Term | Definition |
Agile Software Development Methodologies | like waterfull, but performed repeatedly on smaller parts of the project |
Analysis | taking end-user business requirements and refining project goals into defined functions and operations of the intended system. first and most important step of SDLC where requirements and outcomes are understood |
ASCII | American Standard Code for Information Interchange - 256 characters with assigned decimal values used to represent letters, numbers, punctuation, and transmission codes between computers |
Binary | base-2 |
cloud computing | large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources |
Copyright | protects original works of authorship. can be inherited, sold and protected for life of creator + 50 years, or 75 years from date of creation if work for hire |
creative commons attribution | permits users to distribute remix tweak and build upon existing work (even commercially) as long as they credit for original creation is retained |
creative commons no commercial nor derivative | users can use it |
creative commons no derivative | redistribution (commercial and non-commercial) as long as it is passed along unchanged in its entirety with credit |
creative commons non-commercial attribute share alike | users can remix tweak build and distribute if non-commercial and credit given and licensed as non-commercial share alike |
creative commons non-commercial | users can remix tweak build and distribute if non-commercial and credit given and no other license is required |
creative commons share alike | attribution rights and distribute rights as long as new creation is also marked share alike |
Data | Unorganized facts that have been collected |
Decimal | base-10 |
Design | describing the desired features and operations of the system including screen layouts, business rulers, process diagrams, pseudo code, and other documentation |
Development | involves taking all of the detailed design documents form the design phase and transforming them into the actual system. For programming, this is the coding stage. |
Fair use | use of copyrighted material for criticism, comment, news reporting, teaching, scholarship and research for 1 year |
Goals | the evaluation criteria that determines if the project has been successfully completed |
Hexadecimal | base-16 |
Hybrid cloud | provides both public and private services and applications. |
Implementation | Placing the system into production so users can begin to perform actual business operations with the system. |
Information | data which has been organized into a table, chart, or other product |
Intellectual property | products that come from the human mind |
Knowledge | understanding and additional questions generated when information is analyzed and compared |
Maintenance | Performing changes corrections, feature additions and upgrades to ensure the system continues to meet the business goals. This phase continues for the life of the system. |
Patent | protects new, useful, non obvious inventions and designs. generally protected for 17 years after issuance, but depends on type |
Planning | Most critical phase. plan of the intended project and determining project goals. Assessing project feasibility. |
Private cloud | cloud available only to subscribed individuals or people within a particular company's doman |
project scope | specify boundaries for the project, i.e., identifying things that the project will not include. |
Public cloud | cloud available to the general public |
Public domain | intellectual property with expired protection |
RAD | focus on involving users at every step, developing a prototype |
SDLC | The overall process for developing information system form planning and analysis through implementation and maintenance |
Stakeholders | all individuals that will use, or be affected by, the project |
Testing | Involves bringing all the project pieces together into a special testing environment to the test for errors bugs, and interoperablity and verify that the system meets all of the business requirements defined in the analysis phase. |
Trade secret | protect valuable information for a competitive edge as long as owner tries to keep secret. protected by state law as long as the owner tries to keep it secret |
Trademark | protects word, names, symbols used by manufacturers to uniquely identify their products. protected as long as the product is being produced |
Virtual application | applications provided in the cloud including and users access via an installed client software |
Virtual service | cloud services including operating systems programming languages execution environments database and web server. These are either virtual machines |
Waterfall Methodology | Each phase of the SDLC is performed sequentially |