Please enable JavaScript.
Coggle requires JavaScript to display documents.
ICT: System Life Cycle (Development and testing (Normal Data, Abnormal…
ICT: System Life Cycle
Questionnaire
DISADV
Biased and fake
All the questions are the same
Number of returns is low
ADV
Cheap;
Can stay anominous
Answer the question quickly
Interview
ADV
You can explain and gain more feedback
U can change the questions to fit the responser
You can motivate the interviewee
DISADV
The interviewee cant remain anomynous
time consuming
Expensive
Documentation
Help the user knows how to use the equipment
Disadv
Time consuming
Expensive
Design: How the form and report gonna look
Validation
Format Check
Range Check
Verification
Double - entryt
Visual Check
Development and testing
Normal Data
Abnormal Data
Live Data
Extreme Data
Implementation
Parallel
ADV
If the system fails; there will still be the old system
Can slowly train the staff
DISADV
Time-consuming
Expensive
Phase-in
ADV
It is possible to go back to the successful part
Direct- changover
ADV
The benefits will be immediate
Cost are reduced
DISADV
It will be disastrous if the new system doesnt work
Pilot
ADV
If the system fails, we still have other branches
Cheap
It is possible to train staff in one place
DISADV
Time consuming
Chap 8: Safety and security
Back and Neck Problem
Repetitive Strain injuries
Use voice activate software
Use economic keyboard
Eye Strain
Make sure the screen do not flicker
Change to LCD screen
Take regular break
Use anti flare screen
Headache
Ozone irriatation
Proper ventilation
Seperate room for laser printer
Change to other type of printrer
Electrocution
Use RCB
Check insulation on wire regularly
NO drink
check equipment
Trailing Wire
Use wireless connector
Use cable lock
Cover the wire and have them tuck under the table
Heavy Equipments Falling
Use large desk
Use strong desk
Fire risk
Dont cover the computer fan
Have fire extinguisher near by ( do not use water
Insure good ventilation in the room
Dont overload socket
E-safety
Keep your personal data, info safe
Hacking
change password regularly
def: Act of unauthorised access to your computer
use firewall
Use protection software
Fishing
def: Use legitimate looking email with a link that take you to a fake website
Use internet provide that filter out fishing email
User should always be cautious when clicking email
Dont click on suspicious link
Fake malicious program installed in your device taking you to a fake website
use anti spyware software
Try to stay alert
Key logging
Try to stay alert
Use anti spyware software