True/False
1. True
2. True
3. False
4. False
5. False
6. True
7. False
8. False
9. True
10. True
11. False
Multiple Choice
1.a
2.b
3.c
4.a
5.c
6.d
7.a
8.d
Matching
1.h
2.e
3.a
4.b
5.i
6.g
7.f
8.j
9.c
10.k
Short Answers
1. System development is the activities creating an information system.
The five phases of system development life cycle (SDLC):
- Planning : plan all things that are going to be used in the information system development
- Analysis : analyze the current system that needs development
- Design : find the hardwares and softwares needed
- Implementation : design new program or better program and train users
- Operation, Support, and Security : keep maintenancing the program
2. The four feasibilities assessment :
- operational feasibility : determines how well the system will work
- schedule feasibility : determines whether the deadline of the system is logical
- technical feasibility : determines the company has the ability to use that system
- economic feasibility : determines whether the system will return greater benefits that its cost
To gather data and information, we can review documentation, observe, survey, interview, participate in joint-application design ( JAD) sessions, and research.
3. UML has been used as the standard for object modelling and development in big companies.
A use case diagram shows how users interact with the system, while class diagram shows the system into classes and sub-classes
4. Those three major activities of operation, support, and security phase : (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
Three types of maintenance :
- corrective maintenance : corrects the wrong sector of the information system
- adaptive maintenance : includes new features to the system
- perfective maintenance : investigates and makes the system more flexible and reliable
5. Computer security plan is the safeguard to protects all the important information of a company.
Three things that a computer security plan should do :
- identify all information assets of an organization
- identify all security risks
- identify all safeguard solutions for each security risk
True/False #1 is FALSE, #3 is TRUE.
ReplyDeleteVery informative post. Keep up the good work. I would really look forward to your other posts
ReplyDeleteAcer - 14" Touch-Screen Laptop - 4GB Memory - 500GB Hard Drive - Silky Silver (V5-471P-6498)
Acer - 15.6" Laptop - 6GB Memory - 750GB Hard Drive - Gray