Systems Analysis Dr Wilson Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Siobhan has a feature in the dialog box that must allow her users to select one or more choices from a group. Which of the following dialog box components is she most likely to use?

Check box

​Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest Eamon to use?

Cipher code

​_____ use a keyword to encode a number.

Cipher codes

​_____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.

Flowcharts

​A field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

Foreign key

​_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen.

Form filling

One of his firm's clients details an incident in which a hacker - a former employee - thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident?​

Extortion

_____ measures the time between submitting a request for information and the fulfillment of the request.​

Turnaround time

It can include grand totals for numeric fields and other end-of-report information.

Report footer

It identifies the report and contains the report title, date, and other necessary information.

Report header

​Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called _______.

acceptable tests

The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.​

allocated baseline

Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.​

local area network (LAN)

In a structured chart, a curved arrow represents a ______, which indicates that one or more modules are repeated.

loop

A system design where the server performs all the processing is described as _____.​

mainframe architecture

Perfective maintenance usually is cost effective _____ a system's operational life.​

during the middle of

​The inherent efficiency of high-volume processing on larger computers is called _____.

economy of scale

EBCDIC and ASCII both require _____ bits for storage of each character.

eight

​The data mining technique that relies on association rule learning is often called _____.

market basket analysis

​Input _____ is a template or pattern that restricts data entry and prevents errors.

mask

A class diagram includes the class ______, which represent the program logic.

methods

In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data.​

metrics

In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth.

middleware

To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data.

middleware

Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.​

mnemonic

In a(n) _____ design, one can create individual components that connect to a higher-level program or process.

modular

A ______ consists of related program code organized into small units that are easy to understand and maintain.

module

​Companies use various _____ methods to maintain output integrity and security.

output control

​In _____, two programmers work on the same task on the same computer; one drives while the other navigates.

pair programming

​As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period.

parallel operation

A disadvantage of a bus network is that _____.​

performance can decline as more users and devices are added

​As the accompanying figure illustrates, the _____ changeover method allows the new system to be implemented in stages, or modules.

phased operation

As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system as a selected location of the company.

pilot operation

A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.​

platform

A(n) ______ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device.

podcast

​A popular security solution is the use of a network-based application, often called a _____, which controls access to and from workstation interfaces.

port protector

​In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

primary key

Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.

privilege escalation attack

​In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.

process-control

The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system.​

product baseline

The environment for the actual system operation is called the ______.

production environment

Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills.​

programmer/analyst

​The main objective of _____ is to avoid problems or to identify them as soon as possible.

quality assurance

​A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.

query language

​A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value.

range check

​Printed output is used in _____, which are output documents that are later entered back into the same or another information system.

turnaround documents

During _____, programmers must test programs that interact with other programs and files separtely before they are integrated into the system.

unit testing

The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.

unit testing

​A table design that contains a repeating group is called _____.

unnormalized

​In a _____ system, the distinction blurs between input, output, and the interface itself.

user-centered

When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.

users

A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.​

wireless local area network (WLAN)

This is important in implementing systems that are volume-related, such as transaction processing systems.

​802.11g

​This is a standard that increased bandwidth to 54 Mbps.

​802.11g

One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend? ​

​A mesh network

Might include company hardware, software, data, networks, people, or procedures.

​Asset

Hostile act that targets systems or a company itself.

​Attack

​_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.

​Encryption

A coding method used on mainframe computers and high-capacity servers.

​Extended Binary Coded Decimal Interchange Code (EBCDIC)

_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.​

​Fault management

This is another name for the wireless configuration in which a central wireless device is used to serve all wireless clients.

​Infrastructure mode

​_____ requires that a software supplier document all testing and maintain records of test results.

​International Organization for Standardization (ISO)

Records everything that is typed into the keyboard, including passwords, while the system continues to function normally.

​Keystroke logger

A risk control strategy that reduces the impact of a risk by careful planning and preparation.

​Mitigation

Combination of hardware and software that allows computers to interact with a network.

​Network interface

Uses a single key to encrypt and decrypt information.

​Private key encryption

_____ analyzes an organization's assets, threats, and vulnerabilities.

​Risk identification

​This is a process that automatically allows a wireless client to associate with a stronger access point.

​Roaming

​This is a device that connects network segments, determines the most efficient data path, and guides the flow of data.

​Router

_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

​Scalability

​Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.

​Secondary key

Protects the system and keeps it safe, free from danger, and reliable.

​Security

Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product's warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use?

​Significant digit code

One of George's clients reports that the traffic on their network is being intercepted and scanned for valuable information. How does George categorize this incident?

​Sniffing

_____ is the process of tracking system releases.​

​Version control

The _____ was formed in 1999 to certify interoperability of wireless network products based on IEEE 802.11 specifications.​

​Wi-Fi Alliance

​These are broadband wireless communications protocols for metropolitan area networks (MANs).

​Wi-MAX

As shown in the accompanying figure, near the end of a system's useful life, _____ when it becomes clear that a company plans to replace the system.​

​adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases

Adaptive maintenance _____.​

​adds enhancements to an operational system and makes the system easier to use

Compared with character-based formats, a _____ offers a more efficient storage method.​

​binary storage format

In the accompanying figure, any field that serves as a primary key is called a _____.​

​candidate key

The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase - systems implementation.​

​detailed costs

In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.​

​distributed database management system (DDBMS)

A table is in _____ if it does not contain a repeating group.

​first normal form

​In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

​foreign key

​Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____.

​four digits for the year, two for the month, and two for the day (YYYYMMDD)

In a typical system design specification, in the _____ section, start-up processing, initial data entry or acquisition, user training requirements, and software test plans are specified.

​implementation requirements

Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment. ​

​legacy data

The way a network is configured is called the _____.

​network topology

A _____ is an entrance to a multifunction website.​

​portal

The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.​

​security policy

​Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key.

​standard notation format

A _____, such as that illustrated in the accompanying figure, has a central networking device that manages the network.​

​star network

At the center of the network, shown in the accompanying figure, is the _____, which manages the network and acts as a communications conduit for all network traffic.​

​switch

​A _____ is an internal or external entity that could endanger an asset.

​threat

Binary digits have only _____ possible value(s).

​two

If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____.​

​user training package

A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.​

​wiki

To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.​

​​benchmark testing

An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output.​

applications

When a new version of a system is installed, the prior release is _____, or stored.​

archived

​A _____ system allows a customer to request a fax using email, via the company website or by telephone.

faxback

​At the end of the systems implementation phase, the final report to management should include _____.

final versions of all system documentation

​A _____ is the main line of defense between a local network, or intranet, and the Internet.

firewall

The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.

functional baseline

​The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered.

garbage in, garbage out (GIGO)

​Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.

graphical user interface

When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic ecommerce environment.​

greater initial investment but provides more flexibility

​A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

crow's foot notation

​Centralized IT departments no longer produce reams of printed _____ reports.

greenbar

During ______, existing data is loaded into the new system.

data conversion

​Program documentation _______.

describes the inputs, outputs, and processing logic for all program modules

​In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues.

design prototyping

​In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.

design walkthrough

​A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily.

diskless

Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.​

distributed systems

... Quiz Chapter 9

...

Chapter 10 Quiz

.......

Chapter 12 Quiz

.......

Chapter 11 Quiz

..........

In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.​

1.1

​A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.

32

The _____ standard uses multiple input/multiple output (MIMO) technology to boost performance.​

802.11ac

​Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition?

A line with a diamond on one end

Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client?​

A star network

​_____ is the process of constructing the programs and code modules that serves as the building blocks of an information system.

Application development

​_____, a coding method that uses one byte per character, is used on most personal computers.

ASCII (American Standard Code for Information Interchange)

​Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module passes to another. What symbol is used for a data couple?

An arrow with an empty circle

_____ ensures that authorized users have timely and reliable access to necessary information.​

Availability

​_____, a risk control strategy, eliminates risks by adding protective safeguards

Avoidance

_____ describes the amount of data that a system can transfer in a fixed time period.​

Bandwidth

_____ is the amount of data that can be transferred in a fixed time period.

Bandwidth

A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.​

Bluetooth

​Emily tells Anna that a primary key is a field or combination of fields that individually and minimally recognizes a specific entity. She mentions that there may be an option of fields or field combinations to use as the primary key. Which of the following is the term used for a feasible primary key?

Candidate key

The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and systems development into a much larger framework.

Capability Maturity Model Integration (CMMI)

_____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.​

Capacity planning

A technique used by analysts to define relationships in more detail, after drawing an initial entity-relationship diagram.

Cardinality

_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.​

Cardinality

If is the process of turing program logic into specific instructions that a computer system can execute.

Coding

​_____ measures a module's scope and processing characteristics.

Cohesion

​_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.

EBCDIC (Extended Binary Coded Decimal Interchange Code)

_____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving.

Computer output to microfilm (COM)

_____ protects information from unauthorized disclosure and safeguards privacy.​

Confidentiality

_____ is a process for controlling changes in system requirements during software development.​

Configuration management

_____ help offers assistance for a task in progress.

Context-sensitive

​_____ describes the degree of interdependence among modules.

Coupling

Depending on the system this can be done before, during, or after the operational environment is complete.

Data conversation

​Could help a consumer products firm identify potential customers based on their prior purchases.

Data mining

_____ combine data from different item attributes, or characteristics, to build a code.

Derivation codes

______ is the process of reviewing a program code to spot logic errors, which produce incorrect results.

Desk Checking

This explains what is required on a form if variable input data is needed.

Dialog box

_____ involves more risk than other changeover methods.

Direct cutover

Compared to mainframe architecture, these increase concerns about data security and integrity because many individual clients require access to perform processing.

Distributed systems

_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design.​

Enterprise resource planning (ERP)

A person, place, thing, or event for which data is collected and maintained.

Entity

It is a type of report that is useful and wants information only on records that might require action.

Exception

Betty's lead needs to get a report of all of the purchases made only by his employees, using their employee discount, in a given week. In which of the following folders is she likely to find this category of report?

Exception reports

​It is a type of check that is used for mandatory data items.

Existence

The _____ allows the expansion of wireless access over a wide area.​

Extended Service Set (ESS) topology

​This is used to connect any network topology to a larger, dissimilar network

Gateway

Wireless network speed is measured in _____.​

Gbps (gigabits per second)

_____ describes the relationship between computers and the people who use them to perform their jobs.

Human-computer interaction (HCI)

When you reduce this, you avoid unnecessary labor costs, get data into the system more quickly, and decrease the number of errors.

Input volume

​Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together correctly. What is one of the names of this type of testing?

Integration testing

_____ prevents unauthorized users from creating, modifying, or deleting information.​

Integrity

_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.

Java database connectivity (JDBC)

​A set of field values that describes a single person, place, thing, or event.

Logical record

A kind of storage that refers to data that a user can view, regardless of how or where the information actually is organized or stored

Logical storage

_____ describes the way the components in a network interact.​

Logical topology

The _____ describes how data actually moves from an application on one computer to an application on another networked computer.​

OSI (Open Systems Interconnection) model

_____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.​

Maintenance

_____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.​

Maintenance activities

​It is especially important in designing large-scale systems because separate teams of analysts and programmers can work on different areas and then integrate the results.

Modular design

_____ relies on collective data paths to increase bandwidth and range.​

Multiple input/multiple output (MIMO) technology

_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.​

Normalization

​_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

Open database connectivity (ODBC)

A separate test environment is necessary to maintain system security and integrity and protect this kind of environment.

Operational

_____ costs include expenses for items such as supplies, equipment rental, and software leases.​

Operational

_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access.

Output security

This kind of operation is an inappropriate changeover method when two systems perform different functions or if a new system involves a new method of business operations.

Parallel

With this kind of operation, part of the system is given to all users.

Phased

​_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.

Physical storage

_____ describes the actual network cabling and connections.​

Physical topology

​It produces an early, rapidly constructed working version of a proposed information system.

Prototype

This is not language-specific and can be used to describe a software module in plain English without requiring strict syntax rules.

Pseudocode

​An asymmetric kind of encryption.

Public key encryption

In agile application development, this specifies when user stories will be implemented.

Release plan

A set of rules that avoids data inconsistency and quality problems

Referential integrity

​_____ is the overall time between a request for system activity and the delivery of the response.

Response time

_____ measures risk likelihood and impact.

Risk assessment

​_____ develops safeguards that reduce risks and their impact.

Risk control

​_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Scalability

​When developing a training program, which of the following guidelines should be kept in mind?

Select the most effective place to conduct the training.

_____ are numbers or letters assigned in a specific order.

Sequence codes

​Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident?

Social engineering

To achieve better, faster, and less expensive methods of software development, _____ designed the Capability Maturity Model (CMM), which improves quality, reduces development time, and cut costs.

Software Engineering Institute (SEI)

Uses analytical techniques to identify potential quality and performance improvements in an information system.

Software reengineering

They are generally paper-based but can be provided online.

Source document

Which of the following is specified by the detailed procedures in a test plan?

The test data to be used

​Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process?

Stub testing

Defines only those portions of the database that a particular system or user needs or is allowed to access.

Subschema

​Betty's manager wants to just see the total figures of the sales without much of the supporting details. In which of the following folders is she likely to find this category of report?

Summary reports

​It is a starting point with well-placed command buttons that allow users to navigate the systems.

Switchboard

_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.​

System architecture

_____ is the process of putting a new information system online and retiring the old system.

System changeovers

​_____ produces a full-featured, working model of the information system.

System prototyping

​Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat?

Technical obsolescence

​Which of the following configurations has a central wireless device that is used to serve all wireless clients?

The Basic Service Set (BSS)

Sam is looking at a second system. This system, he determines, is a batch processing system. Which of the following observations helped him determine the system?​

The IT operations group at the client site running programs at a predetermined schedule, without user involvement

Sam is analyzing a processing system and he has determined that it is an online processing system and not a batch processing system. Which of the following observations helped him determine the system?​

The system processing transactions completely when and where they occur

_____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.​

Throughput

​If Siobhan has a dialog box option that is either on or off, which of the following is she most likely to use?

Toggle button

This approach is also called modular design, and it is similar to constructing a leveled set of data flow diagrams (DFDs).

Top-down

This should be considered early in the systems development process.

Training plan

​A risk control strategy that shifts risks to another asset or party.

Transference

A widely used method of visualizing and documenting software systems design

Unified Modeling Language (UML)

​At the beginning of the twenty-first century, many firms that used only two digits to represent the year were faced with a major problem called the _____.

Y2K issue

In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.​

access point

As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance.​

adaptive

In maintenance management, _____ means examining the whole in order to learn about the individual elements.​

analysis

A class diagram includes the class ______, which describe the characteristics of objects in the class.

attributes

​A secure system includes _____ that can log every instance of data entry and changes.

audit trails

​In a source document, the _____ contains any required signatures.

authorization zone

A _____ is a formal reference point that measures system characteristics at a specific time.​

baseline

In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.

body zone

​System developers use _____ to document and trail program defects, code changes, and replacement code.

bug tracking software

In a _____, a single communication path connects the network server, departmental servers, workstations, and peripheral devices.

bus network

In a(n) _____, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen.​

centralized design

​Although the vast majority of reports are designed graphically, some systems still produce one or more _____ reports that use a character set with fixed spacing.

character-based reports

​In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group.

check box

The term _____ generally refers to systems that divide processing between one or more networked clients and a central serve.

client/server

​A _____ is a set of letters or numbers that represents a data item.

code

​A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together.

combination check

​In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help.

command button

In a primary key combines two or more fields, then it is called a ________.

composite key

In a structure chart a(n) ______ line, with a diamond on one end, indicateds that a control module determines which subordinate modules will be invoked.

condition

​User documentation _____.

consists of instructions and information to users who will interact with the system

​Operations documentation ______.

contains all the information needed for processing and distributing online and printed output

A _____ usually causes specific actions, such as printing subtotals for a group of records in a report.

control break

To produce a control break report, the records must be arranged, or sorted, in _____.

control field order

​In the given figure, a higher-level module, called a _____, directs lower-level modules.

control module

​In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms.

control zone

A(n) _____ provides access for customers, employees, suppliers, and the public.

corporate portal

As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____.​

corrective maintenance

​A _____ controls database operations, including storing, retrieving, updating, and deleting data.

data manipulation language

In addition to centralized data processing, the earliest systems performed all data input and output at a central location, often called a _____.​

data processing center

​A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.

data structure

​A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.

data validation

A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.

data warehouse

​Typically, a database management system is managed by a person called _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.

database administrator

​A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.

database management system

A(n) _____ produces one or more lines of output for each record processed.

detail report

Corrective maintenance _____.​

diagnoses and corrects errors in an operational system

​If variable input data is needed, a _____ must be provided to explain what is needed.

dialog box

​As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational.​

direct cutover

​A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

entity-relationship diagram (ERD)

​A(n) _____ displays only those records that meet a specific condition or conditions.

exception report

A(n) _____ is a data validation rule that is used for applying to mandatory data items

existence check

A(n) _____ is an attack that takes advantage of a vulnerability.

exploit

A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.​

help desk

In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices.​

hierarchical network

​Testing two or more programs that depend on each other is called ______.

integration testing

Perfective maintenance _____.​

involves changing an operational system to make it more efficient, reliable, or maintainable

​During the systems design phase, _____ are used to organize, access, and maintain data structures.

key fields

​A new system might have to interface with one or more _____, which are older systems that use outdated technology.

legacy systems

​The given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a structure chart.

library

​A _____ language feature allows users to type commands or requests in normal text phrases.

natural

Any field that is not a primary key or a candidate key is called a _____.​

nonkey field

​A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong.

reasonableness check

​In the event of a file catastrophe, _____ can be used to restore the file or database to its current state at the time of the last backup.

recovery procedures

In an entity-relationship diagram, entities are commonly represented as _____.

rectangles

​In an entity-relationship diagram, entities are commonly represented as _____.

rectangles

One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.

referential integrity

In sequence, the four steps typically followed to create a structure chart are _____.

reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart and the data dictionary

A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting.​

remote control software

The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.​

report footer

​The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information.

report header

To avoid problems, preventive maintenance _____.​

requires analysis of areas where trouble is likely to occur

A _____ resembles a group of computers in which data flows in only one direction from one device to the next.

ring network

​In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.

risk

Cloud computing provides _____, which matches resources to needs at any given time.​

scaling on demand

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.

schema

A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.

second normal form

A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.​

secondary key

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.​

security

After completing integration testing, a system analyst must perform _____, which involves the entire information system and includes all typical processing situations. system testing

system testing

​The goal of _____ is to build a system that is effective, reliable, and maintainable.

systems design

A _____ specifies the fields and identifies the primary key in a particular file.5

table design

When training is complete, many organizations conduct a full-scale test, or _____, which is a dress rehearsal for users and IT support staff.

simulation

In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

system environment

​A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction.

source document

When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.​

stand-alone mode

In a structure chart, a control couple shows a message, also called a(n) ______, which one module sends to another.

status flag

Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design.

storyboard

​A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information.​

structure chart

​Many organizations require a more formal type of desk checking called ______.

structured walkthrough

​In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.

stub testing

In the given figure, a lower-level module is called a _____.

subordinate module

​For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate.

summary report

Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____.​

supply chain management (SCM)

​In maintenance management, _____ involves studying the parts of a system to understand the overall system.

synthesis

A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.​

system administrator

In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications.​

system components

A _____ locates all or most of the processing logic on the server.​

thin client

​In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature that is used to represent on or off status and switches to the other status when clicked.

toggle button

​Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.

toolbar

Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.

top-down approach

​Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others.

train-the-trainer

​A(n) _____ does not distract a user and calls no attention to itself.

transparent interface

​A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness.

usability

​Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system.

usability metrics

​A(n) _____ is a data validation rule that can be used for data items that must have certain values.

validity check

​A _____ is a security weakness or soft spot.

vulnerability

A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy.

web-centric architecture

​To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet.

webcast


Ensembles d'études connexes

BUSMGT 3130: Chapter 12 Six Sigma Quality

View Set

Management 491: Quiz Chapters 1, 2 3, 4, and 5

View Set

Nurse 2 Test 9 Diabetes PrepU Study Guide

View Set

Certification Exam QBO - Version A

View Set

Managing IT Projects Chapter 5, IT PROJECT MANAGEMENT 7e, IT Project Management Chapter 6, ch.7 It project management schwalbe, IT Project Management Chapter 8, Project Management Chapter 6, IT Project Management Chapter 7, Project Management Exam 2,...

View Set