livingmylivetothefullest

It's about life

Answer of Mr. Tri Djoko Assignment Chapter 12

True/False

1. True 7. False
2. True 8. False
3. False 9. True
4. False 10. True
5. False 11. False
6. True

Multiple Choice

1. A 5. C
2. B 6. D
3. C 7. A
4. A 8. D

Matching

1. H 6. G
2. D 7. F
3. A 8. J
4. B 9. C
5. I 10. K

Short Answer

  1. 1. System development is a process of creating or altering information systems, and the models and methodologies that people use to develop these systems. In software engineering, the SDLC concept underpins many kinds of software development methodologies.
    Five phases of the system development life cycle (SDLC) are :
    1) Planning, Establishes a high-level view of the intended project and determines its goals.
    2) Analysis, Refines project goals into defined functions and operation of the intended
    application. Analyzes end-user information needs.
    3) Design, Describes desired features and operations in detail, including screen layouts,
    business rules, process diagrams, pseudocode and other documentation.
    4) Implementation, The real code is written here.
    5) Operation, Support, and Security, perform maintenance activities, monitor system
    performance, assess system security.
  2. Four types of feasibility are
    – Operational feasibility measures how well the proposed information system will work.
    – Schedule feasibility measures whether the established deadlines for the project are reasonable.
    – Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then
    support the proposed information system.
    – Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed information system will be
    greater than its lifetime costs.

    Six techniques used to gather data and information are Review Documentation, Observe, Survey, Interview, JAD Sessions – Joint-application design sessions, and Research.

  3. Unified Modeling Language is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development.
    Difference of use case diagram and class diagram are that an use case diagram graphically shows how actors interact with the information system. An actor is a user or other entity such as a program. A class diagram graphically shows classes and subclasses in a system. On a class diagram, objects are grouped into classes.
  4. The three major activities of the operation, support, and security phase are Perform maintenance activities, Monitor system performance, and Assess system security.
    Type of maintenance activity.
    1) Corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
    2) Adaptive maintenance is the process of including new features or capabilities in an information system.
    3) Performance monitoring is the process to determine whether the system is inefficient or unstable at any point.
    4) Perfective maintenance is the process to investigate solutions to make the information system more efficient and reliable.
  5. Security planning for IT may involve the development of security policies (ie, acceptable use, disaster recovery, breach notification), implementation of security controls (to include hardware, software, and personnel), risk assessment, cryptographic use and controls, and legal/ethical considerations.
    Three things should a computer security plan do are
    1) Identify all information assets of an organization, including hardware, software documentation, procedures, people, data, facilities, and
    supplies.
    2) Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur.
    3) For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Information

This entry was posted on January 17, 2013 by .
January 2013
M T W T F S S
« Dec   Mar »
 123456
78910111213
14151617181920
21222324252627
28293031  

Blog Stats

  • 6,909 hits
%d bloggers like this: