Wednesday 16 January 2013

Chapter 12


Discovering Computers 2011 : Living in a Digital World Answer

True/False


1. False
2. True 
3. False 
4. False 
5. False 
6. True
7. False
8. False
9. True
10.True
11.False



Multiple Choice

1. A
2. B
3. C
4. A
5. C
6. D
7. A
8. D

Matching

1.  H
2.  E
3.  A
4.  B
5.  I
6.  G
7.  F
8.  J
9.  C
10. C

Short Answer

1. A)Set of activities used to build an information system

B)1. Planning
in this process the team reviews and prioritizes project requests, allocate resources and form project development team.

2. Analysis 
in this stage the current system is studied. Then the user’s requirements are determined and finally a solution will be given to the client.

3. Design 
in this stage, both software and hardwares required are acquired, also the details of the system is also developed.

4. Implementation
in this step the new system is installed and tested, the users are also trained to use the system. The convertion to the new system also happens on this step.
5. Operation,Support,Security, in this step the system is continually maintenanced, monitored and the security is assessed.

2. A) – Operational Feasibility, measures how well the proposed information system will work.
o Schedule Feasibility measures whether the established deadlines for the project are reasonable.
o Technical Feasilibity measures whether the organization has or can obtain the hardware, software and people needed to deliver and then support the proposed information system
o Economic Feasibility measures whether the lifetime benefits of the proposed information system will be greater than its lifetime cost.
B) Review Documentation, Observe, Survey, Interview, JAD sessions, Research

3. A) UML is used by using the tools in it, usually the case and class diagrams.

B) a case diagram graphically shows how actors interact with the information system. An actor is the user / entity and the use case is function that actor can perform, while class diagram graphically shows classes and one or more lower levels, called subclasses, in a system. Lower levels ( subclasses) contain attributes of higher levels ( classes) in concept called inheritance.

4. A) Perform maintenance activities, Monitor system performance, and assess system security.

B) Perform Maintenance activities : maintenance is series of actions taken to prolong the system’s life, either by improving the system (adding new features) , or repairing a bug / error in system logic.

Monitor system performance : Monitoring is an action of observing how well the system is running, whether there are problems with the system, effectivity of the costs etc.

Assess System security : Assess System security is to decide whether the security of a system is safe enough to keep sensitive datas from being stolen.

5. A)A plan that summarizes in writing all of the safeguards that are in place to protect an organization’s information assets.

B)1. Identify all information assets of an organization, including hardware, software, documentation, procedures, people,data, facilities and supplies

2. Identify all security risks that may cause an information asset loss

3. For each risk, identify the safeguards that exist to derect, prevent and recover from a loss

0 comments:

Post a Comment