Systems Analysis Dr Wilson Exam 3
Siobhan has a feature in the dialog box that must allow her users to select one or more choices from a group. Which of the following dialog box components is she most likely to use?
Check box
Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest Eamon to use?
Cipher code
_____ use a keyword to encode a number.
Cipher codes
_____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.
Flowcharts
A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
Foreign key
_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen.
Form filling
One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident?
Extortion
_____ measures the time between submitting a request for information and the fulfillment of the request.
Turnaround time
It can include grand totals for numeric fields and other end-of-report information.
Report footer
It identifies the report and contains the report title, date, and other necessary information.
Report header
Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called _______.
acceptable tests
The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
allocated baseline
Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.
local area network (LAN)
In a structured chart, a curved arrow represents a ______, which indicates that one or more modules are repeated.
loop
A system design where the server performs all the processing is described as _____.
mainframe architecture
Perfective maintenance usually is cost effective _____ a system's operational life.
during the middle of
The inherent efficiency of high-volume processing on larger computers is called _____.
economy of scale
EBCDIC and ASCII both require _____ bits for storage of each character.
eight
The data mining technique that relies on association rule learning is often called _____.
market basket analysis
Input _____ is a template or pattern that restricts data entry and prevents errors.
mask
A class diagram includes the class ______, which represent the program logic.
methods
In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.
metrics
In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth.
middleware
To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.
middleware
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.
mnemonic
In a(n) _____ design, one can create individual components that connect to a higher-level program or process.
modular
A ______ consists of related program code organized into small units that are easy to understand and maintain.
module
Companies use various _____ methods to maintain output integrity and security.
output control
In _____, two programmers work on the same task on the same computer; one drives while the other navigates.
pair programming
As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period.
parallel operation
A disadvantage of a bus network is that _____.
performance can decline as more users and devices are added
As the accompanying figure illustrates, the _____ changeover method allows the new system to be implemented in stages, or modules.
phased operation
As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system as a selected location of the company.
pilot operation
A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.
platform
A(n) ______ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device.
podcast
A popular security solution is the use of a network-based application, often called a _____, which controls access to and from workstation interfaces.
port protector
In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
primary key
Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.
privilege escalation attack
In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.
process-control
The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.
product baseline
The environment for the actual system operation is called the ______.
production environment
Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.
programmer/analyst
The main objective of _____ is to avoid problems or to identify them as soon as possible.
quality assurance
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.
query language
A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value.
range check
Printed output is used in _____, which are output documents that are later entered back into the same or another information system.
turnaround documents
During _____, programmers must test programs that interact with other programs and files separtely before they are integrated into the system.
unit testing
The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.
unit testing
A table design that contains a repeating group is called _____.
unnormalized
In a _____ system, the distinction blurs between input, output, and the interface itself.
user-centered
When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.
users
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
wireless local area network (WLAN)
This is important in implementing systems that are volume-related, such as transaction processing systems.
802.11g
This is a standard that increased bandwidth to 54 Mbps.
802.11g
One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend?
A mesh network
Might include company hardware, software, data, networks, people, or procedures.
Asset
Hostile act that targets systems or a company itself.
Attack
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.
Encryption
A coding method used on mainframe computers and high-capacity servers.
Extended Binary Coded Decimal Interchange Code (EBCDIC)
_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.
Fault management
This is another name for the wireless configuration in which a central wireless device is used to serve all wireless clients.
Infrastructure mode
_____ requires that a software supplier document all testing and maintain records of test results.
International Organization for Standardization (ISO)
Records everything that is typed into the keyboard, including passwords, while the system continues to function normally.
Keystroke logger
A risk control strategy that reduces the impact of a risk by careful planning and preparation.
Mitigation
Combination of hardware and software that allows computers to interact with a network.
Network interface
Uses a single key to encrypt and decrypt information.
Private key encryption
_____ analyzes an organization's assets, threats, and vulnerabilities.
Risk identification
This is a process that automatically allows a wireless client to associate with a stronger access point.
Roaming
This is a device that connects network segments, determines the most efficient data path, and guides the flow of data.
Router
_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.
Scalability
Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.
Secondary key
Protects the system and keeps it safe, free from danger, and reliable.
Security
Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product's warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use?
Significant digit code
One of George's clients reports that the traffic on their network is being intercepted and scanned for valuable information. How does George categorize this incident?
Sniffing
_____ is the process of tracking system releases.
Version control
The _____ was formed in 1999 to certify interoperability of wireless network products based on IEEE 802.11 specifications.
Wi-Fi Alliance
These are broadband wireless communications protocols for metropolitan area networks (MANs).
Wi-MAX
As shown in the accompanying figure, near the end of a system's useful life, _____ when it becomes clear that a company plans to replace the system.
adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
Adaptive maintenance _____.
adds enhancements to an operational system and makes the system easier to use
Compared with character-based formats, a _____ offers a more efficient storage method.
binary storage format
In the accompanying figure, any field that serves as a primary key is called a _____.
candidate key
The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase - systems implementation.
detailed costs
In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.
distributed database management system (DDBMS)
A table is in _____ if it does not contain a repeating group.
first normal form
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
foreign key
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____.
four digits for the year, two for the month, and two for the day (YYYYMMDD)
In a typical system design specification, in the _____ section, start-up processing, initial data entry or acquisition, user training requirements, and software test plans are specified.
implementation requirements
Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment.
legacy data
The way a network is configured is called the _____.
network topology
A _____ is an entrance to a multifunction website.
portal
The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.
security policy
Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key.
standard notation format
A _____, such as that illustrated in the accompanying figure, has a central networking device that manages the network.
star network
At the center of the network, shown in the accompanying figure, is the _____, which manages the network and acts as a communications conduit for all network traffic.
switch
A _____ is an internal or external entity that could endanger an asset.
threat
Binary digits have only _____ possible value(s).
two
If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____.
user training package
A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.
wiki
To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.
benchmark testing
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output.
applications
When a new version of a system is installed, the prior release is _____, or stored.
archived
A _____ system allows a customer to request a fax using email, via the company website or by telephone.
faxback
At the end of the systems implementation phase, the final report to management should include _____.
final versions of all system documentation
A _____ is the main line of defense between a local network, or intranet, and the Internet.
firewall
The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
functional baseline
The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered.
garbage in, garbage out (GIGO)
Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.
graphical user interface
When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic ecommerce environment.
greater initial investment but provides more flexibility
A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.
crow's foot notation
Centralized IT departments no longer produce reams of printed _____ reports.
greenbar
During ______, existing data is loaded into the new system.
data conversion
Program documentation _______.
describes the inputs, outputs, and processing logic for all program modules
In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues.
design prototyping
In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.
design walkthrough
A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily.
diskless
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.
distributed systems
... Quiz Chapter 9
...
Chapter 10 Quiz
.......
Chapter 12 Quiz
.......
Chapter 11 Quiz
..........
In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.
1.1
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.
32
The _____ standard uses multiple input/multiple output (MIMO) technology to boost performance.
802.11ac
Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition?
A line with a diamond on one end
Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client?
A star network
_____ is the process of constructing the programs and code modules that serves as the building blocks of an information system.
Application development
_____, a coding method that uses one byte per character, is used on most personal computers.
ASCII (American Standard Code for Information Interchange)
Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module passes to another. What symbol is used for a data couple?
An arrow with an empty circle
_____ ensures that authorized users have timely and reliable access to necessary information.
Availability
_____, a risk control strategy, eliminates risks by adding protective safeguards
Avoidance
_____ describes the amount of data that a system can transfer in a fixed time period.
Bandwidth
_____ is the amount of data that can be transferred in a fixed time period.
Bandwidth
A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.
Bluetooth
Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key?
Candidate key
The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and systems development into a much larger framework.
Capability Maturity Model Integration (CMMI)
_____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.
Capacity planning
A technique used by analysts to define relationships in more detail, after drawing an initial entity-relationship diagram.
Cardinality
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.
Cardinality
If is the process of turing program logic into specific instructions that a computer system can execute.
Coding
_____ measures a module's scope and processing characteristics.
Cohesion
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.
EBCDIC (Extended Binary Coded Decimal Interchange Code)
_____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving.
Computer output to microfilm (COM)
_____ protects information from unauthorized disclosure and safeguards privacy.
Confidentiality
_____ is a process for controlling changes in system requirements during software development.
Configuration management
_____ help offers assistance for a task in progress.
Context-sensitive
_____ describes the degree of interdependence among modules.
Coupling
Depending on the system this can be done before, during, or after the operational environment is complete.
Data conversation
Could help a consumer products firm identify potential customers based on their prior purchases.
Data mining
_____ combine data from different item attributes, or characteristics, to build a code.
Derivation codes
______ is the process of reviewing a program code to spot logic errors, which produce incorrect results.
Desk Checking
This explains what is required on a form if variable input data is needed.
Dialog box
_____ involves more risk than other changeover methods.
Direct cutover
Compared to mainframe architecture, these increase concerns about data security and integrity because many individual clients require access to perform processing.
Distributed systems
_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design.
Enterprise resource planning (ERP)
A person, place, thing, or event for which data is collected and maintained.
Entity
It is a type of report that is useful and wants information only on records that might require action.
Exception
Betty's lead needs to get a report of all of the purchases made only by his employees, using their employee discount, in a given week. In which of the following folders is she likely to find this category of report?
Exception reports
It is a type of check that is used for mandatory data items.
Existence
The _____ allows the expansion of wireless access over a wide area.
Extended Service Set (ESS) topology
This is used to connect any network topology to a larger, dissimilar network
Gateway
Wireless network speed is measured in _____.
Gbps (gigabits per second)
_____ describes the relationship between computers and the people who use them to perform their jobs.
Human-computer interaction (HCI)
When you reduce this, you avoid unnecessary labor costs, get data into the system more quickly, and decrease the number of errors.
Input volume
Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together correctly. What is one of the names of this type of testing?
Integration testing
_____ prevents unauthorized users from creating, modifying, or deleting information.
Integrity
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.
Java database connectivity (JDBC)
A set of field values that describes a single person, place, thing, or event.
Logical record
A kind of storage that refers to data that a user can view, regardless of how or where the information actually is organized or stored
Logical storage
_____ describes the way the components in a network interact.
Logical topology
The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
OSI (Open Systems Interconnection) model
_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.
Maintenance
_____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
Maintenance activities
It is especially important in designing large-scale systems because separate teams of analysts and programmers can work on different areas and then integrate the results.
Modular design
_____ relies on collective data paths to increase bandwidth and range.
Multiple input/multiple output (MIMO) technology
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.
Normalization
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
Open database connectivity (ODBC)
A separate test environment is necessary to maintain system security and integrity and protect this kind of environment.
Operational
_____ costs include expenses for items such as supplies, equipment rental, and software leases.
Operational
_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access.
Output security
This kind of operation is an inappropriate changeover method when two systems perform different functions or if a new system involves a new method of business operations.
Parallel
With this kind of operation, part of the system is given to all users.
Phased
_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
Physical storage
_____ describes the actual network cabling and connections.
Physical topology
It produces an early, rapidly constructed working version of a proposed information system.
Prototype
This is not language-specific and can be used to describe a software module in plain English without requiring strict syntax rules.
Pseudocode
An asymmetric kind of encryption.
Public key encryption
In agile application development, this specifies when user stories will be implemented.
Release plan
A set of rules that avoids data inconsistency and quality problems
Referential integrity
_____ is the overall time between a request for system activity and the delivery of the response.
Response time
_____ measures risk likelihood and impact.
Risk assessment
_____ develops safeguards that reduce risks and their impact.
Risk control
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
Scalability
When developing a training program, which of the following guidelines should be kept in mind?
Select the most effective place to conduct the training.
_____ are numbers or letters assigned in a specific order.
Sequence codes
Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?
Social engineering
To achieve better, faster, and less expensive methods of software development, _____ designed the Capability Maturity Model (CMM), which improves quality, reduces development time, and cut costs.
Software Engineering Institute (SEI)
Uses analytical techniques to identify potential quality and performance improvements in an information system.
Software reengineering
They are generally paper-based but can be provided online.
Source document
Which of the following is specified by the detailed procedures in a test plan?
The test data to be used
Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process?
Stub testing
Defines only those portions of the database that a particular system or user needs or is allowed to access.
Subschema
Betty's manager wants to just see the total figures of the sales without much of the supporting details. In which of the following folders is she likely to find this category of report?
Summary reports
It is a starting point with well-placed command buttons that allow users to navigate the systems.
Switchboard
_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.
System architecture
_____ is the process of putting a new information system online and retiring the old system.
System changeovers
_____ produces a full-featured, working model of the information system.
System prototyping
Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat?
Technical obsolescence
Which of the following configurations has a central wireless device that is used to serve all wireless clients?
The Basic Service Set (BSS)
Sam is looking at a second system. This system, he determines, is a batch processing system. Which of the following observations helped him determine the system?
The IT operations group at the client site running programs at a predetermined schedule, without user involvement
Sam is analyzing a processing system and he has determined that it is an online processing system and not a batch processing system. Which of the following observations helped him determine the system?
The system processing transactions completely when and where they occur
_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.
Throughput
If Siobhan has a dialog box option that is either on or off, which of the following is she most likely to use?
Toggle button
This approach is also called modular design, and it is similar to constructing a leveled set of data flow diagrams (DFDs).
Top-down
This should be considered early in the systems development process.
Training plan
A risk control strategy that shifts risks to another asset or party.
Transference
A widely used method of visualizing and documenting software systems design
Unified Modeling Language (UML)
At the beginning of the twenty-first century, many firms that used only two digits to represent the year were faced with a major problem called the _____.
Y2K issue
In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.
access point
As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance.
adaptive
In maintenance management, _____ means examining the whole in order to learn about the individual elements.
analysis
A class diagram includes the class ______, which describe the characteristics of objects in the class.
attributes
A secure system includes _____ that can log every instance of data entry and changes.
audit trails
In a source document, the _____ contains any required signatures.
authorization zone
A _____ is a formal reference point that measures system characteristics at a specific time.
baseline
In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.
body zone
System developers use _____ to document and trail program defects, code changes, and replacement code.
bug tracking software
In a _____, a single communication path connects the network server, departmental servers, workstations, and peripheral devices.
bus network
In a(n) _____, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen.
centralized design
Although the vast majority of reports are designed graphically, some systems still produce one or more _____ reports that use a character set with fixed spacing.
character-based reports
In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group.
check box
The term _____ generally refers to systems that divide processing between one or more networked clients and a central serve.
client/server
A _____ is a set of letters or numbers that represents a data item.
code
A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together.
combination check
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help.
command button
In a primary key combines two or more fields, then it is called a ________.
composite key
In a structure chart a(n) ______ line, with a diamond on one end, indicateds that a control module determines which subordinate modules will be invoked.
condition
User documentation _____.
consists of instructions and information to users who will interact with the system
Operations documentation ______.
contains all the information needed for processing and distributing online and printed output
A _____ usually causes specific actions, such as printing subtotals for a group of records in a report.
control break
To produce a control break report, the records must be arranged, or sorted, in _____.
control field order
In the given figure, a higher-level module, called a _____, directs lower-level modules.
control module
In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms.
control zone
A(n) _____ provides access for customers, employees, suppliers, and the public.
corporate portal
As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.
corrective maintenance
A _____ controls database operations, including storing, retrieving, updating, and deleting data.
data manipulation language
In addition to centralized data processing, the earliest systems performed all data input and output at a central location, often called a _____.
data processing center
A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.
data structure
A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.
data validation
A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
data warehouse
Typically, a database management system is managed by a person called _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.
database administrator
A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.
database management system
A(n) _____ produces one or more lines of output for each record processed.
detail report
Corrective maintenance _____.
diagnoses and corrects errors in an operational system
If variable input data is needed, a _____ must be provided to explain what is needed.
dialog box
As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational.
direct cutover
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
entity-relationship diagram (ERD)
A(n) _____ displays only those records that meet a specific condition or conditions.
exception report
A(n) _____ is a data validation rule that is used for applying to mandatory data items
existence check
A(n) _____ is an attack that takes advantage of a vulnerability.
exploit
A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.
help desk
In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices.
hierarchical network
Testing two or more programs that depend on each other is called ______.
integration testing
Perfective maintenance _____.
involves changing an operational system to make it more efficient, reliable, or maintainable
During the systems design phase, _____ are used to organize, access, and maintain data structures.
key fields
A new system might have to interface with one or more _____, which are older systems that use outdated technology.
legacy systems
The given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a structure chart.
library
A _____ language feature allows users to type commands or requests in normal text phrases.
natural
Any field that is not a primary key or a candidate key is called a _____.
nonkey field
A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong.
reasonableness check
In the event of a file catastrophe, _____ can be used to restore the file or database to its current state at the time of the last backup.
recovery procedures
In an entity-relationship diagram, entities are commonly represented as _____.
rectangles
In an entity-relationship diagram, entities are commonly represented as _____.
rectangles
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.
referential integrity
In sequence, the four steps typically followed to create a structure chart are _____.
reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart and the data dictionary
A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting.
remote control software
The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.
report footer
The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information.
report header
To avoid problems, preventive maintenance _____.
requires analysis of areas where trouble is likely to occur
A _____ resembles a group of computers in which data flows in only one direction from one device to the next.
ring network
In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.
risk
Cloud computing provides _____, which matches resources to needs at any given time.
scaling on demand
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.
schema
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.
second normal form
A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.
secondary key
The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.
security
After completing integration testing, a system analyst must perform _____, which involves the entire information system and includes all typical processing situations. system testing
system testing
The goal of _____ is to build a system that is effective, reliable, and maintainable.
systems design
A _____ specifies the fields and identifies the primary key in a particular file.5
table design
When training is complete, many organizations conduct a full-scale test, or _____, which is a dress rehearsal for users and IT support staff.
simulation
In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.
system environment
A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction.
source document
When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.
stand-alone mode
In a structure chart, a control couple shows a message, also called a(n) ______, which one module sends to another.
status flag
Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design.
storyboard
A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information.
structure chart
Many organizations require a more formal type of desk checking called ______.
structured walkthrough
In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.
stub testing
In the given figure, a lower-level module is called a _____.
subordinate module
For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate.
summary report
Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____.
supply chain management (SCM)
In maintenance management, _____ involves studying the parts of a system to understand the overall system.
synthesis
A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
system administrator
In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications.
system components
A _____ locates all or most of the processing logic on the server.
thin client
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature that is used to represent on or off status and switches to the other status when clicked.
toggle button
Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.
toolbar
Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.
top-down approach
Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others.
train-the-trainer
A(n) _____ does not distract a user and calls no attention to itself.
transparent interface
A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness.
usability
Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system.
usability metrics
A(n) _____ is a data validation rule that can be used for data items that must have certain values.
validity check
A _____ is a security weakness or soft spot.
vulnerability
A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy.
web-centric architecture
To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet.
webcast