Unit 5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Auditors making database queries often need to combine several tables to get the information they want. One approach to combining tables is known as A.Sorting. B.Extraction. C.Summarization. D.Joining.

D

A benefit of using computer-aided software engineering (CASE) technology is that it can ensure that A.All programs are optimized for efficiency. B.No obsolete data fields occur in files. C.Users become committed to new systems. D.Data integrity rules are applied consistently.

D CASE is an automated technology (at least in part) for developing and maintaining software and managing projects. A benefit of using CASE technology is that it can ensure that data integrity rules, including those for validation and access, are applied consistently across all files.

Which of the following structures refers to the collection of data for all vendors in a relational database? A.Record. B.File. C.Byte. D.Field.

B A file is a group of records. Each record refers to the collection of data for a specific vendor in the database. A record is a group of fields. All the fields contain information pertaining to a specific entity. This is a vendor file

Which of the following is the final step before placing the system in live operation? A.User acceptance testing. B.Static testing. C.Dynamic testing. D.Phased conversion.

Answer (A) is correct.IT must demonstrate to the user department that the system performs the desired functionality. Once the user department is satisfied with the new system, they acknowledge formal acceptance and implementation begins. Thus, user acceptance testing is the final step before placing the system in live operation.

Access for production data

Answer (B) is correct.The appropriate setup for access in the computer environment is for users to have update access for production data. Users need to update data through applications programs, but have have no need to change production programs. Application programmers should not be able to change production programs. They should submit changes to the change control unit.

Which of the following should not be the responsibility of a database administrator? A.Develop applications to access the database. B.Protect the database and its software. C.Monitor and improve the efficiency of the database. D.Design the content and organization of the database.

A The database administrator (DBA) is the person who has overall responsibility for developing and maintaining the database. One primary responsibility is designing the content of the database. Another responsibility of the DBA is to protect and control the database. A third responsibility is to monitor and improve the efficiency of the database. The responsibility of developing applications to access the database belongs to systems analysts and programmers.

An insurance firm that follows the systems development life cycle concept for all major information system projects is preparing to start a feasibility study for a proposed underwriting system. Some of the primary factors the feasibility study should include are A.Technology and related costs. B.Possible vendors for the system and their reputation for quality .C.Exposure to computer viruses and other intrusions. D.Methods of implementation, such as parallel or cutover.

A The feasibility study should consider the activity to be automated, the needs of the user, the type of equipment required, the cost, and the potential benefit to the specific area and the company in general. Thus, technical feasibility and cost are determined during this stage.

To trace data through several application programs, an auditor needs to know what programs use the data, which files contain the data, and which printed reports display the data. If data exist only in a database system, the auditor could probably find all of this information in a A.Data encryptor. B.Data dictionary. C.Decision table. D.Database schema.

Answer (B) is correct.The data dictionary is a file of all data items contained in the database and their length, usage, and ownership. Only certain persons or entities are permitted to retrieve data or to modify data items. The schema describes the structure of the database

Which of the following best describes acceptance testing? A.Tests a completely integrated system to verify that the system meets its requirements. B.Verifies the functionality of a specific section of code and the handling of data passed between various units. C.Determines whether the system meets the organization's needs and is ready for release. D.Seeks to verify the interfaces between components against software design.

Answer (C) is correct. Acceptance testing is conducted to determine whether the system meets the organization's needs and is ready for release. Integration testing is any type of software testing that seeks to verify the interfaces between components against software design. Unit testing refers to tests that verify the functionality of a specific section of code and the handling of data passed between various units. System testing, or end-to-end testing, tests a completely integrated system to verify that the system meets its requirements.

Gray-box testing involves A.Executing programmed code with a given set of test cases. B.Testing internal structures or workings of a program. C.Having knowledge of internal data structures and algorithms for purposes of designing tests. D.Examining functionality without any knowledge of the source code.

Answer (C) is correct. Gray-box testing involves having knowledge of internal data structures and algorithms for the purpose of designing tests, while executing those tests at the user, or black-box, level. Black-box Examining functionality without any knowledge of the source code White-box Testing internal structures or workings of a program, as opposed to the end user Dynamic Testing is Executing programmed code with a given set of test cases Static Testing examines the program's code and its associated documentation through reviews walkthroughs or inspections but does not require the program to be executed

Which of the following best describes acceptance testing? A.Tests a completely integrated system to verify that the system meets its requirements. B.Verifies the functionality of a specific section of code and the handling of data passed between various units. C.Determines whether the system meets the organization's needs and is ready for release. D.Seeks to verify the interfaces between components against software design.

Answer (C) is correct.Acceptance testing is conducted to determine whether the system meets the organization's needs and is ready for release.

Which of the following statements is true regarding unit testing? -Verifies the functionality of a specific section of code -Checks the handling of data passed between various units or subsystem components A.Neither. B.II only. C.I and II. D.I only.

Answer (C) is correct.Both statements are true regarding unit testing.

A bank was considering its first use of computer-aided software engineering (CASE) to develop an inquiry system for account representatives to access consolidated profiles of customers' accounts. A benefit of using CASE in this situation is that A.No training of programmers would be required. B.No new software development tools would be needed. C.Management of the development process would be improved. D.The need for testing would be reduced.

Answer (C) is correct.CASE applies computers to software design and development. It permits creation and maintenance of systems documentation on the computer and the automation of a part of the programming effort. Using CASE would improve management of the development process because the CASE software maintains the links between the different components, provides built-in project management tools, and supplies automated testing aids.

A major disadvantage of the life cycle approach to system development is that it is not well-suited for projects that are A.Structured. B.Complex. C.Unstructured. D.Large.

Answer (C) is correct.The life cycle approach is best employed when systems are large and highly structured, users understand the tasks to be performed by the information system, and the developers have directly applicable experience in designing similar systems. In the life cycle process, each stage of development is highly structured, and requirements are clearly defined. However, when the task is unstructured, prototyping may be the better approach.

An information system (IS) project manager is currently in the process of adding a systems analyst to the IS staff. The new systems analyst will be involved with testing the new computerized system. At which stage of the systems development life cycle will the analyst be primarily used? A.Cost-benefit analysis. B.Flowcharting. C.Development. D.Requirements definition.

Answer (C) is correct.The systems development life-cycle approach is the oldest methodology applied to the development of medium or large information systems. The cycle is analytically divisible into stages: definition, design, development, implementation, and maintenance. Testing is the most crucial step in the development stage of the life cycle. Key phrase (Involved with TESTING the..) testing is done during development

When the labor cost accounting component of an integrated end-user computer (EUC) application was first implemented, it did not meet certain business requirements in the department and had to be substantially rewritten. Which of the following risks associated with EUC application development could have led directly to this result? A.End-user applications may not receive the independent testing associated with traditional development. B.Segregation of duties would be inadequate if the same person performed programmer and operator functions. C.There may be insufficient review and analysis of user needs when user and analyst functions are no longer separate. D.End-user applications may not be adequately documented to facilitate review.

Answer (C) is correct.Unlike IT-developed and supported applications, user-developed applications are not reviewed by systems analysts prior to implementation. This lack of review may result in the rewrite of user-developed applications to better meet business requirements.

Traditional information systems development procedures that ensure proper consideration of controls may not be followed by users developing end-user computing (EUC) applications. Which of the following is a prevalent risk in the development of EUC applications? A.Management may be less capable of reacting quickly to competitive pressures due to increased application development time. B.Management may place the same degree of reliance on reports produced by EUC applications as it does on reports produced under traditional systems development procedures. C.Management decision making may be impaired due to diminished responsiveness to management's requests for computerized information. D.Management may incur increased application development and maintenance costs for EUC systems, compared with traditional (mainframe) systems.

B End-user developed applications may not be subject to an independent outside review by systems analysts and are not created in the context of a formal development methodology. These applications may lack appropriate standards, controls, quality assurance procedures, and documentation. A risk of end-user applications is that management may rely on them as much as traditional applications.

Query facilities for a database system would most likely include all of the following except A.Data dictionary access. B.A data validity checker. C.A query-by-example interface. D.Graphical output capability.

B The least likely feature of a query tool would be a data validity checker because the database system has already enforced any validity constraints at the time the data were inserted in the database. Any further data validity checking would be a function of a user application program rather than a query.

The process of learning how the current system functions, determining the needs of users, and developing the logical requirements of a proposed system is referred to as A.Systems maintenance. B.Systems feasibility study. C.Systems analysis. D.Systems design.

C A systems analysis requires a survey of the existing system, the organization itself, and the organization's environment to determine (among other things) whether a new system is needed. The survey results determine not only what, where, how, and by whom activities are performed but also why, how well, and whether they should be done at all. Ascertaining the problems and informational needs of decision makers is the next step. The systems analyst must consider the entity's key success variables (factors that determine its success or failure), the decisions currently being made and those that should be made, the factors important in decision making (timing, relation to other decisions, etc.), the information needed for decisions, and how well the current system makes those decisions. Finally, the systems analysis should establish the requirements of a system that will meet user needs. Systems design is the process of developing a system to meet specified requirements

The primary purpose of a database system is to have a single storage location for each A.File. B.Database. C.Data item. D.Record.

C Data organized in files and used by the organization's various applications are collectively known as a database. In a database system, storage structures are created that render the applications independent of the physical or logical arrangement of the data. Each data item has a standard definition, name, and format, and related items are linked by a system of pointers. The programs therefore only need to specify data items by name, not by location. A database management system handles retrieval and storage. Because separate files for different applications are unnecessary, data redundancy (multiple storage locations for a data item) can be substantially reduced.

In a database system, locking of data helps preserve data integrity by permitting transactions to have control of all the data needed to complete the transactions. However, implementing a locking procedure could lead to A.Inconsistent processing. B.Rollback failures. C.Unrecoverable transactions. D.Deadly embraces (retrieval contention).

In a distributed processing system, the data and resources a transaction may update or use should be held in their current status until the transaction is complete. A deadly embrace occurs when two transactions need the same resource at the same time.

A file-oriented approach to data storage requires a primary record key for each file. Which of the following is a primary record key? A.The vendor number in an accounts payable master file. B.All of the answers are correct. C.The vendor number in an open purchase order master file. D.The vendor number in a closed purchase order transaction file.

The primary record key uniquely identifies each record in a file. Because there is only one record for each vendor in an accounts payable master file, the vendor number would be the appropriate key.


Conjuntos de estudio relacionados

Lección 15.2 The present perfect: ¡Manos a la obra!; Completar (pretérito perfecto de indicativo de estos verbos.); Ordenar; (all corrected)

View Set

Benchmark Adelante Grado 5 Unidad 3 Semana 2

View Set

Prep U's - Chapter 40 - Fluid, Electrolyte, and Acid-Base Balance

View Set