Test 3 Review from Ch. 7-12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Data Design Concepts

*Data Structures* = a framework for organizing, storing, and managing data - consists of files or tables that interact in various ways - each file or table contains data about people, places, things, or events - modern relational database became a standard model for systems developers *Mario and Danica: A Data Design Example* = imagine two shops that are very similar, but use two different information system designs *Mario's Auto Shop* = uses two file-oriented systems (old-fashioned) - *file oriented systems* = these two systems store data in separate files that are not connected or linked, means that some data is stored in two different places, and the data might or might not be consistent AKA REDUNDANCY - the mechanic system uses the mechanic file to store data about shop employees - job system uses the job file to store data about work performed at the shop Danica's Auto Shop* = uses a database management system (modern) - *database management system (DBMS) = with two separate tables that are joined, so they act like one large table - the shop operation system has tables that are linked by the mechanic no. field, which is called a *common field* because it connects the tables (besides this common field, no other data items are duplicated) - *relational database/relational model* = introduced in 1970s and continues to be the dominant approach for organizing, storing, and managing business data - however, DBMSs are not immune to data entry problems *Is File Processing Still Important?* - an older approach where some companies still use this method to handle large volumes of structured data on a regular basis - worked well with mainframe hardware and batch input *The Database Environment* - provides an overall framework that avoids data redundancy and supports a real-time, dynamic environment - *DBMS* = a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data - main advantage of a DBMS is that it offers timely, interactive, and flexible data access - other advantages: A) *Scalability* = which means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise B) *Economy of Scale* = the inherent efficiency of high-volume processing on larger computers - database design allows better utilization of hardware C) *Enterprise-wide application* = a database administrator (DBA) assesses overall requirements and maintains the database for the entire organization rather than a single department or user - database systems can support enterprise-wide applications more effectively than file processing systems D) *Strong Standards* = effective database administration helps ensure that standards for data names, formats, and documentation are followed uniformly throughout the organization E) *Better Security* = The DBA ensures that only legitimate users access the database and different users have different levels of access F) *Data Independence* = Systems that interact with a DBMS are relatively independent of how the physical data is maintained, giving DBA the flexibility to alter data structures without modifying information systems that use the data

Entity-Relationship Diagrams

*Entity-Relationship Diagram (ERD) = is a model that shows the logical relationships and interaction among system entities - provides an overall view of the system and a blueprint for creating the physical data structures *Drawing and ERD* - the first step is to list the entities that you identified during the systems analysis phase and to consider the nature of the relationships that link them - represent entities as rectangles and relationships as diamond shapes - unlike data flow diagrams, entity-relationship diagrams depict relationships, not data or information flows *Three Types of Relationships Can Exist Between Entities* 1) *One-to-one (1 : 1)* = exists when exactly one of the second entity occurs for each instance of the first entity - i.e. one office holds one office manager, one person holds one social security numbers - A number 1 is placed alongside each of the two connecting lines to indicate the 1:1 relationship 2) *One-to-many (1 : M)* = exists when one occurrence of the first entity can relate to many instances of the second entity, but each instance of the second entity can associate with only one instance of the first entity - i.e. one customer has many orders, or one department has many employees, or one train holds many passengers 3) *Many-to-many (M : N)* = exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity - i.e. many students in many classes are linked through registration, many passengers on many flights are linked through reservations - these linkages are known as an *associative entity* *Cardinality* = describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity - A common method of cardinality notation is called *crow's foot notation* because of the shapes, which include circles, bars, and symbols, that indicate various possibilities A) *Single Bar* = indicates one B) *Double Bar* = indicates one and only one C) *Circle* = indicates zero D) *Crow's Foot* = indicates many - *Unified Modeling Language (UML)* = is a widely used method of visualizing and documenting software systems design

*Data Normalization*

*Normalization* = the process of creating table designs by assigning specific fields or attributes to each table in the database - use this to develop an overall database design that is simple, flexible, and free of data redundancy - involves applying a set of rules that can help you identify and correct inherent problems and complexities in your table designs - *table design* = specifies the fields and identifies the primary key in a particular table or file - created by Edgar Codd who formulated the basic principles of relational database design *Four Stages of Normalization Process* 1) *Unnormalized Design* 2) *First Normal Form* 3) *Second Normal Form* 4) *Third Normal Form* = best design *Standard Notation Format* - starts with the name of the table, followed by a parenthetical expression that contains the field names separated by commas. The primary key field(s) is underlined, like this: • NAME (FIELD 1, FIELD 2, FIELD 3) - *repeating group* = a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values - *Unnormalized* = a table design that contains a repeating group *First Normal Form (1NF)* = A table is in first normal form (1NF) if it does not contain a repeating group - When you eliminate the repeating group, additional records emerge — one for each combination of a specific order and a specific product - The result is more records, but a greatly simplified design *Second Normal Form (2NF)* = if it is in 1NF AND if all fields that are not part of the primary key are functionally dependent on the entire primary key - *functionally dependence* = the value of Field A depends on Field B (i.e. the DATE value is functionally dependent on the ORDER because for a specific order number, there can be only one date; in contrast, a product description is NOT dependent on the order number) - Objective is to break the original table into two or more new tables and reassign the fields so that each non-key field will depend on the entire primary key in its table - all fields are functionally dependent on the primary key (ORDER LINE is a primary key, and is a unique combination of two foreign keys - ORDER and PRODUCT) *Third Normal Forms (3NF)* = if it is in 2NF and if no non-key field is dependent on another non-key field - A design is in 3NF if every non-key field depends on the key, the whole key, and nothing but the key - A 3NF design avoids redundancy and data integrity problems that still can exist in 2NF designs - To convert the table to 3NF, you must remove all fields from the 2NF table that depend on another non-key field and place them in a new table that uses the non-key field as a primary key

*Should You Use Codes?*

*Overview of Codes* - Because codes can represent data and they are shorter than the data they represent, they save storage space and costs, reduce data transmission time, and decrease data entry time - Codes can be used to reveal or conceal information - Codes can reduce data input errors - Coded data is easier to remember - The code itself can provide immediate verification that the entry is correct - i.e. student number, postal code *Types of Codes* = Codes should be easy to learn and apply 1) *Sequence Codes* = Numbers or letters assigned in a specific order - Contain no additional information other than an indication of order of entry into the system - i.e. codes are assigned in which employees are hired, you can use the code to see that employee number 584 was hired after employee number 433 but not the actual dates 2) *Block Sequence Codes* = Use blocks of numbers for different classifications - 100-level courses are freshman-level - 200-level courses are sophomore-level 3) *Alphabetic Codes* = Use alphabet letters to distinguish one item from another a) *category codes* = identify a group of related items - i.e. GN for gardening supplies or HW for hardware b) *abbreviation codes* = are alphabetic abbreviations - i.e. NY for New York or ME for Maine - *mnemonic codes* = specific combination of letters that are easy to remember 4) *Significant Digit Codes* = Distinguish items by using a series of subgroups of digits - i.e. postal codes or inventory location codes that consist of two-digit warehouse code, followed by a one-digit floor number code, etc. 5) *Derivation Codes* = Combine data from different item attributes, or characteristics - i.e. subscription codes may have five-digit postal code, followed by the first, third, and fourth letters of the subscriber's last name, the last two digits of the subscriber's house number, and the first, third, and fourth letters of the subscriber's street name 6) *Cipher Codes* = Use a keyword to encode a number - i.e. a retail store might use a 10 letter word such as CAMPGROUND to code wholesale prices, where the letter C represents 1, A represents 2 and so on (thus the code GRAND, indicates that the store paid $562.90 for the item) 7) *Action Codes* = Indicate what action is to be taken with an associated item (X to exit the program) *Designing Codes* ◦ Keep codes concise ◦ Allow for expansion ◦ Keep codes stable ◦ Make codes unique ◦ Use sortable codes ◦ Use a simple structure ◦ Avoid confusion ◦ Make codes meaningful ◦ Use a code for a single purpose ◦ Keep codes consistent

Web-Based Data Design

*Overview* - Web-based Design = where the Internet serves as the front end, or interface, for the database management system - Access to the database requires only a Web browser and an Internet connection - Web-based systems are popular because they offer ease of access, cost-effectiveness, and world-wide connectivity - all of which are vital to companies that must compete in a global economy *Connecting to the Web* = to access data in a Web-based system, the database must be connected to the Internet or Intranet - the database (SQL) and the Internet speak two different languages (HTML) - *Web-based Design Characteristics*: A) *Global Access* (the Internet enables worldwide access) B) *Ease of Use* (Web browsers provide a familiar interface that is user-friendly and easily learned) C) *Multiple Platforms* (all that is required is a browser and an Internet connection) D) *Cost Effectiveness* (initial investment is relatively low because the Internet serves as the communication network, where users require only a browser) E) *Security Issues* (Internet connectivity raises special concerns) F) *Adaptability Issues* (migrating a traditional database design to the Web, can require design modification, additional software, and some added expense) - *middleware* = is software that integrates different applications and allows them to exchange data (can interpret client requests in HTML form and translate the requests into commands that the database can execute) - *data security* = Web-based data must be secure, yet easily accessible to authorized users (three levels of security: the database itself, the Web server, and the telecommunication links that connect the components of the system)

*Data Storage and Access*

*Tools and Techniques* - Companies use data warehousing and data mining as strategic tools to help manage the huge quantities of data they need for business operations and decisions A) *Data warehousing* = An integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company - stores data from several systems - by selecting data dimensions, a user can retrieve specific information without having to know how or where the data is stored B) *Data mining* = Looks for meaningful data patterns and relationships in large amounts of data - *clickstream storage* (another name) - *market basket analysis* (another name) *Logical vs. Physical Storage* *Logical storage* = refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored - consists of alphabetic and numeric characters - a field is called a *data element* or a *data item* = describes a single characteristics/attribute of a person, place, thing, or event - *logical record* = a set of field values that describe a single person, place, thing or even *Physical storage* = is strictly hardware-related because it involves the process of reading and writing binary data to physical media such as a hard drive, CD-ROM, or network-based storage device *Data Coding* *EBCDIC (Extended Binary Coded Decimal Interchange Code)* = A coding method used on mainframe computers and high-capacity servers - requires 8 bits or 1 byte per character *ASCII (American Standard Code for Information Exchange)* = A coding method used on most personal computers - requires 8 bits or 1 byte per character *BINARY* = offers a more efficient storage method because it represents numbers as actual binary values, rather than as coded numeric digits *UNICODE* = Supports virtually all languages and has become a global standard - uses two bytes per character *STORING DATES* - *International Organization for Standardization (ISO)* = requires a format of four digits for the year, two for the month, and two for the day (YYYYMMDD) - *Y2K Issue* = many firms that used only two digits to represent the year were faced with a major problem called the Y2K issue - *absolute date* = the total number of days from some specific base date

DBMS Components

- A DBMS provides an interface between a database and users who need to access the data - A systems analyst need to understand all of the components of a DBMS - A DBMS has a data manipulation language, a schema and subschemas, and a physical data repository *Interfaces for Users, Database Administrators, and Related Systems* A) *Users* = typically work with predefined queries and switchboard commands, but also use query languages to access stored data - *Query Language* = allows a user to specify a task without specifying how the task will be accomplished (some are natural language commands) - *Query By Example (QBE) Language* = the user provides an example of the data requested - *Structured Query Language (SQL)* = a language that allows client workstations to communicate with servers and mainframe computers B) *Database Administrators* = Concerned with data security and integrity, preventing unauthorized access, providing backup and recovery, audit trails, maintaining the database, and supporting user needs - most DBMSs provide utility programs to assist the DBA in creating and updating data structure, collecting and reporting patterns of database usage, and detecting and reporting database irregularities C) *Related Information Systems* = A DBMS can support several related information systems that provide input to, and require specific data from, the DBMS - unlike a user interface, no human intervention is required for two-way communication between the DBMS and the related systems *Data Manipulation Language (DML)* = controls database operations, including storing, retrieving, updating, and deleting data *Schema* = the complete definition of a database, including descriptions of all fields, tables, and relationships, is called a schema - *Subschema* = is a view of the database used by one or more systems or users; defines only those portions of the database that a particular system or user needs or is allowed to access (i.e. database designers use subschemas to restrict the level of access permitted to the project management systems) *Physical Data Repository* - at this stage of the systems development process, the data dictionary is transformed into a physical data repository; which also contains the schema and subschemas - *Open Database Connectivity (ODBC)* = is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data (used to resolve potential database connectivity and access problems) - *Java Database Connectivity (JDBC)* = enable Java applications to exchange data with any database that uses SQL statements and is JDBC-compliant

*Working with a Relational Database*

- Suppose you work in IT, and the sales team needs answers to three specific questions 1) Did any customers receive service after 12/14/2013? If so, who were they? 2) Did technician Marie Johnson put in more than six hours of labor on any service calls? If so, which ones? 3) Were any parts used on service calls in Washington? If so, what were the part numbers, descriptions, and quantities? Steps for First Question 1) Go to Service-Call table and look in the DATE field for dates later than 12/14/2013 2) Three Service Calls meet that condition (10799, 10800, and 10801) 3) Two calls were made to customer 1456 and one call was made to customer 6321 4) Obtain customers name by going to the CUSTOMER table and look up the customer numbers, and identify the two customers as Albert Jones and Mary Belli

69. _____ is concerned with managerial policies and controls that ensure secure operations. a. Procedural security b. Network security c. Operational security d. Application security

-Procedural security -Operational security

70. User documentation includes _____. a. security and audit trail information b. program, systems analyst, programmer, and system identification c. frequently asked questions (FAQs) d. description of source document content, preparation, processing, and samples

-Security and audit trail information -Frequently asked questions (FAQs) -Description of source document content, preparation, processing, and samples

69. If a module must perform multiple tasks, _____. a. the module will be less difficult to create and maintain b. the module will be more difficult to create and maintain c. a less complex coding is required d. a more complex coding is required

-The module will be more difficult to create and maintain && -A more complex coding is required

The characteristics of online processing systems are that _____. ​

-the systems process transactions completely when and where they occur - users can access data randomly -users interact directly with the information system

B) stub

. In a technique called ____ testing, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. A) modular B) stub C) outcome D) unit

This is an example of a web-based development environment.

.NET

*Data Design Terms*

1) *Entity* = An entity is a person, place, thing, or event for which data is collected and maintained 2) *Table or File* = A table, or file, contains a set of related records that store data about a specific entity - two-dimensional structures that consist of vertical columns and horizontal rows - each column represents a field (characteristic of entity) - each row represents a record (individual occurrence of the entity) 3) *Field* = • A field, also called an *attribute*, is a single characteristic or fact about an entity - *common field* = an attribute that appears in more than one entity 4) *Record* = A record, also called a *tuple* (rhymes with couple), is a set of related fields (characteristics) that describes one instance, or occurrence, of an entity, such as one customer, one order, or one product *Key Fields* = use these to organize, access, and maintain data structures 1) *Primary Key* = a field or combination of fields that uniquely and minimally identifies a particular member of an entity - *combination key* = to identify a specific student in a specific course, the primary key must be a combination of student number and course ID 2) *Candidate Keys* = Any field that could serve as a primary key is called a candidate key - *Non-Key field* = any field that is not a primary key or a candidate key 3) *Foreign Keys* = A common field that exists in more than one table and can be used to form a relationship, or link, between the tables 4) *Secondary Keys* = A field or combination of fields that can be used to access or retrieve records - these keys are not unique - used to sort or display records in a certain order *Referential Integrity* = a type of validity check which is a set of rules that avoids data inconsistency and quality problems - prevent you from entering a customer order in an order table unless that customer already exists in the customer table - *orphan* = what an order is called when it has no related customer (when there is no referential integrity to prevent this from happening) - can also prevent the deletion of a record if the record has a primary key that matches foreign keys in another table

34. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____. a. 2.1 b. 1.1 c. 0.1 d. 2.1

1.1

In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.

1.1

A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.

32

This is a standard that increased bandwidth to 54 Mbps

802.11g

A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity. a. ​user application b. ​user interface c. ​user query d. ​user configuration

A

A firm that offers outsourcing solutions is called a _____.​ a. ​service provider b. resource provider c. ​software provider d. ​subscription provider

A

A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.​ a. ​usage model b. ​method model c. ​administrative model d. ​interpolated model

A

Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.​ a. ​web-based b. ​cloud c. ​multinational d. ​GUI

A

If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor.​ a. ​supplemental maintenance agreement b. ​software license c. ​request for proposal d. ​fixed fee model

A

The _____ contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management.​ a. ​software requirements specification b. ​request for quoting document c. ​software license d. ​maintenance agreement

A

The _____ must include users, who will participate in the selection process and feel a sense of ownership in the new system.​ a. ​evaluation and selection team b. ​quality audit team c. ​development and testing team d. ​maintenance team

A

_____ is an example of a nonprofit organization that publishes standards and reports for its members and the general public.​ a. ​The Transaction Processing Performance Council (TPC) b. ​The National Institute of Standards and Technology (NIST) c. ​Oracle d. ​Microsoft

A

b. False

A LAN spans long distances and can connect WANS that are continents apart. a. True b. False

b. False

A RAID design improves performance, capacity, and reliability, and involves the use of one large drive that appears to a computer as multiple logical drives. a. True b. False

D) module

A ____ consists of related program code organized into small units that are easy to understand and maintain. A) mode B) stub C) decision tree D) module

natural

A _____ language feature allows users to type commands or requests in normal text phrases.

diskless

A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily.

Basic Service Set

A central wireless device is used to serve all wireless clients

D) attributes

A class diagram includes the class ____, which describe the characteristics of objects in the class. A) methods B) keys C) events D) attributes

False

A data type check is a data validation rule that is used when data must be in predetermined sequence.

d. test plan

A disaster recovery plan should be accompanied by a(n) ________ , which simulates various levels of emergencies and records the responses, which can be analyzed and improved as necessary. a. security token b. capacity plan c. adaptive plan d. test plan

thick

A fat client design, which is also known as a(n) _____ client design, is simpler and less expensive to develop than a thin client.

65. Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition? a. An arrow with a filled circle b. An arrow with an empty circle c. A line with a diamond on one end d. A line with a diamond on both ends

A line with a diamond on one end

b. platform

A main advantage of enterprise resource planning is that it describes a specific hardware and software environment, also called a(n) ________ , that ensures connectivity and easy integration of future systems. a. portal b. platform c. application d. access point

C) cohesion

A module that performs a single function or task has a high degree of ____, which is desirable. A) piloting B) indexing C) cohesion D) resolution

False

A request for quotation (RFQ) is less specific than a request for proposal (RFP).​

b. False

A service desk can boost its productivity by using network interface software, which allows IT staff to take over a user's workstation and provide support and troubleshooting. a. True b. False

platform

A specific hardware and software environment described by ERP

b. False

A system administrator is responsible for configuration management, which includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action. a. True b. False

scalability

A system's ability to expand, change, or downsize easily

b. False

A tunnel, which is identified by a number, is used to route incoming traffic to the correct application on a computer. a. True b. False

b. False

A two-tier design has a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server. a. True b. False

*Data Control*

A well-designed DBMS must provide builtin control and security features, including subschemas, passwords, encryption, audit trail files, and backup and recovery procedures to maintain data - *User ID and Password* - *Permissions* = privileges can be associated with different users - *Encryption* = process of converting readable data into unreadable characters to prevent unauthorized access to the data - *Backup* - *Recovery Procedures* = used to restore the file or database its current state at the time of the last backup - *Audit Fields* = special fields within data records to provide additional control or security information

​application service provider

A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.​

evaluation model

A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings.

star

A(n) _____ network, which has a hub-and-spoke design, does not suffer from the same degradation issues as a bus design when users and devices are added to the network.

online

A(n) _____ system, which allows a constant dialog between users and the system, handles transactions when and where they occur and provides output directly to users.

firewall

A(n) _____, which is the main line of defense between a local network and the Internet, can be configured to detect and respond to denial-of-service attacks, port scans, and other suspicious activity.

b. hub

A(n) ________ is a device that broadcasts network traffic, called data frames, to all other connected devices. a. client b. hub c. switch d. server

d. proxy

A(n) ________ server is a network device that provides Internet connectivity for internal LAN users. a. distributed b. application c. portal d. proxy

b. automatic update

A(n) ________ service, which may be offered by a software vendor, enables an application to contact the vendor's server and check for a needed patch or update. a. enhancement b. automatic update c. hot site d. business continuity

____ describes the relationship between computers and the people who use them to perform business-related tasks. A) HCI B) PCI C) UI D) PI

A) HCI (Human-Computer Interaction)

In most organizations, the ____ department is responsible for output control and security measures. A) IT B) police C) finance D) security

A) IT

Because every piece of information should be traceable back to the input data that produced it, a(n) ____ trail must be provided that records the source of each data item and when it entered the system. A) audit B) index C) source D) control

A) audit

Some firms use ____ facsimile to allow a customer to request a fax using e-mail, via the company Web site, or by telephone. A) automated B) batched C) turnaround D) digital

A) automated

In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature used to initiate an action such as printing a form or requesting help. A) command button B) option button C) toggle button D) radio button

A) command button

A ____ usually causes specific actions, such as printing subtotals for a group of records in a report. A) control break B) stratification C) subgroup D) concatenation character

A) control break

On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms. A) control zone B) heading zone C) totals zone D) authorization zone

A) control zone

If variable input data is needed, provide a(n) ____ that explains what is needed. A) dialog box B) list box C) menu bar D) toggle button

A) dialog box

Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design. A) storyboard B) turnaround document C) faxback D) output control

A) storyboard

A range check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items

A) tests data items to verify that they fall between a specified minimum and maximum value

Design prototyping is also known as ____ prototyping. A) throwaway B) command C) system D) layout

A) throwaway

____ means that in risk control, nothing is done.

Acceptance

44. Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called _____. a. integrated tests b. modular tests c. unit tests d. acceptance tests

Acceptance test

Which of the following is an example of a horizontal application?

Accounting packages

adaptive maintenance

Adds enhancements to an operational system and makes the system easier to use

remote control software

Allows IT staff to take over a workstation and provide support

stand-alone

Although the use of PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, _____ computing was inefficient and expensive.

64. Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module passes to another. What symbol is used for a data couple? a. An arrow with a filled circle b. An arrow with an empty circle c. A line with a diamond on one end d. A line with a diamond on both ends

An arrow with an empty circle

Roger is part of a team that is responsible for employing a new information system, the design of which was developed using customary structured methods. To manage the intricacy of the application development process, Roger wants to deploy structured development techniques, and he asks Pete, his coworker, for information about these techniques. Pete tells him about structure charts, which show program modules and the relationships among them using various graphical symbols. ​ ​Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module passes to another. What symbol is used for a data couple?

An arrow with an empty circle

____ means examining the whole in order to learn about the individual elements.

Analysis

19. _____ is the process of constructing the programs and code modules that serves as the building blocks of an information system. a. Application structuring b. Application analysis c. Application development d. Application virtualization

Application development

service

Application that monitors, or listens on, a particular port

36. When a new version of a system is installed, the prior release is _____, or stored. a. archived b. deleted c. discontinued d. reinstalled

Archived

sniffing

Attack in which network traffic is intercepted/scanned for valuable information

exploit

Attack that takes advantage of a vulnerability

34. A class diagram includes the class _____, which describe the characteristics of objects in the class. a. methods b. keys c. events d. attributes

Attributes

roaming

Automatically allows the client to associate with the stronger access point

51. _____ ensures that authorized users have timely and reliable access to necessary information. a. Availability b. Integrity c. Confidentiality d. Concealability

Availability

____ ensures that authorized users have timely and reliable access to necessary information.

Availability

A _____ describes the actual processes of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reports, and so on.​ a. ​qualitative design b. ​physical design c. ​logical design d. ​quantitative design

B

A _____ measures the time a package takes to process a certain number of transactions.​ a. ​parameter b. ​benchmark c. ​middleware d. ​newsgroup

B

A software package that can be used by many different types of organizations is called a(n) _____.​ a. ​symmetric application b. ​horizontal application c. ​vertical application d. ​asymmetric application

B

In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support.​ a. ​planning center b. ​service desk c. ​evaluation team d. ​planning center

B

Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas.​ a. ​service desks b. ​newsgroups c. ​report generators d. ​benchmarks

B

The main reason for offshore outsourcing is to _____.​ a. ​manage operations only in one country b. ​lower bottom-line costs c. ​manage operations only in one country d. ​ship bulky raw materials

B

The software that a company's IT department makes, builds, and develops is called _____.​ a. ​indexed software b. ​in-house software c. ​external software d. ​internal software

B

Tom started the process of selecting a new system for the firm and he is weighing all of the various issues that need to be considered and the resources he has at his disposal as he makes this important decision. As Tom prepares to remove the field in his selection of a new system, he wants a quick refresher on the difference between a request for proposal (RFP) and a request for quotation (RFQ). If he needs a request for proposal (RFP), Simone will write it, and if he needs an RFQ, Marny is responsible for writing that. Which of the following is true?​ a. ​When Marny is tasked with the job, her output can involve outright purchase or a variety of leasing options. b. ​When Simone is tasked with the job, Tom already knows the specific product or service he wants and he needs to obtain price quotations or bids. c. ​RFPs and RFQs have very different objectives. d. ​An RFP that Simone writes is more specific than an RFQ Marny will write.

B

When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.​ a. product b. ​service c. ​process d. ​outsource

B

When determining outsourcing fees, a _____ uses a set fee based on a specified level of service and user support. a. ​subscription model b. ​fixed fee model c. ​transaction model d. ​usage model

B

_____ determines how long it takes an information system to spend for itself through reduced costs and increased benefits.​ a. ​Net present value (NPV) b. ​Payback analysis c. ​Return on investment (ROI) d. ​Acquisition process

B

_____ is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase.​ a. ​Request for quoting document b. ​Software requirements specification c. ​Maintenance agreement d. ​Software license

B

_____ reduces the customer's need for software maintenance, operation, and support.​ a. ​Hardware as a Help b. ​Software as a Service c. ​Storage as a Solution d. ​Processing as a Product

B

____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving. A) POD B) COM C) FBC D) ASCII

B) COM (Computer Output to Microfilm)

____ prototyping produces a full-featured, working model of the information system. A) Design B) System C) Application D) IS

B) System

Although the vast majority of reports are designed graphically, some systems still produce one or more ____ reports that use a character set with fixed spacing. A) monospaced B) character-based C) diagrammed D) preset

B) character-based

A(n) ____ displays only those records that meet a specific condition or conditions. A) detail report B) exception report C) summary report D) exigency report

B) exception report

The concept that the quality of the output is only as good as the quality of the input, which sometimes is known as ____, is familiar to IT professionals, who recognize that the best time to avoid problems is when data is entered. A) bad input, bad output (BIBO) B) garbage in, garbage out (GIGO) C) poor start, poor finish (PSPF) D) weak hand, weak hold (WHWH)

B) garbage in, garbage out (GIGO)

Centralized IT departments no longer produce reams of printed ____ reports. A) batch B) greenbar C) audit D) hash

B) greenbar

A reasonableness check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items

B) identifies values that are questionable, but not necessarily wrong

Input ____ are templates that make it easier for users to enter data. A) patterns B) masks C) legends D) keys

B) masks

A ____ language feature allows users to type commands or requests in normal text phrases. A) normal B) natural C) standard D) basal

B) natural

In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system. A) physical B) process C) input D) command

B) process

Some forms use a ____ that contains icons or buttons that represent shortcuts for executing common commands. A) menu bar B) toolbar C) dialog box D) toggle bar

B) toolbar

differential backup

Backs up only the files that are new or changed since the last full backup

45. _____ describes the amount of data that a system can transfer in a fixed time period. a. Latency b. Resolution c. Dimensionality d. Bandwidth

Bandwidth

____ describes the amount of data that a system can transfer in a fixed time period.

Bandwidth

_____ is the amount of data that can be transferred in a fixed time period.

Bandwidth

37. A _____ is a formal reference point that measures system characteristics at a specific time. a. feature line b. baseline c. product point d. viewport

Baseline

42. To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems. a. metric analysis b. benchmark testing c. threat analysis d. allocation testing

Benchmark testing

This is a good way to measure relative performance of two or more competing products in a standard environment.

Benchmark testing

WiMAX

Broadband wireless communications protocols for metropolitan area networks

47. System developers use _____ to document and trail program defects, code changes, and replacement code. a. bug tracking software b. the obstruction generator c. fault promotion analysis d. the defect distribution policy

Bug tracking software

a. distributed

By storing data in various locations, a(n) ________ database management system is less likely to experience a catastrophic failure. a. distributed b. proxy c. access d. thick

c. distributed

By storing data in various locations, a(n) ________ database management system is less likely to experience a catastrophic failure. a. proxy b. access c. distributed d. thick

A _____ defines what must take place, not how it will be accomplished.​ a. ​physical design b. ​qualitative design c. ​logical design d. ​quantitative design

C

Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called _____, is changing the picture dramatically.​ a. ​Hardware as a Help b. ​Process as a Product c. ​Software as a Service d. ​Storage as a Solution

C

In a(n) _____, the web becomes an integral part of the application, rather than just a communication channel, and systems analysts need new application development tools and solutions to handle the new systems.​ a. ​quality-based system b. ​agent-based system c. ​Internet-based system d. ​file-based system

C

In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry is called a(n) _____.​ a. ​business process outsourcing (BPO) b. ​online service provider (OSP) c. ​value-added reseller (VAR) d. ​enterprise resource planner (ERP)

C

Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which of the following is a reason Priscilla would offer as a reason for in-house software development?​ a. ​The client is looking to spend the least possible time in implementation. b. ​The client wants to be able to use fewer technical development staff members. c. ​The client has a number of very distinctive security requirements. d. ​The client wishes to receive future upgrade from the vendors.

C

Tom started the process of selecting a new system for the firm and he is weighing all of the various issues that need to be considered and the resources he has at his disposal as he makes this important decision. Tom has two candidates for the new system. Which one of the following is a strategy he can pursue for making the final selection from among the two candidates?​ a. ​Be aware that some vendors limit their reference lists to satisfied clients, so mostly negative feedback should be expected from those firms. b. ​For vertical applications, use a demo copy to enter a few sample transactions in both. c. ​Consult websites maintained by consultants and software publishers with product references and links to vendors. d. ​Although benchmarking can predict project-specific results, benchmark testing is not a good way to measure relative performance of two or more competing products in a standard environment.

C

When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.​ a. ​usage model b. ​fixed fee model c. ​subscription model d. ​transaction model

C

_____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.​ a. ​Process as a Product b. ​Process as a Product c. ​Software as a Service d. ​Hardware as a Help

C

A key physical design element is the ____, which describes how users interact with a computer system. A) HCI B) PCI C) UI D) PI

C) UI (User Interface)

On a source document, the main part of the form, called the ____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data. A) instruction zone B) authorization zone C) body zone D) heading zone

C) body zone

Companies use various output ____ methods to maintain output integrity and security. A) ergonomic B) aesthetic C) control D) detail

C) control

In ____ prototyping, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. A) system B) command C) design D) layout

C) design

A combination check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items

C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together

In a ____ design, you create individual components that connect to a higher-level program or process. A) distributed B) dissociated C) modular D) prototypical

C) modular

For upper-level managers who often want to see total figures and do not need supporting details, a(n) ____ is appropriate. A) detail report B) exception report C) summary report D) exigency report

C) summary report

In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature that is used to represent on or off status and switches to the other status when clicked. A) command button B) option button C) toggle button D) radio button

C) toggle button

In a source document, if totals are included on a form, they appear in the ____ zone. A) calculated B) control C) totals D) heading

C) totals

Printed output is used in ____ documents, which are output documents that are later entered back into the same or another information system. A) detail B) output C) turnaround D) report

C) turnaround

____ is a process for controlling changes in system requirements during software development.

CM

test plan

Can simulate various levels of emergencies and record the responses

17. The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and systems development into a much larger framework. a. the Department of Defense (DoD) model b. the Thousand-Yard Model c. Open Database Connectivity (ODBC) model d. Capability Maturity Model Integration (CMMI)

Capability Maturity Model Integration (CMMI)

_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.

Cardinality

A Web site for the ____ describes a variety of IT education and training resources.

Center for the Application of Information Technologies (CAIT)

access point

Central wireless device used to serve all wireless clients

information center

Centralized resource staffed by IT professionals who provide users with support

perfective maintenance

Changes an operational system to make it more efficient or maintainable

_____ use a keyword to encode a number.

Cipher codes

d. architecture

Client/server ________ generally refers to systems that divide processing between one or more networked clients and a central server. a. specification b. mode c. scalability d. architecture

This can be viewed as an online Software as a Service (SaaS) and data environment supported by supercomputer technology.

Cloud computing

a. True

Cloud computing effectively eliminates compatibility issues as well as the need for users to install updates or perform maintenance. a. True b. False

30. _____ measures a module's scope and processing characteristics. a. Coupling b. Indexing c. Cohesion d. Partitioning

Cohesion

soft skills

Communications, interpersonal, and perceptive abilities

distributed system

Company-wide system that connects one or more LANs or WANs

_____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving. a. Physical picture to device (PPOD) b. Computer output to microfilm (COM) c. Firewall output to microfilm (FOM) d. American standard code for information interchange (ASCII)

Computer output to microfilm (COM)

client

Computer that receives data, processing services, or other support from a server

server

Computer that supplies data, processing services, or other support to clients

procedural security

Concerned with managerial policies and controls that ensure secure operations

28. In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control module determines which subordinate modules will be invoked. a. method b. condition c. class d. attribute

Condition

49. _____ protects information from unauthorized disclosure and safeguards privacy. a. Availability b. Integrity c. Confidentiality d. Accessibility

Confidentiality

____ protects information from unauthorized disclosure and safeguards privacy.

Confidentiality

gateway

Connection between a network topology and a larger, dissimilar network

49. User documentation _____. a. allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) b. describes a system's functions and how they are implemented c. contains all the information needed for users to process and distribute online and printed output d. consists of instructions and information to users who will interact with the system

Consists of instructions and information to users who will interact with the system

48. Operations documentation _____. a. describes the inputs, outputs, and processing logic for all program modules b. describes a system's functions and how they are implemented c. contains all the information needed for processing and distributing online and printed output d. consists of instructions and information to users who will interact with the system

Contains all the information needed for processing and distributing online and printed output

_____ help offers assistance for a task in progress. a. User-selected b. User-sensitive c. Standard-selected d. Context-sensitive

Context-sensitive

24. In the given figure, a higher-level module, called a _____, directs lower-level modules. a. library module b. data module c. subordinate module d. control module

Control module

backup

Copying data at prescribed intervals, or continuously

21. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____. a. corrective maintenance b. adaptive maintenance c. perfective maintenance d. obsolete maintenance

Corrective Maintenance

31. _____ describes the degree of interdependence among modules. a. Resolution b. Modularity c. Dynamism d. Coupling

Coupling

____ describes the degree of interdependence among modules.

Coupling

star network

Currently the most popular LAN topology

A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings. a. ​fixed fee model b. ​usage model c. ​subscription model d. ​evaluation model

D

IBM describes WebSphere as a software platform for _____ environments. ​ a. ​integrated development b. ​integrated development c. ​business process outsourcing d. ​service-oriented architecture

D

In the context of in-house software development options, companies that develop software for sale are called _____. a. ​software distributers b. ​software stockers c. ​software dealers d. ​software vendors

D

Nearly _____ percent of total costs occur after the purchase of hardware and software.​ a. ​15 b. ​45 c. ​95 d. ​80

D

Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which of the following is a reason Priscilla will share with the new analysts, with regard to a client that wants to purchase a software package?​ a. ​The client has some existing technology in place whose requirements must be met by the new software. b. ​The client has unique business requirements that must be satisfied by this software application. c. ​The client wants to develop internal resources and capabilities. d. ​The client is looking for the lowest possible costs.

D

Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management.​ a. ​fixed outsourcing services (FOS) b. ​application service provider (ASP) c. ​outsource hosting provider (OHP) d. ​internet business services (IBS)

D

The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.​ a. ​command-line b. ​Software as a Service c. ​outsourcing d. ​Web 2.0

D

Which of the following is an example of a horizontal application?​ a. ​College applications b. ​Real estate firms c. ​Construction companies d. ​Accounting packages

D

Which of the following is true of a traditional systems development environment?​ a. ​Systems are developed and delivered in an Internet-based framework such as .NET or WebSphere. b. ​Systems are easily scalable and can run on multiple hardware environments. c. ​Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel. d. ​Many applications require substantial desktop computing power and resources.

D

Which of the following is true of a web-based systems development environment?​ a. ​Internet-based development treats the web only as a communication channel. b. ​Scalability of web-based systems can be affected by network limitations and constraints. c. ​Web-based solutions do not open complex security issues that should be addressed. d. ​Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.

D

​Identify a major web-based development environment. a. ​HP ArcSight b. ​Cisco's CSR c. ​Oracle DBA d. ​Microsoft's .NET

D

​In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application. a. ​user manual b. ​user agent c. ​user story d. ​user interface

D

​When companies use a _____, they already know the specific products or service they want and need to obtain price estimates or bids from vendors. a. ​net present value (NPV) b. ​return on investment (ROI) c. ​request for proposal (RFP) d. ​request for quotation (RFQ)

D

Many physicians feel that ____ software is difficult to use and does not meet their needs. A) HCP B) indexed C) prototypical D) EHR

D) EHR (Electronic Health Records)

A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices. A) HCI B) PCI C) UI D) GUI

D) GUI (Graphical User Interface)

____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. A) Aesthetics B) Interface technology C) Ergonomics D) Output security

D) Output security

In a data entry screen, such as that shown in the accompanying figure, a ____ is a control feature that is used to select one or more choices from a group. A) dialog box B) list box C) text box D) check box

D) check box

A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily. A) command-line B) prescribed C) satellite D) diskless

D) diskless

An existence check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items

D) is used for mandatory data items

Interface designers can obtain data, called ____ metrics, by using software that can record and measure user interaction with a system. A) aesthetics B) relationship C) ergonomic D) usability

D) usability

56. During _____, existing data is loaded into the new system. a. data visualization b. data conversion c. data collision d. data normalization

Data conversion

legacy data

Data that is difficult to access and transport to client/server environment

Bandwidth will not be measured in which of the following units?

Dbps (decibits per second)

_____ combine data from different item attributes, or characteristics, to build a code.

Derivation codes

permissions

Describe the rights a user has to a particular file or directory on a server

product baseline

Describes a system at the beginning of system operation

46. Program documentation _____. a. describes the inputs, outputs, and processing logic for all program modules b. consists of instructions and information to users who will interact with the system and includes user manuals, help screens, programs, and online tutorials c. includes data dictionary entries, data flow diagrams, screen layouts, and the systems request that initiated the program d. creates links within the program that will take a user to the appropriate documentation

Describes the inputs, outputs, and processing logic for all program modules

38. In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included. a. unit test b. design walkthrough c. function assessment d. closure meeting

Design walkthrough

36. _____ is the process of reviewing a program code to spot logic errors, which produce incorrect results. a. Desk checking b. Direct cutover examination c. Results walkthrough d. Cohesion assurance

Desk checking

____ is the process of reviewing the program code to spot logic errors, which produce incorrect results.

Desk checking

keystroke logger

Device that can record everything that is typed into a keyboard

router

Device that connects network segments and guides the flow of data

corrective maintenance

Diagnoses and corrects errors in an operational system

____ cutover involves more risk than other changeover methods.

Direct

58. _____ involves more risk than other changeover methods. a. Direct cutover b. Pilot operation c. Parallel cutover d. Phased operation

Direct cutover

59. As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational. a. phased operation b. parallel operation c. pilot operation d. direct cutover

Direct cutover

log

Documents all events, including dates, times, and other specific information

perfective

During system operation, changes in user activity or data patterns can cause a decline in efficiency, and _____ maintenance might be needed to restore performance.

_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers. a. Unicode b. ASCII (American Standard Code for Information Interchange) c. EBCDIC (Extended Binary Coded Decimal Interchange Code) d. ISO (International Organization for Standardization)

EBCDIC (Extended Binary Coded Decimal Interchange Code)

avoidance

Eliminates risk by adding protective safeguards

False

Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals.

_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data. a. Normalization b. Encryption c. Encapsulation d. Standardization

Encryption

_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design. ​

Enterprise resource planning (ERP)

portal

Entrance to a multifunction Web site

*Chapter Objectives*

Explain file-oriented systems and how they differ from database management systems Explain data design terminology, including entities, fields, common fields, records, files, tables, and key fields Describe data relationships, draw an entity relationship diagram, define cardinality, and use cardinality notation Explain the concept of normalization Explain the importance of codes and describe various coding schemes Explain data warehousing and data mining Differentiate between logical and physical storage and records Explain data control measures

supply chain management

Extends a company's internal ERP system to their suppliers and customers

10. Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time.

False

5. The skill set required to develop documentation usually is the same as that required to develop a system.

False

A request for quotation (RFQ) is more specific than a request for proposal (RFP).

False

A service desk is a highly effective replacement for traditional IT maintenance and support activities.

False

A subscription model charges a variable fee based on the volume of transactions or operations performed by the application.

False

Adaptive maintenance always is less difficult than new systems development because the enhancements need not work within the constraints of an existing system.

False

Although the procedures for corrective maintenance and adaptive maintenance are alike, minor corrective maintenance requires more IT department resources than minor adaptive maintenance.

False

As enterprise-wide information systems grow more complex, configuration management becomes less and less useful.

False

Bandwidth requirements are expressed in bytes per minute.

False

Both adaptive and perfective maintenance activities decrease in a dynamic business environment.

False

Companies with limited resources always consider new systems development, adaptive maintenance, and corrective maintenance less important than perfective maintenance.

False

Context-sensitive help displays information about any task when the user requests it. T/F?

False

Data conversion is easier when the new system replaces a manual system, because all data can be entered manually, unless it must be scanned.

False

Empowerment makes an IT department less productive because it must spend more time responding to daily concerns of users and less time on high-impact systems development projects that support strategic business goals.

False

Errors found during a structured walkthrough are harder to fix.

False

If one module refers to internal logic contained in another module, the modules are loosely coupled.

False

In the star network, each node connects to every other node.

False

Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms.

False

Modules that are independent are tightly coupled.

False

Most Webinars are Web-based broadcasts that allow a user to download multimedia files to a PC or portable device.

False

Parallel operation is the least costly changeover method.

False

Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time.

False

Phased operation is more expensive than full parallel operation because the entire system must be worked with at one time.

False

Post-implementation evaluations are optional for most information systems projects.

False

Requests for corrective and adaptive maintenance normally come from the IT department, while users usually initiate perfective maintenance.

False

Restricting the implementation to a pilot site increases the risk of system failure, compared with a direct cutover method, and operating both systems for only the pilot site is more expensive than a parallel operation for the entire company.

False

Sensitive data can be encrypted, or coded, so only users with decoding software can read it. T/F?

False

T/F As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.​

False

T/F Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services.​

False

T/F Security is especially important when data or processing is performed at a centralized facility, rather than at remote locations. ​

False

The main objective of user training is to show users how to become service desk staff members.

False

The skill set required to develop documentation usually is the same as that to develop a system.

False

To draw a structure chart, working from a logical model the systems analyst transforms program modules into functional primitives and object methods.

False

Using a release methodology increases the documentation burden.

False

​A data type check is a data validation rule that is used when data must be in predetermined sequence. T/F?

False

​An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals. T/F?

False

​Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned.

False

​Interface design should call for attention to the interface, rather than facilitating design objectives. T/F?

False

​To create an attractive user interface layout and design, when the user enters data that completely fills the field, the data must move automatically to the next field. T/F?

False

​User-selected help always offers assistance for a task in progress. T/F?

False

8. Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned.

False: Manually entering data is hard and tedious

Using batch input, data entry is performed continuously.

False: batch input is when info is entered on a specified time schedule

A combination check is a data validation rule that tests to ensure if a data item fits the required data type.

False: data type check

Interface design should call for attention to the interface, rather than facilitating design objectives.

False: design objectives should take precedence over the interface

Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.

False: higher ups only care about general information NOT detailed

4. The hardening process that makes a system more secure is fully automatic.

False: mainly manual

7. Most webinars are web-based broadcasts that allow a user to download multimedia files to a PC or portable device.

False: podcast

A data type check is a data validation rule that is used when data must be in predetermined sequence.

False: sequence check

4. Commercial software packages must undergo unit and integration testing similar to that of in-house developed systems, although system testing usually is not performed.

False: systems testing is always performed on commercial software packages

An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals.

False: they should think like a user and understand business functions

User-selected help always offers assistance for a task in progress.

False: this is context-sensitive help

Context-sensitive help displays information about any task when the user requests it.

False: this is user-selected help

To create an attractive user interface layout and design, when the user enters data that completely fills the field, the data must move automatically to the next field.

False: users should be active in their use of the interface, this doesn't follow that principle

12. Modules that are independent are tightly coupled.

False:loosely coupled

13. If modules are loosely coupled, one module is linked to internal logic contained in another module.

False:tightly coupled

63. At the end of the systems implementation phase, the final report to management should include _____. a. final versions of all system documentation b. hardware efficiency and platform performance c. adequacy of system controls and security measures d. quality and effectiveness of training

Final versions of all system documentation

61. A _____ is the main line of defense between a local network, or intranet, and the Internet. a. malware b. firewall c. spyware d. threat

Firewall

21. _____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows. a. Training plans b. Acceptance tests c. Flowcharts d. Simulations

Flowcharts

____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.

Flowcharts

database programmer

Focuses on creating and supporting large-scale database systems

_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen. a. Form uploading b. Form resetting c. Form pulling d. Form filling

Form filling

baseline

Formal reference point that measures system characteristics at a specific time

38. The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints. a. functional baseline b. extension baseline c. allocated baseline d. product baseline

Functional baseline

Wireless network speed is measured in _____.​

GBPS (gigabits per second)

a. True

Gartner Inc., a leading consulting firm that is well-known for its predictions, believes that prices for most cloud services will begin to include a global energy surcharge. a. True b. False

Wireless network speed is measured in _____.

Gbps (gigabits per second)

False

Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.

online system

Handles transactions when and where they occur and provides output to users

network interface

Hardware and software that allows a computer to interact with a network

16. A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs. a. help desk b. white spot c. maintenance software module d. utility point

Help desk

_____ describes the relationship between computers and the people who use them to perform their jobs. a. Human-computer interaction (HCI) b. Peripheral component interconnect (PCI) c. Media control interaction (MCI) d. Peripheral connect (PC)

Human-computer interaction (HCI)

____ requires that a software supplier document all testing and maintain records of test results.

ISO (International Organization for Standardization)

commerce

If a company is reluctant to take on the challenge and complexity of developing an Internet _____ site in-house, they may pursue alternatives, such as a packaged solution or the use of an application service provider.

supplemental maintenance agreement

If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor.​

a. True

If a system is brought down for hours as a result of a disruption in electricity, the event would be categorized as a service failure. a. True b. False

a. True

If new technology offers a way to perform the same or additional functions more efficiently, it could be a sign that the existing system is obsolete and has reached the end of its economically useful life. a. True b. False

risk

Impact of an attack multiplied by likelihood of a vulnerability being exploited

A) parallel

In ____ programming, two programmers work on the same task on the same computer. A) parallel B) duo C) double D) driver

B) flag

In a structure chart, a control couple shows a message, also called a status ____, which one module sends to another. A) pilot B) flag C) loop D) unit

C) loop

In a structure chart, a curved arrow represents a ____, which indicates that one or more modules are repeated. A) pilot B) flag C) loop D) unit

A) top-down

In a(n) ____ approach, the systems analyst documents the system's requirements and then breaks them down into subsystems and modules. A) top-down B) piloted C) indexed D) integrated

B) design

In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included. A) unit B) design C) testing D) user

service desk

In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support.​

software vendors

In the context of in-house software development options, companies that develop software for sale are called _____.

​build or buy

In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision.

b. False

In today's business environment, batch processing is the most practical method due to its ability to provide real-time information. a. True b. False

fault management

Includes monitoring a system for signs of trouble and logging system failures

hierarchical network

Includes one or more powerful servers that control an entire network

malware

Includes worms, Trojan horses, keystroke loggers, and spyware

hardening

Increases security by removing unnecessary accounts, services, and features

mask

Input _____ is a template or pattern that restricts data entry and prevents errors.

43. Testing two or more programs that depend on each other is called _____. a. integration testing b. unit testing c. acceptance testing d. system testing

Integration testing

67. Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together correctly. What is one of the names of this type of testing? a. Integration testing b. System testing c. Unit testing d. Stub testing

Integration testing

____ prevents unauthorized users from creating, modifying, or deleting information.

Integrity

​usability metrics

Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system.

threat

Internal or external entity that could endanger an asset

18. _____ requires that a software supplier document all testing and maintain records of test results. a. International Organization for Standardization (ISO) b. Software Engineering Institute (SEI) c. Open Database Connectivity (ODBC) d. Center for the Application of Information Technologies (CAIT)

International Organization for Standardization (ISO)

This is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.

Internet Business Services (IBS)

recovery

Involves restoring data and restarting the system after an interruption

_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.

Java database connectivity (JDBC)

local area network

Joins clients and allows sharing of data and hardware resources between them

26. The given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a structure chart. a. library b. data c. subordinate d. control

Library

fat client

Locates all or most of the application processing logic at the client

thin client

Locates all or most of the application processing logic at the server

This is a design that does not address the actual methods of implementation.

Logical design

_____ describes the way the components in a network interact.

Logical topology

_____ describes the way the components in a network interact.​

Logical topology

29. In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated. a. pie b. status flag c. loop d. freeform

Loop

Extended Service Set

Made up of two or more Basic Service Set networks

firewall

Main line of defense between a local network, or intranet, and the Internet

19. _____ expenses vary significantly during a system's operational life and include spending to support maintenance activities. a. Secure b. Maintenance c. Principal d. Capital

Maintenance

____ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.

Maintenance

____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.

Maintenance

20. _____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently. a. Team building activities b. Elicitation activities c. Maintenance activities d. Testing activities

Maintenance activities

This is another name for internet business services (IBS).

Managed hosting

switch

Manages a star network and acts as a communication conduit for network traffic

programmer/analyst

Many IT departments use a job title of _____ to designate positions that require a combination of system analysis and programming skills.

certifications

Many IT industry leaders, such as Microsoft, Cisco, Novell, Oracle, and Sun Microsystems, offer _____, which are measured and verified by examination.

Which of the following is true of a traditional systems development environment?

Many applications require substantial desktop computing power and resources.

True

Many firms feel that in-house IT resources and capabilities provide a competitive advantage because an in-house team can respond quickly when business problems or opportunities arise.​

C) code

Many organizations require a more formal type of desk checking called a structured walkthrough, or ____ review. A) design B) integrated C) code D) interpolated

scaling on demand

Matches resources to needs at any given time

batch processing

Means that data is managed in groups

incremental backup

Method that only includes recent files that have never been backed up

33. A class diagram includes the class _____, which represent the program logic. a. attributes b. events c. methods d. characters

Methods

queue length

Metric that measures the number of requests pending for a service

busy

Metric that measures the time that a given resource is unavailable

43. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data. a. metrics b. wireframes c. viewports d. baselines

Metrics

____ include the volume of online data, the number of records accessed, and the number of transactions processed in a given time period.

Metrics

a. True

Microsoft and Intershop are vendors that offer turnkey systems for companies that want to get an e-business up and running quickly. a. True b. False

Identify a major web-based development environment.

Microsoft's .NET

True

Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable business solution that fits the company's long-term business strategy.​

20. A _____ consists of related program code organized into small units that are easy to understand and maintain. a. node b. stub c. decision tree d. module

Module

b. version

Most firms use commercial applications to handle ________ control for complex systems, such as ERP. a. change b. version c. fault d. remote

_____ relies on collective data paths to increase bandwidth and range.

Multiple input/multiple output (MIMO) technology

mesh network

Network in which each node connects to every other node

data frames

Network traffic that is broadcasted to all connected devices by a hub

ring network

Network with data that flows in a single direction from one device to the next

c. uninterruptible

Non-mission-critical computer systems and network devices should be plugged into a(n) ________ power supply that includes battery backup with suitable capacity to handle short-term operations while an orderly backup and system shutdown can be completed. a. hot site b. tamper-evident c. uninterruptible d. biometric

_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database. a. Encryption b. Encapsulation c. Abstraction d. Normalization

Normalization

legacy systems

Older systems that use outdated technology, but are still functional

b. in-house

One benefit of a(n) ________ e-commerce strategy is the ability to maintain complete control over the organization of the site, the number of pages, and the size of the files. a. offline b. in-house c. offsite d. remote

_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

Open database connectivity (ODBC)

____ costs include expenses for items such as supplies, equipment rental, and software leases.

Operational

_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. a. Aesthetics b. Interface technology c. Ergonomics d. Output security

Output security

_____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.​ a. ​Commission b. ​Subscription c. ​Outsourcing d. ​External provisioning

Outsourcing

response time

Overall time between a request for system activity and delivery of the response

35. In _____, two programmers work on the same task on the same computer; one drives while the other navigates. a. pair programming b. multitasking c. dual tasking d. driver programming

Pair programming

60. As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period. a. phased operation b. parallel operation c. pilot operation d. direct cutover

Parallel operation

metrics

Performance measurements

62. As the accompanying figure illustrates, the _____ changeover method allows the new system to be implemented in stages, or modules. a. phased operation b. parallel operation c. pilot operation d. direct cutover

Phased operation

This is a plan for the actual implementation of the system.

Physical design

security token

Physical device that authenticates a legitimate user

_____ is strictly hardware related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.

Physical storage

_____ describes the actual network cabling and connections. a. Physical topology b. Logical topology c. Star topology d. Bus topology

Physical topology

61. As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system at a selected location of the company. a. phased operation b. parallel operation c. pilot operation d. direct cutover

Pilot operation

52. A(n) _____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device. a. webinar b. tutorial c. podcast d. data frame

Podcast

remote control

Popular examples of _____ software include GoToMyPC by Citrix, LogMeIn Pro by LogMeIn, and PC Now by WebEx.

corporate portal

Portal that provides access for customers, employees, suppliers, and the public

offsiting

Practice of storing backup media away from the main business location

integrity

Prevents unauthorized users from creating, modifying, or deleting information

62. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels. a. privilege escalation attack b. denial-of-service attack c. malware penetration attack d. identity management invasion

Privilege escalation attack

change control

Process for controlling changes in system requirements during development

version control

Process of tracking system releases

40. The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system. a. functional baseline b. operational baseline c. allocated baseline d. product baseline

Product baseline

50. The environment for the actual system operation is called the _____. a. production environment b. exploratory environment c. functional environment d. globalized environment

Production environment

31. Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills. a. tester/programmer b. strategist/analyst c. programmer/analyst d. designer/debugger

Programmer/analyst

applications

Programs that handle input, manage processing logic, and provide required output

applications

Programs that handle the input, manage the processing logic, and provide the required output for an information system are called _____.

confidentiality

Protects information from unauthorized disclosure and safeguards privacy

security

Protects the system, and keeps it safe, free from danger, and reliable

proxy server

Provides Internet connectivity for internal LAN users

hot site

Provides the best insurance against major business interruptions

application server

Provides the business logic required by a system

15. The main objective of _____ is to avoid problems or to identify them as soon as possible. a. direct cutover b. quality assurance c. application development d. cohesion

Quality assurance

mitigation

Reduces the impact of a risk by careful planning and preparation

newsgroups

Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas.​

node

Represents a physical device that can send, receive, or manage network data

_____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project.​ a. ​Return on investment (ROI) b. ​Acquisition process c. ​Net present value (NPV) d. ​Payback analysis

Return On Investment (ROI)

_____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project.

Return on Investment (ROI)

32. In sequence, the four steps typically followed to create a structure chart are _____. a. reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart b. analyzing the structure chart and the data dictionary; reviewing the data flow diagrams (DFDs); identifying modules and relationships; and adding couples, loops, and conditions c. adding couples, loops, and conditions; analyzing the structure chart and the data dictionary; reviewing the data flow diagrams (DFDs); and identifying modules and relationships d. identifying modules and relationships; adding couples, loops, and conditions; analyzing the structure chart and the data dictionary; and reviewing the data flow diagrams (DFDs)

Reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart and the data dictionary

59. In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited. a. proxy b. risk c. firewall d. warning

Risk

54. _____ measures risk likelihood and impact. a. Risk assessment b. Risk marker c. Risk identification d. Risk control

Risk assessment

55. _____ develops safeguards that reduce risks and their impact. a. Risk assessment b. Risk verification c. Risk identification d. Risk control

Risk control

a. True

SAGE is a professional organization that provides a wide variety of technical information and support for system administrators. a. True b. False

To achieve better, faster, and less expensive methods of software development, ____ designed the Capability Maturity Model (CMM), which improves quality, reduces development time, and cuts costs.

SEI (Software Engineering Institute)

_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Scability

_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

Scalability

extensibility

Scalability is also referred to as _____.

Some user applications use this to allow users to design their own data entry forms.

Screen generators

attacker

Script kiddie, which is defined as an inexperienced or juvenile hacker who uses readily available malicious software to disrupt or damage computer systems, is a category of _____.

tunnel

Secure network connection that is established once authentication is complete

53. When developing a training program, which of the following guidelines should be kept in mind? a. Train people individually. b. Select the most effective place to conduct the training. c. Develop a single training program for distinct employee groups. d. Provide only hands-on experience training.

Select the most effective place to conduct the training

_____ are numbers or letters assigned in a specific order. a. Derivation codes b. Category codes c. Sequence codes d. Significant digit codes

Sequence codes

transference

Shifts the risk to another asset or party

55. When training is complete, many organizations conduct a full-scale test, or _____, which is a dress rehearsal for users and IT support staff. a. a parallel operation b. a pre-implementation evaluation c. data conversion d. simulation

Simulation

pretexting

Social engineering used to obtain personal information under false pretenses

16. To achieve better, faster, and less expensive methods of software development, _____ designed the Capability Maturity Model (CMM), which improves quality, reduces development time, and cut costs. a. International Organization for Standardization (ISO) b. Software Engineering Institute (SEI) c. Open Database Connectivity (ODBC) d. Center for the Application of Information Technologies (CAIT)

Software Engineering Institute (SEI)

_____ is a model of software deployment were an application is hosted as a service provided to customers over the internet.

Software as a Service

wide area network

Spans long distances and can connect LANs that are continents apart

middleware

Special software that allows the tiers in a multi-tier system to communicate

patch

Specially written software module that provides temporary repairs

hub

Star network connection device that does not perform as well as a switch

27. In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another. a. pilot b. status flag c. open loop d. unit plan

Status flag

23. A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information. a. flowchart b. data module c. structure chart d. subordinate module

Structure chart

37. Many organizations require a more formal type of desk checking called _____. a. a control module b. integration testing c. a structured walkthrough d. a data couple

Structured walkthrough

41. In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. a. modular testing b. stub testing c. acceptance testing d. unit testing

Stub testing

66. Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process? a. Integration testing b. System testing c. Link testing d. Stub testing

Stub testing

25. In the given figure, a lower-level module is called a _____. a. library module b. data module c. subordinate module d. control module

Subordinate module

68. In a top-down design, the overall objectives of a system are broken down into _____ in a process called partitioning. a. subsystems b. flags c. modules d. pilot sites

Subsystems & Modules

30. In maintenance management, _____ involves studying the parts of a system to understand the overall system. a. synthesis b. adoption c. fusion d. elucidation

Synthesis

____ involves studying the parts to understand the overall system.

Synthesis

a. True

System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security. a. True b. False

57. _____ is the process of putting a new information system online and retiring the old system. a. System integration b. Online system documentation c. System override d. System changeover

System changeover

_____ produces a full-featured, working model of the information system. a. Design prototyping b. System prototyping c. Application prototyping d. Throwaway prototyping

System prototyping

45. After completing integration testing, a systems analyst must perform _____, which involves the entire information system and includes all typical processing situations. a. functional testing b. unit testing c. stub testing d. system testing

System testing

This is like a contract that identifies what the system developers must deliver to users

Systems requirement document

social engineering

Tactic involving use of social interaction to gain access to a computer system

backups

Tape, hard drives, optical storage, and online storage are commonly used types of _____ media.

thick client

Term that is also referred to as fat client

b. False

The 802.11b wireless standard, which was adopted in 2003, has a maximum speed of 54 Mbps and an approximate range of 50-100 feet. a. True b. False

Which configuration has a central wireless device that is used to serve all wireless clients?

The Basic Service Set (BSS)

a. metropolitan

The Institute of Electrical and Electronics Engineers is working on 802.16 standards, sometimes called WiMAX, which are broadband wireless communications protocols for ________ area network. a. metropolitan b. wireless local c. local d. wide

specification

The Management Summary, which provides a brief overview of a project to company managers and executives, is a section included in the system design _____.

a. True

The Open Systems Interconnection model provides physical design standards that assure seamless network connectivity regardless of the specific hardware environment. a. True b. False

802.11

The Wi-Fi Alliance is a non-profit international association formed in 1999 to certify interoperability of wireless network products based on IEEE _____ specifications.

allocated

The _____ baseline documents the system at the end of the design phase and identifies any changes since the functional baseline.

​report footer

The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.​

a. System Components

The ________ section of the system design specification contains the complete design of the new system, including the user interface, outputs, inputs, files, databases, and network specifications. a. System Components b. Management Summary c. Implement Requirements d. System Environment

b. application

The advantage of the ________ logic layer is that a three-tier design enhances overall performance by reducing the data server's workload. a. node b. application c. terminal d. transparent

bandwidth

The amount of data that can be transferred in a fixed time period

network topology

The manner in which a network is configured

b. False

The objective of supply chain management is to establish a company-wide strategy for using IT that includes a specific architecture as well as standards for data, processing, network, and user interface design. a. True b. False

a. True

The occurrence of an emergency could require a maintenance team to address the problem immediately by applying a patch, which is a specially written software module that provides temporary repairs so operations can resume. a. True b. False

42. Which of the following is specified by the detailed procedures in a test plan? a. The result of the final test of all programs b. How a separate operational and test environment is prepared c. The test data to be used d. Who will work with the new system and ensure that all necessary features have been included

The test data to be used

a. interface

The three main functions of a business information system are the management of applications that perform the processing logic, the handling of data storage and access, and the provision of a(n) ________ that allows users to interact with the system. a. interface b. hub c. switch d. gateway

56. A _____ is an internal or external entity that could endanger an asset. a. proxy b. facade c. firewall d. threat

Threat

d. n-tier

Three-tier forms of client/server designs are also referred to as ________ designs, to indicate that some designs use more than one immediate layer. a. multi-tier b. hierarchical c. x-tier d. n-tier

a. preventive

To avoid problems, ________ maintenance requires analysis of areas where trouble is likely to occur. a. preventive b. adaptive c. corrective d. perfective

d. benchmark

To measure system performance, many firms use ________ testing, which uses a set of standard tests to evaluate system performance and capacity. a. bandwidth b. boot-level c. baseline d. benchmark

d. benchmark

To measure system performance, many firms use ________ testing, which uses a set of standard tests to evaluate system performance and capacity. a. baseline b. bandwidth c. boot-level d. benchmark

​control field order

To produce a control break report, the records must be arranged, or sorted, in _____.

22. Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure. a. top-down approach b. test plan c. training plan d. integrated approach

Top-down approach

physical topology

Topology that describes network cabling and connections

logical topology

Topology that describes the way components interact

54. Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others. a. structured walkthrough b. train-the-trainer c. direct cutover d. top-down design

Train-the-trainer

60. _____, a risk control strategy, eliminates risks by adding protective safeguards. a. Avoidance b. Acceptance c. Conveyance d. Transference

Transference

____ shifts the risk to another asset or party, such as an insurance company, in risk control.

Transference

system architecture

Translates the logical design of an information system into a physical structure

1. Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team.

True

11. The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.

True

12. Using a release methodology reduces the documentation burden.

True

14. Podcasts can be prescheduled, made available on demand, or delivered as automatic updates.

True

2. Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.

True

3. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors.

True

6. Effective online documentation is an important productivity tool because it empowers users and reduces the time that IT staff members must spend in providing telephone, e-mail, or face-to-face assistance.

True

7. In dumpster diving attacks, an intruder raids desks or trash bins for valuable information.

True

9. Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy.

True

9. To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year.

True

A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service.

True

A systems analyst prepares most of the systems documentation during the systems analysis and systems design phases.

True

A transparent interface does not distract a user and calls no attention to itself.

True

Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team.

True

Application security requires an understanding of services, hardening, application permissions, input validation techniques, software patches and updates, and software logs.

True

As the first step in capacity planning, analysts develop a current model based on the system's present workload and performance specifications.

True

Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors.

True

Configuration management is sometimes referred to as change control.

True

Effective online documentation is an important productivity tool because it empowers users and reduces the time that IT staff members must spend in providing telephone, e-mail, or face-to-face assistance.

True

Every page in a report should include a page header, which appears at the top of the page and includes the column headings that identify the data.

True

Every page in a report should include a page header, which appears at the top of the page and includes the column headings that identify the data. T/F?

True

In a PKE environment, each user on the network has a pair of keys: a public key and a private key.

True

In a hierarchical network, one or more powerful servers control the entire network.

True

Newly hired and recently promoted IT staff members often are assigned to maintenance projects because their managers believe that maintenance work offers a valuable learning experience.

True

One technique that can be used in perfective maintenance is software reengineering.

True

Perfective maintenance can improve system reliability.

True

Podcasts can be prescheduled, made available on demand, or delivered as automatic updates.

True

Post-implementation evaluation primarily is concerned with assessing the quality of a new system.

True

Retention periods can be a specific number of months or years, depending on legal requirements and company policy.

True

Sensitive data can be encrypted, or coded, so only users with decoding software can read it.

True

Structure charts are based on the DFDs constructed during data and process modeling and object models that might have been developed.

True

Successful, robust systems often need the most support because users want to learn the features, try all the capabilities, and discover how the system can help them perform their business functions.

True

Systems analysts prepare overall documentation, such as process descriptions and report layouts, early in the SDLC.

True

Systems analysts use application generators, report writers, screen generators, fourth-generation languages, and other CASE tools that produce code directly from program design specifications.

True

T/F Implementation of early client/server systems was expensive because clients needed more powerful hardware and software to handle shared processing tasks. ​

True

T/F In contrast to a centralized system, a client/server design separates applications and data. ​

True

T/F The cloud computing concept envisions a cloud of remote computers that provide a total online software and data environment that is hosted by third parties.​

True

The post-implementation evaluation verifies that a new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.

True

The procedure for minor adaptive maintenance is similar to routine corrective maintenance.

True

The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

True

To develop a user-centered interface, a designer must learn to think like a user and see the system through a user's eyes.

True

To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year.

True

Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.

True

When analysts learn different skills, the organization is more versatile and people can shift to meeting changing business needs.

True

When corrective action cannot occur immediately, users appreciate feedback from the system administrator and should be kept informed of any decisions or actions that affect their maintenance requests.

True

Whenever possible, people who were not directly involved in developing a system should conduct the post-implementation evaluation.

True

With a release methodology, even when changes would improve system efficiency or user productivity, the potential savings must wait until the next release date, which might increase operational costs.

True

​Effective online documentation is an important productivity tool because it empowers users and reduces the time that IT staff members must spend in providing telephone, e-mail, or face-to-face assistance.

True

​To develop a user-centered interface, a designer must learn to think like a user and see the system through a user's eyes. T/F?

True

​Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.

True

39. The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking. a. unit testing b. integration testing c. functional testing d. global testing

Unit testing

40. During _____, programmers must test programs that interact with other programs and files separately before they are integrated into the system. a. unit testing b. integrated testing c. acceptance testing d. functional testing

Unit testing

B) users

Unless a problem must be corrected, or modifications or enhancements must be made, access to the operational environment is limited to ____ and must be strictly controlled. A) systems analysts B) users C) programmers D) managers

b. False

Unlike the system requirements specification, which is written for users to understand, the system design document is oriented toward the programmers who will use it to create necessary programs. a. True b. False

When evaluating a system, which of the following is not necessary for a systems analyst to do?

Use interviews to gather information and opinions from a large number of users

port

Used to route incoming traffic to the correct application on a computer

A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

User application

51. When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled. a. systems analysts b. users c. programmers d. managers

Users

software reengineering

Uses analytical techniques to identify quality and performance improvements

B) train-the-trainer

Using a ____ strategy, knowledgeable users can be selected who then conduct sessions for others. A) structured walkthrough B) train-the-trainer C) desk checking D) top-down design

False

Using batch input, data entry is performed continuously.

35. _____ is the process of tracking system releases. a. Configuration control b. Version control c. Source control d. Quality control

Version control

bluetooth

Very popular for short-distance wireless communication

a. 802.11i

WPA2 is an extension of Wi-Fi Protected Access based on a full implementation of the IEEE ________ standard. a. 802.11i b. 802.11a c. 802.11b d. 802.16

The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.

Web 2.0

This describes a second generation of the web that will enable people to collaborate, interact, and share information much more effectively.

Web 2.0

wiki

Web-based repository of information that can be modified by anyone

Which of the following is true of a web-based systems development environment?

Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.

1) corporate organization and culture 2) enterprise resource planning (ERP) 3) initial and total cost of ownership (TCO) 4) scalability 5) web integration 6) legacy system interface requirements 7) processing options 8) security issues 9) corporate portals

What are the issues an analyst must consider that will affect the architecture choice of a system?

Which of the following is not specified by the detailed procedures in a test plan?

What the rate of the forward engineering will be

a. True

When an intruder gains access to a system using a compromised account and attempts to increase permission levels, it is referred to as a privilege escalation attack. a. True b. False

D) What the rate of the forward engineering will be

Which of the following is not specified by the detailed procedures in a test plan? A) How and when testing will be performed B) What test data will be used C) Who will participate D) What the rate of the forward engineering will be

applications programmer

Works on new systems development and maintenance

The test environment for an information system contains ____.

[None Given]

C) Flowcharts

____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows. A) Training plans B) Acceptance tests C) Flowcharts D) Simulations

A) Desk checking

____ is the process of reviewing the program code to spot logic errors, which produce incorrect results. A) Desk checking B) Code review C) Results walkthrough D) Logic review

C) Cohesion

____ measures a module's scope and processing characteristics. A) Coupling B) Indexing C) Cohesion D) Piloting

​source document

_____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction.

LoJack

_____ for Laptops, which is sold by Absolute Software, is a type of tracking software that offers call-in service, as well as a remote data erase capability.

service time

_____ is a performance metric that measures the time it takes to process a given task once it reaches the front of the queue.

bandwidth

_____ is the amount of data that can be transferred in a fixed time period.

mesh

_____ networks, which are expensive to install and maintain, are used in situations where a high degree of redundancy is needed.

a. Integrity

________ , which is one of the three main elements of system security, prevents unauthorized users from creating, modifying, or deleting information. a. Integrity b. Availability c. Transference d. Confidentiality

c. Maintenance

________ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently. a. Hardening b. Operational c. Maintenance d. Risk control

c. Wikis

________ are Web-based repositories of information that have emerged as part of Web 2.0, which is the name for the powerful and compelling shift toward Internet-based collaboration. a. Star networks b. Wireless access points c. Wikis d. Legacy systems

d. Operational costs

________ include(s) items such as supplies, equipment rental, and software leases. a. Corrective maintenance b. Perfective maintenance c. Maintenance costs d. Operational costs

b. Preventive

________ maintenance reduces the possibility of future system failure. a. Perfective b. Preventive c. Corrective d. Adaptive

c. Operational

________ security defines how particular tasks are to be performed, from large-scale data backups to everyday tasks such as storing e-mails or forms. a. Privilege b. Universal c. Operational d. Baseline

A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.​ a. ​ wireless local area network (WLAN) b. ​ storage area network (SAN) c. ​ local area network (LAN) d. ​ metropolitan area network (MAN)

a

At the center of the network, shown in the accompanying figure, is the _____, which manages the network and acts as a communications conduit for all network traffic. ​ a. ​ switch b. ​ log c. scale d. ​ portal

a

In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices.​ a ​hierarchical network b ​ring network c ​bus network d ​star network

a

In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security. ​ a. ​ system environment b. ​ executive summary c. ​ implementation requirements d. ​ time and cost estimates

a

Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. ​ Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client? ​ a. ​ A star network b. ​ A hub network c. ​ A ring network d. ​ A bus network

a

Sam has been asked to classify a number of different processing systems that his consultancy's client uses. Sam is analyzing a processing system and he has determined that it is an online processing system and not a batch processing system. Which of the following observations helped him determine the system?​ a. ​ The system processing transactions completely when and where they occur b. ​ The system avoiding a constant dialog between the user and the system c. ​ The system allowing delays in transactions d. ​ The system's tasks running on a predetermined schedule, without user involvement

a

Sam is looking at a second system. This system, he determines, is a batch processing system. Which of the following observations helped him determine the system?​ a. ​ The IT operations group at the client site running programs at a predetermined schedule, without user involvement b. ​ The information system at the client site being available whenever necessary, supporting business functions c. ​ The system at the client side processing transactions completely when and where they occur d. ​ Users accessing data randomly

a

The _____ allows the expansion of wireless access over a wide area.​ a ​Extended Service Set (ESS) topology b ​logical topology c ​physical topology d ​Basic Service Set (BSS) topology

a

The _____ standard uses multiple input/multiple output (MIMO) technology to boost performance.​ a ​802.11ac b ​802.11b c ​802.11a d ​802.11cn

a

Which of the following configurations has a central wireless device that is used to serve all wireless clients? a. ​ The Basic Service Set (BSS) b. ​ A data frame c. ​ A point-of-sale (POS) terminal d. ​ The OSI (Open Systems Interconnection) model

a

_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design. ​ a. ​ Enterprise resource planning (ERP) b. ​ Legacy data c. ​ Scalability d. ​ Stand-alone computing

a

_____ is designed to serve the needs of a specific department, such as sales, marketing, or finance.

a data mart

_____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.

a data warehouse

One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend?​

a mesh network

Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client? ​

a star network

Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called ____.

acceptance tests

In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.​

access point

As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor ____ maintenance.

adaptive

As shown in the accompanying figure, ____ when it becomes clear that the company plans to replace the system.

adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases

Adaptive maintenance ____.

adds enhancements to an operational system and makes the system easier to use

The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

allocated baseline

A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.​ a. ​software delivery service b. ​manufacturer outsourcing c. ​manufacturer outsourcing d. ​application service provider

application service provider

An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output.

applications

An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output. ​

applications

An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output. ​ a. ​ applications b. ​ data frames c. ​ magnetic tapes d. ​ clients

applications

Risk ____ measures risk likelihood and impact.

assessment

A class diagram includes the class ____, which describe the characteristics of objects in the class.

attributes

A secure system includes _____ that can log every instance of data entry and changes. a. audit trails b. trap trails c. batch trails d. control trails

audit trails

In a source document, the _____ contains any required signatures. a. control zone b. authorization zone c. totals zone d. heading zone

authorization zone

A system design where the server performs all the processing is described as _____.​ a. ​ dataflow architecture b. ​ mainframe architecture c. ​ workstation architecture d. ​ cache architecture

b

In a(n) _____, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen.​ a. ​ open design b. ​ centralized design c. ​ distributed design d. ​ closed design

b

In addition to centralized data processing, the earliest systems performed all data input and output at a central location, often called a _____.​ a. ​ portal b. ​ data processing center c. ​ web-centric hub d. ​ thin client

b

Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.​ a. ​ desk area network (DAN) b. ​ local area network (LAN) c. ​ storage area network (SAN) d. ​ wide area network (WAN)

b

The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase — systems implementation.​ a. ​ data frames b. ​ detailed costs c. ​ web-based components d. ​ access points

b

Wireless network speed is measured in _____.​ a. ​ Bps (bits per second) b. ​ Gbps (gigabits per second) c. ​ Kbps (kilobytes per second) d. ​ Tbps (terabytes per second)

b

c

b

relies on collective data paths to increase bandwidth and range.​ a. ​ Microsoft Visio b. ​ Multiple input/multiple output (MIMO) technology c. ​ Bluetooth d. ​ Supply chain management (SCM)

b

_____ is the amount of data that can be transferred in a fixed time period.​

bandwidth

A ____ is a formal reference point that measures system characteristics at a specific time.

baseline

To measure system performance, companies use ____ testing, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.

benchmark

A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.​

bluetooth

In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data. a. instruction zone b. authorization zone c. body zone d. heading zone

body zone

In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision.

build or buy

​In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision. a. ​build or buy b. ​subscription c. ​build or make d. ​transactional

build or buy

In a _____, a single communication path connects the network server, departmental servers, workstations, and peripheral devices.​

bus network

A _____ resembles a group of computers in which data flows in only one direction from one device to the next.​ a. ​ star network b. ​ hierarchical network c. ​ ring network d. ​ bus network

c

A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.​ a ​data frame b ​hub c ​platform d ​bandwidth

c

A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.​ a. ​ iOS b. ​ blog c. ​ wiki d. ​ portal

c

Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. ​ a. ​ legacy systems b. ​ distributed systems c. ​ web-centric systems d. ​ mission-critical systems

c

Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. ​ One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend?​ a. ​ A star network b. ​ A hub network c. ​ A mesh network d. ​ A bus network

c

Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. ​ Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client?​ a ​A bus network b ​A hub network c ​A star network d ​A ring network

c

The _____ describes how data actually moves from an application on one computer to an application on another networked computer.​ a. ​ subscription model b. ​ five forces model c. ​ OSI (Open Systems Interconnection) model d. ​ object-oriented database model

c

The way a network is configured is called the _____. a ​network baseline b ​network index c ​network topology d ​network orientation

c

When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.​ a ​safe mode b ​mission-critical mode c ​stand-alone mode d ​quirks mode

c

_____ describes the way the components in a network interact.​ a. ​ Engagement topology b. ​ Interactive topology c. ​ Logical topology d. ​ Physical topology

c

_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. a. ​ Interoperability b. ​ Transparency c. ​ Scalability d. ​ Redundancy

c

In the accompanying figure, any field that serves as a primary key is called a _____.

candidate key

Although the vast majority of reports are designed graphically, some systems still produce one or more _____ that use a character set with fixed spacing. a. fixed-spaced reports b. character-based reports c. figure-based reports d. plot-spaced reports

character-based reports

​Although the vast majority of reports are designed graphically, some systems still produce one or more _____ reports that use a character set with fixed spacing. a. ​figure-based reports b. ​plot-spaced reports c. ​fixed-spaced reports d. ​character-based reports

character-based reports

In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group. a. dialog box b. list box c. text box d. check box

check box

Eamon is planning to start an online store that specializes in books and electronics. Since it's his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. ​ ​ Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which code would you suggest that Eamon use?

cipher code

The term "_____" generally refers to systems that divide processing between one or more networked clients and a central server.

client/server

The term _____ generally refers to systems that divide processing between one or more networked clients and a central server. ​

client/server

A _____ is a set of letters or numbers that represents a data item.

code

Many organizations require a more formal type of desk checking called a structured walkthrough, or ____ review.

code

A module that performs a single function or task has a high degree of ____, which is desirable.

cohesion

A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together. a. existence check b. combination check c. data type check d. reasonableness check

combination check

In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help. a. command button b. option button c. toggle button d. help button

command button

If a primary key combines two or more fields, then it is called a _____.

composite key

In a structure chart, a(n) ____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.

condition

​In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.

condition

User documentation ____.

consists of instructions and information to users who will interact with the system

Operations documentation ____.

contains all the information needed for processing and distributing online and printed output

Risk ____ develops safeguards that reduce risks and their impact.

control

A _____ usually causes specific actions, such as printing subtotals for a group of records in a report. a. control break b. concatenation character c. subgroup d. character break

control break

To produce a control break report, the records must be arranged, or sorted, in _____. a. control break order b. control field order c. subgroup field order d. character break order

control field order

In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms. a. control zone b. heading zone c. totals zone d. authorization zone

control zone

A(n) _____ provides access for customers, employees, suppliers, and the public.​ a. ​ application server b. ​ thick client c. ​ corporate portal d. ​ mainframe architecture

corporate portal

As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by ____ maintenance.

corrective

A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities. a. hash topology notation b. crow's foot notation c. big O notation d. dark resistor's notation

crow's foot notation

A _____, such as that illustrated in the accompanying figure, has a central networking device that manages the network.​ a. ​ bus network b. ​ ring network c. ​ hierarchical network d. ​ star network

d

A disadvantage of a bus network is that _____.​ a. ​ data flows in only one direction from one computer to the next b. ​ failure in one workstation necessarily affects other workstations on the network c. ​ devices cannot be attached or detached without disturbing the rest of the network d. ​ performance can decline as more users and devices are added

d

A new system might have to interface with one or more _____, which are older systems that use outdated technology. a. ​ intrusion detection systems b. ​ mission-critical systems c. ​ enterprise resource planning (ERP) systems d. ​ legacy systems

d

In a _____, a single communication path connects the network server, departmental servers, workstations, and peripheral devices.​ a. ​ hierarchical network b. ​ star network c. ​ ring network d. ​ bus network

d

In a typical system design specification, in the _____ section, start-up processing, initial data entry or acquisition, user training requirements, and software test plans are specified. ​ a. ​ executive summary b. ​ system components c. ​ system environment d. ​ implementation requirements

d

Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment. ​ a. ​ advanced data b. ​ primary data c. ​ qualitative data d. ​ legacy data

d

Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. ​ One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend?​ a ​A bus network b ​A hub network c ​A star network d ​A mesh network

d

Sam has been asked to classify a number of different processing systems that his consultancy's client uses. Sam is analyzing a processing system and he has determined that it is an online processing system and not a batch processing system. Which of the following observations helped him determine the system?​ a ​The system allowing delays in transactions b ​The system's tasks running on a predetermined schedule, without user involvement c ​The system avoiding a constant dialog between the user and the system d ​The system processing transactions completely when and where they occur

d

The _____ was formed in 1999 to certify interoperability of wireless network products based on IEEE 802.11 specifications.​ a. ​ World Wide Web Consortium (W3C) b. ​ Wi-MAX c. ​ Institute of Electrical and Electronics Engineers (IEEE) d. ​ Wi-Fi Alliance

d

_____ is the amount of data that can be transferred in a fixed time period.​ a. ​ Resolution b. ​ Dimensionality c. ​ Topology d. ​ Bandwidth

d

_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.​ a. ​ System file checker b. ​ Legacy data c. ​ Multipath design d. ​ System architecture

d

During _____, existing data is loaded into the new system

data conversion

​During _____, existing data is loaded into the new system.

data conversion

A _____ controls database operations, including storing, retrieving, updating, and deleting data. a. data definition language b. data query language c. data manipulation language d. data device language

data manipulation language

A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.

data structure

A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. a. data load rule b. data validation rule c. data requirements rule d. data mining rule

data validation rule

Typically, a database management system is managed by a person called a _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.

database administrator

A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.

database management system

Program documentation ____.

describes the inputs, outputs, and processing logic for all program modules

In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.

design

In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. a. system prototyping b. command prototyping c. design prototyping d. layout prototyping

design prototyping

A(n) ____ produces one or more lines of output for each record processed. A) detail report B) exception report C) summary report D) exigency report

detail report

A(n) _____ produces one or more lines of output for each record processed. a. detail report b. exception report c. summary report d. exigency report

detail report

The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase — systems implementation.

detailed costs

The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase — systems implementation.​

detailed costs

Application ____ is the process of constructing the programs and code modules that serves as the building blocks of an information system.

development

If variable input data is needed, a _____ must be provided to explain what is needed. a. dialog box b. list box c. menu bar d. toggle button

dialog box

As the accompanying figure illustrates, the ____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational.

direct cutover

A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily. a. command-line b. disked c. thick d. diskless

diskless

In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.​

distributed database management system (DDBMS)

In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.​ a. ​ distributed data frame b. ​ distributed supply chain management (DSCM) scheme c. ​ distributed database management system (DDBMS) d. ​ distributed data dictionary

distributed database management system (DDBMS)

Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.

distributed systems

Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. ​

distributed systems

Compared to mainframe architecture, these increase concerns about data security and integrity because many individual clients require access to perform processing.

distributed systems

Perfective maintenance usually is cost effective ____ the system's operational life.

during the middle of

The inherent efficiency of high-volume processing on larger computers is called _____.

economy of scale

Software ____ is a software development process that stresses solid design, effective structure, accurate documentation, and careful testing.

engineering

A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

entity-relationship diagram (ERD)

A(n) _____ is a technique that uses a common yardstick to measure an compare vendor ratings.

evaluation model

A(n) _____ displays only those records that meet a specific condition or conditions. a. detail report b. exception report c. summary report d. exigency report

exception report

A(n) _____ is a data validation rule that is used for applying to mandatory data items. a. sequence check b. range check c. asynchronic check d. existence check

existence check

The _____ allows the expansion of wireless access over a wide area. ​

extended service set (ESS) topology

A common field is an attribute that appears in only one entity.

false

A primary key is composed of exactly two fields.

false

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

false

A schema is a set of letters or numbers that represents a data item.

false

A secondary key is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

false

A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.

false

A thin client design locates all or most of the application processing logic at the client.

false

A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.

false

A web-based data design requires users to have powerful workstations.

false

Cipher codes distinguish items by using a series of subgroups of digits.

false

Compared to mainframe architecture, distributed systems decrease concerns about data security and integrity because fewer individual clients require access to perform processing.

false

Encryption is the process of creating table designs by assigning specific fields or attributes to each table in the database.

false

Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services.

false

In a closed design, the remote user's keystrokes are transmitted from his or her terminal to the mainframe, which responds by sending screen output back to the user's screen.

false

In a table or file, each column represents a record and each row represents a field.

false

Like a primary key, a foreign key must be unique.

false

Mainframe storage refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored.

false

Most magazine subscription codes are action codes.

false

The database and the Internet speak the same language.

false

The three normal forms constitute a progression in which second normal form represents the best design.

false

Today, few ASPs offer full-scale Internet business services for companies that decide to outsource those functions.

false

Web-based designs are dependent on a specific combination of hardware and software.

false

`​Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time.

false

​Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned

false

​The skill set required to develop documentation usually is the same as that required to develop a system.

false

A _____ system allows a customer to request a fax using email, via the company website or by telephone. a. faxback b. frontfax c. turnfax d. digifax

faxback

​A _____ system allows a customer to request a fax using email, via the company website or by telephone. a. ​faxback b. ​frontfax c. ​digifax d. ​turnfax

faxback

At the end of the systems implementation phase, the final report to management should include ____.

final versions of all system documentation a comparison of actual costs and schedules to the original estimates planned modifications and enhancements to the system that have been identified

A table is in _____ if it does not contain a repeating group.

first normal form

In a structure chart, a control couple shows a message, also called a status ____, which one module sends to another.

flag

In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

foreign key

The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.

functional baseline

The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered. a. good input, bad output (GIBO) b. garbage in, garbage out (GIGO) c. poor start, poor finish (PSPF) d. weak hand, weak hold (WHWH)

garbage in, garbage out (GIGO)

This is a device that connects network segments, determines the most efficient data path, and guides the flow of data.

gateway

Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s. a. command line interface b. binary line interface c. character user interface d. graphical user interface

graphical user interface (GUI)

When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic e-commerce environment.

greater initial investment but provides more flexibility

When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic ecommerce environment. ​

greater initial investment but provides more flexibility

Centralized IT departments no longer produce reams of printed _____ reports. a. batch b. greenbar c. audit d. yellowbar

greenbar

In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices.

hierarchical network

In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices. ​

hierarchical network

Risk ____ analyzes the organization's assets, threats, and vulnerabilities.

identification

In a typical system design specification, in the _____ section, start-up processing, initial data entry or acquisition, user training requirements, and software test plans are specified. a. system environment b. implementation requirements c. executive summary d. system components

implementation requirements

The software that a company's IT department makes, builds, and develops is called _____.

in-house software

This is another name for the wireless configuration in which a central wireless device is used to serve all wireless clients.

infrastructure mode

Lisa and her team have finished the coding of a new application, and they are ready to begin testing. She asks Tina, a senior software tester, for help in designing the types of tests that Lisa and her team should perform. ​Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together correctly. What is one of the names of this type of testing?

integration testing

Testing two or more programs that depend on each other is called _____.

integration testing

Some firms offer ____, which provide powerful Web-based support for transactions such as order processing, billing, and customer relationship management.

internet business services (IBS)

Perfective maintenance ____.

involves changing an operational system to make it more efficient, reliable, or maintainable

During the systems design phase, _____ are used to organize, access, and maintain data structures.

key fields

Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment.

legacy data

Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment. ​

legacy data

A new system might have to interface with one or more _____, which are older systems that use outdated technology. a. enterprise resource planning (ERP) systems b. mission-critical systems c. intrusion detection systems d. legacy systems

legacy systems

​ A new system might have to interface with one or more _____, which are older systems that use outdated technology.

legacy systems

If a module must perform multiple tasks, ____.

less complex coding is required

T he given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a structure chart.

library

Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources

local area network (LAN)

Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.​

local area network (LAN)

In a structure chart, a curved arrow represents a ____, which indicates that one or more modules are repeated.

loop

​In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated.

loop

A system design where the server performs all the processing is described as _____.

mainframe architecture

When setting priorities, many IT managers believe that evaluating all projects together leads to the best possible decisions because ____.

maintenance and new development require similar IT department resources

The data mining technique that relies on association rule learning is often called _____.

market basket analysis

Input _____ is a template or pattern that restricts data entry and prevents errors. a. pattern b. mask c. legend d. key

mask

​Input _____ is a template or pattern that restricts data entry and prevents errors. a. ​mask b. ​pattern c. ​legend d. ​key

mask

A class diagram includes the class ____, which represent the program logic.

methods

A class diagram includes the class _____, which represent the program logic.

methods

In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth. a. ​ middleware b. ​ malware c. ​ groupware d. ​ shareware

middleware

To bridge the gap between a database and the Internet, it is necessary to use _____, which is software that integrates different applications and allows them to exchange data.

middleware

Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems.​ a. ​public domain software b. ​shareware c. ​freeware d. ​middleware

middleware

Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.

mnemonic

In a(n) _____ design, one can create individual components that connect to a higher-level program or process. a. integral b. dissociated c. modular d. archetypical

modular

A _____ consists of related program code organized into small units that are easy to understand and maintain.

module

In most organizations, ____ IT department effort goes into supporting existing systems and making them more valuable to users.

more than half of all

A _____ language feature allows users to type commands or requests in normal text phrases. a. normal b. natural c. standard d. basal

natural

​A _____ language feature allows users to type commands or requests in normal text phrases. a. ​standard b. ​normal c. ​basal d. ​natural

natural

The _____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur.​ a. ​net present value (NPV) b. ​return on investment (ROI) c. ​acquisition process d. ​payback analysis

net present value (NPV)

The way a network is configured is called the _____.

network topology

Which of the following is not an advantage of the release methodology?

new features or upgrades are available more often

Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas.

newsgroups

Any field that is not a primary key or a candidate key is called a _____.

nonkey field

Indications that a system has reached the end of its economically useful life include ____.

operational costs and execution times are decreasing rapidly

Companies use various _____ methods to maintain output integrity and security. a. output stream b. output aesthetic c. output control d. output data

output control

Possible disadvantages of rotating IT staff from maintenance to new systems groups include ____.

overhead costs increase when people move from one job to another systems analysts have less opportunity to become skilled at any one job

In ____ programming, two programmers work on the same task on the same computer.

parallel

As the accompanying figure illustrates, the ____ changeover method requires that both the old and the new information systems operate fully for a specific period.

parallel operation

In this changeover method both the old and the new information systems operate fully for a specific period.

parallel operation

A disadvantage of a bus network is that _____.

performance can decline as more users and devices are added

A disadvantage of a bus network is that _____.​

performance can decline as more users and devices are added

As the accompanying figure illustrates, the ____ changeover method allows the new system to be implemented in stages, or modules.

phased operation

A _____ describes the actual process of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reporters and so on.

physical design

_____ describes the actual network cabling and connections.​

physical topology

As the accompanying figure illustrates, the ____ changeover method involves implementing the complete new system at a selected location of the company.

pilot operation

This changeover method involves implementing the complete new system at a selected location of the company.

pilot operation

A popular security solution is the use of a network-based application, often called a _____, which controls access to and from workstation interfaces. a. port synchronizer b. port connector c. port installer d. port protector

port protector

A _____ is an entrance to a multifunction website.

portal

A _____ is an entrance to a multifunction website.​

portal

In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identify a particular member of an entity.

primary key

A(n) ____ is an unauthorized attempt to increase permission levels.

privilege escalation attack

In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system. a. physical-control b. process-control c. quality-control d. network-control

process-control

​The environment for the actual system operation is called the _____.

production environment

User documentation includes ____.

program, systems analyst, programmer, and system identification

A main objective of a service desk is to ____.

provide answers to technical or operational questions make users more productive by teaching them how to meet their own information needs

When developing a training program, which of the following guidelines should be kept in mind?

provide for learning by hearing, seeing, and doing

With a _____, users provide an example of the data requested.

query by example language

A(n) _____ allows a user to specify a task without specifying how the task will be accomplished. a. query language b. imperative language c. procedural language d. query by example language

query language

A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. a. sequence check b. range check c. asynchronous check d. existence check

range check

A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong. a. sequence check b. range check c. validity check d. reasonableness check

reasonableness check

In an entity-relationship diagram, entities are commonly represented as _____.

rectangles

One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems. a. referential integrity b. candidate integrity c. combinatorial integrity d. foreign integrity

referential integrity

The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information. a. total field b. report header c. report footer d. character field

report footer

The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information. a. control head b. report header c. report footer d. character head

report header

A _____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.​ a. ​request for quotation (RFQ) b. ​request for proposal (RFP) c. ​return on investment (ROI) d. ​present net value (PNV)

request for proposal (RFP)

​When companies use a _____, they already know the specific products or service they want and need to obtain price estimates or bids from vendors.

request for quotation (RFQ)

Preventive maintenance ____.

requires analysis of areas where trouble is likely to occur in order to avoid problems

In sequence, the four steps typically followed to create a structure chart are ____.

review the DFDs; identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary

A _____ resembles a group of computers in which data flows in only one direction from one device to the next.

ring network

A _____ resembles a group of computers in which data flows in only one direction from one device to the next.​

ring network

This is a process that automatically allows a wireless client to associate with a stronger access point.

roaming

This is used to connect any network topology to a larger, dissimilar network.

router

Preset ____ determine whether a firewall will allow network traffic to pass.

rules

This is important in implementing systems that are volume-related, such as transaction processing systems.

scalability

_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

scalability

Cloud computing provides _____, which matches resources to needs at any given time.​ a. ​ point-of-sale (POS) terminal b. ​ roaming service c. ​ resource management d. ​ scaling on demand

scaling on demand

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____. a. cell b. schema c. viewport d. framework

schema

A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.

second normal form

A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.

secondary key

When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.

service

Eamon is planning to start an online store that specializes in books and electronics. Since it's his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. ​ ​ Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product's warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which code would you suggest that Eamon use?

significant digit code

When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.

software license

When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.​ a. ​software license b. ​fixed fee model c. ​supplemental maintenance agreement d. ​request for proposal

software license

Which of the following is a software collection obtained from a vendor or application service provider?

software package

Which of the following is a software collection obtained from a vendor or application service provider? a. ​software package b. ​software cluster c. ​software aggregate d. ​software metric

software package

In the context of in-house software development options, companies that develop software for sale are called _____.

software vendors

A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction. a. transaction document b. recovery document c. source document d. tester document

source document

When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.

stand-alone mode

Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key. a. viewport notation format b. distinct notation format c. standard notation format d. multifaceted notation format

standard notation format

A _____, such as that illustrated in the accompanying figure, has a central networking device that manages the network.​

star network

​In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another.

status flag

Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design. a. storyboard b. viewbox c. viewport d. wireframe

storyboard

​Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design. a. ​storyboard b. ​wireframe c. ​viewport d. ​viewbox

storyboard

A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information.​

structure chart

​A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information.​

structure chart

In a technique called ____ testing, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.

stub

​In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.

stub testing

In a top-down design, the overall objectives of a system are broken down into ____ in a process called partitioning.

subsystems modules

For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate. a. detail report b. exception report c. summary report d. exigency report

summary report

Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____.​ a. ​ supply chain management (SCM) b. cloud computing c. ​ stand-alone computing d. ​ behavioral management

supply chain management (SCM)

The ____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.

system administrator

_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.​ a. Multipath design b. Legacy data c. System architecture d. System file checkers

system architecture

In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications.

system components

In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications.​ a. ​ system components b. ​s ystem summaries c. ​ implementation environments d. ​ implementation requirements

system components

In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

system environment

After completing integration testing, a systems analyst must perform _____, which involves the entire information system and includes all typical processing situations.

system testing

The goal of _____ is to build a system that is effective, reliable, and maintainable. a. systems reporting b. systems analysis c. systems design d. systems auditing

systems design

A _____ specifies the fields and identifies the primary key in a particular file. a. frame design b. table design c. window d. viewport

table design

When planning capacity, detailed information is needed about ____.

the number of threats and critical risks posed to a system

A _____ design locates all or most of the processing logic on the server.

thin client

A ____ is an internal or external entity that could endanger an asset.

threat

In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature that is used to represent on or off status and switches to the other status when clicked. a. command button b. option button c. toggle button d. help button

toggle button

Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands. a. menu box b. toolbar c. dialog box d. taskbar

toolbar

In a(n) ____ approach, the systems analyst documents the system's requirements and then breaks them down into subsystems and modules.

top-down

​Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.

top-down approach

The way a network is configured is called the _____.

topology

Using a ____ strategy, knowledgeable users can be selected who then conduct sessions for others.

train-the-trainer

A(n) _____ does not distract a user and calls no attention to itself. a. transparent interface b. translucent interface c. opaque interface d. pellucid interface

transparent interface

A 3NF design avoids redundancy and data integrity problems that still can exist in 2NF designs.

true

A device called a proxy server provides Internet connectivity for internal LAN users.

true

A logical record is a set of field values that describes a single person, place, thing, or event.

true

A main advantage of ERP is that it describes a specific hardware and software environment, also called a platform, which ensures connectivity and easy integration of future systems, including in-house software and commercial packages.

true

A router is a device that connects network segments, determines the most efficient data path, and guides the flow of data.

true

A subschema is a view of the database used by one or more systems or users.

true

An M:N relationship is different from 1:1 or 1:M relationships because the event or transaction that links the two entities is actually a third entity, called an associative entity, that has its own characteristics.

true

An in-house solution usually requires a greater initial investment but provides more flexibility for a company that must adapt quickly in a dynamic e-commerce environment.

true

As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.

true

Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.

true

Batch processing means that data is managed in groups or batches.

true

By the time the final design presentation is delivered, all necessary approvals should have been obtained from prior presentations, and the users and IT department should be onboard.

true

Client/server architecture does involve performance issues that relate to the separation of server-based data and networked clients that must access the data.

true

Cloud computing requires less bandwidth than traditional client/server networks.

true

College course numbers usually are assigned using a block sequence code.

true

Common fields can be used to link entities in various types of relationships.

true

Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.

true

In contrast to a centralized system, a client/server design separates applications and data.

true

Middleware can be seen as representing the slash in the term client/server.

true

Migrating a traditional database design to the web can require design modification, additional software, and some added expense.

true

Some view Web 2.0 as a stepping stone toward the semantic web, called Web 3.0 by some, where the documents shared on the Internet have semantics and not just syntax.

true

System architecture marks the end of the systems design phase of the SDLC.

true

Systems that interact with a DBMS are relatively independent of how the physical data is maintained.

true

The advantage of the application logic layer is that a three-tier design enhances overall performance by reducing the data server's workload.

true

The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.

true

Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.

true

To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.

true

Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.

true

​The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.

true

​To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year.

true

Printed output is used in _____, which are output documents that are later entered back into the same or another information system. a. milestone documents b. tender documents c. turnaround documents d. policy documents

turnaround documents

Binary digits have only _____ possible value(s).

two

During ____ testing, programmers must test programs that interact with other programs and files individually, before they are integrated into the system.

unit

The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.

unit

The testing of an individual module is called ____ testing.

unit

A table design that contains a repeating group is called _____. a. unnormalized b. synchronized c. normalized d. unsynchronized

unnormalized

A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness. a. testability b. usability c. encapsulation d. abstraction

usability

Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system. a. encapsulation metrics b. abstraction metrics c. ergonomic metrics d. usability metrics

usability metrics

A(n) _____ is an outsourcing fee model that charges variable fee based on the volume of transactions or operations performed by the application.

usage model

In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application.

user interface

If significant changes take place in an existing system or if a new version is released, the IT department might develop a ____.

user training package

In a _____ system, the distinction blurs between input, output, and the interface itself. a. user-centered b. topology-centered c. system-centered d. network-centered

user-centered

Unless a problem must be corrected, or modifications or enhancements must be made, access to the operational environment is limited to ____ and must be strictly controlled.

users

​Discuss cloud computing at length, including its advantages and disadvantages.

uses a cloud symbol to represent the internet, which is transparent to users and provides a hardware-independent environment. Where remotes servers handle all processing and computing functions and the internet itself replaces traditional networks + accessibility + scale and cost + little to no maintenance + innovative - security - lack of control - lock-in -reliability

A(n) _____ is a data validation rule that can be used for data items that must have certain values. a. existence check b. validity check c. batch check d. reasonableness check

validity check

A software package developed to handle information requirements for a specific type of business is called a(n) _____.​ a. ​vertical application b. ​asymmetric application c. ​horizontal application d. ​symmetric application

vertical application

A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy.​

web-centric architecture

A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy.​ a. ​ data processing center b. ​ web-centric architecture c. ​ corporate portal d. ​ thin client

web-centric architecture

To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet. a. netpod b. podread c. webOS d. webcast

webcast

​To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet. a. ​netpod b. ​webcast c. ​podread d. ​webOS

webcast

These are broadband wireless communications protocols for metropolitan area networks (MANs).

wi-MAX

A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.

wiki

A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.​ a. iOS b. portal c. wiki d. blog

wiki

A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.

wireless local area network (WLAN)

A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.​

wireless local area network (WLAN)

​ Which of the following are the advantages of using a distributed database management system (DDBMS)?

​ -The system is less likely to experience a catastrophic failure when data is stored in various locations. ​ -The system is scalable, so new data sites can be added without reworking the system design. ​ -The data stored closer to users can reduce network traffic.

​data validation rule

​A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.

​* reasonableness check

​A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong.

Roger is part of a team that is responsible for employing a new information system, the design of which was developed using customary structured methods. To manage the intricacy of the application development process, Roger wants to deploy structured development techniques, and he asks Pete, his coworker, for information about these techniques. Pete tells him about structure charts, which show program modules and the relationships among them using various graphical symbols. ​ ​Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition?

​A line with a diamond on one end

True

​A transparent interface does not distract a user and calls no attention to itself.

​transparent interface

​A(n) _____ does not distract a user and calls no attention to itself.

​combination check

​A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together.

​existence check

​A(n) _____ is a data validation rule that is used for applying to mandatory data items.

False

​An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals.

​graphical user interface

​Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.

​The Software Engineering Institute (SEI)established a new model, called _____, which incorporates software and systems development into a much larger framework.

​Capability Maturity Model Integration (CMMI)

_____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.​ a. ​Grid computing b. ​Cloud computing c. ​Mainframe computing d. ​Utility computing

​Cloud computing

​_____ help offers assistance for a task in progress. a. ​Context-sensitive b. ​User-selected c. ​User-sensitive d. ​Standard-selected

​Context-sensitive

​_____ is the process of reviewing a program code to spot logic errors, which produce incorrect results.

​Desk checking

​_____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.

​Flowcharts

​_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen. a. ​Form uploading b. ​Form resetting c. ​Form filling d. ​Form pulling

​Form filling

​dialog box

​If variable input data is needed, a _____ must be provided to explain what is needed.

​command button

​In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help.

​authorization zone

​In a source document, the _____ contains any required signatures.

​body zone

​In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.

​_____ requires that a software supplier document all testing and maintain records of test results.

​International Organization for Standardization (ISO)

​_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. a. ​Ergonomics b. ​Aesthetics c. ​Output security d. ​Interface technology

​Output security

​When developing a training program, which of the following guidelines should be kept in mind?

​Select the most effective place to conduct the training.

_____ is the process of putting a new information system online and retiring the old system.

​System changeover

​garbage in, garbage out (GIGO)

​The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered.

​Form filling

​_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen.

​System prototyping

​_____ produces a full-featured, working model of the information system.

​A secure system includes _____ that can log every instance of data entry and changes. a. ​audit trails b. ​batch trails c. ​control trails d. ​trap trails

​audit trails

​In a source document, the _____ contains any required signatures. a. ​control zone b. ​heading zone c. ​totals zone d. ​authorization zone

​authorization zone

​In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group. a. ​check box b. ​dialog box c. ​list box d. ​text box

​check box

​A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together. a. ​data type check b. ​combination check c. ​reasonableness check d. ​existence check

​combination check

​In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help. a. ​toggle button b. ​help button c. ​command button d. ​option button

​command button

Operations documentation _____.

​contains all the information needed for processing and distributing online and printed output

​Operations documentation _____.

​contains all the information needed for processing and distributing online and printed output

​A _____ usually causes specific actions, such as printing subtotals for a group of records in a report. a. ​concatenation character b. ​subgroup c. ​character break d. ​control break

​control break

​In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms. a. ​heading zone b. ​control zone c. ​totals zone d. ​authorization zone

​control zone

​In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. design prototyping

​design prototyping

​A(n) _____ produces one or more lines of output for each record processed. a. ​detail report b. ​exception report c. ​exigency report d. ​summary report

​detail report

​If variable input data is needed, a _____ must be provided to explain what is needed. a. ​dialog box b. ​toggle button c. ​list box d. ​menu bar

​dialog box

​A(n) _____ displays only those records that meet a specific condition or conditions. a. ​exigency report b. ​exception report c. ​summary report d. ​detail report

​exception report

​A(n) _____ is a data validation rule that is used for applying to mandatory data items. a. ​asynchronic check b. ​sequence check c. ​existence check d. ​range check

​existence check

​Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s. a. ​binary line interface b. ​character user interface c. ​graphical user interface d. ​command line interface

​graphical user interface

​Companies use various _____ methods to maintain output integrity and security. a. ​output aesthetic b. ​output control c. ​output data d. ​output stream

​output control

​A popular security solution is the use of a network-based application, often called a _____, which controls access to and from workstation interfaces. a. ​port connector b. ​port protector c. ​port synchronizer d. ​port installer

​port protector

​A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong. a. ​reasonableness check b. ​sequence check c. ​range check d. ​validity check

​range check

​A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. a. sequence check​ b. ​asynchronous check c. ​range check d. ​existence check

​range check ​

The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.​ a. ​report footer b. ​total field c. ​report header d. ​character field

​report footer

​The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information. a. ​control head b. ​report footer c. ​character head d. ​report header

​report header

​A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction. a. ​recovery document b. ​transaction document c. ​tester document d. ​source document

​source document

​For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate. a. ​summary report b. ​exception report c. ​detail report d. ​exigency report

​summary report

​The goal of _____ is to build a system that is effective, reliable, and maintainable. a. ​systems analysis b. ​systems reporting c. ​systems auditing d. ​systems design

​systems design

​In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature that is used to represent on or off status and switches to the other status when clicked. a. ​command button b. ​option button c. ​toggle button d. ​help button

​toggle button

​A(n) _____ does not distract a user and calls no attention to itself. a. ​transparent interface b. ​pellucid interface c. ​opaque interface d. ​translucent interface

​transparent interface

​A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness. a. ​usability b. ​encapsulation c. ​testability d. ​abstraction

​usability

​Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system. a. ​ergonomic metrics b. ​encapsulation metrics c. ​abstraction metrics d. ​usability metrics

​usability metrics

​In a _____ system, the distinction blurs between input, output, and the interface itself. a. ​user-centered b. ​system-centered c. ​topology-centered d. ​network-centered

​user-centered

​A(n) _____ is a data validation rule that can be used for data items that must have certain values. a. ​existence check b. ​reasonableness check c. ​validity check d. ​batch check

​validity check

​service provider

A firm that offers outsourcing solutions is called a _____.​

48. _____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service. a. Restructuring b. Capacity planning c. Resource sizing d. Reorganizing

Capacity planning

58. A(n) _____ is an attack that takes advantage of a vulnerability. a. proxy b. exploit c. firewall d. archive

Exploit

63. One of his firm's clients details an incident in which a hacker — a former employee — thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident? a. Vandalism b. Trespass and espionage c. Extortion d. Software attack

Extortion

1. As enterprise-wide information systems grow more complex, configuration management becomes trivial.

False: becomes more complex

2. Bandwidth requirements are expressed in bytes per minute.

False: bits per second (bps)

8. Wrapping refers to the practice of storing backup media away from the main business location, in order to mitigate the risk of a catastrophic disaster, such as a flood, fire, or earthquake.

False: offsitting

3. In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key.

False: public key and private key

5. In a secluded engineering attack, an intruder uses social interaction to gain access to a computer system.

False: social engineering attack

11. Both adaptive and perfective maintenance activities decrease in a dynamic business environment.

False: they increase

6. One highly publicized form of social engineering is called post texting, which is a method of obtaining personal information under false pretenses.

False: this is pretexting

13. When network traffic is encrypted, it is invisible and its content and purpose are masked.

False:visible

41. _____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action. a. Benchmark testing b. Throughput management c. Responsive testing d. Fault management

Fault management

64. Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat? a. Human error b. Technical obsolescence c. Service failure d. Espionage

Technical obsolescence

15. If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____. a. user training package b. user presence software c. maintenance module d. utility index

User training package

57. A _____ is a security weakness or soft spot. a. proxy b. vulnerability c. firewall d. malware

Vulnerabiltiy

middleware

Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems.​

68. A(n) _____ can prevent an unauthorized person from booting a computer by using a CD-ROM or USB device. a. boot-level password b. application-level password c. BIOS-level password d. power-on password

-Boot-level password -BIOS-level password -Power-on password

​logical design

A _____ defines what must take place, not how it will be accomplished.​

67. Response time is affected by _____. a. system design b. capabilities c. follow-up messages d. processing methods

-System design -Capabilities -Processing methods

C) methods

A class diagram includes the class ____, which represent the program logic. A) attributes B) events C) methods D) characters

22. As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance. a. corrective b. adaptive c. perfective d. preventive

Adaptive

27. Perfective maintenance usually is cost effective _____ a system's operational life. a. early in b. during the middle of c. during the end of d. throughout

During the middle of

23. As shown in the accompanying figure, near the end of a system's useful life, _____ when it becomes clear that a company plans to replace the system. a. adaptive, corrective, and perfective maintenance expenses all increase rapidly b. perfective maintenance expenses increase rapidly, but adaptive and corrective maintenance typically decrease c. adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases d. adaptive, corrective, and perfective maintenance expenses all decrease rapidly

Adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases

25. Adaptive maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. competes for resources in an operational system

Adds enhancements to an operational system and makes the system easier to use

39. The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features. a. functional baseline b. operational baseline c. allocated baseline d. product baseline

Allocated baseline

29. In maintenance management, _____ means examining the whole in order to learn about the individual elements. a. synthesis b. adoption c. analysis d. elucidation

Analysis

32. _____ is a process for controlling changes in system requirements during software development. a. Data management b. Disk management c. Configuration management d. Email management

Configuration management

24. Corrective maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. competes for resources in an operational system

Diagnoses and corrects errors in an operational system

B) condition

In a structure chart, a(n) ____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invoked. A) method B) condition C) class D) attribute

True

In a traditional systems development environment, security issues usually are less complex than with web-based systems, because the system operates on a private company network, rather than the Internet.​

A) review the DFDs; identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary

In sequence, the four steps typically followed to create a structure chart are ____. A) review the DFDs; identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary B) identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary; review the DFDs C) add couples, loops, and conditions; analyze the structure chart and the data dictionary; review the DFDs; identify modules and relationships D) analyze the structure chart and the data dictionary; review the DFDs; identify modules and relationships; add couples, loops, and conditions

50. _____ prevents unauthorized users from creating, modifying, or deleting information. a. Availability b. Integrity c. Confidentiality d. Evacuation

Integrity

26. Perfective maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. competes for resources in an operational system

Involves changing an operational system to make it more efficient, reliable, or maintainable

18. _____ costs include expenses for items such as supplies, equipment rental, and software leases. a. Operational b. Corrective c. Maintenance d. Adaptive

Operational

17. A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting. a. high-level synthesis b. wireless fidelity c. word editing software d. remote control software

Remote control software

28. To avoid problems, preventive maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. requires analysis of areas where trouble is likely to occur

Requires analysis of areas where trouble is likely to occur

44. _____ is the overall time between a request for system activity and the delivery of the response. a. Response time b. Throughput time c. Refresh rate d. Base rate

Response time

53. _____ analyzes an organization's assets, threats, and vulnerabilities. a. Risk uncertainty b. Risk diversification c. Risk identification d. Risk control

Risk identification

14. The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life. a. implementation b. verification c. security d. testing

Security

52. The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability. a. security policy b. risk policy c. threat report d. concealment report

Security policy

65. One of George's clients reports that the traffic on their network is being intercepted and scanned for valuable information. How does George categorize this incident? a. Spoofing b. Man in the middle c. Dumpster diving d. Sniffing

Sniffing

66. Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident? a. Social engineering b. Mail bombing c. Spoofing d. Privilege escalation

Social engineering

33. A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team. a. tester b. programmer c. system validator d. system administrator

System administrator

lower bottom-line costs

The main reason for offshore outsourcing is to _____.​

46. _____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency. a. Throughput b. Resolution c. Dimensionality d. Latency

Throughput

10. In a broad sense, credentials include formal degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.

True

47. _____ measures the time between submitting a request for information and the fulfillment of the request. a. Bandwidth b. Turnaround time c. Throughput d. Frequency

Turnaround time

software license

When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.​

Many applications require substantial desktop computing power and resources.

Which of the following is true of a traditional systems development environment?

D) Coupling

____ describes the degree of interdependence among modules. A) Resolution B) Modularity C) Dynamism D) Coupling

​Payback analysis

_____ determines how long it takes an information system to spend for itself through reduced costs and increased benefits.​

Cloud computing

_____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.​

The Transaction Processing Performance Council (TPC)

_____ is an example of a nonprofit organization that publishes standards and reports for its members and the general public.​

​Software as a Service

_____ reduces the customer's need for software maintenance, operation, and support.​

When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.

service​

When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.​

subscription model


संबंधित स्टडी सेट्स

EFSC Leadership: Chapter 10 Issues of Quality and Safety

View Set

What was the name and where was the location of the capital and cultural center of the Byzantine Empire?

View Set

Chapter 32: stress and coping 1128

View Set

Art Appreciation Midterm Study (Chapters 1 - 15)

View Set