Domain III – Information Technology – Section A: Application and System Software Flashcards

1
Q

The Systems Development Life Cycle (SDLC)

A

is a theoretical description of the phases through which an information system is developed. Generally, there are five phases in a SDLC:
 Phase 1: Systems Planning and Investigation Phase
 Phase 2: Systems Analysis
 Phase 3: Systems Design and Development
 Phase 4: System Implementation
 Phase 5: Systems Operations and Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Parallel Conversion

A

the new system operates concurrently with the old system for a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phased Conversion

A

implementation would start in selected units and operations of the new systemare closely monitored and evaluated. Once management is satisfied with the newsystem, it would gradually replace the old system in all the other units.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pilot Conversion

A

the system would be initially tested at a pilot site while users are still using the old system. Once the new system is operating satisfactorily in the pilot site, it is introduced to the whole organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Direct Conversion

A

occurs when the new system immediately replaces the old system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT change management can be defined

A

as the set of processes executed within
the organization’s IT department designed to manage the enhancements, updates, incremental fixes, and patches to production systems, which include:
1. Application code revisions.
2. System upgrades (e.g., applications, operating systems, and databases).
3. Infrastructure changes (e.g., servers, cabling, routers, and firewalls).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Program

A

is a set of instructions that tells the computer what to do. The computer is a dumb machine, it does nothing on its own until instructed to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code Generators

A

are tools that generate program code based on parameters defined by the systems analyst. They are usually used in association with CASE products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Test Data Generators

A

are tools used to systematically generate random data that can be used to test programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer Aided Software Engineering (CASE)

A

is the use of automated software packages that aid in the development of all phases of an information system
(requirements definition, analysis, design, code production, testing, document generation).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fourth Generation Languages

A

are user‐friendly computer languages used in computer programming. They are nonprocedural problem‐oriented programming languages that
simplify the programming process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Object‐oriented techniques

A

are system development techniques that combine
both data and procedures in what is called an object as contrasted with the traditional structure which considers data separately from the procedures that act
on them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

User‐developed applications (UDAs)

A

are applications that are developed by end users,
usually in a non‐controlled IT environment (sometimes it is called end‐user computing).
=> UDAs typically consist of spreadsheets and databases created and used by end users to extract, sort, calculate, and compile organizational data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rapid Application Development (RAD)

A

is an application development methodology that
allows for the development of strategically significant systems quickly. RAD allows for a reduction in time, costs, and maintaining quality of developed systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Database

A

is a structured collection of data intended to be accessible and used by multiple users in various ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data

A

is any sequence of symbols given meaning by specific actions of interpretations.
=> Data can be stored, processed, and transmitted in the form of electrical signals. Data requires interpretation to become information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A field

A

is a space that contains one data value. Fields are the smallest units of information in database systems. In spreadsheets, fields are called cells.
=> Examples of fields in a customer’s database include the name of the customer, the address, the telephone number, or the account number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A record

A

is a basic data structure. Records in a database are usually called rows. Each row consists of several column fields. Every row in a table has the same set of columns.
=> In a customer’s database, each record would be dedicated to a particular customer and include all information related to that customer such as name, address, telephone number, and account number.

19
Q

An object

A

can be a table, a form, or an association between data and a database entity.
=> For example, in Microsoft Access, an object could be a table, a query, a form, or a report.

20
Q

A database schema

A

is the structure of the database that defines the objects and relations in the database.
=> It defines how the data is organized and how the relations among them are associated.

21
Q

A query

A

is a request of information from a database.

22
Q

Database Management System (DBMS)

A

is a software package that controls the development, use, and maintenance of the organizational databases.
=> This includes more control over the organization, storage and retrieval of data, in addition to more security and integrity of the database.

23
Q

Hierarchal (database Structure)

A

organizes data in a parent‐child relationship. Each child has only one
parent, however, parents may have many children.
Difficult to apply when children need to relate to more than one parent.

24
Q

Network (database structure)

A

organizes data in a parent‐child relationship, however, in addition to each parent having more than one child, each child may also have more than one parent.
Due to the complexity of the structures, they may be difficult to comprehend, modify, or reconstruct in case of failure.

25
Q

Relational (database structure)

A

organizes data independent from the physical implementation of the data structure and establishes relationships amongst the data.
Relational database technology separates data from the application.

26
Q

Data definition language

A

is used to define (that is, determine) the database. It is used by the database administrators to establish the structure of database tables.

27
Q

Data control language

A

is used to specify privileges and security rules.

28
Q

Data manipulation language

A

provides programmers with a facility to update the database.

29
Q

Data query language

A

is used for ad‐hoc queries.

30
Q

Network analysis (passive attack)

A

describes the practice to obtain a complete profile of an organization’s network security infrastructure.

31
Q

Eavesdropping (passive attack)

A

describes the practice of intercepting communication lines to obtain copies of communications and messages flowing into and out of the organization’s network systems.

32
Q

Traffic analysis (passive attack)

A

describes the practice of determining the nature of flow between the organization and third parties.

33
Q

Brute‐force attack (active attack)

A

involves the use of password cracking software to gain unauthorized access to restricted systems.

34
Q

Masquerading (active attack)

A

is the use of an identity other than the user’s to gain unauthorized access.

35
Q

E‐mail bombing (active attack)

A

involves sending an identical message to an e‐mail address repeatedly.

36
Q

E‐mail spamming (active attack)

A

involves sending a message to a significant amount of users.

37
Q

E‐mail spoofing (active attack)

A

involves receiving an e‐mail that appears to be from a source while in actuality it is from a different source.

38
Q

Management information system (MIS)

A

provide middle management with reports that summarize and categorize information derived from all the company databases.

39
Q

Transaction processing system (TPS)

A

is an information system supporting day‐to‐day business operating activities or transactions, usually the first and most important objective of an information system.

40
Q

Decision support system (DSS)

A

is a computer‐based information system for assisting managers in planning and decision‐making.

41
Q

Enterprise‐wide Resource Planning (ERP) System

A

is a software that allows the integration and automation of the significant business processes in a company. It is considered the backbone of e‐businesses as it generally integrates the manufacturing, distribution, sales, accounting, finance, human resources processes (amongst others).
=> Amongst the larger ERP software manufacturers are the SAP®, Peoplesoft® and Oracle®.

42
Q

Governance, Risk management and Compliance GRC System

A

GRC system is software a that allows organizations to pursue a systematic approach to develop and implement GRC strategy including managing regulations, compliance, and risks in the organization’s key operations. GRC software provide a single centralized platform to control the various functions and procedures related to GRC.

43
Q

Customer Relationship Management (CRM) System

A

CRM system is a software that allows organizations to manage their relationships and interactions with current and potential customers. CRM systems compile data from different channels, including an organization’s email, website, telephone, chat, sales
records, customer service, marketing materials, and social media. Compiling customer data in one place provides for a better customer relationship management.

44
Q

Distributed Databases

A

the use of distributed databases that are continuously updated facilitates the filing, processing, and retrieval of data from an organizational system that
has widely dispersed operations. Using distributed databases allows for minimizing total interruption of processing throughout a distributed information technology system as there is a capability to continue processing at all sites except a nonfunctioning one (usually referred to as fail‐soft protection).