Discovering Computer 2011 – Living in a Digital World
Lecturer : Tri Djoko Wahjono
- An information system supports daily, short-term, and long-range activities of systems analysts. (True)
- A systems analyst is responsible for designing and developing an information system. (True)
- Operational feasibility measures whether an organization has the hardware, software, and people needed to support a proposed information system. (False)
- Documentation should be updated only after a project is complete. (False)
- In detailed analysis, the systems analysts develop the proposed solution with a specific hardware or software in mind. (False)
- Structured English is a style of writing that describes the steps in a process. (True)
- Object modeling combines the data with the processes that act on that data into a single unit, called a method. (False)
- The only major activity of the design phase is the development of all of the details of the new or modified information system. (False)
- Some VARs provide complete systems, known as a turnkey solution. (True)
- During program design, the systems analyst prepares the program specification package, which identifies the required programs and the relationship among each program, as well as the input, output, and database specifications. (True)
- With a pilot conversion, multiple locations in the organization use the new system. (False)
- A. Extreme project management
- B. PERT chart
- C. Project request
- A. Mandated by management or some other governing body
- C. Decision table
- D. System proposal
- A. Computer-aided software engineering (CASE)
- D. Acceptance
- System developer, h. responsible for designing and developing an information system
- Project manager, d. shows how actors interact with an information system
- Request for system services, a. becomes the first item in the project notebook and triggers the planning phase
- Process modeling, b. analysis and design technique that describes processes that transform inputs into outputs
- Project dictionary, i. contains all the documentation and deliverables of a project
- Data dictionary, g. stores a name, description, and other details about each data item
- Object, c. working model of the proposed system
- Packaged software, j. mass-produced, copyrighted, prewritten software available for purchase
- Prototype, c. working model of the proposed system
- Performance monitoring, k. determines whether the system is inefficient or unstable at any point
- – What is system development?
System development is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. In software engineering, the SDLC concept underpins many kinds of software development methodologies.
– Describe the five phases of the system development life cycle (SDLC).
* Planning, Establishes a high-level view of the intended project and determines its goals.
* Analysis, Refines project goals into defined functions and operation of the intended application. Analyzes end-user information needs.
* Design, Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudo code and other documentation.
* Implementation, The real code is written here.
* Operation, Support, and Security, perform maintenance activities, monitor system performance, assess system security.
- – What are four types of feasibility, and what does each measure?
* Operational feasibility measures how well the proposed information system will work.
* Schedule feasibility measures whether the established deadlines for the project are reasonable.
* Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
* Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs.
– What are six techniques used to gather data and information?
Six techniques used to gather data and information are Review Documentation, Observe, Survey, Interview, JAD Sessions – Joint-application design sessions, and Research.
- – How is UML used?
Unified Modeling Language is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development.
– How is a use case diagram different from a class diagram?
Difference of use case diagram and class diagram are that an use case diagram graphically shows how actors interact with the information system. An actor is a user or other entity such as a program. A class diagram graphically shows classes and subclasses in a system. On a class diagram, objects are grouped into classes.
- – What are the three major activities of the operation, support, and security phase?
The three major activities of the operation, support, and security phase are Perform maintenance activities, Monitor system performance, and Assess system security.
– Describe each type of maintenance activity.
* Corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
* Adaptive maintenance is the process of including new features or capabilities in an information system.
* Performance monitoring is the process to determine whether the system is inefficient or unstable at any point.
* Perfective maintenance is the process to investigate solutions to make the information system more efficient and reliable.
- – What is a computer security plan?
Security planning for IT may involve the development of security policies (ie, acceptable use, disaster recovery, breach notification), implementation of security controls (to include hardware, software, and personnel), risk assessment, cryptographic use and controls, and legal/ethical considerations.
– What three things should a computer security plan do?
* Identify all information assets of an organization, including hardware, software documentation, procedures, people, data, facilities, and
* Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur.
* For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.