policies and stratagies

?
Contract of employment
The legal agreement between an employer and an employee
1 of 39
Disciplinary procedures
Lay down the penalties for breaking company policies. These may include verbal and written warnings, fines, suspension and even instant dismissal for cases of gross misconduct
2 of 39
Security of data
Involves making sure that an organisation's data is correct, is kept confidential and is safe
3 of 39
Privacy of data
Involves ensuring that data is not seen or accessed by anyone who is not authroised to view it
4 of 39
Deliverables
Documents or systems that must be produced during the various stages of the systems life cycle
5 of 39
Approval to proceed
A signed agreement from the client that they are happy for the next stage of the life cycle to commence
6 of 39
Data decomposition diagram
A diagram that represents the processes within a system
7 of 39
Data flow diagram
A diagram that shows how data moves through a system, showing where the data comes from, what processes it passes through and where it goes to within an organisation
8 of 39
Systems flow chart
A diagram vused to define the flow of data through a system
9 of 39
White box testing
Checks the details of the processing code and algorithms
10 of 39
Black box testing
Checks that a given input procedures the correct output, rather than the details of the processing involved
11 of 39
Debugging
The process of testing program code to isolate and remove errors
12 of 39
Corrective maintenance
Involves putting right any errors that remain in the system after testing
13 of 39
Adaptive maintenance
Involves making alterations to respond to changes in the organisation or external changes such as a new security risk
14 of 39
Perfective maintenance
Improving the software to enhance its performance
15 of 39
Relationship
Describes the link between two entities, for example a student and a member of staff might be linked by the relationship "tutor", which means that member of staff is a tutor to that particular student
16 of 39
Entity
In databases, the entities are the things that have data stored about them, for example, in a system concerning a school, a student would be an entity
17 of 39
Attribute
Describes an individual data item within an entity, for example, student surname, forename and date of birth
18 of 39
Platform
A combination of hardware and software, in particular operating systems software that allows applications software to run
19 of 39
Test case
A set of test data and its expected outcomes
20 of 39
Disaster recovery strategy
Makes plans to avoid data loss and reinstate a working system within an acceptable period of time
21 of 39
Risk analysis
Used to identify each element of a successful information system and to place a value to the business on that element. It then identifies any potential threats to that element, predicting the likelihood of the threat occuring.
22 of 39
Recovery time objective
The length of time that it will take to get a system fully operational after a crisis
23 of 39
Data recovery point
The last point at which data can be recovered, i.e the time lapse between backups
24 of 39
Failover systems
Used to provide continuous service for mission critical systems such as e-commerce. If the main system fails, they immediately switch to standby services to maintain continuity. They may involve stanby hardware, software or data
25 of 39
Extranet
A section of the organisation's intranet that is available for external use, for example by suppliers or customers
26 of 39
Induction training
The training carried out when a new employee joins an organisation
27 of 39
Task-based training
Trains the user to carry out a specific routine activity, such as filling in an on-screen data entry form or operating an EPOS checkout
28 of 39
Skills-based training
Aims to give the user transferable skills that can be used in a variety of ways to perform a range of functions
29 of 39
Natural language interface
Allows the user to ask questions in normal words ratehr than using technical terms. For example, a user could serach for "reduce errors" rather than needing to know the term "validation"
30 of 39
Context-sensitive help
Gives information based on what the user was doing when they pressed the help button
31 of 39
GPS technology
Global positioning system technology tracks the position of objects using satellites
32 of 39
Supercomputers
Mainframe computers that are amongst the most powerful computers at any particular time
33 of 39
Business case
What the organisation wants to be able to do. Examples can include improving efficiency or providing a better quality service for the customer
34 of 39
Aims
A clear statement of intent signalling the purpose of the proposed project
35 of 39
Objectives
More specific than the overall project aim. They set out what the project will do in specific, measurable terms. They should be realistic and achievable within the stated time
36 of 39
External entity
Someone outside of your system who puts data in, e.g. a customer buying goods, or someone who receives data or information from the system, i.e a manager receiving a report
37 of 39
Process
A business activity, for example recording a customer's order
38 of 39
Dialogue flow diagram
A set of logical steps expressed graphically that show how the user will pass through a series of dialogues to complete a task. Each dialogue either asks the user information or confirms previously gathered data
39 of 39

Other cards in this set

Card 2

Front

Lay down the penalties for breaking company policies. These may include verbal and written warnings, fines, suspension and even instant dismissal for cases of gross misconduct

Back

Disciplinary procedures

Card 3

Front

Involves making sure that an organisation's data is correct, is kept confidential and is safe

Back

Preview of the back of card 3

Card 4

Front

Involves ensuring that data is not seen or accessed by anyone who is not authroised to view it

Back

Preview of the back of card 4

Card 5

Front

Documents or systems that must be produced during the various stages of the systems life cycle

Back

Preview of the back of card 5
View more cards

Comments

chickentikamosalah

Report

decent did in 2 mins 30

Similar ICT resources:

See all ICT resources »See all policies resources »