Knowledge points for information system project managers to brush questions (continuously updated)

Mainly record your knowledge points in the process of preparing for the high-level exams.
The information system project manager’s knowledge points in the questions (arranged in the order of the questions)
1. The application of information technology is the leader of the six elements of the information system and the main front of the country’s information construction , which embodies the needs and benefits of national informatization construction.
2. The prototyping method is also called rapid prototyping, or prototyping for short. It is a method of rapidly developing an information system that uses system development tools to quickly establish a system model and show it to users based on the initial needs of users, communicate with users on this basis, and finally realize the needs of users.
3. The router works at the network layer and forwards information between networks through logical addresses.
4. Network Attached Storage (NAS) supports plug-and-play, and can economically solve the problem of insufficient storage capacity.
5. Fiber Channel Storage Area Network (FC SAN) has two major drawbacks, namely cost and complexity.
6. According to the "14th Five-Year Plan" and the outline of long-term goals for 2035, my country will enter the forefront of innovative countries in 2035, basically realize new industrialization, informatization, urbanization, and agricultural modernization, and build a modern economic system.
7. In order to test the elastic scaling capability of the cloud computing platform network, engineer Xiao Wang adopted an effective method: check whether there is a computing resource elastic scaling menu or button.
8. The characteristics of big data: (1) Volume: refers to the huge volume of data, (2) Variety: refers to the variety of data types. (3) Value; refers to the low value density; (4) Velocity: refers to the fast processing speed. (5) Veracity: Refers to the behavior or traces of data from various and various information system networks and network terminals.
9. Sensor (Sensor) is a detection device that can feel the measured information, and can transform the detected information into electrical signals or other required forms of information output according to certain rules to meet the transmission of information. , processing, storage, display, recording and control requirements. In computer systems, the primary role of sensors is to convert analog signals into digital signals.
10. Quality Function Deployment (QFD) divides software requirements into regular requirements, expected requirements and unexpected requirements.
11. The user's test in the development environment is an Alpha test.
12. Testers use tools to obtain the transmission data packets of the system, check the consistency of the contents of the sender and receiver, and verify the integrity of the data.
13. The information system has higher requirements on the amount of stored data, and its average stored data amount is higher in the securities field. The information system has higher requirements on the amount of stored data, and its average stored data amount is in PB.
14. The third stage of information system planning (ISP) focuses on integration and is carried out around the strategic needs of enterprises. The main methods include value chain analysis and so on.
15. The information system planning tool that can link the organizational structure of the enterprise with the process of the enterprise is the P/0 matrix.
16. Project life cycle characteristics: (1) Cost and manpower input are low at the beginning, peak during work execution, and fall back quickly when the project is about to end. (2) The risk and uncertainty are greatest at the beginning of the project, and gradually decrease with the decision making and the acceptance of deliverables throughout the life cycle of the project. The ability to change the final characteristics of the project's product is greatest at the beginning of the project and diminishes as the project progresses. The cost of making changes and correcting mistakes increases significantly as the project gets closer to completion.
17. The "build project team" process in project human resource management belongs to the execution process group.
18. In a project-based project organization, the project manager will have the strictest possible control over project resources.
19. The most basic feature that distinguishes a project from other tasks (operations) is one-off.
20. The purpose of software requirements analysis is to detect and resolve conflicts between requirements, discover the boundaries of software, and how software interacts with its environment, describe system requirements in detail, and derive software requirements.
21. The main functions of software quality assurance: check whether development and management activities are consistent with established process strategies and standards, check whether work products follow the content and format specified in the template, and check whether development and management activities are consistent with established processes.
22. Project management plan preparation Figure
Project Management Plan Preparation Chart
23. The purpose of technical review in the software development process is to evaluate the software product to determine its suitability for the intended use and to indicate whether the product meets the requirements.
24. The basic components of a data flow diagram include: data flow, processing, data storage, and external entities.
25. The external learnability measure should be able to evaluate how long it takes users to learn how to use a particular function, and evaluate the effectiveness of its help system and documentation.
26. Denial of service: The attacker finds a way to make the target machine stop providing services.
27. Address spoofing attack: an attack using a stolen terminal number.
28. Session hijacking: an attack method that combines sniffing and deception techniques. For example, during a normal session, the attacker participates as a third party. He can insert malicious data into the normal data packet, monitor the session between the two parties, or even take over the session instead of one host.
29. Characteristics of mobile computing: mobility, network diversity, frequent short-circuiting, asymmetry, and low reliability.

Guess you like

Origin blog.csdn.net/weixin_43485035/article/details/129049944