1
Q

what are the inputs to the initiation phase (2)?

A

User req.

User cons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the outputs from the initiation phase(2)

A

success criteria

feasibility decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

outputs from the planning phase(4)

A

Project targets (SMART)
Project steps
risk and mitigation
test plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

outputs from the execution phase

A

finished product

test results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

outputs from the evaluation phase

A

deliverable product

user documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 types of IT system testing

A

iterative.
final.
Normal, extreme and destructive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(4)draw backs of plf

A

requires managements skill
bureaucratic
time to put in place
need effective communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 planning tools that are data based

A

gantt
pert/critical path
charts and graphs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 image based planning tool

A

visualisation
mind map
chart, graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SWOT analysis

A

-Our strengths and weaknesses
-Competitors opportunities and threats.
Identity’s risks and responses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how do we turn data into information

A

we give it structure, context and meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what software can be used to process data

A

Database

spreadsheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

features of a database(6)

A
tables for each focus
queries
forms
reports
switchboard
validation and input masks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

features of a spreadsheet(4)

A

functions(e.g. sum, max, min)
formula
charts and graphs
“what if analysis”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

primary methods of data collection(6)

A
questionnaire
observation
interview
loyalty schemes
email requests
consumer panels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

secondary methods of data collection(4)

A

internet
books
magazines
government data sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IT based methods of data collection

3

A

sensors
online questionnaires
cctv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

big data

A

data collected on national/international scale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how can big data be used(3)

A

spot trends and patterns
identify solutions
spot emerging issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

hazard of big data

A

tend to be national and ignore local variation

21
Q

ways we can judge data collection methods(5)

A
reliability
bias
cost
two way style possible
primary/secondary
22
Q

benefits of an it network

A

share data and devices as well as cooperation

23
Q

data types.(10)

A
text
alphanumeric
integer
currency
percentage
decimal
date/time
limited choice
object
boolean
24
Q

why set data types before collecting them

A

validate user inputs

25
why does data need to be stored (4)
has to be like that before processing portability backup devices dont have limitless storage
26
4 portable storage media
p hard drive external hard drive memory stick cloud
27
benefits of cloud storage
limitless secure accessible from any device dont need local storage
28
ways we can back up data
full | incremental
29
validation
preventing data entry error
30
ways of validation(4)
presence check length input mask look up list
31
verification
checking data is accurate
32
how to verify data(3)
physical checks two step V double entry
33
data destruction(name methods)
``` overwriting magnetic wipe(degaussing) physical destruction ```
34
what can security attacks do to data(4)
destruction theft modification denial
35
types of security threats(5)
``` malware social ENG DDoS Hacking Botnet ```
36
types of malware(7)
``` Adware Bot-takes control of system bug-caused by human error ransomware-takes files/syst. hostage spyware-tracks user activity trojan-disguised attempt to take control of system Virus-breaks files/syst. ```
37
social engineering types(6)
``` phishing-fake links pretexting-criminal asks for ID info baiting-offering tempting links Quid pro quo-baiting with promise shoulder surfing Tailgating ```
38
logical ways of securing It network(6)
``` control access AV and firewalls control usr acces levels to resources encryption timed access back up ```
39
physical ways of securing it network(4)
locked facilities security staff entry pass cards and ID cards CCTV
40
name biometric mthods
eyes. voice fingerprint facial recognition
41
what can data attacks disrupt?
system operations communication
42
what can data attacks disrupt the safety of?(4)
customers premise and equipment staff general public
43
what can be lost from data attacks?(3)
data and information reputation income
44
IT systems vulnerabilities(3)
Physical damage system being out of data or system dont work environmental damage
45
laws affecting IT users (7)
``` Copyright GDPR misuse of computers health and safety defamation freedom of information WEEE- disposal of it ```
46
features of GDPR(5)
``` Only store needed data can not store forever must get subjects permission can not share with others must be up to date ```
47
how can we present data (6)
``` report presentation graphs and charts integrated documents end user documents Tables ```
48
methods of information distribution(6)
``` messaging services websites Video or voice calls Multimedia cloud based IT Mobile apps ```