A centralized banking system oversees and manages financial activities, money supply, reserves, interest rates, and foreign exchange of a country.
Create, Read, Update, and Delete.
Clearly defined requirements.
Check bank balance, view bank statements, set up direct debits, apply for loans and overdrafts, pay bills, and transfer money between accounts.
Transfer of funds electronically, such as through credit cards or direct debits.
The process of merging data from a source file into a master document.
They can perform mundane and repetitive tasks.
To reduce the number of possible input errors.
A method that uses computers to provide a video link between people.
The end solution is more suitable for end users.
Expensive prototypes are not necessary as stress testing can be carried out on models.
No need to leave home for everything, visit branches less, avoid bank queues, service available 24/7, and view transactions without waiting for paper statements.
In games, medical simulations, and training programs like flight simulators.
Run spell and grammar checks, visually check for errors, and ensure correct records are included.
Using robotics to create assembly lines of products and providing students with online resources and guidance.
The final solution may not meet the needs of the entire organization.
CAD software is complex, requiring highly trained staff.
Better time utilization.
The ability to make holograms, which are free-standing 3D images.
A system to manage stock levels to avoid excess storage costs or running out of items.
Product size and quality can't be judged, leading to increased returns.
Testing carried out by developers or a special team before a system is delivered to users.
A contract between the developer and client specifying system requirements for producing a matching system.
To use computers to design physical products.
To use computers to manufacture physical products.
It shows the sequence of tasks that determine the minimum project duration.
Power cut, fire, flood, malware, unauthorized access to data.
Data cannot be deleted once posted.
A prototype that is discarded and does not become part of the final product, allowing for early requirement tuning.
Instant messaging, blogs, microblogs, vlogs, and forums.
Real-time communication where multiple people view the same content on a computer screen simultaneously.
The host controls the content on the screen.
It can be used to print items like guns.
It increases upload/download speeds and reduces latency.
Specialist doctors can guide operations through video calls.
All hardware and software required for the system, including storage considerations.
A constant internet connection.
To correct stimulus entering the eye and enhance vision.
Companies expect employees to be more available.
Encryption using mathematical algorithms with keys generated through photons.
Indicates the start and end of a flowchart.
An iterative approach where the initial prototype is developed, reviewed, and refined based on feedback.
A switch sends data packets to the desired port.
No need to pay travel expenses.
Uploading can be very slow.
Fiber optics have no electric interference, great speeds, can't be tapped, and don't suffer from signal degradation.
Saves on travel costs, which also benefits the environment.
It can stop the flow of the game.
They create assembly lines of products.
There is a question of whether the company or user should pay for accident costs.
By providing synchronized calendars, IM/video chat, and shared document storage.
Robots do dangerous work, offer greater consistency, are more accurate, can perform repeated tasks, run for longer periods, and can be operated 24/7.
To illustrate how the system will look, what data structures will be, and how the system will work.
It requires large bandwidth, making it difficult to stream.
To track and analyze budget, scheduling, and task progress.
An agreement allowing a business to automatically take a set amount of money from a person's account.
It takes a long time to produce an object.
They may replace human jobs.
A form of currency that is available only in digital or electronic form, not in physical form like coins or banknotes.
Anomaly detection, association rule, cluster detection, classification, and regression.
A router connects a LAN to a WAN and determines the most efficient route for data to reach its destination.
To test an early release of an application after alpha testing with selected users.
A set-top box and a satellite dish.
TCP/IP.
Conception and initiation, Planning and design, Execution, Monitoring and control, Closure.
The act of gaining unauthorized access to a network, allowing the hacker to read, change, and destroy data.
To track user values like heart rate and authorize access.
Data can be accessed from anywhere while online.
To find out the workings of the current system and requirements for a new system.
They can be hacked into, leading to potential data theft and identity theft.
Direct translations may not convey the meaning behind sentences.
The ability to hold 1TB of data using smaller pits and more layers.
Identity theft, which can compromise financial details and lead to unauthorized purchases.
A business that performs a majority of its operations online.
An internet-based form of money that fluctuates in value and can be used instantly without exchange rates.
They are subject to moisture, which can cause damage.
It is very risky and users need to be trained in advance.
To gather input data or output data for a system.
Involves selecting input data and checking that expected output matches actual output without knowledge of the internal workings.
Because it uses microwaves.
It can be expensive.
It defines file transfer rules.
A service where servers store and process data instead of your computer.
It cannot be used by people living in areas not covered by wireless or wired broadband connections.
Results in loss of jobs and can be costly, leading to a competitive disadvantage if a company buys machines.
How data moves in a system, including data flow, processes, and data stores.
Quick real-time translations in foreign countries.
Holographic storage records data throughout the volume of the medium, while magnetic and optical store data on the surface.
Risk = likelihood x impact.
Processes that take place within the system and decisions that are made.
The maximum time a business activity could tolerate not having essential system functionality.
A computerized version of the majority of services that a normal bank would offer.
Computer system, webcam, microphone, speakers, good broadband connection, and video conferencing software.
An overview of the structure of the system, how it was put together, and how it works.
A link sent to attendees, who must download software and enter login details.
They address the organ waitlist and match problem.
They improve speed and capability of wireless connections for data.
Satellites.
It is used by web browsers to send requests to a web server to view a web page, with HTTPS being the secure version.
It overlays computer-generated images on the real world.
It allows several users to use it at once, storing information on a central server.
To replace original data in case it is lost or damaged, but they do not stop hackers or prevent data corruption.
Massive Open Online Courses that are mostly free, include filmed lectures and resources, and allow interaction with other learners and educators.
It may lead to work overload for users or a need for temporary staff.
4K resolution.
Virtual Reality (VR).
Printing where an object is created based on a blueprint made with modeling software.
The estimated maximum amount of time that business activity has to recover systems and resume operations.
Decentralized currency systems are not controlled by any central authority.
The process of sorting through data to find trends, identify patterns, and predict changes.
It uses prototyping to develop a system in a short time frame with less emphasis on planning.
Video conferencing systems can be costly to buy.
It allows clients to upload and receive data directly from the satellite.
Distractions at home.
A print server deals with all print jobs, maintains a queue, and allows priority users to jump the queue.
A protocol is a set of rules that ensure that data is transferred correctly.
A budget and time scale, milestones, and a Gantt chart.
Types include parasitic viruses, macro viruses, email viruses, worms, and Trojan horses.
An attack designed to overload a server’s requests to cause disruption, which is easy to launch and difficult to track.
They can help in scheduling tasks and identifying dependencies.
Low Earth Orbit, Medium Earth Orbit, and Geostationary Earth Orbit.
Uses barcodes to identify products and updates stock levels in real-time or batch processing.
Barcodes made of black and white squares used for providing information.
Less risky because if the new system fails, the old system is still operational.
A user involvement method where requirements are gathered through a focus group.
Bandwidth measures the range of frequencies on a communication channel.
Radio waves, cables, or satellites.
A mail server receives and sends emails for an organization.
Bluetooth uses frequencies between 2402 and 2480 MHz and is used for communication over short distances.
Communicates roles and responsibilities to the team and sets interim targets.
It overlays information in real-time and can share images.
They control what data goes in and out of a network and can be part of a router or separate software.
Ultra-wide screens with resolutions like 2560x1080 for 2K and 4K having twice as many pixels horizontally.
Allows different forms of expression, helps find others with similar interests, and can lead to online bullying and identity theft.
In circuit switching, the packet path is decided before communication, while in packet switching, each packet takes its route and is routed between nodes.
Parts of the new system are installed one at a time.
By using recorded footage to see if the ball is over the line.
Measuring heart rate, analyzing DNA samples, artificial limbs, and using nanotechnology.
The ability of a computer to make decisions based on stimuli.
To ensure tasks are completed on time and to monitor performance and budget.
Desktop is for one project manager and has better graphics; web-based allows multiple users to access documents centrally.
Sensitive information may be exposed in a database breach.
An act that outlines principles for protecting individuals about whom data is stored, ensuring data is used fairly and securely.
A hub sends data packets to all ports; it's called a multi-port repeater.
A firewall prevents external users from gaining unauthorized access.
They are more flexible and don’t cover the broken body part.
A proxy deals with all requests to the internet and sits between the LAN and the gateway.
IMAP is an alternative method for email client software that leaves mail on the server and downloads a copy, supporting multiple folders unlike POP.
Trilateration.
It specifies how multiple downloads occur from the same file concurrently, allowing clients to download portions of the file and send them directly to each other.
To authenticate a user’s identity using unique biological characteristics like fingerprints or retina scans.
40-80 satellites.
The process of changing data to make it unreadable without authorization, using an algorithm to change the cipher.