Which risk assessment question is part of the Initiation Phase? - ANSWER-Could the end user reject the outcome of the project?
Planning - ANSWER-In
... [Show More] what phase of the project does estimation occur?
Initiation Phase # - ANSWER-Phase 1 of 4 in planning
Planning Phase # - ANSWER-Phase 2 of 4 in planning
Executing & Controlling Phase # - ANSWER-Phase 3 of 4 in planning
Closing Phase # - ANSWER-Phase 4 of 4 in planning
Initiation key elements - ANSWER-Problem definition, resource allocation and risk assessment
Planning key elements - ANSWER-Determine objectives and activities, organize the activities, and estimate time and cost required to successfully complete the project
Executing & Controlling key elements - ANSWER-Ensuring that the project is progressing properly and may involve hiring or training personnel, purchase hardware, and developing, testing, and deploying a product or service
Closing key elements - ANSWER-Once all deliverables are met, a project is considered closed. May include a final report detailing the processes strengths and successes and obstacles that were encountered
Why is it important to ensure that data support business goals? - ANSWER-To aid in making strategic decisions
Data type needed to order names and numbers in a database - ANSWER-String data
What effect does scope creep have on a project? - ANSWER-In increases unplanned costs for the project
Scope Creep - ANSWER-Additional features are needed or could be beneficial which can impact the allocation of resources (i.e., time and capital), and put the project at risk
In which category of the DIKW hierarchy would BI be located? - ANSWER-Knowledge
DIKW - ANSWER-Describes the transition for data, information, knowledge to wisdom
D in DIKW - ANSWER-Data, inputs directly received by a computer
I in DIKW - ANSWER-Information, transform data into a useful form (using algebraic laws)
K in DIKW - ANSWER-Knowledge, is gained experience from using information (knowing which algebraic laws to use in a given situation)
W in DIKW - ANSWER-Wisdom, social setting to knowledge or the understanding of "why". Wisdom is the ultimate goal for a human in that it improves the person's ability to function in the modern world and to make informed decisions that take into account beliefs and values.
Which system requirement is an example of considering user needs in the design of an information system? - ANSWER-Allowing easy access to customer account information
Which field must contain a unique value in order for a relational database table to function? - ANSWER-Primary key
N-Tier - ANSWER-Indicate that the number of tiers a system will be broken down into will vary between different software development projects. In typical n-tier development projects, the tiers are divided between the presentation tier, the logic tier, and the data tier
Presentation N-Tier - ANSWER-User interface is developed
Logic N-Tier - ANSWER-Where the system performs its logic processing
Data N-Tier - ANSWER-Where data is stored, retrieved, and updated from database tables
Benefit of separating database from application? - ANSWER-Data can change without the need to change the application, scale more easy, removes the need for users to interact directly with data
How does a compiler work? - ANSWER-It takes the most recent instructions and translated them into machine language
What is the characteristic of high-level languages? - ANSWER-Language translator programs are required
Which is a type of two-factor authentication? - ANSWER-Biometrics
End users assisted by developers; systems tested with simulated data - ANSWER-Alpha testing
End user test the system in operational setting to see if it's useful - ANSWER-User Acceptance
End user tests the system without help from developers; using actual data - ANSWER-Beta testing
SDLC - ANSWER-Software Development Life Cycle
SDLC aka - ANSWER-Staircase or most referred to as waterfall
Preliminary Investigation Step # - ANSWER-Step 1 in SDLC
Analysis Step # - ANSWER-Step 2 in SDLC
Logical Design Step # - ANSWER-Step 3 in SDLC
Physical Design Step # - ANSWER-Step 4 in SDLC
Implementation Step # - ANSWER-Step 5 in SDLC
Maintenance Step # - ANSWER-Step 6 in SDLC
SDLC - Preliminary Investigation - ANSWER-Problem or opportunity that a new system could be developed to address. During this first step, the team assesses the feasibility of the proposed project and selects a development methodology
SDLC - Analysis - ANSWER-Determine user requirements for new system and develop logical system models (i.e., graphic displays that demonstrate the relationships between resources, activities, and outputs and outcomes)
SDLC - Logical Design - ANSWER-Models developed during the second step are revised to ensure that the new system will meet the user requirements identified in the first step
SDLC - Physical Design - ANSWER-Logical models converted but are still abstractions of the system that will be built later, but they are now more complete and may include network maps and descriptions of servers and other devices to be used in the system
SDLC - Implementation - ANSWER-Programmers begin converting the models from the previous steps into the actual system, for instance, by developing databases and other software programs that will be needed. This step also includes installing hardware, testing the system, and training the end users
SDLC - Maintenance - ANSWER-Modifications or corrections to the system are made
Three main categories of a database? - ANSWER-Flat file, relational and hierarchical
Flat file - ANSWER-One large single table without the relations between tables that a relational format provides
Relational Database - ANSWER-Multiple tables (relations) with interrelated fields
Hierarchical Databases - ANSWER-Organizes data using a tree-like or organizational chart type structure (the child can only have one parent)
MVC stands for? - ANSWER-Model-View-Controller
What is MVC? - ANSWER-Software development technique used in the implementation of user interfaces which include the model, the view and the controller
Model in MVC - ANSWER-Software logic, business rules and application data
View in MVC - ANSWER-User interface (i.e.; colors, fields...ect)
Controller in MVC - ANSWER-Communication between the user and the model
Which component facilitates communication between the other two components in the MVC architecture model? - ANSWER-View
Types of system conversion (SDLC) - ANSWER-Direct, Parallel, Pilot, Phased
Direct Conversion - ANSWER-The old system is "turned off" and the new system is "turned on" at a specific date and time
Parallel Conversion - ANSWER-Period of time in which both systems (the old and the new) are operating concurrently
Pilot Conversion - ANSWER-Starting the conversion with a portion of the end users, for instance in a specific geographic region or a department in an organization
Phased Conversion - ANSWER-Deploys a subset of the system first, rather than deploying the whole system at once
Which type of system conversion involves starting the conversion with a portion of the end users? - ANSWER-Pilot
What is the database administrator's role in security? - ANSWER-To eliminate data redundancy when integrating old with new systems
Administrator - ANSWER-Someone who is in charge of some portion of the IT infrastructure
System Administrator - ANSWER-Process of maintaining the operating system of a computer system (including network of computers)
Network Administrator - ANSWER-Physically laying down cable, making connections, working with hardware (for instance, routers and switches) and configure the individual machines to be able to communicate via the network
Database Administrator - ANSWER-Design, development, support, installation, maintenance, performance analysis, and troubleshooting
Difference between compiler and interpreter - ANSWER-Translates an entire program into executable, which can be run at a later time, while other does it incrementally
Which data communication medium is used over very long distances? - ANSWER-Radio signals since cable is too expensive
Most common form of network connection used today? - ANSWER-UTP (Un-shielded Twisted [wire] Pair) and fiber optic cables
Coaxial Cable & UTP have in common? - ANSWER-Transmit information using electromagnetic waves
Fiber Optic - ANSWER-Transmit information using light pulses
Radio signals - ANSWER-Sent via radio towers, cell phone towers, and bounced off of satellites in orbit
Types of network topographies - ANSWER-Bus, Star, Mesh and Ring
Bus Network - ANSWER-Connected through a "T" connected along a single cable (simplest and most common)
Star Network - ANSWER-Connected to a central device, such as a hub or switch
Mesh Network - ANSWER-Connected directly to every other device in the network
Ring Network - ANSWER-Connected directly to its neighbors, and messages are forwarded from device to device until the proper destination is reached
Which item is a storage device? - ANSWER-Flash Drive
Heat Sink - ANSWER-Motherboard component helps to cool the CPU
Two necessary elements of business continuity planning - ANSWER-Identifying risks that may occur and ensuring continuity in the sequence of staffing schedules
Real Time Data - ANSWER-Data is gathered as soon as it's available
Event-Driven Data - ANSWER-Responds to preset conditions
Batch - ANSWER-Data accepted as a set of records and processed as a unit
Languages used for automation vs software development - ANSWER-COBOL & C++
High Level Languages (write programs) - ANSWER-BASIC, C, C++, Java and Python
Types of programming language classes - ANSWER-Assembly languages, high-level compiled languages, and high-level interpreted languages
Types of language translators - ANSWER-Assembler for Assembly, Compiler for high-level, and Interpreter for high-level interpreted languages
Shareware Software - ANSWER-Software permits free temporary use followed by long-term activation fee
Proprietary Software - ANSWER-Purchased from a vendor (software house)
What 3 things are received with purchasing proprietary software? - ANSWER-1) Executable 2) License to use (not yours to own) 3) Helpful resources like manuals or technical support
Freeware Software - ANSWER-Software that has become obsolete because a newer software has replaced it, or is software that the original producer (whether an individual or a company) no longer wishes to maintain and provide support for. You are bound by some agreements when you install it, but otherwise you are free to use it as if you purchased it
Public Domain Software - ANSWER-Software that has been moved into the public domain. Like freeware, this is software that no one wishes to make money off of or support. Anything found in the public domain can be used however you feel; no one is claiming any rights for it
Open Source Software - ANSWER-Made freely available as source code. You may obtain the software for free; you may enhance the software; you may distribute the software. However, you have to abide by the copyright (copyleft) provided with the software - must remain free (good faith)
Application the is cloud-based - ANSWER-Is provided by servers in the internal business network
Proxy Server - ANSWER-Used to route internet access including blocking of sites
Linux - ANSWER-Can run on both servers and workstations
Requires support from an operating system - ANSWER-Internet browser displays a web page
Operating System - ANSWER-Allows the user to control actions of the software, and through the software, to access hardware
One computer will request information from another and will respond with requested info - ANSWER-Client-Server
Each computer is roughly equal to others - ANSWER-Peer-to-Peer
Software emulator program that permits a computer user to use multiple computers and platforms without the expense of purchasing multiple computers - ANSWER-Virtual Machine
Which disaster recovery strategy is used to save information to multiple hard drives at the same time? - ANSWER-Data Mirroring
Purpose of an IT dept - ANSWER-Helps the organization achieve strategic goals
True of databases and applications that interact with them - ANSWER-They are independent
IP Address - ANSWER-Indicates a specific internet location
Purpose of End User License Agreement - ANSWER-Establish customer's right to use the software
What action supports confidentiality? - ANSWER-Updating security software
Algorithm - ANSWER-Formula that outlines how to execute a task
DNS (Domain Name System) - ANSWER-Translates human-readable aliases into IP's
Security Breach Notification Law - ANSWER-Since 2002, most U.S. states have adopted laws that require any company (including nonprofit organizations and state institutions) notify all parties whose data records may have been compromised, lost, or stolen in the event that such data has been both un-encrypted and compromised
Privacy Act of 1974 - ANSWER-The earliest piece of legislation that pertains to the collection and usage of personal data, this act limits actions of the federal government by blocking disclosure of data without consent of the person the data pertains to. Also, agencies must publicly make available the data they are collecting, the reason for the collection, and the ability for any individual to consult the data collected on them to ensure its integrity
The Family Educational Rights and Privacy Act of 1974 (FERPA) - ANSWER-Gives students the right to access their own educational records, amend those records should information be missing or inaccurate, and prevent schools from disseminating student records without prior authorization
Electronic Communication Privacy Act of 1986 - ANSWER-Establishes regulations and requirements to perform electronic wiretapping over computer networks (among other forms of wiretapping)
Computer Matching and Privacy Protection Act of 1988 - ANSWER-Amends the Privacy Act of 1974 by limiting the use of database and other matching programs to match data across different databases. Without this act, one agency could potentially access data from other agencies to build a profile on a particular individual.
Drivers Privacy Protection Act of 1994 - ANSWER-Prohibits states from selling data gathered in the process of registering drivers with drivers' licenses (e.g., addresses, social security numbers, height, weight, eye color, photographs)
Health Insurance Portability and Accountability Act of 1996 (HIPAA) - ANSWER-Requires national standards for electronic healthcare records among other policies (such as limitations that a health care provider can place on an employee who has a preexisting condition). Needs individual's consent
Digital Millennium Copyright Act of 1998 (DMCA) - ANSWER-Implements two worldwide copyright treaties that makes it illegal to violate copyrights by disseminating digitized material over computer
Digital Signature and Electronic Authentication Law of 1998 (SEAL) - ANSWER-Permits the use of authenticated digital signatures in financial transactions and requires compliance of the digital signature mechanisms. It also places standards on cryptographic algorithms used in digital signatures. This was followed 2 years later with the Electronic Signatures in Global and National Commerce Act.
Role of driver between application and database - ANSWER-Allow ODBC to be used for interactions with database and applications
Protocol - ANSWER-Part of Uniform Resource Locator (URL) that identifies the location of the document on a server
URL - ANSWER-Uniform Resource Locator
Patent - ANSWER-Gives author of software unauthorized duplication for 35 years
Parts of information system - ANSWER-Databases & Networks
IT's role in globalization - ANSWER-Allows companies to reach wider customer base
Allows software to be used through the internet - ANSWER-SaaS
Low-level language corresponds one-to-one with assembly - ANSWER-Translator language
How can organizations assist employees with the ethical use of information technology? - ANSWER-Developing policies for information usage
IAS - ANSWER-Information Assurance & Security
Information Assurance & Security (AIS) - ANSWER-The IAS model combines the three components of IT—communications, hardware, and software—with the information utilized by the three components. Focusing on how information is used, IAS prescribes three goals, commonly referred to as CIA: confidentiality, integrity, and availability
Confidentiality (AIS) - ANSWER-Requires that data be kept secure so that they are not accidentally provided to unauthorized individuals and cannot be obtained by unauthorized users
Integrity (AIS) - ANSWER-Requires that data are correct. This requires at a minimum three different efforts. First, data gathering must include a component that ensures the accuracy of the collected data. Second, data must be entered into the system accurately. Third, and most importantly, data modification must be tracked
Availability (AIS) - ANSWER-Requires that information is available when needed
Difference between processing and storage - ANSWER-Processing involves temporary information, while storage involves permanent information
Writes laws dealing with information technology - ANSWER-Outside the role of IT
Find Data Type = Customer Janet Jones - ANSWER-String [Show Less]