Name the maintenance phases.
major modifications, routine modifications, emergency modifications, software patches
What the metrics are used to measure the quality of service?
Throughput, accuracy, downtime, capacity, user levels, response time.
Name the types of testing in the correct order.
Unit testing, Integration testing, System testing, Business Level testing, Integration testing
Amount of time a system is not avaliable for processing.
Downtime.
Name the types of testing each of them illustrates.
system testing;unit testing; integration testing
What type of conversion is shown in the illustration?
Phased conversion
The fact of something being easy to use , or the degree to which it is easy to use.
Usability.
What does QoS stand for?
QoS stands for "Quality of Service".
What threat to information systems is written about?Сan completely shut down a computer system, cut off service to customers, and potentially destroy the system completely.
Natural disasters.
Describe the features of routine modification.
They involve making changes to application or OS software to improve performance, correct problems, or enhance security. They can be simple or complex, but are not of the magnitude of major modifications, and can be deployed in the normal course of business.cations.
What threat to information systems is being discussed?Can be caused by natural disasters, overloaded powergrids, planned brownouts, and rolling blackouts.
Power outages.
What threat to information systems is being discussed? Can cause physical damage to computer systems; cyberterrorism can also cause damage, using viruses and worms to destroy data and otherwise disrupt computer-based operations, which now include critical national infrastructures such as power grids and telecommunications systems.
Acts of war.
Describe the features of emergency modification.
They are periodically needed to correct software problems or restore processing operations quickly. Although the changes must be completed quickly, they should also be implemented in a well-controlled manner
What threat to information systems is being discussed?Are mistakes made by computer operators. Common ones within an information system include entering inaccurate data and failing to follow required procedures
Human errors.
In the context of information systems refers to the implementation of measures or strategies aimed at discouraging potential attackers or unauthorized individuals from attempting to compromise the security or integrity of computer systems, networks, or data.
Deterrents
What does EFTS stand for?
Electronic funds transfer systems.