Chapter 16 - Systems Development and Data Analytics Flashcards

1
Q

Phases of a System Development Life Cycle

A
  1. Initiation, feasibility, and Planning: understand the situation to see if it is feasible to create a solution and formulating a plan.

The project initiation phase includes promptly informing managers and employees about the project, assembling the project team (possibly including systems analysts, programmers, accountants, and users), training selected personnel to improve necessary skills and enhance communication among team members, and establishing project controls (e.g., by implementing a project scheduling technique such as PERT)

  1. Requirement analysis and definition:
    a. Formal proposal for a new system is proposed to the IT steering committee.
    b. Feasibility study happens: It should consider the activity to be automated, the needs of the user, the type and cost of equipment required, and potential benefits. FEASIBILITY AND COST ARE ACCESSED, and developing the logical requirements of a proposed system
    c. STEERING COMMITTEE GIVES GO AHEAD.
  2. System conceptual design
    a. Mapping: data flow and storage diagrams and flowcharts.
    b. System analysts involved.
  3. Building and development
    a. Actual program code and DB structure are written
    b. Hardware is acquired, and physical structure is assembled
  4. Testing and quality control
    a. Methods:
    i. Static testing: examine’s program code and its associated documentation without running program.
    ii. Dynamic testing: involves executing code with a given set of test cases.
    iii. White-box testing: tests internal structure instead of front end.
    iv. Black box testing: tests functionality without any knowledge of the source code, tests only at user (blackbox) level.
    v. Graybox testing: knows both internal data structure and also performs test to user.
    b. Levels of tests
    i. Unit testing: workability of specific section of codes or multiple items/subcomponents.
    ii. Integration testing: test interaction of different components/modules.
    iii. System testing or end to end: tests a completely integrated system to verify that the system meets its requirements.
    iv. Acceptance testing: is conducted to determine whether the system meets the org needs and is ready for release.
  5. Acceptance, installation and implementation
    a. 4 types of conversion
    i. In parallel.
    ii. Direct change over.
    iii. Pilot coversion: one branch, department or division at a time.
    iv. Phased conversion: one function at a time. Oracle and Adaptive

v. Additional: prototype conversion involves developing and putting into operation successively more refined versions of the system until sufficient information is obtained to produce a satisfactory design.
b. Training and documentation are criticial.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PROGRAM CHANGE CONTROL

A
  1. Starts always from users.
  2. Save a copy of the production to the sandbox.
  3. Changes performed in sandbox version.
  4. When ready, it is named object code or executable code.
  5. Testing is done but not against production data, a special set of test data must be provided.
  6. User accepts or not (then make more adustments).
  7. Programmers move program to a holding area (they shouldn’t release themselves).
  8. Program supervisor reviews the program, and operations personnel move to production (compensating control since programmers cannot put fraudulent code into production).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

End User Computing (limitations)

A

End user computing

  • Involves user-created or user acquired systems that are maintained and operated outside of traditional information controls (like the queries in DWH)
    • Environmental control risks are greater (copywright violation or unauthorized copies etc).
    • Unauthorized access is another concern (lacks physical controls).
    • Not adequate backup and contingency planning.
    • Data might not be uniform/consistent across EUC applications.
  • To handle that:
    • Find controls and their intended functions
      • One approach is to take an organization-wide inventory of major EUC applications.
      • Risk assessment
      • Review control of applications.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BUSINESS PROCESS REENGINEERING

A
  • Involves a complete rethinking of how business functions are performed to provide value to a customer (radical innovation and a disregard of current jobs, hierarchies and reporting relationships.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BUSINESS PROCESS DESIGN AND PARTICIPANTS ROLES

A
  • End users are the drivers of a new or redesigned process.
  • Because IT pervades every aspect of operations in a modern organization, the IT STEERING COMMITTEE must study each request for a new process or either approve it or deny it.
    • Usually CIO or head of systems development are members. Executive mgmt. of each division is also involved.
    • The committee members have an understanding of the interactions of the organizations current structure. (like the PC2 project)
  • Once a new process or system has been approved, a project team is is assembled.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Artificial Intelligence (Benefits)

A
  • Helps on Robotic Process Automation
  • How does it improve efficiency and effectiveness:
    • Automate data entry and analysis (pdf reader)
      • And it learns while it does that.
    • Reduce fraud
      • Review entire population of documents.
    • Strengthen expenditure disbursement policies
      • Check vast amount of documents to see if they are compliant with policies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cloud Computing Benefits

A
  • Fast access to software, reduce need for investment in IT infra, and use of “pay as you go” service.
  • Uses do not have to buy, maintain or update computer hardware or software (done by 3rd party a lot).
  • Subscribe only to the services needed.
  • Users can access software from anywhere.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Blockchain
A
  • It is a distributed ledger that is encrypted, public and shared widely for anyone to view. Data is not centralized.
  • A block is the current part of a blockchain
    • Used primarily to verify transactions within digital currencies
      • Cryptocurrency is a digital designed to be a medium of exchange using encryption to secure transactions, control the creation of additional units and verify transfer.
      • Owning a bitcoin means that the user owns a piece of information (block) within the blockchain ledger.
      • The blockchain allows users to transfer funds without the need of a financial institution intermediating.
      • Miners then come into play confirming each new block of transaction seeing if they are legitimate. They are then paid bitcoins for thjeir effort.

CONSENSUS MECHANISM maintained and validated by multiple agents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMART CONTRACTS

A

Are computerized transaction protocols that execute the terms of a contract. A smart contract is a collection of code and data that is deployed using crypto. THEY SATISFY COMMON CONTRACTUAL CONDITIONS WITHOUT NEEDING LAWYERS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Approach to Quantify or Understand Risk (Delpy Approach, Predictive Analysis, EDA)

A

Delpy approach - Get opinion from set of experts and then share back to them so they can give feedback again and it should converge to an optimal solution.

Predictive analysis – uses data with statistical algorithmus and machine learning to draw insights in consumer behavior. Check out suggestions for a customer.

EDA (exploratory data analysis) - INSIDE DATA MINING APPROACH – different from traditional analysis since it doesn’t start from a given assumption/hypothesis. Seeks to:

  • Maximize insight into data set.
  • Uncover an underlying structure.
  • Identify important variables.
  • Check for outliers.
  • Test underlying assumptions
  • Develop parsimonious models
  • Determine optimal factors.
  • USE OF HISTOGRAMS AND SCATTER PLOTS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

BIG DATA: Concept, 5 V’s and limitations

A

BIG DATA

>> Process of mining volume amount of data from all sorts (unstructured on the beginning ) to transform it from low density to high density data (which has value). Data is usually in text format.

>> 4 Vs:

  1. Volume: large amount of data captured over time. IoT internet of things help on this since it owrks like real-time sensors and have the ability to transfer data over a network without requiring human to human or computer interactin. Might require multiple servers.
  2. Variety: structure data like the ones maintained in SQL (DWH), unstructured data (noSQL)
  3. Velocity: speed at which data has to be analysed./
  4. Veracity: to what extent data is representative of the population.

>> THE 5TH V: value.

>> Limitations of big data:

  • User level data are incomplete (data restricted to target group that visited the website): a lot of untapped potential.
  • Knowing on why results are like they are is ticky (you need more technical people).
  • Data can contain noise (useless informatin)
  • User level data requires interpretation prior to use (text to graph helps visualization though).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BI

A

Business intelligence (BI) has all of the following characteristics except

A.Displaying information in graphical format.

B.Giving immediate information about an organization’s critical success factors.

C.Focusing on strategic objectives.

Answer (D) is correct.

D.Providing advice and answers to top management from a knowledge-based system.
BI serves the needs of top management for managerial control and strategic planning. BI focuses on strategic (long-range) objectives and gives immediate information about a firm’s critical success factors. BI is not a program for providing top management with advice and answers from a knowledge-based (expert) system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Statistical Control Charts

vs

Histogram

vs

The fishbone diagram (also called a cause-and-effect diagram)

A

Statistical control charts are graphic aids for monitoring the status of any process subject to acceptable and unacceptable variations during repeated operations. The chart consists of three horizontal lines plotted on a horizontal time scale. The vertical scale represents the appropriate quantitative measure. The center line represents the average range or overall mean for the process being controlled. The other two lines are the upper control limit and the lower control limit. The processes are measured periodically, and the values are plotted on the chart. If the value falls within the control limits, no action is taken. If the value falls outside the limits, the process is considered out of control, and an investigation is made for possible corrective action. Another advantage of the chart is that it makes trends visible.

The histogram displays a continuous frequency distribution of the independent variable in the form of a bar graph.

Fish bone is a total quality management process improvement technique. The format identifies and organizes the analysis of causation and helps to identify possible interactions among causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

High-low method for Regression

A

(Ymax - Ymin)/(Xmax-Xmin) = COEFFICIENT

Then calcualte fixed cost for the formula.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly