Test 3 Review from Ch. 7-12
Data Design Concepts
*Data Structures* = a framework for organizing, storing, and managing data - consists of files or tables that interact in various ways - each file or table contains data about people, places, things, or events - modern relational database became a standard model for systems developers *Mario and Danica: A Data Design Example* = imagine two shops that are very similar, but use two different information system designs *Mario's Auto Shop* = uses two file-oriented systems (old-fashioned) - *file oriented systems* = these two systems store data in separate files that are not connected or linked, means that some data is stored in two different places, and the data might or might not be consistent AKA REDUNDANCY - the mechanic system uses the mechanic file to store data about shop employees - job system uses the job file to store data about work performed at the shop Danica's Auto Shop* = uses a database management system (modern) - *database management system (DBMS) = with two separate tables that are joined, so they act like one large table - the shop operation system has tables that are linked by the mechanic no. field, which is called a *common field* because it connects the tables (besides this common field, no other data items are duplicated) - *relational database/relational model* = introduced in 1970s and continues to be the dominant approach for organizing, storing, and managing business data - however, DBMSs are not immune to data entry problems *Is File Processing Still Important?* - an older approach where some companies still use this method to handle large volumes of structured data on a regular basis - worked well with mainframe hardware and batch input *The Database Environment* - provides an overall framework that avoids data redundancy and supports a real-time, dynamic environment - *DBMS* = a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data - main advantage of a DBMS is that it offers timely, interactive, and flexible data access - other advantages: A) *Scalability* = which means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise B) *Economy of Scale* = the inherent efficiency of high-volume processing on larger computers - database design allows better utilization of hardware C) *Enterprise-wide application* = a database administrator (DBA) assesses overall requirements and maintains the database for the entire organization rather than a single department or user - database systems can support enterprise-wide applications more effectively than file processing systems D) *Strong Standards* = effective database administration helps ensure that standards for data names, formats, and documentation are followed uniformly throughout the organization E) *Better Security* = The DBA ensures that only legitimate users access the database and different users have different levels of access F) *Data Independence* = Systems that interact with a DBMS are relatively independent of how the physical data is maintained, giving DBA the flexibility to alter data structures without modifying information systems that use the data
Entity-Relationship Diagrams
*Entity-Relationship Diagram (ERD) = is a model that shows the logical relationships and interaction among system entities - provides an overall view of the system and a blueprint for creating the physical data structures *Drawing and ERD* - the first step is to list the entities that you identified during the systems analysis phase and to consider the nature of the relationships that link them - represent entities as rectangles and relationships as diamond shapes - unlike data flow diagrams, entity-relationship diagrams depict relationships, not data or information flows *Three Types of Relationships Can Exist Between Entities* 1) *One-to-one (1 : 1)* = exists when exactly one of the second entity occurs for each instance of the first entity - i.e. one office holds one office manager, one person holds one social security numbers - A number 1 is placed alongside each of the two connecting lines to indicate the 1:1 relationship 2) *One-to-many (1 : M)* = exists when one occurrence of the first entity can relate to many instances of the second entity, but each instance of the second entity can associate with only one instance of the first entity - i.e. one customer has many orders, or one department has many employees, or one train holds many passengers 3) *Many-to-many (M : N)* = exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity - i.e. many students in many classes are linked through registration, many passengers on many flights are linked through reservations - these linkages are known as an *associative entity* *Cardinality* = describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity - A common method of cardinality notation is called *crow's foot notation* because of the shapes, which include circles, bars, and symbols, that indicate various possibilities A) *Single Bar* = indicates one B) *Double Bar* = indicates one and only one C) *Circle* = indicates zero D) *Crow's Foot* = indicates many - *Unified Modeling Language (UML)* = is a widely used method of visualizing and documenting software systems design
*Data Normalization*
*Normalization* = the process of creating table designs by assigning specific fields or attributes to each table in the database - use this to develop an overall database design that is simple, flexible, and free of data redundancy - involves applying a set of rules that can help you identify and correct inherent problems and complexities in your table designs - *table design* = specifies the fields and identifies the primary key in a particular table or file - created by Edgar Codd who formulated the basic principles of relational database design *Four Stages of Normalization Process* 1) *Unnormalized Design* 2) *First Normal Form* 3) *Second Normal Form* 4) *Third Normal Form* = best design *Standard Notation Format* - starts with the name of the table, followed by a parenthetical expression that contains the field names separated by commas. The primary key field(s) is underlined, like this: • NAME (FIELD 1, FIELD 2, FIELD 3) - *repeating group* = a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values - *Unnormalized* = a table design that contains a repeating group *First Normal Form (1NF)* = A table is in first normal form (1NF) if it does not contain a repeating group - When you eliminate the repeating group, additional records emerge — one for each combination of a specific order and a specific product - The result is more records, but a greatly simplified design *Second Normal Form (2NF)* = if it is in 1NF AND if all fields that are not part of the primary key are functionally dependent on the entire primary key - *functionally dependence* = the value of Field A depends on Field B (i.e. the DATE value is functionally dependent on the ORDER because for a specific order number, there can be only one date; in contrast, a product description is NOT dependent on the order number) - Objective is to break the original table into two or more new tables and reassign the fields so that each non-key field will depend on the entire primary key in its table - all fields are functionally dependent on the primary key (ORDER LINE is a primary key, and is a unique combination of two foreign keys - ORDER and PRODUCT) *Third Normal Forms (3NF)* = if it is in 2NF and if no non-key field is dependent on another non-key field - A design is in 3NF if every non-key field depends on the key, the whole key, and nothing but the key - A 3NF design avoids redundancy and data integrity problems that still can exist in 2NF designs - To convert the table to 3NF, you must remove all fields from the 2NF table that depend on another non-key field and place them in a new table that uses the non-key field as a primary key
*Should You Use Codes?*
*Overview of Codes* - Because codes can represent data and they are shorter than the data they represent, they save storage space and costs, reduce data transmission time, and decrease data entry time - Codes can be used to reveal or conceal information - Codes can reduce data input errors - Coded data is easier to remember - The code itself can provide immediate verification that the entry is correct - i.e. student number, postal code *Types of Codes* = Codes should be easy to learn and apply 1) *Sequence Codes* = Numbers or letters assigned in a specific order - Contain no additional information other than an indication of order of entry into the system - i.e. codes are assigned in which employees are hired, you can use the code to see that employee number 584 was hired after employee number 433 but not the actual dates 2) *Block Sequence Codes* = Use blocks of numbers for different classifications - 100-level courses are freshman-level - 200-level courses are sophomore-level 3) *Alphabetic Codes* = Use alphabet letters to distinguish one item from another a) *category codes* = identify a group of related items - i.e. GN for gardening supplies or HW for hardware b) *abbreviation codes* = are alphabetic abbreviations - i.e. NY for New York or ME for Maine - *mnemonic codes* = specific combination of letters that are easy to remember 4) *Significant Digit Codes* = Distinguish items by using a series of subgroups of digits - i.e. postal codes or inventory location codes that consist of two-digit warehouse code, followed by a one-digit floor number code, etc. 5) *Derivation Codes* = Combine data from different item attributes, or characteristics - i.e. subscription codes may have five-digit postal code, followed by the first, third, and fourth letters of the subscriber's last name, the last two digits of the subscriber's house number, and the first, third, and fourth letters of the subscriber's street name 6) *Cipher Codes* = Use a keyword to encode a number - i.e. a retail store might use a 10 letter word such as CAMPGROUND to code wholesale prices, where the letter C represents 1, A represents 2 and so on (thus the code GRAND, indicates that the store paid $562.90 for the item) 7) *Action Codes* = Indicate what action is to be taken with an associated item (X to exit the program) *Designing Codes* ◦ Keep codes concise ◦ Allow for expansion ◦ Keep codes stable ◦ Make codes unique ◦ Use sortable codes ◦ Use a simple structure ◦ Avoid confusion ◦ Make codes meaningful ◦ Use a code for a single purpose ◦ Keep codes consistent
Web-Based Data Design
*Overview* - Web-based Design = where the Internet serves as the front end, or interface, for the database management system - Access to the database requires only a Web browser and an Internet connection - Web-based systems are popular because they offer ease of access, cost-effectiveness, and world-wide connectivity - all of which are vital to companies that must compete in a global economy *Connecting to the Web* = to access data in a Web-based system, the database must be connected to the Internet or Intranet - the database (SQL) and the Internet speak two different languages (HTML) - *Web-based Design Characteristics*: A) *Global Access* (the Internet enables worldwide access) B) *Ease of Use* (Web browsers provide a familiar interface that is user-friendly and easily learned) C) *Multiple Platforms* (all that is required is a browser and an Internet connection) D) *Cost Effectiveness* (initial investment is relatively low because the Internet serves as the communication network, where users require only a browser) E) *Security Issues* (Internet connectivity raises special concerns) F) *Adaptability Issues* (migrating a traditional database design to the Web, can require design modification, additional software, and some added expense) - *middleware* = is software that integrates different applications and allows them to exchange data (can interpret client requests in HTML form and translate the requests into commands that the database can execute) - *data security* = Web-based data must be secure, yet easily accessible to authorized users (three levels of security: the database itself, the Web server, and the telecommunication links that connect the components of the system)
*Data Storage and Access*
*Tools and Techniques* - Companies use data warehousing and data mining as strategic tools to help manage the huge quantities of data they need for business operations and decisions A) *Data warehousing* = An integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company - stores data from several systems - by selecting data dimensions, a user can retrieve specific information without having to know how or where the data is stored B) *Data mining* = Looks for meaningful data patterns and relationships in large amounts of data - *clickstream storage* (another name) - *market basket analysis* (another name) *Logical vs. Physical Storage* *Logical storage* = refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored - consists of alphabetic and numeric characters - a field is called a *data element* or a *data item* = describes a single characteristics/attribute of a person, place, thing, or event - *logical record* = a set of field values that describe a single person, place, thing or even *Physical storage* = is strictly hardware-related because it involves the process of reading and writing binary data to physical media such as a hard drive, CD-ROM, or network-based storage device *Data Coding* *EBCDIC (Extended Binary Coded Decimal Interchange Code)* = A coding method used on mainframe computers and high-capacity servers - requires 8 bits or 1 byte per character *ASCII (American Standard Code for Information Exchange)* = A coding method used on most personal computers - requires 8 bits or 1 byte per character *BINARY* = offers a more efficient storage method because it represents numbers as actual binary values, rather than as coded numeric digits *UNICODE* = Supports virtually all languages and has become a global standard - uses two bytes per character *STORING DATES* - *International Organization for Standardization (ISO)* = requires a format of four digits for the year, two for the month, and two for the day (YYYYMMDD) - *Y2K Issue* = many firms that used only two digits to represent the year were faced with a major problem called the Y2K issue - *absolute date* = the total number of days from some specific base date
DBMS Components
- A DBMS provides an interface between a database and users who need to access the data - A systems analyst need to understand all of the components of a DBMS - A DBMS has a data manipulation language, a schema and subschemas, and a physical data repository *Interfaces for Users, Database Administrators, and Related Systems* A) *Users* = typically work with predefined queries and switchboard commands, but also use query languages to access stored data - *Query Language* = allows a user to specify a task without specifying how the task will be accomplished (some are natural language commands) - *Query By Example (QBE) Language* = the user provides an example of the data requested - *Structured Query Language (SQL)* = a language that allows client workstations to communicate with servers and mainframe computers B) *Database Administrators* = Concerned with data security and integrity, preventing unauthorized access, providing backup and recovery, audit trails, maintaining the database, and supporting user needs - most DBMSs provide utility programs to assist the DBA in creating and updating data structure, collecting and reporting patterns of database usage, and detecting and reporting database irregularities C) *Related Information Systems* = A DBMS can support several related information systems that provide input to, and require specific data from, the DBMS - unlike a user interface, no human intervention is required for two-way communication between the DBMS and the related systems *Data Manipulation Language (DML)* = controls database operations, including storing, retrieving, updating, and deleting data *Schema* = the complete definition of a database, including descriptions of all fields, tables, and relationships, is called a schema - *Subschema* = is a view of the database used by one or more systems or users; defines only those portions of the database that a particular system or user needs or is allowed to access (i.e. database designers use subschemas to restrict the level of access permitted to the project management systems) *Physical Data Repository* - at this stage of the systems development process, the data dictionary is transformed into a physical data repository; which also contains the schema and subschemas - *Open Database Connectivity (ODBC)* = is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data (used to resolve potential database connectivity and access problems) - *Java Database Connectivity (JDBC)* = enable Java applications to exchange data with any database that uses SQL statements and is JDBC-compliant
*Working with a Relational Database*
- Suppose you work in IT, and the sales team needs answers to three specific questions 1) Did any customers receive service after 12/14/2013? If so, who were they? 2) Did technician Marie Johnson put in more than six hours of labor on any service calls? If so, which ones? 3) Were any parts used on service calls in Washington? If so, what were the part numbers, descriptions, and quantities? Steps for First Question 1) Go to Service-Call table and look in the DATE field for dates later than 12/14/2013 2) Three Service Calls meet that condition (10799, 10800, and 10801) 3) Two calls were made to customer 1456 and one call was made to customer 6321 4) Obtain customers name by going to the CUSTOMER table and look up the customer numbers, and identify the two customers as Albert Jones and Mary Belli
69. _____ is concerned with managerial policies and controls that ensure secure operations. a. Procedural security b. Network security c. Operational security d. Application security
-Procedural security -Operational security
70. User documentation includes _____. a. security and audit trail information b. program, systems analyst, programmer, and system identification c. frequently asked questions (FAQs) d. description of source document content, preparation, processing, and samples
-Security and audit trail information -Frequently asked questions (FAQs) -Description of source document content, preparation, processing, and samples
69. If a module must perform multiple tasks, _____. a. the module will be less difficult to create and maintain b. the module will be more difficult to create and maintain c. a less complex coding is required d. a more complex coding is required
-The module will be more difficult to create and maintain && -A more complex coding is required
The characteristics of online processing systems are that _____.
-the systems process transactions completely when and where they occur - users can access data randomly -users interact directly with the information system
B) stub
. In a technique called ____ testing, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. A) modular B) stub C) outcome D) unit
This is an example of a web-based development environment.
.NET
*Data Design Terms*
1) *Entity* = An entity is a person, place, thing, or event for which data is collected and maintained 2) *Table or File* = A table, or file, contains a set of related records that store data about a specific entity - two-dimensional structures that consist of vertical columns and horizontal rows - each column represents a field (characteristic of entity) - each row represents a record (individual occurrence of the entity) 3) *Field* = • A field, also called an *attribute*, is a single characteristic or fact about an entity - *common field* = an attribute that appears in more than one entity 4) *Record* = A record, also called a *tuple* (rhymes with couple), is a set of related fields (characteristics) that describes one instance, or occurrence, of an entity, such as one customer, one order, or one product *Key Fields* = use these to organize, access, and maintain data structures 1) *Primary Key* = a field or combination of fields that uniquely and minimally identifies a particular member of an entity - *combination key* = to identify a specific student in a specific course, the primary key must be a combination of student number and course ID 2) *Candidate Keys* = Any field that could serve as a primary key is called a candidate key - *Non-Key field* = any field that is not a primary key or a candidate key 3) *Foreign Keys* = A common field that exists in more than one table and can be used to form a relationship, or link, between the tables 4) *Secondary Keys* = A field or combination of fields that can be used to access or retrieve records - these keys are not unique - used to sort or display records in a certain order *Referential Integrity* = a type of validity check which is a set of rules that avoids data inconsistency and quality problems - prevent you from entering a customer order in an order table unless that customer already exists in the customer table - *orphan* = what an order is called when it has no related customer (when there is no referential integrity to prevent this from happening) - can also prevent the deletion of a record if the record has a primary key that matches foreign keys in another table
34. In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____. a. 2.1 b. 1.1 c. 0.1 d. 2.1
1.1
In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.
1.1
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.
32
This is a standard that increased bandwidth to 54 Mbps
802.11g
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity. a. user application b. user interface c. user query d. user configuration
A
A firm that offers outsourcing solutions is called a _____. a. service provider b. resource provider c. software provider d. subscription provider
A
A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application. a. usage model b. method model c. administrative model d. interpolated model
A
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment. a. web-based b. cloud c. multinational d. GUI
A
If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor. a. supplemental maintenance agreement b. software license c. request for proposal d. fixed fee model
A
The _____ contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management. a. software requirements specification b. request for quoting document c. software license d. maintenance agreement
A
The _____ must include users, who will participate in the selection process and feel a sense of ownership in the new system. a. evaluation and selection team b. quality audit team c. development and testing team d. maintenance team
A
_____ is an example of a nonprofit organization that publishes standards and reports for its members and the general public. a. The Transaction Processing Performance Council (TPC) b. The National Institute of Standards and Technology (NIST) c. Oracle d. Microsoft
A
b. False
A LAN spans long distances and can connect WANS that are continents apart. a. True b. False
b. False
A RAID design improves performance, capacity, and reliability, and involves the use of one large drive that appears to a computer as multiple logical drives. a. True b. False
D) module
A ____ consists of related program code organized into small units that are easy to understand and maintain. A) mode B) stub C) decision tree D) module
natural
A _____ language feature allows users to type commands or requests in normal text phrases.
diskless
A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily.
Basic Service Set
A central wireless device is used to serve all wireless clients
D) attributes
A class diagram includes the class ____, which describe the characteristics of objects in the class. A) methods B) keys C) events D) attributes
False
A data type check is a data validation rule that is used when data must be in predetermined sequence.
d. test plan
A disaster recovery plan should be accompanied by a(n) ________ , which simulates various levels of emergencies and records the responses, which can be analyzed and improved as necessary. a. security token b. capacity plan c. adaptive plan d. test plan
thick
A fat client design, which is also known as a(n) _____ client design, is simpler and less expensive to develop than a thin client.
65. Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition? a. An arrow with a filled circle b. An arrow with an empty circle c. A line with a diamond on one end d. A line with a diamond on both ends
A line with a diamond on one end
b. platform
A main advantage of enterprise resource planning is that it describes a specific hardware and software environment, also called a(n) ________ , that ensures connectivity and easy integration of future systems. a. portal b. platform c. application d. access point
C) cohesion
A module that performs a single function or task has a high degree of ____, which is desirable. A) piloting B) indexing C) cohesion D) resolution
False
A request for quotation (RFQ) is less specific than a request for proposal (RFP).
b. False
A service desk can boost its productivity by using network interface software, which allows IT staff to take over a user's workstation and provide support and troubleshooting. a. True b. False
platform
A specific hardware and software environment described by ERP
b. False
A system administrator is responsible for configuration management, which includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action. a. True b. False
scalability
A system's ability to expand, change, or downsize easily
b. False
A tunnel, which is identified by a number, is used to route incoming traffic to the correct application on a computer. a. True b. False
b. False
A two-tier design has a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server. a. True b. False
*Data Control*
A well-designed DBMS must provide builtin control and security features, including subschemas, passwords, encryption, audit trail files, and backup and recovery procedures to maintain data - *User ID and Password* - *Permissions* = privileges can be associated with different users - *Encryption* = process of converting readable data into unreadable characters to prevent unauthorized access to the data - *Backup* - *Recovery Procedures* = used to restore the file or database its current state at the time of the last backup - *Audit Fields* = special fields within data records to provide additional control or security information
application service provider
A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
evaluation model
A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings.
star
A(n) _____ network, which has a hub-and-spoke design, does not suffer from the same degradation issues as a bus design when users and devices are added to the network.
online
A(n) _____ system, which allows a constant dialog between users and the system, handles transactions when and where they occur and provides output directly to users.
firewall
A(n) _____, which is the main line of defense between a local network and the Internet, can be configured to detect and respond to denial-of-service attacks, port scans, and other suspicious activity.
b. hub
A(n) ________ is a device that broadcasts network traffic, called data frames, to all other connected devices. a. client b. hub c. switch d. server
d. proxy
A(n) ________ server is a network device that provides Internet connectivity for internal LAN users. a. distributed b. application c. portal d. proxy
b. automatic update
A(n) ________ service, which may be offered by a software vendor, enables an application to contact the vendor's server and check for a needed patch or update. a. enhancement b. automatic update c. hot site d. business continuity
____ describes the relationship between computers and the people who use them to perform business-related tasks. A) HCI B) PCI C) UI D) PI
A) HCI (Human-Computer Interaction)
In most organizations, the ____ department is responsible for output control and security measures. A) IT B) police C) finance D) security
A) IT
Because every piece of information should be traceable back to the input data that produced it, a(n) ____ trail must be provided that records the source of each data item and when it entered the system. A) audit B) index C) source D) control
A) audit
Some firms use ____ facsimile to allow a customer to request a fax using e-mail, via the company Web site, or by telephone. A) automated B) batched C) turnaround D) digital
A) automated
In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature used to initiate an action such as printing a form or requesting help. A) command button B) option button C) toggle button D) radio button
A) command button
A ____ usually causes specific actions, such as printing subtotals for a group of records in a report. A) control break B) stratification C) subgroup D) concatenation character
A) control break
On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms. A) control zone B) heading zone C) totals zone D) authorization zone
A) control zone
If variable input data is needed, provide a(n) ____ that explains what is needed. A) dialog box B) list box C) menu bar D) toggle button
A) dialog box
Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design. A) storyboard B) turnaround document C) faxback D) output control
A) storyboard
A range check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items
A) tests data items to verify that they fall between a specified minimum and maximum value
Design prototyping is also known as ____ prototyping. A) throwaway B) command C) system D) layout
A) throwaway
____ means that in risk control, nothing is done.
Acceptance
44. Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called _____. a. integrated tests b. modular tests c. unit tests d. acceptance tests
Acceptance test
Which of the following is an example of a horizontal application?
Accounting packages
adaptive maintenance
Adds enhancements to an operational system and makes the system easier to use
remote control software
Allows IT staff to take over a workstation and provide support
stand-alone
Although the use of PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, _____ computing was inefficient and expensive.
64. Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module passes to another. What symbol is used for a data couple? a. An arrow with a filled circle b. An arrow with an empty circle c. A line with a diamond on one end d. A line with a diamond on both ends
An arrow with an empty circle
Roger is part of a team that is responsible for employing a new information system, the design of which was developed using customary structured methods. To manage the intricacy of the application development process, Roger wants to deploy structured development techniques, and he asks Pete, his coworker, for information about these techniques. Pete tells him about structure charts, which show program modules and the relationships among them using various graphical symbols. Pete informs Roger that one type of element in a structure chart is a data couple, which shows data that one module passes to another. What symbol is used for a data couple?
An arrow with an empty circle
____ means examining the whole in order to learn about the individual elements.
Analysis
19. _____ is the process of constructing the programs and code modules that serves as the building blocks of an information system. a. Application structuring b. Application analysis c. Application development d. Application virtualization
Application development
service
Application that monitors, or listens on, a particular port
36. When a new version of a system is installed, the prior release is _____, or stored. a. archived b. deleted c. discontinued d. reinstalled
Archived
sniffing
Attack in which network traffic is intercepted/scanned for valuable information
exploit
Attack that takes advantage of a vulnerability
34. A class diagram includes the class _____, which describe the characteristics of objects in the class. a. methods b. keys c. events d. attributes
Attributes
roaming
Automatically allows the client to associate with the stronger access point
51. _____ ensures that authorized users have timely and reliable access to necessary information. a. Availability b. Integrity c. Confidentiality d. Concealability
Availability
____ ensures that authorized users have timely and reliable access to necessary information.
Availability
A _____ describes the actual processes of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reports, and so on. a. qualitative design b. physical design c. logical design d. quantitative design
B
A _____ measures the time a package takes to process a certain number of transactions. a. parameter b. benchmark c. middleware d. newsgroup
B
A software package that can be used by many different types of organizations is called a(n) _____. a. symmetric application b. horizontal application c. vertical application d. asymmetric application
B
In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support. a. planning center b. service desk c. evaluation team d. planning center
B
Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas. a. service desks b. newsgroups c. report generators d. benchmarks
B
The main reason for offshore outsourcing is to _____. a. manage operations only in one country b. lower bottom-line costs c. manage operations only in one country d. ship bulky raw materials
B
The software that a company's IT department makes, builds, and develops is called _____. a. indexed software b. in-house software c. external software d. internal software
B
Tom started the process of selecting a new system for the firm and he is weighing all of the various issues that need to be considered and the resources he has at his disposal as he makes this important decision. As Tom prepares to remove the field in his selection of a new system, he wants a quick refresher on the difference between a request for proposal (RFP) and a request for quotation (RFQ). If he needs a request for proposal (RFP), Simone will write it, and if he needs an RFQ, Marny is responsible for writing that. Which of the following is true? a. When Marny is tasked with the job, her output can involve outright purchase or a variety of leasing options. b. When Simone is tasked with the job, Tom already knows the specific product or service he wants and he needs to obtain price quotations or bids. c. RFPs and RFQs have very different objectives. d. An RFP that Simone writes is more specific than an RFQ Marny will write.
B
When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum. a. product b. service c. process d. outsource
B
When determining outsourcing fees, a _____ uses a set fee based on a specified level of service and user support. a. subscription model b. fixed fee model c. transaction model d. usage model
B
_____ determines how long it takes an information system to spend for itself through reduced costs and increased benefits. a. Net present value (NPV) b. Payback analysis c. Return on investment (ROI) d. Acquisition process
B
_____ is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase. a. Request for quoting document b. Software requirements specification c. Maintenance agreement d. Software license
B
_____ reduces the customer's need for software maintenance, operation, and support. a. Hardware as a Help b. Software as a Service c. Storage as a Solution d. Processing as a Product
B
____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving. A) POD B) COM C) FBC D) ASCII
B) COM (Computer Output to Microfilm)
____ prototyping produces a full-featured, working model of the information system. A) Design B) System C) Application D) IS
B) System
Although the vast majority of reports are designed graphically, some systems still produce one or more ____ reports that use a character set with fixed spacing. A) monospaced B) character-based C) diagrammed D) preset
B) character-based
A(n) ____ displays only those records that meet a specific condition or conditions. A) detail report B) exception report C) summary report D) exigency report
B) exception report
The concept that the quality of the output is only as good as the quality of the input, which sometimes is known as ____, is familiar to IT professionals, who recognize that the best time to avoid problems is when data is entered. A) bad input, bad output (BIBO) B) garbage in, garbage out (GIGO) C) poor start, poor finish (PSPF) D) weak hand, weak hold (WHWH)
B) garbage in, garbage out (GIGO)
Centralized IT departments no longer produce reams of printed ____ reports. A) batch B) greenbar C) audit D) hash
B) greenbar
A reasonableness check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items
B) identifies values that are questionable, but not necessarily wrong
Input ____ are templates that make it easier for users to enter data. A) patterns B) masks C) legends D) keys
B) masks
A ____ language feature allows users to type commands or requests in normal text phrases. A) normal B) natural C) standard D) basal
B) natural
In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system. A) physical B) process C) input D) command
B) process
Some forms use a ____ that contains icons or buttons that represent shortcuts for executing common commands. A) menu bar B) toolbar C) dialog box D) toggle bar
B) toolbar
differential backup
Backs up only the files that are new or changed since the last full backup
45. _____ describes the amount of data that a system can transfer in a fixed time period. a. Latency b. Resolution c. Dimensionality d. Bandwidth
Bandwidth
____ describes the amount of data that a system can transfer in a fixed time period.
Bandwidth
_____ is the amount of data that can be transferred in a fixed time period.
Bandwidth
37. A _____ is a formal reference point that measures system characteristics at a specific time. a. feature line b. baseline c. product point d. viewport
Baseline
42. To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems. a. metric analysis b. benchmark testing c. threat analysis d. allocation testing
Benchmark testing
This is a good way to measure relative performance of two or more competing products in a standard environment.
Benchmark testing
WiMAX
Broadband wireless communications protocols for metropolitan area networks
47. System developers use _____ to document and trail program defects, code changes, and replacement code. a. bug tracking software b. the obstruction generator c. fault promotion analysis d. the defect distribution policy
Bug tracking software
a. distributed
By storing data in various locations, a(n) ________ database management system is less likely to experience a catastrophic failure. a. distributed b. proxy c. access d. thick
c. distributed
By storing data in various locations, a(n) ________ database management system is less likely to experience a catastrophic failure. a. proxy b. access c. distributed d. thick
A _____ defines what must take place, not how it will be accomplished. a. physical design b. qualitative design c. logical design d. quantitative design
C
Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called _____, is changing the picture dramatically. a. Hardware as a Help b. Process as a Product c. Software as a Service d. Storage as a Solution
C
In a(n) _____, the web becomes an integral part of the application, rather than just a communication channel, and systems analysts need new application development tools and solutions to handle the new systems. a. quality-based system b. agent-based system c. Internet-based system d. file-based system
C
In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry is called a(n) _____. a. business process outsourcing (BPO) b. online service provider (OSP) c. value-added reseller (VAR) d. enterprise resource planner (ERP)
C
Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which of the following is a reason Priscilla would offer as a reason for in-house software development? a. The client is looking to spend the least possible time in implementation. b. The client wants to be able to use fewer technical development staff members. c. The client has a number of very distinctive security requirements. d. The client wishes to receive future upgrade from the vendors.
C
Tom started the process of selecting a new system for the firm and he is weighing all of the various issues that need to be considered and the resources he has at his disposal as he makes this important decision. Tom has two candidates for the new system. Which one of the following is a strategy he can pursue for making the final selection from among the two candidates? a. Be aware that some vendors limit their reference lists to satisfied clients, so mostly negative feedback should be expected from those firms. b. For vertical applications, use a demo copy to enter a few sample transactions in both. c. Consult websites maintained by consultants and software publishers with product references and links to vendors. d. Although benchmarking can predict project-specific results, benchmark testing is not a good way to measure relative performance of two or more competing products in a standard environment.
C
When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application. a. usage model b. fixed fee model c. subscription model d. transaction model
C
_____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet. a. Process as a Product b. Process as a Product c. Software as a Service d. Hardware as a Help
C
A key physical design element is the ____, which describes how users interact with a computer system. A) HCI B) PCI C) UI D) PI
C) UI (User Interface)
On a source document, the main part of the form, called the ____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data. A) instruction zone B) authorization zone C) body zone D) heading zone
C) body zone
Companies use various output ____ methods to maintain output integrity and security. A) ergonomic B) aesthetic C) control D) detail
C) control
In ____ prototyping, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. A) system B) command C) design D) layout
C) design
A combination check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items
C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together
In a ____ design, you create individual components that connect to a higher-level program or process. A) distributed B) dissociated C) modular D) prototypical
C) modular
For upper-level managers who often want to see total figures and do not need supporting details, a(n) ____ is appropriate. A) detail report B) exception report C) summary report D) exigency report
C) summary report
In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature that is used to represent on or off status and switches to the other status when clicked. A) command button B) option button C) toggle button D) radio button
C) toggle button
In a source document, if totals are included on a form, they appear in the ____ zone. A) calculated B) control C) totals D) heading
C) totals
Printed output is used in ____ documents, which are output documents that are later entered back into the same or another information system. A) detail B) output C) turnaround D) report
C) turnaround
____ is a process for controlling changes in system requirements during software development.
CM
test plan
Can simulate various levels of emergencies and record the responses
17. The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and systems development into a much larger framework. a. the Department of Defense (DoD) model b. the Thousand-Yard Model c. Open Database Connectivity (ODBC) model d. Capability Maturity Model Integration (CMMI)
Capability Maturity Model Integration (CMMI)
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.
Cardinality
A Web site for the ____ describes a variety of IT education and training resources.
Center for the Application of Information Technologies (CAIT)
access point
Central wireless device used to serve all wireless clients
information center
Centralized resource staffed by IT professionals who provide users with support
perfective maintenance
Changes an operational system to make it more efficient or maintainable
_____ use a keyword to encode a number.
Cipher codes
d. architecture
Client/server ________ generally refers to systems that divide processing between one or more networked clients and a central server. a. specification b. mode c. scalability d. architecture
This can be viewed as an online Software as a Service (SaaS) and data environment supported by supercomputer technology.
Cloud computing
a. True
Cloud computing effectively eliminates compatibility issues as well as the need for users to install updates or perform maintenance. a. True b. False
30. _____ measures a module's scope and processing characteristics. a. Coupling b. Indexing c. Cohesion d. Partitioning
Cohesion
soft skills
Communications, interpersonal, and perceptive abilities
distributed system
Company-wide system that connects one or more LANs or WANs
_____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving. a. Physical picture to device (PPOD) b. Computer output to microfilm (COM) c. Firewall output to microfilm (FOM) d. American standard code for information interchange (ASCII)
Computer output to microfilm (COM)
client
Computer that receives data, processing services, or other support from a server
server
Computer that supplies data, processing services, or other support to clients
procedural security
Concerned with managerial policies and controls that ensure secure operations
28. In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control module determines which subordinate modules will be invoked. a. method b. condition c. class d. attribute
Condition
49. _____ protects information from unauthorized disclosure and safeguards privacy. a. Availability b. Integrity c. Confidentiality d. Accessibility
Confidentiality
____ protects information from unauthorized disclosure and safeguards privacy.
Confidentiality
gateway
Connection between a network topology and a larger, dissimilar network
49. User documentation _____. a. allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) b. describes a system's functions and how they are implemented c. contains all the information needed for users to process and distribute online and printed output d. consists of instructions and information to users who will interact with the system
Consists of instructions and information to users who will interact with the system
48. Operations documentation _____. a. describes the inputs, outputs, and processing logic for all program modules b. describes a system's functions and how they are implemented c. contains all the information needed for processing and distributing online and printed output d. consists of instructions and information to users who will interact with the system
Contains all the information needed for processing and distributing online and printed output
_____ help offers assistance for a task in progress. a. User-selected b. User-sensitive c. Standard-selected d. Context-sensitive
Context-sensitive
24. In the given figure, a higher-level module, called a _____, directs lower-level modules. a. library module b. data module c. subordinate module d. control module
Control module
backup
Copying data at prescribed intervals, or continuously
21. As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by _____. a. corrective maintenance b. adaptive maintenance c. perfective maintenance d. obsolete maintenance
Corrective Maintenance
31. _____ describes the degree of interdependence among modules. a. Resolution b. Modularity c. Dynamism d. Coupling
Coupling
____ describes the degree of interdependence among modules.
Coupling
star network
Currently the most popular LAN topology
A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings. a. fixed fee model b. usage model c. subscription model d. evaluation model
D
IBM describes WebSphere as a software platform for _____ environments. a. integrated development b. integrated development c. business process outsourcing d. service-oriented architecture
D
In the context of in-house software development options, companies that develop software for sale are called _____. a. software distributers b. software stockers c. software dealers d. software vendors
D
Nearly _____ percent of total costs occur after the purchase of hardware and software. a. 15 b. 45 c. 95 d. 80
D
Priscilla is providing the junior analysts, in her firm, on the team with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which of the following is a reason Priscilla will share with the new analysts, with regard to a client that wants to purchase a software package? a. The client has some existing technology in place whose requirements must be met by the new software. b. The client has unique business requirements that must be satisfied by this software application. c. The client wants to develop internal resources and capabilities. d. The client is looking for the lowest possible costs.
D
Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management. a. fixed outsourcing services (FOS) b. application service provider (ASP) c. outsource hosting provider (OHP) d. internet business services (IBS)
D
The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications. a. command-line b. Software as a Service c. outsourcing d. Web 2.0
D
Which of the following is an example of a horizontal application? a. College applications b. Real estate firms c. Construction companies d. Accounting packages
D
Which of the following is true of a traditional systems development environment? a. Systems are developed and delivered in an Internet-based framework such as .NET or WebSphere. b. Systems are easily scalable and can run on multiple hardware environments. c. Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel. d. Many applications require substantial desktop computing power and resources.
D
Which of the following is true of a web-based systems development environment? a. Internet-based development treats the web only as a communication channel. b. Scalability of web-based systems can be affected by network limitations and constraints. c. Web-based solutions do not open complex security issues that should be addressed. d. Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.
D
Identify a major web-based development environment. a. HP ArcSight b. Cisco's CSR c. Oracle DBA d. Microsoft's .NET
D
In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application. a. user manual b. user agent c. user story d. user interface
D
When companies use a _____, they already know the specific products or service they want and need to obtain price estimates or bids from vendors. a. net present value (NPV) b. return on investment (ROI) c. request for proposal (RFP) d. request for quotation (RFQ)
D
Many physicians feel that ____ software is difficult to use and does not meet their needs. A) HCP B) indexed C) prototypical D) EHR
D) EHR (Electronic Health Records)
A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices. A) HCI B) PCI C) UI D) GUI
D) GUI (Graphical User Interface)
____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. A) Aesthetics B) Interface technology C) Ergonomics D) Output security
D) Output security
In a data entry screen, such as that shown in the accompanying figure, a ____ is a control feature that is used to select one or more choices from a group. A) dialog box B) list box C) text box D) check box
D) check box
A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily. A) command-line B) prescribed C) satellite D) diskless
D) diskless
An existence check is a data validation check that ____. A) tests data items to verify that they fall between a specified minimum and maximum value B) identifies values that are questionable, but not necessarily wrong C) is performed on two or more fields to ensure that they are consistent or reasonable when considered together D) is used for mandatory data items
D) is used for mandatory data items
Interface designers can obtain data, called ____ metrics, by using software that can record and measure user interaction with a system. A) aesthetics B) relationship C) ergonomic D) usability
D) usability
56. During _____, existing data is loaded into the new system. a. data visualization b. data conversion c. data collision d. data normalization
Data conversion
legacy data
Data that is difficult to access and transport to client/server environment
Bandwidth will not be measured in which of the following units?
Dbps (decibits per second)
_____ combine data from different item attributes, or characteristics, to build a code.
Derivation codes
permissions
Describe the rights a user has to a particular file or directory on a server
product baseline
Describes a system at the beginning of system operation
46. Program documentation _____. a. describes the inputs, outputs, and processing logic for all program modules b. consists of instructions and information to users who will interact with the system and includes user manuals, help screens, programs, and online tutorials c. includes data dictionary entries, data flow diagrams, screen layouts, and the systems request that initiated the program d. creates links within the program that will take a user to the appropriate documentation
Describes the inputs, outputs, and processing logic for all program modules
38. In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included. a. unit test b. design walkthrough c. function assessment d. closure meeting
Design walkthrough
36. _____ is the process of reviewing a program code to spot logic errors, which produce incorrect results. a. Desk checking b. Direct cutover examination c. Results walkthrough d. Cohesion assurance
Desk checking
____ is the process of reviewing the program code to spot logic errors, which produce incorrect results.
Desk checking
keystroke logger
Device that can record everything that is typed into a keyboard
router
Device that connects network segments and guides the flow of data
corrective maintenance
Diagnoses and corrects errors in an operational system
____ cutover involves more risk than other changeover methods.
Direct
58. _____ involves more risk than other changeover methods. a. Direct cutover b. Pilot operation c. Parallel cutover d. Phased operation
Direct cutover
59. As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational. a. phased operation b. parallel operation c. pilot operation d. direct cutover
Direct cutover
log
Documents all events, including dates, times, and other specific information
perfective
During system operation, changes in user activity or data patterns can cause a decline in efficiency, and _____ maintenance might be needed to restore performance.
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers. a. Unicode b. ASCII (American Standard Code for Information Interchange) c. EBCDIC (Extended Binary Coded Decimal Interchange Code) d. ISO (International Organization for Standardization)
EBCDIC (Extended Binary Coded Decimal Interchange Code)
avoidance
Eliminates risk by adding protective safeguards
False
Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals.
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data. a. Normalization b. Encryption c. Encapsulation d. Standardization
Encryption
_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design.
Enterprise resource planning (ERP)
portal
Entrance to a multifunction Web site
*Chapter Objectives*
Explain file-oriented systems and how they differ from database management systems Explain data design terminology, including entities, fields, common fields, records, files, tables, and key fields Describe data relationships, draw an entity relationship diagram, define cardinality, and use cardinality notation Explain the concept of normalization Explain the importance of codes and describe various coding schemes Explain data warehousing and data mining Differentiate between logical and physical storage and records Explain data control measures
supply chain management
Extends a company's internal ERP system to their suppliers and customers
10. Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time.
False
5. The skill set required to develop documentation usually is the same as that required to develop a system.
False
A request for quotation (RFQ) is more specific than a request for proposal (RFP).
False
A service desk is a highly effective replacement for traditional IT maintenance and support activities.
False
A subscription model charges a variable fee based on the volume of transactions or operations performed by the application.
False
Adaptive maintenance always is less difficult than new systems development because the enhancements need not work within the constraints of an existing system.
False
Although the procedures for corrective maintenance and adaptive maintenance are alike, minor corrective maintenance requires more IT department resources than minor adaptive maintenance.
False
As enterprise-wide information systems grow more complex, configuration management becomes less and less useful.
False
Bandwidth requirements are expressed in bytes per minute.
False
Both adaptive and perfective maintenance activities decrease in a dynamic business environment.
False
Companies with limited resources always consider new systems development, adaptive maintenance, and corrective maintenance less important than perfective maintenance.
False
Context-sensitive help displays information about any task when the user requests it. T/F?
False
Data conversion is easier when the new system replaces a manual system, because all data can be entered manually, unless it must be scanned.
False
Empowerment makes an IT department less productive because it must spend more time responding to daily concerns of users and less time on high-impact systems development projects that support strategic business goals.
False
Errors found during a structured walkthrough are harder to fix.
False
If one module refers to internal logic contained in another module, the modules are loosely coupled.
False
In the star network, each node connects to every other node.
False
Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms.
False
Modules that are independent are tightly coupled.
False
Most Webinars are Web-based broadcasts that allow a user to download multimedia files to a PC or portable device.
False
Parallel operation is the least costly changeover method.
False
Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time.
False
Phased operation is more expensive than full parallel operation because the entire system must be worked with at one time.
False
Post-implementation evaluations are optional for most information systems projects.
False
Requests for corrective and adaptive maintenance normally come from the IT department, while users usually initiate perfective maintenance.
False
Restricting the implementation to a pilot site increases the risk of system failure, compared with a direct cutover method, and operating both systems for only the pilot site is more expensive than a parallel operation for the entire company.
False
Sensitive data can be encrypted, or coded, so only users with decoding software can read it. T/F?
False
T/F As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.
False
T/F Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services.
False
T/F Security is especially important when data or processing is performed at a centralized facility, rather than at remote locations.
False
The main objective of user training is to show users how to become service desk staff members.
False
The skill set required to develop documentation usually is the same as that to develop a system.
False
To draw a structure chart, working from a logical model the systems analyst transforms program modules into functional primitives and object methods.
False
Using a release methodology increases the documentation burden.
False
A data type check is a data validation rule that is used when data must be in predetermined sequence. T/F?
False
An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals. T/F?
False
Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned.
False
Interface design should call for attention to the interface, rather than facilitating design objectives. T/F?
False
To create an attractive user interface layout and design, when the user enters data that completely fills the field, the data must move automatically to the next field. T/F?
False
User-selected help always offers assistance for a task in progress. T/F?
False
8. Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned.
False: Manually entering data is hard and tedious
Using batch input, data entry is performed continuously.
False: batch input is when info is entered on a specified time schedule
A combination check is a data validation rule that tests to ensure if a data item fits the required data type.
False: data type check
Interface design should call for attention to the interface, rather than facilitating design objectives.
False: design objectives should take precedence over the interface
Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.
False: higher ups only care about general information NOT detailed
4. The hardening process that makes a system more secure is fully automatic.
False: mainly manual
7. Most webinars are web-based broadcasts that allow a user to download multimedia files to a PC or portable device.
False: podcast
A data type check is a data validation rule that is used when data must be in predetermined sequence.
False: sequence check
4. Commercial software packages must undergo unit and integration testing similar to that of in-house developed systems, although system testing usually is not performed.
False: systems testing is always performed on commercial software packages
An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals.
False: they should think like a user and understand business functions
User-selected help always offers assistance for a task in progress.
False: this is context-sensitive help
Context-sensitive help displays information about any task when the user requests it.
False: this is user-selected help
To create an attractive user interface layout and design, when the user enters data that completely fills the field, the data must move automatically to the next field.
False: users should be active in their use of the interface, this doesn't follow that principle
12. Modules that are independent are tightly coupled.
False:loosely coupled
13. If modules are loosely coupled, one module is linked to internal logic contained in another module.
False:tightly coupled
63. At the end of the systems implementation phase, the final report to management should include _____. a. final versions of all system documentation b. hardware efficiency and platform performance c. adequacy of system controls and security measures d. quality and effectiveness of training
Final versions of all system documentation
61. A _____ is the main line of defense between a local network, or intranet, and the Internet. a. malware b. firewall c. spyware d. threat
Firewall
21. _____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows. a. Training plans b. Acceptance tests c. Flowcharts d. Simulations
Flowcharts
____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.
Flowcharts
database programmer
Focuses on creating and supporting large-scale database systems
_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen. a. Form uploading b. Form resetting c. Form pulling d. Form filling
Form filling
baseline
Formal reference point that measures system characteristics at a specific time
38. The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints. a. functional baseline b. extension baseline c. allocated baseline d. product baseline
Functional baseline
Wireless network speed is measured in _____.
GBPS (gigabits per second)
a. True
Gartner Inc., a leading consulting firm that is well-known for its predictions, believes that prices for most cloud services will begin to include a global energy surcharge. a. True b. False
Wireless network speed is measured in _____.
Gbps (gigabits per second)
False
Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.
online system
Handles transactions when and where they occur and provides output to users
network interface
Hardware and software that allows a computer to interact with a network
16. A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs. a. help desk b. white spot c. maintenance software module d. utility point
Help desk
_____ describes the relationship between computers and the people who use them to perform their jobs. a. Human-computer interaction (HCI) b. Peripheral component interconnect (PCI) c. Media control interaction (MCI) d. Peripheral connect (PC)
Human-computer interaction (HCI)
____ requires that a software supplier document all testing and maintain records of test results.
ISO (International Organization for Standardization)
commerce
If a company is reluctant to take on the challenge and complexity of developing an Internet _____ site in-house, they may pursue alternatives, such as a packaged solution or the use of an application service provider.
supplemental maintenance agreement
If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor.
a. True
If a system is brought down for hours as a result of a disruption in electricity, the event would be categorized as a service failure. a. True b. False
a. True
If new technology offers a way to perform the same or additional functions more efficiently, it could be a sign that the existing system is obsolete and has reached the end of its economically useful life. a. True b. False
risk
Impact of an attack multiplied by likelihood of a vulnerability being exploited
A) parallel
In ____ programming, two programmers work on the same task on the same computer. A) parallel B) duo C) double D) driver
B) flag
In a structure chart, a control couple shows a message, also called a status ____, which one module sends to another. A) pilot B) flag C) loop D) unit
C) loop
In a structure chart, a curved arrow represents a ____, which indicates that one or more modules are repeated. A) pilot B) flag C) loop D) unit
A) top-down
In a(n) ____ approach, the systems analyst documents the system's requirements and then breaks them down into subsystems and modules. A) top-down B) piloted C) indexed D) integrated
B) design
In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included. A) unit B) design C) testing D) user
service desk
In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support.
software vendors
In the context of in-house software development options, companies that develop software for sale are called _____.
build or buy
In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision.
b. False
In today's business environment, batch processing is the most practical method due to its ability to provide real-time information. a. True b. False
fault management
Includes monitoring a system for signs of trouble and logging system failures
hierarchical network
Includes one or more powerful servers that control an entire network
malware
Includes worms, Trojan horses, keystroke loggers, and spyware
hardening
Increases security by removing unnecessary accounts, services, and features
mask
Input _____ is a template or pattern that restricts data entry and prevents errors.
43. Testing two or more programs that depend on each other is called _____. a. integration testing b. unit testing c. acceptance testing d. system testing
Integration testing
67. Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together correctly. What is one of the names of this type of testing? a. Integration testing b. System testing c. Unit testing d. Stub testing
Integration testing
____ prevents unauthorized users from creating, modifying, or deleting information.
Integrity
usability metrics
Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system.
threat
Internal or external entity that could endanger an asset
18. _____ requires that a software supplier document all testing and maintain records of test results. a. International Organization for Standardization (ISO) b. Software Engineering Institute (SEI) c. Open Database Connectivity (ODBC) d. Center for the Application of Information Technologies (CAIT)
International Organization for Standardization (ISO)
This is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.
Internet Business Services (IBS)
recovery
Involves restoring data and restarting the system after an interruption
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.
Java database connectivity (JDBC)
local area network
Joins clients and allows sharing of data and hardware resources between them
26. The given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a structure chart. a. library b. data c. subordinate d. control
Library
fat client
Locates all or most of the application processing logic at the client
thin client
Locates all or most of the application processing logic at the server
This is a design that does not address the actual methods of implementation.
Logical design
_____ describes the way the components in a network interact.
Logical topology
_____ describes the way the components in a network interact.
Logical topology
29. In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated. a. pie b. status flag c. loop d. freeform
Loop
Extended Service Set
Made up of two or more Basic Service Set networks
firewall
Main line of defense between a local network, or intranet, and the Internet
19. _____ expenses vary significantly during a system's operational life and include spending to support maintenance activities. a. Secure b. Maintenance c. Principal d. Capital
Maintenance
____ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently.
Maintenance
____ expenses vary significantly during a system's operational life and include spending to support maintenance activities.
Maintenance
20. _____ include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently. a. Team building activities b. Elicitation activities c. Maintenance activities d. Testing activities
Maintenance activities
This is another name for internet business services (IBS).
Managed hosting
switch
Manages a star network and acts as a communication conduit for network traffic
programmer/analyst
Many IT departments use a job title of _____ to designate positions that require a combination of system analysis and programming skills.
certifications
Many IT industry leaders, such as Microsoft, Cisco, Novell, Oracle, and Sun Microsystems, offer _____, which are measured and verified by examination.
Which of the following is true of a traditional systems development environment?
Many applications require substantial desktop computing power and resources.
True
Many firms feel that in-house IT resources and capabilities provide a competitive advantage because an in-house team can respond quickly when business problems or opportunities arise.
C) code
Many organizations require a more formal type of desk checking called a structured walkthrough, or ____ review. A) design B) integrated C) code D) interpolated
scaling on demand
Matches resources to needs at any given time
batch processing
Means that data is managed in groups
incremental backup
Method that only includes recent files that have never been backed up
33. A class diagram includes the class _____, which represent the program logic. a. attributes b. events c. methods d. characters
Methods
queue length
Metric that measures the number of requests pending for a service
busy
Metric that measures the time that a given resource is unavailable
43. In addition to benchmark testing, performance measurements, called _____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data. a. metrics b. wireframes c. viewports d. baselines
Metrics
____ include the volume of online data, the number of records accessed, and the number of transactions processed in a given time period.
Metrics
a. True
Microsoft and Intershop are vendors that offer turnkey systems for companies that want to get an e-business up and running quickly. a. True b. False
Identify a major web-based development environment.
Microsoft's .NET
True
Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable business solution that fits the company's long-term business strategy.
20. A _____ consists of related program code organized into small units that are easy to understand and maintain. a. node b. stub c. decision tree d. module
Module
b. version
Most firms use commercial applications to handle ________ control for complex systems, such as ERP. a. change b. version c. fault d. remote
_____ relies on collective data paths to increase bandwidth and range.
Multiple input/multiple output (MIMO) technology
mesh network
Network in which each node connects to every other node
data frames
Network traffic that is broadcasted to all connected devices by a hub
ring network
Network with data that flows in a single direction from one device to the next
c. uninterruptible
Non-mission-critical computer systems and network devices should be plugged into a(n) ________ power supply that includes battery backup with suitable capacity to handle short-term operations while an orderly backup and system shutdown can be completed. a. hot site b. tamper-evident c. uninterruptible d. biometric
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database. a. Encryption b. Encapsulation c. Abstraction d. Normalization
Normalization
legacy systems
Older systems that use outdated technology, but are still functional
b. in-house
One benefit of a(n) ________ e-commerce strategy is the ability to maintain complete control over the organization of the site, the number of pages, and the size of the files. a. offline b. in-house c. offsite d. remote
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
Open database connectivity (ODBC)
____ costs include expenses for items such as supplies, equipment rental, and software leases.
Operational
_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. a. Aesthetics b. Interface technology c. Ergonomics d. Output security
Output security
_____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis. a. Commission b. Subscription c. Outsourcing d. External provisioning
Outsourcing
response time
Overall time between a request for system activity and delivery of the response
35. In _____, two programmers work on the same task on the same computer; one drives while the other navigates. a. pair programming b. multitasking c. dual tasking d. driver programming
Pair programming
60. As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period. a. phased operation b. parallel operation c. pilot operation d. direct cutover
Parallel operation
metrics
Performance measurements
62. As the accompanying figure illustrates, the _____ changeover method allows the new system to be implemented in stages, or modules. a. phased operation b. parallel operation c. pilot operation d. direct cutover
Phased operation
This is a plan for the actual implementation of the system.
Physical design
security token
Physical device that authenticates a legitimate user
_____ is strictly hardware related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
Physical storage
_____ describes the actual network cabling and connections. a. Physical topology b. Logical topology c. Star topology d. Bus topology
Physical topology
61. As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system at a selected location of the company. a. phased operation b. parallel operation c. pilot operation d. direct cutover
Pilot operation
52. A(n) _____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device. a. webinar b. tutorial c. podcast d. data frame
Podcast
remote control
Popular examples of _____ software include GoToMyPC by Citrix, LogMeIn Pro by LogMeIn, and PC Now by WebEx.
corporate portal
Portal that provides access for customers, employees, suppliers, and the public
offsiting
Practice of storing backup media away from the main business location
integrity
Prevents unauthorized users from creating, modifying, or deleting information
62. Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels. a. privilege escalation attack b. denial-of-service attack c. malware penetration attack d. identity management invasion
Privilege escalation attack
change control
Process for controlling changes in system requirements during development
version control
Process of tracking system releases
40. The _____ describes a system at the beginning of system operation and includes the results of performance and acceptance tests for the operational system. a. functional baseline b. operational baseline c. allocated baseline d. product baseline
Product baseline
50. The environment for the actual system operation is called the _____. a. production environment b. exploratory environment c. functional environment d. globalized environment
Production environment
31. Many IT departments also use a job title of _____ to designate positions that require a combination of systems analysis and programming skills. a. tester/programmer b. strategist/analyst c. programmer/analyst d. designer/debugger
Programmer/analyst
applications
Programs that handle input, manage processing logic, and provide required output
applications
Programs that handle the input, manage the processing logic, and provide the required output for an information system are called _____.
confidentiality
Protects information from unauthorized disclosure and safeguards privacy
security
Protects the system, and keeps it safe, free from danger, and reliable
proxy server
Provides Internet connectivity for internal LAN users
hot site
Provides the best insurance against major business interruptions
application server
Provides the business logic required by a system
15. The main objective of _____ is to avoid problems or to identify them as soon as possible. a. direct cutover b. quality assurance c. application development d. cohesion
Quality assurance
mitigation
Reduces the impact of a risk by careful planning and preparation
newsgroups
Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas.
node
Represents a physical device that can send, receive, or manage network data
_____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project. a. Return on investment (ROI) b. Acquisition process c. Net present value (NPV) d. Payback analysis
Return On Investment (ROI)
_____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project.
Return on Investment (ROI)
32. In sequence, the four steps typically followed to create a structure chart are _____. a. reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart b. analyzing the structure chart and the data dictionary; reviewing the data flow diagrams (DFDs); identifying modules and relationships; and adding couples, loops, and conditions c. adding couples, loops, and conditions; analyzing the structure chart and the data dictionary; reviewing the data flow diagrams (DFDs); and identifying modules and relationships d. identifying modules and relationships; adding couples, loops, and conditions; analyzing the structure chart and the data dictionary; and reviewing the data flow diagrams (DFDs)
Reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart and the data dictionary
59. In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited. a. proxy b. risk c. firewall d. warning
Risk
54. _____ measures risk likelihood and impact. a. Risk assessment b. Risk marker c. Risk identification d. Risk control
Risk assessment
55. _____ develops safeguards that reduce risks and their impact. a. Risk assessment b. Risk verification c. Risk identification d. Risk control
Risk control
a. True
SAGE is a professional organization that provides a wide variety of technical information and support for system administrators. a. True b. False
To achieve better, faster, and less expensive methods of software development, ____ designed the Capability Maturity Model (CMM), which improves quality, reduces development time, and cuts costs.
SEI (Software Engineering Institute)
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
Scability
_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.
Scalability
extensibility
Scalability is also referred to as _____.
Some user applications use this to allow users to design their own data entry forms.
Screen generators
attacker
Script kiddie, which is defined as an inexperienced or juvenile hacker who uses readily available malicious software to disrupt or damage computer systems, is a category of _____.
tunnel
Secure network connection that is established once authentication is complete
53. When developing a training program, which of the following guidelines should be kept in mind? a. Train people individually. b. Select the most effective place to conduct the training. c. Develop a single training program for distinct employee groups. d. Provide only hands-on experience training.
Select the most effective place to conduct the training
_____ are numbers or letters assigned in a specific order. a. Derivation codes b. Category codes c. Sequence codes d. Significant digit codes
Sequence codes
transference
Shifts the risk to another asset or party
55. When training is complete, many organizations conduct a full-scale test, or _____, which is a dress rehearsal for users and IT support staff. a. a parallel operation b. a pre-implementation evaluation c. data conversion d. simulation
Simulation
pretexting
Social engineering used to obtain personal information under false pretenses
16. To achieve better, faster, and less expensive methods of software development, _____ designed the Capability Maturity Model (CMM), which improves quality, reduces development time, and cut costs. a. International Organization for Standardization (ISO) b. Software Engineering Institute (SEI) c. Open Database Connectivity (ODBC) d. Center for the Application of Information Technologies (CAIT)
Software Engineering Institute (SEI)
_____ is a model of software deployment were an application is hosted as a service provided to customers over the internet.
Software as a Service
wide area network
Spans long distances and can connect LANs that are continents apart
middleware
Special software that allows the tiers in a multi-tier system to communicate
patch
Specially written software module that provides temporary repairs
hub
Star network connection device that does not perform as well as a switch
27. In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another. a. pilot b. status flag c. open loop d. unit plan
Status flag
23. A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information. a. flowchart b. data module c. structure chart d. subordinate module
Structure chart
37. Many organizations require a more formal type of desk checking called _____. a. a control module b. integration testing c. a structured walkthrough d. a data couple
Structured walkthrough
41. In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. a. modular testing b. stub testing c. acceptance testing d. unit testing
Stub testing
66. Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process? a. Integration testing b. System testing c. Link testing d. Stub testing
Stub testing
25. In the given figure, a lower-level module is called a _____. a. library module b. data module c. subordinate module d. control module
Subordinate module
68. In a top-down design, the overall objectives of a system are broken down into _____ in a process called partitioning. a. subsystems b. flags c. modules d. pilot sites
Subsystems & Modules
30. In maintenance management, _____ involves studying the parts of a system to understand the overall system. a. synthesis b. adoption c. fusion d. elucidation
Synthesis
____ involves studying the parts to understand the overall system.
Synthesis
a. True
System architecture translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security. a. True b. False
57. _____ is the process of putting a new information system online and retiring the old system. a. System integration b. Online system documentation c. System override d. System changeover
System changeover
_____ produces a full-featured, working model of the information system. a. Design prototyping b. System prototyping c. Application prototyping d. Throwaway prototyping
System prototyping
45. After completing integration testing, a systems analyst must perform _____, which involves the entire information system and includes all typical processing situations. a. functional testing b. unit testing c. stub testing d. system testing
System testing
This is like a contract that identifies what the system developers must deliver to users
Systems requirement document
social engineering
Tactic involving use of social interaction to gain access to a computer system
backups
Tape, hard drives, optical storage, and online storage are commonly used types of _____ media.
thick client
Term that is also referred to as fat client
b. False
The 802.11b wireless standard, which was adopted in 2003, has a maximum speed of 54 Mbps and an approximate range of 50-100 feet. a. True b. False
Which configuration has a central wireless device that is used to serve all wireless clients?
The Basic Service Set (BSS)
a. metropolitan
The Institute of Electrical and Electronics Engineers is working on 802.16 standards, sometimes called WiMAX, which are broadband wireless communications protocols for ________ area network. a. metropolitan b. wireless local c. local d. wide
specification
The Management Summary, which provides a brief overview of a project to company managers and executives, is a section included in the system design _____.
a. True
The Open Systems Interconnection model provides physical design standards that assure seamless network connectivity regardless of the specific hardware environment. a. True b. False
802.11
The Wi-Fi Alliance is a non-profit international association formed in 1999 to certify interoperability of wireless network products based on IEEE _____ specifications.
allocated
The _____ baseline documents the system at the end of the design phase and identifies any changes since the functional baseline.
report footer
The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.
a. System Components
The ________ section of the system design specification contains the complete design of the new system, including the user interface, outputs, inputs, files, databases, and network specifications. a. System Components b. Management Summary c. Implement Requirements d. System Environment
b. application
The advantage of the ________ logic layer is that a three-tier design enhances overall performance by reducing the data server's workload. a. node b. application c. terminal d. transparent
bandwidth
The amount of data that can be transferred in a fixed time period
network topology
The manner in which a network is configured
b. False
The objective of supply chain management is to establish a company-wide strategy for using IT that includes a specific architecture as well as standards for data, processing, network, and user interface design. a. True b. False
a. True
The occurrence of an emergency could require a maintenance team to address the problem immediately by applying a patch, which is a specially written software module that provides temporary repairs so operations can resume. a. True b. False
42. Which of the following is specified by the detailed procedures in a test plan? a. The result of the final test of all programs b. How a separate operational and test environment is prepared c. The test data to be used d. Who will work with the new system and ensure that all necessary features have been included
The test data to be used
a. interface
The three main functions of a business information system are the management of applications that perform the processing logic, the handling of data storage and access, and the provision of a(n) ________ that allows users to interact with the system. a. interface b. hub c. switch d. gateway
56. A _____ is an internal or external entity that could endanger an asset. a. proxy b. facade c. firewall d. threat
Threat
d. n-tier
Three-tier forms of client/server designs are also referred to as ________ designs, to indicate that some designs use more than one immediate layer. a. multi-tier b. hierarchical c. x-tier d. n-tier
a. preventive
To avoid problems, ________ maintenance requires analysis of areas where trouble is likely to occur. a. preventive b. adaptive c. corrective d. perfective
d. benchmark
To measure system performance, many firms use ________ testing, which uses a set of standard tests to evaluate system performance and capacity. a. bandwidth b. boot-level c. baseline d. benchmark
d. benchmark
To measure system performance, many firms use ________ testing, which uses a set of standard tests to evaluate system performance and capacity. a. baseline b. bandwidth c. boot-level d. benchmark
control field order
To produce a control break report, the records must be arranged, or sorted, in _____.
22. Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure. a. top-down approach b. test plan c. training plan d. integrated approach
Top-down approach
physical topology
Topology that describes network cabling and connections
logical topology
Topology that describes the way components interact
54. Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others. a. structured walkthrough b. train-the-trainer c. direct cutover d. top-down design
Train-the-trainer
60. _____, a risk control strategy, eliminates risks by adding protective safeguards. a. Avoidance b. Acceptance c. Conveyance d. Transference
Transference
____ shifts the risk to another asset or party, such as an insurance company, in risk control.
Transference
system architecture
Translates the logical design of an information system into a physical structure
1. Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team.
True
11. The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.
True
12. Using a release methodology reduces the documentation burden.
True
14. Podcasts can be prescheduled, made available on demand, or delivered as automatic updates.
True
2. Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.
True
3. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors.
True
6. Effective online documentation is an important productivity tool because it empowers users and reduces the time that IT staff members must spend in providing telephone, e-mail, or face-to-face assistance.
True
7. In dumpster diving attacks, an intruder raids desks or trash bins for valuable information.
True
9. Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy.
True
9. To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year.
True
A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service.
True
A systems analyst prepares most of the systems documentation during the systems analysis and systems design phases.
True
A transparent interface does not distract a user and calls no attention to itself.
True
Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team.
True
Application security requires an understanding of services, hardening, application permissions, input validation techniques, software patches and updates, and software logs.
True
As the first step in capacity planning, analysts develop a current model based on the system's present workload and performance specifications.
True
Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors.
True
Configuration management is sometimes referred to as change control.
True
Effective online documentation is an important productivity tool because it empowers users and reduces the time that IT staff members must spend in providing telephone, e-mail, or face-to-face assistance.
True
Every page in a report should include a page header, which appears at the top of the page and includes the column headings that identify the data.
True
Every page in a report should include a page header, which appears at the top of the page and includes the column headings that identify the data. T/F?
True
In a PKE environment, each user on the network has a pair of keys: a public key and a private key.
True
In a hierarchical network, one or more powerful servers control the entire network.
True
Newly hired and recently promoted IT staff members often are assigned to maintenance projects because their managers believe that maintenance work offers a valuable learning experience.
True
One technique that can be used in perfective maintenance is software reengineering.
True
Perfective maintenance can improve system reliability.
True
Podcasts can be prescheduled, made available on demand, or delivered as automatic updates.
True
Post-implementation evaluation primarily is concerned with assessing the quality of a new system.
True
Retention periods can be a specific number of months or years, depending on legal requirements and company policy.
True
Sensitive data can be encrypted, or coded, so only users with decoding software can read it.
True
Structure charts are based on the DFDs constructed during data and process modeling and object models that might have been developed.
True
Successful, robust systems often need the most support because users want to learn the features, try all the capabilities, and discover how the system can help them perform their business functions.
True
Systems analysts prepare overall documentation, such as process descriptions and report layouts, early in the SDLC.
True
Systems analysts use application generators, report writers, screen generators, fourth-generation languages, and other CASE tools that produce code directly from program design specifications.
True
T/F Implementation of early client/server systems was expensive because clients needed more powerful hardware and software to handle shared processing tasks.
True
T/F In contrast to a centralized system, a client/server design separates applications and data.
True
T/F The cloud computing concept envisions a cloud of remote computers that provide a total online software and data environment that is hosted by third parties.
True
The post-implementation evaluation verifies that a new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.
True
The procedure for minor adaptive maintenance is similar to routine corrective maintenance.
True
The systems support and security phase begins when a system becomes operational and continues until the system reaches the end of its useful life.
True
To develop a user-centered interface, a designer must learn to think like a user and see the system through a user's eyes.
True
To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year.
True
Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.
True
When analysts learn different skills, the organization is more versatile and people can shift to meeting changing business needs.
True
When corrective action cannot occur immediately, users appreciate feedback from the system administrator and should be kept informed of any decisions or actions that affect their maintenance requests.
True
Whenever possible, people who were not directly involved in developing a system should conduct the post-implementation evaluation.
True
With a release methodology, even when changes would improve system efficiency or user productivity, the potential savings must wait until the next release date, which might increase operational costs.
True
Effective online documentation is an important productivity tool because it empowers users and reduces the time that IT staff members must spend in providing telephone, e-mail, or face-to-face assistance.
True
To develop a user-centered interface, a designer must learn to think like a user and see the system through a user's eyes. T/F?
True
Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.
True
39. The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking. a. unit testing b. integration testing c. functional testing d. global testing
Unit testing
40. During _____, programmers must test programs that interact with other programs and files separately before they are integrated into the system. a. unit testing b. integrated testing c. acceptance testing d. functional testing
Unit testing
B) users
Unless a problem must be corrected, or modifications or enhancements must be made, access to the operational environment is limited to ____ and must be strictly controlled. A) systems analysts B) users C) programmers D) managers
b. False
Unlike the system requirements specification, which is written for users to understand, the system design document is oriented toward the programmers who will use it to create necessary programs. a. True b. False
When evaluating a system, which of the following is not necessary for a systems analyst to do?
Use interviews to gather information and opinions from a large number of users
port
Used to route incoming traffic to the correct application on a computer
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.
User application
51. When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled. a. systems analysts b. users c. programmers d. managers
Users
software reengineering
Uses analytical techniques to identify quality and performance improvements
B) train-the-trainer
Using a ____ strategy, knowledgeable users can be selected who then conduct sessions for others. A) structured walkthrough B) train-the-trainer C) desk checking D) top-down design
False
Using batch input, data entry is performed continuously.
35. _____ is the process of tracking system releases. a. Configuration control b. Version control c. Source control d. Quality control
Version control
bluetooth
Very popular for short-distance wireless communication
a. 802.11i
WPA2 is an extension of Wi-Fi Protected Access based on a full implementation of the IEEE ________ standard. a. 802.11i b. 802.11a c. 802.11b d. 802.16
The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.
Web 2.0
This describes a second generation of the web that will enable people to collaborate, interact, and share information much more effectively.
Web 2.0
wiki
Web-based repository of information that can be modified by anyone
Which of the following is true of a web-based systems development environment?
Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.
1) corporate organization and culture 2) enterprise resource planning (ERP) 3) initial and total cost of ownership (TCO) 4) scalability 5) web integration 6) legacy system interface requirements 7) processing options 8) security issues 9) corporate portals
What are the issues an analyst must consider that will affect the architecture choice of a system?
Which of the following is not specified by the detailed procedures in a test plan?
What the rate of the forward engineering will be
a. True
When an intruder gains access to a system using a compromised account and attempts to increase permission levels, it is referred to as a privilege escalation attack. a. True b. False
D) What the rate of the forward engineering will be
Which of the following is not specified by the detailed procedures in a test plan? A) How and when testing will be performed B) What test data will be used C) Who will participate D) What the rate of the forward engineering will be
applications programmer
Works on new systems development and maintenance
The test environment for an information system contains ____.
[None Given]
C) Flowcharts
____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows. A) Training plans B) Acceptance tests C) Flowcharts D) Simulations
A) Desk checking
____ is the process of reviewing the program code to spot logic errors, which produce incorrect results. A) Desk checking B) Code review C) Results walkthrough D) Logic review
C) Cohesion
____ measures a module's scope and processing characteristics. A) Coupling B) Indexing C) Cohesion D) Piloting
source document
_____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction.
LoJack
_____ for Laptops, which is sold by Absolute Software, is a type of tracking software that offers call-in service, as well as a remote data erase capability.
service time
_____ is a performance metric that measures the time it takes to process a given task once it reaches the front of the queue.
bandwidth
_____ is the amount of data that can be transferred in a fixed time period.
mesh
_____ networks, which are expensive to install and maintain, are used in situations where a high degree of redundancy is needed.
a. Integrity
________ , which is one of the three main elements of system security, prevents unauthorized users from creating, modifying, or deleting information. a. Integrity b. Availability c. Transference d. Confidentiality
c. Maintenance
________ activities include changing programs, procedures, or documentation to ensure correct system performance; adapting the system to changing requirements; and making the system operate more efficiently. a. Hardening b. Operational c. Maintenance d. Risk control
c. Wikis
________ are Web-based repositories of information that have emerged as part of Web 2.0, which is the name for the powerful and compelling shift toward Internet-based collaboration. a. Star networks b. Wireless access points c. Wikis d. Legacy systems
d. Operational costs
________ include(s) items such as supplies, equipment rental, and software leases. a. Corrective maintenance b. Perfective maintenance c. Maintenance costs d. Operational costs
b. Preventive
________ maintenance reduces the possibility of future system failure. a. Perfective b. Preventive c. Corrective d. Adaptive
c. Operational
________ security defines how particular tasks are to be performed, from large-scale data backups to everyday tasks such as storing e-mails or forms. a. Privilege b. Universal c. Operational d. Baseline
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location. a. wireless local area network (WLAN) b. storage area network (SAN) c. local area network (LAN) d. metropolitan area network (MAN)
a
At the center of the network, shown in the accompanying figure, is the _____, which manages the network and acts as a communications conduit for all network traffic. a. switch b. log c. scale d. portal
a
In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices. a hierarchical network b ring network c bus network d star network
a
In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security. a. system environment b. executive summary c. implementation requirements d. time and cost estimates
a
Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client? a. A star network b. A hub network c. A ring network d. A bus network
a
Sam has been asked to classify a number of different processing systems that his consultancy's client uses. Sam is analyzing a processing system and he has determined that it is an online processing system and not a batch processing system. Which of the following observations helped him determine the system? a. The system processing transactions completely when and where they occur b. The system avoiding a constant dialog between the user and the system c. The system allowing delays in transactions d. The system's tasks running on a predetermined schedule, without user involvement
a
Sam is looking at a second system. This system, he determines, is a batch processing system. Which of the following observations helped him determine the system? a. The IT operations group at the client site running programs at a predetermined schedule, without user involvement b. The information system at the client site being available whenever necessary, supporting business functions c. The system at the client side processing transactions completely when and where they occur d. Users accessing data randomly
a
The _____ allows the expansion of wireless access over a wide area. a Extended Service Set (ESS) topology b logical topology c physical topology d Basic Service Set (BSS) topology
a
The _____ standard uses multiple input/multiple output (MIMO) technology to boost performance. a 802.11ac b 802.11b c 802.11a d 802.11cn
a
Which of the following configurations has a central wireless device that is used to serve all wireless clients? a. The Basic Service Set (BSS) b. A data frame c. A point-of-sale (POS) terminal d. The OSI (Open Systems Interconnection) model
a
_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design. a. Enterprise resource planning (ERP) b. Legacy data c. Scalability d. Stand-alone computing
a
_____ is designed to serve the needs of a specific department, such as sales, marketing, or finance.
a data mart
_____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
a data warehouse
One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend?
a mesh network
Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client?
a star network
Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called ____.
acceptance tests
In its wireless configuration, the _____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients.
access point
As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor ____ maintenance.
adaptive
As shown in the accompanying figure, ____ when it becomes clear that the company plans to replace the system.
adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
Adaptive maintenance ____.
adds enhancements to an operational system and makes the system easier to use
The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.
allocated baseline
A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee. a. software delivery service b. manufacturer outsourcing c. manufacturer outsourcing d. application service provider
application service provider
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output.
applications
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output.
applications
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output. a. applications b. data frames c. magnetic tapes d. clients
applications
Risk ____ measures risk likelihood and impact.
assessment
A class diagram includes the class ____, which describe the characteristics of objects in the class.
attributes
A secure system includes _____ that can log every instance of data entry and changes. a. audit trails b. trap trails c. batch trails d. control trails
audit trails
In a source document, the _____ contains any required signatures. a. control zone b. authorization zone c. totals zone d. heading zone
authorization zone
A system design where the server performs all the processing is described as _____. a. dataflow architecture b. mainframe architecture c. workstation architecture d. cache architecture
b
In a(n) _____, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen. a. open design b. centralized design c. distributed design d. closed design
b
In addition to centralized data processing, the earliest systems performed all data input and output at a central location, often called a _____. a. portal b. data processing center c. web-centric hub d. thin client
b
Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources. a. desk area network (DAN) b. local area network (LAN) c. storage area network (SAN) d. wide area network (WAN)
b
The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase — systems implementation. a. data frames b. detailed costs c. web-based components d. access points
b
Wireless network speed is measured in _____. a. Bps (bits per second) b. Gbps (gigabits per second) c. Kbps (kilobytes per second) d. Tbps (terabytes per second)
b
c
b
relies on collective data paths to increase bandwidth and range. a. Microsoft Visio b. Multiple input/multiple output (MIMO) technology c. Bluetooth d. Supply chain management (SCM)
b
_____ is the amount of data that can be transferred in a fixed time period.
bandwidth
A ____ is a formal reference point that measures system characteristics at a specific time.
baseline
To measure system performance, companies use ____ testing, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.
benchmark
A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.
bluetooth
In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data. a. instruction zone b. authorization zone c. body zone d. heading zone
body zone
In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision.
build or buy
In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision. a. build or buy b. subscription c. build or make d. transactional
build or buy
In a _____, a single communication path connects the network server, departmental servers, workstations, and peripheral devices.
bus network
A _____ resembles a group of computers in which data flows in only one direction from one device to the next. a. star network b. hierarchical network c. ring network d. bus network
c
A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages. a data frame b hub c platform d bandwidth
c
A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify. a. iOS b. blog c. wiki d. portal
c
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a. legacy systems b. distributed systems c. web-centric systems d. mission-critical systems
c
Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend? a. A star network b. A hub network c. A mesh network d. A bus network
c
Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. Neil's client wants to follow the current trends with everyone else in terms of speed and versatility. He is risk-averse and wants to leverage the most popular local area network (LAN) topology. Which of the following will Neil recommend to this client? a A bus network b A hub network c A star network d A ring network
c
The _____ describes how data actually moves from an application on one computer to an application on another networked computer. a. subscription model b. five forces model c. OSI (Open Systems Interconnection) model d. object-oriented database model
c
The way a network is configured is called the _____. a network baseline b network index c network topology d network orientation
c
When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface. a safe mode b mission-critical mode c stand-alone mode d quirks mode
c
_____ describes the way the components in a network interact. a. Engagement topology b. Interactive topology c. Logical topology d. Physical topology
c
_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. a. Interoperability b. Transparency c. Scalability d. Redundancy
c
In the accompanying figure, any field that serves as a primary key is called a _____.
candidate key
Although the vast majority of reports are designed graphically, some systems still produce one or more _____ that use a character set with fixed spacing. a. fixed-spaced reports b. character-based reports c. figure-based reports d. plot-spaced reports
character-based reports
Although the vast majority of reports are designed graphically, some systems still produce one or more _____ reports that use a character set with fixed spacing. a. figure-based reports b. plot-spaced reports c. fixed-spaced reports d. character-based reports
character-based reports
In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group. a. dialog box b. list box c. text box d. check box
check box
Eamon is planning to start an online store that specializes in books and electronics. Since it's his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only the premium buyers can decipher the code shared. In this scenario, which code would you suggest that Eamon use?
cipher code
The term "_____" generally refers to systems that divide processing between one or more networked clients and a central server.
client/server
The term _____ generally refers to systems that divide processing between one or more networked clients and a central server.
client/server
A _____ is a set of letters or numbers that represents a data item.
code
Many organizations require a more formal type of desk checking called a structured walkthrough, or ____ review.
code
A module that performs a single function or task has a high degree of ____, which is desirable.
cohesion
A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together. a. existence check b. combination check c. data type check d. reasonableness check
combination check
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help. a. command button b. option button c. toggle button d. help button
command button
If a primary key combines two or more fields, then it is called a _____.
composite key
In a structure chart, a(n) ____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.
condition
In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.
condition
User documentation ____.
consists of instructions and information to users who will interact with the system
Operations documentation ____.
contains all the information needed for processing and distributing online and printed output
Risk ____ develops safeguards that reduce risks and their impact.
control
A _____ usually causes specific actions, such as printing subtotals for a group of records in a report. a. control break b. concatenation character c. subgroup d. character break
control break
To produce a control break report, the records must be arranged, or sorted, in _____. a. control break order b. control field order c. subgroup field order d. character break order
control field order
In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms. a. control zone b. heading zone c. totals zone d. authorization zone
control zone
A(n) _____ provides access for customers, employees, suppliers, and the public. a. application server b. thick client c. corporate portal d. mainframe architecture
corporate portal
As shown in the accompanying figure, maintenance expenses usually are high when a system is implemented because problems must be detected, investigated, and resolved by ____ maintenance.
corrective
A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities. a. hash topology notation b. crow's foot notation c. big O notation d. dark resistor's notation
crow's foot notation
A _____, such as that illustrated in the accompanying figure, has a central networking device that manages the network. a. bus network b. ring network c. hierarchical network d. star network
d
A disadvantage of a bus network is that _____. a. data flows in only one direction from one computer to the next b. failure in one workstation necessarily affects other workstations on the network c. devices cannot be attached or detached without disturbing the rest of the network d. performance can decline as more users and devices are added
d
A new system might have to interface with one or more _____, which are older systems that use outdated technology. a. intrusion detection systems b. mission-critical systems c. enterprise resource planning (ERP) systems d. legacy systems
d
In a _____, a single communication path connects the network server, departmental servers, workstations, and peripheral devices. a. hierarchical network b. star network c. ring network d. bus network
d
In a typical system design specification, in the _____ section, start-up processing, initial data entry or acquisition, user training requirements, and software test plans are specified. a. executive summary b. system components c. system environment d. implementation requirements
d
Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment. a. advanced data b. primary data c. qualitative data d. legacy data
d
Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, according to their circumstances. One of Neil's clients, Ann, is looking for a highly redundant and reliable network topology Ann is not particularly concerned about the expenditure that would go behind the installation and maintenance of the network. Which of the following networks is Neil most likely to recommend? a A bus network b A hub network c A star network d A mesh network
d
Sam has been asked to classify a number of different processing systems that his consultancy's client uses. Sam is analyzing a processing system and he has determined that it is an online processing system and not a batch processing system. Which of the following observations helped him determine the system? a The system allowing delays in transactions b The system's tasks running on a predetermined schedule, without user involvement c The system avoiding a constant dialog between the user and the system d The system processing transactions completely when and where they occur
d
The _____ was formed in 1999 to certify interoperability of wireless network products based on IEEE 802.11 specifications. a. World Wide Web Consortium (W3C) b. Wi-MAX c. Institute of Electrical and Electronics Engineers (IEEE) d. Wi-Fi Alliance
d
_____ is the amount of data that can be transferred in a fixed time period. a. Resolution b. Dimensionality c. Topology d. Bandwidth
d
_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. a. System file checker b. Legacy data c. Multipath design d. System architecture
d
During _____, existing data is loaded into the new system
data conversion
During _____, existing data is loaded into the new system.
data conversion
A _____ controls database operations, including storing, retrieving, updating, and deleting data. a. data definition language b. data query language c. data manipulation language d. data device language
data manipulation language
A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.
data structure
A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. a. data load rule b. data validation rule c. data requirements rule d. data mining rule
data validation rule
Typically, a database management system is managed by a person called a _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.
database administrator
A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.
database management system
Program documentation ____.
describes the inputs, outputs, and processing logic for all program modules
In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.
design
In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. a. system prototyping b. command prototyping c. design prototyping d. layout prototyping
design prototyping
A(n) ____ produces one or more lines of output for each record processed. A) detail report B) exception report C) summary report D) exigency report
detail report
A(n) _____ produces one or more lines of output for each record processed. a. detail report b. exception report c. summary report d. exigency report
detail report
The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase — systems implementation.
detailed costs
The system design specification is a document that presents the complete design for a new information system, along with _____ for completing the next SDLC phase — systems implementation.
detailed costs
Application ____ is the process of constructing the programs and code modules that serves as the building blocks of an information system.
development
If variable input data is needed, a _____ must be provided to explain what is needed. a. dialog box b. list box c. menu bar d. toggle button
dialog box
As the accompanying figure illustrates, the ____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational.
direct cutover
A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily. a. command-line b. disked c. thick d. diskless
diskless
In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.
distributed database management system (DDBMS)
In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____. a. distributed data frame b. distributed supply chain management (DSCM) scheme c. distributed database management system (DDBMS) d. distributed data dictionary
distributed database management system (DDBMS)
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.
distributed systems
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.
distributed systems
Compared to mainframe architecture, these increase concerns about data security and integrity because many individual clients require access to perform processing.
distributed systems
Perfective maintenance usually is cost effective ____ the system's operational life.
during the middle of
The inherent efficiency of high-volume processing on larger computers is called _____.
economy of scale
Software ____ is a software development process that stresses solid design, effective structure, accurate documentation, and careful testing.
engineering
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
entity-relationship diagram (ERD)
A(n) _____ is a technique that uses a common yardstick to measure an compare vendor ratings.
evaluation model
A(n) _____ displays only those records that meet a specific condition or conditions. a. detail report b. exception report c. summary report d. exigency report
exception report
A(n) _____ is a data validation rule that is used for applying to mandatory data items. a. sequence check b. range check c. asynchronic check d. existence check
existence check
The _____ allows the expansion of wireless access over a wide area.
extended service set (ESS) topology
A common field is an attribute that appears in only one entity.
false
A primary key is composed of exactly two fields.
false
A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.
false
A schema is a set of letters or numbers that represents a data item.
false
A secondary key is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
false
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.
false
A thin client design locates all or most of the application processing logic at the client.
false
A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.
false
A web-based data design requires users to have powerful workstations.
false
Cipher codes distinguish items by using a series of subgroups of digits.
false
Compared to mainframe architecture, distributed systems decrease concerns about data security and integrity because fewer individual clients require access to perform processing.
false
Encryption is the process of creating table designs by assigning specific fields or attributes to each table in the database.
false
Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services.
false
In a closed design, the remote user's keystrokes are transmitted from his or her terminal to the mainframe, which responds by sending screen output back to the user's screen.
false
In a table or file, each column represents a record and each row represents a field.
false
Like a primary key, a foreign key must be unique.
false
Mainframe storage refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored.
false
Most magazine subscription codes are action codes.
false
The database and the Internet speak the same language.
false
The three normal forms constitute a progression in which second normal form represents the best design.
false
Today, few ASPs offer full-scale Internet business services for companies that decide to outsource those functions.
false
Web-based designs are dependent on a specific combination of hardware and software.
false
`Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time.
false
Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned
false
The skill set required to develop documentation usually is the same as that required to develop a system.
false
A _____ system allows a customer to request a fax using email, via the company website or by telephone. a. faxback b. frontfax c. turnfax d. digifax
faxback
A _____ system allows a customer to request a fax using email, via the company website or by telephone. a. faxback b. frontfax c. digifax d. turnfax
faxback
At the end of the systems implementation phase, the final report to management should include ____.
final versions of all system documentation a comparison of actual costs and schedules to the original estimates planned modifications and enhancements to the system that have been identified
A table is in _____ if it does not contain a repeating group.
first normal form
In a structure chart, a control couple shows a message, also called a status ____, which one module sends to another.
flag
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
foreign key
The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
functional baseline
The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered. a. good input, bad output (GIBO) b. garbage in, garbage out (GIGO) c. poor start, poor finish (PSPF) d. weak hand, weak hold (WHWH)
garbage in, garbage out (GIGO)
This is a device that connects network segments, determines the most efficient data path, and guides the flow of data.
gateway
Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s. a. command line interface b. binary line interface c. character user interface d. graphical user interface
graphical user interface (GUI)
When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic e-commerce environment.
greater initial investment but provides more flexibility
When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic ecommerce environment.
greater initial investment but provides more flexibility
Centralized IT departments no longer produce reams of printed _____ reports. a. batch b. greenbar c. audit d. yellowbar
greenbar
In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices.
hierarchical network
In a _____, one or more powerful servers control the network, and departmental servers control lower levels of processing and network devices.
hierarchical network
Risk ____ analyzes the organization's assets, threats, and vulnerabilities.
identification
In a typical system design specification, in the _____ section, start-up processing, initial data entry or acquisition, user training requirements, and software test plans are specified. a. system environment b. implementation requirements c. executive summary d. system components
implementation requirements
The software that a company's IT department makes, builds, and develops is called _____.
in-house software
This is another name for the wireless configuration in which a central wireless device is used to serve all wireless clients.
infrastructure mode
Lisa and her team have finished the coding of a new application, and they are ready to begin testing. She asks Tina, a senior software tester, for help in designing the types of tests that Lisa and her team should perform. Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together correctly. What is one of the names of this type of testing?
integration testing
Testing two or more programs that depend on each other is called _____.
integration testing
Some firms offer ____, which provide powerful Web-based support for transactions such as order processing, billing, and customer relationship management.
internet business services (IBS)
Perfective maintenance ____.
involves changing an operational system to make it more efficient, reliable, or maintainable
During the systems design phase, _____ are used to organize, access, and maintain data structures.
key fields
Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment.
legacy data
Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment.
legacy data
A new system might have to interface with one or more _____, which are older systems that use outdated technology. a. enterprise resource planning (ERP) systems b. mission-critical systems c. intrusion detection systems d. legacy systems
legacy systems
A new system might have to interface with one or more _____, which are older systems that use outdated technology.
legacy systems
If a module must perform multiple tasks, ____.
less complex coding is required
T he given figure shows a _____ module, which is reusable code and can be invoked from more than one point in a structure chart.
library
Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources
local area network (LAN)
Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.
local area network (LAN)
In a structure chart, a curved arrow represents a ____, which indicates that one or more modules are repeated.
loop
In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated.
loop
A system design where the server performs all the processing is described as _____.
mainframe architecture
When setting priorities, many IT managers believe that evaluating all projects together leads to the best possible decisions because ____.
maintenance and new development require similar IT department resources
The data mining technique that relies on association rule learning is often called _____.
market basket analysis
Input _____ is a template or pattern that restricts data entry and prevents errors. a. pattern b. mask c. legend d. key
mask
Input _____ is a template or pattern that restricts data entry and prevents errors. a. mask b. pattern c. legend d. key
mask
A class diagram includes the class ____, which represent the program logic.
methods
A class diagram includes the class _____, which represent the program logic.
methods
In a multi-tier system, special utility software called _____ enables the tiers to communicate and pass data back and forth. a. middleware b. malware c. groupware d. shareware
middleware
To bridge the gap between a database and the Internet, it is necessary to use _____, which is software that integrates different applications and allows them to exchange data.
middleware
Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems. a. public domain software b. shareware c. freeware d. middleware
middleware
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.
mnemonic
In a(n) _____ design, one can create individual components that connect to a higher-level program or process. a. integral b. dissociated c. modular d. archetypical
modular
A _____ consists of related program code organized into small units that are easy to understand and maintain.
module
In most organizations, ____ IT department effort goes into supporting existing systems and making them more valuable to users.
more than half of all
A _____ language feature allows users to type commands or requests in normal text phrases. a. normal b. natural c. standard d. basal
natural
A _____ language feature allows users to type commands or requests in normal text phrases. a. standard b. normal c. basal d. natural
natural
The _____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur. a. net present value (NPV) b. return on investment (ROI) c. acquisition process d. payback analysis
net present value (NPV)
The way a network is configured is called the _____.
network topology
Which of the following is not an advantage of the release methodology?
new features or upgrades are available more often
Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas.
newsgroups
Any field that is not a primary key or a candidate key is called a _____.
nonkey field
Indications that a system has reached the end of its economically useful life include ____.
operational costs and execution times are decreasing rapidly
Companies use various _____ methods to maintain output integrity and security. a. output stream b. output aesthetic c. output control d. output data
output control
Possible disadvantages of rotating IT staff from maintenance to new systems groups include ____.
overhead costs increase when people move from one job to another systems analysts have less opportunity to become skilled at any one job
In ____ programming, two programmers work on the same task on the same computer.
parallel
As the accompanying figure illustrates, the ____ changeover method requires that both the old and the new information systems operate fully for a specific period.
parallel operation
In this changeover method both the old and the new information systems operate fully for a specific period.
parallel operation
A disadvantage of a bus network is that _____.
performance can decline as more users and devices are added
A disadvantage of a bus network is that _____.
performance can decline as more users and devices are added
As the accompanying figure illustrates, the ____ changeover method allows the new system to be implemented in stages, or modules.
phased operation
A _____ describes the actual process of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reporters and so on.
physical design
_____ describes the actual network cabling and connections.
physical topology
As the accompanying figure illustrates, the ____ changeover method involves implementing the complete new system at a selected location of the company.
pilot operation
This changeover method involves implementing the complete new system at a selected location of the company.
pilot operation
A popular security solution is the use of a network-based application, often called a _____, which controls access to and from workstation interfaces. a. port synchronizer b. port connector c. port installer d. port protector
port protector
A _____ is an entrance to a multifunction website.
portal
A _____ is an entrance to a multifunction website.
portal
In the accompanying figure, a _____ is a field or combination of fields that uniquely and minimally identify a particular member of an entity.
primary key
A(n) ____ is an unauthorized attempt to increase permission levels.
privilege escalation attack
In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system. a. physical-control b. process-control c. quality-control d. network-control
process-control
The environment for the actual system operation is called the _____.
production environment
User documentation includes ____.
program, systems analyst, programmer, and system identification
A main objective of a service desk is to ____.
provide answers to technical or operational questions make users more productive by teaching them how to meet their own information needs
When developing a training program, which of the following guidelines should be kept in mind?
provide for learning by hearing, seeing, and doing
With a _____, users provide an example of the data requested.
query by example language
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished. a. query language b. imperative language c. procedural language d. query by example language
query language
A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. a. sequence check b. range check c. asynchronous check d. existence check
range check
A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong. a. sequence check b. range check c. validity check d. reasonableness check
reasonableness check
In an entity-relationship diagram, entities are commonly represented as _____.
rectangles
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems. a. referential integrity b. candidate integrity c. combinatorial integrity d. foreign integrity
referential integrity
The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information. a. total field b. report header c. report footer d. character field
report footer
The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information. a. control head b. report header c. report footer d. character head
report header
A _____ is a document that describes a company, lists the IT services or products needed, and specifies the features required. a. request for quotation (RFQ) b. request for proposal (RFP) c. return on investment (ROI) d. present net value (PNV)
request for proposal (RFP)
When companies use a _____, they already know the specific products or service they want and need to obtain price estimates or bids from vendors.
request for quotation (RFQ)
Preventive maintenance ____.
requires analysis of areas where trouble is likely to occur in order to avoid problems
In sequence, the four steps typically followed to create a structure chart are ____.
review the DFDs; identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary
A _____ resembles a group of computers in which data flows in only one direction from one device to the next.
ring network
A _____ resembles a group of computers in which data flows in only one direction from one device to the next.
ring network
This is a process that automatically allows a wireless client to associate with a stronger access point.
roaming
This is used to connect any network topology to a larger, dissimilar network.
router
Preset ____ determine whether a firewall will allow network traffic to pass.
rules
This is important in implementing systems that are volume-related, such as transaction processing systems.
scalability
_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.
scalability
Cloud computing provides _____, which matches resources to needs at any given time. a. point-of-sale (POS) terminal b. roaming service c. resource management d. scaling on demand
scaling on demand
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____. a. cell b. schema c. viewport d. framework
schema
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.
second normal form
A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.
secondary key
When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.
service
Eamon is planning to start an online store that specializes in books and electronics. Since it's his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product's warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which code would you suggest that Eamon use?
significant digit code
When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.
software license
When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions. a. software license b. fixed fee model c. supplemental maintenance agreement d. request for proposal
software license
Which of the following is a software collection obtained from a vendor or application service provider?
software package
Which of the following is a software collection obtained from a vendor or application service provider? a. software package b. software cluster c. software aggregate d. software metric
software package
In the context of in-house software development options, companies that develop software for sale are called _____.
software vendors
A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction. a. transaction document b. recovery document c. source document d. tester document
source document
When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.
stand-alone mode
Designing tables is easier if a _____ is used to show a table's structure, fields, and primary key. a. viewport notation format b. distinct notation format c. standard notation format d. multifaceted notation format
standard notation format
A _____, such as that illustrated in the accompanying figure, has a central networking device that manages the network.
star network
In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another.
status flag
Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design. a. storyboard b. viewbox c. viewport d. wireframe
storyboard
Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design. a. storyboard b. wireframe c. viewport d. viewbox
storyboard
A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information.
structure chart
A _____, such as that illustrated in the given figure, consists of rectangles that represent program modules, with arrows and other symbols that provide additional information.
structure chart
In a technique called ____ testing, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.
stub
In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.
stub testing
In a top-down design, the overall objectives of a system are broken down into ____ in a process called partitioning.
subsystems modules
For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate. a. detail report b. exception report c. summary report d. exigency report
summary report
Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____. a. supply chain management (SCM) b. cloud computing c. stand-alone computing d. behavioral management
supply chain management (SCM)
The ____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
system administrator
_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. a. Multipath design b. Legacy data c. System architecture d. System file checkers
system architecture
In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications.
system components
In a typical system design specification, the _____ section contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specifications. a. system components b. s ystem summaries c. implementation environments d. implementation requirements
system components
In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.
system environment
After completing integration testing, a systems analyst must perform _____, which involves the entire information system and includes all typical processing situations.
system testing
The goal of _____ is to build a system that is effective, reliable, and maintainable. a. systems reporting b. systems analysis c. systems design d. systems auditing
systems design
A _____ specifies the fields and identifies the primary key in a particular file. a. frame design b. table design c. window d. viewport
table design
When planning capacity, detailed information is needed about ____.
the number of threats and critical risks posed to a system
A _____ design locates all or most of the processing logic on the server.
thin client
A ____ is an internal or external entity that could endanger an asset.
threat
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature that is used to represent on or off status and switches to the other status when clicked. a. command button b. option button c. toggle button d. help button
toggle button
Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands. a. menu box b. toolbar c. dialog box d. taskbar
toolbar
In a(n) ____ approach, the systems analyst documents the system's requirements and then breaks them down into subsystems and modules.
top-down
Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.
top-down approach
The way a network is configured is called the _____.
topology
Using a ____ strategy, knowledgeable users can be selected who then conduct sessions for others.
train-the-trainer
A(n) _____ does not distract a user and calls no attention to itself. a. transparent interface b. translucent interface c. opaque interface d. pellucid interface
transparent interface
A 3NF design avoids redundancy and data integrity problems that still can exist in 2NF designs.
true
A device called a proxy server provides Internet connectivity for internal LAN users.
true
A logical record is a set of field values that describes a single person, place, thing, or event.
true
A main advantage of ERP is that it describes a specific hardware and software environment, also called a platform, which ensures connectivity and easy integration of future systems, including in-house software and commercial packages.
true
A router is a device that connects network segments, determines the most efficient data path, and guides the flow of data.
true
A subschema is a view of the database used by one or more systems or users.
true
An M:N relationship is different from 1:1 or 1:M relationships because the event or transaction that links the two entities is actually a third entity, called an associative entity, that has its own characteristics.
true
An in-house solution usually requires a greater initial investment but provides more flexibility for a company that must adapt quickly in a dynamic e-commerce environment.
true
As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.
true
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.
true
Batch processing means that data is managed in groups or batches.
true
By the time the final design presentation is delivered, all necessary approvals should have been obtained from prior presentations, and the users and IT department should be onboard.
true
Client/server architecture does involve performance issues that relate to the separation of server-based data and networked clients that must access the data.
true
Cloud computing requires less bandwidth than traditional client/server networks.
true
College course numbers usually are assigned using a block sequence code.
true
Common fields can be used to link entities in various types of relationships.
true
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
true
In contrast to a centralized system, a client/server design separates applications and data.
true
Middleware can be seen as representing the slash in the term client/server.
true
Migrating a traditional database design to the web can require design modification, additional software, and some added expense.
true
Some view Web 2.0 as a stepping stone toward the semantic web, called Web 3.0 by some, where the documents shared on the Internet have semantics and not just syntax.
true
System architecture marks the end of the systems design phase of the SDLC.
true
Systems that interact with a DBMS are relatively independent of how the physical data is maintained.
true
The advantage of the application logic layer is that a three-tier design enhances overall performance by reducing the data server's workload.
true
The basic elements of logical storage are alphabetic or numeric characters, such as the letter A or the number 9.
true
Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.
true
To resolve potential database connectivity and access problems, companies use ODBC-compliant software that enables communication among various systems and DBMSs.
true
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.
true
The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits.
true
To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year.
true
Printed output is used in _____, which are output documents that are later entered back into the same or another information system. a. milestone documents b. tender documents c. turnaround documents d. policy documents
turnaround documents
Binary digits have only _____ possible value(s).
two
During ____ testing, programmers must test programs that interact with other programs and files individually, before they are integrated into the system.
unit
The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.
unit
The testing of an individual module is called ____ testing.
unit
A table design that contains a repeating group is called _____. a. unnormalized b. synchronized c. normalized d. unsynchronized
unnormalized
A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness. a. testability b. usability c. encapsulation d. abstraction
usability
Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system. a. encapsulation metrics b. abstraction metrics c. ergonomic metrics d. usability metrics
usability metrics
A(n) _____ is an outsourcing fee model that charges variable fee based on the volume of transactions or operations performed by the application.
usage model
In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application.
user interface
If significant changes take place in an existing system or if a new version is released, the IT department might develop a ____.
user training package
In a _____ system, the distinction blurs between input, output, and the interface itself. a. user-centered b. topology-centered c. system-centered d. network-centered
user-centered
Unless a problem must be corrected, or modifications or enhancements must be made, access to the operational environment is limited to ____ and must be strictly controlled.
users
Discuss cloud computing at length, including its advantages and disadvantages.
uses a cloud symbol to represent the internet, which is transparent to users and provides a hardware-independent environment. Where remotes servers handle all processing and computing functions and the internet itself replaces traditional networks + accessibility + scale and cost + little to no maintenance + innovative - security - lack of control - lock-in -reliability
A(n) _____ is a data validation rule that can be used for data items that must have certain values. a. existence check b. validity check c. batch check d. reasonableness check
validity check
A software package developed to handle information requirements for a specific type of business is called a(n) _____. a. vertical application b. asymmetric application c. horizontal application d. symmetric application
vertical application
A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy.
web-centric architecture
A _____ follows Internet design protocols and enables a company to integrate new applications into its ecommerce strategy. a. data processing center b. web-centric architecture c. corporate portal d. thin client
web-centric architecture
To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet. a. netpod b. podread c. webOS d. webcast
webcast
To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet. a. netpod b. webcast c. podread d. webOS
webcast
These are broadband wireless communications protocols for metropolitan area networks (MANs).
wi-MAX
A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.
wiki
A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify. a. iOS b. portal c. wiki d. blog
wiki
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
wireless local area network (WLAN)
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
wireless local area network (WLAN)
Which of the following are the advantages of using a distributed database management system (DDBMS)?
-The system is less likely to experience a catastrophic failure when data is stored in various locations. -The system is scalable, so new data sites can be added without reworking the system design. -The data stored closer to users can reduce network traffic.
data validation rule
A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.
* reasonableness check
A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong.
Roger is part of a team that is responsible for employing a new information system, the design of which was developed using customary structured methods. To manage the intricacy of the application development process, Roger wants to deploy structured development techniques, and he asks Pete, his coworker, for information about these techniques. Pete tells him about structure charts, which show program modules and the relationships among them using various graphical symbols. Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition?
A line with a diamond on one end
True
A transparent interface does not distract a user and calls no attention to itself.
transparent interface
A(n) _____ does not distract a user and calls no attention to itself.
combination check
A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together.
existence check
A(n) _____ is a data validation rule that is used for applying to mandatory data items.
False
An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals.
graphical user interface
Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.
The Software Engineering Institute (SEI)established a new model, called _____, which incorporates software and systems development into a much larger framework.
Capability Maturity Model Integration (CMMI)
_____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. a. Grid computing b. Cloud computing c. Mainframe computing d. Utility computing
Cloud computing
_____ help offers assistance for a task in progress. a. Context-sensitive b. User-selected c. User-sensitive d. Standard-selected
Context-sensitive
_____ is the process of reviewing a program code to spot logic errors, which produce incorrect results.
Desk checking
_____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.
Flowcharts
_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen. a. Form uploading b. Form resetting c. Form filling d. Form pulling
Form filling
dialog box
If variable input data is needed, a _____ must be provided to explain what is needed.
command button
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help.
authorization zone
In a source document, the _____ contains any required signatures.
body zone
In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.
_____ requires that a software supplier document all testing and maintain records of test results.
International Organization for Standardization (ISO)
_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. a. Ergonomics b. Aesthetics c. Output security d. Interface technology
Output security
When developing a training program, which of the following guidelines should be kept in mind?
Select the most effective place to conduct the training.
_____ is the process of putting a new information system online and retiring the old system.
System changeover
garbage in, garbage out (GIGO)
The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered.
Form filling
_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen.
System prototyping
_____ produces a full-featured, working model of the information system.
A secure system includes _____ that can log every instance of data entry and changes. a. audit trails b. batch trails c. control trails d. trap trails
audit trails
In a source document, the _____ contains any required signatures. a. control zone b. heading zone c. totals zone d. authorization zone
authorization zone
In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group. a. check box b. dialog box c. list box d. text box
check box
A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together. a. data type check b. combination check c. reasonableness check d. existence check
combination check
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature used to initiate an action such as printing a form or requesting help. a. toggle button b. help button c. command button d. option button
command button
Operations documentation _____.
contains all the information needed for processing and distributing online and printed output
Operations documentation _____.
contains all the information needed for processing and distributing online and printed output
A _____ usually causes specific actions, such as printing subtotals for a group of records in a report. a. concatenation character b. subgroup c. character break d. control break
control break
In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms. a. heading zone b. control zone c. totals zone d. authorization zone
control zone
In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. design prototyping
design prototyping
A(n) _____ produces one or more lines of output for each record processed. a. detail report b. exception report c. exigency report d. summary report
detail report
If variable input data is needed, a _____ must be provided to explain what is needed. a. dialog box b. toggle button c. list box d. menu bar
dialog box
A(n) _____ displays only those records that meet a specific condition or conditions. a. exigency report b. exception report c. summary report d. detail report
exception report
A(n) _____ is a data validation rule that is used for applying to mandatory data items. a. asynchronic check b. sequence check c. existence check d. range check
existence check
Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s. a. binary line interface b. character user interface c. graphical user interface d. command line interface
graphical user interface
Companies use various _____ methods to maintain output integrity and security. a. output aesthetic b. output control c. output data d. output stream
output control
A popular security solution is the use of a network-based application, often called a _____, which controls access to and from workstation interfaces. a. port connector b. port protector c. port synchronizer d. port installer
port protector
A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong. a. reasonableness check b. sequence check c. range check d. validity check
range check
A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. a. sequence check b. asynchronous check c. range check d. existence check
range check
The _____, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information. a. report footer b. total field c. report header d. character field
report footer
The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information. a. control head b. report footer c. character head d. report header
report header
A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction. a. recovery document b. transaction document c. tester document d. source document
source document
For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate. a. summary report b. exception report c. detail report d. exigency report
summary report
The goal of _____ is to build a system that is effective, reliable, and maintainable. a. systems analysis b. systems reporting c. systems auditing d. systems design
systems design
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature that is used to represent on or off status and switches to the other status when clicked. a. command button b. option button c. toggle button d. help button
toggle button
A(n) _____ does not distract a user and calls no attention to itself. a. transparent interface b. pellucid interface c. opaque interface d. translucent interface
transparent interface
A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness. a. usability b. encapsulation c. testability d. abstraction
usability
Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system. a. ergonomic metrics b. encapsulation metrics c. abstraction metrics d. usability metrics
usability metrics
In a _____ system, the distinction blurs between input, output, and the interface itself. a. user-centered b. system-centered c. topology-centered d. network-centered
user-centered
A(n) _____ is a data validation rule that can be used for data items that must have certain values. a. existence check b. reasonableness check c. validity check d. batch check
validity check
service provider
A firm that offers outsourcing solutions is called a _____.
48. _____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service. a. Restructuring b. Capacity planning c. Resource sizing d. Reorganizing
Capacity planning
58. A(n) _____ is an attack that takes advantage of a vulnerability. a. proxy b. exploit c. firewall d. archive
Exploit
63. One of his firm's clients details an incident in which a hacker — a former employee — thieved trade secrets from the client and threatened to release them to the competition if he was not paid. In which of the following categories should George place this incident? a. Vandalism b. Trespass and espionage c. Extortion d. Software attack
Extortion
1. As enterprise-wide information systems grow more complex, configuration management becomes trivial.
False: becomes more complex
2. Bandwidth requirements are expressed in bytes per minute.
False: bits per second (bps)
8. Wrapping refers to the practice of storing backup media away from the main business location, in order to mitigate the risk of a catastrophic disaster, such as a flood, fire, or earthquake.
False: offsitting
3. In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key.
False: public key and private key
5. In a secluded engineering attack, an intruder uses social interaction to gain access to a computer system.
False: social engineering attack
11. Both adaptive and perfective maintenance activities decrease in a dynamic business environment.
False: they increase
6. One highly publicized form of social engineering is called post texting, which is a method of obtaining personal information under false pretenses.
False: this is pretexting
13. When network traffic is encrypted, it is invisible and its content and purpose are masked.
False:visible
41. _____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action. a. Benchmark testing b. Throughput management c. Responsive testing d. Fault management
Fault management
64. Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat? a. Human error b. Technical obsolescence c. Service failure d. Espionage
Technical obsolescence
15. If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____. a. user training package b. user presence software c. maintenance module d. utility index
User training package
57. A _____ is a security weakness or soft spot. a. proxy b. vulnerability c. firewall d. malware
Vulnerabiltiy
middleware
Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems.
68. A(n) _____ can prevent an unauthorized person from booting a computer by using a CD-ROM or USB device. a. boot-level password b. application-level password c. BIOS-level password d. power-on password
-Boot-level password -BIOS-level password -Power-on password
logical design
A _____ defines what must take place, not how it will be accomplished.
67. Response time is affected by _____. a. system design b. capabilities c. follow-up messages d. processing methods
-System design -Capabilities -Processing methods
C) methods
A class diagram includes the class ____, which represent the program logic. A) attributes B) events C) methods D) characters
22. As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance. a. corrective b. adaptive c. perfective d. preventive
Adaptive
27. Perfective maintenance usually is cost effective _____ a system's operational life. a. early in b. during the middle of c. during the end of d. throughout
During the middle of
23. As shown in the accompanying figure, near the end of a system's useful life, _____ when it becomes clear that a company plans to replace the system. a. adaptive, corrective, and perfective maintenance expenses all increase rapidly b. perfective maintenance expenses increase rapidly, but adaptive and corrective maintenance typically decrease c. adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases d. adaptive, corrective, and perfective maintenance expenses all decrease rapidly
Adaptive and corrective maintenance expenses increase rapidly, but perfective maintenance typically decreases
25. Adaptive maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. competes for resources in an operational system
Adds enhancements to an operational system and makes the system easier to use
39. The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features. a. functional baseline b. operational baseline c. allocated baseline d. product baseline
Allocated baseline
29. In maintenance management, _____ means examining the whole in order to learn about the individual elements. a. synthesis b. adoption c. analysis d. elucidation
Analysis
32. _____ is a process for controlling changes in system requirements during software development. a. Data management b. Disk management c. Configuration management d. Email management
Configuration management
24. Corrective maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. competes for resources in an operational system
Diagnoses and corrects errors in an operational system
B) condition
In a structure chart, a(n) ____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invoked. A) method B) condition C) class D) attribute
True
In a traditional systems development environment, security issues usually are less complex than with web-based systems, because the system operates on a private company network, rather than the Internet.
A) review the DFDs; identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary
In sequence, the four steps typically followed to create a structure chart are ____. A) review the DFDs; identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary B) identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary; review the DFDs C) add couples, loops, and conditions; analyze the structure chart and the data dictionary; review the DFDs; identify modules and relationships D) analyze the structure chart and the data dictionary; review the DFDs; identify modules and relationships; add couples, loops, and conditions
50. _____ prevents unauthorized users from creating, modifying, or deleting information. a. Availability b. Integrity c. Confidentiality d. Evacuation
Integrity
26. Perfective maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. competes for resources in an operational system
Involves changing an operational system to make it more efficient, reliable, or maintainable
18. _____ costs include expenses for items such as supplies, equipment rental, and software leases. a. Operational b. Corrective c. Maintenance d. Adaptive
Operational
17. A help desk can boost its productivity by using _____, which allows IT staff to take over a user's workstation and provide support and troubleshooting. a. high-level synthesis b. wireless fidelity c. word editing software d. remote control software
Remote control software
28. To avoid problems, preventive maintenance _____. a. adds enhancements to an operational system and makes the system easier to use b. diagnoses and corrects errors in an operational system c. involves changing an operational system to make it more efficient, reliable, or maintainable d. requires analysis of areas where trouble is likely to occur
Requires analysis of areas where trouble is likely to occur
44. _____ is the overall time between a request for system activity and the delivery of the response. a. Response time b. Throughput time c. Refresh rate d. Base rate
Response time
53. _____ analyzes an organization's assets, threats, and vulnerabilities. a. Risk uncertainty b. Risk diversification c. Risk identification d. Risk control
Risk identification
14. The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life. a. implementation b. verification c. security d. testing
Security
52. The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability. a. security policy b. risk policy c. threat report d. concealment report
Security policy
65. One of George's clients reports that the traffic on their network is being intercepted and scanned for valuable information. How does George categorize this incident? a. Spoofing b. Man in the middle c. Dumpster diving d. Sniffing
Sniffing
66. Another of George's clients describes a situation in which a caller to their service desk pretended to be a legitimate user and requested that his password to his company account be changed. How does George categorize this incident? a. Social engineering b. Mail bombing c. Spoofing d. Privilege escalation
Social engineering
33. A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team. a. tester b. programmer c. system validator d. system administrator
System administrator
lower bottom-line costs
The main reason for offshore outsourcing is to _____.
46. _____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency. a. Throughput b. Resolution c. Dimensionality d. Latency
Throughput
10. In a broad sense, credentials include formal degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.
True
47. _____ measures the time between submitting a request for information and the fulfillment of the request. a. Bandwidth b. Turnaround time c. Throughput d. Frequency
Turnaround time
software license
When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.
Many applications require substantial desktop computing power and resources.
Which of the following is true of a traditional systems development environment?
D) Coupling
____ describes the degree of interdependence among modules. A) Resolution B) Modularity C) Dynamism D) Coupling
Payback analysis
_____ determines how long it takes an information system to spend for itself through reduced costs and increased benefits.
Cloud computing
_____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
The Transaction Processing Performance Council (TPC)
_____ is an example of a nonprofit organization that publishes standards and reports for its members and the general public.
Software as a Service
_____ reduces the customer's need for software maintenance, operation, and support.
When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.
service
When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.
subscription model