CIS 301 Final Test Review
Two major Web-based development environments are Microsoft's ______ and IBM's WebSphere.
.NET
It is important for the interviewer to record facts and evaluate information following an interview because studies have shown that ________ percent of a conversation is forgotten within 30 minutes.
50
Oracle Corporation cites data that shows that businesses spend up to ________ percent of their IT budgets maintaining existing software and systems.
80
The Wi-Fi Alliance is a non-profit international association formed in 1999 to certify interoperability of wireless network products based on IEEE _______ specifications.
802.11
WPA2 is an extension of Wi-Fi Protected Access based on a full implementation of the IEEE ________ standard.
802.11i
On lower-level DFDs with multiple processes, it is recommended that no more than ________ process symbols be included.
9
Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called ________ tests.
Acceptance
________ are able to display multiple use cases in the form of a grid, where classes are shown as vertical bars and actions appear as horizontal arrows.
Activity Diagrams
A use case is initiated by a(n) _______, which is an external entity that requests the system to perform a function or process.
Actor
A user assumes the role of a(n) ________ in a use case diagram.
Actor
Business process modeling works well with object modeling, because both methods focus on the ________ and the way they behave.
Actors
Critics of _______ development often claim that because it focuses on quick iterations and fast releases, it lacks discipline and produces systems of questionable quality.
Agile
The _______ baseline documents the system at the end of the design phase and identifies any changes since the functional baseline.
Allocated
The initial task during systems implementation is _______ development, which requires systems analysts and programmers to work together to construct the necessary programs and code modules.
Application
________ consists of programs that support day-to-day business functions and provide users with the information they need
Application Software
Programs that handle the input, manage the processing logic, and provide the required output for an information system are called _______.
Applications
________ offers several levels of business applications, including project management, and has a plan that is available free of charge with unlimited duration.
Apptivo
Script kiddie, which is defined as an inexperienced or juvenile hacker who uses readily available malicious software to disrupt or damage computer systems, is a category of ________.
Attacker
An object has certain ________ , which are characteristics that describe the object.
Attributes
A(n) ________ service, which may be offered by a software vendor, enables an application to contact the vendor's server and check for a needed patch or update.
Automatic Update
Tape, hard drives, optical storage, and online storage are commonly used types of _______ media.
Backup
________ is the amount of data that can be transferred in a fixed time period.
Bandwidth
A prototype can serve as an initial model that is used as a(n) ________ to evaluate the finished system, or the prototype itself can develop into the final version of the system.
Benchmark
To measure system performance, many firms use ________ testing, which uses a set of standard tests to evaluate system performance and capacity.
Benchmark
A(n) _______ format is more efficient than a character-based format because it represents numbers as actual binary values, rather than as coded numeric digits.
Binary Storage
A(n) ________ is a hardware-based security control that can identify a person by a retina scan or by mapping a facial pattern.
Biometric Device
Project status meetings provide a project manager with an opportunity to seek input and conduct ________ sessions.
Brainstorming
The term ________ refers to the reasons, or justification, for a proposal.
Business Case
When an information system does not meet ________ , causes might include inadequately defined scope, imprecise targets, and lack of change control procedures.
Business Requirements
________ systems can analyze transactional data, generate information needed to manage and control business processes, and provide information that leads to better decision making.
Business Support
Modern ______ tools can help in simplifying the difficult task of maintaining full and accurate documentation for complex systems.
CASE
If context-sensitive Help is part of a program, developers must include coded _______ in the text that link to the correct page of information in the documentation.
Callouts
The class diagram includes a concept called ________ , which describes how instances of one class relate to instances of another class.
Cardinality
The final task in the preliminary investigation is to prepare a report to management that includes an evaluation of the systems request, an estimate of costs and benefits, and a ________ , which is a summary of the project request and a specific recommendation.
Case for Action
________ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.
Certification
Many IT industry leaders, such as Microsoft, Cisco, Novell, Oracle, and Sun Microsystems, offer ________, which are measured and verified by examination.
Certifications
Printing _______ reports on high-speed impact printers is a fast, inexpensive method for producing large-scale reports, especially if multiple copies are required.
Character-Based
An interface feature that allows a user to select one or more choices from a group is the ________ .
Check Box
To create a(n) ________ diagram, the use case is reviewed and the classes that participate in the underlying business process are identified.
Class
A(n) ________ is a set of letters or numbers that represents a data item and can be used to simplify output, input, and data formats.
Code
If a company is reluctant to take on the challenge and complexity of developing an Internet _______ site in-house, they may pursue alternatives, such as a packaged solution or the use of an application service provider.
Commerce
________ tools provide an overall framework for systems development and support a wide variety of design methodologies, including structured analysis and object-oriented analysis.
Computer-aided systems engineering
When creating a structure chart, the typical third step is to add couples, loops, and _______ to the chart.
Conditions
Requirements planning, user design, _______, and cutover are the four phases of the rapid application development model.
Construction
A(n) _______ is a top-level view of an information system that shows the system's boundaries and scope.
Context Diagram
An example of a(n) _______ requirement is when a system must maintain separate levels of security for users and the system administrator.
Control
A(n) _______ is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.
Corporate Culture
When the progress of a project is poorly monitored and responses to early warning signs of problems are slow, the result can be a(n) ________
Cost Overrun
Microsoft Project and other project management software can highlight the series of tasks that form the ________
Critical Path
The completion of a project will be delayed if any task on the ________ falls behind schedule.
Critical Path
High-priority objectives that must be achieved to fulfill the company's mission are called ________
Critical Success Factors
_______ notation, a common method of cardinality notation, uses shapes to indicate various possibilities.
Crow's foot
_______ consists of basic facts that are the system's raw material.
Data
A(n) ________, which is the smallest piece of data that has meaning within an information system, may also be referred to as a data item or field.
Data Element
Database operations, including storing, retrieving, updating, and deleting data, are controlled by a(n) _______ language.
Data Manipulation
A ________ is a framework for organizing, storing, and managing data that is comprised of files or tables that interact in various ways.
Data Structure
A(n) ______ system is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze data.
Database Management
A(n) _______ is a graphical representation of the conditions, actions, and rules found in a decision table.
Decision Tree
The pattern of tasks for a large project can be broken down into ________ tasks, multiple successor tasks, and multiple predecessor tasks.
Dependent
A make or buy decision is the choice between _______ versus purchasing software.
Developing
The ________ approach usually is the least expensive changeover method, but involves more risk than any other changeover method.
Direct Cutover
By storing data in various locations, a(n) ________ database management system is less likely to experience a catastrophic failure.
Distributed
_______ includes two main sectors: business-to-consumer and business-to-business
E-commerce
The black box concept is an example of ________ , which means that all data and methods are self-contained.
Encapsulation
Some common security controls include passwords, various levels of user access, and _______, or coding data to keep it safe from unauthorized users.
Encryption
The Software ______ Institute at Carnegie Mellon University represents the cutting edge of software design and development technology.
Engineering
The main objective of ________ is to integrate a company's primary functions to improve efficiency, reduce costs, and help managers make key decisions.
Enterprise Computing
The four basic symbols used in data flow diagrams represent processes, ______, data flows, and data stores.
Entities
A(n) _______ diagram depicts the logical relationships and interaction among system entities, provides an overview of the system, and acts as a blueprint for creating the physical data structures.
Entity-relationship
Object-oriented applications are called _______ -driven, because each transaction, message, or event triggers a corresponding action.
Event
Body motion detection is an example of a(n) ________ input technology.
Evolving
A LAN spans long distances and can connect WANS that are continents apart
False
A RAID design improves performance, capacity, and reliability, and involves the use of one large drive that appears to a computer as multiple logical drives.
False
A business profile is a specific set of transactions, events, and results that can be described and documented.
False
A class diagram is a physical model that evolves into a logical model and finally becomes a functioning information system.
False
A decision table is a physical structure that shows every combination of conditions and outcomes.
False
A form's instruction zone usually contains the company's name or logo and the title and number of the form.
False
A gray hole is a process that produces output, but has no input data flow.
False
A mitigation plan identifies a condition that would initiate a contingency plan.
False
A project manager's best course of action is to attempt to handle all situations single-handedly and avoid alerting management until a problem is serious.
False
A project triangle displays the same information as the Gantt chart, but uses task boxes to include much more detail.
False
A request for proposal is more specific than a request for quotation because the required product or service is already known when the request for quotation is written.
False
A service desk can boost its productivity by using network interface software, which allows IT staff to take over a user's workstation and provide support and troubleshooting.
False
A system administrator is responsible for configuration management, which includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.
False
A task ID does not need to be unique in a project and should be brief and descriptive.
False
A tunnel, which is identified by a number, is used to route incoming traffic to the correct application on a computer.
False
A two-tier design has a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server.
False
ASCII is an industry-standard protocol that allows DBMSs from various vendors to interact and exchange data.
False
Although each data element must be documented in the data dictionary, documenting the data flows isn't necessary.
False
Although the Internet has triggered enormous changes in business methods and operations, it has had little impact in the area of software acquisition.
False
An accurate forecast of TCO isn't as critical as it might seem, because only 15% of total costs occur after the purchase of the hardware and software, according to Gartner, Inc.
False
An attribute defines specific tasks that an object can perform.
False
An integration test includes all typical processing situations and is intended to assure users, developers, and managers that the program meets all specifications and that all necessary features have been included.
False
Database specialists design and construct Web pages, monitor traffic, manage hardware and software, and link Web-based applications to the company's information systems.
False
Diagram 0 contains a single process symbol and provides the most general view of an information system.
False
Examples of static modeling tools include sequence diagrams, state transition diagrams, and activity diagrams.
False
IBM introduced the graphical user interface and was a pioneer in user interface development.
False
IT professionals handle almost every aspect of systems development with little to no user participation.
False
In an interview, closed-ended questions encourage spontaneous and unstructured responses.
False
In modular design, it is recommended that the modules be designed to perform multiple functions because dependent modules provide a greater level of flexibility.
False
In today's business environment, batch processing is the most practical method due to its ability to provide real-time information.
False
Input security protects privacy rights and shields an organization's proprietary data from theft or unauthorized access.
False
It is important to remember that normal forms beyond 3NF do not exist.
False
Knowledge workers develop long-range plans, called strategic plans, which define the company's overall mission and goals.
False
Microsoft has developed a method for measuring scalability called Rapid Economic Justification (REJ).
False
Most magazine subscription codes are cipher codes, which combine data from different item attributes.
False
Most physicians feel that electronic health records software is easy to use and meets the needs of medical providers.
False
Most users prefer program documentation, which provides immediate Help when they have questions or encounter problems.
False
Object database connectivity, which is referred to as ODBC, is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
False
One advantage of a pilot approach is that the risk of errors or failures is limited to the implemented module only.
False
Organizations with special systems requirements, such as colleges and banks, need horizontal applications to handle their unique business needs.
False
Projects where management has a choice in implementing them are called voluntary projects.
False
Pseudocode is a subset of standard English that describes logical processes clearly and accurately.
False
Software consists of everything in the physical layer of the information system.
False
System analysts and programmers should not have access to the test environment except to correct a system problem or make authorized modifications or enhancements.
False
The 802.11b wireless standard, which was adopted in 2003, has a maximum speed of 54 Mbps and an approximate range of 50-100 feet.
False
The Critical Path Method (CPM) was developed by the U.S. Navy to manage very complex projects.
False
The Hawthorne Effect is a model that asks traditional fact-finding questions in a systems development context.
False
The first section of a typical preliminary investigation report is the case for action.
False
The letters SWOT stand for strengths, weaknesses, options, and threats.
False
The objective of supply chain management is to establish a company-wide strategy for using IT that includes a specific architecture as well as standards for data, processing, network, and user interface design.
False
The purpose of the systems analysis phase is to perform a preliminary investigation to evaluate an IT-related business opportunity or problem.
False
The standard notation method for representing a normalized design is to enclose the repeating group of fields within a second set of parentheses.
False
The starting point for creating use cases is the review of the information gathered during the methods modeling phase.
False
Unlike the system requirements specification, which is written for users to understand, the system design document is oriented toward the programmers who will use it to create necessary programs.
False
The first step in evaluating _______ is to identify and weed out systems requests that are not achievable.
Feasibility
A(n) ________ form, which is an alternative to a traditional paper-based survey, can be used to collect data on the Internet or a company intranet.
Fill-in
The _______ section of a typical preliminary investigation report contains the results of the investigation, including a description of the project's scope, constraints, and feasibility.
Findings
A(n) _______, which is the main line of defense between a local network and the Internet, can be configured to detect and respond to denial-of-service attacks, port scans, and other suspicious activity.
Firewall
A popular technique for investigating causes and effects is called a ________ .
Fishbone Diagram
An Ishikawa diagram, which is a popular technique for investigating causes and effects, is also called a(n) _______
Fishbone Diagram
A data ________ , which is represented as a line with a single or double arrow on a DFD, is a path for data to move from one part of an information system to another.
Flow
A(n) ________ indicates when an object sends or receives a message and is identified by a narrow vertical shape that covers the lifeline.
Focus
Establishing a relationship between two tables requires a ________ key field in one table to match a primary key value in another table.
Foreign
A properly designed _______ will be well organized, include enough space, and provide clear instructions.
Form
_________, or newsgroups, can be hosted by private or public entities, or reside in larger communities such as Google Groups or Yahoo Groups.
Forums
The additional cost and time associated with developing a logical and physical model of a system is one disadvantage of the _______ approach.
Four-Model
Complex systems, which have many processes, require analysts to create lower-level DFDs until all processes are identified as ________ .
Functional Primitives
In a data flow diagram, the ______ symbol for a data store is a flat rectangle that is open on the right side and closed on the left side.
Gane and Sarson
When the project manager provides status reports to management and users, ________ are often included as a means for showing the project's status graphically.
Gantt Charts
_______ is a free open source program that has a similar look and feel as Microsoft Project.
GanttProject
The user support function usually is called a service desk or _______
Help Desk
A user interface is based on basic principles of ________ interaction, which describes the relationship between computers and the people who use them to perform their jobs.
Human-Computer
Most date formats are based on the model that was established by the ________ , which requires a format of four digits for the year, two for the month, and two for the day.
ISO
Companies tend to choose _______ development to satisfy unique business requirements, to minimize changes in business procedures and policies, to meet constraints of existing systems and existing technology, and to develop internal resources and capabilities.
In-House
One benefit of a(n) ________ e-commerce strategy is the ability to maintain complete control over the organization of the site, the number of pages, and the size of the files.
In-House
A knowledge management system uses ________, which are logical rules that identify data patterns and relationships.
Inference Rules
In a(n) ________ structure, some people have more influence or knowledge than appears on an organization chart.
Informal
A(n) ________ combines technology, people, and data to provide support for business functions.
Information System
The strongest relationship, which enables an object to derive one or more of its attributes from another object, is called _______.
Inheritance
Microsoft Access is able to restrict data entry and prevent errors by providing standard _______ for fields such as dates, telephone numbers, postal codes, and Social Security numbers.
Input Masks
Although some users feel that _______ is a distracting form of communication, others like it and find it to be especially useful when working as team members in a collaborative situation.
Instant Messaging
A(n) ________ can make it easier to program interactive software products by providing built-in tools and advanced features, such as real-time error detection, syntax hints, highlighted code, class browsers, and version control.
Integrated Development Environment (IDE)
________ , which is one of the three main elements of system security, prevents unauthorized users from creating, modifying, or deleting information.
Integrity
The three main functions of a business information system are the management of applications that perform the processing logic, the handling of data storage and access, and the provision of a(n) ________ that allows users to interact with the system.
Interface
The ________ is the primary method of obtaining information during the preliminary investigation.
Interview
Modular design is based on combinations of three logical structures, which are called sequence, selection, and ________ .
Iteration
________ inventory systems rely on computer-to-computer data exchange to minimize unnecessary inventory.
Just-in-time (JIT)
Two techniques, _______ and balancing, must be used if lower-level data flow diagrams are being created.
Leveling
A software ________ could allow the software to be used on a single computer, a specified number of computers, a network, or an entire site, depending on the terms of the agreement.
License
A(n) ________ represents the time during which the object above it is able to interact with the other objects in the use case.
Lifeline
Checking that a payment amount is greater than zero, but not specifying a maximum value is an example of a(n) ________ check .
Limit
_______ for Laptops, which is sold by Absolute Software, is a type of tracking software that offers call-in service, as well as a remote data erase capability.
LoJack
Processes contain the business ________ that transform data and produce the required results.
Logic
A process that continues to print payroll checks until it reaches the end of the payroll file is an example of ________ .
Looping
A(n) _______ agreement, which includes additional support and assistance from a vendor, is a supplement to a software purchase.
Maintence
________ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
Maintence
The presentation to ________, one of the most critical milestones in the systems development process, occurs at the end of the systems analysis phase.
Management
Many companies use a data ________, which is designed to serve the needs of a specific department, rather than a data warehouse that spans an entire enterprise.
Mart
When using a CASE tool or screen generator for documentation, number the screen designs and save them in a hierarchy similar to a(n) ________ .
Menu Tree
_________ networks, which are expensive to install and maintain, are used in situations where a high degree of redundancy is needed.
Mesh
Interface designers can obtain usability _______ by using software that can record and measure user interaction with a system.
Metrics
A popular graphics modeling tool that can be used to create many types of charts and diagrams is ________ .
Microsoft Visio
________ is a popular tool that systems analysts can use to create business process diagrams, flowcharts, and organization charts.
Microsoft Visio
________ is software that can connect a database to the Web and enable data to be viewed and updated through a Web browser.
Middleware
A major advantage of object-oriented designs is that systems analysts can save time and avoid errors by using _______ objects.
Modular
A(n) _______ consists of related program code organized into small units that are easy to understand and maintain.
Module
A(n) ________ table can be simplified because some rules might be duplicates, redundant, or unrealistic.
Multicondition
_______ language technology is used in text-to-speech synthesizers, automated voice response systems, and speech recognition systems.
Natural
The ________ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur.
Net Present Value
A type of project where management has no choice in implementing it is referred to as a(n) _______ project.
Nondiscretionary
Modeling involves graphical methods and ________ language that represent the system at various stages of development
Nontechnical
A(n) ______ represents a real person, place, event, or transaction.
Object
After you identify the system's objects, classes, and relationships, you should develop an _______ diagram that provides an overview of the system.
Object Relationship
________ methods use a variety of diagrams, including use case, class, sequence, and transition state diagrams.
Object-Oriented
Properly implemented, ________ can speed up projects, reduce costs, and improve overall quality.
Object-oriented development (OOD)
Personal _______ is a fact-finding technique used by systems analysts to verify statements made in interviews and determine if procedures operate as they are described.
Observation
Microsoft _______ is powerful information management software that allows an interviewer to record a meeting, store the results, and create a searchable file for easy access.
OneNote
A(n) _______ system, which allows a constant dialog between users and the system, handles transactions when and where they occur and provides output directly to users.
Online
________ security defines how particular tasks are to be performed, from large-scale data backups to everyday tasks such as storing e-mails or forms.
Operational
________ feasibility means that a proposed system will be used effectively after it has been developed.
Operational Feasibility
The practice of shifting IT development, support, and operations to other countries is referred to as offshore ________ .
Outsourcing
A project manager can use a ________ to convert task start and finish times to actual dates by laying out an entire project on a calendar.
PERT Chart
To transform a task list into a(n) _______ chart, you first enter the task name, ID, duration, and predecessors for each task.
PERT/CPM
Extreme Programming uses a concept called ________ programming, which involves two programmers working on the same task on the same computer.
Parallel
When a data flow diagram is partitioned, the higher-level diagram is referred to as the ________ diagram.
Parent
Systems analysts may use a(n) ______, which is a widely used tool for visualizing issues that need attention.
Pareto Chart
________ determines how long it takes an information system to pay for itself through reduced costs and increased benefits.
Payback Analysis
During system operation, changes in user activity or data patterns can cause a decline in efficiency, and ______ maintenance might be needed to restore performance.
Perfective
A(n) _______ represents the work that one person can complete in one day.
Person-day
A main advantage of enterprise resource planning is that it describes a specific hardware and software environment, also called a(n) ________ , that ensures connectivity and easy integration of future systems.
Platform
_______ is the concept that a message can give different meanings to different objects.
Polymorphism
The ________ , a network-based application, is a popular security solution that controls access to and from workstation interfaces.
Port Protector
The _______ evaluation verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.
Post-Implementation
______ software, such as Microsoft PowerPoint, can be used to create organization charts, which are helpful during a preliminary investigation.
Presentation Graphics
To avoid problems, ________ maintenance requires analysis of areas where trouble is likely to occur.
Preventive
Associating different permissions, also called ________ , with different users is a method for protecting stored data by limiting access to files and databases.
Privileges
Decision tables are an example of a(n) _______ tool that can be used to create accurate, complete, and concise models.
Process Description
Analysts often create models that use a standard language called business _______ during requirements modeling.
Process Modeling Notation
Many IT departments use a job title of _______ to designate positions that require a combination of system analysis and programming skills.
Programmer/Analyst
Examples of commonly used _______ languages are Visual Basic, Python, Ruby, and SQL.
Programming
In a typical JAD session, the ________ explains the reason for the project and expresses top management authorization and support.
Project Owner
Structured ________ Language, which is generated by many database programs, allows client workstations to communicate with servers and mainframe computers.
Query
RFID stands for ________
Radio Frequency Indentification
Joint application development focuses on team-based fact-finding, which is only one phase of the development process, whereas _______ is more like a compressed version of the entire process.
Rapid Application Development
________ provide(s) a fast-track approach to a full spectrum of systems development tasks, including planning, design, construction, and implementation.
Rapid Application Development
A(n) ________ , also known as a data structure, is a meaningful combination of related data elements that is included in a data flow or retained in a data store.
Record
Edgar Codd, a British computer scientist, developed the basic principles of _______ database design.
Relational
________ enable objects to communicate and interact as they perform business functions and transactions required by the system.
Relationships
A system that can handle input errors, processing errors, hardware failures, or human mistakes is _______.
Reliable
Popular examples of ______ software include GoToMyPC by Citrix, LogMeIn Pro by LogMeIn, and PC Now by WebEx
Remote Control
Consideration of development strategies, object modeling, data and process modeling, and ______ modeling are the four main activities of the systems analysis phase.
Requirements
A Microsoft Excel XY chart can be used to display a(n) _______ that shows risk probability and potential impact
Risk Matrix
The ________ is effective if the overall impact of a risk can be reduced by triggering timely and appropriate action.
Risk Responsive Plane
________ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.
SaaS
Information about projected future volume for all outputs, inputs, and processes is required in order to evaluate ________ .
Scalability
When assessing ______ feasibility, a systems analyst must consider the interaction between time and costs.
Schedule
Project ________ involves selecting and staffing a project team and assigning specific tasks to team members.
Scheduling
A table design is in _______ form if it is in 1NF and if all fields that are not part of the primary key are functionally dependent on the entire primary key
Second Normal
________ codes contain no additional information other than an indication of order of entry into the system.
Sequence
A(n) _______ graphically documents the use case by showing the classes, the messages, and the timing of the messages.
Sequence Diagram
The ________, or information center, offers services such as hotline assistance, training, and guidance to users who need technical help.
Service Desk
_______ is a performance metric that measures the time it takes to process a given task once it reaches the front of the queue.
Service Time
A postal code is an example of a(n) _______ code that distinguishes items by using a series of subgroups of digits.
Significant digit
When performing research regarding a vendor's software, it could be beneficial to make a(n) ________ to observe the system in use at another location.
Site visit
________ is a software development process that is used to manage and improve the quality of a finished system.
Software Engineering
Collecting input data, triggering or authorizing an input action, and providing a record of an original transaction are all functions of a(n) ________ document.
Source
________ data automation, a popular online input method, is fast and accurate, and minimizes human involvement in the translation process.
Source
The Management Summary, which provides a brief overview of a project to company managers and executives, is a section included in the system design _________.
Specification
Although the use of PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, ________ computing was inefficient and expensive.
Stand-Alone
A(n) _______ network, which has a hub-and-spoke design, does not suffer from the same degradation issues as a bus design when users and devices are added to the network.
Star
A ________ looks beyond day-to-day activities and focuses on a horizon that is three, five, ten, or more years in the future.
Strategic Plan
When using a(n) ________ method, system development is organized into phases, with deliverables and milestones to measure progress.
Structured Analysis
________ is a popular, traditional technique that describes a system in terms of data and the processes that act on the data.
Structured Analysis
One rule to follow when writing in _______ is to use limited vocabulary, including standard terms used in the data dictionary and specific words that describe the processing rules.
Structured English
Many project managers institute ________ , which are reviews of a project team member's work by other members of the team.
Structured Walk-Throughs
An application service provider is a firm that delivers a software application, or access to an application, by charging a usage or _______ fee.
Subscription
If a predecessor task has more than one successor task, the predecessor task's finish time is used to determine the start time for all ________ tasks.
Successor
A(n) ________ report is useful to upper-level managers who want to focus on total figures rather than supporting details.
Summary
A questionnaire, which can be used to obtain information about a wide range of topics, can also be referred to as a(n) _______
Survey
The end product of _______ prototyping is a working model of an information system, which is ready for implementation
System
________ documentation includes data dictionary entries, data flow diagrams, object models, screen layouts, source documents, and the system request that initiated the project.
System
The first step in creating a use case diagram is to identify the ______ , which shows what is included in a system and what is not included in the system.
System Boundary
The ________ section of the system design specification contains the complete design of the new system, including the user interface, outputs, inputs, files, databases, and network specifications.
System Components
The purpose of the ________ phase is to build a logical model of the new system.
Systems Analyis
________ are often the company's best line of defense against an IT disaster involving a system that is technically sound, but fails because it doesn't meet the needs of users and managers.
Systems Analyst
Structured analysis uses a series of phases, called the ________ to plan, analyze, design, implement, and support an information system.
Systems Development Life Cycle (SDLC)
The starting point for most projects is called a(n) ______, which is a formal way of asking for IT support.
Systems Request
The ________ document is the end product of the SDLC systems analysis phase.
Systems Requirements
A(n) _______ evaluates systems requests at most large companies.
Systems Review Committee
The IT director usually serves as a technical consultant to ensure that members of the ________ are aware of crucial issues, problems, and opportunities.
Systems Review Committee
If a site has a large number of remote clients, the ________ group often includes a deployment team that installs and configures the workstations.
Systems support and security
Conducting interviews, designing a report, selecting software, waiting for the delivery of equipment, and training users are examples of _______
Tasks
A disaster recovery plan should be accompanied by a(n) ________ , which simulates various levels of emergencies and records the responses, which can be analyzed and improved as necessary.
Test Plan
A fat client design, which is also known as a(n) ______ client design, is simpler and less expensive to develop than a thin client.
Thick
Most business-related databases must be designed in ________ normal form, which avoids the redundancy and data integrity problems that can exist in previous stages of the normalization process.
Third
Successful projects must balance cost, scope, and ______ against a set of constraints.
Time
A system's ________ includes ongoing system support and maintenance costs, as well as acquisition costs.
Total Cost of Ownership (TCO)
In a(n) ________ systems development environment, many applications require substantial desktop computing power and resources.
Traditional
When utilizing ________ techniques, the initial training must include not only the use of the application or system, but some instruction on how to present the materials effectively.
Train-the-Trainer
A potential disadvantage of rapid application development is its lack of emphasis on a company's strategic business needs.
True
A principle called Brook's Law demonstrates that adding more people to a project might increase the time necessary to complete the project.
True
A risk management plan should define project roles and responsibilities, risk management methods and procedures, categories of risk, and contingency plans.
True
A state transition diagram shows how an object changes from one state to another, depending on events that affect the object.
True
A storyboard, which can be created with software or drawn freehand, is a sketch that shows a general screen layout and design.
True
A system is effective if it supports business requirements and meets user needs.
True
A utility bill is an example of a turnaround document if the bill is printed from the company's billing system and the returned portion of the bill is scanned into the company's accounts receivable system.
True
Although resources on the Web are easily accessible to users, making a traditional database design available on the Web can require design modifications, additional software, and added expenses.
True
An IBS solution is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.
True
An entity name is the singular form of a department, outside organization, other information system, or person.
True
An evaluation and selection team must include users, who will participate in the selection process and feel a sense of ownership in the new system.
True
An iteration cycle includes planning, designing, coding, and testing one or more features based on user stories.
True
An operating system provides one logical record to a program or accepts one logical record from a program whenever a read or write command is issued by the program.
True
As a rule, data flow diagrams should only show a data store when two or more processes use that data store.
True
Because it allows companies to reach the global marketplace, B2B is especially important to smaller suppliers and customers who need instant information about prices and availability.
True
CASE tools are used by systems analysts to speed up the process of creating diagrams, which can be time consuming and tedious if completed by hand.
True
Cloud computing effectively eliminates compatibility issues as well as the need for users to install updates or perform maintenance.
True
Coding is the process of turning program logic into specific instructions that the computer system can execute.
True
Compared with software developed in-house, a software package almost always is less expensive, particularly in terms of initial investment.
True
Computer output to microfilm systems, which are often used by large firms, are especially important for legal reasons, or where it is necessary to display a signature, date stamp, or other visual features of a document.
True
Customer relationship management systems integrate all customer-related events and transactions, including marketing, sales, and customer service activities.
True
Database systems are able to support enterprise-wide applications more effectively than file processing systems
True
Depending on the project, system developers often blend traditional and cutting-edge development methods, because what works in one situation might not work in another.
True
Economic feasibility means that the projected benefits of a proposed system outweigh the estimated costs.
True
Examples of audit fields include a record's creation date, a record's modification date, the name of the user who has performed the action, and the number of times the record has been accessed.
True
Fortunately, the deletion of a record can be prevented if the record has a primary key that matches foreign keys in another table.
True
Gartner Inc., a leading consulting firm that is well-known for its predictions, believes that prices for most cloud services will begin to include a global energy surcharge.
True
Gathering data about project usability, cost, benefits, and schedules is the objective of fact-finding.
True
Groupware programs enable users to share data, collaborate on projects, and work in teams.
True
Identifying all project tasks and estimating the completion time and cost of each is referred to as project planning.
True
If a system is brought down for hours as a result of a disruption in electricity, the event would be categorized as a service failure.
True
If new technology offers a way to perform the same or additional functions more efficiently, it could be a sign that the existing system is obsolete and has reached the end of its economically useful life.
True
If system testing does not produce any technical, economical, or operational problems, management determines a schedule for system installation and evaluation.
True
In situations in which the same data travels to two or more different locations, it is appropriate to use a diverging data flow.
True
It is recommended that use cases and use case diagrams be organized so they can be linked to the appropriate class, state transition, sequence, and activity diagrams.
True
Many organizations assign responsibility for evaluating systems requests to a computer resources committee.
True
Microsoft Outlook and Novell's GroupWise are examples of popular personal information managers, which include a personal calendar, a to-do list, and contact management features.
True
Microsoft and Intershop are vendors that offer turnkey systems for companies that want to get an e-business up and running quickly.
True
Object-oriented methodology is popular because it provides an easy transition to O-O programming languages such as Java, Smalltalk, C++, Python, and Perl.
True
Objects within a class can be grouped into subclasses, which are more specific categories within a class.
True
Outputs, inputs, processes, performance, and controls are the five general categories of system requirements.
True
People working in teams can use collaboration software, such as Google Docs and Microsoft Web Apps, to access data and share files.
True
Project managers often use a weighted formula for estimating the duration of each task.
True
SAGE is a professional organization that provides a wide variety of technical information and support for system administrators.
True
Slack time is the amount of time a task can be late without pushing back the completion date of an entire project.
True
Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product, from the factory floor to the retail checkout counter.
True
Sometimes companies will waive educational requirements if a candidate for employment has significant experience, skills, or professional certifications.
True
Stronger controls and reduced cost are two of the main reasons for systems requests.
True
System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security.
True
The Open Systems Interconnection model provides physical design standards that assure seamless network connectivity regardless of the specific hardware environment.
True
The Unified Modeling Language is a popular technique for documenting and modeling a system.
True
The Unified Modeling Language uses object-oriented design concepts and provides various graphical tools, such as use case diagrams and sequence diagrams.
True
The XY chart, which is a problem-solving tool, is sometimes called a scatter diagram.
True
The default value is the value for a data element if a value otherwise is not entered for it.
True
The end product of object-oriented analysis is an object model, which represents the information system in terms of objects and object-oriented concepts.
True
The most effective training is interactive, self-paced, and multimedia-based.
True
The objective of the systems analysis phase is to understand the proposed project, ensure that it will support business requirements, and build a solid foundation for system development.
True
The occurrence of an emergency could require a maintenance team to address the problem immediately by applying a patch, which is a specially written software module that provides temporary repairs so operations can resume.
True
The systems requirements document is the basis for the presentations that are made to the IT department, the users, and most importantly, management.
True
The three types of relationships that can exist between entities are one-to-one, one-to-many, and many-to-many.
True
To determine whether a package can handle a certain transaction volume efficiently, a benchmark test can be performed.
True
Two examples of tools that are used for systems development include IBM's Rational software and the Microsoft Solutions Framework.
True
Typical characteristics of a data store include the data store name, a description, alternate name(s), attributes, and volume and frequency.
True
When an intruder gains access to a system using a compromised account and attempts to increase permission levels, it is referred to as a privilege escalation attack.
True
When designing a data entry screen, methods that can be used to indicate field locations include video highlighting, underscores, special symbols, or a combination of these features.
True
Whenever possible, people who were not directly involved in developing a system should conduct the post-implementation evaluation.
True
The user interface has evolved into a(n) ________ channel, with powerful output capability, and most user information needs can be met with screen-generated data, which a user can print, view, or save.
Two-Way
________ , which is an attribute that is recorded and described in a data dictionary, refers to whether a data element contains numeric, alphabetic, or character values.
Type
The ________ is a widely used method of visualizing and documenting an information system.
UML
Non-mission-critical computer systems and network devices should be plugged into a(n) ________ power supply that includes battery backup with suitable capacity to handle short-term operations while an orderly backup and system shutdown can be completed.
Uninterruptible
The objective of ________ testing is to identify and eliminate execution errors that could cause the program to terminate abnormally, and logic errors that could have been missed during desk checking.
Unit
A(n) ________ represents the steps in a specific business function or process.
Use Case
A(n) _______ documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks and actions required for successful completion, a description of alternative courses of action, preconditions, postconditions, and assumptions.
Use Case Description
Business requirements sometimes can be fulfilled by a(n) ________ application, rather than a formal information system or commercial package.
User
The first task in the systems design phase of the SDLC is ______ design.
User Interface
A(n) ________ is a firm that enhances a commercial software package by adding custom features and configuring it for a particular industry.
VAR
An evaluation model is a technique that uses a common yardstick to measure and compare ________ ratings.
Vendor
Most firms use commercial applications to handle ________ control for complex systems, such as ERP.
Version
A systems analyst can use industry trade journals as a source of information when researching ________ applications for a specific industry.
Vertical
The ______ CASE tool includes a Zachman Framework interface that allows users to view a systems project from different perspectives and levels of detail.
Visible Analyst
Tasks in a(n) _______ must be arranged in a logical sequence called a task pattern.
WBS
_______ data must be protected by security at three levels: the database itself, the Web server, and the telecommunication links that connect system components.
Web-based
________ are Web-based repositories of information that have emerged as part of Web 2.0, which is the name for the powerful and compelling shift toward Internet-based collaboration.
Wikis
There was widespread concern regarding the ________ issue because many older programs used only two characters to store the year, and might not recognize the start of a new century.
Y2K
A(n) ________ is a device that broadcasts network traffic, called data frames, to all other connected devices.
hub
A(n) ________ relationship exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity.
many-to-many
The Institute of Electrical and Electronics Engineers is working on 802.16 standards, sometimes called WiMAX, which are broadband wireless communications protocols for ________ area network.
metropolitan
Three-tier forms of client/server designs are also referred to as ________ designs, to indicate that some designs use more than one immediate layer.
n-tier
A(n) ________ server is a network device that provides Internet connectivity for internal LAN users.
proxy
If modules are ________ coupled, one module is linked to internal logic contained in another module.
tightly