SYSTEMS ANALYSIS & DESIGN Chapter 9
Gartner, Inc. predicts that by 2015 SaaS revenue will grow to ____.
$22.1 billion
Evaluate the alternatives
- Existing users - Application testing - Benchmarking
Microsoft's ____ is one of the major Web-based development environments.
.NET
Computing Devices
1. server 2. personal computing devices or clients (desktops, laptops tablets)
Text box
A box that accepts text from a keyboard or speech input
C) data store
A computer-based file containing employee information is represented on a data flow diagram as a: A) data flow B) source C) data store D) process
Data Structures
A framework for organizing, storing and managing data. Consists of files or tables that interact in different ways
Simple Message
A message that transfers control from the sender to the recipient without describing the details of the communication.
Entity
A person, place, thing or event for which data is collected and maintained
Data flow diagram (DFD)
A picture of the movement of data between external entities and the processes and data stores within a system.
Binary relationship
A relationship between instances of two entity types. This is the most common type of relationship encountered in data modeling.
Homonym
A single attribute name that is used for two or more different attributes.
Field
A single characteristic or fact about an entity, also called an attribute.
Synchronous message
A type of message in which the caller has to wait for the receiving object to finish executing the called operation before it can resume execution itself.
eBay employs the ___ auction mechanism. A. Forward B. Reverse C. Dutch D. Proprietary eBay
A. Forward
Web-based Application
An application that uses a browser for the user interface.
Optional attribute
An attribute that may not have a value for every entity instance.
Multivalued attribute
An attribute that may take on more than one value for each entity instance.
False
Application software that usually executes with a browser is often just called an "App".
Both the sellers and buyers are business organizations. *Represents the vast majority of e-commerce
B2B
Outsourcing a basic business process is often called ____.
BPO
A) decouples the processe
By placing a data store between two processes, this: A) decouples the processes B) enables store and forward capabilities C) enhances the flow of data between the processes D) structures the processes
derivation codes
Combine data from different item attributes, or characteristics
Software requirements specification
Contains the requirements for the new system, describes the alternatives that were considered and makes a specific recommendation to management
Data administrator
DA. The person in charge of the structure and integrity of the data
A practice of registrants using the five-day "grace period" at the beginning of a domain registration to profit from pay-per-click advertising.
Domain Tasting
What are some common ways to evaluate the alternatives?
Existing Users Application testing Benchmarking
Cybersquatting refers to the tampering of existing Web sites and selling unrelated products. True False
False
Object-oriented systems can send messages to a legacy system through the use of a package wrapper.
False
C) balancing
If a data flow appears on the context diagram and is also represented at level-0, this would be referred to as: A) leveling B) flow conservation C) balancing D) matching
C) complete
If your DFD contains data flows that do not lead anywhere, it is not: A) gap proof B) a primitive diagram C) complete D) consistent
True
In a client/server configuration, it is possible for a single software component to be both client and server.
Domain Layer
In a three-layer architecture, another name for the business logic layer is what?
What are some common financial analysis tools?
Payback analysis Return on investment Net present value
Summary reports
Reports that summarize detail or recap periodic activity
Storyboarding
Sequence of sketches of the display screen during a dialogue
What are the benefits of user applications?
Simple low-cost solutions
____ reduces the customer's need for software maintenance, operation, and support.
Software as a Service
Disjoint rule
Specifies that if an entity instance of the supertype is a member of one subtype, it cannot simultaneously be a member of any other subtype.
True
The Internet can be thought of as the network of networks.
Logical design
The definition of an information system's functions and features, and the relationships among its components
Primitive DFD
The lowest level of decomposition for a DFD
Primitive DFD
The lowest level of decomposition for a DFD.
D) primitive diagram
The lowest level of decomposition for a data flow diagram is called the: A) context diagram B) level-0 diagram C) level-1 diagram D) primitive diagram
Parent process
The process on Diagram 0.
Activation
The time period during which an object performs an operation.
Net Present Value (NPV)
The total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur
Net present value (NPV)
The total value of the benefits minus the total value of the costs, with both the costs and benefits being adjusted to reflect the point in time at which they occur
Preconditions
Things that must be true before a use case can start.
Payback Analysis
To determine how long it takes an information system to pay for itself through reduced costs and increased benefits
Affordance
When the appearance of a specific control suggest it's functions
The set of world wide resources that are available over the Internet.
When you use the term "Web", what is the correct definition?
D) All of the above.
Which of the following is a true statement regarding sources/sinks? A) Sources/sinks are always outside the information system and define the boundaries of the system. B) Data must originate outside a system from one or more sources. C) The system must produce information to one or more sinks. D) All of the above.
B) A data flow can go directly back to the same process it leaves.
Which of the following is not a true statement regarding data flows? A) A fork in a data flow means that exactly the same data goes from a common location to two or more different processes, data stores, or sources/sinks. B) A data flow can go directly back to the same process it leaves. C) A data flow has a noun phrase label. D) A data flow has only one direction of flow between symbols.
Www
World Wide Web. An interconnected set a resources accessed via the Internet
physical design
a plan for the actual implementation of the system
fixed fee model
a service model that charges a set fee based on a specified level of service and user support
subscription model
a service model that charges a variable fee for an application based on the number of users or workstations that have access to the application
logical record
a set of field values that describes a single person, place, thing, or event
first normal form
a table is in _____ ______ ____ if it does not contain a repeating group
evaluation model
a technique that uses a common yardstick to measure and compare vendor ratings
counterbalancing
a technique used to control for sequencing effects
list box
a text box that contains a list of predefined data values
cloud computing
an online software and data environment in which applications and services are accessed and used through an internet connection rather than on a local computer
managed hosting
an operation is managed by the outside firm, or host. another term for internet business service
retrospective verbal report
an oral report in which the participant retrospectively recalls aspects of the experiment
Context diagram
an overview of an organizational system that shows the system boundaries, external entities that interact with the system, and the major information flows between the entities and the system.
metaphors
analogies between features of the user interface and aspects of physical reality that users are familiar with
In the accompanying figure, any field that could serve as a primary key is called a ____.
candidate key
child diagram
cannot produce output or receive input that the parent process does not also produce or receive.
category codes
codes that identify a group of related items
database manipulation language
controls database operations, including storing, retrieving, updating, and deleting data
java database connectivity
enables java applications to exchange data with any database that uses SQL statements and is JDBC- compliant
deception
giving the participant a bogus rationale for the experiment
system interfaces
inputs or outputs that require minimal human intervention
derived element
it must be created by a process and should be output from at least one process into which it is not input. . Elements that are not keyed but are rather the result of a calculation or logical operation are called
An IBS solution is attractive to customers because...
it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet
double-blind placebo method
neither the experimenter nor the research participant is aware of the treatment condition administered to the participant
Any field that is not a primary key or a candidate key is called a ____ key.
nonkey
Cloud Computing
replacing computing with services provided over the internet
external outputs
reports or other outputs produced for use by people outside the organization
internal outputs
reports or other outputs produced for use within the organization
detailed reports
reports that contain specific information on business transactions
exception reports
reports that provide details or summary information about transactions or operating results that fall outside a predefined normal range of values
summary reports
reports that summarize detail or recap periodic activity
executive reports
reports used by highlevel managers to assess overall organizational health and performance
Internet Protocol (IP)
routing protocol in charge of forwarding packets on the internet
storyboarding
sequence of sketches of the display screen during a dialog
randomized counterbalancing
sequence order is randomly determined for each individual
A firm that offers outsourcing solutions is called a ____ provider.
service
Some ____ providers concentrate on specific software applications; others offer resources like order processing and customer billing.
service
When companies acquire Web-based software as a(n) ____, they can limit in-house involvement to a minimum.
service
internet business services
services that provide web based support for transactions such as order processing, billing, and crm
check boxes
similar to radio buttons, but the user can select multiple items within the group
Local area network (LAN)
small network for single site
assistive technologies
software (such as text-to-speech and voice-recognition utilities) that adapts user interfaces to the special needs of persons with disabilities
Web service
software function or related set of functions that can be executed via Web standards
middleware
software that connects dissimilar applications and enables them to communicate and exchange data
middleware
software that integrates different applications and allows them to exchange data and interpret client requests in HTML form; then translate the requests into commands that the database can execute
Open Source Software (OSS)
software that is free and where anyone can look at and potentially modify the code
software package
software that is purchased or leased from another firm
application software
software that performs user or business-specific tasks and is typically constructed as an app or Web-based application.
system software
software, such as operating systems and Web server software, that works behind the scenes to support application software and control or interact with hardware or software resources
audit fields
special fields within data records to provide additional control or security information
make or buy
the choice between developing in house software and purchasing software often is called a make or buy, or build or buy, decision
logical design
the definition of an information system's functions and features, and the relationships among its components
matching variable
the extraneous variable used in matching
economy of scale
the inherent efficiency of high-volume processing on larger computers is called
data layer
the part of a three-layer architecture that interacts with the data
What is a fixed fee model?
uses a set fee based on a specified level of service and user support
Hybrid TCP / IP-OSI Architecture
- Layer 5 : Application (HTTP) - Layer 4 : Transport (TCP) - Layer 3 : Internet (IP) - Layer 2 : Data Link - Layer 1 : Physical
Connections Architecture
- Layer 5 : How two applications work with each other - Layer 4 : End-to-End communications between the two end hosts - Layer 3 : Route through a routed network (internet) - Layer 2 : Data Link through a single switched network - Layer 1 : Physical link between adjacent devices
Two Major Protocols
1. Ethernet 2. Tranmission Control Protocol / Internet Protocol
Internet Protocol Suite consists of :
1. Transmission Control Protocol (TCP) 2. Internet Protocol (IP)
Level-n diagram
A DFD that is the result of n nested decompositions from a process on a level-0 diagram
data structure
A ____ _________ Consists of files or tables that interact in various ways
Form
A business document that contains some predefined data and may include some areas where additional data are to be filled in. An instance of a form is typically based on one database record.
Service desk
A centralized resource started by IT professionals that provides users with the support they need to do their jobs. Also called a help desk
Build or buy
A choice between developing in-house software and purchasing software
Data type
A coding scheme recognized by system software for representing organizational data.
Heterogeneous Distributed Database
A database distributed across multiple locations with different DBMSs and with local access allowed without global schema coordination
Network diagram
A diagram that shows how hardware components are interconnected with devices and cabling is called a what?
What is a request for proposal?
A document that describes the company, lists the IT services needed or products needed, and specifies the features required
Value-Added Reseller (VAR)
A firm that enhances a commercial package by adding custom features and configuring it for a particular industry
Evaluation and selection team
A group of people involved in selecting hardware and software. The group includes systems analysts and users. A team approach ensures that critical factors are not overlooked and that a sound choice is made
Decision table
A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions.
False
A network diagram and a location diagram show basically the same information but in a different format.
C) verb phrase label
A process has a: A) pronoun label B) adjective label C) verb phrase label D) noun phrase label
Third Normal Form (3NF)
A restriction that a table is in 2NF and that no non-key attribute is functionally dependent on any other non-key attribute
Subscription model (outsourcing)
A variable fee based on the number of users or workstations that have access to the application
Triggering operation (trigger)
An assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete; also called a trigger.
Relationship
An association between the instance of one or more entity types that is of interest to the organization.
Candidate Key
An attribute or set of attributes that are unique identifiers and could serve as the primary key
Derived attribute
An attribute whose value can be computed from related attribute values.
Database (DB)
An integrated collection of stored data that is centrally managed and controlled
Functional decomposition
An iterative process of breaking the description of a system down into finer and finer detail, which creates a set of charts in which one process on a given chart is explained in greater detail on another chart.
Functional decomposition
An iterative process of breaking the description of a system down into finer and finer detail, which creates a set of charts is explained in greater detail on another chart
Forum
An online discussion on a particular topic, where people meet, offer support, and exchange ideas
The sellers are organizations and the buyers are individuals
B2C
Software vendors
Companies that develop software for sale
Metadata
Data about data, also called schema data
significant digit codes
Distinguish items by using a series of subgroups of digits Postal codes are significant digit codes
Trigger
Event that initiates a use case.
In order to be considered as an e-commerce Web site, the site must sell some tangible good. True False
False
The stock market is the only area of business that has experienced fraud on the Internet. True False
False
B) violation of consistency
Having a level-1 diagram with no level-0 diagram is an example of a: A) violation of completeness B) violation of consistency C) gap D) structuring violation
Human-Computer interaction
Hci. A field of study concerned with the efficiency and effectiveness of user interfaces via computer systems, human-oriented input and output technology, and psychological aspects of the user interface.
A) indifferent condition
In a decision table, a condition whose value does not affect which actions are taken for two or more rules is referred to as a(n): A) indifferent condition B) static condition C) fixed condition D) flexible condition
Indifferent condition
In a decision table, a condition whose value does not affect which actions are taken for two or more rules.
Gateway
In business modelling, a decision point.
C) process
In the Gane and Sarson model, a rectangle with rounded corners on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
What are two major web-based development environments?
Microsoft's .net IBM's WebSphere
In what type of e-commerce business model do customers decide how much they want to pay
Name-your-own-price
Row (Tuple) (Record)
One horizontal group of data attribute values in a table
Partitioning
Processes are put together and automated if analysis dictates they do so. Manual processes are put together, and automated processes can also be paired with each other.
Which one in the following is NOT a factor for selecting a design strategy?
Software quality
Child Diagram
The diagram that results from exploding the process on Diagram 0 (called the parent process).
DFD completeness
The extent to which all necessary components of a DFD have been included and fully described.
Offshore outsourcing, or global outsourcing, refers to what?
The practice of shifting IT development, support, and operations to other countries
Denormalization
The process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields.
entity-relationship diagram
a model that shows the logical relationships and interaction among system entities
concurrent verbal report
a participant's oral report of the experiment, which is obtained as the experiment is being performed
return on investment
a percentage rate that measures profitability by comparing the total net benefits received from a project to the total costs
Hypertext Markup Language (HTML)
a protocol that defines the structure and content of a Web page
forum
an online discussion on a particular topic
HTML (hypertext markup language)
protocol for the structure of content of a web page
An advantage of purchasing packaged software is that the organization can _____.
save money on the purchase
base element
that is initially keyed into the system, such as a customer name, address, or city and must be stored in files
XML (extensible markup language)
an extension of HTML that enables defining semantics of tags
data store
are created for each different data entity being stored
Exchanges have many
buyers and sellers
Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology.
cloud
abbreviation codes
codes that are alphabetic abreviations (MIA for Miami)
action codes
codes that indicate what action is to be taken with an associated item
cipher codes
codes that use a keyword to encode a number
When a primary key combines two or more fields, it is called a ____ key.
composite
statistical control
control of measured extraneous variables during data analysis
randomization
control technique that equates groups of participants by ensuring every member an equal chance of being assigned to any group
The ___ layer addresses the issues involving the persistence of the objects contained in the system.
data management
Which one in the following is NOT a layer of a software architecture.
data structure
Sampling error
error between a sample statistic and it's coresspnding population paramiter
field (attribute)
is a single characteristic or fact about an entity
Domain name service
is hierarchical system of name-servers that maps host-domain name combinations to IP addresses
During the systems design phase, ____ fields are used to organize, access, and maintain data structures
key
Internet Backbone
made of fiber optic lines, is very fast
unicode
more recent coding standard that uses two bytes per character rather than one. Supports virtually all languages and has become a global standard
To avoid the classic design mistake of "feature creep," the analyst should ___.
move proposed changes into future versions
An electronic mall represents ____________.
multiple stores
Data Flow Diagrams
Graphically characterize data processes and flows in a business system. Depicts: - System inputs - Processes - Outputs
A gift card is a(n) ____________.
stored value money card
A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.
structure
When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.
subscription model
user interfaces
system interfaces that directly involve a system user
experimenter effects
the biasing influence that can be exerted by the experimenter
Rules
the part of a decision table that specifies which actions are to be followed for a given set of conditions
normalization
the process of creating table designs by assigning specific fields or attributes to each table in the database
Gap analysis
the process of discovering discrepancies between two or more sets of DFD's or discrepancies within a single DFD.
C) process modeling
Graphically representing the functions, or processes, which capture, manipulate, store, and distribute data between a system and its environment and between components within a system refers to: A) data modeling B) flow charting C) process modeling D) transition modeling
In what type of e-commerce business model do small buyers aggregate demand to get a large volume; then the group conducts tendering or negotiates a lower price
Group purchasing
C) numbering
Guidelines for drawing DFDs include the following except for: A) completeness B) consistency C) numbering considerations D) timing considerations
Human-interface objects
HIOs. Icons and other objects on a screen that can be manipulated by the user and cause some action to occur
Hypertext markup language
HTML. A protocol that defines the structure and content of a web page
cardinality notation
uses special symbols to represent the relationship
matching
using any of a variety of techniques for equating participants on one or more variables
affordance
when the appearance of a specific control suggests its function
Hypertext transfer protocol
HTTP. A protocol that defines the format and content of requests for web documents and related data communication
Internet backbone Network
High capacity and high speed computer network that carries large amounts of internet traffic across regions, countries, and continents
Some firms offer ____, which provide powerful Web-based support for transactions such as order processing, billing, and customer relationship management.
IBS
What should be done during the evaluate the information systems requirements step?
Identify key features Consider network and related issues Estimate volume and future growth Specify hardware, software, or personnel constraints Prepare a request for proposal or quotation
B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule
If Rules 2, 4, and 6 are indifferent conditions, then: A) Rules 2, 4, and 6 are eliminated from the matrix B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule C) Rules 2, 4, and 6 will result in at least two additional rules being included in the matrix D) Rules 2, 4, and 6 have no impact on the interpretation of the matrix
A) appear on the context diagram
If an input from a source appears at level-0, it must: A) appear on the context diagram B) be connected to a data flow C) be connected to a sink D) be connected to a data store
Use case
In UML, a sequence of transactions in a system; the purpose is to produce something of value to an actor in the system; focuses on what the system does rather than on how it does it. The use case model is based on the interactions and relationships of individual use cases. In a use case, an actor using the system initiates an event that begins a related series of interactions in the system.
False
In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.
B) gateway
In business process modeling, a decision point is called a(n): A) activity B) gateway C) terminal D) loop
A) swimlane
In business process modeling, a way to encapsulate a process is called a(n): A) swimlane B) fastlane C) lane D) none of the above
Event
In business process modelling, a trigger that initiates the start of a process.
Pool
In business process modelling, a way to encapsulate a process that has two or more participants.
Swimlane
In business process modelling, a way to visually encapsulate a process.
Activity
In business process modelling, an action that must take place for a process to be completed.
Flow
In business process modelling, it shows the sequence of action in a process.
A) data store
In the Gane and Sarson model, a rectangle that is missing its right vertical sides on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
The company's IT department makes, builds, and develops _______________ A ____________ is obtained from a vendor or application service provider
In-house software Software package
User interface
Includes screens, commands, controls, and features that enable users to interact more effectively with an application
What is user interface?
Includes screens, commands, controls, and features that enable users to interact more effectively with the application
A logical data flow diagram:
Is a model of how the business operates.
What are the seven steps for a cost-benefit checklist?
List each strategy being considered Identify costs and benefits for each Consider future growth Include support costs for hardware and software Analyze various software licensing options, including fixed fees and formulas Apply the financial analysis tools to each alternative Study results and prepare report
A ___________ defines what must take place, not how it will be accomplished A ____________ is like a set of blueprints for the actual construction of a building
Logical Physical
Why do companies purchase software?
Lower Costs Requires less time to implement Proven reliability and performance benchmarks Requires less technical development staff Future upgrades are provided by the vendor Input from other companies
Continuity
Maintaining a certain level of consistency over time across multiple releases
The choice between developing versus purchasing software is often called what?
Make or buy, build or buy, decision
Benchmark
Measures the time a package takes to process a certain number of transactions.
What type of e-commerce business model allows only members to use the services provided
Membership
Document metaphor
Metaphor in which data is visually represented as paper pages or forms
Direct manipulation metaphor
Metaphor in which objects on a display are manipulated to look like physical objects or graphic symbols that represent them
Desktop metaphor
Metaphor in which the visual display is organized into distinct regions with a large empty work space in the middle and a collection of tool icons around the perimeter
Dialogue metaphor
Metaphor in which user and computer accomplish a task by engaging in a conversation or dialogue via text voice or tools such as labeled buttons
____ promotes a broader vision of Software + Services, which refers to the company's strategy for cloud computing -- integrating software applications, platforms, and infrastructure.
Microsoft
Refers to e-commerce that is conducted in a wireless environment.
Mobile Commerce
What are the benefits of application software?
More powerful Flexible User friendly
Request for Quotation
More specific than a RFP. Only price quotations or bids are needed, since the specific product or service is already known.
A process in which a company integrates its offline and online channels.
Multichanneling
sequence codes
Numbers or letters assigned in a specific order Contain no additional information other than an indication of order of entry into the system
____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
ODBC
D) both A and B
On a data flow diagram, you may: A) repeat data stores B) repeat sources/sinks C) repeat processes D) both A and B
Attribute (Field) (Column)
One vertical group of data attribute values in a table
In what type of e-commerce business model do companies run auctions of various types on the internet
Online auctions
In what type of e-commerce business model do manufacturers or retailers sell directly to customers.
Online direct marketing
Oracle Corporation offers a service called ____, which provides e-business applications on a fixed fee basis.
Oracle On Demand
Involves finding the product to be shipped; packaging the product; arrange for speedy delivery to the customer; and handle the return of unwanted or defective products.
Order fulfillment
What are some service provider functions?
Order processing Customer Billing Enterprise wide software solutions such as accounting, inventory control, manufacturing
____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.
Outsourcing
______________ determines how long it takes an information system to pay for itself through reduced costs and increased benefits _____________ is a percentage rate that compares the total net benefits received from a project to the total costs of the project _____________ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur
Payback analysis Return on investment net present value
Stakeholder
People who have a vested interest in the system being developed.
A form of e-cash that enables two individuals or an individual and a business to transfer funds without using a credit card.
Person-to-person Payments
Level
Perspective from which a use case description is written, typically ranging from high level to extremely detailed.
Level
Perspective from which a use case description is written, typically ranging from high-level to extremely detailed.
Appears underneath the active window
Pop-under Ad
Appears in front of the current browser window.
Pop-up Ad
Internet Business Services (IBS)
Powerful web-based support for transactions such as order processing, billing and customer relationship management
User application
Programs that utilize standard business software, such as Microsoft office, which has been configured in a specific manner to enhance user productivity
Electronic marketplace in which there are many sellers and many buyers, and entry is open to all; it is frequently owned and operated by a third party
Public Exchange
What are three ways to customize a software package?
Purchase a basic package that vendors will customize to suit the project's needs Negotiate directly with the software vendor to make enhancements to meet the project's needs by paying for changes Purchase the package and make project-specific modifications
Traditional Development
- Compatibility issues influence systems design - Systems are designed to run on local and wide area company networks - Systems often utilize Internet links and resources, but web-based features are considered to be enhancements rather than core elements - Development is either in-house development, purchase of a software package with possible modification or use of outside consultants - Scalability can be effected by network limitations and constraints -Many applications require substantial desktop computing power and resources - Security issues are usually less complex
DFD Levels
- Data flow diagrams are built in layers - The top level is the context level - Each process may explode to a lower level - The lower level diagram number is the same as the parent process number - Processes that do not create a child diagram are called primitive
Evaluate Information System requirements
- Identify key features - Consider network and web-related issues - Estimate volume and future growth - Specify hardware, software or personnel constraints - Prepare a RFQ or RFP
Rules for DFDs
- Must have one process - Must not be any freestanding objects - A process must have input/output - A data store must be connected to at least one process. - External entities should not be connected to one another.
Web-Based Development
- Systems are developed and delivered in an Internet-based framework such as .NET - Internet-based development treats the web as the platform and not just the communication channel - Web-based systems are easily scalable and can run on multiple hardware environments - Large firms tend to deploy web based systems as enterprise wide software solutions - Software application is less dependent on desktop power and resources - SAAS limits in-house involvement and vendors can install, configure and maintain the system - Includes additional layers called middleware to communicate with existing software and legacy systems - More complex security issues
Diagram 0
- The explosion of the context diagram - May include up to nine processes - Each process is numbered - Major data stores and all external entities are included - Start with the data flow from an entity on the input side - Work backward from an output data flow - Examine the data flow to or from a data store - Analyze a well-defined process - Take note of any fuzzy areas
Three-Layer Architecture
-client / server architecture with application divided into view layer, logic layer, and data layer 1. view layer - user interface 2. logic layer - program logic to implement the functions 3. data layer - functions to access the data
DFD development process
1. Make a list of business activities and use it to determine various - External entities - Data flows - Processes - Data stores 2. Create a context diagram that shows the external entities and data flows to and from the system. Do not show any detailed processes or data stores. 3. Draw Diagram 0, the next level. Show processes, but keep them general. Show data stores at this level. 4. Create a child diagram for each of the processes in Diagram 0. 5. Check for errors and make sure the labels you assign to each process and data flow are meaningful. 6. Develop a physical data flow diagram from the logical data flow diagram. Distinguish between manual and automated processes, describe actual files and reports by name, and ass controls to indicate when processes are complete or errors occur. 7. Partition the physical data flow diagram by separating or grouping parts of the diagram in order to facilitate programming and implementation.
Eight Types of Web sites for Advertising
1. Portals: most popular; best for reach but not targeting 2. Search: second largest reach, high advertising value 3. Commerce: high reach, not conducive to advertising 4. News/weather/sports: poor target ability 5. Entertainment: large reach, strong target ability 6. Community: emphasize being a part of something; good for specific advertising 7. Communications: not good for branding; low target ability 8. Games: good for very specific types of advertising
Customizing a software package
1. Purchase a basic package that vendors will customize to suit the project's needs 2. Negotiate directly with the software vendor to make enhancements 3. Purchase the package and make project-specific modifications if the software license permits it
Reasons for in house development:
1. Satisfy unique business requirements 2. Minimize changes in business procedures and policies 3. Meet constraints of existing systems & technology 4. Develop internal resources and capabilities 5. Satisfy unique security requirements
The three types of Electronic Exchanges
1. Vertical Exchanges: connect byers and sellers in a given industry 2. Horizontal Exchanges: connect buyers and sellers across many industries and are used mainly for MRO materials 3. Functional Exchanges: needed services such as temporary help or extra office space are traded on an as-needed basis
steps in the software acquisition process
1. eval the info systems requirements 2. identify potential vendors or outsourcing options 3.evaluate the alternatives 4. perform cost benefit analysis 5. prepare a recommendation 6. implement the solution
B) has only inputs
A black hole is one that: A) has only inputs B) has only outputs C) has not been exploded to show enough detail D) has insufficient inputs to produce the associated processes
Report
A business document that contains only predefined data; it is a passive document used solely for reading or viewing. A report typically contains data from many unrelated records or transactions.
Identifier
A candidate key that has been selected as the unique, identifying characteristic for an entity type.
Combo box
A combination text box and list box that displays a predefined list but also allows data entry
foreign key
A common field that exists in more than one table and can be used to form a relationship, or link, between the tables
crow's foot notation
A common method of cardinality notation is called _____ _____ ________ because of the shapes, which include circles, bars, and symbols, that indicate various possibilities
Action bar
A common navigation bar with action controls used for smartphones and usually placed at the bottom of the screen
Server
A computer or a group of computers that manages shared resources such as file systems, databases, and websites, and enables users and computers to access those resources over a network.
Server
A computer that manages shared resources and allows users to access those resources over a network is called a what?
A) extended entry
A condition that has more than two values is a(n): A) extended entry B) simple entry C) complex entry D) limited entry
Functional dependency
A constraint between two attributes in which the value of one attribute is determined by the value of another attribute.
Referential Integrity Constraint
A constraint, stored in the schema, that the DBMS uses to automatically enforce referential integrity
Event modeling
A data flow diagram built based on events. Includes the event, source, trigger, activity, and response. The trigger and response become the input and output data flows, and the activity becomes the process.
C) level-0 diagram
A data flow diagram that represents a system's major processes, data flows, and data stores at a high level of detail refers to: A) context diagram B) level-1 diagram C) level-0 diagram D) level-00 diagram
Decentralized Database
A database stored at multiple locations without needing to be interconnected through a network or synchronized
B
A decision table is simplified by: A) removing extended entries B) removing any rules with impossible actions C) removing simple entries D) removing any rules with static actions
Use case
A depiction of a system's behavior or functionality under various conditions as the system responds to requests from users.
Use Case
A depiction of a system's behaviour or functionality under various conditions as the system responds to requests from users.
Data Store
A depository for the data that allows examination, addition, and retrieval of data. Named with a noun, describing the data. Usually given a unique reference number. Represents a: - Database - Computerized file - Filing cabinet
Conceptual data model
A detailed model that captures the overall structure of organizational data that is independent of any database management system or other implementation considerations.
Entity-relationship data model (E-R model)
A detailed, logical representation of the entities, associations, and data elements for an organization or business area.
Payback analysis
A determination of how long it takes and information system to pay for itself through reduced costs and increased benefits
Logical model
A diagram that focuses on the business and how the business operates; describes the business events that take place and the data required and produced by each event.
Sampling distribution
A distribution of statistics obtained by selecting all of the possible samples of a specific size from a population
Software requirements specification
A document that contains the requirements for the new system, describe the alternatives that were considered, and makes a specific recommendation to management. It is the end product of the systems analysis phase. Sometimes also called a systems requirement document
Request for Proposal (RFP)
A document that describes the company, lists the IT services or products needed, and specifies the features required
Information center (IC)
A facility that supports users by training them on application software. Used support specialists answer questions, troubleshoot problems, and serve as a clearinghouse for used problems and solutions. Also known as service desk or help desk
Discoverability
A feature of the user interface that provides Clues to help users uncover hidden features
Foreign Key
A field in one table that must match a primary key value in another table in order to establish the relationship between two tables
Pointer
A field of data that can be used to locate a related field or row of data.
secondary key
A field or combination of fields that can be used to access or retrieve records
primary key
A field or combination of fields that uniquely and minimally identifies a particular member of an entity
Primary Key
A field or combination of fields that uniquely identifies a particular member of an entity
Calculated field
A field that can be derived from other database fields. Also known as a computed field or a derived field.
D) data store
A file folder containing orders is represented on a data flow diagram as a: A) process B) source C) data flow D) data store
Indexed file organization
A file organization in which rows are stored either sequentially or nonsequentially, and an index is created that allows software to locate individual rows.
Sequential file organization
A file organization in which rows in a file are stored in sequence according to a primary key value.
Hashed file organization
A file organization in which the address of each row is determined using an algorithm.
Application service provider(ASP)
A firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
Application Service Provider
A firm that delivers a software application, or access to an application, by charging a usage/subscription fee.
Application service provided (ASP)
A firm that delivers a software application, or access to and application, by charging a usage or subscription fee
Value-added reseller (VAR)
A firm that enhances a commercial package by adding custom features and configuring it for a particular industry
What is a service provider?
A firm that offers outsourcing solutions
Service provider
A firm that offers outsourcing solutions. Two popular outsourcing options involve application service providers and firms that offer internet business services
Entity-relationship diagram (E-R diagram)
A graphical representation of an E-R model.
Check boxes
A group of selection items that allows either none or many items to be selected within the group
Radio Buttons
A group of selection items that allows only one item to be selected within a group
Unified Modeling Language (UML)
A language that provides a standardized set of tools to document the object-oriented analysis and design of a software system.
False
A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.
Exclusive Lock (White Lock)
A lock where no other activity is allowed, neither reading nor writing the data
Which of the following is not an advantage of using a logical model?
A logical model clarifies which processes are automated
Decision table
A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions
C) decision table
A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions, defines a: A) structure chart B) state transition diagram C) decision table D) sequence diagram
Benchmark
A measure of time a blackberries to process a certain number of transactions
Asynchronous message
A message in which the sender does not have to wait for the recipient to handle the message.
Client/Server Architecture
A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?
Ajax
A method using JavaScript and XML to dynamically change Web pages without displaying a new page by obtaining small amounts of data from the server.
B) has only outputs
A miracle process is one that: A) has only inputs B) has only outputs C) cannot be exploded further D) has insufficient inputs to produce the associated processes
Cloud Computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction
B) decision table
A modeling technique that allows you to represent a set of conditions and the actions that follow from them in a tabular format best describes: A) data flow diagram B) decision table C) flowchart D) Structured English
Physical table
A named set of rows and columns that specifies the fields in each row of the table.
Physical file
A named set of table rows stored in a contiguous section of secondary memory.
Relation
A named, two-dimensional table of data. Each relation consists of a set of named columns and an arbitrary number of unnamed rows
Return on Investment (ROI)
A percentage rate that compares the total net benefits (the return) received from a project to the total costs (the investment) of the project
Return on investment (ROI)
A percentage rate that measures profitability by comparing the total net benefits(the return) received from a project to the total costs (the investment) of the project. _______ = (total benefits - total costs) / total costs
Use case diagram
A picture showing system behavior, along with the key actors that interact with the system.
Use Case Diagram
A picture showing system behaviour, along with the key actors that interact with the system.
Transaction
A piece of work with several steps that must all be completed to be valid
What is middle (i.e.,label) of the process symbol used for?
A process description
Child Diagrams
A process on Diagram 0 that is exploded. Cannot produce output or receive input that the parent process does not also produce or receive. The child process is given the same number as the parent process. - Process 3 would explode to Diagram 3
Hypertext Markup Language
A protocol that defines the structure and content of a web page is called what?
Structured Query Language SQL
A query language used to access and update the data in a relational database
Third normal form (3NF)
A relation is in second normal form and has no functional (transitive) dependencies between two (or more) nonprimary key attributes.
Second normal form (2NF)
A relation is in second normal form if every nonprimary key attribute is functionally dependent on the whole primary key.
Well-structured relation
A relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies; also known as a table.
Functional Dependency
A relationship between columns such that the values in one (or more) column determine the values in a second column (or set of columns)
Unary relationship
A relationship between instances of one entity type; also called recursive relationship.
Second Normal Form (2NF)
A restriction that a table is in 1NF and that each non-key attribute is functionally dependent on the entire primary key
First Normal Form (1NF)
A restriction that all fields must be atomic, or single valued
Referential integrity
A rule that states that either each foreign key value must match a primary key value in another relation or the foreign key value must be null (i.e., have no value).
Scenario
A scenario, in UML refers to a single path, among many possible different paths, through a use case.
Web 2.0
A second generation of the web that enable people to collaborate, interact, and share information much more dynamically, based on continuously available used applications rather than static HTML webpages. Interactive experience is a hallmark of ______
Web 2.0
A second generation of the web that enables people to collaborate, interact and share informatino much more effectively
Virtual Private Network (VPN)
A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?
Fixed fee model
A service model that charges a set fee based on a specified level of service and used support
Subscription model
A service model that charges a variable fee for an application based on the number of users of workstations that have access to the application
Transaction model
A service model that charges a variable fee for an application based on the volume of transactions or operations performed by the application. Also called a usage model
Fixed fee model (outsourcing)
A set fee based on a specified level of service and user support
Record
A set of related fields that describes one instance or occurrence of an entity
Referential integrity
A set of rules that avoids data inconsistency and quality problems
referential integrity
A set of rules that avoids data inconsistency and quality problems
Repeating group
A set of two or more multivalued attributes that are logically related.
Ternary relationship
A simultaneous relationship among instance of three entity types.
Entity instance
A single occurrence of an entity type. Also known as an instance.
Data flow diagram fragment
A single process on a data flow diagram. All the fragments combine to form Diagram 0.
Three-layer architecture
A software architecture that divides an application into view, business logic, and data is called what?
Web service
A software function or set of functions or services that can be executed via Web protocols is called a what?
Vertical application
A software package developed to handle information requirements for a specific type of business
What is a vertical application?
A software package developed to handle information requirements for a specific type of business
Horizontal application
A software package that can be used by many different types of organizations
What is a horizontal application?
A software package that can be used by many different types of organizations
Vertical application
A software that has been developed to handle information requirements for a specific type of business
External entity (source or destination)
A source or destination of data considered to be external to the system being described. Also called an entity.
Null value
A special field value, distinct from zero, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown.
Maintenance agreement
A specification of the conditions, charges, and time frame for users to contact the vendor for assistance when they have system problems or questions
Subtype
A subgrouping of the entities in an entity type that is meaningful to the organization and that shares common attributes or relationships distinct from other subgroupings.
B) source
A supplier of auto parts to our company is represented on a data flow diagram as a: A) process B) source C) data flow D) data store
System of record
A system or application component that maintains the current and correct Master Copy of one or more data items
Database Management System (DBMS)
A system software component that manages and controls one of more databases
Why do analysts work in teams when selecting hardware and software?
A team approach ensures that critical factors are not overlooked and that a sound choice is made
Transaction Logging
A technique by which any update to the database is logged with such audit information as user ID, date, time, input data, and type of update
File organization
A technique for physically arranging the records of a file.
Evaluation Model
A technique that uses a common yardstick to measure and compare vendor ratings
List box
A text box with a list of predefined data values
False
A three-layer architecture requires at least three computers to be implemented correctly.
Report generator
A tool for designing formatted reports rapidly. Also called a report writer
Default value
A value a field will assume unless an explicit value is entered for that field.
Service-oriented architecture (SOA)
A way of engineering systems in which reusable business functionality is provided by services through well defined interfaces. Technically, not software architecture but an architectural style
Request for proposal (RFP)
A written list of features and specifications given to prospective vendors before a specific product or package has been selected
When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.
A. Buy-side marketplace.
Organizations typically face issues related to e-tailing including A. Companies face issues in both of these areas B. Channel conflict C. Order fulfillment D. Companies do not face issues in either of these areas
A. Companies face issues in both of these areas
Downloading a book on an Amazon Kindle is an example of: A. Pure e-commerce. B. Partial e-commerce. C. Both of these are correct. D. Neither of these are correct.
A. Pure e-commerce.
For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply): A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. C. The ability to eliminate advertising. D. The ability to offer lower prices to customers.
A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. D. The ability to offer lower prices to customers.
The opening case illustrates how e-commerce has increased (choose all that apply): A. The volume of business transactions. B. The skill with which computers are able to handle unexpected situations. C. The occurrence of human errors. D. The speed at which we do business.
A. The volume of business transactions. D. The speed at which we do business.
eBay is an example of which type of e-commerce? A. consumer-to-consumer B. consumer-to-business C. business-to-consumer D. business-to-business E. government-to-citizen
A. consumer-to-consumer
When e-commerce is done in a wireless environment, this is called: A. mobile commerce B. wireless commerce C. pervasive computing D. location commerce E. consumer commerce
A. mobile commerce
Manufacturers or retailers sell directly to customers in which of the following business models? A. online direct marketing B. affiliate marketing C. find-the-best-price D. name-your-own-price E. electronic tendering system
A. online direct marketing
A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
ASP
Interoperability
Ability of a component or system to interact with other components or systems
An attempt to disseminate information in order to influence a buyer-seller transaction.
Advertising
ajax
Ajax is a technique that uses both JavaScript and XML to obtain small amounts of data, either plain text or XML, from a server without leaving the web page.
B) event
All business processes begin and end with a(n): A) starting and termination points B) event C) activity D) gateway
A) decision
All of the following are symbols used in business process modeling EXCEPT: A) decision B) gateway C) event D) activity
Business logic layer
Also known as The Domain layer the part of a three layer architecture that contains the programs that implement the business rules and processes
Which is NOT one of the four basic symbols used to chart data movement on data flow diagrams?
An Oval
B) data flow
An arrow on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
Extend relationship
An association between two use cases where one adds new behaviors or actions to the other.
Extend Relationship
An association between two use cases where one adds new behaviours or actions to the other. [The base use case can stand alone without the _____ case(s)].
Include relationship
An association between two use cases where one use case uses the functionality contained in the other.
Include Relationship
An association between two use cases where one use case uses the functionality contained in the other. [The base use case can't function without the ___ case(s).]
Candidate key
An attribute (or combination of attributes) that uniquely identifies each instance of an entity type.
Primary key
An attribute (or combination of attributes) whose value is unique across all occurrences of a relation.
Key
An attribute or set of attributes, the values of which are unique for each row of the table, that is used to uniquely identify a row
Foreign key
An attribute that appears as a nonprimary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation.
Foreign Key
An attribute that duplicates the primary key of a different (or foreign) table.
Composite attribute
An attribute that has meaningful component parts.
Required attribute
An attribute that must have a value for every entity instance.
Associative entity
An entity type that associates the instances of one or more entity types and contains attributes that are peculiar to the relationship between those entity Instances; also called a gerund.
A) dash (-)
An indifferent condition is represented by a(n): A) dash (-) B) asterisk (*) C) exclamation point (!) D) pound sign (#)
Open Database Connectivity (OBDC)
An industry-standard protocol that makes it possible for software from different vendors to interact and exchange data
In-house software
An information center of help desk within the IT department responsible for providing used support and offering services such as hotline assistance, training, and guidance to users who need technical help
data warehouse
An integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company
Data Warehouse
An integrated collection of data that can include seemingly unrelated information
Screen generator
An interactive tool that helps design a custom interface, create screen forms, and handle data entry format and procedures. Also called a form painter
Newsgroup
An online discussion on a particular topic, where people meet, offer support,and exchange ideas. The electronic equivalent of the physical bulletin board. Also called a forum
Cloud computing
An online software and data environment in which applications and services are accessed and used through an internet connection rather than on a local computer; refers to the cloud symbol for the internet
Managed hosting
An operation is managed by the outside firm, or host. Another term for IBS
Usability
An overall evaluation of how a system performs in supporting a particular user for a particular task.
Context diagram
An overview of an organizational system that shows the system boundaries, external entities that interact with the system, and the major information flows between the entities and the system
Context diagram
An overview of an organizational system that shows the system boundaries, external entities that interact with the system, and the major information flows between the entities and the system.
Metaphors
Analogies between features of the user interface and aspects of physical reality which users are familiar
candidate key
Any field that could serve as a primary key is called a
_____________ is a firm that delivers a software application, or access to an application _____________ provide powerful web-based support for transactions such as order processing, billing, and crm
Application service provider Internet Business Services
Business Process Outsourcing
Aspects of outsourcing such as programming, renting software/systems, or handling the IT functions.
Which type of electronic payment is typically favored in B2B A. Electronic credit cards B. Electronic checks C. Smart cards D. Electronic cash
B. Electronic checks
When organizations come to a company's Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.
B. Sell-side marketplace.
Which of the following electronic payments is ideal for micropayments? A. Purchasing cards B. Smart cards C. Electronic checks D. None of the methods listed is suited to micropayments
B. Smart cards
The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by: A. Neither party; PayPal is a free service. B. The payer. C. The payee. D. Both the payee and the payer.
B. The payer.
In an e-credit card transaction, the clearinghouse plays the following role: A. Initiates the transfer of money B. Validates and verifies the seller's payment information C. Transfers funds between the seller's bank and the buyer's bank D. All of these
B. Validates and verifies the seller's payment information
The four types of E-Commerce are:
B2C - Business to Consumer B2B - Business to Business C2C - Consumer to Consumer B2E - Business to Employee
An organization uses e-commerce internally to provide information and services to its employees. Companies allow employees to manage their benefits, take training classes electronically; buy discounted insurance, travel packages, and event tickets.
B2E
Electronic billboards.
Banners
What are the benefits of E-Commerce to organizations and customers and society?
Benefits to Organizations: -makes markets more accessible -lowers costs Benefits to Customers: -access to a vast number of products and services around the clock Benefits to Society: -ability to easily deliver to people everywhere
Purely physical organizations.
Brick-and-mortar organizations
Tool tip
Brief instructions that pop up when the mouse hovers over a control
Standards Architecture
Broad plan for creating standards - break problems into smaller pieces for ease of development - develop standards for the individual pieces - Dominant architecture today is the hybrid TCP/IP-OSI standards
The method by which a company generates revenue to sustain itself
Business Model
Which type of electronic exchange connect buyers with sellers within a specific industry? A. Functional exchanges B. Public exchanges C. Vertical exchanges D. Horizontal exchanges
C. Vertical exchanges
In this type of e-commerce, buyers and sellers are individuals. A. business-to-consumer B. business-to-business C. consumer-to-consumer D. government-to-citizen E. consumer-to-business
C. consumer-to-consumer
In _____, needed services such as temporary help or extra space are traded on an as-needed basis. A. buy-side marketplaces B. horizontal exchanges C. functional exchanges D. sell-side marketplaces E. vertical exchanges
C. functional exchanges
A(n) _____ is automatically launched by some trigger and appears in front of the active window. A. keyword banner B. random banner C. pop-up ad D. pop-under ad E. text box
C. pop-up ad
The major strategies for conducting __________ commerce on the Internet are auctions and classified ads.
C2C
D) process
Calculating an employee's salary is represented on a data flow diagram as a: A) data flow B) source C) data store D) process
The alienation of existing distributors when a company decides to sell to customers directly online
Channel Conflict
What is a usage model or transaction model?
Charges a variable fee based on the volume of transactions or operations performed by the application
Conduct some e-commerce activities, yet their business is primarily done in the physical world in example: partial EC
Click-and-mortar Organizations
Complex Data Types
Combinations of or extensions to primitive data types that are supported by programming languages, operating systems, and DMBSs
The blending of community, communication, and entertainment into a new form of online activity driven by consumers.
Communitainment
Software vendor
Company that develops software for sale
What are some characteristics of a traditional development environment?
Compatibility issues influence systems design Systems are designed to run on local and wide-area company networks Systems often use internet links as enhancements Follows three main paths, in-house, purchase a package, or outside consultants Scalability depends on networks limitations and constraints Require lots of computing power and resources Security issues are less complex
Table or File
Contains a set of related records that store data about a specific entity
Distribution of Sample Means
Contains all of the possible samples The collection of ample means for all of the possible random samples of a particular size (n) that can be obtained from a population.
What is a systems requirements specification?
Contains the requirements for the new system, describes the alternatives that were considered, and makes specific recommendation to management
Firmware
Control programs stored on chips are sometimes referred to as _________? The OS in an ipod, iphone or TV is most likely stored as _______?
Involves conducting banking activities from home, a place of business, or on the road instead of at a physical bank location.
Cyberbanking
____ and ____ are the two major challenges for the sellers in e-commerce. A. Order fulfillment, large orders B. Channel conflict, advertising C. Advertising, large orders D. Channel conflict, order fulfillment
D. Channel conflict, order fulfillment
In the _____ marketplace model, the reverse auction is typically used. A. desktop purchasing B. group purchasing C. electronic exchange D. buy-side E. sell-side
D. buy-side
Database administrator
DBA. The person in charge of the safety and operation of the database management system
A(n) ____ is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze the contents of data.
DBMS
A method that provides conceptional freedom for representing processes and flows in a business system is the _______.
Data Flow Diagram
Data store
Data at rest, which may take form of many different physical representations.
Data store
Data at rest, which may take the form of many different physical representations
B) data store
Data at rest, which may take the form of many different physical representations, defines: A) source B) data store C) data flow D) process
Derived element
Data fields or elements that are not keyed but are rather the result of a calculation or logical operation.
Base element
Data fields or elements that need to be keyed; must be stored in a file.
A) process models
Data flow diagrams that concentrate on the movement of data between processes are referred to as: A) process models B) data models C) flow models D) flow charts
Which of the following is not an error when drawing a data flow diagram?
Data flow on a child diagram that has only one end connected to a process, the other end is a point in space
D) data flow
Data in motion, moving from one place in a system to another, defines: A) data store B) process C) source D) data flow
Relational database model
Data represented as a set of related tables or relations.
Data store
Data that are at rest in a system; depicted using an open-ended rectangle in data flow diagrams.
Primitive Data Types
Data types supported directly by computer hardware or a programming language
Schema
Database component that contains descriptive information about the data stored in the physical data store
scalability, economy of scale, enterprise-wide application, stronger standards, better security, and data independence
Database management software advantages include:
Make or buy (build or buy)
Decision between developing or purchasing software. Developing is an "In House Software" Purchasing is a "Software Package"
In what type of e-commerce business model do companies offer deep price discounts
Deep discounters
Local Design
Defines "what" must take place, not "how" it will be accomplished.
HTTP (hypertext transfer protocol)
Defines format and content for transfer of web documents
Logical design
Defines what must take place, not how it will be accomplished
Pure versus Partial Electronic Commerce depends on the ______ involved.
Degree of Digitization
Process
Denotes a change in or transformation of data. Represents work being performed in the system. Naming convention: - Assign the name of the whole system when naming a high-level process. - To name a major subsystem attach the word subsystem to the name. - Use the form verb-adjective-noun for detailed processes.
Sequence diagram
Depicts the interactions among objects during a certain period of time
Physical design
Describes the actual process of entering, verifying and storing data
True
Describing the environment is one of the detailed activities of core process 4: Design system components.
User-centered design
Design techniques that embody The View that the user interface appears to be in the entire system
Mobile responsive
Designing websites so the pages are responsive to being displayed on small mobile devices
Payback Analysis
Determines how long it takes an information system to pay for itself through reduced costs and increased benefits.
Intermediaries or middlemen provide information and/or provide value-added services. When the function(s) of these intermediaries can be automated or eliminated, this process is called
Disintermediation
Request for Proposal
Document that describes the company, lists the IT services required, and specifies the features required.
Businesses and organizations set up Web sites to: A. Sell goods and services. B. Induce people to visit a physical location. C. Reduce operational and transaction costs. D. Enhance their reputation. E. All of the above.
E. All of the above
Electronic business includes which of the following? A. buying and selling B. servicing customers C. collaborating with business partners D. conducting electronic transactions within an organization E. all of the above
E. all of the above
The key mechanisms to sell-side marketplaces are
Electronic Catalogs and Forward Auctions
Describes the buying, selling, transferring or exchanging of products, services or information via computer networks, including the Internet.
Electronic Commerce (E-Commerce)
Allow customers to charge online payments to their credit card account
Electronic Credit Cards
Collections of individual shops under a single Internet address.
Electronic Malls
This enables you to pay for goods and services electronically.
Electronic Payment Systems
In what type of e-commerce business model do businesses request quotes from suppliers
Electronic tendering system
HTTPS (hypertext transfer protocol secure)
Encrypted and secure HTTP transfers
What are the steps in the software acquisition process?
Evaluate the Information System Requirements Identify Potential Vendors or Outsourcing Options Evaluate Alternatives Cost Benefit Analysis Prepare Recommendation Implement Solution
An _____________ model is a technique that uses a common yardstick to measure and compare vendor ratings
Evaluation
Exploding
Expanding a diagram to show subprocesses.
A value added contract provides for flexibility, but may result in a larger than expected bill.
False
Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity. True False
False
If in-house experience exists for all the functional and technical needs of the new system, it will be easier to outsource the building of the system, because the company employees with those skills will be able to quickly learn the new system with very little training.
False
In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores. True False
False
In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores. True False
False
In-house experience is not a factor to be considered for selecting a design strategy since a company is always able to hire experienced developers.
False
Internet marketing typically is one-way and impersonal. True False
False
Many project teams believe that packaged software is the best way to create a system because they have complete control over the way the system looks and functions, and they can be flexible and creative in the way they solve business problems.
False
Max has been a project manager for 10 years and is considered one of the best in his department of well qualified IS professionals. The approval committee is considering the approval of a new unique Internet system that could possibly catapult the firm ahead of all of the competition. Buying a packaged system would be the best design strategy.
False
Processes in a rectangle with rounded corners sometimes denote something other than a change in or transformation of data or a system/subsystem.
False
Processes that transform data should be named with a noun which indicates the data that has been transformed.
False
Stored-value money cards contain chips with personal data. True False
False
The design strategy that would be most logical to a firm with a very limited amount of in-house IS expertise is allow end-users to create the system.
False
The highest level data flow diagram is called Diagram 0.
False
The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores. True False
False
The use of electronic commerce requires companies to hire additional employees. True False
False
There are three design strategies: 1) developing a custom application in-house, 2) hiring a consultant, and 3) relying on an external vendor, developer, or service provider to build the system.
False
Trademark owners in the US are not allowed to sue for damages in cases of cybersquatting. True False
False
Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities. True False
False
Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions. True False
False
When two companies fight over a domain name the company that has been in business the longest is automatically considered the owner of the domain. True False
False
In what type of e-commerce business model do customers specify a need and an intermediary compares providers and shows the lowest price
Find-the-best-price
Recursive foreign key
A foreign key in a relation that references the primary key values of that same relation.
Normalization
A formal technique for transforming a relational schema to an equivalent one that minimizes data redundancy and eliminates data anomalies
data structure
A framework for organizing, storing, and managing data
Supertype
A generic entity type that has a relationship with one or more subtypes.
Data flow diagram
A graphical depiction of data processes, data flows, and data stores in a business system.
data flow diagram (DFD)
A graphical depiction of data processes, data flows, and data stores in a business system. (7)
Software license
A legal agreement that gives users the right to use the software under certain terms and conditions
Software as a Service (SaaS)
A model of software delivery in which functionality is delivered on-demand as a network-accessible service, rather than as a traditional software application that is downloaded and installed on the customer's computer
What is Software as a service?
A model of software development in which an application is hosted as a service provided to customers over the internet
Software as a Service
A model of software development in which an application is hosted as a service provided to customers over the internet.
Network diagram
A model that shows how locations and Hardware components are interconnected with network devices and wiring
Entity-Relationship Diagram (ERD)
A model that shows the logical relationships and interaction among entities. Provides the overall view of the system and a blueprint for creating the physical data structures.
Attribute
A named property or characteristic of an entity that is of interest to the organization.
Physical design
A plan for the actual implementation of the system
D) source/sink
A square on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink
Evaluation model
A technique that used a common yardstick to measure and compare vendor ratings
In what type of e-commerce business model do vendors ask partners to place logos or banners on partner's sites
Affiliate Marketing
____ accounts for the majority of e-commerce transactions. A. B2C B. B2B C. C2C D. B2E E. G2C
B. B2B
C) identifying selection criteria
Basic procedures for constructing a decision table do not include: A) listing all possible rules B) naming the conditions and the values each condition can assume C) identifying selection criteria D) simplifying the decision table
B2B model in which organizations buy needed products or services from other organizations electronically, often through a reverse auction
Buy-side Marketplace
An individual sells products or services to other individuals
C2C
Usage or transaction model (outsourcing)
Charges a variable fee based on the volume of transactions or operations performed by the application
True
Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.
Internet Protocol (IP) Address
Every device connected to the internet has an identifying address called __________?
Referential Integrity
Every value as a foreign key in one table must have an equivalent value as the primary key in the associated table
Electronic commerce makes national and international markets less accessible. True False
False
C) be coupled to each other
If two processes are connected by a data flow, they are said to: A) share the same timing effects B) share the same data C) be coupled to each other D) be strapped to each other
False
In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.
What is another term for internet business services?
Managed hosting
Benchmarking
Measurement of the time a package takes to process a certain number of transactions
Secondary key
One or a combination of fields for which more than one row may have the same combination of values.
Asks consumers to give their permission to voluntarily accept online advertising and e-mail.
Permission Marketing
The B2B equivalent of electronic credit cards and are typically used for unplanned B2B purchases
Purchasing cards
B) decision table
Removing any rules with impossible actions to make which of the following simple as possible? A) activity diagram B) decision table C) structure chart D) hierarchical chart
Detailed reports
Reports that contain specific information on business transactions
Sequence Diagram - Instance Form
Shows the sequence for only one scenario.
Total specialization rule
Specifies that each entity instance of the supertype must be a member of some subtype of the relationship.
___________ has a variable fee based on the number of users or workstations that have access to the application
Subscription model
What are some characteristics of a web-based development environment:
Systems are developed in internet-based framework Treats web as a platform Easily scalable and can run on multiple hardware Used by large firms for CRM, order processing, and materials management Treats the software application as a service that is less dependent on computing power and resources Can limit in-house involvement and have the vendor install, configure, and maintain the system Usually requires middleware to communicate with existing software and legacy systems More complex security issues
The process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate everything together is called _____.
Systems integration
schema
The complete definition of a database, including descriptions of all fields, tables, and relationships
DFD consistency
The extent to which information contained on one level of a set of nested DFDs is also included on other levels
B) rules
The part of a decision table that links conditions to actions is the section that contains the: A) action statements B) rules C) condition statements D) decision stubs
Action stubs
The part of a decision table that lists the actions that result for a given set of conditions
D) multiply the number of values for each condition by the number of values for every other condition
To determine the number of rules required for the decision table, you would: A) add the number of values for each condition to the number of values for every other condition B) multiply the number of conditions by two C) add the number of values for each condition to the number of values for every other condition, then subtract 1 D) multiply the number of values for each condition by the number of values for every other condition
With a ______ approach, the diagrams move from general to specific.
Top-Down
Event response table
Used to summarize events.
Ui
User experience. The set of inputs and outputs that the user interacts with to invoke the functions of an application
False
For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.
Refers to online "word of mouth" marketing
Viral Marketing
Banks dedicated only to Internet transactions.
Virtual Banks
______________ second generation of the web that enables people to collaborate, interact, and share information much more effectively ____________ a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction ___________ hand held electronics such as smartphones and tablets
Web 2.0 Cloud Computing Mobile Devices
Level-n diagram
a DFD that is the result of n nested decompositions from a process on a level-0 diagram
one-to-one relationship
abbreviated 1:1, exists when exactly one of the second entity occurs for each instance of the first entity
A(n) ______ matrix can be used to organize the pros and cons of the design alternatives so that the best solution will be chosen in the end.
alternative
Central limit theorem
For any population with a mean and standard deviation the distribution of sample means for sample size n will have a manu of u and ans standard deviation of square root over n and will approach a normal distribution as n approaches infinity.
Computer Network
hardware, software, transmission media
user interface
includes screens, commands, controls, and features that enable users to interact more effectively with an application
subject matching
synonym for individual matching
Drivers of today's online advertising include:
-Communitainment -Usites -Multitasking
What are the disadvantages of E-Commerce
-No universal security standard -Insufficient bandwidth -Expensive accessibility -Perception that EC is insecure -Lacks a critical mass of buyers and sellers
Reasons for purchasing a software package
1. Lower costs 2. Requires less time to implement 3. Proven reliability and performance benchmarks 4. Requires less technical development staff 5. Future upgrades provided by the vendor 6. Obtain input from other companies
A) level-3 diagram
A DFD that is a result of three nested decompositions of a series of subprocesses from a process on a level-0 diagram defines a: A) level-3 diagram B) level-1 diagram C) level-2 diagram D) primitive diagram
D) level-n diagram
A DFD that is the result of n nested decompositions from a process on a level-0 diagram, is called: A) primitive diagram B) level-0 diagram C) context diagram D) level-n diagram
Level-n diagram
A DFD that is the result of n nested decompositions from a process on a level-0 diagram.
Level-0 diagram
A DFD that represents a system's major processes, data flows, and data stores at a high level of detail
Physical model
A DFD that shows how a system will be implemented, including the hardware, software, people, and files involved.
Relational Database Management System (RDBMS)
A DMBS that organizes data in tables or relations
Homogeneous Distributed Database
A Database distributed across multiple locations with the same DBMS, and all database access coordinated by a global schema
Protocol
A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.
Three-layer architecture
A client/server architecture that divides an application interview layer, business logic layer, and data layer
Three layer architecture
A client/server architecture that divides an application into view, business logic and data layers is called what?
EBCDIC
A coding method used on mainframe computers and high-capacity servers
ASCII
A coding method used on most personal computers
Entity type
A collection of entities that share common properties or characteristics.
A) statements
A decision table does not include: A) statements B) condition stubs C) action stubs D) rules
Shared lock (Read lock)
A lock where other transaction are allowed to read the data
A primitive process is:
A process that is not exploded to a child diagram
Index
A table used to determine the location of rows in a file that satisfy some condition.
Active discovery
A user interface feature to lead users to discover hidden features
Actor
An external entity that interacts with a system.
Candidate Key
Any field that can serve as a primary key
C) 16
Assume the first condition has four values; the second condition has two values; the third condition has two values. How many rules will there be? A) 8 B) 7 C) 16 D) 24
B) 12
Assume the first condition has two values; the second condition has two values; the third condition has three values. How many rules will there be? A) 7 B) 12 C) 6 D) 11
D) 18
Assume we have three conditions. Condition one has two values; condition two has three values; condition three has three values. How many rules are needed? A) 8 B) 6 C) 5 D) 18
A competitive process in which either a seller solicits consecutive bids from buyers or a buyer solicits consecutive bids from sellers.
Auction
Major E-Commerce Mechanisms include:
Auctions Forward Auctions Reverse Auctions
Sellers use a _____ as a channel to many potential buyers. *Note that Sotheby's uses forward auctions.
Forward Auction Results in higher prices over time
Legal Issues Specific to E-commerce include
Fraud on the Internet- stocks Domain Names- competition Cybersquatting Domain Tasting Taxes and Other Fees Copyright
Refers to the practice of registering domain names solely for the purpose of selling them later at a higher price
Cybersquatting
Data store
Data at rest, which may take the form of many different physical representations.
A broader definition of EC, including buying and selling of goods and services, and also servicing customers, collaborating with partners, conducting e-learning and conducting electronic transactions within an organization.
E-Business
The use of Internet Technology in general and e-commerce in particular to deliver information about public services to citizens (called Government-to-citizen [G2C EC]), business partners
E-Government
Similar to paper checks and are used mostly in B2B.
E-checks
Purchasing by using electronic support
E-procurement
A(n) ____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
ERD
A Web site that represents a single store.
Electronic Storefront
Class such as URLConnection (dealing with URL connections) should be handled in the layer Data Management.
False
On data flow diagram, an arrow is used to depict an external entity that can give and receive data from the system.
False
Pirate Adventures, Inc., a company that owns and operates hotels in tropical locations, is interested in replacing the 15-year-old room reservation system in all of its hotels. Custom development would be the best design strategy.
False
Event trigger
Input for an event.
JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.
Java
LAN
Local area network- small computer network typically spanning a single home, small office, or one floor of a building
Data mining software
Looks for meaningful data patterns and relationships
What is the main reason for IT offshoring?
Lower costs
Involves customers accessing services via the Web.
Online Service
Ethical issues related to E-commerce include
Privacy and Job loss
In what type of e-commerce business model do customers use the internet to self-configure products or services
Product customization
What are some risks of offshoring?
Project control security issues disparate cultures effective communication Economic impact
Internet Business Services (managed hosting)
Provide powerful web-based support for transactions such as order processing, billing, and CRM.
With a(n) ____ language, the user provides an example of the data requested.
QBE
The key mechanisms to buy-side marketplaces are
Reverse Auctions
Physical Design
Set of blueprints for the actual construction.
Client / Server architecture
Software design with part of the application on a server and part of the client
Software package
Software that is purchased or leased from another firm. A commercially produced software product, or family of products
Feedback
Some visual or audio response by the system in response to a user action
Interoperability
The ability of a component or system to interact with other components or systems is referred to as what?
Balancing
The conservation of inputs and outputs to a DFD process when that process is decomposed to a lower level.
Primary Key
The key chosen by a database designer to define relationships by being used as a foreign key in other tables
Degree
The number of entity types that participate in a relationship.
Normalization
The process of converting complex data structures into simple, stable data structures.
Technology Architecture
The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?
Technology Architecture
The set of computing hardware, network hardware and system software used by an organization is called the what?
Application Architecture
The set of information systems the organization needs to support its operations is often called the what?
Lightweight graphics
The use of small, simple images to allow a Web page to be displayed more quickly.
Process
The work or actions performed on data so that they are transformed, stored, or distributed
Net Present Value
Total value of the benefits mins the total value of the costs.
Drill down
User interface design techniques that enables a user to select summary information and View supporting detail
Hypertext Transfer Protocol
What does HTTP stand for?
Software as a Service
What does SaaS stand for?
A Server Computer
What is a computer that manages shared resources for access across a network called?
Visibility
When a control is visible so that users know it's available
client/server architecture
a software design and deployment method that divides software into components that manage resources and components that use those resources
system of record
a system or application component that maintains the current and correct master copy of one or more data items
group counterbalancing
administering different sequences to different groups of participants
intrasubject counterbalancing
administering the treatment conditions to each individual participant in more than one order
Relational database management system
RDBMS. A DBMS that organizes data in tables or relations
A) process
Recording a customer's payment is represented on a data flow diagram as a: A) process B) source C) data flow D) data store
What are some benefits of SaaS?
Reduces the need for software maintenance, operation, and support
Exception reports
Reports that provide details or summary information about transactions or operating results of fall outside of predefined normal range of values
Executive reports
Reports used by high-level managers to assess overall organizational health and performance
External Entities
Represent another department, a business, a person, or a machine. A source of destination of data, outside the boundaries of the system. Should be named with a noun.
binary digits
Represents numbers as actual binary values, rather than as coded numeric digits
A -___________ is more specific than a RFP?
Request for quotation
One buyer, usually an organization, wants to buy a product or a service. The buyer posts a request for quotation (RFQ) on its Web site or on a third-party Web site. The RFQ contains detailed information on the desired purchase. Suppliers study the RFQ and submit bids, and the lowest bid wins the auction.
Reverse Auctions Results in lower prices over time
Many database programs generate ____, which is a language that allows client workstations to communicate with servers and mainframe computers.
SQL
Software-as-a-service
SaaS. A software delivery model similar to a utility, in which application software is accessed via the internet without locally installed programs
Why do companies choose to develop software in-house?
Satisfy unique business requirements Minimize changes in business procedures and policies Meet constraints of existing systems Meet constraints of existing technology Develop internal resources and capabilities
____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
Scalability
Where organizations sell their products or services to other organizations electronically from their own Web site and/or from a third-party Web site
Sell-side Marketplace examples include: Ariba Dell Auction BigboXX.com
Internet business services (IBS)
Services that provide powerful web-based support for transactions such as order processing, billing, and customer relationship management
Protocol
Set of languages, rules, and procedures that ensure accurate and efficient data exchange and coordination among hardware and software components
Sequence Diagram - Generic Form
Shows all possible sequences of interactions, that is, the sequences corresponding to all the scenarios of a use case.
Data Flow
Shows movement of data from one point to another. Described with a noun. Arrowhead indicates the flow direction. Represents data about a person, place, or thing.
Activity Diagram
Shows the conditional logic for the sequence of system activities needed to accomplish a business process.
Contain a chip called a microprocessor that can store a considerable amount of information and are multipurpose - can be used as a debit card, credit card or a stored-value money card.
Smart Cards
Mobile device
Smartphones, tablets, and other computing devices that are not permanently tethered to a desk. They connect to the network wirelessly
Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ____, is changing the picture dramatically.
Software as a Service
____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.
Software as a Service
Software as a Service (SaaS)
Software deployment model in which an application is hosted as a service provided to customers over the Internet
Client/server architecture
Software design and deployment method that divides software into components that manage resources and components that use resources
Enterprise Resource Planning (ERP)
Software package that integrates the many functions of a business - sales & inventory - manufacturing & purchasing - human resources - order tracking & decision support
Middleware
Software that connects dissimilar applications and enables them to communicate and exchange data. For example, ________ can link a departmental database to a web server that can be accessed by client computers via the internet or a company intranet
Application software
Software that performs user or business specific tasks and is typically constructed as an app or web-based application
Companies that develop software for sale are called what?
Software vendors
System Software
Software, such as Web server software, and works behind the scenes is called what?
Business rules
Specifications that preserve the integrity of the logical data model.
Overlap rule
Specifies that an entity instance can simultaneously be a member of two (or more) subtypes.
Partial specialization rule
Specifies that an entity instance of the supertype does not have to belong to any subtype.
standard notation format
Starts with the name of the table, followed by a parenthetical expression that contains the field names separated by commas. The primary key field(s) is underlined, like this: NAME (FIELD 1, FIELD 2, FIELD 3)
The Software Acquisition process
Step 1: Evaluate the Information System Requirements Step 2: Identify potential vendors or outsourcing options Step 3: Evaluate the alternatives Step 4: Perform Cost-Benefit analysis Step 5: Prepare a recommendation Step 6: Implement the Solution
Allow you to store a fixed amount of prepaid money and then spend it as necessary.
Stored-value Money Card
B) data flow
Student data contained on an enrollment form is represented on a data flow diagram as a: A) process B) data flow C) source D) data store
Evaluation Model
Technique that uses a common yardstick to measure and compare vendors.
Template-Based HTML
Templates to display and process common attributes of higher-level, more abstract items.
Hyperlink
The URL of one web resource is embedded within another web resource
False
The Web is the highway over which messages and information travel from network to network.
International Organization for Standardization
The ____________ ____________ __ _______________requires a format of four digits for the year, two forthe month, and two for the day (YYYYMMDD)
C) functional decomposition
The act of going from a single system to several component processes refers to: A) structuring B) balancing C) functional decomposition D) formatting
External systems and technology architecture.
The activity of Describing the Environment consists of what two key elements?
Make or buy
The choice between developing in-house software and purchasing software Also called build or buy
Schema
The complete definition of a database, including descriptions of all fields, tables and relationships is called a schema
Balancing
The conservation of inputs and outputs to a DFD process when that process is decomposed to a lower level
B) balancing
The conservation of inputs and outputs to a data flow diagram process when that process is decomposed to a lower level defines: A) decomposition B) balancing C) conservation D) data flow structuring
Usability
The degree to which a system is easy to learn and use
B) what you learned during requirements determination
The deliverables of process modeling state: A) how you should develop the system during physical design B) what you learned during requirements determination C) how you should implement the new system during implementation D) what you learned during project planning
A) context diagram
The diagram that shows the scope of the system, indicating what elements are inside and which are outside the system, is called a: A) context diagram B) level-2 diagram C) referencing diagram D) representative diagram
Level 0 diagram
The explosion (or decomposition) of a context-level data ow diagram that shows from three to nine major processes, important data flows, and data stores of the system under study.
DFD completeness
The extent to which all necessary components of a DFD have been included and fully described
B) DFD completeness
The extent to which all necessary components of a data flow diagram have been included and fully described refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility
DFD consistency
The extent to which information contained on one level of a set of nested DFDs is also included on other levels.
A) DFD consistency
The extent to which information contained on one level of a set of nested data flow diagrams is also included on other levels refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility
Internet Backbone Network
The high-speed, high capacity network that interconnects regions, countries, and continents.
Context Diagram
The highest level in a data flow diagram. Contains only one process, representing the entire system. The process is given the number 0. All external entities, as well as major data flows are shown.
Minimal Guarantee
The least amount promised to the stakeholder by a use case
Minimal guarantee
The least amount promised to the stakeholder by a use case.
D) primitive data flow diagrams
The lowest level of DFDs is called: A) level-0 diagrams B) context diagrams C) level-1 diagrams D) primitive data flow diagrams
Context-level diagram flow diagram
The most basic data flow diagram of an organization showing how processes transform incoming data into outgoing information. Also called an environmental model.
context level data flow diagram
The most basic data flow diagram of an organization showing how processes transform incoming data into outgoing information. Also called an environmental model.
Cardinality
The number of instances of entity B that can (or must) be associated with each instance of entity A.
Cardinality
The numeric relationship between two entities, shows how instances of one entity relate to instances of another entity
A) source/sink
The origin and/or destination of data, sometimes referred to as external entities defines: A) source/sink B) data store C) data flow D) process
Source/sink
The origin and/or destination of data; sometimes referred to as external entities.
Source/sink
The origin and/or destination of data; sometimes referred to as external entitiies
Business process outsourcing (BPO)
The outsourcing of basic business process
A) action stubs
The part of a decision table that lists the actions that result for a given set of conditions is called: A) action stubs B) condition stubs C) rule section D) condition execution
B) condition stubs
The part of a decision table that lists the actions that result for a given set of conditions is called: A) action stubs B) condition stubs C) rule section D) condition execution
Action stubs
The part of a decision table that lists the actions that result for a given set of conditions.
Condition stubs
The part of a decision table that lists the conditions relevant to the decision.
C) rules
The part of a decision table that specifies which actions are to be followed for a given set of conditions refers to: A) action stubs B) condition list C) rules D) decision list
Rules
The part of a decision table that specifies which actions are to be followed for a given set of conditions.
View layer
The part of a three layer architecture that contains the user interface
Data layer
The part of a three layer architecture that interacts with the data
Database Administrator (DBA)
The person in charge of the safety and operation of the DBMS
Data Administrator (DA)
The person in charge of the structure and integrity of the data
Global outsourcing
The practice of shifting IT development, support, and operations to other countries
Offshore outsourcing
The practice of shifting IT development, support, and operations to other countries. Not global
False
The primary benefit of a network diagram, is to show the network cabling and the network routers.
D) gap analysis
The process in analysis in which the analyst tries to discover discrepancies between two or more sets of data flow diagrams, representing two or more states of an information system, or discrepancies within a single DFD, is referred to as: A) double checking B) sequencing C) referencing D) gap analysis
Normalization
The process of creating table designs by assigning specific attributes to each table in the database
Gap analysis
The process of discovering discrepancies between two or more sets of DFDs or discrepancies within a single DFD
Gap analysis
The process of discovering discrepancies between two or more sets of DFDs or discrepancies within a single DFD.
Domain
The set of all data types and values that an attribute can assume.
Extension
The set of behaviors or functions in a use case that follow exceptions to the main success scenario.
Extension
The set of behaviours or functions in a use case that follow exceptions to the main success scenario.
Application Architecture
The set of information systems the organization needs to support its operations.
World Wide Web
The set of resources that can be accessed over the Internet is referred to what?
Field
The smallest unit of named application data recognized by system software.
Data Type
The storage format and allowable content of a program variable, class attribute, or relational database field
D) a rectangle with rounded edges
The symbol for an activity is: A) a square B) a circle C) an arrow D) a rectangle with rounded edges
Database lock
The technique of applying exclusive control to a part of the database so the one use at a time can use the data
Breadcrumbs (navigation)
The technique of displaying the sequence of pages traversed to allow easy backing out to a previous page
Outsourcing
The transfer of information systems development, operation or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.
Outsourcing
The transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis
What is outsourcing?
The transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis
D) process
The work or actions performed on data so that they are transformed, stored, or distributed defines: A) source/sink B) data store C) data flow D) process
Process
The work or actions performed on data so that they are transformed, stored, or distributed.
Outsourcing
Transfer of information systems development, operation, or maintenance to an outside firm.
A rectangle with rounded corners is used to show the occurrence of a transforming process.
True
A(n) fixed price contract provides for a stable customer price, but requirements will be well defined by the outsourcer at the beginning of the contract period.
True
An advantage of outsourcing the application development process is that the organization may acquire technical skills and functional knowledge from the vendor.
True
An object wrapper creates an application program interface (API) to a legacy system, enabling object-oriented systems to interact with it.
True
Each external entity is labeled with a noun.
True
Information is the major component of the e-commerce offerings of service industries. True False
True
The data flow diagram graphically characterizes data processes and flows in a business system.
True
The key mechanisms in the sell-side marketplace are customized electronic catalogs and forward auctions. True False
True
The physical architecture layer addresses how the software will execute on specific computers and networks.
True
The primary characteristic of auctions is that prices are determined dynamically by competitive bidding. True False
True
The three primary types of contracts that can be drawn to control the outsourcing deal are (1) a time and arrangements contract, (2) a fixed-price contract, and (3) a value-added contract.
True
Unbalanced decomposition means that the data flow to or from parent process does not match the data flow in or out of a child diagram.
True
Synonym
Two different names that are used for the same attribute.
Tables (Relations)
Two-Dimensional data structures consisting of columns and rows
users
Typically work with predefined queries and switchboard commands, but also use query languages to access stored data
Uniform resource locator
URL. Identifier of a web resource containing a protocol header, server name or address, and resource name
When the data flow in and out of a parent process do not match the data flow in or out of a child diagram, it is called:
Unbalanced Decomposition
Database Synchronization
Updating one database copy with changes made to other database copies
block sequence codes
Use blocks of numbers for different classifications 100-level courses are freshman-level 200-level courses are sophomore-level
Request for quotation (RFQ)
Used to obtain a price quotation or bid on a specific product or package
Ux
User experience. All aspects of a person's interaction with a software application, including actions, responses, perceptions, and feelings
User Application
Utilizes standard business software (Ex. Microsoft), which has been configured in a specific manner to enhance user productivity. Some user applications have powerful "screen generators" or "report generators" that allow users to design their own data entry forms and reports.
A firm that enhances a commercial package by adding custom features and configuring it for a particular industry is called what?
Value-added reseller
In what type of e-commerce business model do receivers send information about your product to their friends
Viral marketing
Companies engaged only in E-Commerce (also called pure play)
Virtual Organizations
VPN
Virtual private Network. Secure communication over the internet using technologies that reliably identify senders and recipients and encrypt Network messages sent among them
The ____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.
Web 2.0
What are three examples of evolving trends in the IT world?
Web 2.0 Cloud Computing Mobile Devices
Middleware
Web based software usually requires additional layers, called middleware, to communicate with existing software and systems.
cascading style sheets (CSS)
Web page encoding standard that enables a Web site designer to specify parts of a page that will always look the same and parts that will vary by task or audience
Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment.
Web-based
Success Guarantee
What a use case must do effectively in order to satisfy stakeholders.
Success guarantee
What a use case must do effectively in order to satisfy stakeholders.
Local Area Network
What does LAN stand for?
Extensible Markup Language
What does XML stand for?
data element (or item)
What is a field also called?
HTTP is less secure, while HTTPS would be used for credit card transactions.
What is the difference between HTTP and HTTPS?
HTML5
What is the latest version of HTML? (As of 2016)
Functionally primitive
When a process is not exploded. Also referred to as a primitive process.
D) limited entry
When condition values are either "yes" or "no", these values are called a(n): A) extended entry B) simple entry C) complex entry D) limited entry
C) primitive data flow diagrams
When you believe that you have shown each business form or transaction, computer screen, and report as a single data flow, you have probably reached the: A) level-0 diagrams B) level-1 diagrams C) primitive data flow diagrams D) level-3 diagrams
C) A data store has a noun phrase label.
Which of the following is a true statement regarding a data store? A) Data can move directly from one data store to another data store. B) Data can move directly from a sink to a data store. C) A data store has a noun phrase label. D) Data can move from an outside source to a data store.
D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.
Which of the following is a true statement regarding data flows? A) A data flow may have multiple directions between symbols. B) A data flow to a data store means retrieve or use. C) A data flow from a data store means update. D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.
D) none of the above
Which of the following is considered when diagramming? A) the interactions occurring between sources and sinks B) how to provide sources and sinks direct access to stored data C) how to control or redesign a source or sink D) none of the above
C) Composite data flows on one level cannot be split into component data flows at the next level.
Which of the following is not an advanced rule governing data flow diagramming? A) To avoid having data flow lines cross each other, data stores may be repeated on a DFD. B) At the lowest level of DFDs, new data flows may be added to represent data that are transmitted under exceptional conditions. C) Composite data flows on one level cannot be split into component data flows at the next level. D) The inputs to a process must be sufficient to produce the outputs from the process.
D) state-transition diagram
Which of the following is not one of the primary deliverables resulting from studying and documenting a system's processes? A) context data flow diagram (DFD) B) thorough descriptions of each DFD component C) DFDs of the current logical system D) state-transition diagram
Extensible markup language
XML. An HTML extension that enables the meaning of words phrases or numbers to be defined
data mining
____ ________ Looks for meaningful data patterns and relationships in large amountsof data
physical storage
_______ _______ is strictly hardware-related because it involves the process of reading and writing binary data to physical media such as a hard drive, CD-ROM, or network-based storage device
logical storage
_______ _______ refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored
Level-0 diagram
a DFD that represents a system's major processes, data flows and data stores at a high level of detail
Level-0 diagram
a DFD that represents a system's major processes, data flows, and data stores at a high level of detail
service desk
a centralized resource staffed by IT pros that provides users with the support they need to do their jobs - help desk
build or buy
a choice between developing in house software and purchasing software, often called a build or buy, or make or buy, decision
three-layer architecture
a client/server architecture that divides an application into view layer, business logic layer, and data layer
database management system
a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data
server
a computer or group of computers that manages shared resources such as file systems, databases, and Web sites, and enables users and other computers to access those resources over a network
payback analysis
a determination of how long it takes an info system to pay for itself through reduced costs and increased benefits
software requirements specification
a document that contains the requirements for the new system, describes the alteratives that were considered, and makes a specific recommendation to management. it is the end product of the system analysis phase.
information center
a facility that supports users by training them on application software. user support specialists answer questions, troubleshoot problems, and serve as a clearinghouse for user problems and solutions
application service provider
a firm that delivers a software application, or access to an application, by charging a usage or subscription fee
value added reseller
a firm that enhances a commercial package by adding customer features configuring it for a particular industry
service provider
a firm that offers outsourcing solutions - application service providers and internet business services
radio buttons
a group of choices from which the user selects only one; the system then automatically turns off all other buttons in the group
evaluation and selection team
a group of people involved in selecting hardware and software. the group includes systems analysts and users. a team approach ensures that critical factors are not overlooked and that a sound choice is made
internet backbone network
a high-capacity and high-speed computer network that carries a large amounts of internet traffic across regions, countries, and continents
SQL (structured query language)
a language that allows client workstations to communicate with servers and mainframe cmputers
software license
a legal agreement that gives users the right to use the software under certain terms and conditions
individual matching
a matching technique in which each participant is matched with another participant on selected variables
yoked control
a matching technique that matches participants on the basis of the temporal sequence of administering an event
Decision table
a matrix representation of the logic of a decision; it specifies the possible conditions for the decision and the resulting actions
benchmark
a measure of time a package takes to process a certain number of transactions
think-aloud technique
a method that requires participants to verbalize their thoughts as they are performing the experiment
blind technique
a method whereby knowledge of each research participant's treatment condition is kept from the experimenter
partial blind technique
a method whereby knowledge of each research participant's treatment condition is kept from the experimenter through as many stages of the experiment as possible
software as a service
a model of software delivery in which functionality is delivered on demand as a network accessible service, rather than as a traditional software application that is downloaded and installed on the customer's computer
network program
a model that shows how locations and hardware components are inter-connected with network devices and wiring
Data flow diagram (DFD)
a picture of the movement of data between external entities and the processes and data stores within a system
Hypertext Transfer Protocol (HTTP)
a protocol that defines the format and content of requests for Web documents and related data communication
text box
a rectangular box that accepts text typed on a keyboard or recognized from speech input
web 2.0
a second generation of the web that enables people to collaborate, interact, and share info much more dynamically, based on continually available user applications rather than by HTML webpages. interaction experience is a hallmark of web 2.0
order effect
a sequencing effect arising from the order in which the treatment conditions are administered to participants
carryover effect
a sequencing effect that occurs when performance in one treatment condition affects performance in another treatment condition
transaction model
a service model that charges a variable fee for an application based on the volume of transactions or operations performed by the application - usage model
protocol
a set of languages, rules, and procedures that ensure accurate and efficient data exchange and coordination among hardware and software components
repeating group
a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values
Protocol
a set of rules and procedures for control of communications in a network
local area network (LAN)
a small computer network typically spanning a single home, small office, or one floor of a building.
software as a service (SaaS)
a software delivery model similar to a utility, in which application software is accessed via the internet without locally installed programs
horizontal application
a software package that can be used by many different types of organizations
vertical application
a software package that has been developed to handle information for a specific type of business
maintenance agreement
a specification of the conditions, charges, and time frame for users to contact the vendor for assistance when they have system problems or questions
third normal form
a table design is in _____ ______ ____ if every non-key field depends on the key, the whole key, and nothing but the key
second normal form
a table design is in ______ ______ _____ if it is in 1NF and if all fields that are not part of the primary key are functionally dependent on the entire primary key
unnormalized
a table design that contains a repeating group is called ____________
combo box
a text box that contains a predefined list of acceptable entries but permits the user to enter a new value when the list doesn't contain the desired value
differential carryover effect
a treatment condition affects participants' performance in a later condition in one way and in another when followed by a different condition
service oriented architecture
a way of engineering systems in which reusable business functionality is provided by services through well defined interfaces.
Unified Modeling Language
a widely used method of visualizing and documenting software systems design
request for proposal
a written list of features and specifications given to prospective vendors before a specific product or package has been selected
one-to-many relationship
abbreviated 1:M, exists when one occurrence of the first entity can relate to many instances of the second entity, but each instance of the second entity can associate with only one instance of the first entity
many-to-many relationship
abbreviated M:N, exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity
business logic layer
also known as the domain layer, the part of a three-layer architecture that contains the programs that implement the business rules and processes
Extensible Markup Language (XML)
an HTML extension that enables the meaning of words, phrases, or numbers to be defined
entity
an ______is a person, place, thing, or event for which data is collected and maintained
open database connectivity
an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data
in house software
an information center or help desk within the IT department responsible for providing user support and offering services such as hotline assistance, training, and guidance to users who need technical help
screen generator
an interactive tool that helps design a custom interface, create screen forms, and handle data entry format and procedures - also called form painter
World Wide Web (WWW)
an interconnected set of resources accessed via the internet
postexperimental inquiry
an interview of the participant after the experiment is over
Functional decompoition
an iterative process of breaking the description of a system down into finer and finer detail, which creates a set of charts in which one process on a given chart is explained in greater detail on another chart
newsgroup
an online discussion on a particular topic, where people meet, offer support, and exchange ideas - also called forum
app
application software that is installed on the storage device of a computer or cell phone
Web-based application
application software that uses a Web browser as the user interface, has a URL for application access, uses a Web server and server-side software components, and uses Web standards for communication between Web browser and server
Enterprise Software
applications that address the needs of multiple users throughout an organization or work group
report generator
atool for designing formatted reports rapidly - also called report writer
The design phase of the SDLC creates a(n) _____.
blueprint for the future system
XML tags
character sequences (such as and ) that define the beginning, end, and meaning of the text that appears between them
software vendor
company that develops software for sale
Routers
computing devices that connect networks and exchange data between them
table (file)
contains a set of related records that store data about a specific entity
usability
degree to which a system is easy to learn and use
cardinality
describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity
user-centered design
design techniques that embody the view that theuser interface is the entire system
complete counterbalancing
enumerating all possible sequences and requriing different groups of participants to take each of the sequences
incomplete counterbalancing
enumerating fewer than all possible sequences and requiring different groups of participants to take each of the sequences
Extensible Markup Language (XML)
extension of HTML that embeds self-defining data structures within textual Messages
turnaround documents
external outputs that includes one or more parts intended to be returned with new data or information
human-computer interaction (HCI)
field of study concerned with the efficiency and effectiveness of user interfaces vis-à-vis computer systems, human-oriented input and output technology, and psychological aspects of user interfaces
Software as a Service (SaaS)
firm subscribes to a third-party software and receives a service that is delivered online
When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.
fixed fee model
In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
foreign key
sacrifice groups
groups of participants who are stopped and interviewed at different stages of the experiment
The layer that keeps the user interface implementation separate from the application or problem domain classes is the _____ layer.
human-computer interaction
Uniform Resources Locator (URL)
identifier of a Web resource containing a protocol header, server name or address, and resource name
method of difference
if groups are equivalent every variable except for one, then that one variable is the cause of the difference between the groups
Indifferent condition
in a decision table, a condition whose value does not affect which actions are taken for two or more rules
Indifferent condition
in a decision table, a condition whose value does not affect which actions are taken for two or more rules.
There are three methods to create a new system. They are ___.
in-house custom application, buy a package, and external vender
The following are all classic design mistakes EXCEPT _____.
including design time
record (tuple)
is a set of related fields that describes one instance, or occurrence, of an entity, such as one customer, one order, or one product
The following are all strengths of a custom development design strategy EXCEPT ___.
lower risk
database administrator
manages a DBMS, assesses overall requirements and maintains the database for the benefit of the entire organization rather than a single department or user
Server
manages shared resources & enables users and other computers access to these resources
A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.
manipulation
scalability
means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise
document metaphor
metaphor in which data is visually represented as paper pages or forms
direct manipulation metaphor
metaphor in which objects on a display are manipulated to look like physical objects (pictures) or graphic symbols that represent them (icons)
desktop metaphor
metaphor in which the visual display is organized into distinct regions, with a large empty workspace in the middle and a collection of tool icons around the perimeter
dialog metaphor
metaphor in which user and computer accomplish a task by engaging in a conversation or dialog via text, voice, or tools such as labeled buttons
To bridge the gap between a database and the Web and enable data to be viewed and updated, it is necessary to use ____, which is software that integrates different applications and allows them to exchange data.
middleware
Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.
middleware
To avoid the classic design mistake of "silver bullet syndrome," the analyst should ___.
not use a design tool that appears too good to be true
concurrent probing
obtaining a participant's perceptions of the experiment after completion of each trial
Internet Backbone
owned by governments & telecom companies
The ___ layer addresses how the software will execute on specific computers and networks.
physical architecture
In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
primary key
user application
programs that utilize standard business software, such as Microsoft office, which has been configured in a specific manner to enhance user productivity
A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.
query language
random assignment
randomly assigning a sample of individuals to a specific number of comparison groups
audit log files
record details of all accesses and changes to the file or database and can be used to recover changes made since the last backup
In an entity-relationship diagram, entities are represented as ____.
rectangles
One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.
referential
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.
schema
virtual private network (VPN)
secure communication over the Internet using technologies that reliably identify senders and recipients and encrypt network messages sent among them.
mobile device
smartphones, tablets, and other computing devices that are not permanently tethered to a desk
table design
specifies the fields and identifies the primary key in a particular table or file
Amdahl's Law
systems speed is determined by its slowest component or the last mile
hyperlink
the URL of one Web resource is embedded within another Web resource
interoperability
the ability of a component or system to interact with other components or systems
The decision on which design strategy to use depends on ___.
the expertise of the project manager, how unique the business need is, the amount of in-house experience, the urgency of the project
DFD consistency
the extent to which information contained on one level of a set of nested DFD's is also included on other levels
Source/sink
the origin and/or destination of data; sometimes referred to as external entities
business process outsourcing
the outsourcing of a basic business process
Condition stubs
the part of a decision table that lists the conditions relevant to the decision
Action stub
the part of a decision table that specifies which actions are to be followed for a given set of conditions
view layer
the part of a three-layer architecture that contains the user interface
global outsourcing
the practice of shifting IT development, support, and operations to other countries
offshore outsourcing
the practice of shifting IT development, support, and operations to other countries
automation
the technique of totally automating the experimental procedures so that no experimenter participant interaction is required
absolute date
the total number of days from some specific base date
net present value
the total value of the benefits minus the costs, with both the costs and benefits being adjusted to relflect the point in time at which they occur
outsourcing
the transfer of info systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temp or long term basis
Attribute Value
the value held in a single table cell.
What is the primary objective of the evaluation and selection team?
to eliminate system alternatives that will not meet requirements, rank the alternatives that are feasible, and present the viable alternatives to management for a final decision
alphabetic codes
use alphabet letters to distinguish one item from another based on a category, an abbreviation, or an easy to remember value, called a mnemonic code
use case
use case summarizes an event and has a similar format to process specifications
request for quotation
used to obtain a price quote or bid on a specific product or package
A ___________ utilizes standard business software, such as word or excel, which has been configured in a specific manner to enhance user productivity
user application
drill down
user-interface design technique that enables a user to select summary information and view supporting detail
visibility
when a control is visible so that users know it is available, the control providing immediate feedback to indicate that it is responding to the user
peer-to-peer connection
when independent computers communicate and share resources without the need of a centralized server computer
differential influence
when the influence of an extraneous variable is different for the various groups
Transmission Control Protocol (TCP)
works at both ends of internet communications to ensure perfect copies of messages are sent