CIS 301 Final Test Review

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Two major Web-based development environments are Microsoft's ______ and IBM's WebSphere.

.NET

It is important for the interviewer to record facts and evaluate information following an interview because studies have shown that ________ percent of a conversation is forgotten within 30 minutes.

50

Oracle Corporation cites data that shows that businesses spend up to ________ percent of their IT budgets maintaining existing software and systems.

80

The Wi-Fi Alliance is a non-profit international association formed in 1999 to certify interoperability of wireless network products based on IEEE _______ specifications.

802.11

WPA2 is an extension of Wi-Fi Protected Access based on a full implementation of the IEEE ________ standard.

802.11i

On lower-level DFDs with multiple processes, it is recommended that no more than ________ process symbols be included.

9

Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called ________ tests.

Acceptance

________ are able to display multiple use cases in the form of a grid, where classes are shown as vertical bars and actions appear as horizontal arrows.

Activity Diagrams

A use case is initiated by a(n) _______, which is an external entity that requests the system to perform a function or process.

Actor

A user assumes the role of a(n) ________ in a use case diagram.

Actor

Business process modeling works well with object modeling, because both methods focus on the ________ and the way they behave.

Actors

Critics of _______ development often claim that because it focuses on quick iterations and fast releases, it lacks discipline and produces systems of questionable quality.

Agile

The _______ baseline documents the system at the end of the design phase and identifies any changes since the functional baseline.

Allocated

The initial task during systems implementation is _______ development, which requires systems analysts and programmers to work together to construct the necessary programs and code modules.

Application

________ consists of programs that support day-to-day business functions and provide users with the information they need

Application Software

Programs that handle the input, manage the processing logic, and provide the required output for an information system are called _______.

Applications

________ offers several levels of business applications, including project management, and has a plan that is available free of charge with unlimited duration.

Apptivo

Script kiddie, which is defined as an inexperienced or juvenile hacker who uses readily available malicious software to disrupt or damage computer systems, is a category of ________.

Attacker

An object has certain ________ , which are characteristics that describe the object.

Attributes

A(n) ________ service, which may be offered by a software vendor, enables an application to contact the vendor's server and check for a needed patch or update.

Automatic Update

Tape, hard drives, optical storage, and online storage are commonly used types of _______ media.

Backup

________ is the amount of data that can be transferred in a fixed time period.

Bandwidth

A prototype can serve as an initial model that is used as a(n) ________ to evaluate the finished system, or the prototype itself can develop into the final version of the system.

Benchmark

To measure system performance, many firms use ________ testing, which uses a set of standard tests to evaluate system performance and capacity.

Benchmark

A(n) _______ format is more efficient than a character-based format because it represents numbers as actual binary values, rather than as coded numeric digits.

Binary Storage

A(n) ________ is a hardware-based security control that can identify a person by a retina scan or by mapping a facial pattern.

Biometric Device

Project status meetings provide a project manager with an opportunity to seek input and conduct ________ sessions.

Brainstorming

The term ________ refers to the reasons, or justification, for a proposal.

Business Case

When an information system does not meet ________ , causes might include inadequately defined scope, imprecise targets, and lack of change control procedures.

Business Requirements

________ systems can analyze transactional data, generate information needed to manage and control business processes, and provide information that leads to better decision making.

Business Support

Modern ______ tools can help in simplifying the difficult task of maintaining full and accurate documentation for complex systems.

CASE

If context-sensitive Help is part of a program, developers must include coded _______ in the text that link to the correct page of information in the documentation.

Callouts

The class diagram includes a concept called ________ , which describes how instances of one class relate to instances of another class.

Cardinality

The final task in the preliminary investigation is to prepare a report to management that includes an evaluation of the systems request, an estimate of costs and benefits, and a ________ , which is a summary of the project request and a specific recommendation.

Case for Action

________ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.

Certification

Many IT industry leaders, such as Microsoft, Cisco, Novell, Oracle, and Sun Microsystems, offer ________, which are measured and verified by examination.

Certifications

Printing _______ reports on high-speed impact printers is a fast, inexpensive method for producing large-scale reports, especially if multiple copies are required.

Character-Based

An interface feature that allows a user to select one or more choices from a group is the ________ .

Check Box

To create a(n) ________ diagram, the use case is reviewed and the classes that participate in the underlying business process are identified.

Class

A(n) ________ is a set of letters or numbers that represents a data item and can be used to simplify output, input, and data formats.

Code

If a company is reluctant to take on the challenge and complexity of developing an Internet _______ site in-house, they may pursue alternatives, such as a packaged solution or the use of an application service provider.

Commerce

________ tools provide an overall framework for systems development and support a wide variety of design methodologies, including structured analysis and object-oriented analysis.

Computer-aided systems engineering

When creating a structure chart, the typical third step is to add couples, loops, and _______ to the chart.

Conditions

Requirements planning, user design, _______, and cutover are the four phases of the rapid application development model.

Construction

A(n) _______ is a top-level view of an information system that shows the system's boundaries and scope.

Context Diagram

An example of a(n) _______ requirement is when a system must maintain separate levels of security for users and the system administrator.

Control

A(n) _______ is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

Corporate Culture

When the progress of a project is poorly monitored and responses to early warning signs of problems are slow, the result can be a(n) ________

Cost Overrun

Microsoft Project and other project management software can highlight the series of tasks that form the ________

Critical Path

The completion of a project will be delayed if any task on the ________ falls behind schedule.

Critical Path

High-priority objectives that must be achieved to fulfill the company's mission are called ________

Critical Success Factors

_______ notation, a common method of cardinality notation, uses shapes to indicate various possibilities.

Crow's foot

_______ consists of basic facts that are the system's raw material.

Data

A(n) ________, which is the smallest piece of data that has meaning within an information system, may also be referred to as a data item or field.

Data Element

Database operations, including storing, retrieving, updating, and deleting data, are controlled by a(n) _______ language.

Data Manipulation

A ________ is a framework for organizing, storing, and managing data that is comprised of files or tables that interact in various ways.

Data Structure

A(n) ______ system is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze data.

Database Management

A(n) _______ is a graphical representation of the conditions, actions, and rules found in a decision table.

Decision Tree

The pattern of tasks for a large project can be broken down into ________ tasks, multiple successor tasks, and multiple predecessor tasks.

Dependent

A make or buy decision is the choice between _______ versus purchasing software.

Developing

The ________ approach usually is the least expensive changeover method, but involves more risk than any other changeover method.

Direct Cutover

By storing data in various locations, a(n) ________ database management system is less likely to experience a catastrophic failure.

Distributed

_______ includes two main sectors: business-to-consumer and business-to-business

E-commerce

The black box concept is an example of ________ , which means that all data and methods are self-contained.

Encapsulation

Some common security controls include passwords, various levels of user access, and _______, or coding data to keep it safe from unauthorized users.

Encryption

The Software ______ Institute at Carnegie Mellon University represents the cutting edge of software design and development technology.

Engineering

The main objective of ________ is to integrate a company's primary functions to improve efficiency, reduce costs, and help managers make key decisions.

Enterprise Computing

The four basic symbols used in data flow diagrams represent processes, ______, data flows, and data stores.

Entities

A(n) _______ diagram depicts the logical relationships and interaction among system entities, provides an overview of the system, and acts as a blueprint for creating the physical data structures.

Entity-relationship

Object-oriented applications are called _______ -driven, because each transaction, message, or event triggers a corresponding action.

Event

Body motion detection is an example of a(n) ________ input technology.

Evolving

A LAN spans long distances and can connect WANS that are continents apart

False

A RAID design improves performance, capacity, and reliability, and involves the use of one large drive that appears to a computer as multiple logical drives.

False

A business profile is a specific set of transactions, events, and results that can be described and documented.

False

A class diagram is a physical model that evolves into a logical model and finally becomes a functioning information system.

False

A decision table is a physical structure that shows every combination of conditions and outcomes.

False

A form's instruction zone usually contains the company's name or logo and the title and number of the form.

False

A gray hole is a process that produces output, but has no input data flow.

False

A mitigation plan identifies a condition that would initiate a contingency plan.

False

A project manager's best course of action is to attempt to handle all situations single-handedly and avoid alerting management until a problem is serious.

False

A project triangle displays the same information as the Gantt chart, but uses task boxes to include much more detail.

False

A request for proposal is more specific than a request for quotation because the required product or service is already known when the request for quotation is written.

False

A service desk can boost its productivity by using network interface software, which allows IT staff to take over a user's workstation and provide support and troubleshooting.

False

A system administrator is responsible for configuration management, which includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.

False

A task ID does not need to be unique in a project and should be brief and descriptive.

False

A tunnel, which is identified by a number, is used to route incoming traffic to the correct application on a computer.

False

A two-tier design has a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server.

False

ASCII is an industry-standard protocol that allows DBMSs from various vendors to interact and exchange data.

False

Although each data element must be documented in the data dictionary, documenting the data flows isn't necessary.

False

Although the Internet has triggered enormous changes in business methods and operations, it has had little impact in the area of software acquisition.

False

An accurate forecast of TCO isn't as critical as it might seem, because only 15% of total costs occur after the purchase of the hardware and software, according to Gartner, Inc.

False

An attribute defines specific tasks that an object can perform.

False

An integration test includes all typical processing situations and is intended to assure users, developers, and managers that the program meets all specifications and that all necessary features have been included.

False

Database specialists design and construct Web pages, monitor traffic, manage hardware and software, and link Web-based applications to the company's information systems.

False

Diagram 0 contains a single process symbol and provides the most general view of an information system.

False

Examples of static modeling tools include sequence diagrams, state transition diagrams, and activity diagrams.

False

IBM introduced the graphical user interface and was a pioneer in user interface development.

False

IT professionals handle almost every aspect of systems development with little to no user participation.

False

In an interview, closed-ended questions encourage spontaneous and unstructured responses.

False

In modular design, it is recommended that the modules be designed to perform multiple functions because dependent modules provide a greater level of flexibility.

False

In today's business environment, batch processing is the most practical method due to its ability to provide real-time information.

False

Input security protects privacy rights and shields an organization's proprietary data from theft or unauthorized access.

False

It is important to remember that normal forms beyond 3NF do not exist.

False

Knowledge workers develop long-range plans, called strategic plans, which define the company's overall mission and goals.

False

Microsoft has developed a method for measuring scalability called Rapid Economic Justification (REJ).

False

Most magazine subscription codes are cipher codes, which combine data from different item attributes.

False

Most physicians feel that electronic health records software is easy to use and meets the needs of medical providers.

False

Most users prefer program documentation, which provides immediate Help when they have questions or encounter problems.

False

Object database connectivity, which is referred to as ODBC, is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

False

One advantage of a pilot approach is that the risk of errors or failures is limited to the implemented module only.

False

Organizations with special systems requirements, such as colleges and banks, need horizontal applications to handle their unique business needs.

False

Projects where management has a choice in implementing them are called voluntary projects.

False

Pseudocode is a subset of standard English that describes logical processes clearly and accurately.

False

Software consists of everything in the physical layer of the information system.

False

System analysts and programmers should not have access to the test environment except to correct a system problem or make authorized modifications or enhancements.

False

The 802.11b wireless standard, which was adopted in 2003, has a maximum speed of 54 Mbps and an approximate range of 50-100 feet.

False

The Critical Path Method (CPM) was developed by the U.S. Navy to manage very complex projects.

False

The Hawthorne Effect is a model that asks traditional fact-finding questions in a systems development context.

False

The first section of a typical preliminary investigation report is the case for action.

False

The letters SWOT stand for strengths, weaknesses, options, and threats.

False

The objective of supply chain management is to establish a company-wide strategy for using IT that includes a specific architecture as well as standards for data, processing, network, and user interface design.

False

The purpose of the systems analysis phase is to perform a preliminary investigation to evaluate an IT-related business opportunity or problem.

False

The standard notation method for representing a normalized design is to enclose the repeating group of fields within a second set of parentheses.

False

The starting point for creating use cases is the review of the information gathered during the methods modeling phase.

False

Unlike the system requirements specification, which is written for users to understand, the system design document is oriented toward the programmers who will use it to create necessary programs.

False

The first step in evaluating _______ is to identify and weed out systems requests that are not achievable.

Feasibility

A(n) ________ form, which is an alternative to a traditional paper-based survey, can be used to collect data on the Internet or a company intranet.

Fill-in

The _______ section of a typical preliminary investigation report contains the results of the investigation, including a description of the project's scope, constraints, and feasibility.

Findings

A(n) _______, which is the main line of defense between a local network and the Internet, can be configured to detect and respond to denial-of-service attacks, port scans, and other suspicious activity.

Firewall

A popular technique for investigating causes and effects is called a ________ .

Fishbone Diagram

An Ishikawa diagram, which is a popular technique for investigating causes and effects, is also called a(n) _______

Fishbone Diagram

A data ________ , which is represented as a line with a single or double arrow on a DFD, is a path for data to move from one part of an information system to another.

Flow

A(n) ________ indicates when an object sends or receives a message and is identified by a narrow vertical shape that covers the lifeline.

Focus

Establishing a relationship between two tables requires a ________ key field in one table to match a primary key value in another table.

Foreign

A properly designed _______ will be well organized, include enough space, and provide clear instructions.

Form

_________, or newsgroups, can be hosted by private or public entities, or reside in larger communities such as Google Groups or Yahoo Groups.

Forums

The additional cost and time associated with developing a logical and physical model of a system is one disadvantage of the _______ approach.

Four-Model

Complex systems, which have many processes, require analysts to create lower-level DFDs until all processes are identified as ________ .

Functional Primitives

In a data flow diagram, the ______ symbol for a data store is a flat rectangle that is open on the right side and closed on the left side.

Gane and Sarson

When the project manager provides status reports to management and users, ________ are often included as a means for showing the project's status graphically.

Gantt Charts

_______ is a free open source program that has a similar look and feel as Microsoft Project.

GanttProject

The user support function usually is called a service desk or _______

Help Desk

A user interface is based on basic principles of ________ interaction, which describes the relationship between computers and the people who use them to perform their jobs.

Human-Computer

Most date formats are based on the model that was established by the ________ , which requires a format of four digits for the year, two for the month, and two for the day.

ISO

Companies tend to choose _______ development to satisfy unique business requirements, to minimize changes in business procedures and policies, to meet constraints of existing systems and existing technology, and to develop internal resources and capabilities.

In-House

One benefit of a(n) ________ e-commerce strategy is the ability to maintain complete control over the organization of the site, the number of pages, and the size of the files.

In-House

A knowledge management system uses ________, which are logical rules that identify data patterns and relationships.

Inference Rules

In a(n) ________ structure, some people have more influence or knowledge than appears on an organization chart.

Informal

A(n) ________ combines technology, people, and data to provide support for business functions.

Information System

The strongest relationship, which enables an object to derive one or more of its attributes from another object, is called _______.

Inheritance

Microsoft Access is able to restrict data entry and prevent errors by providing standard _______ for fields such as dates, telephone numbers, postal codes, and Social Security numbers.

Input Masks

Although some users feel that _______ is a distracting form of communication, others like it and find it to be especially useful when working as team members in a collaborative situation.

Instant Messaging

A(n) ________ can make it easier to program interactive software products by providing built-in tools and advanced features, such as real-time error detection, syntax hints, highlighted code, class browsers, and version control.

Integrated Development Environment (IDE)

________ , which is one of the three main elements of system security, prevents unauthorized users from creating, modifying, or deleting information.

Integrity

The three main functions of a business information system are the management of applications that perform the processing logic, the handling of data storage and access, and the provision of a(n) ________ that allows users to interact with the system.

Interface

The ________ is the primary method of obtaining information during the preliminary investigation.

Interview

Modular design is based on combinations of three logical structures, which are called sequence, selection, and ________ .

Iteration

________ inventory systems rely on computer-to-computer data exchange to minimize unnecessary inventory.

Just-in-time (JIT)

Two techniques, _______ and balancing, must be used if lower-level data flow diagrams are being created.

Leveling

A software ________ could allow the software to be used on a single computer, a specified number of computers, a network, or an entire site, depending on the terms of the agreement.

License

A(n) ________ represents the time during which the object above it is able to interact with the other objects in the use case.

Lifeline

Checking that a payment amount is greater than zero, but not specifying a maximum value is an example of a(n) ________ check .

Limit

_______ for Laptops, which is sold by Absolute Software, is a type of tracking software that offers call-in service, as well as a remote data erase capability.

LoJack

Processes contain the business ________ that transform data and produce the required results.

Logic

A process that continues to print payroll checks until it reaches the end of the payroll file is an example of ________ .

Looping

A(n) _______ agreement, which includes additional support and assistance from a vendor, is a supplement to a software purchase.

Maintence

________ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.

Maintence

The presentation to ________, one of the most critical milestones in the systems development process, occurs at the end of the systems analysis phase.

Management

Many companies use a data ________, which is designed to serve the needs of a specific department, rather than a data warehouse that spans an entire enterprise.

Mart

When using a CASE tool or screen generator for documentation, number the screen designs and save them in a hierarchy similar to a(n) ________ .

Menu Tree

_________ networks, which are expensive to install and maintain, are used in situations where a high degree of redundancy is needed.

Mesh

Interface designers can obtain usability _______ by using software that can record and measure user interaction with a system.

Metrics

A popular graphics modeling tool that can be used to create many types of charts and diagrams is ________ .

Microsoft Visio

________ is a popular tool that systems analysts can use to create business process diagrams, flowcharts, and organization charts.

Microsoft Visio

________ is software that can connect a database to the Web and enable data to be viewed and updated through a Web browser.

Middleware

A major advantage of object-oriented designs is that systems analysts can save time and avoid errors by using _______ objects.

Modular

A(n) _______ consists of related program code organized into small units that are easy to understand and maintain.

Module

A(n) ________ table can be simplified because some rules might be duplicates, redundant, or unrealistic.

Multicondition

_______ language technology is used in text-to-speech synthesizers, automated voice response systems, and speech recognition systems.

Natural

The ________ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur.

Net Present Value

A type of project where management has no choice in implementing it is referred to as a(n) _______ project.

Nondiscretionary

Modeling involves graphical methods and ________ language that represent the system at various stages of development

Nontechnical

A(n) ______ represents a real person, place, event, or transaction.

Object

After you identify the system's objects, classes, and relationships, you should develop an _______ diagram that provides an overview of the system.

Object Relationship

________ methods use a variety of diagrams, including use case, class, sequence, and transition state diagrams.

Object-Oriented

Properly implemented, ________ can speed up projects, reduce costs, and improve overall quality.

Object-oriented development (OOD)

Personal _______ is a fact-finding technique used by systems analysts to verify statements made in interviews and determine if procedures operate as they are described.

Observation

Microsoft _______ is powerful information management software that allows an interviewer to record a meeting, store the results, and create a searchable file for easy access.

OneNote

A(n) _______ system, which allows a constant dialog between users and the system, handles transactions when and where they occur and provides output directly to users.

Online

________ security defines how particular tasks are to be performed, from large-scale data backups to everyday tasks such as storing e-mails or forms.

Operational

________ feasibility means that a proposed system will be used effectively after it has been developed.

Operational Feasibility

The practice of shifting IT development, support, and operations to other countries is referred to as offshore ________ .

Outsourcing

A project manager can use a ________ to convert task start and finish times to actual dates by laying out an entire project on a calendar.

PERT Chart

To transform a task list into a(n) _______ chart, you first enter the task name, ID, duration, and predecessors for each task.

PERT/CPM

Extreme Programming uses a concept called ________ programming, which involves two programmers working on the same task on the same computer.

Parallel

When a data flow diagram is partitioned, the higher-level diagram is referred to as the ________ diagram.

Parent

Systems analysts may use a(n) ______, which is a widely used tool for visualizing issues that need attention.

Pareto Chart

________ determines how long it takes an information system to pay for itself through reduced costs and increased benefits.

Payback Analysis

During system operation, changes in user activity or data patterns can cause a decline in efficiency, and ______ maintenance might be needed to restore performance.

Perfective

A(n) _______ represents the work that one person can complete in one day.

Person-day

A main advantage of enterprise resource planning is that it describes a specific hardware and software environment, also called a(n) ________ , that ensures connectivity and easy integration of future systems.

Platform

_______ is the concept that a message can give different meanings to different objects.

Polymorphism

The ________ , a network-based application, is a popular security solution that controls access to and from workstation interfaces.

Port Protector

The _______ evaluation verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.

Post-Implementation

______ software, such as Microsoft PowerPoint, can be used to create organization charts, which are helpful during a preliminary investigation.

Presentation Graphics

To avoid problems, ________ maintenance requires analysis of areas where trouble is likely to occur.

Preventive

Associating different permissions, also called ________ , with different users is a method for protecting stored data by limiting access to files and databases.

Privileges

Decision tables are an example of a(n) _______ tool that can be used to create accurate, complete, and concise models.

Process Description

Analysts often create models that use a standard language called business _______ during requirements modeling.

Process Modeling Notation

Many IT departments use a job title of _______ to designate positions that require a combination of system analysis and programming skills.

Programmer/Analyst

Examples of commonly used _______ languages are Visual Basic, Python, Ruby, and SQL.

Programming

In a typical JAD session, the ________ explains the reason for the project and expresses top management authorization and support.

Project Owner

Structured ________ Language, which is generated by many database programs, allows client workstations to communicate with servers and mainframe computers.

Query

RFID stands for ________

Radio Frequency Indentification

Joint application development focuses on team-based fact-finding, which is only one phase of the development process, whereas _______ is more like a compressed version of the entire process.

Rapid Application Development

________ provide(s) a fast-track approach to a full spectrum of systems development tasks, including planning, design, construction, and implementation.

Rapid Application Development

A(n) ________ , also known as a data structure, is a meaningful combination of related data elements that is included in a data flow or retained in a data store.

Record

Edgar Codd, a British computer scientist, developed the basic principles of _______ database design.

Relational

________ enable objects to communicate and interact as they perform business functions and transactions required by the system.

Relationships

A system that can handle input errors, processing errors, hardware failures, or human mistakes is _______.

Reliable

Popular examples of ______ software include GoToMyPC by Citrix, LogMeIn Pro by LogMeIn, and PC Now by WebEx

Remote Control

Consideration of development strategies, object modeling, data and process modeling, and ______ modeling are the four main activities of the systems analysis phase.

Requirements

A Microsoft Excel XY chart can be used to display a(n) _______ that shows risk probability and potential impact

Risk Matrix

The ________ is effective if the overall impact of a risk can be reduced by triggering timely and appropriate action.

Risk Responsive Plane

________ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.

SaaS

Information about projected future volume for all outputs, inputs, and processes is required in order to evaluate ________ .

Scalability

When assessing ______ feasibility, a systems analyst must consider the interaction between time and costs.

Schedule

Project ________ involves selecting and staffing a project team and assigning specific tasks to team members.

Scheduling

A table design is in _______ form if it is in 1NF and if all fields that are not part of the primary key are functionally dependent on the entire primary key

Second Normal

________ codes contain no additional information other than an indication of order of entry into the system.

Sequence

A(n) _______ graphically documents the use case by showing the classes, the messages, and the timing of the messages.

Sequence Diagram

The ________, or information center, offers services such as hotline assistance, training, and guidance to users who need technical help.

Service Desk

_______ is a performance metric that measures the time it takes to process a given task once it reaches the front of the queue.

Service Time

A postal code is an example of a(n) _______ code that distinguishes items by using a series of subgroups of digits.

Significant digit

When performing research regarding a vendor's software, it could be beneficial to make a(n) ________ to observe the system in use at another location.

Site visit

________ is a software development process that is used to manage and improve the quality of a finished system.

Software Engineering

Collecting input data, triggering or authorizing an input action, and providing a record of an original transaction are all functions of a(n) ________ document.

Source

________ data automation, a popular online input method, is fast and accurate, and minimizes human involvement in the translation process.

Source

The Management Summary, which provides a brief overview of a project to company managers and executives, is a section included in the system design _________.

Specification

Although the use of PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, ________ computing was inefficient and expensive.

Stand-Alone

A(n) _______ network, which has a hub-and-spoke design, does not suffer from the same degradation issues as a bus design when users and devices are added to the network.

Star

A ________ looks beyond day-to-day activities and focuses on a horizon that is three, five, ten, or more years in the future.

Strategic Plan

When using a(n) ________ method, system development is organized into phases, with deliverables and milestones to measure progress.

Structured Analysis

________ is a popular, traditional technique that describes a system in terms of data and the processes that act on the data.

Structured Analysis

One rule to follow when writing in _______ is to use limited vocabulary, including standard terms used in the data dictionary and specific words that describe the processing rules.

Structured English

Many project managers institute ________ , which are reviews of a project team member's work by other members of the team.

Structured Walk-Throughs

An application service provider is a firm that delivers a software application, or access to an application, by charging a usage or _______ fee.

Subscription

If a predecessor task has more than one successor task, the predecessor task's finish time is used to determine the start time for all ________ tasks.

Successor

A(n) ________ report is useful to upper-level managers who want to focus on total figures rather than supporting details.

Summary

A questionnaire, which can be used to obtain information about a wide range of topics, can also be referred to as a(n) _______

Survey

The end product of _______ prototyping is a working model of an information system, which is ready for implementation

System

________ documentation includes data dictionary entries, data flow diagrams, object models, screen layouts, source documents, and the system request that initiated the project.

System

The first step in creating a use case diagram is to identify the ______ , which shows what is included in a system and what is not included in the system.

System Boundary

The ________ section of the system design specification contains the complete design of the new system, including the user interface, outputs, inputs, files, databases, and network specifications.

System Components

The purpose of the ________ phase is to build a logical model of the new system.

Systems Analyis

________ are often the company's best line of defense against an IT disaster involving a system that is technically sound, but fails because it doesn't meet the needs of users and managers.

Systems Analyst

Structured analysis uses a series of phases, called the ________ to plan, analyze, design, implement, and support an information system.

Systems Development Life Cycle (SDLC)

The starting point for most projects is called a(n) ______, which is a formal way of asking for IT support.

Systems Request

The ________ document is the end product of the SDLC systems analysis phase.

Systems Requirements

A(n) _______ evaluates systems requests at most large companies.

Systems Review Committee

The IT director usually serves as a technical consultant to ensure that members of the ________ are aware of crucial issues, problems, and opportunities.

Systems Review Committee

If a site has a large number of remote clients, the ________ group often includes a deployment team that installs and configures the workstations.

Systems support and security

Conducting interviews, designing a report, selecting software, waiting for the delivery of equipment, and training users are examples of _______

Tasks

A disaster recovery plan should be accompanied by a(n) ________ , which simulates various levels of emergencies and records the responses, which can be analyzed and improved as necessary.

Test Plan

A fat client design, which is also known as a(n) ______ client design, is simpler and less expensive to develop than a thin client.

Thick

Most business-related databases must be designed in ________ normal form, which avoids the redundancy and data integrity problems that can exist in previous stages of the normalization process.

Third

Successful projects must balance cost, scope, and ______ against a set of constraints.

Time

A system's ________ includes ongoing system support and maintenance costs, as well as acquisition costs.

Total Cost of Ownership (TCO)

In a(n) ________ systems development environment, many applications require substantial desktop computing power and resources.

Traditional

When utilizing ________ techniques, the initial training must include not only the use of the application or system, but some instruction on how to present the materials effectively.

Train-the-Trainer

A potential disadvantage of rapid application development is its lack of emphasis on a company's strategic business needs.

True

A principle called Brook's Law demonstrates that adding more people to a project might increase the time necessary to complete the project.

True

A risk management plan should define project roles and responsibilities, risk management methods and procedures, categories of risk, and contingency plans.

True

A state transition diagram shows how an object changes from one state to another, depending on events that affect the object.

True

A storyboard, which can be created with software or drawn freehand, is a sketch that shows a general screen layout and design.

True

A system is effective if it supports business requirements and meets user needs.

True

A utility bill is an example of a turnaround document if the bill is printed from the company's billing system and the returned portion of the bill is scanned into the company's accounts receivable system.

True

Although resources on the Web are easily accessible to users, making a traditional database design available on the Web can require design modifications, additional software, and added expenses.

True

An IBS solution is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.

True

An entity name is the singular form of a department, outside organization, other information system, or person.

True

An evaluation and selection team must include users, who will participate in the selection process and feel a sense of ownership in the new system.

True

An iteration cycle includes planning, designing, coding, and testing one or more features based on user stories.

True

An operating system provides one logical record to a program or accepts one logical record from a program whenever a read or write command is issued by the program.

True

As a rule, data flow diagrams should only show a data store when two or more processes use that data store.

True

Because it allows companies to reach the global marketplace, B2B is especially important to smaller suppliers and customers who need instant information about prices and availability.

True

CASE tools are used by systems analysts to speed up the process of creating diagrams, which can be time consuming and tedious if completed by hand.

True

Cloud computing effectively eliminates compatibility issues as well as the need for users to install updates or perform maintenance.

True

Coding is the process of turning program logic into specific instructions that the computer system can execute.

True

Compared with software developed in-house, a software package almost always is less expensive, particularly in terms of initial investment.

True

Computer output to microfilm systems, which are often used by large firms, are especially important for legal reasons, or where it is necessary to display a signature, date stamp, or other visual features of a document.

True

Customer relationship management systems integrate all customer-related events and transactions, including marketing, sales, and customer service activities.

True

Database systems are able to support enterprise-wide applications more effectively than file processing systems

True

Depending on the project, system developers often blend traditional and cutting-edge development methods, because what works in one situation might not work in another.

True

Economic feasibility means that the projected benefits of a proposed system outweigh the estimated costs.

True

Examples of audit fields include a record's creation date, a record's modification date, the name of the user who has performed the action, and the number of times the record has been accessed.

True

Fortunately, the deletion of a record can be prevented if the record has a primary key that matches foreign keys in another table.

True

Gartner Inc., a leading consulting firm that is well-known for its predictions, believes that prices for most cloud services will begin to include a global energy surcharge.

True

Gathering data about project usability, cost, benefits, and schedules is the objective of fact-finding.

True

Groupware programs enable users to share data, collaborate on projects, and work in teams.

True

Identifying all project tasks and estimating the completion time and cost of each is referred to as project planning.

True

If a system is brought down for hours as a result of a disruption in electricity, the event would be categorized as a service failure.

True

If new technology offers a way to perform the same or additional functions more efficiently, it could be a sign that the existing system is obsolete and has reached the end of its economically useful life.

True

If system testing does not produce any technical, economical, or operational problems, management determines a schedule for system installation and evaluation.

True

In situations in which the same data travels to two or more different locations, it is appropriate to use a diverging data flow.

True

It is recommended that use cases and use case diagrams be organized so they can be linked to the appropriate class, state transition, sequence, and activity diagrams.

True

Many organizations assign responsibility for evaluating systems requests to a computer resources committee.

True

Microsoft Outlook and Novell's GroupWise are examples of popular personal information managers, which include a personal calendar, a to-do list, and contact management features.

True

Microsoft and Intershop are vendors that offer turnkey systems for companies that want to get an e-business up and running quickly.

True

Object-oriented methodology is popular because it provides an easy transition to O-O programming languages such as Java, Smalltalk, C++, Python, and Perl.

True

Objects within a class can be grouped into subclasses, which are more specific categories within a class.

True

Outputs, inputs, processes, performance, and controls are the five general categories of system requirements.

True

People working in teams can use collaboration software, such as Google Docs and Microsoft Web Apps, to access data and share files.

True

Project managers often use a weighted formula for estimating the duration of each task.

True

SAGE is a professional organization that provides a wide variety of technical information and support for system administrators.

True

Slack time is the amount of time a task can be late without pushing back the completion date of an entire project.

True

Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product, from the factory floor to the retail checkout counter.

True

Sometimes companies will waive educational requirements if a candidate for employment has significant experience, skills, or professional certifications.

True

Stronger controls and reduced cost are two of the main reasons for systems requests.

True

System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security.

True

The Open Systems Interconnection model provides physical design standards that assure seamless network connectivity regardless of the specific hardware environment.

True

The Unified Modeling Language is a popular technique for documenting and modeling a system.

True

The Unified Modeling Language uses object-oriented design concepts and provides various graphical tools, such as use case diagrams and sequence diagrams.

True

The XY chart, which is a problem-solving tool, is sometimes called a scatter diagram.

True

The default value is the value for a data element if a value otherwise is not entered for it.

True

The end product of object-oriented analysis is an object model, which represents the information system in terms of objects and object-oriented concepts.

True

The most effective training is interactive, self-paced, and multimedia-based.

True

The objective of the systems analysis phase is to understand the proposed project, ensure that it will support business requirements, and build a solid foundation for system development.

True

The occurrence of an emergency could require a maintenance team to address the problem immediately by applying a patch, which is a specially written software module that provides temporary repairs so operations can resume.

True

The systems requirements document is the basis for the presentations that are made to the IT department, the users, and most importantly, management.

True

The three types of relationships that can exist between entities are one-to-one, one-to-many, and many-to-many.

True

To determine whether a package can handle a certain transaction volume efficiently, a benchmark test can be performed.

True

Two examples of tools that are used for systems development include IBM's Rational software and the Microsoft Solutions Framework.

True

Typical characteristics of a data store include the data store name, a description, alternate name(s), attributes, and volume and frequency.

True

When an intruder gains access to a system using a compromised account and attempts to increase permission levels, it is referred to as a privilege escalation attack.

True

When designing a data entry screen, methods that can be used to indicate field locations include video highlighting, underscores, special symbols, or a combination of these features.

True

Whenever possible, people who were not directly involved in developing a system should conduct the post-implementation evaluation.

True

The user interface has evolved into a(n) ________ channel, with powerful output capability, and most user information needs can be met with screen-generated data, which a user can print, view, or save.

Two-Way

________ , which is an attribute that is recorded and described in a data dictionary, refers to whether a data element contains numeric, alphabetic, or character values.

Type

The ________ is a widely used method of visualizing and documenting an information system.

UML

Non-mission-critical computer systems and network devices should be plugged into a(n) ________ power supply that includes battery backup with suitable capacity to handle short-term operations while an orderly backup and system shutdown can be completed.

Uninterruptible

The objective of ________ testing is to identify and eliminate execution errors that could cause the program to terminate abnormally, and logic errors that could have been missed during desk checking.

Unit

A(n) ________ represents the steps in a specific business function or process.

Use Case

A(n) _______ documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks and actions required for successful completion, a description of alternative courses of action, preconditions, postconditions, and assumptions.

Use Case Description

Business requirements sometimes can be fulfilled by a(n) ________ application, rather than a formal information system or commercial package.

User

The first task in the systems design phase of the SDLC is ______ design.

User Interface

A(n) ________ is a firm that enhances a commercial software package by adding custom features and configuring it for a particular industry.

VAR

An evaluation model is a technique that uses a common yardstick to measure and compare ________ ratings.

Vendor

Most firms use commercial applications to handle ________ control for complex systems, such as ERP.

Version

A systems analyst can use industry trade journals as a source of information when researching ________ applications for a specific industry.

Vertical

The ______ CASE tool includes a Zachman Framework interface that allows users to view a systems project from different perspectives and levels of detail.

Visible Analyst

Tasks in a(n) _______ must be arranged in a logical sequence called a task pattern.

WBS

_______ data must be protected by security at three levels: the database itself, the Web server, and the telecommunication links that connect system components.

Web-based

________ are Web-based repositories of information that have emerged as part of Web 2.0, which is the name for the powerful and compelling shift toward Internet-based collaboration.

Wikis

There was widespread concern regarding the ________ issue because many older programs used only two characters to store the year, and might not recognize the start of a new century.

Y2K

A(n) ________ is a device that broadcasts network traffic, called data frames, to all other connected devices.

hub

A(n) ________ relationship exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity.

many-to-many

The Institute of Electrical and Electronics Engineers is working on 802.16 standards, sometimes called WiMAX, which are broadband wireless communications protocols for ________ area network.

metropolitan

Three-tier forms of client/server designs are also referred to as ________ designs, to indicate that some designs use more than one immediate layer.

n-tier

A(n) ________ server is a network device that provides Internet connectivity for internal LAN users.

proxy

If modules are ________ coupled, one module is linked to internal logic contained in another module.

tightly


Kaugnay na mga set ng pag-aaral

N487 Leadership in Nursing: Fiscal Planning and Responsibility

View Set

3.16 Unit Test: Circles - Part 1

View Set

costs incurred in a manufacturing firm, indicate whether the costs are most likely fixed or variable & whether they are most likely period costs or product costs under full absorption costing.

View Set

Disease Mechanisms II Exam 2 Material Part 1

View Set