SPEA-V369 Exam 3 Study Guide

What is prototyping?

Prototyping refers to an initial stage of a software release in which developmental evolution and product fixes may occur before a bigger release is initiated. These kinds of activities can also sometimes be called a beta phase or beta testing, where an i

What is extreme programming?

Extreme programming (XP) is a software development methodology which is intended to improve software quality and responsiveness to changing customer requirements. ... The methodology takes its name from the idea that the beneficial elements of traditional

What is the SDLC?

The software development life cycle (SDLC) is a framework defining tasks performed at each step in the software development process. SDLC is a structure followed by a development team within the software organization. It consists of a detailed plan descri

What is RAD?

(Rapid Application Development) Developing systems incrementally and delivering working pieces every three to four months, rather than waiting until the entire project is programmed before implementing it.

What are the phases of the SDLC?

There are following six phases in every Software development life cycle model:
Requirement gathering and analysis.
Design.
Implementation or coding.
Testing.
Deployment.
Maintenance.

What are the steps of the SDLC? (details on phases)

Planning: The most important parts of software development, requirement gathering or requirement analysis are usually done by the most skilled and experienced software engineers in the organization. After the requirements are gathered from the client, a s

What are the guidelines for outsourcing?

See MAS publication document

What is feasibility analysis?

A feasibility study is an analysis of how successfully a project can be completed, accounting for factors that affect it such as economic, technological, legal and scheduling factors. Project managers use feasibility studies to determine potential positiv

What is a systems analyst?

a person who analyzes a complex process or operation in order to improve its efficiency, especially by applying a computer system.
System analysts carry the responsibilities of researching problems, finding solutions, recommending courses of actions and c

What is UAD???

Uniform Appraisal Dataset?

What is a conversion strategy?

A marketing tactic that encourages a customer to take a specific action. In electronic commerce, conversion marketing is the phrase used to often describe the act of converting a customer who browses your site to a paying customer.

(Conversion strategy) Direct changeover

Also known as going "cold turkey," a direct change over involves stopping the old method and beginning the new.

(Conversion strategy) Phase Implementation

The most common approach, phase implementation involves rolling out a piece of the system across the entire organization.

(Conversion strategy) Pilot Implementation

implementation involves implementing all security improvements in a single office, department, or division, and resolving issues within that group before expanding to the rest of the organization.

(Conversion strategy) Parallel Operations

Parallel operations involve running the new methods alongside the old methods.

What is maintenance?

(1) Hardware maintenance is the testing and cleaning of equipment.
(2) Software maintenance is the updating of application programs in order to meet changing information requirements, such as adding new functions and changing data formats. It also include

What is the agile methodology?

Agile software development refers to a group of software development methodologies based on iterative development, where requirements and solutions evolve through collaboration between self-organizing cross-functional teams. Agile methods or Agile process

What are the advantages of prototyping?

Benefits of Prototyping
Prototyping helps to eliminate ambiguities and improve accuracy in interpretation of system requirements and functionality
Prototyping helps to ensure that the solution does what it is supposed to do - not what the developer thinks

What is acceptable use?

An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet.
Many businesses and educational facilities require that employees or students sign an acceptabl

What is COSO?

In 1992, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) developed a model for evaluating internal controls. This model has been adopted as the generally accepted framework for internal control and is widely recognized as the d

What is ERM?

Enterprise Risk Management (ERM) is the practice of planning, coordinating, executing and handling the activities of an organization in order to minimize the impact of risk on investment and earnings. ERM extends the approach to incorporate not only risks

What is single loss expectancy?

Single-loss expectancy (SLE) is the monetary value expected from the occurrence of a risk on an asset. It is related to risk management and risk assessment.
Single-loss expectancy is mathematically expressed as:
S i n g l e ? l o s s e x p e c t a n c y (

What is the PATRIOT act?

a U.S. law enacted in response to the September 11, 2001 terrorist attacks, which gave law-enforcement officials greater ability to tap telephones and track Internet users; also called [ The Uniting and Strengthening America by Providing Appropriate Tools

What is the GLBA?

The Gramm-Leach-Bliley Act requires financial institutions - companies that offer consumers financial products or services like loans, financial or investment advice, or insurance - to explain their information-sharing practices to their customers and to

What is change management?

Change management is an IT services management (ITSM) strategy in which a systematic approach ensures the efficient and seamless flow of change in an organization's IT infrastructure. Change management helps all involved parties, including both individual

What is an RFP?

A request for proposal (RFP) is a document issued by a business or an organization to request vendor bids for products, solutions and services. The RFP provides a procurement framework to streamline the initial stages of contractor solicitation. RFP also

What is Sarbanes-Oxley?

The Sarbanes-Oxley Act of 2002 (SOX) is an act passed by U.S. Congress in 2002 to protect investors from the possibility of fraudulent accounting activities by corporations. The SOX Act mandated strict reforms to improve financial disclosures from corpora

What is BCP?

A business continuity plan (BCP) is a plan to help ensure that business processes can continue during a time of emergency or disaster. Such emergencies or disasters might include a fire or any other case where business is not able to occur under normal co

What is the ripple effect?

The ripple effect metric shows what impact changes to software will have on the rest of the system. ... The computation of ripple effect is based on the effect that a change to a single variable will have on the rest of a program; it provides a measure of

What is user acceptance testing?

User acceptance testing (UAT) is the last phase of the software testing process. During UAT, actual software users test the software to make sure it can handle required tasks in real-world scenarios, according to specifications. ... UAT is also known as b

What is a virus?

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected

What is a worm?

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

What is a denial of service attack?

A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate reque