Implementation phase
Maintenance phase
QoS
Electronic Government
100

What is "Scope creep"?

Scope creep is what happens when changes are made without any control

100

What is the main goal of maintenance phase 

The main goal of the maintenance phase is to ensure the functionality and sustainability of a system after its initial development or implementation, including bug fixing and updates.

100

What does QoS stand for?

Quality of service

100

What are the types of E-Governance?

E-services and E-collaboration

200

Name the types of testing and describe them 

Types of testing include unit testing (ensures each module works correctly), Integration testing (all the modules work together correctly), System testing (new modules work with the rest of the system hardware and software), Business level testing (done by business analysts or professional testers), Acceptance testing (to verify that the new inf system works as required).

200

Name the basic maintenance phase activities

operate equipment; make backups; provide help to users; fix bugs; optimize for speed and security; revise software as necessary to meet business needs

200

What is "metrics"?

Metrics - a set of numbers that give inf about a particular process or activity. 

200

What are the objectives of Electronic Government?

Better delivery of public services to people; Enhancing business and industry collaborations; Citizen empowerment through access to information; More effective governance

300

Identify the strategies to convert data

Direct conversion - completely deactivates the old system and immediately activates the new system; Parallel conversion keep both the old and new systems activated therefore more costly in terms of time and resources; Phased conversion activates one module at a time ; Pilot conversion activates one branch at a time, and if it works correctly, the new system is activated at the next branch

300

Identify the types of modification during the maintenance phase

major modifications (significant functional changes), routine modifications (to improve performance; simple or complex), emergency modifications (needed to correct software problems or restore processing operations) and software patches (program modifications involving externally developed software).

300

What are the potential threats to inf systems?

Potential threats to inf systems are natural disasters (complete shut down), power outages, equipment failures, human errors, software failures, security breaches, acts of war and malware

300

What are the advantages of e-government?

more transparency for the government as it enables the public to be informed about what government is working on; less paper consumption by implementing e-government; creating open and transparent market and a stronger economy; accessibility of public services

400

Look at the diagrams and identify which type of conversion they illustrate. 

1 - Pilot

2 - Direct

3 - Parallel

4 - Phased

400

 Can you explain the difference between major modifications and emergency modifications in the context of software development?

Major modifications involve significant functional changes to the software, while emergency modifications are necessary to fix critical problems or restore operation. The usual changes are made to improve performance or add new features in a simple or complex way.

400

What are the key quality-of-service metrics used to measure the performance of an inf system?

Throughput (amount of data processed in a particular time interval); Accuracy (number of errors occurring in a particular time); Downtime (time during which system isn’t available for procesing); Capacity (available storage space, number of users, number of connections or number of packets); User level (the number of users at peak, average and low times); Response time (is a time period between when a user initiates a request for information and when the request is fulfilled)

400

What are the measures to protect data and inf systems?

To protect data and information systems, several measures can be implemented: creating password, biometric security and firewall; availability of encryption, data backup; having the disaster recovery plan and antivirus, regular file updates.

M
e
n
u