WJEC GCSE Digital Technology - Topic 2 Fill in the Blanks

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

  • During analysis, Data Flow Diagrams, Decision Tables, and Data Dictionaries are used to map out information flow, simplify decision rules, and explain ______ fields.

database

  • Different types of software include program software, business process management, customer relationship management, and ______ software.

productivity

  • Bespoke software is customized to a specific company's needs, but development is time-consuming and ______.

expensive

  • Anti-virus software monitors computer systems for virus infections using unique signatures and quarantines ______ files.

<p>infected</p> Signup and view all the answers

  • Backup methods include full, incremental, differential, and ______-father-son backup, each with advantages and disadvantages.

<p>grandfather</p> Signup and view all the answers

  • Disaster recovery plans include a recovery site, a data restoration procedure, recovery time and point objectives, regular testing and verification, and ______ training.

<p>employee</p> Signup and view all the answers

  • The feasibility report includes identifying the scope of the current system, existing hardware and software, problems with the system, and understanding the requirements and ability to cope with new system ______.

<p>demands</p> Signup and view all the answers

  • Evaluation determines how well the system meets initial requirements, identifies necessary changes, and plans for system ______.

<p>evolution</p> Signup and view all the answers

  • Maintenance is ongoing and involves user guides, technical manuals, and ______ checking.

<p>error</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Overview of Systems Analysis, Design, and Implementation

  • A Systems Analyst investigates the existing system using methods such as questionnaires, feasibility reports, interviews, and observing staff.
  • The feasibility report includes identifying the scope of the current system, existing hardware and software, problems with the system, and understanding the requirements and ability to cope with new system demands.
  • During analysis, Data Flow Diagrams, Decision Tables, and Data Dictionaries are used to map out information flow, simplify decision rules, and explain database fields.
  • The design stage includes hardware, software, network, staff issues, and security procedures.
  • Implementation involves selecting a changeover method, installing hardware and software.
  • Maintenance is ongoing and involves user guides, technical manuals, and error checking.
  • Evaluation determines how well the system meets initial requirements, identifies necessary changes, and plans for system evolution.
  • Different types of software include program software, business process management, customer relationship management, and productivity software.
  • Bespoke software is customized to a specific company's needs, but development is time-consuming and expensive.
  • Anti-virus software monitors computer systems for virus infections using unique signatures and quarantines infected files.
  • Backup methods include full, incremental, differential, and grandfather-father-son backup, each with advantages and disadvantages.
  • Disaster recovery plans include a recovery site, a data restoration procedure, recovery time and point objectives, regular testing and verification, and employee training.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser