Domain 3: Information Systems Acquisition and Development Flashcards
What are the three project management structures?
Functional, Project and Matrix
Who is responsible for approving and prioritising projects?
The IT steering committee
What is the role of the IT strategy committee?
To guide and recommend the BoD on IT initatives.
What are three types of code size evaluation?
SLOC, FPA and COCOMO
What is CPM?
Critical path methodology. It is a project evaluation method which uses a critical path that is made up of the tasks that are longest to complete
What is PERT?
Program Evaluatoin Review Technique. Another project evaluation method which considers three differe scenarios. Optimistic (best), pessimistic (worst) and normal (most likely).
What are two proccess that should take place prior to the beginning of a project?
Business Case and Feasibility analysis
What are all the elements in feasibility study report?
Scope, current process, requirements, approach, evaluation and review
What is scope creep?
Scope creep refers to an uncontrolled project scope due to continuous changes
What happens in the Feasibility Study phase? (SDLC Phases)
It is the first phase. The expected benefits are outlined against the cost of the implementation.
What happens in the requirements phase? (SDLC Phases)
The second phase. Requirements of the new systems are detailed and documented.
What happens in the Software Selection and Acquisition phase? (SDLC Phases)
The third phase. This should contain the architectural and technical specifications of the new system. Security requirements need to be considered.
What happens in the development phase? (SDLC Phases)
The fourth phase. Development of the application takes place.
What happens in the testing and implementation phase? (SDLC Phases)
The fifth phase. Unit testing, system testing and UAT are conducted
What happens in the post-implementation phase? (SDLC Phases)
The sixth phase. Reviews are conducted and ROI is assessed.
What is the objective of Agile development approach?
To produce releasable software in short iterations without putting too much time into paper-based deliverables
What is a characteristic of agile?
Systematic review after completion of each iteration to identify areas of improvement
What is a characteristic of waterfall approach?
Suitable for when requirements are well defined and do not undergo frequent changes
What is a characteristic of a prototype approach?
It saves a considerable amount of time and cost but there is a risk of inadequate controls
What development technique uses a prototype that can be frequently updated to address business requirements?
Rapid Application Development
What is a benefit of object oriented development?
Object modules can be reused
What makes the OOSD method enable greated security?
It uses encapsulation
What is a benefit of component-based development?
Ability to support multiple development envrionments
What is, check digits?
A check digit is an extra digit, used for error detection. It helps to ensure that original data is not tampered or altered.
What are parity bits?
They are used to verify complete and accurate data transmission. Used as the simplest form of error-detecting code when data is transfered from one machine to another.
What are checksums?
Similar to parity bits but have the capability to recognise multi-bit errors.