What happens when changes are made without any control?
Scope creep.
Name at least 3 key activities of the maintenance phase.
Operate equipment;
Make backups;
Provide help to users;
Fix bugs;
Optimise for speed and security;
Upgrade the application to the newer versions of the software;
Revise software as necessary to meet business needs.
Which specialists are competent at cyber security threats, technologies and countermeasures to ensure secure computer systems?
IT security specialists.
What is a set of numbers that give information about a particular process or activity?
Metrics.
Name the types of testing in the correct order.
Unit testing
Integration testing
System testing
Business Level testing
Acceptance testing
What are the three main considerations of the maintenance phase?
Efficiency, usability, appropriateness.
Complete the sentence.
The most common threats to corporate information systems include natural __, power outages, equipment failure, human errors, software failures, _ breaches, acts of war, and malware.
Disasters, security.
What is a time period between when a user initiates a request for information and when the request is fulfilled?
Response time.
Identify the type of testing and give its description.

System testing ensures thet new modules work with the rest of the system hardware and software.
Formulate the goal of the maintenance phase.
Your answer.
Write a transcription of the word "maintenance".
[ˈmeɪntənəns]
What does QoS stand for? What metrics does it include?
Quality of service.
It includes metrics such as throughput, accuracy, downtime, capacity, user levels, response time.
Identify the type of conversion and give its description.

Direct conversion involves complete deactivation of an old system.
What are the four possible types of modifications in the maintenance phase?
Major modifications, routine modifications, emergency modifications, software patches.
What measures to protect information systems reduce the likelihood of possible attacks? Give an example.
Deterrents.
For example password.
Name at least 2 advantages (objectives) of e-government.
Better delivery of public services to people;
Enhancing business and industry collaborations;
Citizen empowerment through access to information;
Move effective governance.