.
Dashboards and maps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Supply Chain

A

All businesses involved in the production and distribution of a product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dashboards

A

data visualizations that display the current status of key performance indicators in easy to understand formats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet of Things

A

a set of capabilities enabled when physical things are connected to the internet via sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Machine to Machine technology

A

enables sensor embedded products to share reliable real time data via radio signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unstructured Data

A

Do not have a predictable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Science

A

involves managing and analyzing massive sets of data for purposes such as marketing, trends, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business Processes

A

Series of steps by which organizations coordinate and organize tasks to get work done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Formal Processes

A

documented and have well-established steps. Taking a CC pmt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Standard Operating Procedures

A

Who performs, What materials, where

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business Process Re-engineering

A

Methods and efforts to eliminate wasted steps within a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Agility

A

being able to respond quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Responsiveness

A

that IT capacity can be easily scaled up or down as needed, which requires cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flexibility

A

having the ability to quickly integrate new business functions or easily reconfigure software or apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules of SWOT

A

Be realistic about strengths and weaknesses
Also about size of Ops + Threats
Specific and keep analysis simple
Evaluate strengths + weaknesses
Expect conflicting views, SWOT is subjective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Five Industry Forces

A

Threat of entry new competitors
Bargaining power of suppliers
Bargaining power of customers or buyers
Threat of substituting products or services
Competitive rivalry among existing firms in the industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

5 Primary Activities

A

Inbound logistics- acquiring and receiving of raw materials and other inputs
Operations - manufacturing and testing
Outbound Logistics - packaging, storage, delivery, distribution
Marketing and Sales - customers
Services - customer services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Support Activities

A
Primary Activities rely on them. 
Infrastructure, accounting, finance
HR 
R&D
Procurement or purchasing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Governance

A

is the control of enterprise data through formal policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Enterprise Architecture

A

guides the evolution and expansion of information systems, digital technology, and business processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Customer Centeric

A

best suited for the cutomer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Touchpoint

A

any influencing action initiated through communication, human contact or physical or sensory interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Dirty Data

A

data of such poor quality that they cannot be trusted or relied upon for decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Master Data Management

A

methods synchronize all business critical data from disparate systems into a master file, which provides a trusted data source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Information management

A

use of IT tools and methods to collect, process, consolidate, store, and secure data from sources that are often fragmented and inconsistent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Data Silo

A

data stores in which their data are not accessible by other ISs that need it or outside of that department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Data Silos Exist When:

A

there is no overall IT architecture to guide IS investments, data coordination, and communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Advantages of information management are:

A

Improves decision quality
Improves the accuracy and reliability of management predictions
Reduces the risk of non compliance
Reduces the time and cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Problems that Enterprise Architecture is designed to Address

A

IT systems Complexity

Poor business alignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Benefits of having the right Enterprise Architecture in place

A

Cuts IT cost + increases productivity
Determines an organizations competitiveness
align capabilities with strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Components of Enterprise Architecture

A

Business Architecture - The process the business uses to meet its goals
Application architecture - how specific applications are designed and how they interact with each other
Data Architecture - How an enterprise’s data stores are organized and accessed
Technical architecture - the hardware and software infrastructure that supports applications and their instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Database

A

is a repository or data store that is organized for efficient access, search, retrieval, and update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Information

A

data that have been processed, organized or put into context so it has meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Knowledge

A

Consists of data and/or information that has been processed, organized, and put in context to be meaningful, and to convey undedstanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Transaction Processing Systems

A

designed to process specific types of data input from ongoing transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Types of Transactions

A

Internal - originate within the organization. payroll, purchases
External - originate from outside the organization. customers, suppliers, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Batch Processing

A

TPS in batch mode collects all transactions for a day, shift, or other rime period, then processes the data and updates the data stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Online Transaction Processing

A

TPS processes each transaction as it occurs, which is what is meant by the term real time processing. Webiste must be linked via a network to the TPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Management Information Systems

A

Their objective is to provide reports to managers for tracking operations, monitoring, and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Decision support systems (DSS)

A

INTERACTIVE APPLICATIONS THAT SUPPORT DECISION MAKING.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Unstructured Decision

A

depend on human intelligence, knowledge, and/or experiences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What if Analysis

A

refers to changing assumptions or data in the model to observe the impacts of those changes on the outcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Data Center

A

a large number of network servers used for the storage, processing, management, distribution and archiving of data, systems, web traffic, services and enterprise applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Service Level Agreements

A

A negotiated agreement between a company and service provider that can be a legally binding contract or an informal contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Software as a service(SaaS)

A

any software that is provided on demand
Google Apps
Salesforce.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

How is Virtualization used to create Virtual Machines

A

Application Layer
Virtualization Layer
Hardware Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is Virtualization

A

is a Technique that creates a virtual layer and multiple virtual machines to run on a single physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

PaaS -

A

set of tools and services that make coding and deploying these apps faster and more efficeint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Iaas- Information as a service

A

consists of hardware and software that power computing resources servers, storage, os, and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Data as a Service (DaaS)

A

enables data to be shared among clouds, systems, apps, and so on regardless of the data source or where they are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Centralized Databases

A

Store data at a single location that is accessible from anywhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Volatile Data

A

can change frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Data Warehouse

A

integrate data from multiple databases and data silos, and organize them for complex analysis, knowledge discovery, and to support decision making.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Data Marts

A

small-scale data warehouses that support a single function or one department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Business Intelligence

A

tools and techniques process data and do statistical analysis for insight and discovery. discover meaningful relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Database management systems (DBMSs)

A

integrate with data collection systems such as TPS and business applications: store the data in an organized way and provide facilities for accessing and managing that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Relational database

A

store data in tables consisting of columns and rows, similar to a spreadsheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Relational Management Systems (RDBMSs)

A

provide access to data using a decarative language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Extract, Transform, Load (ETL)

A

Extracted by designated databases
Transformed by standardizing formats, cleaning the data, and integrating them
Loaded into a datawarehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Active Data Warehouse (ADW)

A

real time data warehousing and analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Business Analytics

A

describes the entire function of applying technologies, algorithms, human expertise, and judgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Data Mining

A

software enables users to analyze data from various dimensions or angles, categorize them, and find correlations or patterns among fields in the data warehouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Text Mining

A

a broad category that involves interpreting words and concepts in context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Internet Protocol IP -

A

Basic technology that makes global communication possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

IP address

A

Each device attached to a network has an IP address that enables it to send and receive files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Packets

A

Files are broken down into blocks known as packets in order to be transmitted over a network to their destination, which also has a unique IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Bandwidth

A

The capacity or throughput per second of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Traffic Shaping

A

The ability to prioritize and throttle network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Protocol

A

rules and standard that govern how devices on a network exchange data and talk to each other.

72
Q

Mashup

A

A general term referring to the integration of two or more technologies

73
Q

Application program Interface (API)

A

an interface is the boundary where two separate systems meet. API provides a standard way for different things such as software, content, or websites, to talk to each other in a way they both understand.

74
Q

Bluetooth

A

a short-range wireless communications technology

75
Q

Wi-Fi

A

the standard way computers connect to wireless networks

76
Q

Intranets

A

used for data access, sharing, and collaboration. they are portals or gateways that provide easy and inexpensive browsing and search capabilities.

77
Q

Extranet

A

a private, company-owned network that can be logged into remotely via the internet

78
Q

Virtual private networks (VPNs)

A

encrypts the packets before they are transferred over the network

79
Q

Malware

A

short for malicious software, computer programs whose code causes disruption, destruction, or other devious action.

80
Q

BlackPOS

A

is malware designed to be installed on POS devices in order to record data from credit and debit cards swiped through the infected device.

81
Q

Distributed Denial of Service (DDoS)

A

attack bombards a network or website with traffic to crash

82
Q

Critical Infastructure

A

systems and assets, so vital to the US that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or saftey

83
Q

Advanced Persistent Threat (APT)

A

hackers remaining unnoticed so they can continue to steal data

84
Q

Internal Threats

A

major challenge largely due to the many ways an employee can carry out malicious activity

85
Q

Phishing

A

a deceptive method of stealing confidential information by pretending to be a legitimate organization

86
Q

Enterprise Risk Management

A

a risk based approach to managing an enterprise that integrates internal control, the SOX mandates and strategic planning

87
Q

Control Objectives for Information and Related Technology (CORBIT)

A

is an internationally accepted IT governance and control framework for aligning IT with business objectives, delivering value, and managing associated risks.

88
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

requires merchants and card payment providers to make certain their Web applications are secure

89
Q

IT Security Model

A
  1. Senior management commitment and support
  2. Acceptable use policies and IT security training
  3. IT security procedures and enforcement
  4. Hardware and Software
90
Q

Remote-Access Trojans (RATS)

A

create an unprotected backdoor into a system through which a hacker can remotely control that system

91
Q

Payload

A

refers to the actions that occur after a system has been infected.

92
Q

Search Engine Results Page (SERP)

A

the list of links and other descriptive information about webpages returned by a search engine in response to a search quesry

93
Q

Keywords

A

words or phrases that describe the content on a webpage

94
Q

Search Engine Optimization (SEO)

A

a collection of strategies and techniques designed to increases the number of visitors to a website as a result of the websites rank on the search engine results page.

95
Q

Search Engine

A

an application for locating webpages or other content on a computer network.

96
Q

Crawler Search Engine

A

rely on sophisticated computer programs called spiders, crawlers, or bots that surf the internet locating webpages links and other content that are then stored in the search engines page repository.

97
Q

Web Directories

A

are categorized listings of webpages created and maintained by humans.

98
Q

Hybrid Search Engines

A

combine the results of a directory created by humans and results from a crawler search engine with the goal of providing both accuracy and broad coverage of the internet.

99
Q

Meta Search engines

A

combine results from other search

100
Q

Semantic Search Engines

A

designed to located information based on the nature and meaning of Web content not simple keywords matches.

101
Q

Page Repository

A

a data structure that stores and manages information from a large number of webpages, providing a fast and efficient means for accessing and analyzing the information at a later time

102
Q

Crawler control module

A

software program that controls a number of spiders responsible for scanning or crawling through information on the Web.

103
Q

Petabyte

A

a unit of measurement for digital data storage = to one million gigabytes

104
Q

Enterprise Search

A

tools are used by employees to search for and retrieve information related to their work in a manner that complies with the organization’s information sharing and access control policies.

105
Q

Structured Data

A

information with a high degree of organization

106
Q

Unstructured Data

A

information that is not organized

107
Q

Search Engine Marketing (SEM)

A

a collection of online marketing strategies and tactics that promote brands by increasing their visibility in SERPs through optimization and advertising

108
Q

Recommendation Engines

A

anticipate information that a user might be interested in

109
Q

Pay per click (PPC)

A

advertisers pay search engines based on how many people click on the ads

110
Q

Click through rates (CTRs)

A

the percentage of people who click on a hyperlinked area of a SERP or webpage

111
Q

Keyword Conversion rates

A

likelihood that using a particular keyword to optimize a page will result in conversions

112
Q

Semantic Web

A

semantics is meaningful computing the application of natural language processing to support information retrieval, analytics and data integration that compass both numerical and unstructured information

113
Q

Spiders

A

also known as crawlers web bots or simply bots, are small computer programs designed to perform automated, repetitive tasks over the internet

114
Q

Dwell Time

A

Users who stay on a site longer are probably more satisfied

115
Q

Cost of Customer Acquisition

A

represents the amount of money spent to attract a paying customer

116
Q

Spear Fishing

A

A scam where you receive an email that appears to be from someone you work with, but it is fake

117
Q

Distributed Denial of Service (DDOS)

A

bombards network with traffic

118
Q

Attack Vectors

A

entry points for malware/hackers

119
Q

Botnet

A

A collection of bots (malware infected computers)
Called zombies
can be used to launch DDos
Can steal personal or financial data

120
Q

Business Continuity Plan

A

Maintaining business function or restoring them quickly when there is a major disruption

121
Q

BYOD - Bring your own Device

A

companies have employees use their own devices for work

122
Q

Advanced Persistent Threat (APT)

A

attacker wants to remain unnoticed
profit motivated criminal
Hacker with a personal agenda are not stealthy

123
Q

Firewall

A

Software/hardware device that controls access to a private network from a public netowork by analyzing data packets

124
Q

Bio metrics

A

method to identify a person, such as a fingerprint

125
Q

IT governance

A

supervision, monitoring, and control of an organizations IT assets

126
Q

Intrusion Prevention Systems (IPS)

A

defense system designed to take immediate actions

127
Q

Service Pack

A

Patches to update and fix vulnerabilities in an O/S

128
Q

Patches

A

Fix a vulnerability

129
Q

Data Tampering

A

Common means of attack, where someone enters false or fraudulent data, or deletes existing data.

130
Q

API

A

Application programming interface (API). APIs facilitate the transfer of data
from one website app to another. APIs can be either proprietary or open source.
Use of a proprietary API requires the developer to pay a fee to gain access to
data.

131
Q

Crowdfunding

A

The practice of funding a project or venture by raising monetary contributions from a large number of people.

132
Q

Crowdsourcing

A

a model of problem solving and idea generation that marshals the collective talents of a large group of people.

133
Q

Mashup

A

A Web application that combines information from two or more sources and presents this information in a way that creates some new benefit or service.

134
Q

Enterprise mashups

A

Combine data from internal business sources (e.g., sales records, customer information, etc.) and/or information from external sources for enhanced usefulness and productivity.

135
Q

Open Source

A

An application programming interface (API) that anyone can use, usually for free.

136
Q

Semantic web

A

An extension of the World Wide Web that utilizes a variety of conventions and technologies and languages developed by the W3C that allow machines to understand the meaning of web content.

137
Q

Social media

A

A collection of web applications, based on Web 2.0 technology and culture, that allows people to connect and collaborate with others by creating and sharing digital content.

138
Q

Social web

A

The new technologies, often called Web 2.0, that dramatically increase the ability of people to interact with businesses and each other, sharing and finding information, and forming relationships.

139
Q

Terms of service (TOS) agreement

A

A formal listing of the policies, liability limits, fees, and user rights and responsibilities associated with using a particular service. Users are typically required to acknowledge they have read, understand and agree to the terms of the TOS before they are allowed to use the service.

140
Q

Web 2.0

A

A term used to describe a phase of World Wide Web evolution characterized by dynamic webpages, social media, mashup applications, broadband connectivity, and user-generated content.

141
Q

Groundswell

A

The spontaneous effort of people using online tools to obtain information, support, ideas, products, and bargaining power from each other.

142
Q

Augmented reality

A

A technology that superimposes a computer-generated image

onto an image of the real world to provide information or entertainment.

143
Q

Business-to-business (B2B)

A

Markets in which the buyers, sellers, and transactions involve only organizations, not individual consumers.

144
Q

Digital dependents

A

The emerging generation of young people who are growing up in a world of broadband connections, constant connectivity, and related technology and who become uncomfortable if they do not have access to it.

145
Q

Digital immigrants

A

Typically, a member of an older age cohort that may be increasingly comfortable with technology but much less likely to incorporate mobile technology into their shopping behavior.

146
Q

Digital natives

A

The first generation to have grown up surrounded by digital devices (i.e., computers, smartphones, digital cameras, and video recorders, etc.) and Internet connectivity.

147
Q

Corporate procurement

A

Also called corporate purchasing, deals with the transactional elements of buying products and services by an organization for its operational
and functional needs.

148
Q

E-procurement

A

It refers to the reengineered procurement process using e-business technologies and strategies.

149
Q

Mobile commerce or m-commerce

A

The buying or selling of goods and services using a wireless, handheld device such as a cell phone or tablet (slate) computer.

150
Q

Micropayments

A

Transactions involving relatively small sums of money.

151
Q

Mobile location-based marketing

A

A marketing strategy that uses information from a mobile device’s GPS or customer’s mobile check-in on a social network to determine the content of marketing communications they receive on the device (e.g., advertisements, coupons, special offers).

152
Q

Omni-channel retailing

A

The effort by retailers to fully integrate both traditional and emerging methods to influence consumers.

153
Q

Showrooming

A

Using mobile search engine for locating product reviews and price comparisons while shopping in brick-and-mortar stores.

154
Q

Applications portfolio

A

A list of major, approved information system projects that are also consistent with the long-range plan. Expectations for sourcing of resources in the project or applications portfolio should be driven by the business strategy.

155
Q

Cloud services—also referred to as edge services

A

have to integrate back to core internal systems. That is, edge services have to connect and share data with enterprise systems such as order and inventory management, ERP, CRM, SCM, legacy financial, and HR systems and on mobile and social platforms.

156
Q

IT strategy

A

Shapes the direction of IT investments over the next one to five years to maximize business value and shareholder wealth.

157
Q

Lagging indicators

A

Confirm what has already happened. They evaluate outcomes and achievements.

158
Q

Offshoring

A

Sourcing that is done off-shore.

159
Q

Onshore sourcing

A

Work or development that can be sourced to consulting companies or vendors that are within the same country.

160
Q

Opportunistic repricing

A

When a client enters into a long-term contract with a vendor, the vendor changes financial terms at some point or overcharges for unanticipated enhancements and contract extensions.

161
Q

Poaching

A

The vendor develops a strategic application for a client and then uses it for other clients.

162
Q

Shirking

A

The vendor deliberately underperforms while claiming full payment, for example, billing for more hours than were worked and/or providing excellent staff at first and later replacing them with less qualified ones.

163
Q

The steering committee

A

A team of managers and staff representing various business units that establish IT priorities and ensure the IT department is meeting the needs of the enterprise.

164
Q

Value driver

A

Any activity that enhances the value of a product or service to consumers, thereby creating value for the company. Advanced IT, reliability, and brand reputation are examples.

165
Q

Baseline

A

A specification of the project plan that has been formally reviewed and agreed upon. It should be changed only through a formal change control process.

166
Q

Critical path

A

The longest path of tasks through a project, as shown on a Gantt chart. A delay of any task on the critical path will delay the project.

167
Q

Deliverables

A

The outputs or tangible things that are produced by a business process. Common deliverables are products, services, actions, plans, or decisions, such as approval or denial of a credit application. Deliverables are milestones, produced in order to achieve specific objectives.

168
Q

Gantt chart

A

Horizontal bar chart that graphically displays the project schedule.

169
Q

Milestone

A

Used to manage the project work effort, monitor results, and report meaningful status to project stakeholders.

170
Q

Project management

A

Structured methodology to plan, manage, and control the completion of a project throughout its lifecycle.

171
Q

Responsibility matrix

A

A document that lets everyone know who is responsible for completion of tasks.

172
Q

Scope creep

A

Refers to the growth of the project, which might seem inconsequential—at least to the person who is requesting that change. Scope creep is the piling up of small changes that by themselves are manageable, but in aggregate are significant.

173
Q

Statement of work (SOW)

A

Defines the project plan, but does not offer any options or alternatives in the scope.

174
Q

The system development life cycle (SDLC)

A

The traditional system development method for large IT projects, such as IT infrastructure or an enterprise system.

175
Q

Triple constraint

A

Three attributes–time, scope, and cost–that must be managed effectively for successful completion and closure of any project.

176
Q

Work breakdown structure (WBS)

A

List of tasks in a project shown in sequential order, resources allocated to each task, and schedule.