CIS 622 Final Exam
Put in sequence, the four steps typically followed to create a structure chart are:
1. Review the data 2. identify modules 3. adding couples, etc. 4. analyzing the structure
Match the best choice for logical & physical models. 1. what must take place: 2. technology, format, organization:
1. logical 2. physical
A firm that delivers a software application, or access to an application, by charging a usage or subscription fee
ASP
In a client/server architecture, data stored in more than one location but acting as a single, logical database
DDBMS
enacting data validation rules, reasonableness checks, existence checks, range checks, input masks, and other input restraints to improve system outputs
GIGO
The relationship between computers and the people who use them to perform their jobs
HCI
Which is a compelling reason to pursue in-house software development?
Enact a number of distinctive security requirements
Many applications require substantial desktop computing power and resource
traditional systems development environment
identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking
unit testing
test programs that interact with other programs and files separately before they are integrated into the system
unit testing
social engineering
user
consists of instructions and information to users who will interact with the system
user documentation
When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.
users
Software package developed to handle information requirements for a specific type of business
vertical app
a security weakness or soft spot
vulnerability
Internet design protocols and enables a company to integrate new applications into its e-commerce strategy
web-centric
A group in the IT department is responsible for providing user support
service desk
A report showing the total figures of the sales without much of the supporting details is a(n):
summary report
Extending ERP to suppliers and customers
supply chain management
Translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods
system architecture
the process of putting a new information system online and retiring the old system
system changeover
after integration testing, testing the entire IS and typical processing situations
system testing
"Build a system that is effective, reliable, and maintainable." best aligns with
systems design
A well-structured relation is a relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies
table
Which of the following is an example of a horizontal application?
Microsoft Excel
The total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur
NPV
describes how data actually moves from an application on one computer to an application on another networked computer
OSI model
a web-based repository of information that anyone can access, contribute to, or modify
wiki
A document that describes a company, lists the IT services or products needed, and specifies the features required:
RFP
A document with known specific products or service they want and need to obtain a price estimates or bids from vendors RFQ
RFQ
In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry
VAR
A model of software deployment where an application is hosted as a service provided to customers over the Internet
SaaS
hardening
application
Systems that divide processing between one or more networked clients and a central server
client/server
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction
cloud computing
existing data is loaded into the new system
data conversion concept
A useful managerial report generating only those records that meet specific conditions.
exception report
an attack that takes advantage of a vulnerability
exploit
encryption & permissions
file
At the end of the systems implementation phase, the final report to management should include
final versions of system documentation
main line of defense between a local network, or intranet, and the Internet
firewall
An attribute that appears as a non-primary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation
foreign key
One or more powerful servers control the network, and departmental servers control lower levels of processing and network devices
hierarchical network
A software package that can be used by many different types of organizations
horizontal app
which are older systems that use outdated technology
legacy
describes the way the components in a network interact
logical topology
a process for converting complex data structures into simple, stable data structures
normalization
Transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis
outsourcing
A company using a service provider is engaged in a(n):
outsourcing arrangement
two programmers work on the same task on the same computer; one drives while the other navigates
pair programming concept
Changing an operational system to make it more efficient, reliable, and maintainable
perfective maintenance
BIOS-level passwords
physical
describes the actual network cabling and connections
physical topology
ERP concept that ensures connectivity and easy integration of future systems, including in-house software and commercial packages
platform
competes for resources in an operational system
preventative maintenance
An attribute (or combination of attributes) whose value is unique across all occurrences of a relation
primary key
safeguard procedures
procedural
The environment for the actual system operation is called the _____ environment.
production
describes the inputs, outputs, and processing logic for all program modules
program documentation
measure risk likelihood & impact
risk assessment
strategies to deal with risk
risk control
identify vulnerabilities and how they might be exploited
risk identification
list and classify assets & possible threats
risk identification
a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise
scalability
Cloud computing capability which matches resources to needs at any given time
scaling on demand
Locates all or most of the processing logic on the server
think client
internal or external entity that could endanger an asset
threat
Put the following steps to the :Software Acquisition Process" in order: 1-6
1. Evaluate the ISR 2. Identify the potential vendors 3. Evaluate alternatives 4. Perform Cost-Ben. Anyl. 5. Prepare recomm. 6. Implement solution
establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design
ERP
Which document is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase and contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management.
Software requirements specification
Which of the following is specified by the detailed procedures in a test plan?
The test data to be used
Web-based environment that enhances interactive experiences, including wikis and blogs, and social networking applications
Web 2.0
successful completion of system testing is the key to user and management approval, which is why system tests sometimes are referred to as
acceptance testing
adds enhancements to an operational system and makes the system easier to use
adaptive maintenance
Where does the "make or buy" decision fall in the SDLC?
after analysis
related program code organized into small units that are easy to understand and maintain
module concept
diagnoses and corrects errors in an operational system
corrective maintenance
the degree of interdependence among modules
coupling concept
Centralized data processing & all data input and output at a central location
data processing center
A(n) ________ is a coding scheme recognized by system software for representing organizational data.
data type
The process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields. For example, when a customer views their account it uses a query that combines several tables to return their account information and all the products that were sold to them. Rather than joining all these tables for every query, we add a customer_ID attribute directly to the products_sold table.
de-normalization
In addition to analyzing logic and program code, a project team usually holds this session with users to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included
design walkthrough
the process of reviewing a program code to spot logic errors, which produce incorrect results
desk checking
____ involves more risk than other changeover methods.
direct cutover
A(n) ________ is a file organization in which rows are stored either sequentially or non-sequentially, and an index is created that allows software to locate individual rows.
indexed file organization
A template or pattern that restricts data entry and prevents errors input mask
input mask
Testing two or more programs that depend on each other
integration testing
Web-based software usually with additional layers, called to communicate with existing software and legacy systems
middleware
special utility software that enables the tiers to communicate and pass data back and forth in a multi-tier system
middleware
VPN
network
The way a network is configured
network topology
The result of normalization is that every ________ key attribute depends upon the whole primary key.
non-primary
contains all the information needed for processing and distributing online and printed output
operations documentation
A sketch that shows the general screen layout and design
storyboard/wireframe
simulation of each program outcome or result and a message to indicate whether or not the program executed successfully
stub testing
A variable fee based on the number of users or workstations that have access to the application
subscription
