CTS-285-01IN Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

This provides various graphical tools, such as use case diagrams and sequence diagrams.

The Unified Modeling Language (UML)

If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____.​ Select one: a. ​user training package b. ​user presence software c. ​maintenance module d. ​utility index

a. ​user training package

​Two or more concurrent tasks often depend on a single prior task, which is called a _____. a.​predecessor task b.​wireframe task c.​beneficiary task d.​discrete task

a.predecessor task

Which of the following methods of system development stresses intense team-based effort and reflects a set of community-based values?​ a.​Agile method b.​Structured analysis c.​Rapid application development d.​Object-oriented analysis

a.​Agile method

​In _____, two programmers work on the same task on the same computer; one drives while the other navigates. Select one: a.​pair programming b.​multitasking c.​dual tasking d.​driver programming

a.​pair programming

​A task that represents several activities is known as a _____. Select one: a.​task group b.​task name c.​task review d.​task ID

a.​task group

Corrective maintenance _____.​ Select one: a. ​adds enhancements to an operational system and makes the system easier to use b. ​diagnoses and corrects errors in an operational system c. ​involves changing an operational system to make it more efficient, reliable, or maintainable d. ​competes for resources in an operational system

b. ​diagnoses and corrects errors in an operational system

When using a _____ to investigate the causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.​ Select one: a.​causebone diagram b.​fishbone diagram c.​jawbone diagram d.​crossbone diagram

b.​fishbone diagram

​Centralized IT departments no longer produce reams of printed _____ reports. Select one: a.​batch b.​greenbar c.​audit d.​yellowbar

b.​greenbar

A(n) _____ resembles a verb and defines specific tasks that an object can perform. Select one: a.​attribute b.​method c.​command d.​message

b.​method

The first step in the creation of a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart is to _____. Select one: a.​the graphical planning aids to use b.​determine the logical order of project tasks identify c.​determine the status of all tasks d.​identify all the project tasks

d.​identify all the project tasks

​During the systems design phase, _____ are used to organize, access, and maintain data structures. Select one: a.​glossary fields b.​common fields c.​content fields d.​key fields

d.​key fields

​When phrasing interview questions, a systems analyst should avoid _____ that suggest or favor a particular reply. Select one: a.​range-of-response questions b.​open-ended questions c.​closed-ended questions d.​leading questions

d.​leading questions

he data mining technique that relies on association rule learning is often called _____. Select one: a.​simulated analysis b.​virtual storage analysis c.​strategy-oriented analysis d.​market basket analysis

d.​market basket analysis

Mauricio, a project manager at a reputed firm, has been assigned to handle a new project that the firm has received. This project involves a lot of scheduling that has to be handled by Mauricio. Mauricio has decided to use a project management tool for this project. He wants the tool to be free and cloud-based so that there is no need for software to be installed. Help Mauricio in identifying the project management tool that best fits the purpose.​ Select one: a.​Apptivo b.​Smartsheet c.​Microsoft Project d.​Gantter

b. SmartSheet

_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.​ Select one: a. ​Secure b. ​Maintenance c. ​Principal d. ​Capital

b. ​Maintenance

​Business support systems _____. a.​simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied b.​process data generated by day-to-day business operations c.​provide job-related information support to users at all levels of a company d.​include email, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and integrated mobile computing systems

c. ​provide job-related information support to users at all levels of a company

_____ protects information from unauthorized disclosure and safeguards privacy.​ Select one: a. ​Availability b. ​Integrity c. ​Confidentiality d. ​Accessibility

c. ​Confidentiality

_____ is a process for controlling changes in system requirements during software development.​ Select one: a. ​Data management b. ​Disk management c. ​Configuration management d. ​Email management

c. ​Configuration management

When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic ecommerce environment.​ Select one: a.​smaller initial investment and provides more flexibility b.​smaller initial investment but provides less flexibility c.​greater initial investment but provides more flexibility d.​greater initial investment and provides less flexibility

c.​greater initial investment but provides more flexibility

​A data flow diagram (DFD) shows _____. Select one: a.​how data is related b.​what key fields are stored in the system c.​how a system transforms input data into useful information d.​what data is stored in the system

c.​how a system transforms input data into useful information

User productivity systems _____.​ a.​process data generated by day-to-day business operations b.​provide job-related information to users at all levels of a company c.​simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied d.​include groupware programs that enable users to share data, collaborate on projects, and work in teams

d. ​include groupware programs that enable users to share data, collaborate on projects, and work in teams

Agile methods typically use a(n) _____ , which represents a series of iterations based on user feedback.​ a.​extreme model b.​incremental model c.​evaluative model d.​spiral model

d. ​spiral model

A _____ is an overview that describes a company's overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction. a.​business matrix b.​business glossary c.​business index d.​business profile

d. business profile

A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting.​ Select one: a. ​high-level synthesis b. ​wireless fidelity c. ​word editing software d. remote control software

d. remote control software

_____ describes the amount of data that a system can transfer in a fixed time period.​ Select one: a. ​Latency b. ​Resolution c. ​Dimensionality d. ​Bandwidth

d. ​Bandwidth

_____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.​ a.​Prototyping b.​Scrum c.​Rapid application development d.​Modeling

d. ​Modeling

​_____, a risk control strategy, eliminates risks by adding protective safeguards. Select one: a. ​Avoidance b. ​Acceptance c. ​Conveyance d. ​Transference

d. ​Transference

The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.​ Select one: a. ​functional baseline b. ​operational baseline c. ​allocated baseline d. ​product baseline

d. ​product baseline

A _____ is an internal or external entity that could endanger an asset. Select one: a. ​proxy b. ​facade c. ​firewall d. ​threat

d. ​threat

​A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form. Select one: a.​12 b.​24 c.​30 d.​32

d.​32

_____ is the amount of data that can be transferred in a fixed time period.​ Select one: a.​Resolution b.​Dimensionality c.​Topology d.​Bandwidth

d.​Bandwidth

​_____ help offers assistance for a task in progress. Select one: a.​User-selected b.​User-sensitive c.​Standard-selected d.​Context-sensitive

d.​Context-sensitive

​_____ describes the degree of interdependence among modules. Select one: a.​Resolution b.​Modularity c.​Dynamism d.​Coupling

d.​Coupling

​_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data. Select one: a.​Encapsulation b.​Normalization c.​Standardization d.​Encryption

d.​Encryption

_____, a free cloud-based project management tool, runs in a browser window, so there is no software to install to use it. Select one: a.​Apptivo b.​Smartsheet c.​Microsoft Project d.​Gantter

d.​Gantter

Nathan is an expert on all of the different kinds of process description tools. So, when his colleagues have questions, they know where to turn. One of the firm's trainee analysts is working on a financial process that will continue to print vendor payments until it reaches the end of the file. Which of the following processes will Nathan suggest the analyst to use? Select one: a.​Sequence b.​Selection c.​Concatenation d.​Iteration

d.​Iteration

​_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard. Select one: a.​Java runtime environment (JRE) b.​Java eclipse framework connectivity (JEFC) c.​Java virtual machine (JVM) d.​Java database connectivity (JDBC)

d.​Java database connectivity (JDBC)

_____ relies on collective data paths to increase bandwidth and range.​ Select one: a.​Supply chain management (SCM) b.​Microsoft Visio c.​Bluetooth d.​Multiple input/multiple output (MIMO) technology

d.​Multiple input/multiple output (MIMO) technology

_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.​ Select one: a.​Accessibility b.​Relationship c.​Feasibility d.​Performance

d.​Performance

_____ describes the actual network cabling and connections.​ Select one: a.​Logical topology b.​Bus topology c.​Star topology d.​Physical topology

d.​Physical topology

If one of these is available, analysts can use it to develop models and enter documentation from the joint application development (JAD) session. Answer 7Choose...​The Unified Modeling Language (UML)​Scalable system​A functional decomposition diagram (FDD)​Total cost of ownership (TCO)​Rapid application development (RAD)​Pool​Closed-ended​CASE tool​Open-ended​Agile method

CASE Tool

Systems analysts use this kind of question when they want information that is more specific, or when facts must be verified.

Closed-ended

A data flow diagram (DFD) does not show the external entities that provide data to the system or receive output from the system. Select one: True False

False

A single site visit usually gives true pictures, so it is unnecessary to visit more than one installation. Select one: True False

False

Economic activity has a negligible influence on corporate information management.​ Select one: True False

False

Joint application development (JAD) is like a compressed version of the entire development process.​ True False

False

Most large companies rely on one person to evaluate systems requests instead of relying on a systems review committee.​ Select one: True False

False

When practicing a presentation, write a script so that the presentation can be read to the audience. Select one: True False

False

​A spell checker will identify instances when the word "their" is used instead of the word "there." Select one: True False

False

​In a data flow diagram (DFD), systems analysts call an entity that receives data from the system a source. True False

False

​In a presentation, specialized or technical terminology should be used whenever possible. Select one: True False

False

​In addition to helping to gather and analyze facts, many programs also automatically perform fact-finding for systems analysts. Select one: True False

False

​In most systems analysis tasks, time and people are interchangeable. True False

False

​It is easier to assign dollar values to intangible benefits. True False

False

​Transaction processing (TP) systems are inefficient because they process a set of transaction-related commands individually rather than as a group. True False

False

These are the kinds of questions that are useful when a systems analyst wants to understand a larger process or draw out the interviewee's opinions, attitudes, or suggestions.

Open-Ended

This is the overall diagram in business process modeling notation (BPMN) terminology.

Pool

This offers a better return on the initial investment because it will have a longer useful life.

Scalable System

George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories. ​Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat? Select one: a. ​Human error b. ​Technical obsolescence c. ​Service failure d. ​Espionage

b. ​Technical obsolescence

Jerry has inherited an Excel sheet that lists all of the system requirements for his team's new project. But unfortunately, his predecessor did not label the requirements with categories-or in some cases failed to categorize them correctly. He needs to take care of this so the requirements can be sorted correctly. ​Jerry knows that there were supposed to be three performance examples but he finds four in the spreadsheet. Which one of these is mislabeled as a performance example? Select one: a.​The system must automatically generate an insurance claim form.Correct b.​Response time must not exceed four seconds. c.​The online inventory control system must flag all low-stock items within one hour after the quantity falls below a predetermined minimum. d.​The records system must produce key reports within five hours of the end of each fiscal quarter.

a. ​The system must automatically generate an insurance claim form.

A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage. a. ​data flow diagram b. ​object model c. ​process flow diagram d. ​network model

a. data flow diagram

​_____ is the overall time between a request for system activity and the delivery of the response. Select one: a. ​Response time b. ​Throughput time c. ​Refresh rate d. ​Base rate

a. ​Response time

_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.​ Select one: a. ​Throughput b. ​Resolution c. ​Dimensionality d. ​Latency

a. ​Throughput

When a new version of a system is installed, the prior release is _____, or stored.​ Select one: a. ​archived b. ​deleted c. ​discontinued d. ​reinstalled

a. ​archived

The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.​ Select one: a. ​functional baseline b. ​extension baseline c. ​allocated baseline d. ​product baseline

a. ​functional baseline

A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.​ Select one: a. ​help desk b. ​white spot c. ​maintenance software module d. ​utility point

a. ​help desk

​Response time is affected by _____. Select one or more: a. ​system design b. ​capabilities c. ​follow-up messages d. ​processing methods

a. ​system design b. ​capabilities d. ​processing methods

Project monitoring, an activity of a project manager, _____.​ Select one: a.requires guiding, supervising, and coordinating a project team's workload b.​involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that might delay a project c.​consists of staffing, which includes selecting the project team and assigning specific tasks to team members d.​includes identifying and arranging project tasks and estimating completion times and costs

a.requires guiding, supervising, and coordinating a project team's workload

Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. ​ One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend?​ Select one: a.​A mesh network b.​A bus network c.​A star network d.​A hub network

a.​A mesh network

In determining this, one problem is that cost estimates tend to understate costs such as user support and downtime productivity losses.

Total Cost of Ownership (TCO)

Although many authors use a more conversational style for e-mail, users should remember that e-mail messages often are forwarded to other recipients or groups, and so you must consider the users to whom it might be distributed. Select one: True False

True

Network administration includes hardware and software maintenance, support, and security.​ True False

True

System developers can initiate a formal project as early as the preliminary investigation stage, or later on, as analysis, design, and implementation activities occur. Select one: True False

True

User support provides users with technical information, training, and productivity support.​ True False

True

When assessing schedule feasibility, a systems analyst must consider the interaction between time and costs.​ Select one: True False

True

​By limiting access to internal processes, an object prevents its internal code from being altered by another object or process. Select one: True False

True

​The why, who, what, when, and how of communications are important questions that one must answer before he or she communicates. Select one: True False

True

Which of the following is an example of an intangible benefit?​ Select one: a.​A user-friendly system that improves employee job satisfaction b.​A new scheduling system that reduces overtime c.​An online package tracking system that improves service and decreases the need for clerical staff d.​A sophisticated inventory control system that cuts excess inventory

a.​A user-friendly system that improves employee job satisfactionCorrect

​Which of the following is one of the main sectors of eCommerce? a.​B2C (business-to-consumer) b.​C2B (consumer-to-business) c.​BPM (business process model) d.​C2C (consumer-to-consumer)

a.​B2C (business-to-consumer)

​_____ maintains consistency among data flow diagrams (DFDs) by ensuring that input and output data flows align properly. Select one: a.​Balancing b.​Indexing c.​Adapting d.​Shipping

a.​Balancing

Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she has never before taken the time to learn the names of the actual dialog box features aligned with their functions. ​Siobhan has a feature in the dialog box that must allow her users to select one or more choices from a group. Which of the following dialog box components is she most likely to use? Select one: a.​Check box b.​Text box c.​List box d.​Toggle button

a.​Check box

​A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities. Select one: a.​entity-relationship diagram (ERD) b.​illustration flow chart c.​query relationship diagram (QRD) d.​data chart

a.​entity-relationship diagram (ERD)

​In a web-based design, the Internet serves as the _____ for the database management system. Select one or more: a.​front end b.​back end c.​middleware d.​interface

a.​front end d.​interface

A sequence diagram _____. Select one or more: a.​is a dynamic model of a use case b.​is like a blueprint for all the objects within a class c.​is another term for a state transition diagram d.​shows the interaction among classes during a specified time period

a.​is a dynamic model of a use case d.​shows the interaction among classes during a specified time period

In a sequence diagram, a _____ is identified by a line showing direction that runs between two objects. Select one: a.​message b.​procedure c.​method d.​response

a.​message

​In a data flow diagram (DFD), a spontaneous generation process is a process that has _____. Select one: a.​no input b.​at least one output and one input, but the output obviously is insufficient to generate the input shown c.​no output d.​at least one input and one output, but the input obviously is insufficient to generate the output shown

a.​no input

​A(n) _____ represents a person, a place, an event, or a transaction that is significant to the information system. Select one: a.​object b.​instance c.​class d.​model

a.​object

​ Lara, managing director of an information technology firm, has received a big project from one of their highly valuable clients. However, the project received is different from the usual projects they handle. ​ Lara performs certain analyses and ensures that the company's image will not be at risk by taking this project. This is an example of _____.​ Select one: a.​operational feasibility b.​economic feasibility c.​technical feasibility d.​schedule feasibility

a.​operational feasibility

​As the accompanying figure illustrates, the _____ changeover method allows the new system to be implemented in stages, or modules. Select one: a.​phased operation b.​parallel operation c.​pilot operation d.​direct cutover

a.​phased operation

In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identify a particular member of an entity. Select one: a.​primary key b.​secondary key c.​candidate key d.​foreign key

a.​primary key

The environment for the actual system operation is called the _____. Select one: a.​production environment b.​exploratory environment c.​functional environment d.​globalized environment

a.​production environment

Rapid application development (RAD) relies heavily on _____. Select one: a.​prototyping b.​management direction c.​agile methods d.​scrum

a.​prototyping

​In a data flow diagram (DFD), the Gane and Sarson symbol for a data store is a _____. Select one: a.​rectangle with rounded corners b.​line with a single or double arrowhead c.​flat rectangle that is open on the right side and closed on the left side d.​rectangle, which may be shaded to make it look three-dimensional

a.​rectangle with rounded corners

​To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes. Select one: a.​scalability b.​reliability c.​compatibility d.​applicability

a.​scalability

​User documentation includes _____. Select one or more: a.​security and audit trail information b.​program, systems analyst, programmer, and system identification c.​frequently asked questions (FAQs) d.​description of source document content, preparation, processing, and samples

a.​security and audit trail information c.​frequently asked questions (FAQs) d.​description of source document content, preparation, processing, and samples

Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design. Select one: a.​storyboard b.​viewbox c.​viewport d.​wireframe

a.​storyboard

​In a top-down design, the overall objectives of a system are broken down into _____ in a process called partitioning. Select one or more: a.​subsystems b.​flags c.​modules d.​pilot sites

a.​subsystems c.​modules

​A class can belong to a more general category called a _____. a.​superclass b.​register c.​subclass d.​catalog

a.​superclass

Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____.​ Select one: a.​supply chain management (SCM) b.​stand-alone computing c.cloud computing d.​behavioral management

a.​supply chain management (SCM)

Structured analysis is a traditional systems development technique that uses a series of phases, called the _____, to plan, analyze, design, implement, and support an information system.​ a.​systems development life cycle (SDLC) b.​transaction processing (TP) system c.​object-oriented (O-O) analysis d.​enterprise resource planning system (ERP)

a.​systems development life cycle (SDLC)

A SWOT (Strength, Weakness, Opportunities, and Threats) analysis contributes to the strategic planning process by examining a firm's _____ resources.​ Select one or more: a.​technical b.​human c.​financial d.​logistical

a.​technical b.​human c.​financial

​Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure. Select one: a.​top-down approach b.​test plan c.​training plan d.​integrated approach

a.​top-down approach

​During _____, programmers must test programs that interact with other programs and files separately before they are integrated into the system. Select one: a.​unit testing b.​integrated testing c.​acceptance testing d.​functional testing

a.​unit testing

​The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking. Select one: a.​unit testing b.​integration testing c.​functional testing d.​global testing

a.​unit testing

​For each use case, a _____ in the form of a table is developed to document the name of the use case, the actor, a description of the use case, and so forth. Select one: a.​use case description b.​use case diagram c.​use case schematic d.​use case outline

a.​use case description

​Leveling _____. Select one: a.​uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system b.​ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD) c.​uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system d.​ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD)

a.​uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system

A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy.​ Select one: a.​web-centric architecture b.​thin client c.​data processing center d.​corporate portal

a.​web-centric architecture

​To know _____, ask the question, "Is this communication necessary, and what specific results am I seeking?" Select one: a.​why you are communicating b.​when to speak c.​who your targets are d.​how to communicate effectively

a.​why you are communicating

​Identify a typical example of a system requirement for the input category. Select one: a.​As a final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits. b.​Response time must not exceed four seconds. c.​The system must provide logon security at the operating system level and at the application level. d.​Student grades must be entered on machine-readable forms prepared by the instructor.

d.​Student grades must be entered on machine-readable forms prepared by the instructor.

Emily is functioning with her customer, Anna, on the design of a new database. She describes to Anna that key fields are utilized to access, coordinate, and preserve the data records. ​Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here. Select one: a.​Primary keyIncorrect b.​Secondary key c.​Foreign key d.​Super key

d.​Super key

​A _____ involves breaking a project down into a series of smaller tasks. Select one: a.​ work breakdown structure (WBS) b.​value breakdown structure (VBS) c.​risk breakdown structure (RBS) d.​concept breakdown structure (CBS)

work breakdown structure (WBS)

​Among the symbols in the accompanying figure, a _____ is a path for data to move from one part of the information system to another. Select one: a.​data store b.​data flow c.​process d.​gray hole

​b. data flow

Of the measures of feasibility, questions such as "Does management support the project?" and "Will the new system require training for users?" would help predict a system's _____.​ Select one: a.​schedule feasibility b.​technical feasibilityIncorrect c.​economic feasibility d.​operational feasibility

​d. operational feasibility

A business process describes a specific set of _____. a.​employees b.​results c.​transactions d.​events

ANSWER: b.​results c.​transactions d.​events

The creation of this representation is similar to drawing an organization chart.

A functional decomposition diagram (FDD)

These methods develop a system incrementally, by building a series of prototypes and constantly adjusting them to user requirements.

Agile method

One of its risks is that a system might work well in the short term, but the corporate and long-term objectives for the system might not be met.

Rapid application development (RAD)

​The _____ is a top-down representation of a process. Select one: a.​Unified Modeling Language (UML) b.​total cost of ownership (TCO) c.​functional decomposition diagram (FDD) d.​Rapid Economic Justification (REJ)

c.​functional decomposition diagram (FDD)

Betty has a number of report templates at her disposal filed in folders to respond to her boss's requests. In order to know where to find a report that meets the needs of her manager, she first needs to know what category of report will satisfy the request. ​Betty's lead needs to get a report of all of the purchases made only by his employees, using their employee discount, in a given week. In which of the following folders is she likely to find this category of report? Select one: a.​Exception reports b.​Summary reports c.​Detail reports d.​Control reports

a.​Exception reports

The _____ describes how data actually moves from an application on one computer to an application on another networked computer.​ Select one: a.​OSI (Open Systems Interconnection) model b.​five forces model c.​object-oriented database model d.​subscription model

a.​OSI (Open Systems Interconnection) model

​_____ means that a proposed system will be used effectively after it has been developed. Select one: a.​Operational feasibility b.​Technical feasibility c.​Schedule feasibility d.Economic feasibility

a.​Operational feasibility

The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.​ Select one: a.​Pareto chart b.​Gantt chart c.​Scatter chart d.​XY chart

a.​Pareto chart

Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems development method the team uses to create a new application for a major medical supplier. ​It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client will throw them a curveball and want to make changes late in the game-but that they also will be unwilling to absorb the costs of those changes. For this reason, which of the following methods of development will Roark eliminate? a.​Structured analysis b.​Agile/adaptive methods c.​Rapid application development d.​Object-oriented analysis

a.​Structured analysis

​_____ is a widely used method of visualizing and documenting an information system. Select one: a.​Unified Modeling Language (UML) b.​Java Virtual Machine (JVM) c.​UNiplexed Information and Computing System (UNIX) d.​Multimedia Logic (ML)

a.​Unified Modeling Language (UML)

When structured English is used, which of the following rules must be conformed to?​ Select one or more: a.​Use only the three building blocks of sequence, selection, and iteration. b.​Use indentation for readability. c.​Use a limited vocabulary. d.​Avoid standard terms used in the data dictionary.

a.​Use only the three building blocks of sequence, selection, and iteration. b.​Use indentation for readability. c.​Use a limited vocabulary.

The _____ was formed in 1999 to certify interoperability of wireless network products based on IEEE 802.11 specifications.​ Select one: a.​Wi-Fi Alliance b.​Institute of Electrical and Electronics Engineers (IEEE) c.​World Wide Web Consortium (W3C) d.​Wi-MAX

a.​Wi-Fi Alliance

The kind of document shown in the accompanying figure starts with a heading, which should include all except _____. Select one: a.​a brief statement of purpose b.​your suggestions c.​your signature d.​your observations

a.​a brief statement of purpose

​In a use case, the _____ is shown as a stick figure with a label that identifies its role. Select one: a.​actor b.​association c.​linkage d.​service request

a.​actor

The number of _____ needed to describe the characteristics of an object depends on the business requirements of the information system and its users.​ Select one: a.​attributes b.​packets c.​indices d.​keys

a.​attributes

A _____ is a summary of a project request and a specific recommendation.​ a.​case for action b.​routine report c.​breakdown report d.​case for approval

a.​case for action

​Inheritance enables an object, called a _____, to derive one or more of its attributes from a parent. Select one: a.​child b.​user c.​package d.​suite

a.​child

The objective of a _____ is to use the combined judgment and experience of several analysts to evaluate systems projects.​ Select one: a.​computer resources committee b.​data storage committee c.​system networking committee d.​topology identification committee

a.​computer resources committeeCorrect

​A(n) _____ is a series of tasks that, if delayed, would affect the completion date of the overall project. Select one: a.​critical path b.​dynamic path c.​absolute path d.​relative path

a.​critical path

​A _____ is designed to serve the needs of a specific department, such as sales, marketing, or finance. Select one: a.​data mart b.​data frame c.​pseudo-data d.​metadata

a.​data mart

​A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways. Select one: a.​data structure b.​data roster c.​data object d.​data log

a.​data structure

A _____ cannot be started until a previous task is completed.​ Select one: a.​dependent task b.​predecessor task c.​precursor task d.​concurrent task

a.​dependent task

​In _____, systems analysts use prototyping to verify user requirements, after which the prototype is discarded and implementation continues. Select one or more: a.​design prototyping b.​throwaway prototyping c.​system prototyping d.​application prototyping

a.​design prototyping b.​throwaway prototyping

Projects, where management has a choice in implementing them, are called _____ projects.​ Select one: a.​discretionary b.​nondiscretionary c.​appended d.​concatenated

a.​discretionary

Roger is part of a team that is responsible for employing a new information system, the design of which was developed using customary structured methods. To manage the intricacy of the application development process, Roger wants to deploy structured development techniques, and he asks Pete, his coworker, for information about these techniques. Pete tells him about structure charts, which show program modules and the relationships among them using various graphical symbols. ​ ​Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module passes to another. What symbol is used for a data couple? Select one: a.​An arrow with a filled circle b.​An arrow with an empty circle c.​A line with a diamond on one end d.​A line with a diamond on both ends

b.​An arrow with an empty circle

​_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers. Select one: a.​ASCII (American Standard Code for Information Interchange) b.​EBCDIC (Extended Binary Coded Decimal Interchange Code) c.​Unicode d.​ISO (International Organization for Standardization)

b.​EBCDIC (Extended Binary Coded Decimal Interchange Code)

_____ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.​ a.​Assistive technology b.​Information technology c.​Medical technology d.​Instructional technology

b.​Information technology

_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.​ Select one: a.​Encapsulation b.​Normalization c.​Abstraction d.​Encryption

b.​Normalization

​_____ describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses. Select one: a.​Instances b.​Relationships c.​Aggregates d.​Clusters

b.​Relationships

​When developing a training program, which of the following guidelines should be kept in mind? Select one: a.​Train people individually. b.​Select the most effective place to conduct the training c.​Develop a single training program for distinct employee groups. d.​Provide only hands-on experience training.

b.​Select the most effective place to conduct the training

_____ produces a full-featured, working model of the information system Select one: a.​Design prototyping b.​System prototyping c.​Application prototyping d.​Throwaway prototyping

b.​System prototyping

_____ refers to the practical resources needed to develop, purchase, install, or operate a system.​ Select one: a.​Operational feasibility b.​Technical feasibility c.​Schedule feasibility d.​Market feasibility

b.​Technical feasibility

Which of the following is a typical example of a system requirement for the control category? Select one: a.​The customer analysis system must produce a quarterly report that identifies changes in ordering patterns. b.​The system must maintain separate levels of security for users and the system administrator. c.​The data entry screens must be uniform, except for background color, which can be changed by the user. d.​The warehouse distribution system must analyze daily orders and create a routing pattern for delivery trucks.

b.​The system must maintain separate levels of security for users and the system administrator.

In a use case diagram, the user becomes a(n) _____, with a specific role that describes how he or she interacts with a system. Select one: a.​agent b.​actor c.​interlocutor d.​master

b.​actor

An object has certain _____, which are characteristics that describe the object, such as the make, model, and color of a car. Select one: a.​keys b.​attributes c.​indices d.​elements

b.​attributes

​In a source document, the _____ contains any required signatures. Select one: a.​control zone b.​authorization zone c.​totals zone d.​heading zone

b.​authorization zone

​Program Evaluation Review Technique (PERT) is a _____ technique because it analyzes a large, complex project as a series of individual tasks. Select one: a.​top-down b.​bottom-up c.​three-point estimate d.​six-point estimate

b.​bottom-up

​In an interview, _____ limit or restrict the response. Select one: a.​open-ended questions b.​closed-ended questions c.​leading questions d.​range-of-response questions

b.​closed-ended questions

A _____ is a graphical representation of the conditions, actions, and rules found in a decision table. Select one: a.​decision board b.​decision tree c.​decision element d.​decision point

b.​decision tree

​Typical process description tools include _____. Select one: a.​context diagrams b.​decision trees c.​pseudocode d.​database tables

b.​decision trees

EBCDIC and ASCII both require _____ bits for storage of each character. Select one: a.​six b.​eight c.​twelve d.​sixteen

b.​eight

​A table is in _____ if it does not contain a repeating group. Select one: a.​second normal form b.​first normal form c.​third normal form d.​fourth normal form

b.​first normal form

​A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a _____. Select one: a.​flowchart b.​histogram c.​tree map d.​streamgraph

b.​histogram

Decision trees show the logic structure in a _____. Select one: a.​vertical form that resembles a tree with the roots at the bottom and the branches at the top b.​horizontal form that resembles a tree with the roots at the left and the branches to the right c.​vertical form that resembles a tree with the roots at the top and the branches at the bottom d.​horizontal form that resembles a tree with the roots at the right and the branches to the left

b.​horizontal form that resembles a tree with the roots at the left and the branches to the right

​Project reporting, an activity of a project manager, _____. Select one: a.​involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that might delay a project b.​includes informing management, users, and the project team about the progress of a project c.​consists of staffing, which includes selecting the project team and assigning specific tasks to team members d.​includes identifying and arranging project tasks and estimating completion times and costs

b.​includes informing management, users, and the project team about the progress of a projectCorrect

​Microsoft claims that the Microsoft Project software can _____. Select one: a.​link risks with specific vendors b.​link risks with specific tasks and projects c.​eliminate risks d.​prevent risks

b.​link risks with specific tasks and projects

In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth. Select one: a.​shareware b.​middleware c.​groupware d.​malware

b.​middleware

​When maintaining schedules, if enough _____ and frequent checkpoints exist, problems will be detected rapidly. Select one: a.​activity diagrams b.​milestones c.​data flow diagrams d.​viewports

b.​milestones

A _____ language feature allows users to type commands or requests in normal text phrases. Select one: a.​normal b.​natural c.​standard d.​basal

b.​natural

​Projects where management has no choice in implementing them are called _____ projects. Select one: a.​discretionary b.​nondiscretionary c.​appended d.​concatenated

b.​nondiscretionary

A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.​ Select one: a.​data frame b.​platform c.​bandwidth d.​hub

b.​platform

In a report, the recommendations section is used to _____. Select one: a.​summarize the entire project in several paragraphs b.​present the best system alternative with a brief explanation c.​locate the questionnaires at the end of the document d.​describe the major conclusions reached

b.​present the best system alternative with a brief explanation

​If processes must be performed in a specific sequence, the information should be documented in the _____. Select one: a.​leveling guide b.​process descriptions c.​data dictionary d.​data flow diagram (DFD)

b.​process descriptions

​A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. Select one: a.sequence check​ b.​range check c.​asynchronous check d.​existence check

b.​range check

​The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information. Select one: a.​control head b.​report header c.​report footer d.​character head

b.​report header

​A(n) _____ graphically documents a use case by showing the classes, the messages, and the timing of the messages. Select one: a.​state transition diagram b.​sequence diagram c.​data flow diagram d.​scatter diagram

b.​sequence diagram

In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.​ Select one: a.​time and cost estimates b.​system environment c.​executive summary d.​implementation requirements

b.​system environment

The systems implementation phase of the systems development life cycle (SDLC) includes an assessment, called a _____, to determine whether the system operates properly and if costs and benefits are within expectation.​ a.​systems validation b.​systems evaluation c.​systems estimation d.​systems verification

b.​systems evaluation

Systems development typically starts with a _____.​ Select one: a.​feasibility study, followed by a systems request, which includes a preliminary investigation b.​systems request, followed by a preliminary investigation, which includes a feasibility study c.​preliminary investigation, followed by a feasibility study, which includes a systems request d.​feasibility study, followed by a preliminary investigation, which includes a systems request

b.​systems request, followed by a preliminary investigation, which includes a feasibility study

​In addition to direct evaluations, systems developers must identify and document indirect expenses that contribute to the _____. Select one: a.​business process modeling notation(BPMN) b.​total cost of ownership (TCO) c.​functional decomposition diagrams (FDD) d.​Rapid Economic Justification (REJ)

b.​total cost of ownership (TCO)

A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness. Select one: a.​testability b.​usability c.​encapsulation d.​abstraction

b.​usability

​A(n) _____ is a data validation rule that can be used for data items that must have certain values. Select one: a.​existence check b.​validity check c.​batch check d.​reasonableness check

b.​validity check

A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.​ Select one: a.​local area network (LAN) b.​wireless local area network (WLAN) c.​metropolitan area network (MAN) d.​storage area network (SAN)

b.​wireless local area network (WLAN)

Examples of company-wide applications, called _____, include order processing systems, payroll systems, and company communications networks.​ a.​legacy systems b.​operating applications c.​enterprise applications d.​network operating systems (NOS)

c. ​enterprise applications

As shown in the accompanying figure, near the end of a system's useful life, _____ when it becomes clear that a company plans to replace the system.​ Select one: a. ​adaptive, corrective, and perfective maintenance expenses all increase rapidly b. ​perfective maintenance expenses increase rapidly, but adaptive and corrective maintenance typically decrease c. ​adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases d. ​adaptive, corrective, and perfective maintenance expenses all decrease rapidly

c. ​adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases

In maintenance management, _____ means examining the whole in order to learn about the individual elements.​ Select one: a. ​synthesis b. ​adoption c. ​analysis d. ​elucidation

c. ​analysis

Perfective maintenance _____.​ Select one: a. ​adds enhancements to an operational system and makes the system easier to use b. ​diagnoses and corrects errors in an operational system c. ​involves changing an operational system to make it more efficient, reliable, or maintainable d. ​competes for resources in an operational system

c. ​involves changing an operational system to make it more efficient, reliable, or maintainable

Kevin, the trainee analyst at Lynach TechSystems, is in charge of allocating suitable Unified Modeling Language (UML) notations to a particular class diagram. ​ ​In a given diagram, Kevin is designing a relationship in which a given employee can have no payroll deductions or he/she can have many deductions. Which of the following notations should Kevin write to mark this relationship? Select one: a.​0..1 b.​1 c.​0..* d.​1..*

c.​0..*

​The Unified Modeling Language (UML) notation _____ identifies a zero or many relation. Select one: a.​0..1 b.​1..* c.​0..* d.​0..0

c.​0..*

​For most standard documents, Microsoft suggests writers should aim for the Flesch Reading Ease score of _____. Select one: a.​10-20 b.30-40 c.​60-70 d.​90-100

c.​60-70

_____ is the process of constructing the programs and code modules that serves as the building blocks of an information system. Select one: a.​Application structuring b.​Application analysis c.​Application development d.​Application virtualization

c.​Application development

_____ measures a module's scope and processing characteristics. Select one: a.​Coupling b.​Indexing c.​Cohesion d.​Partitioning

c.​Cohesion

The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client. ​Which of the following is a benefit if they use the four-model approach? Select one: a.​It will take less time to build a logical and physical model of the current system. b.​It will not incur additional costs to develop logical and physical model of the current system. c.​It will provide a clear picture of current system functions before any modifications or improvements are made. d.​It will provide time to create the current system models even for projects with tight schedules.

c.​It will provide a clear picture of current system functions before any modifications or improvements are made.

​Electronic data interchange (EDI) enables _____ inventory systems, which rely on computer-to-computer data exchange to minimize unnecessary inventory. Select one: a.​CRM (Customer relationship management) b.​EPOD (Electronic proof of delivery) c.​JIT (Just-in-time) d.​RFID (Radio frequency identification)

c.​JIT (Just-in-time)

​_____ give the project managers an opportunity to seek input and conduct brainstorming sessions. Select one: a.​Status reports b.​Project review reports c.​Project status meetings d.​Board meetings

c.​Project status meetings

Which of the following is specified by the detailed procedures in a test plan?​ Select one: a.​The result of the final test of all programs b.​How a separate operational and test environment is prepared c.​The test data to be used d.​Who will work with the new system and ensure that all necessary features have been included

c.​The test data to be used

Which of the following is a guideline for preparing an effective slide presentation? Select one: a.​Use numbers rather than bullets, unless showing a specific sequence. b.​Display at least three topics per slide. c.​Use appropriate point sizes for titles and body text. d.​Read the slides to the audience during the presentation.

c.​Use appropriate point sizes for titles and body text.

​The iteration structure is the completion of _____. a.​one or more process steps based on the results of a test or condition b.​steps in a chronological order, one after another c.​a process step that is repeated until a specific condition changes d.​a specific condition that is repeated until a process changes

c.​a process step that is repeated until a specific condition changes

In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.​ a.​instance b.​message c.​class d.​property

c.​class

The term _____ generally refers to systems that divide processing between one or more networked clients and a central server.​ Select one: a.​fat client b.​glueware c.​client/server d.​mission-critical

c.​client/server

​The Unified Modeling Language (UML) uses a set of symbols to represent graphically the _____ within a system. Select one or more: a.​feasibility b.​accuracy c.​components d.​relationships

c.​components d.​relationships

​In the rapid application development (RAD) model in the accompanying figure, the _____ phase focuses on program and application development tasks similar to the SDLC. Select one: a.​requirements planning b.​user design c.​construction d.​cutover

c.​construction

​Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____. Select one: a.​two digits for the year, two for the month, and two for the day (YYMMDD) b.​two digits for the day, two for the month, and four for the year (DDMMYYYY) c.​four digits for the year, two for the month, and two for the day (YYYYMMDD) d.​four digits for the year, two for the month, and four for the day (YYYYMMDDDD)

c.​four digits for the year, two for the month, and two for the day (YYYYMMDD)

Project scheduling, an activity of a project manager, _____.​ Select one: a.​requires guiding, supervising, and coordinating a project team's workload b.​includes monitoring the progress of a project, evaluating results, and taking corrective action when necessary to stay on target c.​involves staffing, which includes selecting the project team and assigning specific tasks to team members d.​includes budgeting a project based on the number of modules and their complexity in a project

c.​involves staffing, which includes selecting the project team and assigning specific tasks to team members

​A new system might have to interface with one or more _____, which are older systems that use outdated technology. Select one: a.​enterprise resource planning (ERP) systems b.​mission-critical systems c.​legacy systems d.​intrusion detection systems

c.​legacy systems

​In a data dictionary, _____ is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element. Select one: a.​domain b.​valence c.​length d.​index

c.​length

​The first step in creating a work breakdown structure (WBS) is to _____. Select one: a.​mark all recognizable events b.​determine time requirements c.​list all tasks d.​estimate task completion time and cost

c.​list all tasks

In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated. Select one: a.​pie b.​status flag c.​loop d.​freeform

c.​loop

​A major advantage of object-oriented (O-O) designs is that systems analysts can save time and avoid errors by using _____ objects. Select one: a.​dynamic b.​feasible c.​modular d.​linear

c.​modular

​In a(n) _____ design, one can create individual components that connect to a higher-level program or process. Select one: a.​integral b.​dissociated c.​modular d.​archetypical

c.​modular

As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system at a selected location of the company.​ Select one: a.​phased operation b.​parallel operation c.​pilot operation d.​direct cutover

c.​pilot operation

With a _____, users provide an example of the data requested. Select one: a.​query language b.​data table c.​query by example language d.​data frame

c.​query by example language

​When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select any 20 customers. Select one: a.​systematic sample b.​stratified sample c.​random sample d.​comprehensive sample

c.​random sample

​Objects within a class can be grouped into _____, which are more specific categories within a class. Select one: a.​grids b.​units c.​subclasses d.​matrices

c.​subclasses

In the given figure, a lower-level module is called a _____. Select one: a.​library module b.​data module c.​subordinate module d.​control module

c.​subordinate module

​For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate. Select one: a.​detail report b.​exception report c.​summary report d.​exigency report

c.​summary report

At the center of the network, shown in the accompanying figure, is the _____, which manages the network and acts as a communications conduit for all network traffic.​ Select one: a.​log b.scale c.​switch d.​portal

c.​switch

​Printed output is used in _____, which are output documents that are later entered back into the same or another information system. Select one: a.​milestone documents b.​tender documents c.​turnaround documents d.​policy documents

c.​turnaround documents

A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.​ Select one: a.​blog b.​iOS c.​wiki d.​portal

c.​wiki

​In addition to the Gane and Sarson symbol set, another popular symbol set is _____. a.​Mantissa b.​Jira c.​Zachman d.​Yourdon

d. ​Yourdon

Sam is looking at a second system. This system, he determines, is a batch processing system. Which of the following observations helped him determine the system?​ Select one: a.​Users accessing data randomly b.​The information system at the client site being available whenever necessary, supporting business functions c.​The system at the client side processing transactions completely when and where they occur d.​The IT operations group at the client site running programs at a predetermined schedule, without user involvement

d.​The IT operations group at the client site running programs at a predetermined schedule, without user involvement

John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder. ​There have been some rumblings within the firm that this development project is not necessary so John and others feel it is important to explain the reason for the project at the outset. Whose name goes next to this point on the agenda? Select one: a.​​His ownIncorrect b.​Jennifer c.​Alex d.​Tom

d.​Tom

​A class diagram includes the class _____, which describe the characteristics of objects in the class. Select one: a.​methods b.​keys c.​events d.​attributes

d.​attributes

Compared with character-based formats, a _____ offers a more efficient storage method.​ Select one: a.​foreign storage format b.​unary storage format c.​tertiary storage format d.​binary storage format

d.​binary storage format

In a(n) _____, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen.​ Select one: a.​closed design b.​distributed design c.​open design d.​centralized design

d.​centralized design

​All objects within a(n) _____ share common attributes and methods. Select one: a.​catalog b.​register c.​index d.​class

d.​class

​A _____ is a set of letters or numbers that represents a data item. Select one: a.​business glossary b.​data dictionary c.​mnemonic d.​code

d.​code

​In the given figure, a higher-level module, called a _____, directs lower-level modules. Select one: a.​library module b.​data module c.​subordinate module d.​control module

d.​control module

A _____ is a central storehouse of information about a system's data. Select one: a.​data cube b.​data feed c.​data mart d.​data repository

d.​data repository

​In a report, the findings section is used to _____. Select one: a.​​explain the logical design of a new system in a way that only technical managers can understand b.​​list the costs and benefits of each major system alternative c.​​locate the questionnaires at the end of the document d.​describe the major conclusions reached by a team

d.​describe the major conclusions reached by a team

​A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily. Select one: a.​command-line b.​disked c.​thick d.​diskless

d.​diskless

​Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s. Select one: a.​command line interface b.​binary line interface c.​character user interface d.​graphical user interface

d.​graphical user interface

In object-oriented design, built-in processes called _____ can change an object's properties. Select one: a.​attributes b.​features c.​functions d.​methods

d.​methods

A _____ consists of related program code organized into small units that are easy to understand and maintain. Select one: a.​node b.​stub c.​decision tree d.​module

d.​module

​A popular security solution is the use of a network-based application, often called a _____, which controls access to and from workstation interfaces. Select one: a.​port synchronizer b.​port connector c.​port installer d.​port protector

d.​port protector

A(n) _____ is an event that could affect a project negatively.​ Select one: a.​issue b.​webinar c.​uncertainty d.​risk

d.​risk

​A(n) _____ shows the timing of interactions between objects as they occur. Select one: a.​timing diagram b.​class diagram c.​orientation diagram d.​sequence diagram

d.​sequence diagram

A _____ negotiates with users who might have conflicting requirements or want changes that would require additional time or expense. Select one: a.​project manager b.​project reporter c.​software tester d.​software developer

d.​software developer

The data dictionary usually records and describes a default value, which is the _____. Select one: a.​the set of values permitted for the data element b.​identification of the user(s) responsible for changing values for the data element c.​specification for the origination point for the data element's value d.​value for the data element if a value otherwise is not entered for it

d.​value for the data element if a value otherwise is not entered for it


Ensembles d'études connexes

MGMT 355-01 Quiz Chapters 3 to 8 Quiz

View Set

APWH Chapter 12- The Making of Europe in the Middle Ages

View Set

Chapter 21 Respiratory Care Modalities

View Set

ECONO 2202 CH 14 Key Terms/ Review ETC.

View Set

Chapter 31: Skin Integrity and Wound Care prepU, Fundamental of Nursing Chapter 31 Skin Integrity and Wound Care Prepu

View Set

Physics Practice Questions Heat Transfer and Change of Phase

View Set