1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
customer relationship management systems (CRMs)
track and organize every interaction a company has with current and potential customers, providing data about customers' needs, wants, and behaviors
IT governance
system of processes that ensures the effective and efficient use of IT to enable an organization to achieve its business goals and to add value to key stakeholders in an organization
vision
states what the department would like to achieve
mission
states how they will achieve the vision
core values
state expected behaviors
Network administrators
set up, maintain, and monitor the hardware and software that support the networking components of the computer systems
Systems administrators
set up, maintain, and monitor devices that support business operations
Web administrators
control the outward-facing content on an organization's website and intranets and ensure that the sites function and integrate with back-end systems, such as supporting databases
Database administrators
configure and troubleshoot an organization's data repositories
Cybersecurity analysts
monitor the behaviors of the system components for anomalies and malicious attacks. They also put measures in place to deter, detect, and mitigate internal and external threats
Outsourcing
uses the resources and skills of a developed workforce from an external organization
offshoring,
outsourcing outside country lines
project outsourcing
where project management is outsourced
nearshoring
offshoring to countries in a closer time zone or with an economic structure close to that of the home country
Insourcing
assigns a project to employees within the organization
Scope creep
uncontrolled change of a project's scope, typically adding tasks and increased, unplanned costs to the project
Budget risk
budget control issues, such as underestimated or improper allocation of cost
Resistance to change
departments and individuals resist organizational changes resulting from the project
Resource risk
inability to secure sufficient resources for the project
Contract risk
a vendor fails to deliver on contractual obligations
Project dependencies
especially when completion of some tasks is dependent on the completion of other tasks
Project assumptions risk
when assumptions about the project are invalidated during project development
Benefit shortfall
the project meets the requirements but delivers fewer benefits than outlined in the business case
Requirements quality risk
requirements have not been properly validated or documented
Force majeure risk
the chance of a major negative event beyond human control, such as a natural disaster
Integrated development environments (IDEs)
combine tools, such as editing, compiling, and debugging tools, into a single package
requirements analysis
determine what services the system will provide, identify any conditions (such as time constraints and security), and define how users will interact with the system
feasibility study
determines whether development is possible under the given constraints and whether the development aligns with the organization's mission
system requirement specification (SRS)
written agreement between all parties that records the system requirements and guides system development
implementation phase
things such as developing programs and databases and creating data files
system maintenance
the system is monitored, evaluated, and modified as needed
corrective maintenance
remove errors to ensure functionality of the system
Adaptive maintenance
performed when organizational changes affect system requirements, such as changes in the organizational procedures, forms, or system controls and security needs
Perfective maintenance
performed when new components are introduced, or existing components are improved, to enhance overall system performance
Preventive maintenance
changes made to increase the life span of systems and could include restructuring, optimizing code, or updating documentation that impacts the scalability, stability, and maintainability of the system
waterfall model
following the development process sequentially: first requirements analysis, then design and implementation, and finally testing. Each step needed to be finished before moving on to the next
incremental model
system is constructed in increments. The first increment is a simplified version of the final product
Prototyping
building and evaluating basic versions of a proposed system
Agile methods
system development methodologies that propose incremental implementations, respond to rapidly changing requirements, and reduce the emphasis on rigorous requirements. Scrum and extreme programming are both examples
Scrum
1. The system owner makes a prioritized wish list.
2. The scrum team selects an item toward the top of the wish list and plans the implementation during an event called "sprint."
3. The team completes the list of objectives while assessing progress in daily meetings called scrums.
4. The sprint ends with the system ready to be released.
5. A new sprint starts, using another item on the wish list.
6. This process continues until the prioritized wish list is clear.
uptime
the amount of time client data and resources are available on the servers
Disaster recovery plans (DRPs)
rely on solutions to ensure that systems can recover from catastrophic events in a reasonable amount of time with minimal data loss
Data mirroring
involves setting up the operating system to simultaneously write copies of the data on several storage devices
Data backups
can be stored on any data storage device, but tape archival is common for businesses
Off-site storage
locations are often found in other states. Salt mines and caves are popular locations for physical storage because of the low humidity and the protection provided by the earth's terrain. Storing data in the cloud is another popular option
Hot storage
allows organizations the quickest access to restore critical data in the event of a disaster or catastrophe
Cold storage
Cold storage offers less frequent access and is maintained on minimal equipment that is considered lower performance
Mobile computing
the use of handheld devices, such as laptops, smartphones, and tablets
Internet of Things (IoT)
embedded and mechanical devices, objects, animals, and people are increasingly being provided with unique identifiers (UIDs), which provides the ability to transfer data, or even funds, via a network without the need for direct human interaction
Globalization
refers to the growing interdependence of the world's economies and cultures, brought about by the trade of goods and services and the flow of information and people