1
Q

what are the inputs to the initiation phase (2)?

A

User req.

User cons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the outputs from the initiation phase(2)

A

success criteria

feasibility decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

outputs from the planning phase(4)

A

Project targets (SMART)
Project steps
risk and mitigation
test plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

outputs from the execution phase

A

finished product

test results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

outputs from the evaluation phase

A

deliverable product

user documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 types of IT system testing

A

iterative.
final.
Normal, extreme and destructive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(4)draw backs of plf

A

requires managements skill
bureaucratic
time to put in place
need effective communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 planning tools that are data based

A

gantt
pert/critical path
charts and graphs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 image based planning tool

A

visualisation
mind map
chart, graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SWOT analysis

A

-Our strengths and weaknesses
-Competitors opportunities and threats.
Identity’s risks and responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how do we turn data into information

A

we give it structure, context and meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what software can be used to process data

A

Database

spreadsheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

features of a database(6)

A
tables for each focus
queries
forms
reports
switchboard
validation and input masks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

features of a spreadsheet(4)

A

functions(e.g. sum, max, min)
formula
charts and graphs
“what if analysis”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

primary methods of data collection(6)

A
questionnaire
observation
interview
loyalty schemes
email requests
consumer panels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

secondary methods of data collection(4)

A

internet
books
magazines
government data sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IT based methods of data collection

3

A

sensors
online questionnaires
cctv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

big data

A

data collected on national/international scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how can big data be used(3)

A

spot trends and patterns
identify solutions
spot emerging issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

hazard of big data

A

tend to be national and ignore local variation

21
Q

ways we can judge data collection methods(5)

A
reliability
bias
cost
two way style possible
primary/secondary
22
Q

benefits of an it network

A

share data and devices as well as cooperation

23
Q

data types.(10)

A
text
alphanumeric
integer
currency
percentage
decimal
date/time
limited choice
object
boolean
24
Q

why set data types before collecting them

A

validate user inputs

25
Q

why does data need to be stored (4)

A

has to be like that before processing
portability
backup
devices dont have limitless storage

26
Q

4 portable storage media

A

p hard drive
external hard drive
memory stick
cloud

27
Q

benefits of cloud storage

A

limitless
secure
accessible from any device
dont need local storage

28
Q

ways we can back up data

A

full

incremental

29
Q

validation

A

preventing data entry error

30
Q

ways of validation(4)

A

presence check
length
input mask
look up list

31
Q

verification

A

checking data is accurate

32
Q

how to verify data(3)

A

physical checks
two step V
double entry

33
Q

data destruction(name methods)

A
overwriting
magnetic wipe(degaussing)
physical destruction
34
Q

what can security attacks do to data(4)

A

destruction
theft
modification
denial

35
Q

types of security threats(5)

A
malware
social ENG
DDoS
Hacking
Botnet
36
Q

types of malware(7)

A
Adware
Bot-takes control of system
bug-caused by human error
ransomware-takes files/syst. hostage
spyware-tracks user activity
trojan-disguised attempt to take control of system
Virus-breaks files/syst.
37
Q

social engineering types(6)

A
phishing-fake links
pretexting-criminal asks for ID info
baiting-offering tempting links
Quid pro quo-baiting with promise
shoulder surfing
Tailgating
38
Q

logical ways of securing It network(6)

A
control access
AV and firewalls
control usr acces levels to resources
encryption
timed access
back up
39
Q

physical ways of securing it network(4)

A

locked facilities
security staff
entry pass cards and ID cards
CCTV

40
Q

name biometric mthods

A

eyes.
voice
fingerprint
facial recognition

41
Q

what can data attacks disrupt?

A

system
operations
communication

42
Q

what can data attacks disrupt the safety of?(4)

A

customers
premise and equipment
staff
general public

43
Q

what can be lost from data attacks?(3)

A

data and information
reputation
income

44
Q

IT systems vulnerabilities(3)

A

Physical damage
system being out of data or system dont work
environmental damage

45
Q

laws affecting IT users (7)

A
Copyright
GDPR
misuse of computers
health and safety
defamation
freedom of information
WEEE- disposal of it
46
Q

features of GDPR(5)

A
Only store needed data
can not store forever
must get subjects permission
can not share with others
must be up to date
47
Q

how can we present data (6)

A
report
presentation
graphs and charts
integrated documents
end user documents
Tables
48
Q

methods of information distribution(6)

A
messaging services
websites
Video or voice calls
Multimedia
cloud based IT
Mobile apps