-
-
-
-
100

Name the maintenance phases.

major modifications, routine modifications, emergency modifications, software patches

100

What the metrics are used to measure the quality of service?

Throughput, accuracy, downtime, capacity, user levels, response time.

100

Name the types of testing in the correct order.

Unit testing, Integration testing, System testing, Business Level testing, Integration testing

100

Amount of time a system is not avaliable for processing.

Downtime.

200

Name the types of testing each of them illustrates.

 system testing;unit testing; integration testing

200

What type of conversion is shown in the illustration?

Phased conversion

200

The fact of something being easy to use , or the degree to which it is easy to use.

Usability.

200

What does QoS stand for?

QoS stands for "Quality of Service".

300

What threat to information systems is written about?Сan completely shut down a computer system, cut off service to customers, and potentially destroy the system completely.

Natural disasters.

300

Describe the features of routine modification.

They involve making changes to application or OS software to improve performance, correct problems, or enhance security. They can be simple or complex, but are not of the magnitude of major modifications, and can be deployed in the normal course of business.cations.

300

What threat to information systems is being discussed?Can be caused by natural disasters, overloaded powergrids, planned brownouts, and rolling blackouts.

Power outages.

300

What threat to information systems is being discussed? Can cause physical damage to computer systems; cyberterrorism can also cause damage, using viruses and worms to destroy data and otherwise disrupt computer-based operations, which now include critical national infrastructures such as power grids and telecommunications systems.

Acts of war.

400

Describe the features of emergency modification.

They are periodically needed to correct software problems or restore processing operations quickly. Although the changes must be completed quickly, they should also be implemented in a well-controlled manner

400

What threat to information systems is being discussed?Are mistakes made by computer operators. Common ones within an information system include entering inaccurate data and failing to follow required procedures

Human errors.

400

In the context of information systems refers to the implementation of measures or strategies aimed at discouraging potential attackers or unauthorized individuals from attempting to compromise the security or integrity of computer systems, networks, or data.

Deterrents

400

What does EFTS stand for?

Electronic funds transfer systems.

M
e
n
u