PTI Chapter 12

Assignment from Mr.Tridjoko Wahdjono

 
 
True/False
1. True
2. True
3. False
4. False           
5. False           
6. True
7. False
8. False
9. True
10. True
11. False
 
Multiple choice
1. A
2. B
3. C
4. A     
5. C
6. D
7. A
8. D
 
Matching
 
1. H     
2. D     
3. A     
4. B     
5. I      
6. G
7. F
8. J
9. C
10. K
 
Short Answer
 
1.  System development is a set of activities used to
build an information system.
 
Five phases of the system development life cycle :
1) Planning, Establishes a high-level view of the intended project and determines its goals.
2) Analysis, Refines project goals into defined functions and operation of the intended application. Analyzes end-user information needs.
3) Design, Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudocode and other documentation.
4) Implementation to construct, or build, the new or modified system and then deliver it to the users.
5) Operation, Support, and Security, perform maintenance activities, monitor system performance, assess system security.
 
2. Four types of feasibility are:
– Operational feasibility measures how well the proposed information system will work.
– Schedule feasibility measures whether the established deadlines for the project are reasonable.
– Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
– Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs.
 
Six techniques used to gather data and information are:
-Review Documentation, -Observe
-Survey
-Interview
-JAD Sessions (Joint-application design sessions).
-Research.
 
3. Unified Modeling Language is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development.
 
Difference of use case diagram and class diagram are that an use case diagram graphically shows how actors interact with the information system. An actor is a user or other entity such as a program.  A class diagram graphically shows classes and subclasses in a system. On a class diagram, objects are grouped into classes.
 
4. The three major activities of the operation, support, and security phase are Perform maintenance activities, Monitor system performance, and Assess system security.
 
Type of maintenance activity.
1) Corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
2) Adaptive maintenance is the process of including new features or capabilities in an information system.
3) Performance monitoring is the process to determine whether the system is inefficient or unstable at any point.
4) Perfective maintenance is the process to investigate solutions to make the information system more efficient and reliable.
 
5. Security planning for IT may involve the development of security policies (ie, acceptable use, disaster recovery, breach notification), implementation of security controls (to include hardware, software, and personnel), risk assessment, cryptographic use and controls, and legal/ethical considerations.
 
Three things should a computer security plan do  :
1) Identify all information assets of an organization, including hardware, software documentation, procedures, people, data, facilities, and
supplies.
2) Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur.
3) For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s