Podcast
Questions and Answers
- During analysis, Data Flow Diagrams, Decision Tables, and Data Dictionaries are used to map out information flow, simplify decision rules, and explain ______ fields.
- During analysis, Data Flow Diagrams, Decision Tables, and Data Dictionaries are used to map out information flow, simplify decision rules, and explain ______ fields.
database
- Different types of software include program software, business process management, customer relationship management, and ______ software.
- Different types of software include program software, business process management, customer relationship management, and ______ software.
productivity
- Bespoke software is customized to a specific company's needs, but development is time-consuming and ______.
- Bespoke software is customized to a specific company's needs, but development is time-consuming and ______.
expensive
- Anti-virus software monitors computer systems for virus infections using unique signatures and quarantines ______ files.
- Anti-virus software monitors computer systems for virus infections using unique signatures and quarantines ______ files.
Signup and view all the answers
- Backup methods include full, incremental, differential, and ______-father-son backup, each with advantages and disadvantages.
- Backup methods include full, incremental, differential, and ______-father-son backup, each with advantages and disadvantages.
Signup and view all the answers
- Disaster recovery plans include a recovery site, a data restoration procedure, recovery time and point objectives, regular testing and verification, and ______ training.
- Disaster recovery plans include a recovery site, a data restoration procedure, recovery time and point objectives, regular testing and verification, and ______ training.
Signup and view all the answers
- The feasibility report includes identifying the scope of the current system, existing hardware and software, problems with the system, and understanding the requirements and ability to cope with new system ______.
- The feasibility report includes identifying the scope of the current system, existing hardware and software, problems with the system, and understanding the requirements and ability to cope with new system ______.
Signup and view all the answers
- Evaluation determines how well the system meets initial requirements, identifies necessary changes, and plans for system ______.
- Evaluation determines how well the system meets initial requirements, identifies necessary changes, and plans for system ______.
Signup and view all the answers
- Maintenance is ongoing and involves user guides, technical manuals, and ______ checking.
- Maintenance is ongoing and involves user guides, technical manuals, and ______ checking.
Signup and view all the answers
Study Notes
Overview of Systems Analysis, Design, and Implementation
- A Systems Analyst investigates the existing system using methods such as questionnaires, feasibility reports, interviews, and observing staff.
- The feasibility report includes identifying the scope of the current system, existing hardware and software, problems with the system, and understanding the requirements and ability to cope with new system demands.
- During analysis, Data Flow Diagrams, Decision Tables, and Data Dictionaries are used to map out information flow, simplify decision rules, and explain database fields.
- The design stage includes hardware, software, network, staff issues, and security procedures.
- Implementation involves selecting a changeover method, installing hardware and software.
- Maintenance is ongoing and involves user guides, technical manuals, and error checking.
- Evaluation determines how well the system meets initial requirements, identifies necessary changes, and plans for system evolution.
- Different types of software include program software, business process management, customer relationship management, and productivity software.
- Bespoke software is customized to a specific company's needs, but development is time-consuming and expensive.
- Anti-virus software monitors computer systems for virus infections using unique signatures and quarantines infected files.
- Backup methods include full, incremental, differential, and grandfather-father-son backup, each with advantages and disadvantages.
- Disaster recovery plans include a recovery site, a data restoration procedure, recovery time and point objectives, regular testing and verification, and employee training.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of Systems Analysis, Design, and Implementation with this informative quiz! From understanding the role of a Systems Analyst to learning about different types of software and backup methods, this quiz covers a range of topics to enhance your understanding of system development. Whether you're a student or a professional in the field, this quiz is sure to challenge and educate you on the ins and outs of systems development.