What is the structured approach called for developing software and information systems? Show Systems development life cycle Who is the person who typically manages the software development project? In which phase of the software design and development project would you try to understand the proposed project? In which phase of the software design and development project would you build a blueprint of the proposed system? In which phase of the software design and development project would you build the proposed system? In which phase of the software design and development project would you take the newly built system and place in operations? In which phase of the software design and development project would you fix errors in the new built and operational system? What term refers to the fast-paced building or construction of a software prototype? Rapid application development (RAD) What type of software design and development methodology does Microsoft Corporation employ? What term refers to the end user developing software without the assistance of IT? What type of information should you avoid including on your Web site? Private personal information Which of the following web elements should you know about before building your web site? What is the language of the Web? What does an HTML tag do? It specifies formatting and layout instructions for your web page A Web document is broken into sections. What are the tags called that create these sections? What should be the first and last pair of tags in your Web document? There are two main sections in every HTML document. What are they? For every Web document, you can add words that appear in the upper left bar area of your browser. What set of tags allows you to provide this information? If you wanted to create text that was a different color or font than other text in your Web page, what type of tag would you use? What tag would you use if you wanted a blank line in your Web document? Three primary choices as to who will build your system. _____, selfsourcing (aka end-user development), and outsourcing. Three primary choices as to who will build your system. Insourcing, _____(aka end-user development), and outsourcing. Three primary choices as to who will build your system. Insourcing, selfsourcing (aka end-user development), and _____. Involves in-house IT specialists within your organization to develop the system. The development and support of IT systems by end users ( knowledge workers) with little or no help from IT specialists. Selfsourcing (aka end-user development) The delegation of specific work to a third party for a special length of time, at a specified cost, and at a specified level of service. A structured step-by-step approach for developing information systems. Includes seven key phases. Systems Development Life Cycle (SDLC) In the Systems Development Life Cycle (SDLC), what phase is the activity: Define the system to be developed? In the Systems Development Life Cycle (SDLC), what phase is the activity: Set the project scope? In the Systems Development Life Cycle (SDLC), what phase is the activity: Develop the project plan including tasks, resources, and timeframes? In the Systems Development Life Cycle (SDLC), what phase is the activity: Gather the business requirements for the system? In the Systems Development Life Cycle (SDLC), what phase is the activity: Design the technical architecture required to support the system? In the Systems Development Life Cycle (SDLC), what phase is the activity: Design system models? In the Systems Development Life Cycle (SDLC), what phase is the activity: Build the technical architecture? In the Systems Development Life Cycle (SDLC), what phase is the activity: Build the database and programs? In the Systems Development Life Cycle (SDLC), what phase is the activity: Write the test conditions? In the Systems Development Life Cycle (SDLC), what phase is the activity: Preform the testing of the system? In the Systems Development Life Cycle (SDLC), what phase is the activity: Write detailed user documentation? In the Systems Development Life Cycle (SDLC), what phase is the activity: Provide training for the system users? In the Systems Development Life Cycle (SDLC), what phase is the activity: Build a help desk to support the system users? In the Systems Development Life Cycle (SDLC), what phase is the activity: Provide an environment to support system changes? During the _____ phase of the SLDC you crate a solid plan for developing your information system. The _____ phase of the SLDC involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system. The primary goal of the _____ phase of the SLDC is to build a technical blueprint of how the proposed system will work. The _____ phase of the SLDC verifies that the system works and meets all the business requirements defined in the analysis phase. During the _____ phase of the SLDC you distribute the system to all the users and they begin using the system to perform their everyday jobs. During the ______ phase of the SLDC, you monitor and support the new system to ensure it continues to meet business goals. The advantages of selfsourcing are: The advantages of selfsourcing are: participation / ownership The advantages of selfsourcing are: The advantages of selfsourcing are: _____ is the process of building a model that demonstrates the features of a proposed product, service, or system The five main reasons behind rapid growth: The five main reasons behind rapid growth: The five main reasons behind rapid growth: The five main reasons behind rapid growth: The five main reasons behind rapid growth: The three geopolitical outsourcing options: The three geopolitical outsourcing options: The three geopolitical outsourcing options: A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups: A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups: A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups: A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups: A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups: Service-Oriented Architecture (SOA) Involves distributing the information and processing power of IT systems via a network.( This is the the first true network infrastructure) Distributed infrastructure What are the four tiers of an n-Tier infrastructure model? What are the four tiers of an n-Tier infrastructure model? What are the four tiers of an n-Tier infrastructure model? What are the four tiers of an n-Tier infrastructure model? A _____ infrastructure is the most basic setup because it involves a single tier on a single machine.Think of an application that runs on your PC-everything you need to run the application is wrapped up together. An example is a basic word processor or a desktop file utility program. A _____ infrastructure is the basic client/server relationship. In essence, the client handles the display, the server handles the request, and this tier is contained on one or both of the tiers. A _____ infrastructure is the most common approach used for Web applications today. A typical example if this model is the Web browser that acts as the client, an application server that handles the business logic, and a seperate tier (such as a DBMS) that handles database functions. An _____ infrastructure balances the work of the network over several different servers. The letter stands for any number of tiers. Traditionally it starts with a basic 3-tier model and expands on it to allow for greater performance, scalability, and a host of other benefits. A delivery model for software in which you pay for software on a pay-per-use basis instead of buying the software outright. Software-As-A-Service (Saas) A delivery model for software identical to SaaS with additional features of (1) the ability to customize data entry forms, screens, reports, and the like and (2) access to software development tools to alter the way in which the software works by adding new modules (services) and/or making modifications to existing modules. Platform-as-a-Service (PaaS) The cloud computing model in which you acquire all your technology needs in the cloud. Infrastructure-as-a-Service (IAAS) The process of continuously measuring system results and comparing those results. Baseline values a system seeks to attain. To justify costs of technology, you need to be able to measure the success of technology. With these metrics in hand you can make a cost/benefit judgement about technology. ______ can lead to identifying steps and procedures to improve system performance. A _____ metric is a measure of the success of your Web and e-business initiatives. Common Web-centric metrics include: Common Web-centric metrics include: Common Web-centric metrics include: Common Web-centric metrics include: Common Web-centric metrics include: Common Web-centric metrics include: Common Web-centric metrics include: Common Web-centric metrics include: Measure the success of call center efforts. Typical call center metrics include: Typical call center metrics include: Typical call center metrics include: Typical call center metrics include: The __________ methodology looks very similar to the systems development life cycle. It starts with the oraganization's strategic plan and moves through various phases including analysis ,design, implementation, testing, and maintenance. Business Continuity Planning (BCP) Principles and standards that guide our behavior toward other people. _____ people have integrity. Intangible creative work that is embodied in physical form. The legal protection afforded an expression of an idea. A program that when installed on your computer, records every keystroke and mouse click. Key logger aka Key trapper The forging of someones identity for the purpose of fraud. A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail. Phishing (aka carding or brand spoofing) Phishing that is targeted to a specific individual. The use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals. The rerouting of your request for a legitimate Web site. A small file that contains information about you and your Web activities, which a Web site you visit places on your computer. Software to generate ads that installs itself on your computer when you download some other program. Software you do not want hidden inside software you do want. Malicious software that collects information about you and your computer and reports it to someone without your permission. Spyware (aka sneakware or stealthware) Floods a server or network with so many requests for service that is slows down or crashes. Denial of Service Attack (DOS) A delivery model for personal productivity software such as Microsoft Office in which you pay for personal productivity software on a pay-per-use basis instead of buying the software outright. Personal Software-as-a-Service (Personal SaaS) Allows you to send voice communications over the Internet and avoid the toll charges that you would normally recieve from your long distance carrier. Voice over Internet Protocol (VoIP) Not only captures spoken words but also distinguishes word groupings to form a sentence. Automatic Speech Recognition (ASR) The three steps of Automatic Speech Recognition are: The three steps of Automatic Speech Recognition are: The three steps of Automatic Speech Recognition are: The system captures your words as you speak into a microphone, eliminates any background noise, and converts the digital signals of your speech into phonemes (syllables) The system matches your spoken phonemes to a phoneme sequence stored in an acoustic model database. The system attempts to make sense of what you're saying by comparing the word phonemes generated in step 2 with a language model database. A three dimensional computer simulation in which you actively and physically participate. An input device that captures and records the shape and movement of your hand and fingers and the strength of your hand and finger movements. A combined input and output device that (1) captures and records the movement of your head and (2) contains a screen that covers your entire field of vision and displays various views of an environment based on your movements. Headset (head-mounted display) An input device that captures and records the movement of your feet as you walk or turn in different directions. Technology to add the sense of touch to an environment that previously only had visual and textual elements. Use of physiological characteristics-such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath-to provide identification. Custom shoes, Custom wedding gowns, and custom bathrobes are all examples of the use of _____ technology. A technology chip that can perform a variety of physiological functions when inserted into the human body. A technology-enabled microchip implanted into the human body that stores important information about you (such as your identification and medical history) and that may be GPS-enabled to offer a method of tracking. Software that provides identification by evaluating facial characteristics. Facial recognition software A standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet. A standard for transmitting information in the form of radio waves over distances up to about several miles. A wireless transmission technology developed primarily for mobile phones to support mobile commerce (m-commerce) and other phone activities. Near Field Communication (NFC) Examples of RFID in use today include: Examples of RFID in use today include: Examples of RFID in use today include: Examples of RFID in use today include: Examples of RFID in use today include: Microchip in a tag or label to store information, and information is transmitted from, or written to, the tag or label when the microchip is exposed to the correct frequency of radio waves. RFID (radio frequency identification) What are the steps in software development?7 core phases of software development. Phase 1 – Brainstorming. ... . Phase 2 – Business analysis. ... . Phase 3 – Design. ... . Phase 4 – Programming. ... . Phase 5 – Integration. ... . Phase 6 – Quality assurance. ... . Phase 7 – Release. ... . SDLC Example – DICEUS SDLC.. What is the structured approach called for developing software and information systems?The Systems Development Lifecycle (SDLC) provides a template for that development process. The structured approach to systems development was popularized in the 1980 s, and is still widely used by many practitioners today.
Which of the following is the correct order of the SDLC?What Are the 7 Phases of SDLC? The new seven phases of SDLC include planning, analysis, design, development, testing, implementation, and maintenance.
What is the first step of the system development life cycle SDLC )?The first step in the systems development life cycle is Preliminary investigation. 1) Planning/Preliminary Investigation: This is the first phase of the systems development process. It identifies whether or not there is a need for a new system to achieve a business"s strategic objectives.
|