CIS 622 Final Exam

Ace your homework & exams now with Quizwiz!

Put in sequence, the four steps typically followed to create a structure chart are:

1. Review the data 2. identify modules 3. adding couples, etc. 4. analyzing the structure

Match the best choice for logical & physical models. 1. what must take place: 2. technology, format, organization:

1. logical 2. physical

A firm that delivers a software application, or access to an application, by charging a usage or subscription fee

ASP

In a client/server architecture, data stored in more than one location but acting as a single, logical database

DDBMS

enacting data validation rules, reasonableness checks, existence checks, range checks, input masks, and other input restraints to improve system outputs

GIGO

The relationship between computers and the people who use them to perform their jobs

HCI

Which is a compelling reason to pursue in-house software development? ​

Enact a number of distinctive security requirements

Many applications require substantial desktop computing power and resource

traditional systems development environment

identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking

unit testing

test programs that interact with other programs and files separately before they are integrated into the system

unit testing

social engineering

user

consists of instructions and information to users who will interact with the system

user documentation

When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.

users

Software package developed to handle information requirements for a specific type of business

vertical app

a security weakness or soft spot

vulnerability

Internet design protocols and enables a company to integrate new applications into its e-commerce strategy

web-centric

A group in the IT department is responsible for providing user support

service desk

A report showing the total figures of the sales without much of the supporting details is a(n):

summary report

Extending ERP to suppliers and customers

supply chain management

Translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods

system architecture

the process of putting a new information system online and retiring the old system

system changeover

after integration testing, testing the entire IS and typical processing situations

system testing

"Build a system that is effective, reliable, and maintainable." best aligns with

systems design

A well-structured relation is a relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies

table

Which of the following is an example of a horizontal application?

Microsoft Excel

The total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur

NPV

describes how data actually moves from an application on one computer to an application on another networked computer

OSI model

a web-based repository of information that anyone can access, contribute to, or modify

wiki

A document that describes a company, lists the IT services or products needed, and specifies the features required:

RFP

A document with known specific products or service they want and need to obtain a price estimates or bids from vendors RFQ

RFQ

In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry

VAR

A model of software deployment where an application is hosted as a service provided to customers over the Internet

SaaS

hardening

application

Systems that divide processing between one or more networked clients and a central server

client/server

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

cloud computing

existing data is loaded into the new system

data conversion concept

A useful managerial report generating only those records that meet specific conditions.

exception report

an attack that takes advantage of a vulnerability

exploit

encryption & permissions

file

At the end of the systems implementation phase, the final report to management should include

final versions of system documentation

main line of defense between a local network, or intranet, and the Internet

firewall

An attribute that appears as a non-primary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation

foreign key

One or more powerful servers control the network, and departmental servers control lower levels of processing and network devices

hierarchical network

A software package that can be used by many different types of organizations

horizontal app

which are older systems that use outdated technology

legacy

describes the way the components in a network interact

logical topology

a process for converting complex data structures into simple, stable data structures

normalization

Transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis

outsourcing

A company using a service provider is engaged in a(n):

outsourcing arrangement

two programmers work on the same task on the same computer; one drives while the other navigates

pair programming concept

Changing an operational system to make it more efficient, reliable, and maintainable

perfective maintenance

BIOS-level passwords

physical

describes the actual network cabling and connections

physical topology

ERP concept that ensures connectivity and easy integration of future systems, including in-house software and commercial packages

platform

competes for resources in an operational system

preventative maintenance

An attribute (or combination of attributes) whose value is unique across all occurrences of a relation

primary key

safeguard procedures

procedural

The environment for the actual system operation is called the _____ environment.

production

describes the inputs, outputs, and processing logic for all program modules

program documentation

measure risk likelihood & impact

risk assessment

strategies to deal with risk

risk control

identify vulnerabilities and how they might be exploited

risk identification

list and classify assets & possible threats

risk identification

a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise

scalability

Cloud computing capability which matches resources to needs at any given time

scaling on demand

Locates all or most of the processing logic on the server

think client

internal or external entity that could endanger an asset

threat

Put the following steps to the :Software Acquisition Process" in order: 1-6

1. Evaluate the ISR 2. Identify the potential vendors 3. Evaluate alternatives 4. Perform Cost-Ben. Anyl. 5. Prepare recomm. 6. Implement solution

establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design

ERP

Which document is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase and contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management.​

Software requirements specification

Which of the following is specified by the detailed procedures in a test plan? ​

The test data to be used

Web-based environment that enhances interactive experiences, including wikis and blogs, and social networking applications

Web 2.0

successful completion of system testing is the key to user and management approval, which is why system tests sometimes are referred to as

acceptance testing

adds enhancements to an operational system and makes the system easier to use

adaptive maintenance

Where does the "make or buy" decision fall in the SDLC?

after analysis

related program code organized into small units that are easy to understand and maintain

module concept

diagnoses and corrects errors in an operational system

corrective maintenance

the degree of interdependence among modules

coupling concept

Centralized data processing & all data input and output at a central location

data processing center

A(n) ________ is a coding scheme recognized by system software for representing organizational data.

data type

The process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields. For example, when a customer views their account it uses a query that combines several tables to return their account information and all the products that were sold to them. Rather than joining all these tables for every query, we add a customer_ID attribute directly to the products_sold table.

de-normalization

​​In addition to analyzing logic and program code, a project team usually holds this session with users to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included

design walkthrough

the process of reviewing a program code to spot logic errors, which produce incorrect results

desk checking

​____ involves more risk than other changeover methods.

direct cutover

A(n) ________ is a file organization in which rows are stored either sequentially or non-sequentially, and an index is created that allows software to locate individual rows.

indexed file organization

A template or pattern that restricts data entry and prevents errors input mask

input mask

Testing two or more programs that depend on each other

integration testing

Web-based software usually with additional layers, called to communicate with existing software and legacy systems

middleware

special utility software that enables the tiers to communicate and pass data back and forth ​in a multi-tier system

middleware

VPN

network

The way a network is configured

network topology

The result of normalization is that every ________ key attribute depends upon the whole primary key.

non-primary

contains all the information needed for processing and distributing online and printed output

operations documentation

A sketch that shows the general screen layout and design

storyboard/wireframe

simulation of each program outcome or result and a message to indicate whether or not the program executed successfully

stub testing

A variable fee based on the number of users or workstations that have access to the application

subscription


Related study sets

DNA and RNA Structure and Function

View Set

PrepU Ch. 28: Safety, Security, and Emergency Preparedness

View Set

Art History 1440 - Chapter 15: Early Medieval Art in Europe

View Set

QUIZZES PERSONAL FINANCE KAPOOR 14e CHAPTER 6

View Set

Chapter 15: Creating an Excel Worksheet and Charting Data

View Set

MGMT 2103 Exam 2 (Ch 14, 15, 16, 17, 18)

View Set

1 Leadership and Management Ch. 1

View Set