2013-01-10

Answers to Chapter 12

True/False

1. T
2. T
3. F
4. F
5. F
6. T
7. F
8. F
9. T
10.T
11.F

Multiple Choice

1. A) Extreme Project Management
2. B) PERT Chart
3. C) Project Request
4. A) Mandated by Management Or Some Other Governing Body
5. C) Decision Table
6. D) System Proposal
7. A) Computer-Aided Software Engineering (CASE)
8. D) Acceptance

Matching

1. H
2. E
3. A
4. B
5. I
6. G
7. F
8. J
9. C
10.D

Short Answer

1. (620) Set of activities used to build an information system.

-> Planning
    @ Review project requests
    @ Prioritize project requests
    @ Allocate resources
    @ Form project development team

-> Analysis
    @ Conduct preliminary investigation
    @ Perform detailed analysis activities;
        * Study current system
        * Determine user requirements
        * Determine solution
-> Design
    @ Acquire hardware and software, if necessary
    @ Develop details of system

-> Implementation
    @ Develop programs, if necessary
    @ Install and test new system
    @ Train users
    @ Convert to new system

-> Operation, Support, and Security
    @ Perform maintenance activities
    @ Monitor system performance
    @ Assess system security

2. (624) -> Operational Feasibility
-> Schedule Feasibility
-> Technical Feasibility
-> Economic Feasibility

@ Review Documentation
@ Observe
@ Survey
@ Interview
@ JAD Sessions
@ Research

3. UML is a graphical tool that enables analysts to document a system. It consist of many irrelevant diagrams.

-> Case diagram graphically shows how user interact with the information system.
-> Class diagram graphically show classes and subclasses in a system.

4.(645) -> Perform maintenance activities
   -> Monitor system performance
   -> Assess system security

@ Corrective Maintenance
    Process of diagnosing and correcting errors in an information system.
@ Adaptive Maintenance
    Process of including new features or capability in an information system. To perform adaptive maintenance, the analyst returns tot he planning phase.
@ Perfective Maintenance
    Make the information system more reliable and efficient if the system is determined to be inefficient or unstable at any point.

5. Computer security plan is writing all of the safeguards that are in place to protect an organization's information assets.

@ Identify all information assets of an organization including hardware, software, documentation, procedures, people, data, facilities, and supplies.
@ Identify all security risks that may cause an information asset loss.
@ For each risk, identify the safeguard that exist to detect, prevent, and recover from a loss.

Tidak ada komentar:

Posting Komentar