CIS 622 Module 2
Match to following descriptors with the system architecture concept.
Cloud computing capability which matches resources to needs at any given time - scaling on demand In a client/server architecture, data stored in more than one location but acting as a single, logical database - DDBMS ERP concept that ensures connectivity and easy integration of future systems, including in-house software and commercial packages - Platform Extending ERP to suppliers and customers - Supply chain management
Which is a compelling reason to pursue in-house software development
Enact a number of distinctive security requirements
Match to following descriptors with the system architecture concept.
Internet design protocols and enables a company to integrate new applications into its e-commerce strategy - Web-centric Locates all or most of the processing logic on the server - Thin client establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design - ERP Centralized data processing & all data input and output at a central location - Data Processing center One or more powerful servers control the network, and departmental servers control lower levels of processing and network devices - Hierarchical network
Match the following computing environments with the best description
Many applications require substantial desktop computing power and resource - traditional systems Transfer of information systems development, operation or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis - Outsourcing Web-based software usually with additional layers, called to communicate with existing software and legacy systems - middleware Web-based environment that enhances interactive experiences, including wikis and blogs and social networking apps - Web 2.0 A variable fee based on the number of users or workstations that have access to the application - Subscription A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned w/ minimal management effort or service provider interaction - Cloud computing A model of software deployment where an application is hosted as a service provided to customers over the internet - SaaS
A company using a service provider is engaged in a(n)
Outsourcing arrangement
which document is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phases and contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management
Software requirements specification
Match the following activities with the type of test
Testing two or more programs that depend on each other - integration testing
Match the following design related terms or cncepts:
The relationship between computers and the people who use them to perform their jobs - HCI A sketch that shows the general screen layout and design - storyboard/wireframe A template or pattern that restricts data entry and prevents errors - Input mask enacting data validation rules, reasonableness checks, existence checks, range checks, input masks, and other input restraints to improve system outputs - GIGO
Which of the following is specified by the detailed procedures in a test plan?
The test data to be used
Match to following descriptors with the system architecture concept.
Translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods - System architecture The way a network is configured - network topology Systems that divide processing between one or more networked clients and a central server - Client/sever describes how data actually moves from an application on one computer to an application on another networked computer - OSI open system interconnection Model special utility software that enables the tiers to communicate and pass data back and forth in a multi-tier system - middleware a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise - Scalability
Match the best choice for logical and physical models
What must take place - Logical Technology, format, organization - Physical
Match the terms with the best description
a document that describes a company, list the IT services or products needed and specifies the features required - RFP A document with known specific products or service they want and need to obtain a price estimates or bids from vendors - RFQ A firm that delivers a software application, or access to an applcation by charging a usage or subscription fee - ASP In context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry - VAR
Match the following terms
a group in the IT department is responsible for providing user support - Service desk Software package developed to handle information requirements for a specific type of business - Vertical app A software package that can be used by many different types of organizations - horizontal app the total value of the benefits minus the total value of the cost, with both cost and benefits adjusted to reflect the point in time at which they occur - NPV
Match to following descriptors with the system architecture concept:
a web-based repository of information that anyone can access, contribute to, or modify - wiki which are older systems that use outdated technology - legacy describes the actual network cabling and connections - physical topology describes the way the components in a network interact - logical topology
Which of the following is an example of a horizontal application
accounting package
Match the types of system maintenance adds enhancements to an operational system and makes the system easier to use
adaptive maintenance
Where does the "make or buy" decision gall in the SDLC
after analysis
Match the following activities with the type of test
after integration testing, testing the entire IS and typical processing situations - system testing
Match the following database related terms:
an attribute (or combination of attributes) whose value is unique across all occurrences of a relation - primary key A well-structured relation is a relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies - table a process for converting complex data structures into simple, stable data structures - normalization An attribute that appears as a non-primary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation - Foreign key
Match the example with the corresponding security level. hardening
application
Match the types of system maintenance diagnoses and corrects errors in an operational system
corrective maintenance
Match the application development concepts the degree of interdependence among modules
coupling
Match the application development concepts existing data is loaded into the new system
data conversion
A(n) ________ is a coding scheme recognized by system software for representing organizational data.
data type
The process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields. For example, when a customer views their account it uses a query that combines several tables...
de-normalization
Match these implementation concepts: In addition to analyzing logic and program code, a project team usually holds this session with users to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included
design walkthrough
____ involves more risk than other changeover methods.
direct cutover
A useful managerial report generating only those records that meet specific conditions
exception report
Match the security-related concepts or terms: an attack that takes advantage of a vulnerability
exploit
Match the example with the corresponding security level. encryption & permission
file
Match these implementation concepts: At the end of the systems implementation phase, the final report to management should include
final versions of all system documentation
Match the security-related concepts or terms: main line of defense between a local network, or intranet, and the Internet
firewall
Match the following activities with the type of test
identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking - unit testing
A(n) ________ is a file organization in which rows are stored either sequentially or non-sequentially, and an index is created that allows software to locate individual rows.
indexed file organization
Match the application development concepts Group of answer choices related program code organized into small units that are easy to understand and maintain
module
Match the example with the corresponding security level. VPN
network
The result of normalization is that every ________ key attribute depends upon the whole primary key.
non-primary
Put the following steps to the Software Acquisition Process in order:
one - evaluate the information system requirements two - identify potential vendors or outsourcing options three - evaluate the alternatives four - Preform cost-benefit analysis five - prepare a recommendation six - implement the solution
Put in sequence, the four steps typically followed to create a structure chart are:
one - reviewing the data flow diagrams (DFDs) two - identify modules and relationships three - adding couples, loops, and conditions four - analyzing the structure chart and data dictionary
Match each type of documentation contains all the information needed for processing and distributing online and printed output
operations
Match the application development concepts two programmers work on the same task on the same computer; one drives while the other navigates
pair programming
Match the types of system maintenance Changing an operational system to make it more efficient, reliable, and maintainable
perfective maintenance
Match the example with the corresponding security level. BIOS-level passwords
physical
Match the types of system maintenance competes for resources in an operational system
preventive maintenance
Match the example with the corresponding security level. safeguard procedures
procedural
The environment for the actual system operation is called the _____ environment.
production
Match each type of documentation describes the inputs, outputs, and processing logic for all program modules
program
Match the Risk Management activities measure risk likelihood & impact
risk assessment
Match the Risk Management activities strategies to deal with risk
risk control
Match the Risk Management activities identify vulnerabilities and how they might be exploited
risk identification
Match the Risk Management activities list and classify assets & possible threats
risk identification
Match the following activities with the type of test
simulation of each program outcome or result and a message to indicate whether or not the program executed successfully - Stub testing
Match the following activities with the type of test
successful completion of system testing is the key to user and management approval, which is why system tests sometimes are referred to as - acceptance testing
A report showing the total figures of the sales without much of the supporting details is a(n)
summary report
Match these implementation concepts: the process of putting a new information system online and retiring the old system
system changeover
"Build a system that is effective, reliable, and maintainable." bust aligns with
systems design
Match the following activities with the type of test
test programs that interact with other programs and files separately before they are integrated into the system - unit testing
Match the following activities with the type of test
the process of reviewing a program code to spot logic errors, which produce incorrect results - desk checking
Match the security-related concepts or terms: internal or external entity that could endanger an asset
threat
Match each type of documentation consists of instructions and information to users who will interact with the system
user
Match the example with the corresponding security level. social engineering
user
When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.
users
Match the security-related concepts or terms: a security weakness or soft spot
vulnerability