CIS 450 Exam 3 Sutherland LaTech
Programs that utilize standard business software, such as Microsoft Office, which has been configured in a specific manner to enhance user productivity.
user application
what is the output of systems analysis in the SDLC
system requirements document (SRD)
Includes screens, commands, controls, and features that enable users to interact more effectively with an application.
User Interface
A record of the source of each data item and when it entered a system.
audit trail
Part of a form that contains any required signatures.
authorization zone
A system that allows a customer to request a fax using email, the company website, or a telephone. The response is transmitted in a matter of seconds back to the user's fax machine.
automated fax
A choice between developing in-house software and purchasing software, often called a ________ decision.
build or buy
A report created using a single mono-spaced character set.
character-based report
A type of data validation check that is performed on two or more fields to ensure that they are consistent or reasonable when considered together.
combination check
Onscreen button that initiates an action such as printing a form or requesting Help.
command button
A group of people involved in selecting hardware and software. The group includes systems analysts and users. A team approach ensures that critical factors are not overlooked and that a sound choice is made.
evaluation and selection team
A document displaying only those records that meet a specific condition or conditions.
exception report
A type of data validation check that is used for mandatory data items.
existence check
A service model that charges a set fee based on a specific level of service and user support.
fixed fee model
what is the output of systems security and support in the SDLC
fully operational system
An output mechanism that displays a list of choices that the user can select.
list box
Methods to maintain integrity and security.
output controls
A web-based broadcast that allows a user to receive audio or multimedia files using music player software such as iTunes, and listen to them on a PC or download them to a phone.
podcast
A firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
Application Service Provider (ASP)
A total is used to verify batch input. __________ might check data items such as record counts and numeric field totals. For example, before entering a batch of orders, a user might calculate the total number of orders and the sum of all the order quantities.
Batch control
A type of data validation check that is used to ensure that a data item fits the required data type.
Data type check
A value a field will assume unless an explicit value is entered for that field.
Default Value
__________ information on an individual that conforms to nationally recognized interoperability standards and that can be created, managed, and consulted by authorized clinicians and staff across more than one healthcare organization
Electronic Health Record (EHR)
A process where data is coded so that only those with the required authorization can access the data
Encryption
The concept that the quality of the output is only as good as the quality of the input.
Garbage in‐garbage out
The use of graphical objects and techniques allowing users to communicate with a system.
Graphical User Interface (GUI)
A description of the relationship between computers and the people who use them to perform business-related tasks.
Human-Computer Interaction
Template or pattern that makes it easier for users to enter data. Often used in automated forms to guide an unfamiliar user.
Input Mask
Services that provide powerful web-based support for transactions such as order processing, billing, and customer relationship management.
Internet business services (IBS)
A set of user-selectable software application options, usually located across the top of the screen.
Menu Bar
When designing a report, a sample report is prepared, which is a __________, or prototype, for users to review.
Mock-up
a design in which parts or components of a product are subdivided into modules that are easily interchanged or replaced
Modular Design
A plan for the actual implementation of the system.
Physical Design
A written list of features and specifications given to prospective vendors before a specific product or package has been selected.
Request for Proposal (RFP)
Used to obtain a price quotation or bid on a specific product or package.
Request for Quotation (RFQ)
A percentage rate that measures profitability by comparing the total net benefits received from a project to the total costs of the project.
Return on Investment (ROI)
A model of software delivery in which functionality is delivered on-demand as a network-accessible service, rather than as a traditional software application that is downloaded and installed on the customer's computer
Software as a Service (SaaS)
A second generation development of the World Wide Web focusing on user collaboration, sharing of user-generated content, and social networking.
Web 2.0
A group of data, usually inputted into an information system at the same time.
batch
A process where data entry is performed on a specified time schedule, such as daily, weekly, monthly, or longer.
batch input
A measure of the time a package takes to process a certain number of transactions.
benchmark
an online journal that allows users to post their own comments, graphics, and video
blog
The outsourcing of office activities like accounting, human resources, customer service activities (like call centers and customer chat). Sometimes these types of outsourced activities are referred to as basic office activities.
business process outsourcing
A __________ allows the user to select a date that the system will display and store as a field value.
calendar control
Used to select one or more choices from a group. A check mark, or an X, represents selected options.
check box
An online software and data environment in which applications and services are accessed and used through an Internet connection rather than on a local computer, refers to the cloud symbol on the computer.
cloud computing
A feature that is sensitive to the current conditions when it is invoked.
context sensitive
A __________ usually causes specific actions to occur, such as printing subtotals for a group of records.
control break
A detail report that focuses on control breaks.
control break report
In a control break report, the records are arranged or sorted in the same order as the control fields.
control field order
A mechanism to improve input quality by testing the data and rejecting any entry that fails to meet specified conditions.
data validation rule
Allows a user to enter information about a task that a system will perform.
dialog box
A network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily.
diskless workstation
A technique that uses a common yardstick to measure and compare vendor ratings.
evaluation model
The physical appearance and placement of data on a form.
form layout
A very effective method of online data entry where a blank form that duplicates the source document is completed on screen.
form-filing
An online discussion on a particular topic
forum
what is the output of systems implementation in the SDLC
functioning system
The practice of shifting IT development, support, and operations to other countries.
global outsourcing
Not meaningful numbers themselves, but are useful for comparison purposes. Also known as batch control totals.
hash totals
A software package that can be used by many different types of organizations
horizontal application
An information center or help desk within the IT department responsible for providing user support and offering services such as hotline assistance, training, and guidance to users who need technical help.
in-house software
Occurs when a validation check involves a minimum or a maximum value, but not both.
limit check
The definition of an information system's functions and features, and the relationships among its components.
logical design
A specification of the conditions, charges, and time frame for users to contact the vendor for assistance when they have system problems or questions.
maintenance agreement
The choice between developing in-house software and purchasing software often is called a __________ decision.
make or buy
An operation is __________ by the outside firm, or __________. Another term for Internet business services (IBS).
managed host
Software that connects dissimilar applications and enables them to communicate and exchange data.
middleware
Smartphones, tablets, and other computing devices that are not permanently tethered to a desk. They connect to the network wirelessly.
mobile device
Related program code organized into small units that are easy to understand and maintain.
module
A software feature that allows users to type commands or requests in normal English (or other language) phrases.
natural language
The total value of the benefits minus the total value of the costs, with both the costs and benefits being adjusted to reflect the point in time in which they occur.
net present value
A data entry method used for most business activity. The online method offers major advantages, including the immediate validation and availability of data.
online data entry
Radio buttons that represent groups of options. The user can select only one option at a time; a selected option contains a black dot.
option button
__________ protects privacy rights and shields the organization's proprietary data from theft or unauthorized access.
output security
The transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary long-term basis.
outsourcing
A determination of how long it takes an information system to pay for itself through reduced costs and increased benefits.
payback analysis
what is the output of systems planning in the SDLC
preliminary investigative report (PIR)
An early rapidly constructed working version of the proposed information system.
prototype
A type of data validation check that tests data items to verify that they fall between a specified minimum and maximum value.
range check
A type of data validation check that identifies values that are questionable, but not necessarily wrong.
reasonableness check
A centralized resource staffed by IT professionals that provides users with the support they need to do their jobs.
service desk/help desk
A firm that offers outsourcing solutions. Two popular outsourcing options involve application service providers and firms that offer Internet business services.
service provider
Company that develops software for sale.
software vendor
A service model that charges a variable fee for an application based on the number of users or workstations that have access to the application.
subscription model
what is the output of systems design in the SDLC
system design specification
A document that contains the requirements for the new system, describes the alternatives that were considered, and makes a specific recommendation to management. It is the end product of the systems analysis phase.
system requirements document
A service model that charges a variable fee for an application based on the volume of transactions or operations performed by the application. Also called a usage model.
transaction model
A firm that enhances a commercial package by adding custom features and configuring it for a particular industry
value-added reseller (VAR)
A software package that has been developed to handle information requirements for a specific type of business.
vertical application
The necessary measures to ensure that input data is correct, complete, and secure.
Input Controls
Buttons that represent groups of options. The user can select only one option at a time; a selected option contains a black dot. See also option button.
Radio Button
An input device and in source automation
Radio Frequency Identification (RFID) tag
Protection of data from loss or damage and recovers data when it is lost or damaged.
data security
Creating a prototype of user requirements, after which the prototype is discarded and implementation continues. Also called throwaway prototyping.
design prototyping
A __________ produces one or more lines of output for each record processed.
detail report
The practice of shifting IT development, support, and operations to other countries.
offshore outsourcing
A legal agreement that gives users the right to use the software under certain terms and conditions.
software license
Software that is purchased or leased from another firm. A commercially produced software product, or family of products.
software package
What are the 5 parts to the SDLC in order
1. systems planning 2. systems analysis 3. systems design 4. systems implementation 5. systems security and support
