SYSTEMS ANALYSIS & DESIGN Chapter 9

Ace your homework & exams now with Quizwiz!

Gartner, Inc. predicts that by 2015 SaaS revenue will grow to ____.

$22.1 billion

Evaluate the alternatives

- Existing users - Application testing - Benchmarking

Microsoft's ____ is one of the major Web-based development environments.

.NET

Computing Devices

1. server 2. personal computing devices or clients (desktops, laptops tablets)

Text box

A box that accepts text from a keyboard or speech input

C) data store

A computer-based file containing employee information is represented on a data flow diagram as a: A) data flow B) source C) data store D) process

Data Structures

A framework for organizing, storing and managing data. Consists of files or tables that interact in different ways

Simple Message

A message that transfers control from the sender to the recipient without describing the details of the communication.

Entity

A person, place, thing or event for which data is collected and maintained

Data flow diagram (DFD)

A picture of the movement of data between external entities and the processes and data stores within a system.

Binary relationship

A relationship between instances of two entity types. This is the most common type of relationship encountered in data modeling.

Homonym

A single attribute name that is used for two or more different attributes.

Field

A single characteristic or fact about an entity, also called an attribute.

Synchronous message

A type of message in which the caller has to wait for the receiving object to finish executing the called operation before it can resume execution itself.

eBay employs the ___ auction mechanism. A. Forward B. Reverse C. Dutch D. Proprietary eBay

A. Forward

Web-based Application

An application that uses a browser for the user interface.

Optional attribute

An attribute that may not have a value for every entity instance.

Multivalued attribute

An attribute that may take on more than one value for each entity instance.

False

Application software that usually executes with a browser is often just called an "App".​

Both the sellers and buyers are business organizations. *Represents the vast majority of e-commerce

B2B

Outsourcing a basic business process is often called ____.

BPO

A) decouples the processe

By placing a data store between two processes, this: A) decouples the processes B) enables store and forward capabilities C) enhances the flow of data between the processes D) structures the processes

derivation codes

Combine data from different item attributes, or characteristics

Software requirements specification

Contains the requirements for the new system, describes the alternatives that were considered and makes a specific recommendation to management

Data administrator

DA. The person in charge of the structure and integrity of the data

A practice of registrants using the five-day "grace period" at the beginning of a domain registration to profit from pay-per-click advertising.

Domain Tasting

What are some common ways to evaluate the alternatives?

Existing Users Application testing Benchmarking

Cybersquatting refers to the tampering of existing Web sites and selling unrelated products. True False

False

Object-oriented systems can send messages to a legacy system through the use of a package wrapper.

False

C) balancing

If a data flow appears on the context diagram and is also represented at level-0, this would be referred to as: A) leveling B) flow conservation C) balancing D) matching

C) complete

If your DFD contains data flows that do not lead anywhere, it is not: A) gap proof B) a primitive diagram C) complete D) consistent

True

In a client/server configuration, it is possible for a single software component to be both client and server.​

Domain Layer

In a three-layer architecture, another name for the business logic layer is what?

What are some common financial analysis tools?

Payback analysis Return on investment Net present value

Summary reports

Reports that summarize detail or recap periodic activity

Storyboarding

Sequence of sketches of the display screen during a dialogue

What are the benefits of user applications?

Simple low-cost solutions

____ reduces the customer's need for software maintenance, operation, and support.

Software as a Service

Disjoint rule

Specifies that if an entity instance of the supertype is a member of one subtype, it cannot simultaneously be a member of any other subtype.

True

The Internet can be thought of as the network of networks.​

Logical design

The definition of an information system's functions and features, and the relationships among its components

Primitive DFD

The lowest level of decomposition for a DFD

Primitive DFD

The lowest level of decomposition for a DFD.

D) primitive diagram

The lowest level of decomposition for a data flow diagram is called the: A) context diagram B) level-0 diagram C) level-1 diagram D) primitive diagram

Parent process

The process on Diagram 0.

Activation

The time period during which an object performs an operation.

Net Present Value (NPV)

The total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur

Net present value (NPV)

The total value of the benefits minus the total value of the costs, with both the costs and benefits being adjusted to reflect the point in time at which they occur

Preconditions

Things that must be true before a use case can start.

Payback Analysis

To determine how long it takes an information system to pay for itself through reduced costs and increased benefits

Affordance

When the appearance of a specific control suggest it's functions

The set of world wide resources that are available over the Internet.

When you use the term "Web", what is the correct definition?​

D) All of the above.

Which of the following is a true statement regarding sources/sinks? A) Sources/sinks are always outside the information system and define the boundaries of the system. B) Data must originate outside a system from one or more sources. C) The system must produce information to one or more sinks. D) All of the above.

B) A data flow can go directly back to the same process it leaves.

Which of the following is not a true statement regarding data flows? A) A fork in a data flow means that exactly the same data goes from a common location to two or more different processes, data stores, or sources/sinks. B) A data flow can go directly back to the same process it leaves. C) A data flow has a noun phrase label. D) A data flow has only one direction of flow between symbols.

Www

World Wide Web. An interconnected set a resources accessed via the Internet

physical design

a plan for the actual implementation of the system

fixed fee model

a service model that charges a set fee based on a specified level of service and user support

subscription model

a service model that charges a variable fee for an application based on the number of users or workstations that have access to the application

logical record

a set of field values that describes a single person, place, thing, or event

first normal form

a table is in _____ ______ ____ if it does not contain a repeating group

evaluation model

a technique that uses a common yardstick to measure and compare vendor ratings

counterbalancing

a technique used to control for sequencing effects

list box

a text box that contains a list of predefined data values

cloud computing

an online software and data environment in which applications and services are accessed and used through an internet connection rather than on a local computer

managed hosting

an operation is managed by the outside firm, or host. another term for internet business service

retrospective verbal report

an oral report in which the participant retrospectively recalls aspects of the experiment

Context diagram

an overview of an organizational system that shows the system boundaries, external entities that interact with the system, and the major information flows between the entities and the system.

metaphors

analogies between features of the user interface and aspects of physical reality that users are familiar with

In the accompanying figure, any field that could serve as a primary key is called a ____.

candidate key

child diagram

cannot produce output or receive input that the parent process does not also produce or receive.

category codes

codes that identify a group of related items

database manipulation language

controls database operations, including storing, retrieving, updating, and deleting data

java database connectivity

enables java applications to exchange data with any database that uses SQL statements and is JDBC- compliant

deception

giving the participant a bogus rationale for the experiment

system interfaces

inputs or outputs that require minimal human intervention

derived element

it must be created by a process and should be output from at least one process into which it is not input. . Elements that are not keyed but are rather the result of a calculation or logical operation are called

An IBS solution is attractive to customers because...

it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet

double-blind placebo method

neither the experimenter nor the research participant is aware of the treatment condition administered to the participant

Any field that is not a primary key or a candidate key is called a ____ key.

nonkey

Cloud Computing

replacing computing with services provided over the internet

external outputs

reports or other outputs produced for use by people outside the organization

internal outputs

reports or other outputs produced for use within the organization

detailed reports

reports that contain specific information on business transactions

exception reports

reports that provide details or summary information about transactions or operating results that fall outside a predefined normal range of values

summary reports

reports that summarize detail or recap periodic activity

executive reports

reports used by highlevel managers to assess overall organizational health and performance

Internet Protocol (IP)

routing protocol in charge of forwarding packets on the internet

storyboarding

sequence of sketches of the display screen during a dialog

randomized counterbalancing

sequence order is randomly determined for each individual

A firm that offers outsourcing solutions is called a ____ provider.

service

Some ____ providers concentrate on specific software applications; others offer resources like order processing and customer billing.

service

When companies acquire Web-based software as a(n) ____, they can limit in-house involvement to a minimum.

service

internet business services

services that provide web based support for transactions such as order processing, billing, and crm

check boxes

similar to radio buttons, but the user can select multiple items within the group

Local area network (LAN)

small network for single site

assistive technologies

software (such as text-to-speech and voice-recognition utilities) that adapts user interfaces to the special needs of persons with disabilities

Web service

software function or related set of functions that can be executed via Web standards

middleware

software that connects dissimilar applications and enables them to communicate and exchange data

middleware

software that integrates different applications and allows them to exchange data and interpret client requests in HTML form; then translate the requests into commands that the database can execute

Open Source Software (OSS)

software that is free and where anyone can look at and potentially modify the code

software package

software that is purchased or leased from another firm

application software

software that performs user or business-specific tasks and is typically constructed as an app or Web-based application.

system software

software, such as operating systems and Web server software, that works behind the scenes to support application software and control or interact with hardware or software resources

audit fields

special fields within data records to provide additional control or security information

make or buy

the choice between developing in house software and purchasing software often is called a make or buy, or build or buy, decision

logical design

the definition of an information system's functions and features, and the relationships among its components

matching variable

the extraneous variable used in matching

economy of scale

the inherent efficiency of high-volume processing on larger computers is called

data layer

the part of a three-layer architecture that interacts with the data

What is a fixed fee model?

uses a set fee based on a specified level of service and user support

Hybrid TCP / IP-OSI Architecture

- Layer 5 : Application (HTTP) - Layer 4 : Transport (TCP) - Layer 3 : Internet (IP) - Layer 2 : Data Link - Layer 1 : Physical

Connections Architecture

- Layer 5 : How two applications work with each other - Layer 4 : End-to-End communications between the two end hosts - Layer 3 : Route through a routed network (internet) - Layer 2 : Data Link through a single switched network - Layer 1 : Physical link between adjacent devices

Two Major Protocols

1. Ethernet 2. Tranmission Control Protocol / Internet Protocol

Internet Protocol Suite consists of :

1. Transmission Control Protocol (TCP) 2. Internet Protocol (IP)

Level-n diagram

A DFD that is the result of n nested decompositions from a process on a level-0 diagram

data structure

A ____ _________ Consists of files or tables that interact in various ways

Form

A business document that contains some predefined data and may include some areas where additional data are to be filled in. An instance of a form is typically based on one database record.

Service desk

A centralized resource started by IT professionals that provides users with the support they need to do their jobs. Also called a help desk

Build or buy

A choice between developing in-house software and purchasing software

Data type

A coding scheme recognized by system software for representing organizational data.

Heterogeneous Distributed Database

A database distributed across multiple locations with different DBMSs and with local access allowed without global schema coordination

Network diagram

A diagram that shows how hardware components are interconnected with devices and cabling is called a what?

What is a request for proposal?

A document that describes the company, lists the IT services needed or products needed, and specifies the features required

Value-Added Reseller (VAR)

A firm that enhances a commercial package by adding custom features and configuring it for a particular industry

Evaluation and selection team

A group of people involved in selecting hardware and software. The group includes systems analysts and users. A team approach ensures that critical factors are not overlooked and that a sound choice is made

Decision table

A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions.

False

A network diagram and a location diagram show basically the same information but in a different format.

C) verb phrase label

A process has a: A) pronoun label B) adjective label C) verb phrase label D) noun phrase label

Third Normal Form (3NF)

A restriction that a table is in 2NF and that no non-key attribute is functionally dependent on any other non-key attribute

Subscription model (outsourcing)

A variable fee based on the number of users or workstations that have access to the application

Triggering operation (trigger)

An assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete; also called a trigger.

Relationship

An association between the instance of one or more entity types that is of interest to the organization.

Candidate Key

An attribute or set of attributes that are unique identifiers and could serve as the primary key

Derived attribute

An attribute whose value can be computed from related attribute values.

Database (DB)

An integrated collection of stored data that is centrally managed and controlled

Functional decomposition

An iterative process of breaking the description of a system down into finer and finer detail, which creates a set of charts in which one process on a given chart is explained in greater detail on another chart.

Functional decomposition

An iterative process of breaking the description of a system down into finer and finer detail, which creates a set of charts is explained in greater detail on another chart

Forum

An online discussion on a particular topic, where people meet, offer support, and exchange ideas

The sellers are organizations and the buyers are individuals

B2C

Software vendors

Companies that develop software for sale

Metadata

Data about data, also called schema data

significant digit codes

Distinguish items by using a series of subgroups of digits Postal codes are significant digit codes

Trigger

Event that initiates a use case.

In order to be considered as an e-commerce Web site, the site must sell some tangible good. True False

False

The stock market is the only area of business that has experienced fraud on the Internet. True False

False

B) violation of consistency

Having a level-1 diagram with no level-0 diagram is an example of a: A) violation of completeness B) violation of consistency C) gap D) structuring violation

Human-Computer interaction

Hci. A field of study concerned with the efficiency and effectiveness of user interfaces via computer systems, human-oriented input and output technology, and psychological aspects of the user interface.

A) indifferent condition

In a decision table, a condition whose value does not affect which actions are taken for two or more rules is referred to as a(n): A) indifferent condition B) static condition C) fixed condition D) flexible condition

Indifferent condition

In a decision table, a condition whose value does not affect which actions are taken for two or more rules.

Gateway

In business modelling, a decision point.

C) process

In the Gane and Sarson model, a rectangle with rounded corners on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

What are two major web-based development environments?

Microsoft's .net IBM's WebSphere

In what type of e-commerce business model do customers decide how much they want to pay

Name-your-own-price

Row (Tuple) (Record)

One horizontal group of data attribute values in a table

Partitioning

Processes are put together and automated if analysis dictates they do so. Manual processes are put together, and automated processes can also be paired with each other.

Which one in the following is NOT a factor for selecting a design strategy?

Software quality

Child Diagram

The diagram that results from exploding the process on Diagram 0 (called the parent process).

DFD completeness

The extent to which all necessary components of a DFD have been included and fully described.

Offshore outsourcing, or global outsourcing, refers to what?

The practice of shifting IT development, support, and operations to other countries

Denormalization

The process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields.

entity-relationship diagram

a model that shows the logical relationships and interaction among system entities

concurrent verbal report

a participant's oral report of the experiment, which is obtained as the experiment is being performed

return on investment

a percentage rate that measures profitability by comparing the total net benefits received from a project to the total costs

Hypertext Markup Language (HTML)

a protocol that defines the structure and content of a Web page

forum

an online discussion on a particular topic

HTML (hypertext markup language)

protocol for the structure of content of a web page

An advantage of purchasing packaged software is that the organization can _____.

save money on the purchase

base element

that is initially keyed into the system, such as a customer name, address, or city and must be stored in files

XML (extensible markup language)

an extension of HTML that enables defining semantics of tags

data store

are created for each different data entity being stored

Exchanges have many

buyers and sellers

Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology.

cloud

abbreviation codes

codes that are alphabetic abreviations (MIA for Miami)

action codes

codes that indicate what action is to be taken with an associated item

cipher codes

codes that use a keyword to encode a number

When a primary key combines two or more fields, it is called a ____ key.

composite

statistical control

control of measured extraneous variables during data analysis

randomization

control technique that equates groups of participants by ensuring every member an equal chance of being assigned to any group

The ___ layer addresses the issues involving the persistence of the objects contained in the system.

data management

Which one in the following is NOT a layer of a software architecture.

data structure

Sampling error

error between a sample statistic and it's coresspnding population paramiter

field (attribute)

is a single characteristic or fact about an entity

Domain name service

is hierarchical system of name-servers that maps host-domain name combinations to IP addresses

During the systems design phase, ____ fields are used to organize, access, and maintain data structures

key

Internet Backbone

made of fiber optic lines, is very fast

unicode

more recent coding standard that uses two bytes per character rather than one. Supports virtually all languages and has become a global standard

To avoid the classic design mistake of "feature creep," the analyst should ___.

move proposed changes into future versions

An electronic mall represents ____________.

multiple stores

Data Flow Diagrams

Graphically characterize data processes and flows in a business system. Depicts: - System inputs - Processes - Outputs

A gift card is a(n) ____________.

stored value money card

A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.

structure

When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.

subscription model

user interfaces

system interfaces that directly involve a system user

experimenter effects

the biasing influence that can be exerted by the experimenter

Rules

the part of a decision table that specifies which actions are to be followed for a given set of conditions

normalization

the process of creating table designs by assigning specific fields or attributes to each table in the database

Gap analysis

the process of discovering discrepancies between two or more sets of DFD's or discrepancies within a single DFD.

C) process modeling

Graphically representing the functions, or processes, which capture, manipulate, store, and distribute data between a system and its environment and between components within a system refers to: A) data modeling B) flow charting C) process modeling D) transition modeling

In what type of e-commerce business model do small buyers aggregate demand to get a large volume; then the group conducts tendering or negotiates a lower price

Group purchasing

C) numbering

Guidelines for drawing DFDs include the following except for: A) completeness B) consistency C) numbering considerations D) timing considerations

Human-interface objects

HIOs. Icons and other objects on a screen that can be manipulated by the user and cause some action to occur

Hypertext markup language

HTML. A protocol that defines the structure and content of a web page

cardinality notation

uses special symbols to represent the relationship

matching

using any of a variety of techniques for equating participants on one or more variables

affordance

when the appearance of a specific control suggests its function

Hypertext transfer protocol

HTTP. A protocol that defines the format and content of requests for web documents and related data communication

Internet backbone Network

High capacity and high speed computer network that carries large amounts of internet traffic across regions, countries, and continents

Some firms offer ____, which provide powerful Web-based support for transactions such as order processing, billing, and customer relationship management.

IBS

What should be done during the evaluate the information systems requirements step?

Identify key features Consider network and related issues Estimate volume and future growth Specify hardware, software, or personnel constraints Prepare a request for proposal or quotation

B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule

If Rules 2, 4, and 6 are indifferent conditions, then: A) Rules 2, 4, and 6 are eliminated from the matrix B) the number of rules is reduced by condensing Rules 2, 4, and 6 into one rule C) Rules 2, 4, and 6 will result in at least two additional rules being included in the matrix D) Rules 2, 4, and 6 have no impact on the interpretation of the matrix

A) appear on the context diagram

If an input from a source appears at level-0, it must: A) appear on the context diagram B) be connected to a data flow C) be connected to a sink D) be connected to a data store

Use case

In UML, a sequence of transactions in a system; the purpose is to produce something of value to an actor in the system; focuses on what the system does rather than on how it does it. The use case model is based on the interactions and relationships of individual use cases. In a use case, an actor using the system initiates an event that begins a related series of interactions in the system.

False

In a client/server configuration the term "server" refers to the central computer equipment that houses the core resources.​

B) gateway

In business process modeling, a decision point is called a(n): A) activity B) gateway C) terminal D) loop

A) swimlane

In business process modeling, a way to encapsulate a process is called a(n): A) swimlane B) fastlane C) lane D) none of the above

Event

In business process modelling, a trigger that initiates the start of a process.

Pool

In business process modelling, a way to encapsulate a process that has two or more participants.

Swimlane

In business process modelling, a way to visually encapsulate a process.

Activity

In business process modelling, an action that must take place for a process to be completed.

Flow

In business process modelling, it shows the sequence of action in a process.

A) data store

In the Gane and Sarson model, a rectangle that is missing its right vertical sides on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

The company's IT department makes, builds, and develops _______________ A ____________ is obtained from a vendor or application service provider

In-house software Software package

User interface

Includes screens, commands, controls, and features that enable users to interact more effectively with an application

What is user interface?

Includes screens, commands, controls, and features that enable users to interact more effectively with the application

A logical data flow diagram:

Is a model of how the business operates.

What are the seven steps for a cost-benefit checklist?

List each strategy being considered Identify costs and benefits for each Consider future growth Include support costs for hardware and software Analyze various software licensing options, including fixed fees and formulas Apply the financial analysis tools to each alternative Study results and prepare report

A ___________ defines what must take place, not how it will be accomplished A ____________ is like a set of blueprints for the actual construction of a building

Logical Physical

Why do companies purchase software?

Lower Costs Requires less time to implement Proven reliability and performance benchmarks Requires less technical development staff Future upgrades are provided by the vendor Input from other companies

Continuity

Maintaining a certain level of consistency over time across multiple releases

The choice between developing versus purchasing software is often called what?

Make or buy, build or buy, decision

Benchmark

Measures the time a package takes to process a certain number of transactions.

What type of e-commerce business model allows only members to use the services provided

Membership

Document metaphor

Metaphor in which data is visually represented as paper pages or forms

Direct manipulation metaphor

Metaphor in which objects on a display are manipulated to look like physical objects or graphic symbols that represent them

Desktop metaphor

Metaphor in which the visual display is organized into distinct regions with a large empty work space in the middle and a collection of tool icons around the perimeter

Dialogue metaphor

Metaphor in which user and computer accomplish a task by engaging in a conversation or dialogue via text voice or tools such as labeled buttons

____ promotes a broader vision of Software + Services, which refers to the company's strategy for cloud computing -- integrating software applications, platforms, and infrastructure.

Microsoft

Refers to e-commerce that is conducted in a wireless environment.

Mobile Commerce

What are the benefits of application software?

More powerful Flexible User friendly

Request for Quotation

More specific than a RFP. Only price quotations or bids are needed, since the specific product or service is already known.

A process in which a company integrates its offline and online channels.

Multichanneling

sequence codes

Numbers or letters assigned in a specific order Contain no additional information other than an indication of order of entry into the system

____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.

ODBC

D) both A and B

On a data flow diagram, you may: A) repeat data stores B) repeat sources/sinks C) repeat processes D) both A and B

Attribute (Field) (Column)

One vertical group of data attribute values in a table

In what type of e-commerce business model do companies run auctions of various types on the internet

Online auctions

In what type of e-commerce business model do manufacturers or retailers sell directly to customers.

Online direct marketing

Oracle Corporation offers a service called ____, which provides e-business applications on a fixed fee basis.

Oracle On Demand

Involves finding the product to be shipped; packaging the product; arrange for speedy delivery to the customer; and handle the return of unwanted or defective products.

Order fulfillment

What are some service provider functions?

Order processing Customer Billing Enterprise wide software solutions such as accounting, inventory control, manufacturing

____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.

Outsourcing

______________ determines how long it takes an information system to pay for itself through reduced costs and increased benefits _____________ is a percentage rate that compares the total net benefits received from a project to the total costs of the project _____________ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur

Payback analysis Return on investment net present value

Stakeholder

People who have a vested interest in the system being developed.

A form of e-cash that enables two individuals or an individual and a business to transfer funds without using a credit card.

Person-to-person Payments

Level

Perspective from which a use case description is written, typically ranging from high level to extremely detailed.

Level

Perspective from which a use case description is written, typically ranging from high-level to extremely detailed.

Appears underneath the active window

Pop-under Ad

Appears in front of the current browser window.

Pop-up Ad

Internet Business Services (IBS)

Powerful web-based support for transactions such as order processing, billing and customer relationship management

User application

Programs that utilize standard business software, such as Microsoft office, which has been configured in a specific manner to enhance user productivity

Electronic marketplace in which there are many sellers and many buyers, and entry is open to all; it is frequently owned and operated by a third party

Public Exchange

What are three ways to customize a software package?

Purchase a basic package that vendors will customize to suit the project's needs Negotiate directly with the software vendor to make enhancements to meet the project's needs by paying for changes Purchase the package and make project-specific modifications

Traditional Development

- Compatibility issues influence systems design - Systems are designed to run on local and wide area company networks - Systems often utilize Internet links and resources, but web-based features are considered to be enhancements rather than core elements - Development is either in-house development, purchase of a software package with possible modification or use of outside consultants - Scalability can be effected by network limitations and constraints -Many applications require substantial desktop computing power and resources - Security issues are usually less complex

DFD Levels

- Data flow diagrams are built in layers - The top level is the context level - Each process may explode to a lower level - The lower level diagram number is the same as the parent process number - Processes that do not create a child diagram are called primitive

Evaluate Information System requirements

- Identify key features - Consider network and web-related issues - Estimate volume and future growth - Specify hardware, software or personnel constraints - Prepare a RFQ or RFP

Rules for DFDs

- Must have one process - Must not be any freestanding objects - A process must have input/output - A data store must be connected to at least one process. - External entities should not be connected to one another.

Web-Based Development

- Systems are developed and delivered in an Internet-based framework such as .NET - Internet-based development treats the web as the platform and not just the communication channel - Web-based systems are easily scalable and can run on multiple hardware environments - Large firms tend to deploy web based systems as enterprise wide software solutions - Software application is less dependent on desktop power and resources - SAAS limits in-house involvement and vendors can install, configure and maintain the system - Includes additional layers called middleware to communicate with existing software and legacy systems - More complex security issues

Diagram 0

- The explosion of the context diagram - May include up to nine processes - Each process is numbered - Major data stores and all external entities are included - Start with the data flow from an entity on the input side - Work backward from an output data flow - Examine the data flow to or from a data store - Analyze a well-defined process - Take note of any fuzzy areas

Three-Layer Architecture

-client / server architecture with application divided into view layer, logic layer, and data layer 1. view layer - user interface 2. logic layer - program logic to implement the functions 3. data layer - functions to access the data

DFD development process

1. Make a list of business activities and use it to determine various - External entities - Data flows - Processes - Data stores 2. Create a context diagram that shows the external entities and data flows to and from the system. Do not show any detailed processes or data stores. 3. Draw Diagram 0, the next level. Show processes, but keep them general. Show data stores at this level. 4. Create a child diagram for each of the processes in Diagram 0. 5. Check for errors and make sure the labels you assign to each process and data flow are meaningful. 6. Develop a physical data flow diagram from the logical data flow diagram. Distinguish between manual and automated processes, describe actual files and reports by name, and ass controls to indicate when processes are complete or errors occur. 7. Partition the physical data flow diagram by separating or grouping parts of the diagram in order to facilitate programming and implementation.

Eight Types of Web sites for Advertising

1. Portals: most popular; best for reach but not targeting 2. Search: second largest reach, high advertising value 3. Commerce: high reach, not conducive to advertising 4. News/weather/sports: poor target ability 5. Entertainment: large reach, strong target ability 6. Community: emphasize being a part of something; good for specific advertising 7. Communications: not good for branding; low target ability 8. Games: good for very specific types of advertising

Customizing a software package

1. Purchase a basic package that vendors will customize to suit the project's needs 2. Negotiate directly with the software vendor to make enhancements 3. Purchase the package and make project-specific modifications if the software license permits it

Reasons for in house development:

1. Satisfy unique business requirements 2. Minimize changes in business procedures and policies 3. Meet constraints of existing systems & technology 4. Develop internal resources and capabilities 5. Satisfy unique security requirements

The three types of Electronic Exchanges

1. Vertical Exchanges: connect byers and sellers in a given industry 2. Horizontal Exchanges: connect buyers and sellers across many industries and are used mainly for MRO materials 3. Functional Exchanges: needed services such as temporary help or extra office space are traded on an as-needed basis

steps in the software acquisition process

1. eval the info systems requirements 2. identify potential vendors or outsourcing options 3.evaluate the alternatives 4. perform cost benefit analysis 5. prepare a recommendation 6. implement the solution

B) has only inputs

A black hole is one that: A) has only inputs B) has only outputs C) has not been exploded to show enough detail D) has insufficient inputs to produce the associated processes

Report

A business document that contains only predefined data; it is a passive document used solely for reading or viewing. A report typically contains data from many unrelated records or transactions.

Identifier

A candidate key that has been selected as the unique, identifying characteristic for an entity type.

Combo box

A combination text box and list box that displays a predefined list but also allows data entry

foreign key

A common field that exists in more than one table and can be used to form a relationship, or link, between the tables

crow's foot notation

A common method of cardinality notation is called _____ _____ ________ because of the shapes, which include circles, bars, and symbols, that indicate various possibilities

Action bar

A common navigation bar with action controls used for smartphones and usually placed at the bottom of the screen

Server

A computer or a group of computers that manages shared resources such as file systems, databases, and websites, and enables users and computers to access those resources over a network.

Server

A computer that manages shared resources and allows users to access those resources over a network is called a what?

A) extended entry

A condition that has more than two values is a(n): A) extended entry B) simple entry C) complex entry D) limited entry

Functional dependency

A constraint between two attributes in which the value of one attribute is determined by the value of another attribute.

Referential Integrity Constraint

A constraint, stored in the schema, that the DBMS uses to automatically enforce referential integrity

Event modeling

A data flow diagram built based on events. Includes the event, source, trigger, activity, and response. The trigger and response become the input and output data flows, and the activity becomes the process.

C) level-0 diagram

A data flow diagram that represents a system's major processes, data flows, and data stores at a high level of detail refers to: A) context diagram B) level-1 diagram C) level-0 diagram D) level-00 diagram

Decentralized Database

A database stored at multiple locations without needing to be interconnected through a network or synchronized

B

A decision table is simplified by: A) removing extended entries B) removing any rules with impossible actions C) removing simple entries D) removing any rules with static actions

Use case

A depiction of a system's behavior or functionality under various conditions as the system responds to requests from users.

Use Case

A depiction of a system's behaviour or functionality under various conditions as the system responds to requests from users.

Data Store

A depository for the data that allows examination, addition, and retrieval of data. Named with a noun, describing the data. Usually given a unique reference number. Represents a: - Database - Computerized file - Filing cabinet

Conceptual data model

A detailed model that captures the overall structure of organizational data that is independent of any database management system or other implementation considerations.

Entity-relationship data model (E-R model)

A detailed, logical representation of the entities, associations, and data elements for an organization or business area.

Payback analysis

A determination of how long it takes and information system to pay for itself through reduced costs and increased benefits

Logical model

A diagram that focuses on the business and how the business operates; describes the business events that take place and the data required and produced by each event.

Sampling distribution

A distribution of statistics obtained by selecting all of the possible samples of a specific size from a population

Software requirements specification

A document that contains the requirements for the new system, describe the alternatives that were considered, and makes a specific recommendation to management. It is the end product of the systems analysis phase. Sometimes also called a systems requirement document

Request for Proposal (RFP)

A document that describes the company, lists the IT services or products needed, and specifies the features required

Information center (IC)

A facility that supports users by training them on application software. Used support specialists answer questions, troubleshoot problems, and serve as a clearinghouse for used problems and solutions. Also known as service desk or help desk

Discoverability

A feature of the user interface that provides Clues to help users uncover hidden features

Foreign Key

A field in one table that must match a primary key value in another table in order to establish the relationship between two tables

Pointer

A field of data that can be used to locate a related field or row of data.

secondary key

A field or combination of fields that can be used to access or retrieve records

primary key

A field or combination of fields that uniquely and minimally identifies a particular member of an entity

Primary Key

A field or combination of fields that uniquely identifies a particular member of an entity

Calculated field

A field that can be derived from other database fields. Also known as a computed field or a derived field.

D) data store

A file folder containing orders is represented on a data flow diagram as a: A) process B) source C) data flow D) data store

Indexed file organization

A file organization in which rows are stored either sequentially or nonsequentially, and an index is created that allows software to locate individual rows.

Sequential file organization

A file organization in which rows in a file are stored in sequence according to a primary key value.

Hashed file organization

A file organization in which the address of each row is determined using an algorithm.

Application service provider(ASP)

A firm that delivers a software application, or access to an application, by charging a usage or subscription fee.

Application Service Provider

A firm that delivers a software application, or access to an application, by charging a usage/subscription fee.

Application service provided (ASP)

A firm that delivers a software application, or access to and application, by charging a usage or subscription fee

Value-added reseller (VAR)

A firm that enhances a commercial package by adding custom features and configuring it for a particular industry

What is a service provider?

A firm that offers outsourcing solutions

Service provider

A firm that offers outsourcing solutions. Two popular outsourcing options involve application service providers and firms that offer internet business services

Entity-relationship diagram (E-R diagram)

A graphical representation of an E-R model.

Check boxes

A group of selection items that allows either none or many items to be selected within the group

Radio Buttons

A group of selection items that allows only one item to be selected within a group

Unified Modeling Language (UML)

A language that provides a standardized set of tools to document the object-oriented analysis and design of a software system.

False

A location diagram can be used to indicate the locations of the client computers and the server computers in a client/server environment.

Exclusive Lock (White Lock)

A lock where no other activity is allowed, neither reading nor writing the data

Which of the following is not an advantage of using a logical model?

A logical model clarifies which processes are automated

Decision table

A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions

C) decision table

A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions, defines a: A) structure chart B) state transition diagram C) decision table D) sequence diagram

Benchmark

A measure of time a blackberries to process a certain number of transactions

Asynchronous message

A message in which the sender does not have to wait for the recipient to handle the message.

Client/Server Architecture

A method of organizing software applications so that the data and core processing is in a central location and access to that core is distributed on user's computing devices is called what?

Ajax

A method using JavaScript and XML to dynamically change Web pages without displaying a new page by obtaining small amounts of data from the server.

B) has only outputs

A miracle process is one that: A) has only inputs B) has only outputs C) cannot be exploded further D) has insufficient inputs to produce the associated processes

Cloud Computing

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

B) decision table

A modeling technique that allows you to represent a set of conditions and the actions that follow from them in a tabular format best describes: A) data flow diagram B) decision table C) flowchart D) Structured English

Physical table

A named set of rows and columns that specifies the fields in each row of the table.

Physical file

A named set of table rows stored in a contiguous section of secondary memory.

Relation

A named, two-dimensional table of data. Each relation consists of a set of named columns and an arbitrary number of unnamed rows

Return on Investment (ROI)

A percentage rate that compares the total net benefits (the return) received from a project to the total costs (the investment) of the project

Return on investment (ROI)

A percentage rate that measures profitability by comparing the total net benefits(the return) received from a project to the total costs (the investment) of the project. _______ = (total benefits - total costs) / total costs

Use case diagram

A picture showing system behavior, along with the key actors that interact with the system.

Use Case Diagram

A picture showing system behaviour, along with the key actors that interact with the system.

Transaction

A piece of work with several steps that must all be completed to be valid

What is middle (i.e.,label) of the process symbol used for?

A process description

Child Diagrams

A process on Diagram 0 that is exploded. Cannot produce output or receive input that the parent process does not also produce or receive. The child process is given the same number as the parent process. - Process 3 would explode to Diagram 3

Hypertext Markup Language

A protocol that defines the structure and content of a web page is called what?

Structured Query Language SQL

A query language used to access and update the data in a relational database

Third normal form (3NF)

A relation is in second normal form and has no functional (transitive) dependencies between two (or more) nonprimary key attributes.

Second normal form (2NF)

A relation is in second normal form if every nonprimary key attribute is functionally dependent on the whole primary key.

Well-structured relation

A relation that contains a minimum amount of redundancy and that allows users to insert, modify, and delete the rows without error or inconsistencies; also known as a table.

Functional Dependency

A relationship between columns such that the values in one (or more) column determine the values in a second column (or set of columns)

Unary relationship

A relationship between instances of one entity type; also called recursive relationship.

Second Normal Form (2NF)

A restriction that a table is in 1NF and that each non-key attribute is functionally dependent on the entire primary key

First Normal Form (1NF)

A restriction that all fields must be atomic, or single valued

Referential integrity

A rule that states that either each foreign key value must match a primary key value in another relation or the foreign key value must be null (i.e., have no value).

Scenario

A scenario, in UML refers to a single path, among many possible different paths, through a use case.

Web 2.0

A second generation of the web that enable people to collaborate, interact, and share information much more dynamically, based on continuously available used applications rather than static HTML webpages. Interactive experience is a hallmark of ______

Web 2.0

A second generation of the web that enables people to collaborate, interact and share informatino much more effectively

Virtual Private Network (VPN)

A secure communications scheme that utilizes the Internet but with very secure technologies so that it appears as a dedicated network is called what?

Fixed fee model

A service model that charges a set fee based on a specified level of service and used support

Subscription model

A service model that charges a variable fee for an application based on the number of users of workstations that have access to the application

Transaction model

A service model that charges a variable fee for an application based on the volume of transactions or operations performed by the application. Also called a usage model

Fixed fee model (outsourcing)

A set fee based on a specified level of service and user support

Record

A set of related fields that describes one instance or occurrence of an entity

Referential integrity

A set of rules that avoids data inconsistency and quality problems

referential integrity

A set of rules that avoids data inconsistency and quality problems

Repeating group

A set of two or more multivalued attributes that are logically related.

Ternary relationship

A simultaneous relationship among instance of three entity types.

Entity instance

A single occurrence of an entity type. Also known as an instance.

Data flow diagram fragment

A single process on a data flow diagram. All the fragments combine to form Diagram 0.

Three-layer architecture

A software architecture that divides an application into view, business logic, and data is called what?

Web service

A software function or set of functions or services that can be executed via Web protocols is called a what?

Vertical application

A software package developed to handle information requirements for a specific type of business

What is a vertical application?

A software package developed to handle information requirements for a specific type of business

Horizontal application

A software package that can be used by many different types of organizations

What is a horizontal application?

A software package that can be used by many different types of organizations

Vertical application

A software that has been developed to handle information requirements for a specific type of business

External entity (source or destination)

A source or destination of data considered to be external to the system being described. Also called an entity.

Null value

A special field value, distinct from zero, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown.

Maintenance agreement

A specification of the conditions, charges, and time frame for users to contact the vendor for assistance when they have system problems or questions

Subtype

A subgrouping of the entities in an entity type that is meaningful to the organization and that shares common attributes or relationships distinct from other subgroupings.

B) source

A supplier of auto parts to our company is represented on a data flow diagram as a: A) process B) source C) data flow D) data store

System of record

A system or application component that maintains the current and correct Master Copy of one or more data items

Database Management System (DBMS)

A system software component that manages and controls one of more databases

Why do analysts work in teams when selecting hardware and software?

A team approach ensures that critical factors are not overlooked and that a sound choice is made

Transaction Logging

A technique by which any update to the database is logged with such audit information as user ID, date, time, input data, and type of update

File organization

A technique for physically arranging the records of a file.

Evaluation Model

A technique that uses a common yardstick to measure and compare vendor ratings

List box

A text box with a list of predefined data values

False

A three-layer architecture requires at least three computers to be implemented correctly.

Report generator

A tool for designing formatted reports rapidly. Also called a report writer

Default value

A value a field will assume unless an explicit value is entered for that field.

Service-oriented architecture (SOA)

A way of engineering systems in which reusable business functionality is provided by services through well defined interfaces. Technically, not software architecture but an architectural style

Request for proposal (RFP)

A written list of features and specifications given to prospective vendors before a specific product or package has been selected

When organizations request for bids for contracts on their own Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.

A. Buy-side marketplace.

Organizations typically face issues related to e-tailing including A. Companies face issues in both of these areas B. Channel conflict C. Order fulfillment D. Companies do not face issues in either of these areas

A. Companies face issues in both of these areas

Downloading a book on an Amazon Kindle is an example of: A. Pure e-commerce. B. Partial e-commerce. C. Both of these are correct. D. Neither of these are correct.

A. Pure e-commerce.

For a small-to-medium enterprise, the benefits of setting up an e-commerce store front include (choose all that apply): A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. C. The ability to eliminate advertising. D. The ability to offer lower prices to customers.

A. The ability to reach a wider customer base. B. The ability to offer a larger selection of products. D. The ability to offer lower prices to customers.

The opening case illustrates how e-commerce has increased (choose all that apply): A. The volume of business transactions. B. The skill with which computers are able to handle unexpected situations. C. The occurrence of human errors. D. The speed at which we do business.

A. The volume of business transactions. D. The speed at which we do business.

eBay is an example of which type of e-commerce? A. consumer-to-consumer B. consumer-to-business C. business-to-consumer D. business-to-business E. government-to-citizen

A. consumer-to-consumer

When e-commerce is done in a wireless environment, this is called: A. mobile commerce B. wireless commerce C. pervasive computing D. location commerce E. consumer commerce

A. mobile commerce

Manufacturers or retailers sell directly to customers in which of the following business models? A. online direct marketing B. affiliate marketing C. find-the-best-price D. name-your-own-price E. electronic tendering system

A. online direct marketing

A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.

ASP

Interoperability

Ability of a component or system to interact with other components or systems

An attempt to disseminate information in order to influence a buyer-seller transaction.

Advertising

ajax

Ajax is a technique that uses both JavaScript and XML to obtain small amounts of data, either plain text or XML, from a server without leaving the web page.

B) event

All business processes begin and end with a(n): A) starting and termination points B) event C) activity D) gateway

A) decision

All of the following are symbols used in business process modeling EXCEPT: A) decision B) gateway C) event D) activity

Business logic layer

Also known as The Domain layer the part of a three layer architecture that contains the programs that implement the business rules and processes

Which is NOT one of the four basic symbols used to chart data movement on data flow diagrams?

An Oval

B) data flow

An arrow on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

Extend relationship

An association between two use cases where one adds new behaviors or actions to the other.

Extend Relationship

An association between two use cases where one adds new behaviours or actions to the other. [The base use case can stand alone without the _____ case(s)].

Include relationship

An association between two use cases where one use case uses the functionality contained in the other.

Include Relationship

An association between two use cases where one use case uses the functionality contained in the other. [The base use case can't function without the ___ case(s).]

Candidate key

An attribute (or combination of attributes) that uniquely identifies each instance of an entity type.

Primary key

An attribute (or combination of attributes) whose value is unique across all occurrences of a relation.

Key

An attribute or set of attributes, the values of which are unique for each row of the table, that is used to uniquely identify a row

Foreign key

An attribute that appears as a nonprimary key attribute in one relation and as a primary key attribute (or part of a primary key) in another relation.

Foreign Key

An attribute that duplicates the primary key of a different (or foreign) table.

Composite attribute

An attribute that has meaningful component parts.

Required attribute

An attribute that must have a value for every entity instance.

Associative entity

An entity type that associates the instances of one or more entity types and contains attributes that are peculiar to the relationship between those entity Instances; also called a gerund.

A) dash (-)

An indifferent condition is represented by a(n): A) dash (-) B) asterisk (*) C) exclamation point (!) D) pound sign (#)

Open Database Connectivity (OBDC)

An industry-standard protocol that makes it possible for software from different vendors to interact and exchange data

In-house software

An information center of help desk within the IT department responsible for providing used support and offering services such as hotline assistance, training, and guidance to users who need technical help

data warehouse

An integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company

Data Warehouse

An integrated collection of data that can include seemingly unrelated information

Screen generator

An interactive tool that helps design a custom interface, create screen forms, and handle data entry format and procedures. Also called a form painter

Newsgroup

An online discussion on a particular topic, where people meet, offer support,and exchange ideas. The electronic equivalent of the physical bulletin board. Also called a forum

Cloud computing

An online software and data environment in which applications and services are accessed and used through an internet connection rather than on a local computer; refers to the cloud symbol for the internet

Managed hosting

An operation is managed by the outside firm, or host. Another term for IBS

Usability

An overall evaluation of how a system performs in supporting a particular user for a particular task.

Context diagram

An overview of an organizational system that shows the system boundaries, external entities that interact with the system, and the major information flows between the entities and the system

Context diagram

An overview of an organizational system that shows the system boundaries, external entities that interact with the system, and the major information flows between the entities and the system.

Metaphors

Analogies between features of the user interface and aspects of physical reality which users are familiar

candidate key

Any field that could serve as a primary key is called a

_____________ is a firm that delivers a software application, or access to an application _____________ provide powerful web-based support for transactions such as order processing, billing, and crm

Application service provider Internet Business Services

Business Process Outsourcing

Aspects of outsourcing such as programming, renting software/systems, or handling the IT functions.

Which type of electronic payment is typically favored in B2B A. Electronic credit cards B. Electronic checks C. Smart cards D. Electronic cash

B. Electronic checks

When organizations come to a company's Web site for procurement, such business is classified as a(n): A. Buy-side marketplace. B. Sell-side marketplace. C. Electronic exchange. D. None of these.

B. Sell-side marketplace.

Which of the following electronic payments is ideal for micropayments? A. Purchasing cards B. Smart cards C. Electronic checks D. None of the methods listed is suited to micropayments

B. Smart cards

The fee for a monetary transaction between a buyer and a seller using PayPal is paid for by: A. Neither party; PayPal is a free service. B. The payer. C. The payee. D. Both the payee and the payer.

B. The payer.

In an e-credit card transaction, the clearinghouse plays the following role: A. Initiates the transfer of money B. Validates and verifies the seller's payment information C. Transfers funds between the seller's bank and the buyer's bank D. All of these

B. Validates and verifies the seller's payment information

The four types of E-Commerce are:

B2C - Business to Consumer B2B - Business to Business C2C - Consumer to Consumer B2E - Business to Employee

An organization uses e-commerce internally to provide information and services to its employees. Companies allow employees to manage their benefits, take training classes electronically; buy discounted insurance, travel packages, and event tickets.

B2E

Electronic billboards.

Banners

What are the benefits of E-Commerce to organizations and customers and society?

Benefits to Organizations: -makes markets more accessible -lowers costs Benefits to Customers: -access to a vast number of products and services around the clock Benefits to Society: -ability to easily deliver to people everywhere

Purely physical organizations.

Brick-and-mortar organizations

Tool tip

Brief instructions that pop up when the mouse hovers over a control

Standards Architecture

Broad plan for creating standards - break problems into smaller pieces for ease of development - develop standards for the individual pieces - Dominant architecture today is the hybrid TCP/IP-OSI standards

The method by which a company generates revenue to sustain itself

Business Model

Which type of electronic exchange connect buyers with sellers within a specific industry? A. Functional exchanges B. Public exchanges C. Vertical exchanges D. Horizontal exchanges

C. Vertical exchanges

In this type of e-commerce, buyers and sellers are individuals. A. business-to-consumer B. business-to-business C. consumer-to-consumer D. government-to-citizen E. consumer-to-business

C. consumer-to-consumer

In _____, needed services such as temporary help or extra space are traded on an as-needed basis. A. buy-side marketplaces B. horizontal exchanges C. functional exchanges D. sell-side marketplaces E. vertical exchanges

C. functional exchanges

A(n) _____ is automatically launched by some trigger and appears in front of the active window. A. keyword banner B. random banner C. pop-up ad D. pop-under ad E. text box

C. pop-up ad

The major strategies for conducting __________ commerce on the Internet are auctions and classified ads.

C2C

D) process

Calculating an employee's salary is represented on a data flow diagram as a: A) data flow B) source C) data store D) process

The alienation of existing distributors when a company decides to sell to customers directly online

Channel Conflict

What is a usage model or transaction model?

Charges a variable fee based on the volume of transactions or operations performed by the application

Conduct some e-commerce activities, yet their business is primarily done in the physical world in example: partial EC

Click-and-mortar Organizations

Complex Data Types

Combinations of or extensions to primitive data types that are supported by programming languages, operating systems, and DMBSs

The blending of community, communication, and entertainment into a new form of online activity driven by consumers.

Communitainment

Software vendor

Company that develops software for sale

What are some characteristics of a traditional development environment?

Compatibility issues influence systems design Systems are designed to run on local and wide-area company networks Systems often use internet links as enhancements Follows three main paths, in-house, purchase a package, or outside consultants Scalability depends on networks limitations and constraints Require lots of computing power and resources Security issues are less complex

Table or File

Contains a set of related records that store data about a specific entity

Distribution of Sample Means

Contains all of the possible samples The collection of ample means for all of the possible random samples of a particular size (n) that can be obtained from a population.

What is a systems requirements specification?

Contains the requirements for the new system, describes the alternatives that were considered, and makes specific recommendation to management

Firmware

Control programs stored on chips are sometimes referred to as _________? The OS in an ipod, iphone or TV is most likely stored as _______?

Involves conducting banking activities from home, a place of business, or on the road instead of at a physical bank location.

Cyberbanking

____ and ____ are the two major challenges for the sellers in e-commerce. A. Order fulfillment, large orders B. Channel conflict, advertising C. Advertising, large orders D. Channel conflict, order fulfillment

D. Channel conflict, order fulfillment

In the _____ marketplace model, the reverse auction is typically used. A. desktop purchasing B. group purchasing C. electronic exchange D. buy-side E. sell-side

D. buy-side

Database administrator

DBA. The person in charge of the safety and operation of the database management system

A(n) ____ is a collection of tools, features, and interfaces that enable users to add, update, manage, access, and analyze the contents of data.

DBMS

A method that provides conceptional freedom for representing processes and flows in a business system is the _______.

Data Flow Diagram

Data store

Data at rest, which may take form of many different physical representations.

Data store

Data at rest, which may take the form of many different physical representations

B) data store

Data at rest, which may take the form of many different physical representations, defines: A) source B) data store C) data flow D) process

Derived element

Data fields or elements that are not keyed but are rather the result of a calculation or logical operation.

Base element

Data fields or elements that need to be keyed; must be stored in a file.

A) process models

Data flow diagrams that concentrate on the movement of data between processes are referred to as: A) process models B) data models C) flow models D) flow charts

Which of the following is not an error when drawing a data flow diagram?

Data flow on a child diagram that has only one end connected to a process, the other end is a point in space

D) data flow

Data in motion, moving from one place in a system to another, defines: A) data store B) process C) source D) data flow

Relational database model

Data represented as a set of related tables or relations.

Data store

Data that are at rest in a system; depicted using an open-ended rectangle in data flow diagrams.

Primitive Data Types

Data types supported directly by computer hardware or a programming language

Schema

Database component that contains descriptive information about the data stored in the physical data store

scalability, economy of scale, enterprise-wide application, stronger standards, better security, and data independence

Database management software advantages include:

Make or buy (build or buy)

Decision between developing or purchasing software. Developing is an "In House Software" Purchasing is a "Software Package"

In what type of e-commerce business model do companies offer deep price discounts

Deep discounters

Local Design

Defines "what" must take place, not "how" it will be accomplished.

HTTP (hypertext transfer protocol)

Defines format and content for transfer of web documents

Logical design

Defines what must take place, not how it will be accomplished

Pure versus Partial Electronic Commerce depends on the ______ involved.

Degree of Digitization

Process

Denotes a change in or transformation of data. Represents work being performed in the system. Naming convention: - Assign the name of the whole system when naming a high-level process. - To name a major subsystem attach the word subsystem to the name. - Use the form verb-adjective-noun for detailed processes.

Sequence diagram

Depicts the interactions among objects during a certain period of time

Physical design

Describes the actual process of entering, verifying and storing data

True

Describing the environment is one of the detailed activities of core process 4: Design system components.​

User-centered design

Design techniques that embody The View that the user interface appears to be in the entire system

Mobile responsive

Designing websites so the pages are responsive to being displayed on small mobile devices

Payback Analysis

Determines how long it takes an information system to pay for itself through reduced costs and increased benefits.

Intermediaries or middlemen provide information and/or provide value-added services. When the function(s) of these intermediaries can be automated or eliminated, this process is called

Disintermediation

Request for Proposal

Document that describes the company, lists the IT services required, and specifies the features required.

Businesses and organizations set up Web sites to: A. Sell goods and services. B. Induce people to visit a physical location. C. Reduce operational and transaction costs. D. Enhance their reputation. E. All of the above.

E. All of the above

Electronic business includes which of the following? A. buying and selling B. servicing customers C. collaborating with business partners D. conducting electronic transactions within an organization E. all of the above

E. all of the above

The key mechanisms to sell-side marketplaces are

Electronic Catalogs and Forward Auctions

Describes the buying, selling, transferring or exchanging of products, services or information via computer networks, including the Internet.

Electronic Commerce (E-Commerce)

Allow customers to charge online payments to their credit card account

Electronic Credit Cards

Collections of individual shops under a single Internet address.

Electronic Malls

This enables you to pay for goods and services electronically.

Electronic Payment Systems

In what type of e-commerce business model do businesses request quotes from suppliers

Electronic tendering system

HTTPS (hypertext transfer protocol secure)

Encrypted and secure HTTP transfers

What are the steps in the software acquisition process?

Evaluate the Information System Requirements Identify Potential Vendors or Outsourcing Options Evaluate Alternatives Cost Benefit Analysis Prepare Recommendation Implement Solution

An _____________ model is a technique that uses a common yardstick to measure and compare vendor ratings

Evaluation

Exploding

Expanding a diagram to show subprocesses.

A value added contract provides for flexibility, but may result in a larger than expected bill.

False

Due to privacy issues, it is illegal for e-commerce Web sites to use cookies to record their customer's past behaviors and discover their identity. True False

False

If in-house experience exists for all the functional and technical needs of the new system, it will be easier to outsource the building of the system, because the company employees with those skills will be able to quickly learn the new system with very little training.

False

In general, e-commerce Web sites of click-and-mortar companies carry the same variety of merchandise as their brick-and-mortar stores. True False

False

In general, the e-commerce Web sites of click-and-mortar companies operate only during the business hours of their brick-and-mortar stores. True False

False

In-house experience is not a factor to be considered for selecting a design strategy since a company is always able to hire experienced developers.

False

Internet marketing typically is one-way and impersonal. True False

False

Many project teams believe that packaged software is the best way to create a system because they have complete control over the way the system looks and functions, and they can be flexible and creative in the way they solve business problems.

False

Max has been a project manager for 10 years and is considered one of the best in his department of well qualified IS professionals. The approval committee is considering the approval of a new unique Internet system that could possibly catapult the firm ahead of all of the competition. Buying a packaged system would be the best design strategy.

False

Processes in a rectangle with rounded corners sometimes denote something other than a change in or transformation of data or a system/subsystem.

False

Processes that transform data should be named with a noun which indicates the data that has been transformed.

False

Stored-value money cards contain chips with personal data. True False

False

The design strategy that would be most logical to a firm with a very limited amount of in-house IS expertise is allow end-users to create the system.

False

The highest level data flow diagram is called Diagram 0.

False

The sales tax laws that apply to brick-and-mortar stores also apply to all e-commerce stores. True False

False

The use of electronic commerce requires companies to hire additional employees. True False

False

There are three design strategies: 1) developing a custom application in-house, 2) hiring a consultant, and 3) relying on an external vendor, developer, or service provider to build the system.

False

Trademark owners in the US are not allowed to sue for damages in cases of cybersquatting. True False

False

Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities. True False

False

Virtual credit cards create new credit card accounts that are valid only for a pre-defined number of transactions. True False

False

When two companies fight over a domain name the company that has been in business the longest is automatically considered the owner of the domain. True False

False

In what type of e-commerce business model do customers specify a need and an intermediary compares providers and shows the lowest price

Find-the-best-price

Recursive foreign key

A foreign key in a relation that references the primary key values of that same relation.

Normalization

A formal technique for transforming a relational schema to an equivalent one that minimizes data redundancy and eliminates data anomalies

data structure

A framework for organizing, storing, and managing data

Supertype

A generic entity type that has a relationship with one or more subtypes.

Data flow diagram

A graphical depiction of data processes, data flows, and data stores in a business system.

data flow diagram (DFD)

A graphical depiction of data processes, data flows, and data stores in a business system. (7)

Software license

A legal agreement that gives users the right to use the software under certain terms and conditions

Software as a Service (SaaS)

A model of software delivery in which functionality is delivered on-demand as a network-accessible service, rather than as a traditional software application that is downloaded and installed on the customer's computer

What is Software as a service?

A model of software development in which an application is hosted as a service provided to customers over the internet

Software as a Service

A model of software development in which an application is hosted as a service provided to customers over the internet.

Network diagram

A model that shows how locations and Hardware components are interconnected with network devices and wiring

Entity-Relationship Diagram (ERD)

A model that shows the logical relationships and interaction among entities. Provides the overall view of the system and a blueprint for creating the physical data structures.

Attribute

A named property or characteristic of an entity that is of interest to the organization.

Physical design

A plan for the actual implementation of the system

D) source/sink

A square on a data flow diagram represents a: A) data store B) data flow C) process D) source/sink

Evaluation model

A technique that used a common yardstick to measure and compare vendor ratings

In what type of e-commerce business model do vendors ask partners to place logos or banners on partner's sites

Affiliate Marketing

____ accounts for the majority of e-commerce transactions. A. B2C B. B2B C. C2C D. B2E E. G2C

B. B2B

C) identifying selection criteria

Basic procedures for constructing a decision table do not include: A) listing all possible rules B) naming the conditions and the values each condition can assume C) identifying selection criteria D) simplifying the decision table

B2B model in which organizations buy needed products or services from other organizations electronically, often through a reverse auction

Buy-side Marketplace

An individual sells products or services to other individuals

C2C

Usage or transaction model (outsourcing)

Charges a variable fee based on the volume of transactions or operations performed by the application

True

Computing devices include all of the following: a server, a laptop, a Kindle reader, an Apple Watch, and a smartphone.​

Internet Protocol (IP) Address

Every device connected to the internet has an identifying address called __________?

Referential Integrity

Every value as a foreign key in one table must have an equivalent value as the primary key in the associated table

Electronic commerce makes national and international markets less accessible. True False

False

C) be coupled to each other

If two processes are connected by a data flow, they are said to: A) share the same timing effects B) share the same data C) be coupled to each other D) be strapped to each other

False

In three-layer architecture, the three layers consist of the view layer, the business logic layer, and the domain layer.

What is another term for internet business services?

Managed hosting

Benchmarking

Measurement of the time a package takes to process a certain number of transactions

Secondary key

One or a combination of fields for which more than one row may have the same combination of values.

Asks consumers to give their permission to voluntarily accept online advertising and e-mail.

Permission Marketing

The B2B equivalent of electronic credit cards and are typically used for unplanned B2B purchases

Purchasing cards

B) decision table

Removing any rules with impossible actions to make which of the following simple as possible? A) activity diagram B) decision table C) structure chart D) hierarchical chart

Detailed reports

Reports that contain specific information on business transactions

Sequence Diagram - Instance Form

Shows the sequence for only one scenario.

Total specialization rule

Specifies that each entity instance of the supertype must be a member of some subtype of the relationship.

___________ has a variable fee based on the number of users or workstations that have access to the application

Subscription model

What are some characteristics of a web-based development environment:

Systems are developed in internet-based framework Treats web as a platform Easily scalable and can run on multiple hardware Used by large firms for CRM, order processing, and materials management Treats the software application as a service that is less dependent on computing power and resources Can limit in-house involvement and have the vendor install, configure, and maintain the system Usually requires middleware to communicate with existing software and legacy systems More complex security issues

The process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate everything together is called _____.

Systems integration

schema

The complete definition of a database, including descriptions of all fields, tables, and relationships

DFD consistency

The extent to which information contained on one level of a set of nested DFDs is also included on other levels

B) rules

The part of a decision table that links conditions to actions is the section that contains the: A) action statements B) rules C) condition statements D) decision stubs

Action stubs

The part of a decision table that lists the actions that result for a given set of conditions

D) multiply the number of values for each condition by the number of values for every other condition

To determine the number of rules required for the decision table, you would: A) add the number of values for each condition to the number of values for every other condition B) multiply the number of conditions by two C) add the number of values for each condition to the number of values for every other condition, then subtract 1 D) multiply the number of values for each condition by the number of values for every other condition

With a ______ approach, the diagrams move from general to specific.

Top-Down

Event response table

Used to summarize events.

Ui

User experience. The set of inputs and outputs that the user interacts with to invoke the functions of an application

False

For a large company such as RMO, external hosting of part or all of the system is not usually a cost effective technique.​

Refers to online "word of mouth" marketing

Viral Marketing

Banks dedicated only to Internet transactions.

Virtual Banks

______________ second generation of the web that enables people to collaborate, interact, and share information much more effectively ____________ a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction ___________ hand held electronics such as smartphones and tablets

Web 2.0 Cloud Computing Mobile Devices

Level-n diagram

a DFD that is the result of n nested decompositions from a process on a level-0 diagram

one-to-one relationship

abbreviated 1:1, exists when exactly one of the second entity occurs for each instance of the first entity

A(n) ______ matrix can be used to organize the pros and cons of the design alternatives so that the best solution will be chosen in the end.

alternative

Central limit theorem

For any population with a mean and standard deviation the distribution of sample means for sample size n will have a manu of u and ans standard deviation of square root over n and will approach a normal distribution as n approaches infinity.

Computer Network

hardware, software, transmission media

user interface

includes screens, commands, controls, and features that enable users to interact more effectively with an application

subject matching

synonym for individual matching

Drivers of today's online advertising include:

-Communitainment -Usites -Multitasking

What are the disadvantages of E-Commerce

-No universal security standard -Insufficient bandwidth -Expensive accessibility -Perception that EC is insecure -Lacks a critical mass of buyers and sellers

Reasons for purchasing a software package

1. Lower costs 2. Requires less time to implement 3. Proven reliability and performance benchmarks 4. Requires less technical development staff 5. Future upgrades provided by the vendor 6. Obtain input from other companies

A) level-3 diagram

A DFD that is a result of three nested decompositions of a series of subprocesses from a process on a level-0 diagram defines a: A) level-3 diagram B) level-1 diagram C) level-2 diagram D) primitive diagram

D) level-n diagram

A DFD that is the result of n nested decompositions from a process on a level-0 diagram, is called: A) primitive diagram B) level-0 diagram C) context diagram D) level-n diagram

Level-n diagram

A DFD that is the result of n nested decompositions from a process on a level-0 diagram.

Level-0 diagram

A DFD that represents a system's major processes, data flows, and data stores at a high level of detail

Physical model

A DFD that shows how a system will be implemented, including the hardware, software, people, and files involved.

Relational Database Management System (RDBMS)

A DMBS that organizes data in tables or relations

Homogeneous Distributed Database

A Database distributed across multiple locations with the same DBMS, and all database access coordinated by a global schema

Protocol

A ______ is a set of languages, rules, and procedures to facilitate accurate data exchange.​

Three-layer architecture

A client/server architecture that divides an application interview layer, business logic layer, and data layer

Three layer architecture

A client/server architecture that divides an application into view, business logic and data layers is called what?

EBCDIC

A coding method used on mainframe computers and high-capacity servers

ASCII

A coding method used on most personal computers

Entity type

A collection of entities that share common properties or characteristics.

A) statements

A decision table does not include: A) statements B) condition stubs C) action stubs D) rules

Shared lock (Read lock)

A lock where other transaction are allowed to read the data

A primitive process is:

A process that is not exploded to a child diagram

Index

A table used to determine the location of rows in a file that satisfy some condition.

Active discovery

A user interface feature to lead users to discover hidden features

Actor

An external entity that interacts with a system.

Candidate Key

Any field that can serve as a primary key

C) 16

Assume the first condition has four values; the second condition has two values; the third condition has two values. How many rules will there be? A) 8 B) 7 C) 16 D) 24

B) 12

Assume the first condition has two values; the second condition has two values; the third condition has three values. How many rules will there be? A) 7 B) 12 C) 6 D) 11

D) 18

Assume we have three conditions. Condition one has two values; condition two has three values; condition three has three values. How many rules are needed? A) 8 B) 6 C) 5 D) 18

A competitive process in which either a seller solicits consecutive bids from buyers or a buyer solicits consecutive bids from sellers.

Auction

Major E-Commerce Mechanisms include:

Auctions Forward Auctions Reverse Auctions

Sellers use a _____ as a channel to many potential buyers. *Note that Sotheby's uses forward auctions.

Forward Auction Results in higher prices over time

Legal Issues Specific to E-commerce include

Fraud on the Internet- stocks Domain Names- competition Cybersquatting Domain Tasting Taxes and Other Fees Copyright

Refers to the practice of registering domain names solely for the purpose of selling them later at a higher price

Cybersquatting

Data store

Data at rest, which may take the form of many different physical representations.

A broader definition of EC, including buying and selling of goods and services, and also servicing customers, collaborating with partners, conducting e-learning and conducting electronic transactions within an organization.

E-Business

The use of Internet Technology in general and e-commerce in particular to deliver information about public services to citizens (called Government-to-citizen [G2C EC]), business partners

E-Government

Similar to paper checks and are used mostly in B2B.

E-checks

Purchasing by using electronic support

E-procurement

A(n) ____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.

ERD

A Web site that represents a single store.

Electronic Storefront

Class such as URLConnection (dealing with URL connections) should be handled in the layer Data Management.

False

On data flow diagram, an arrow is used to depict an external entity that can give and receive data from the system.

False

Pirate Adventures, Inc., a company that owns and operates hotels in tropical locations, is interested in replacing the 15-year-old room reservation system in all of its hotels. Custom development would be the best design strategy.

False

Event trigger

Input for an event.

JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.

Java

LAN

Local area network- small computer network typically spanning a single home, small office, or one floor of a building

Data mining software

Looks for meaningful data patterns and relationships

What is the main reason for IT offshoring?

Lower costs

Involves customers accessing services via the Web.

Online Service

Ethical issues related to E-commerce include

Privacy and Job loss

In what type of e-commerce business model do customers use the internet to self-configure products or services

Product customization

What are some risks of offshoring?

Project control security issues disparate cultures effective communication Economic impact

Internet Business Services (managed hosting)

Provide powerful web-based support for transactions such as order processing, billing, and CRM.

With a(n) ____ language, the user provides an example of the data requested.

QBE

The key mechanisms to buy-side marketplaces are

Reverse Auctions

Physical Design

Set of blueprints for the actual construction.

Client / Server architecture

Software design with part of the application on a server and part of the client

Software package

Software that is purchased or leased from another firm. A commercially produced software product, or family of products

Feedback

Some visual or audio response by the system in response to a user action

Interoperability

The ability of a component or system to interact with other components or systems is referred to as what?

Balancing

The conservation of inputs and outputs to a DFD process when that process is decomposed to a lower level.

Primary Key

The key chosen by a database designer to define relationships by being used as a foreign key in other tables

Degree

The number of entity types that participate in a relationship.

Normalization

The process of converting complex data structures into simple, stable data structures.

Technology Architecture

The set of computing hardware, network hardware and system software in an organization is usually referred to as the what?

Technology Architecture

The set of computing hardware, network hardware and system software used by an organization is called the what?

Application Architecture

The set of information systems the organization needs to support its operations is often called the what?

Lightweight graphics

The use of small, simple images to allow a Web page to be displayed more quickly.

Process

The work or actions performed on data so that they are transformed, stored, or distributed

Net Present Value

Total value of the benefits mins the total value of the costs.

Drill down

User interface design techniques that enables a user to select summary information and View supporting detail

Hypertext Transfer Protocol

What does HTTP stand for?​

Software as a Service

What does SaaS stand for?

A Server Computer

What is a computer that manages shared resources for access across a network called?​

Visibility

When a control is visible so that users know it's available

client/server architecture

a software design and deployment method that divides software into components that manage resources and components that use those resources

system of record

a system or application component that maintains the current and correct master copy of one or more data items

group counterbalancing

administering different sequences to different groups of participants

intrasubject counterbalancing

administering the treatment conditions to each individual participant in more than one order

Relational database management system

RDBMS. A DBMS that organizes data in tables or relations

A) process

Recording a customer's payment is represented on a data flow diagram as a: A) process B) source C) data flow D) data store

What are some benefits of SaaS?

Reduces the need for software maintenance, operation, and support

Exception reports

Reports that provide details or summary information about transactions or operating results of fall outside of predefined normal range of values

Executive reports

Reports used by high-level managers to assess overall organizational health and performance

External Entities

Represent another department, a business, a person, or a machine. A source of destination of data, outside the boundaries of the system. Should be named with a noun.

binary digits

Represents numbers as actual binary values, rather than as coded numeric digits

A -___________ is more specific than a RFP?

Request for quotation

One buyer, usually an organization, wants to buy a product or a service. The buyer posts a request for quotation (RFQ) on its Web site or on a third-party Web site. The RFQ contains detailed information on the desired purchase. Suppliers study the RFQ and submit bids, and the lowest bid wins the auction.

Reverse Auctions Results in lower prices over time

Many database programs generate ____, which is a language that allows client workstations to communicate with servers and mainframe computers.

SQL

Software-as-a-service

SaaS. A software delivery model similar to a utility, in which application software is accessed via the internet without locally installed programs

Why do companies choose to develop software in-house?

Satisfy unique business requirements Minimize changes in business procedures and policies Meet constraints of existing systems Meet constraints of existing technology Develop internal resources and capabilities

____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Scalability

Where organizations sell their products or services to other organizations electronically from their own Web site and/or from a third-party Web site

Sell-side Marketplace examples include: Ariba Dell Auction BigboXX.com

Internet business services (IBS)

Services that provide powerful web-based support for transactions such as order processing, billing, and customer relationship management

Protocol

Set of languages, rules, and procedures that ensure accurate and efficient data exchange and coordination among hardware and software components

Sequence Diagram - Generic Form

Shows all possible sequences of interactions, that is, the sequences corresponding to all the scenarios of a use case.

Data Flow

Shows movement of data from one point to another. Described with a noun. Arrowhead indicates the flow direction. Represents data about a person, place, or thing.

Activity Diagram

Shows the conditional logic for the sequence of system activities needed to accomplish a business process.

Contain a chip called a microprocessor that can store a considerable amount of information and are multipurpose - can be used as a debit card, credit card or a stored-value money card.

Smart Cards

Mobile device

Smartphones, tablets, and other computing devices that are not permanently tethered to a desk. They connect to the network wirelessly

Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ____, is changing the picture dramatically.

Software as a Service

____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.

Software as a Service

Software as a Service (SaaS)

Software deployment model in which an application is hosted as a service provided to customers over the Internet

Client/server architecture

Software design and deployment method that divides software into components that manage resources and components that use resources

Enterprise Resource Planning (ERP)

Software package that integrates the many functions of a business - sales & inventory - manufacturing & purchasing - human resources - order tracking & decision support

Middleware

Software that connects dissimilar applications and enables them to communicate and exchange data. For example, ________ can link a departmental database to a web server that can be accessed by client computers via the internet or a company intranet

Application software

Software that performs user or business specific tasks and is typically constructed as an app or web-based application

Companies that develop software for sale are called what?

Software vendors

System Software

Software, such as Web server software, and works behind the scenes is called what?

Business rules

Specifications that preserve the integrity of the logical data model.

Overlap rule

Specifies that an entity instance can simultaneously be a member of two (or more) subtypes.

Partial specialization rule

Specifies that an entity instance of the supertype does not have to belong to any subtype.

standard notation format

Starts with the name of the table, followed by a parenthetical expression that contains the field names separated by commas. The primary key field(s) is underlined, like this: NAME (FIELD 1, FIELD 2, FIELD 3)

The Software Acquisition process

Step 1: Evaluate the Information System Requirements Step 2: Identify potential vendors or outsourcing options Step 3: Evaluate the alternatives Step 4: Perform Cost-Benefit analysis Step 5: Prepare a recommendation Step 6: Implement the Solution

Allow you to store a fixed amount of prepaid money and then spend it as necessary.

Stored-value Money Card

B) data flow

Student data contained on an enrollment form is represented on a data flow diagram as a: A) process B) data flow C) source D) data store

Evaluation Model

Technique that uses a common yardstick to measure and compare vendors.

Template-Based HTML

Templates to display and process common attributes of higher-level, more abstract items.

Hyperlink

The URL of one web resource is embedded within another web resource

False

The Web is the highway over which messages and information travel from network to network.​

International Organization for Standardization

The ____________ ____________ __ _______________requires a format of four digits for the year, two for the month, and two for the day (YYYYMMDD)

C) functional decomposition

The act of going from a single system to several component processes refers to: A) structuring B) balancing C) functional decomposition D) formatting

External systems and technology architecture.

The activity of Describing the Environment consists of what two key elements?​

Make or buy

The choice between developing in-house software and purchasing software Also called build or buy

Schema

The complete definition of a database, including descriptions of all fields, tables and relationships is called a schema

Balancing

The conservation of inputs and outputs to a DFD process when that process is decomposed to a lower level

B) balancing

The conservation of inputs and outputs to a data flow diagram process when that process is decomposed to a lower level defines: A) decomposition B) balancing C) conservation D) data flow structuring

Usability

The degree to which a system is easy to learn and use

B) what you learned during requirements determination

The deliverables of process modeling state: A) how you should develop the system during physical design B) what you learned during requirements determination C) how you should implement the new system during implementation D) what you learned during project planning

A) context diagram

The diagram that shows the scope of the system, indicating what elements are inside and which are outside the system, is called a: A) context diagram B) level-2 diagram C) referencing diagram D) representative diagram

Level 0 diagram

The explosion (or decomposition) of a context-level data ow diagram that shows from three to nine major processes, important data flows, and data stores of the system under study.

DFD completeness

The extent to which all necessary components of a DFD have been included and fully described

B) DFD completeness

The extent to which all necessary components of a data flow diagram have been included and fully described refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility

DFD consistency

The extent to which information contained on one level of a set of nested DFDs is also included on other levels.

A) DFD consistency

The extent to which information contained on one level of a set of nested data flow diagrams is also included on other levels refers to: A) DFD consistency B) DFD completeness C) DFD gap proofing D) DFD flexibility

Internet Backbone Network

The high-speed, high capacity network that interconnects regions, countries, and continents.

Context Diagram

The highest level in a data flow diagram. Contains only one process, representing the entire system. The process is given the number 0. All external entities, as well as major data flows are shown.

Minimal Guarantee

The least amount promised to the stakeholder by a use case

Minimal guarantee

The least amount promised to the stakeholder by a use case.

D) primitive data flow diagrams

The lowest level of DFDs is called: A) level-0 diagrams B) context diagrams C) level-1 diagrams D) primitive data flow diagrams

Context-level diagram flow diagram

The most basic data flow diagram of an organization showing how processes transform incoming data into outgoing information. Also called an environmental model.

context level data flow diagram

The most basic data flow diagram of an organization showing how processes transform incoming data into outgoing information. Also called an environmental model.

Cardinality

The number of instances of entity B that can (or must) be associated with each instance of entity A.

Cardinality

The numeric relationship between two entities, shows how instances of one entity relate to instances of another entity

A) source/sink

The origin and/or destination of data, sometimes referred to as external entities defines: A) source/sink B) data store C) data flow D) process

Source/sink

The origin and/or destination of data; sometimes referred to as external entities.

Source/sink

The origin and/or destination of data; sometimes referred to as external entitiies

Business process outsourcing (BPO)

The outsourcing of basic business process

A) action stubs

The part of a decision table that lists the actions that result for a given set of conditions is called: A) action stubs B) condition stubs C) rule section D) condition execution

B) condition stubs

The part of a decision table that lists the actions that result for a given set of conditions is called: A) action stubs B) condition stubs C) rule section D) condition execution

Action stubs

The part of a decision table that lists the actions that result for a given set of conditions.

Condition stubs

The part of a decision table that lists the conditions relevant to the decision.

C) rules

The part of a decision table that specifies which actions are to be followed for a given set of conditions refers to: A) action stubs B) condition list C) rules D) decision list

Rules

The part of a decision table that specifies which actions are to be followed for a given set of conditions.

View layer

The part of a three layer architecture that contains the user interface

Data layer

The part of a three layer architecture that interacts with the data

Database Administrator (DBA)

The person in charge of the safety and operation of the DBMS

Data Administrator (DA)

The person in charge of the structure and integrity of the data

Global outsourcing

The practice of shifting IT development, support, and operations to other countries

Offshore outsourcing

The practice of shifting IT development, support, and operations to other countries. Not global

False

The primary benefit of a network diagram, is to show the network cabling and the network routers.​

D) gap analysis

The process in analysis in which the analyst tries to discover discrepancies between two or more sets of data flow diagrams, representing two or more states of an information system, or discrepancies within a single DFD, is referred to as: A) double checking B) sequencing C) referencing D) gap analysis

Normalization

The process of creating table designs by assigning specific attributes to each table in the database

Gap analysis

The process of discovering discrepancies between two or more sets of DFDs or discrepancies within a single DFD

Gap analysis

The process of discovering discrepancies between two or more sets of DFDs or discrepancies within a single DFD.

Domain

The set of all data types and values that an attribute can assume.

Extension

The set of behaviors or functions in a use case that follow exceptions to the main success scenario.

Extension

The set of behaviours or functions in a use case that follow exceptions to the main success scenario.

Application Architecture

The set of information systems the organization needs to support its operations.

World Wide Web

The set of resources that can be accessed over the Internet is referred to what?

Field

The smallest unit of named application data recognized by system software.

Data Type

The storage format and allowable content of a program variable, class attribute, or relational database field

D) a rectangle with rounded edges

The symbol for an activity is: A) a square B) a circle C) an arrow D) a rectangle with rounded edges

Database lock

The technique of applying exclusive control to a part of the database so the one use at a time can use the data

Breadcrumbs (navigation)

The technique of displaying the sequence of pages traversed to allow easy backing out to a previous page

Outsourcing

The transfer of information systems development, operation or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.

Outsourcing

The transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis

What is outsourcing?

The transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis

D) process

The work or actions performed on data so that they are transformed, stored, or distributed defines: A) source/sink B) data store C) data flow D) process

Process

The work or actions performed on data so that they are transformed, stored, or distributed.

Outsourcing

Transfer of information systems development, operation, or maintenance to an outside firm.

A rectangle with rounded corners is used to show the occurrence of a transforming process.

True

A(n) fixed price contract provides for a stable customer price, but requirements will be well defined by the outsourcer at the beginning of the contract period.

True

An advantage of outsourcing the application development process is that the organization may acquire technical skills and functional knowledge from the vendor.

True

An object wrapper creates an application program interface (API) to a legacy system, enabling object-oriented systems to interact with it.

True

Each external entity is labeled with a noun.

True

Information is the major component of the e-commerce offerings of service industries. True False

True

The data flow diagram graphically characterizes data processes and flows in a business system.

True

The key mechanisms in the sell-side marketplace are customized electronic catalogs and forward auctions. True False

True

The physical architecture layer addresses how the software will execute on specific computers and networks.

True

The primary characteristic of auctions is that prices are determined dynamically by competitive bidding. True False

True

The three primary types of contracts that can be drawn to control the outsourcing deal are (1) a time and arrangements contract, (2) a fixed-price contract, and (3) a value-added contract.

True

Unbalanced decomposition means that the data flow to or from parent process does not match the data flow in or out of a child diagram.

True

Synonym

Two different names that are used for the same attribute.

Tables (Relations)

Two-Dimensional data structures consisting of columns and rows

users

Typically work with predefined queries and switchboard commands, but also use query languages to access stored data

Uniform resource locator

URL. Identifier of a web resource containing a protocol header, server name or address, and resource name

When the data flow in and out of a parent process do not match the data flow in or out of a child diagram, it is called:

Unbalanced Decomposition

Database Synchronization

Updating one database copy with changes made to other database copies

block sequence codes

Use blocks of numbers for different classifications 100-level courses are freshman-level 200-level courses are sophomore-level

Request for quotation (RFQ)

Used to obtain a price quotation or bid on a specific product or package

Ux

User experience. All aspects of a person's interaction with a software application, including actions, responses, perceptions, and feelings

User Application

Utilizes standard business software (Ex. Microsoft), which has been configured in a specific manner to enhance user productivity. Some user applications have powerful "screen generators" or "report generators" that allow users to design their own data entry forms and reports.

A firm that enhances a commercial package by adding custom features and configuring it for a particular industry is called what?

Value-added reseller

In what type of e-commerce business model do receivers send information about your product to their friends

Viral marketing

Companies engaged only in E-Commerce (also called pure play)

Virtual Organizations

VPN

Virtual private Network. Secure communication over the internet using technologies that reliably identify senders and recipients and encrypt Network messages sent among them

The ____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.

Web 2.0

What are three examples of evolving trends in the IT world?

Web 2.0 Cloud Computing Mobile Devices

Middleware

Web based software usually requires additional layers, called middleware, to communicate with existing software and systems.

cascading style sheets (CSS)

Web page encoding standard that enables a Web site designer to specify parts of a page that will always look the same and parts that will vary by task or audience

Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment.

Web-based

Success Guarantee

What a use case must do effectively in order to satisfy stakeholders.

Success guarantee

What a use case must do effectively in order to satisfy stakeholders.

Local Area Network

What does LAN stand for?​

Extensible Markup Language

What does XML stand for?​

data element (or item)

What is a field also called?

HTTP is less secure, while HTTPS would be used for credit card transactions.

What is the difference between HTTP and HTTPS?​

HTML5

What is the latest version of HTML?​ (As of 2016)

Functionally primitive

When a process is not exploded. Also referred to as a primitive process.

D) limited entry

When condition values are either "yes" or "no", these values are called a(n): A) extended entry B) simple entry C) complex entry D) limited entry

C) primitive data flow diagrams

When you believe that you have shown each business form or transaction, computer screen, and report as a single data flow, you have probably reached the: A) level-0 diagrams B) level-1 diagrams C) primitive data flow diagrams D) level-3 diagrams

C) A data store has a noun phrase label.

Which of the following is a true statement regarding a data store? A) Data can move directly from one data store to another data store. B) Data can move directly from a sink to a data store. C) A data store has a noun phrase label. D) Data can move from an outside source to a data store.

D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.

Which of the following is a true statement regarding data flows? A) A data flow may have multiple directions between symbols. B) A data flow to a data store means retrieve or use. C) A data flow from a data store means update. D) A join in a data flow means that exactly the same data comes from any of two or more different processes, data stores, or sources/sinks to a common location.

D) none of the above

Which of the following is considered when diagramming? A) the interactions occurring between sources and sinks B) how to provide sources and sinks direct access to stored data C) how to control or redesign a source or sink D) none of the above

C) Composite data flows on one level cannot be split into component data flows at the next level.

Which of the following is not an advanced rule governing data flow diagramming? A) To avoid having data flow lines cross each other, data stores may be repeated on a DFD. B) At the lowest level of DFDs, new data flows may be added to represent data that are transmitted under exceptional conditions. C) Composite data flows on one level cannot be split into component data flows at the next level. D) The inputs to a process must be sufficient to produce the outputs from the process.

D) state-transition diagram

Which of the following is not one of the primary deliverables resulting from studying and documenting a system's processes? A) context data flow diagram (DFD) B) thorough descriptions of each DFD component C) DFDs of the current logical system D) state-transition diagram

Extensible markup language

XML. An HTML extension that enables the meaning of words phrases or numbers to be defined

data mining

____ ________ Looks for meaningful data patterns and relationships in large amounts of data

physical storage

_______ _______ is strictly hardware-related because it involves the process of reading and writing binary data to physical media such as a hard drive, CD-ROM, or network-based storage device

logical storage

_______ _______ refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored

Level-0 diagram

a DFD that represents a system's major processes, data flows and data stores at a high level of detail

Level-0 diagram

a DFD that represents a system's major processes, data flows, and data stores at a high level of detail

service desk

a centralized resource staffed by IT pros that provides users with the support they need to do their jobs - help desk

build or buy

a choice between developing in house software and purchasing software, often called a build or buy, or make or buy, decision

three-layer architecture

a client/server architecture that divides an application into view layer, business logic layer, and data layer

database management system

a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data

server

a computer or group of computers that manages shared resources such as file systems, databases, and Web sites, and enables users and other computers to access those resources over a network

payback analysis

a determination of how long it takes an info system to pay for itself through reduced costs and increased benefits

software requirements specification

a document that contains the requirements for the new system, describes the alteratives that were considered, and makes a specific recommendation to management. it is the end product of the system analysis phase.

information center

a facility that supports users by training them on application software. user support specialists answer questions, troubleshoot problems, and serve as a clearinghouse for user problems and solutions

application service provider

a firm that delivers a software application, or access to an application, by charging a usage or subscription fee

value added reseller

a firm that enhances a commercial package by adding customer features configuring it for a particular industry

service provider

a firm that offers outsourcing solutions - application service providers and internet business services

radio buttons

a group of choices from which the user selects only one; the system then automatically turns off all other buttons in the group

evaluation and selection team

a group of people involved in selecting hardware and software. the group includes systems analysts and users. a team approach ensures that critical factors are not overlooked and that a sound choice is made

internet backbone network

a high-capacity and high-speed computer network that carries a large amounts of internet traffic across regions, countries, and continents

SQL (structured query language)

a language that allows client workstations to communicate with servers and mainframe cmputers

software license

a legal agreement that gives users the right to use the software under certain terms and conditions

individual matching

a matching technique in which each participant is matched with another participant on selected variables

yoked control

a matching technique that matches participants on the basis of the temporal sequence of administering an event

Decision table

a matrix representation of the logic of a decision; it specifies the possible conditions for the decision and the resulting actions

benchmark

a measure of time a package takes to process a certain number of transactions

think-aloud technique

a method that requires participants to verbalize their thoughts as they are performing the experiment

blind technique

a method whereby knowledge of each research participant's treatment condition is kept from the experimenter

partial blind technique

a method whereby knowledge of each research participant's treatment condition is kept from the experimenter through as many stages of the experiment as possible

software as a service

a model of software delivery in which functionality is delivered on demand as a network accessible service, rather than as a traditional software application that is downloaded and installed on the customer's computer

network program

a model that shows how locations and hardware components are inter-connected with network devices and wiring

Data flow diagram (DFD)

a picture of the movement of data between external entities and the processes and data stores within a system

Hypertext Transfer Protocol (HTTP)

a protocol that defines the format and content of requests for Web documents and related data communication

text box

a rectangular box that accepts text typed on a keyboard or recognized from speech input

web 2.0

a second generation of the web that enables people to collaborate, interact, and share info much more dynamically, based on continually available user applications rather than by HTML webpages. interaction experience is a hallmark of web 2.0

order effect

a sequencing effect arising from the order in which the treatment conditions are administered to participants

carryover effect

a sequencing effect that occurs when performance in one treatment condition affects performance in another treatment condition

transaction model

a service model that charges a variable fee for an application based on the volume of transactions or operations performed by the application - usage model

protocol

a set of languages, rules, and procedures that ensure accurate and efficient data exchange and coordination among hardware and software components

repeating group

a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values

Protocol

a set of rules and procedures for control of communications in a network

local area network (LAN)

a small computer network typically spanning a single home, small office, or one floor of a building.

software as a service (SaaS)

a software delivery model similar to a utility, in which application software is accessed via the internet without locally installed programs

horizontal application

a software package that can be used by many different types of organizations

vertical application

a software package that has been developed to handle information for a specific type of business

maintenance agreement

a specification of the conditions, charges, and time frame for users to contact the vendor for assistance when they have system problems or questions

third normal form

a table design is in _____ ______ ____ if every non-key field depends on the key, the whole key, and nothing but the key

second normal form

a table design is in ______ ______ _____ if it is in 1NF and if all fields that are not part of the primary key are functionally dependent on the entire primary key

unnormalized

a table design that contains a repeating group is called ____________

combo box

a text box that contains a predefined list of acceptable entries but permits the user to enter a new value when the list doesn't contain the desired value

differential carryover effect

a treatment condition affects participants' performance in a later condition in one way and in another when followed by a different condition

service oriented architecture

a way of engineering systems in which reusable business functionality is provided by services through well defined interfaces.

Unified Modeling Language

a widely used method of visualizing and documenting software systems design

request for proposal

a written list of features and specifications given to prospective vendors before a specific product or package has been selected

one-to-many relationship

abbreviated 1:M, exists when one occurrence of the first entity can relate to many instances of the second entity, but each instance of the second entity can associate with only one instance of the first entity

many-to-many relationship

abbreviated M:N, exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity

business logic layer

also known as the domain layer, the part of a three-layer architecture that contains the programs that implement the business rules and processes

Extensible Markup Language (XML)

an HTML extension that enables the meaning of words, phrases, or numbers to be defined

entity

an ______is a person, place, thing, or event for which data is collected and maintained

open database connectivity

an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data

in house software

an information center or help desk within the IT department responsible for providing user support and offering services such as hotline assistance, training, and guidance to users who need technical help

screen generator

an interactive tool that helps design a custom interface, create screen forms, and handle data entry format and procedures - also called form painter

World Wide Web (WWW)

an interconnected set of resources accessed via the internet

postexperimental inquiry

an interview of the participant after the experiment is over

Functional decompoition

an iterative process of breaking the description of a system down into finer and finer detail, which creates a set of charts in which one process on a given chart is explained in greater detail on another chart

newsgroup

an online discussion on a particular topic, where people meet, offer support, and exchange ideas - also called forum

app

application software that is installed on the storage device of a computer or cell phone

Web-based application

application software that uses a Web browser as the user interface, has a URL for application access, uses a Web server and server-side software components, and uses Web standards for communication between Web browser and server

Enterprise Software

applications that address the needs of multiple users throughout an organization or work group

report generator

atool for designing formatted reports rapidly - also called report writer

The design phase of the SDLC creates a(n) _____.

blueprint for the future system

XML tags

character sequences (such as and ) that define the beginning, end, and meaning of the text that appears between them

software vendor

company that develops software for sale

Routers

computing devices that connect networks and exchange data between them

table (file)

contains a set of related records that store data about a specific entity

usability

degree to which a system is easy to learn and use

cardinality

describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity

user-centered design

design techniques that embody the view that theuser interface is the entire system

complete counterbalancing

enumerating all possible sequences and requriing different groups of participants to take each of the sequences

incomplete counterbalancing

enumerating fewer than all possible sequences and requiring different groups of participants to take each of the sequences

Extensible Markup Language (XML)

extension of HTML that embeds self-defining data structures within textual Messages

turnaround documents

external outputs that includes one or more parts intended to be returned with new data or information

human-computer interaction (HCI)

field of study concerned with the efficiency and effectiveness of user interfaces vis-à-vis computer systems, human-oriented input and output technology, and psychological aspects of user interfaces

Software as a Service (SaaS)

firm subscribes to a third-party software and receives a service that is delivered online

When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.

fixed fee model

In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

foreign key

sacrifice groups

groups of participants who are stopped and interviewed at different stages of the experiment

The layer that keeps the user interface implementation separate from the application or problem domain classes is the _____ layer.

human-computer interaction

Uniform Resources Locator (URL)

identifier of a Web resource containing a protocol header, server name or address, and resource name

method of difference

if groups are equivalent every variable except for one, then that one variable is the cause of the difference between the groups

Indifferent condition

in a decision table, a condition whose value does not affect which actions are taken for two or more rules

Indifferent condition

in a decision table, a condition whose value does not affect which actions are taken for two or more rules.

There are three methods to create a new system. They are ___.

in-house custom application, buy a package, and external vender

The following are all classic design mistakes EXCEPT _____.

including design time

record (tuple)

is a set of related fields that describes one instance, or occurrence, of an entity, such as one customer, one order, or one product

The following are all strengths of a custom development design strategy EXCEPT ___.

lower risk

database administrator

manages a DBMS, assesses overall requirements and maintains the database for the benefit of the entire organization rather than a single department or user

Server

manages shared resources & enables users and other computers access to these resources

A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.

manipulation

scalability

means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise

document metaphor

metaphor in which data is visually represented as paper pages or forms

direct manipulation metaphor

metaphor in which objects on a display are manipulated to look like physical objects (pictures) or graphic symbols that represent them (icons)

desktop metaphor

metaphor in which the visual display is organized into distinct regions, with a large empty workspace in the middle and a collection of tool icons around the perimeter

dialog metaphor

metaphor in which user and computer accomplish a task by engaging in a conversation or dialog via text, voice, or tools such as labeled buttons

To bridge the gap between a database and the Web and enable data to be viewed and updated, it is necessary to use ____, which is software that integrates different applications and allows them to exchange data.

middleware

Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.

middleware

To avoid the classic design mistake of "silver bullet syndrome," the analyst should ___.

not use a design tool that appears too good to be true

concurrent probing

obtaining a participant's perceptions of the experiment after completion of each trial

Internet Backbone

owned by governments & telecom companies

The ___ layer addresses how the software will execute on specific computers and networks.

physical architecture

In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

primary key

user application

programs that utilize standard business software, such as Microsoft office, which has been configured in a specific manner to enhance user productivity

A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

query language

random assignment

randomly assigning a sample of individuals to a specific number of comparison groups

audit log files

record details of all accesses and changes to the file or database and can be used to recover changes made since the last backup

In an entity-relationship diagram, entities are represented as ____.

rectangles

One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.

referential

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.

schema

virtual private network (VPN)

secure communication over the Internet using technologies that reliably identify senders and recipients and encrypt network messages sent among them.

mobile device

smartphones, tablets, and other computing devices that are not permanently tethered to a desk

table design

specifies the fields and identifies the primary key in a particular table or file

Amdahl's Law

systems speed is determined by its slowest component or the last mile

hyperlink

the URL of one Web resource is embedded within another Web resource

interoperability

the ability of a component or system to interact with other components or systems

The decision on which design strategy to use depends on ___.

the expertise of the project manager, how unique the business need is, the amount of in-house experience, the urgency of the project

DFD consistency

the extent to which information contained on one level of a set of nested DFD's is also included on other levels

Source/sink

the origin and/or destination of data; sometimes referred to as external entities

business process outsourcing

the outsourcing of a basic business process

Condition stubs

the part of a decision table that lists the conditions relevant to the decision

Action stub

the part of a decision table that specifies which actions are to be followed for a given set of conditions

view layer

the part of a three-layer architecture that contains the user interface

global outsourcing

the practice of shifting IT development, support, and operations to other countries

offshore outsourcing

the practice of shifting IT development, support, and operations to other countries

automation

the technique of totally automating the experimental procedures so that no experimenter participant interaction is required

absolute date

the total number of days from some specific base date

net present value

the total value of the benefits minus the costs, with both the costs and benefits being adjusted to relflect the point in time at which they occur

outsourcing

the transfer of info systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temp or long term basis

Attribute Value

the value held in a single table cell.

What is the primary objective of the evaluation and selection team?

to eliminate system alternatives that will not meet requirements, rank the alternatives that are feasible, and present the viable alternatives to management for a final decision

alphabetic codes

use alphabet letters to distinguish one item from another based on a category, an abbreviation, or an easy to remember value, called a mnemonic code

use case

use case summarizes an event and has a similar format to process specifications

request for quotation

used to obtain a price quote or bid on a specific product or package

A ___________ utilizes standard business software, such as word or excel, which has been configured in a specific manner to enhance user productivity

user application

drill down

user-interface design technique that enables a user to select summary information and view supporting detail

visibility

when a control is visible so that users know it is available, the control providing immediate feedback to indicate that it is responding to the user

peer-to-peer connection

when independent computers communicate and share resources without the need of a centralized server computer

differential influence

when the influence of an extraneous variable is different for the various groups

Transmission Control Protocol (TCP)

works at both ends of internet communications to ensure perfect copies of messages are sent


Related study sets

Peds Final Exam Practice Questions

View Set

Ch 14 Accounts Payable and Other Liabilities

View Set

Chapter 36: NATIONALISM AND POLITICAL IDENTITIES IN ASIA, AFRICA, AND LATIN AMERICA

View Set

Major concepts for Unit 5 AP HuG

View Set

Exam : Sexual Harassment for Employees-California

View Set

Practice for Adaptive Quiz 4: Elimination

View Set