IT 2nd Term Notes
IT 2nd Term Notes
Project Management
•Project management involves applying a process to complete a project on time and within
budget
◦Initiation: Identifying ideas, setting goals, identifying stakeholders, and creating a feasibility
study A project brief, PID, or SoW is created
◦Planning: Creating a budget, setting milestones, prioritizing tasks, and creating a Gantt chart
Resources are allocated
◦Execution: Following the plan, communicating roles, and setting targets Reviews take place to
note lessons learned
◦Monitoring and Control: Monitoring progress, performance, and expenditure Adjusting the
plan as needed, and holding regular review meetings
◦Close: Terminating contracts, releasing resources, reviewing the project with the client, and
getting the project signed off
•Project management software helps with scheduling tasks, allocating resources, identifying
milestones, and setting company standards It can also assist in communication and
collaboration, decision-making, and cost tracking However, it can be expensive and require
training, and it can overcomplicate simple projects
•Gantt charts show task start and finish dates, dependencies, progress, and the current position
in a project
•Critical Path Method (CPM) identifies critical tasks that must be completed on time for the
project to finish on time It defines the minimum time for project completion
•Performance Evaluation and Review Technique (PERT) is similar to CPM but uses estimated
times for tasks, making it suitable for non-repetitive projects
•Timings in project management refer to specific durations of tasks Float is the amount of time
a task can be delayed without affecting the project timeline End points are the completion
points of tasks or phases, while milestones are key achievements
System Life Cycle
•The system life cycle includes these stages: analysis, design, development and testing,
implementation, documentation, and evaluation
◦Analysis: Gathering information about the current system and client requirements Methods
include questionnaires, interviews, observation, and document analysis A user requirements
specification is created
◦Design: Designing a new system, creating a system specification and a design specification This
includes data flow diagrams, system flowcharts, data storage, input forms, and output reports
◦Development and testing: Implementing the design and testing the system Includes test plans
and test data as well as alpha and beta testing and white box and black box testing
◦Implementation: Replacing the old system with the new one Methods include parallel running,
direct changeover, phased implementation, and pilot implementation
◦Evaluation: Reviewing the project and determining if the new system meets requirements
•Software development methods include agile, iterative, incremental, RAD and waterfall
Communications Technology
◦LANs are small, local networks with high speeds and private ownership
◦WANs span large areas with lower speeds and often use third-party infrastructure
◦Peer-to-peer networks are decentralized, with each computer having equal status
•A VPN encrypts internet connections for privacy and secure remote access
•IPsec is a network protocol that is designed to encrypt and authenticate data packets
•Mobile networks use radio waves for wireless communication 3G, 4G, and 5G offer increasing
speeds and capabilities
•Network components include
•Network servers include file servers, web servers, mail servers, application servers, print
servers, FTP servers, proxy servers, and virtual servers
•Cloud computing provides on-demand access to shared computing resources over the internet
Service models include IaaS, PaaS, and SaaS
•Bandwidth is the maximum amount of data that can be transferred over a network at a given
time
•Packet switching divides messages into smaller units for transmission It can be connection-
oriented or connectionless
•IP addresses identify devices on a network MAC addresses identify devices on a local network
•Network protocols are sets of rules for data transmission Key protocols include TCP, IP, ICMP,
ARP, HTTP, HTTPS, FTP, and SMTP
•The OSI model has seven layers, while the TCP/IP model has four or five
•Data transmission methods include fiber optic, copper cables, free space laser, radio waves,
infrared, and microwave
•Mobile communication systems use cellular networks with base stations and a core network
•Satellite communication systems transmit radio waves from ground stations via satellites GPS
uses satellites to determine locations
•Disaster recovery involves risk analysis, testing, and quantifying risks, with methods to detect
threats, prevent disasters, and restore systems after a disaster.