(1)
The participants in systems development
(2)
The performance and cost objectives for systems
development
(3)
The implications of making changes during the systems
development life cycle
(4)
The function of and questions answered by each step in
the systems development life cycle (SDLC)
(5)
The definition, advantages, and disadvantages of rapid
application development (RAD) and prototyping
(6)
The types of project management tools and the
associated definitions
(7)
The types of feasibility analysis and methods for
determining feasibility
(8)
The methods of collecting data during the systems
analysis phase
(9)
Data modeling, activity modeling, and the types of
diagrams and charts associated with these approaches
(10)
The definitions and elements of logical and physical
design
(11)
Special system design considerations, such as sign-on
procedures
(12)
The various types of systems controls
(13)
The types of backups and their requirements
(14)
The steps in the RFP process and the various evaluation
techniques
(15)
The forms of systems testing
(16)
The approaches to start-up of a new system
(17)
The reasons for maintenance and the types of software
maintenance changes
(18)
The relationship between design and maintenance time
and expense
(19)
The advantages and disadvantages of externally developed
software
(20)
Policies that help to eliminate computer-related waste,
mistakes, and crimes
(21)
The roles of computers in computer crime
(22)
How computer viruses may be transmitted and detected
(23)
Privacy issues
(24)
Different types of viruses and computer-related crimes
and ways to minimize/prevent them
(25)
Health concerns related to computer use and how to
minimize them
(26) Terms such as: users, stakeholders, systems analyst, creative and critical analysis, mission-critical systems, net present value, CASE tools, critical success factors, screen and report layout, critical path, slack time, dialogue, make-or-buy, programming life cycle, hot site, cold site, hacker, cracker, script bunnies, password sniffer, software piracy, anti-virus programs, biometrics, ergonomics
Read, review, and understand the “Summary” at the end of each chapter in Stair.