WGU D322 Section 7

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

customer relationship management systems (CRMs)

track and organize every interaction a company has with current and potential customers, providing data about customers' needs, wants, and behaviors

2
New cards

IT governance

system of processes that ensures the effective and efficient use of IT to enable an organization to achieve its business goals and to add value to key stakeholders in an organization

3
New cards

vision

states what the department would like to achieve

4
New cards

mission

states how they will achieve the vision

5
New cards

core values

state expected behaviors

6
New cards

Network administrators

set up, maintain, and monitor the hardware and software that support the networking components of the computer systems

7
New cards

Systems administrators

set up, maintain, and monitor devices that support business operations

8
New cards

Web administrators

control the outward-facing content on an organization's website and intranets and ensure that the sites function and integrate with back-end systems, such as supporting databases

9
New cards

Database administrators

configure and troubleshoot an organization's data repositories

10
New cards

Cybersecurity analysts

monitor the behaviors of the system components for anomalies and malicious attacks. They also put measures in place to deter, detect, and mitigate internal and external threats

11
New cards

Outsourcing

uses the resources and skills of a developed workforce from an external organization

12
New cards

offshoring,

outsourcing outside country lines

13
New cards

project outsourcing

where project management is outsourced

14
New cards

nearshoring

offshoring to countries in a closer time zone or with an economic structure close to that of the home country

15
New cards

Insourcing

assigns a project to employees within the organization

16
New cards

Scope creep

uncontrolled change of a project's scope, typically adding tasks and increased, unplanned costs to the project

17
New cards

Budget risk

budget control issues, such as underestimated or improper allocation of cost

18
New cards

Resistance to change

departments and individuals resist organizational changes resulting from the project

19
New cards

Resource risk

inability to secure sufficient resources for the project

20
New cards

Contract risk

a vendor fails to deliver on contractual obligations

21
New cards

Project dependencies

especially when completion of some tasks is dependent on the completion of other tasks

22
New cards

Project assumptions risk

when assumptions about the project are invalidated during project development

23
New cards

Benefit shortfall

the project meets the requirements but delivers fewer benefits than outlined in the business case

24
New cards

Requirements quality risk

requirements have not been properly validated or documented

25
New cards

Force majeure risk

the chance of a major negative event beyond human control, such as a natural disaster

26
New cards

Integrated development environments (IDEs)

combine tools, such as editing, compiling, and debugging tools, into a single package

27
New cards

requirements analysis

determine what services the system will provide, identify any conditions (such as time constraints and security), and define how users will interact with the system

28
New cards

feasibility study

determines whether development is possible under the given constraints and whether the development aligns with the organization's mission

29
New cards

system requirement specification (SRS)

written agreement between all parties that records the system requirements and guides system development

30
New cards

implementation phase

things such as developing programs and databases and creating data files

31
New cards

system maintenance

the system is monitored, evaluated, and modified as needed

32
New cards

corrective maintenance

remove errors to ensure functionality of the system

33
New cards

Adaptive maintenance

performed when organizational changes affect system requirements, such as changes in the organizational procedures, forms, or system controls and security needs

34
New cards

Perfective maintenance

performed when new components are introduced, or existing components are improved, to enhance overall system performance

35
New cards

Preventive maintenance

changes made to increase the life span of systems and could include restructuring, optimizing code, or updating documentation that impacts the scalability, stability, and maintainability of the system

36
New cards

waterfall model

following the development process sequentially: first requirements analysis, then design and implementation, and finally testing. Each step needed to be finished before moving on to the next

37
New cards

incremental model

system is constructed in increments. The first increment is a simplified version of the final product

38
New cards

Prototyping

building and evaluating basic versions of a proposed system

39
New cards

Agile methods

system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements. Scrum and extreme programming are both examples

40
New cards

Scrum

1. The system owner makes a prioritized wish list.

2. The scrum team selects an item toward the top of the wish list and plans the implementation during an event called "sprint."

3. The team completes the list of objectives while assessing progress in daily meetings called scrums.

4. The sprint ends with the system ready to be released.

5. A new sprint starts, using another item on the wish list.

6. This process continues until the prioritized wish list is clear.

41
New cards

uptime

the amount of time client data and resources are available on the servers

42
New cards

Disaster recovery plans (DRPs)

rely on solutions to ensure that systems can recover from catastrophic events in a reasonable amount of time with minimal data loss

43
New cards

Data mirroring

involves setting up the operating system to simultaneously write copies of the data on several storage devices

44
New cards

Data backups

can be stored on any data storage device, but tape archival is common for businesses

45
New cards

Off-site storage

locations are often found in other states. Salt mines and caves are popular locations for physical storage because of the low humidity and the protection provided by the earth's terrain. Storing data in the cloud is another popular option

46
New cards

Hot storage

allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe

47
New cards

Cold storage

Cold storage offers less frequent access and is maintained on minimal equipment that is considered lower performance

48
New cards

Mobile computing

the use of handheld devices, such as laptops, smartphones, and tablets

49
New cards

Internet of Things (IoT)

embedded and mechanical devices, objects, animals, and people are increasingly being provided with unique identifiers (UIDs), which provides the ability to transfer data, or even funds, via a network without the need for direct human interaction

50
New cards

Globalization

refers to the growing interdependence of the world's economies and cultures, brought about by the trade of goods and services and the flow of information and people