Types of testing and conversion. Scope creep
Maintenance phase
Information systems security
QoS.
Electronic government
100

What happens when changes are made without any control?

Scope creep.

100

Name at least 3 key activities of the maintenance phase.

Operate equipment;

Make backups;

Provide help to users;

Fix bugs;

Optimise for speed and security;

Upgrade the application to the newer versions of the software;

Revise software as necessary to meet business needs.

100

Which specialists are competent at cyber security threats, technologies and countermeasures to ensure secure computer systems?

IT security specialists.

100

What is a set of numbers that give information about a particular process or activity?

Metrics.

200

Name the types of testing in the correct order.

Unit testing

Integration testing

System testing

Business Level testing

Acceptance testing



200

What are the three main considerations of the maintenance phase?

Efficiency, usability, appropriateness.

200

Complete the sentence.

The most common threats to corporate information systems include natural __, power outages, equipment failure, human errors, software failures, _ breaches, acts of war, and malware.

Disasters, security.

200

What is a time period between when a user initiates a request for information and when the request is fulfilled?

Response time.

300

Identify the type of testing and give its description.

 

System testing ensures thet new modules work with the rest of the system hardware and software.

300

Formulate the goal of the maintenance phase.

Your answer.

300

Write a transcription of the word "maintenance".

[ˈmeɪntənəns]


300

What does QoS stand for? What metrics does it include?

Quality of service.

It includes metrics such as throughput, accuracy, downtime, capacity, user levels, response time.

400

Identify the type of conversion and give its description.

Direct conversion involves complete deactivation of an old system.

400

What are the four possible types of modifications in the maintenance phase? 

Major modifications, routine modifications, emergency modifications, software patches.

400

What measures to protect information systems reduce the likelihood of possible attacks? Give an example.

Deterrents. 

For example password.

400

Name at least 2 advantages (objectives) of e-government.

Better delivery of public services to people;

Enhancing business and industry collaborations;

Citizen empowerment through access to information;

Move effective governance.