Systems Development Life Cycle Quiz
8 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What phase occurs before system analysis in the project lifecycle?

  • Implementation Phase
  • Design Phase
  • Definition Phase (correct)
  • Investigation Phase
  • In project management, which of the following phases follows the investigation phase?

  • Implementation Phase
  • Evaluation Phase
  • Analysis Phase
  • Definition Phase (correct)
  • What is the main purpose of the Definition Phase in project management?

  • To finalize the project budget
  • To establish project requirements (correct)
  • To document technical specifications
  • To gather user feedback
  • Which of the following activities is typically NOT part of the Definition Phase?

    <p>User training</p> Signup and view all the answers

    What type of errors can arise if the Definition Phase is poorly executed?

    <p>Unclear project objectives</p> Signup and view all the answers

    In the context of project management, which outcome is most likely if the Definition Phase is skipped?

    <p>Increased project risks</p> Signup and view all the answers

    How does the Definition Phase contribute to the overall success of a project?

    <p>By providing a clear outline of project objectives</p> Signup and view all the answers

    What can be a consequence of inadequate information gathering during the Definition Phase?

    <p>Both B and C</p> Signup and view all the answers

    Study Notes

    Multiple Choice Questions

    • Question 1: Pilot migration approach is used when a bank upgrades a computer system at one branch and then installs it at other branches if successful.

    • Question 2: An organizational general or functional manager is most involved in the definition phase of the waterfall method.

    • Question 3: The SNCF app, "oui SNCF," was designed and developed to address the needs of the many train customers who travel between cities in France. This suggests a custom design and development approach.

    • Question 4: End-user training and change management are critical during the installation phase.

    • Question 5: Changing requirements are a risk of outsourcing associated with contract lengths.

    • Question 6: Go/no-go recommendations are provided during the definition phase of the SDLC, specifically after feasibility analysis and before system analysis.

    • Question 7: Visiting vendor sites is part of the system selection process.

    • Question 8: Cost savings are an advantage of custom software development.

    • Question 9: Moving from system selection and acquisition to custom design and development depicts Mr. Smith's decision, as he moved away from using pre-built systems to developing unique in-house applications.

    • Question 10: Processes and tools over individuals and interactions is not part of the agile manifesto.

    • Question 11: Employees' careless behavior is an example of an internal threat.

    • Question 12: Security is considered a negative deliverable because it usually does not generate direct revenue or efficiency improvements, though it does cost money.

    • Question 13: Sniffers are not a form of malware.

    • Question 14: Supervised development is not an approach for acquiring IT systems or introducing IT-based information processing.

    • Question 15: Trojan horses are not viruses because they do not self-replicate.

    • Question 16: Policies regarding which computing resources are accessible to whom are a viable internal security measure.

    • Question 17: Auditing current resources (technological and human) provides the basis for risk assessment.

    • Question 18: Overloading a social networking site with inbound messages to shut it down is an example of a DDoS attack.

    • Question 19: Interconnectivity allows IoT devices to coordinate and create new applications.

    • Question 20: COVID-19 impacted 5G networks and services with short-term delays in network deployment, weakening consumer demand, and weakening demand from businesses (all of the provided options).

    • Question 21: Bitcoin is not the same as blockchain– it is a distributed database, similar to blockchain.

    • Question 22: Latency refers to the time it takes for data to travel between two points.

    • Question 23: Acceptance, reduction, and transference are three possible strategies for handling security threats.

    • Question 24: Phishing is an automated method of seeking passwords.

    • Question 25: LIDAR stands for Light Detection and Ranging.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the Systems Development Life Cycle (SDLC) and related concepts with this quiz. Explore key phases, roles, and methodologies involved in effective system design and implementation. Perfect for students and professionals looking to enhance their understanding of project management in IT.

    More Like This

    Use Quizgecko on...
    Browser
    Browser