Systems Development Life Cycle and Software Lifecycle Models
72 Questions
7 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of cookies on the Internet?

  • Improve website design
  • Block access to certain websites
  • Identify browser and track visits to site (correct)
  • Encrypt sensitive information
  • What is the function of web beacons (web bugs) on the Internet?

  • Analyze website traffic
  • Monitor who is reading e-mail message or visiting site (correct)
  • Enhance website security
  • Block pop-up ads
  • What is the purpose of anti-spyware tools?

  • Block unwanted emails
  • Enhance internet speed
  • Encrypt online communications
  • Detect and remove surreptitiously installed software on a user’s computer (correct)
  • Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?

    <p>Patents</p> Signup and view all the answers

    What does the Digital Millennium Copyright Act (DMCA) make illegal?

    <p>Circumventing technology-based protections of copyrighted materials</p> Signup and view all the answers

    What are the negative social consequences of information systems mentioned in the text?

    <p>Reduced personal interaction, maintaining boundaries, reduced physical activity, dependence and vulnerability</p> Signup and view all the answers

    What is the largest source of repetitive stress injury (RSI) according to the text?

    <p>Computer keyboards</p> Signup and view all the answers

    What is computer vision syndrome (CVS) related to according to the text?

    <p>Eyestrain and headaches related to screen use</p> Signup and view all the answers

    What are some health risks associated with information systems according to the text?

    <p>Repetitive stress injury (RSI), computer vision syndrome (CVS), technostress</p> Signup and view all the answers

    What is the main purpose of 'Do not track' options in browsers according to the text?

    <p>To request websites not to track user activities for targeted advertising</p> Signup and view all the answers

    What is the systems development life cycle used for?

    <p>Planning, creating, testing, and deploying an information system</p> Signup and view all the answers

    What is a software lifecycle model?

    <p>A standardised format for planning, organizing, and running a new development project</p> Signup and view all the answers

    What does project planning aim to optimize?

    <p>Project risk, profit, customer satisfaction, and worker satisfaction</p> Signup and view all the answers

    Why is it difficult to monitor a Software Engineering project?

    <p>Software engineers do not produce anything physical</p> Signup and view all the answers

    What does a project plan need to describe at least?

    <p>Resources needed and dependency &amp; timing of work</p> Signup and view all the answers

    What is the systems development life cycle also referred to as?

    <p>Application development life-cycle</p> Signup and view all the answers

    What does a lifecycle model describe?

    <p>The sequence of activities carried out in an SE project and the relative order of these activities.</p> Signup and view all the answers

    What does project planning optimize?

    <p>Project risk, profit, customer satisfaction, worker satisfaction, long-term company goals.</p> Signup and view all the answers

    Why is monitoring a Software Engineering project inherently difficult?

    <p>Lack of visibility due to the absence of physical production.</p> Signup and view all the answers

    Which phase is not part of the Systems Development Lifecycle (SDLC)?

    <p>Testing</p> Signup and view all the answers

    What is a limitation of the waterfall model in Systems Development?

    <p>Extended duration for each stage</p> Signup and view all the answers

    What approach involves the development of a small part of the system at a time with subsequent iterations and improvements?

    <p>Prototyping</p> Signup and view all the answers

    What is a solution to combat content piracy mentioned in the text?

    <p>Search engine algorithms to prevent pirated content</p> Signup and view all the answers

    What are the five moral dimensions of the information age mentioned in the text?

    <p>Information rights, property rights, accountability, system quality, and quality of life.</p> Signup and view all the answers

    What principle emphasizes making decisions based on what is best for society as a whole?

    <p>Utilitarian Principle</p> Signup and view all the answers

    What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?

    <p>Codes of conduct</p> Signup and view all the answers

    What aims to protect personal information and regulate its use in the digital age?

    <p>Privacy laws</p> Signup and view all the answers

    What are the phases of the Systems Development Lifecycle (SDLC) mentioned in the text?

    <p>Initiation, Analysis, Design, Development, Maintenance</p> Signup and view all the answers

    Which model is mentioned as an alternative to the classic waterfall model in Systems Development Lifecycle (SDLC)?

    <p>Incremental model</p> Signup and view all the answers

    What are the five moral dimensions of the information age mentioned in the text?

    <p>Information rights, Property rights, Accountability, System quality, Quality of life</p> Signup and view all the answers

    Which ethical principle emphasizes making decisions based on what is best for society as a whole?

    <p>Utilitarian Principle</p> Signup and view all the answers

    'The Association of Computing Machinery (ACM)' and other professional organizations establish what for their members?

    <p>'Codes of conduct'</p> Signup and view all the answers

    What regulations aim to protect personal information and regulate its use in the digital age?

    <p>Data Protection Act and European Directive on Data Protection</p> Signup and view all the answers

    Which approach involves developing a small part of the system at a time with subsequent iterations and improvements?

    <p>Prototyping</p> Signup and view all the answers

    What is a limitation mentioned for the classic waterfall model in Systems Development Lifecycle (SDLC)?

    <p>It can be limiting for large projects where each stage can take extended periods.</p> Signup and view all the answers

    What is mentioned as a solution to combat content piracy in the text?

    <p>Search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.</p> Signup and view all the answers

    What are some deliverables involved in systems development according to the text?

    <p>Design documents, reports, project meetings</p> Signup and view all the answers

    What is the main purpose of project planning in software engineering?

    <p>Minimizing project risk and maximizing profit</p> Signup and view all the answers

    Why is it inherently difficult to monitor a Software Engineering project?

    <p>Lack of physical output in software engineering</p> Signup and view all the answers

    What does a project plan need to describe at least?

    <p>Resources needed, dependency &amp; timing of work, rate of delivery</p> Signup and view all the answers

    What is the purpose of a software lifecycle model?

    <p>Standardizing the format for planning and organizing a development project</p> Signup and view all the answers

    What does project planning aim to optimize?

    <p>Project risk, profit, customer satisfaction, worker satisfaction, long-term company goals</p> Signup and view all the answers

    What are the main activities described in a software lifecycle model?

    <p>Planning, creating, testing, deploying an information system</p> Signup and view all the answers

    What is a limitation of the waterfall model in Systems Development?

    <p>Inflexibility to accommodate changes during development</p> Signup and view all the answers

    What is the art of scheduling necessary activities in order to optimize various factors in project planning?

    <p>Project planning</p> Signup and view all the answers

    What do other engineers (e.g. civil, electronic) produce that makes monitoring their projects easier compared to software engineers?

    <p>Physical components or structures</p> Signup and view all the answers

    What is the purpose of 'Right to be forgotten' in the context of Internet privacy?

    <p>To allow individuals to request removal of their personal data from websites and online platforms</p> Signup and view all the answers

    What does the Digital Millennium Copyright Act (DMCA) make illegal?

    <p>Circumventing technology-based protections of copyrighted materials</p> Signup and view all the answers

    What is the largest source of Repetitive Stress Injury (RSI) according to the text?

    <p>Computer keyboards</p> Signup and view all the answers

    Which type of intellectual property protection grants the creator an exclusive monopoly on the ideas behind an invention for 20 years?

    <p>Patents</p> Signup and view all the answers

    What is a key function of 'Web beacons' (Web bugs) as described in the text?

    <p>Tiny graphics embedded in e-mails and Web pages to monitor who is reading e-mail messages or visiting sites</p> Signup and view all the answers

    Which phase involves producing design documents, reports, and project meetings in addition to the final information system in Systems Development Lifecycle (SDLC)?

    <p>Maintenance</p> Signup and view all the answers

    What is a limitation of the waterfall model in large projects?

    <p>It can take extended periods for each stage</p> Signup and view all the answers

    What are the five moral dimensions of the information age mentioned in the text?

    <p>Information rights, intellectual property rights, accountability, system quality, and quality of life</p> Signup and view all the answers

    What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?

    <p>To track user behavior across multiple websites</p> Signup and view all the answers

    What principle emphasizes making decisions based on what is best for society as a whole?

    <p>Utilitarian Principle</p> Signup and view all the answers

    What do professional organizations like the Association of Computing Machinery (ACM) establish for their members?

    <p>Ethical principles and codes of conduct</p> Signup and view all the answers

    What regulations aim to protect personal information and regulate its use in the digital age?

    <p>Data Protection Act and European Directive on Data Protection</p> Signup and view all the answers

    What is computer vision syndrome (CVS) related to according to the text?

    <p>Health risks associated with information systems usage</p> Signup and view all the answers

    What is the main function of 'Super cookies' (Flash cookies) as mentioned in the text?

    <p>To identify a browser and track visits to a site</p> Signup and view all the answers

    What is the largest source of Repetitive Stress Injury (RSI) according to the text?

    <p>Computer keyboards</p> Signup and view all the answers

    What does the Digital Millennium Copyright Act (DMCA) make illegal?

    <p>Circumventing technology-based protections of copyrighted materials</p> Signup and view all the answers

    'Web beacons' (Web bugs) serve what main purpose on the Internet?

    <p>Monitor who is reading e-mail messages or visiting sites</p> Signup and view all the answers

    'Right to be forgotten' in the context of Internet privacy primarily aims to:

    <p>Allow individuals to request removal of personal data from online platforms</p> Signup and view all the answers

    What is the main purpose of cookies on the Internet?

    <p>Identify browser and track visits to site</p> Signup and view all the answers

    What are some health risks associated with information systems according to the text?

    <p>Repetitive stress injury, computer vision syndrome, technostress</p> Signup and view all the answers

    What are the negative social consequences of information systems mentioned in the text?

    <p>Reduced personal interaction, maintaining boundaries, reduced physical activity, dependence and vulnerability</p> Signup and view all the answers

    What is the purpose of project planning in software engineering?

    <p>To optimize project risk, profit, customer satisfaction, worker satisfaction, and long-term company goals</p> Signup and view all the answers

    What is a limitation of the classic waterfall model in Systems Development Lifecycle (SDLC)?

    <p>Difficulty accommodating changes once the process is underway</p> Signup and view all the answers

    What are the key components that a project plan must describe?

    <p>Resources needed, dependency &amp; timing of work, rate of delivery</p> Signup and view all the answers

    Why is it inherently difficult to monitor a Software Engineering project?

    <p>Software engineers do not produce anything physical</p> Signup and view all the answers

    'The systems development life cycle' is also referred to as:

    <p>'Software development life-cycle'</p> Signup and view all the answers

    Study Notes

    • Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.

    • Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.

    • The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.

    • Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.

    • Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.

    • Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.

    • Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.

    • The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.

    • Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.

    • Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.

    • Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.

    • The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.

    • Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.

    • Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.

    • Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.

    • Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.

    • The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.

    • Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.

    • Systems development involves producing additional deliverables, such as design documents, reports, and project meetings, in addition to the final information system.

    • Systems Development Lifecycle (SDLC) consists of phases: Initiation, Analysis, Design, Development, and Maintenance.

    • The waterfall model is a classic SDLC approach, but it can be limiting for large projects where each stage can take extended periods.

    • Prototyping is an alternative approach, involving the development of a small part of the system at a time, with subsequent iterations and improvements.

    • Content piracy is a problem costing the US economy $58 billion annually, with solutions including search engine algorithms to prevent pirated content and new IT-enabled products to compete with pirated content.

    • Information systems raise ethical questions due to their potential for social change, new types of crime, and the five moral dimensions of the information age: information rights, property rights, accountability, system quality, and quality of life.

    • Ethical principles to guide decisions include the Golden Rule, Immanuel Kant's Categorical Imperative, Descartes' Rule of Change, Utilitarian Principle, Risk Aversion Principle, and Ethical "No Free Lunch" Rule.

    • The Association of Computing Machinery (ACM) and other professional organizations establish codes of conduct for their members.

    • Privacy and intellectual property rights exist in the digital age, with regulations like the Data Protection Act and the European Directive on Data Protection aiming to protect personal information and regulate its use.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge about the systems development life cycle and software lifecycle models. Learn about the process of planning, creating, testing, and deploying information systems as well as standard formats for organizing and running development projects.

    More Like This

    Use Quizgecko on...
    Browser
    Browser