QUESTIONS WITH ANSWERS
◉ SDLC Planning. Answer: Identifying and selecting system projects.
◉ SDLC Analysis. Answer: Determining business requirements.
◉ SDLC Design. Answer: Creating system architecture.
◉ SDLC Implementation. Answer: Building, testing, converting,
training.
◉ System Conversion. Answer: Switching to a new system.
◉ Parallel Conversion. Answer: Running old and new systems
together.
◉ Direct Conversion. Answer: Immediate switch to new system.
◉ Phased Conversion. Answer: Gradual transition by module.
◉ Pilot Conversion. Answer: Small group tests system first.
, ◉ Computer Crime. Answer: Using a computer to commit illegal acts.
◉ Hacker. Answer: Person gaining unauthorized access.
◉ Cracker. Answer: Malicious hacker causing damage.
◉ Hacktivist. Answer: Ideologically motivated hacker.
◉ Unauthorized Access. Answer: Entering a system without
permission.
◉ Information Modification. Answer: Altering data without
authorization.
◉ Social Engineering. Answer: Manipulating people to gain access.
◉ Phishing. Answer: Fraudulent attempt to steal info via email.
◉ Spear Phishing. Answer: Targeted phishing attack.
◉ Vishing. Answer: Voice-based phishing attempt.