72 Questions
What is the main purpose of cookies on the Internet?
Identify browser and track visits to site
What is the function of web beacons (web bugs) on the Internet?
Monitor who is reading e-mail message or visiting site
What is the purpose of anti-spyware tools?
Detect and remove surreptitiously installed software on a user’s computer
Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?
Patents
What does the Digital Millennium Copyright Act (DMCA) make illegal?
Circumventing technology-based protections of copyrighted materials
What are the negative social consequences of information systems mentioned in the text?
Reduced personal interaction, maintaining boundaries, reduced physical activity, dependence and vulnerability
What is the largest source of repetitive stress injury (RSI) according to the text?
Computer keyboards
What is computer vision syndrome (CVS) related to according to the text?
Eyestrain and headaches related to screen use
What are some health risks associated with information systems according to the text?
Repetitive stress injury (RSI), computer vision syndrome (CVS), technostress
What is the main purpose of 'Do not track' options in browsers according to the text?
To request websites not to track user activities for targeted advertising
What is the systems development life cycle used for?
Planning, creating, testing, and deploying an information system
What is a software lifecycle model?
A standardised format for planning, organizing, and running a new development project
What does project planning aim to optimize?
Project risk, profit, customer satisfaction, and worker satisfaction
Why is it difficult to monitor a Software Engineering project?
Software engineers do not produce anything physical
What does a project plan need to describe at least?
Resources needed and dependency & timing of work
What is the systems development life cycle also referred to as?
Application development life-cycle
What does a lifecycle model describe?
The sequence of activities carried out in an SE project and the relative order of these activities.
What does project planning optimize?
Project risk, profit, customer satisfaction, worker satisfaction, long-term company goals.
Why is monitoring a Software Engineering project inherently difficult?
Lack of visibility due to the absence of physical production.
Which phase is not part of the Systems Development Lifecycle (SDLC)?
Testing
What is a limitation of the waterfall model in Systems Development?
Extended duration for each stage
What approach involves the development of a small part of the system at a time with subsequent iterations and improvements?
Prototyping
What is a solution to combat content piracy mentioned in the text?
Search engine algorithms to prevent pirated content
What are the five moral dimensions of the information age mentioned in the text?
Information rights, property rights, accountability, system quality, and quality of life.
What principle emphasizes making decisions based on what is best for society as a whole?
Utilitarian Principle
What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?
Codes of conduct
What aims to protect personal information and regulate its use in the digital age?
Privacy laws
What are the phases of the Systems Development Lifecycle (SDLC) mentioned in the text?
Initiation, Analysis, Design, Development, Maintenance
Which model is mentioned as an alternative to the classic waterfall model in Systems Development Lifecycle (SDLC)?
Incremental model
What are the five moral dimensions of the information age mentioned in the text?
Information rights, Property rights, Accountability, System quality, Quality of life
Which ethical principle emphasizes making decisions based on what is best for society as a whole?
Utilitarian Principle
'The Association of Computing Machinery (ACM)' and other professional organizations establish what for their members?
'Codes of conduct'
What regulations aim to protect personal information and regulate its use in the digital age?
Data Protection Act and European Directive on Data Protection
Which approach involves developing a small part of the system at a time with subsequent iterations and improvements?
Prototyping
What is a limitation mentioned for the classic waterfall model in Systems Development Lifecycle (SDLC)?
It can be limiting for large projects where each stage can take extended periods.
What is mentioned as a solution to combat content piracy in the text?
Search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.
What are some deliverables involved in systems development according to the text?
Design documents, reports, project meetings
What is the main purpose of project planning in software engineering?
Minimizing project risk and maximizing profit
Why is it inherently difficult to monitor a Software Engineering project?
Lack of physical output in software engineering
What does a project plan need to describe at least?
Resources needed, dependency & timing of work, rate of delivery
What is the purpose of a software lifecycle model?
Standardizing the format for planning and organizing a development project
What does project planning aim to optimize?
Project risk, profit, customer satisfaction, worker satisfaction, long-term company goals
What are the main activities described in a software lifecycle model?
Planning, creating, testing, deploying an information system
What is a limitation of the waterfall model in Systems Development?
Inflexibility to accommodate changes during development
What is the art of scheduling necessary activities in order to optimize various factors in project planning?
Project planning
What do other engineers (e.g. civil, electronic) produce that makes monitoring their projects easier compared to software engineers?
Physical components or structures
What is the purpose of 'Right to be forgotten' in the context of Internet privacy?
To allow individuals to request removal of their personal data from websites and online platforms
What does the Digital Millennium Copyright Act (DMCA) make illegal?
Circumventing technology-based protections of copyrighted materials
What is the largest source of Repetitive Stress Injury (RSI) according to the text?
Computer keyboards
Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?
Patents
What is a key function of 'Web beacons' (Web bugs) as described in the text?
Tiny graphics embedded in e-mails and Web pages to monitor who is reading e-mail messages or visiting sites
Which phase involves producing design documents, reports, and project meetings in addition to the final information system in Systems Development Lifecycle (SDLC)?
Maintenance
What is a limitation of the waterfall model in large projects?
It can take extended periods for each stage
What are the five moral dimensions of the information age mentioned in the text?
Information rights, intellectual property rights, accountability, system quality, and quality of life
What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?
To track user behavior across multiple websites
What principle emphasizes making decisions based on what is best for society as a whole?
Utilitarian Principle
What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?
Ethical principles and codes of conduct
What regulations aim to protect personal information and regulate its use in the digital age?
Data Protection Act and European Directive on Data Protection
What is computer vision syndrome (CVS) related to according to the text?
Health risks associated with information systems usage
What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?
To identify a browser and track visits to a site
What is the largest source of Repetitive Stress Injury (RSI) according to the text?
Computer keyboards
What does the Digital Millennium Copyright Act (DMCA) make illegal?
Circumventing technology-based protections of copyrighted materials
'Web beacons' (Web bugs) serve what main purpose on the Internet?
Monitor who is reading e-mail messages or visiting sites
'Right to be forgotten' in the context of Internet privacy primarily aims to:
Allow individuals to request removal of personal data from online platforms
What is the main purpose of cookies on the Internet?
Identify browser and track visits to site
What are some health risks associated with information systems according to the text?
Repetitive stress injury, computer vision syndrome, technostress
What are the negative social consequences of information systems mentioned in the text?
Reduced personal interaction, maintaining boundaries, reduced physical activity, dependence and vulnerability
What is the purpose of project planning in software engineering?
To optimize project risk, profit, customer satisfaction, worker satisfaction, and long-term company goals
What is a limitation of the classic waterfall model in Systems Development Lifecycle (SDLC)?
Difficulty accommodating changes once the process is underway
What are the key components that a project plan must describe?
Resources needed, dependency & timing of work, rate of delivery
Why is it inherently difficult to monitor a Software Engineering project?
Software engineers do not produce anything physical
'The systems development life cycle' is also referred to as:
'Software development life-cycle'
Study Notes
-
Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.
-
Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.
-
The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.
-
Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.
-
Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.
-
Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.
-
Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.
-
The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.
-
Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.
-
Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.
-
Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.
-
The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.
-
Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.
-
Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.
-
Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.
-
Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.
-
The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.
-
Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.
-
Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.
-
Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.
-
The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.
-
Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.
-
Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.
-
Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.
-
Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.
-
The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.
-
Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.
Test your knowledge about the systems development life cycle and software lifecycle models. Learn about the process of planning, creating, testing, and deploying information systems as well as standard formats for organizing and running development projects.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.