CIS 622 Module 2

Ace your homework & exams now with Quizwiz!

Match to following descriptors with the system architecture concept.

Cloud computing capability which matches resources to needs at any given time - scaling on demand In a client/server architecture, data stored in more than one location but acting as a single, logical database - DDBMS ERP concept that ensures connectivity and easy integration of future systems, including in-house software and commercial packages - Platform Extending ERP to suppliers and customers - Supply chain management

Which is a compelling reason to pursue in-house software development

Enact a number of distinctive security requirements

Match to following descriptors with the system architecture concept.

Internet design protocols and enables a company to integrate new applications into its e-commerce strategy - Web-centric Locates all or most of the processing logic on the server - Thin client establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design - ERP Centralized data processing & all data input and output at a central location - Data Processing center One or more powerful servers control the network, and departmental servers control lower levels of processing and network devices - Hierarchical network

Match the following computing environments with the best description

Many applications require substantial desktop computing power and resource - traditional systems Transfer of information systems development, operation or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis - Outsourcing Web-based software usually with additional layers, called to communicate with existing software and legacy systems - middleware Web-based environment that enhances interactive experiences, including wikis and blogs and social networking apps - Web 2.0 A variable fee based on the number of users or workstations that have access to the application - Subscription A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned w/ minimal management effort or service provider interaction - Cloud computing A model of software deployment where an application is hosted as a service provided to customers over the internet - SaaS

A company using a service provider is engaged in a(n)

Outsourcing arrangement

which document is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phases and contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management

Software requirements specification

Match the following activities with the type of test

Testing two or more programs that depend on each other - integration testing

Match the following design related terms or cncepts:

The relationship between computers and the people who use them to perform their jobs - HCI A sketch that shows the general screen layout and design - storyboard/wireframe A template or pattern that restricts data entry and prevents errors - Input mask enacting data validation rules, reasonableness checks, existence checks, range checks, input masks, and other input restraints to improve system outputs - GIGO

Which of the following is specified by the detailed procedures in a test plan? ​

The test data to be used

Match to following descriptors with the system architecture concept.

Translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods - System architecture The way a network is configured - network topology Systems that divide processing between one or more networked clients and a central server - Client/sever describes how data actually moves from an application on one computer to an application on another networked computer - OSI open system interconnection Model special utility software that enables the tiers to communicate and pass data back and forth ​in a multi-tier system - middleware a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise - Scalability

Match the best choice for logical and physical models

What must take place - Logical Technology, format, organization - Physical

Match the terms with the best description

a document that describes a company, list the IT services or products needed and specifies the features required - RFP A document with known specific products or service they want and need to obtain a price estimates or bids from vendors - RFQ A firm that delivers a software application, or access to an applcation by charging a usage or subscription fee - ASP In context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry - VAR

Match the following terms

a group in the IT department is responsible for providing user support - Service desk Software package developed to handle information requirements for a specific type of business - Vertical app A software package that can be used by many different types of organizations - horizontal app the total value of the benefits minus the total value of the cost, with both cost and benefits adjusted to reflect the point in time at which they occur - NPV

Match to following descriptors with the system architecture concept:

a web-based repository of information that anyone can access, contribute to, or modify - wiki which are older systems that use outdated technology - legacy describes the actual network cabling and connections - physical topology describes the way the components in a network interact - logical topology

Which of the following is an example of a horizontal application

accounting package

Match the types of system maintenance adds enhancements to an operational system and makes the system easier to use

adaptive maintenance

Where does the "make or buy" decision gall in the SDLC

after analysis

Match the following activities with the type of test

after integration testing, testing the entire IS and typical processing situations - system testing

Match the following database related terms:

an attribute (or combination of attributes) whose value is unique across all occurrences of a relation - primary key A well-structured relation is a relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies - table a process for converting complex data structures into simple, stable data structures - normalization An attribute that appears as a non-primary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation - Foreign key

Match the example with the corresponding security level. hardening

application

Match the types of system maintenance diagnoses and corrects errors in an operational system

corrective maintenance

Match the application development concepts the degree of interdependence among modules

coupling

Match the application development concepts existing data is loaded into the new system

data conversion

A(n) ________ is a coding scheme recognized by system software for representing organizational data.

data type

The process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields. For example, when a customer views their account it uses a query that combines several tables...

de-normalization

​Match these implementation concepts: ​In addition to analyzing logic and program code, a project team usually holds this session with users to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included

design walkthrough

​____ involves more risk than other changeover methods.

direct cutover

A useful managerial report generating only those records that meet specific conditions

exception report

Match the security-related concepts or terms: an attack that takes advantage of a vulnerability

exploit

Match the example with the corresponding security level. encryption & permission

file

Match these implementation concepts: At the end of the systems implementation phase, the final report to management should include

final versions of all system documentation

Match the security-related concepts or terms: main line of defense between a local network, or intranet, and the Internet

firewall

Match the following activities with the type of test

identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking - unit testing

A(n) ________ is a file organization in which rows are stored either sequentially or non-sequentially, and an index is created that allows software to locate individual rows.

indexed file organization

Match the application development concepts Group of answer choices related program code organized into small units that are easy to understand and maintain

module

Match the example with the corresponding security level. VPN

network

The result of normalization is that every ________ key attribute depends upon the whole primary key.

non-primary

Put the following steps to the Software Acquisition Process in order:

one - evaluate the information system requirements two - identify potential vendors or outsourcing options three - evaluate the alternatives four - Preform cost-benefit analysis five - prepare a recommendation six - implement the solution

Put in sequence, the four steps typically followed to create a structure chart are:

one - reviewing the data flow diagrams (DFDs) two - identify modules and relationships three - adding couples, loops, and conditions four - analyzing the structure chart and data dictionary

Match each type of documentation contains all the information needed for processing and distributing online and printed output

operations

Match the application development concepts two programmers work on the same task on the same computer; one drives while the other navigates

pair programming

Match the types of system maintenance Changing an operational system to make it more efficient, reliable, and maintainable

perfective maintenance

Match the example with the corresponding security level. BIOS-level passwords

physical

Match the types of system maintenance competes for resources in an operational system

preventive maintenance

Match the example with the corresponding security level. safeguard procedures

procedural

The environment for the actual system operation is called the _____ environment.

production

Match each type of documentation describes the inputs, outputs, and processing logic for all program modules

program

Match the Risk Management activities measure risk likelihood & impact

risk assessment

Match the Risk Management activities strategies to deal with risk

risk control

Match the Risk Management activities identify vulnerabilities and how they might be exploited

risk identification

Match the Risk Management activities list and classify assets & possible threats

risk identification

Match the following activities with the type of test

simulation of each program outcome or result and a message to indicate whether or not the program executed successfully - Stub testing

Match the following activities with the type of test

successful completion of system testing is the key to user and management approval, which is why system tests sometimes are referred to as - acceptance testing

A report showing the total figures of the sales without much of the supporting details is a(n)

summary report

​Match these implementation concepts: the process of putting a new information system online and retiring the old system

system changeover

"Build a system that is effective, reliable, and maintainable." bust aligns with

systems design

Match the following activities with the type of test

test programs that interact with other programs and files separately before they are integrated into the system - unit testing

Match the following activities with the type of test

the process of reviewing a program code to spot logic errors, which produce incorrect results - desk checking

Match the security-related concepts or terms: internal or external entity that could endanger an asset

threat

Match each type of documentation consists of instructions and information to users who will interact with the system

user

Match the example with the corresponding security level. social engineering

user

When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.

users

Match the security-related concepts or terms: a security weakness or soft spot

vulnerability


Related study sets

reading guide 13 ch 16 and 18: emotional and social development in middle and late adulthood

View Set

A&P Unit 5 Test, Chapters 11; 12; 13

View Set

March 17, 2016: Conduction System of the Heart (Chapter 20)

View Set

Project + Practice Qs (CompTIA Certmaster)

View Set

Intro to Criminal Justice Chapter 3

View Set