IS5803 WEEK 6 Solution’s

1. ____ is a model of software deployment in which an application is hosted as a service provided to customers over the Internet. A. Software as a service

    2. ____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise. A. Scalability

    3. ____ prevents unauthorized users from creating, modifying, or deleting information. A. Integrity

    4. _____ describes the degree of interdependence among modules. A. Coupling

    5. _____ describes the degree of interdependence among modules. A. Coupling

     6. _____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design A. Enterprise resource planning

    7. _____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows. A. Flowcharts

    8. _____ involves more risk than other changeover methods. A. Direct cutover

    9. _____ involves more risk than other changeover methods. A. Direct cutover

    10. ____ involves more risk than other changeover methods. A. Direct cutover

    11. _____ is the process of constructing the programs and code modules that serve as the building blocks of an information system. A. Application development

    12. _____ is the process of putting a new information system online and retiring the old system. A. System changeover

    13. _____ is the process of putting a new information system online and retiring the old system. A. System changeover

    14. _____ is the process of reviewing a program code to spot logic errors, which produce incorrect results. A. Desk checking

    15. _____ is the process of reviewing program code to spot logic errors, which produce incorrect results. A. Desk checking

    16. _____ is the process of tracking system releases. A. Version control

    17. _____ measures a module’s scope and processing characteristics. A. Cohesion

    18. _____ measures a module’s scope and processing characteristics. A. Cohesion

    19. _____ measures a module’s scope and processing characteristics. A. Cohesion

    20. _____ requires that a software supplier document all testing and maintain records of test results. A. The International Organization for Standardization (ISO)

    21. _____ requires that a software supplier document all testing and maintain records of test results. A. International Organization for Standardization, ISO

    22. A _____ consists of related program code organized into small units that are easy to understand and maintain. A. module

    23. A _____ consists of related program code organized into small units that are easy to understand and maintain. A. module

    24. A _____ controls database operations, including storing, retrieving, updating, and deleting data. A. data manipulation

    25.  A _____ is a document that describes a company, lists the IT services or products needed, and specifies the features required A. request for proposal

    26.  A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location. A. Wireless inexpensive to install and is well suited to workgroups and users who are not anchored to a specific desk or location

    27. A class diagram includes the class _____, which describe the characteristics of objects in the class. A. attributes

    28. A class diagram includes the class _____, which describe the characteristics of objects in the class. A. attributes

    29. A class diagram includes the class _____, which represent the program logic.  A. methods

    30. A class diagram includes the class _____, which represent the program logic. A. methods

    31. A combination check is a data validation rule that tests to ensure that a data item fits the required data type A. false: data type check

    32. A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service. A. True

    33. A data validation rule improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. A. combination check

    34. A flag module is reusable code and can be invoked from more than one point in the chart. A. False, library

    35. A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power. A. Bluetooth36

    36. A help desk can boost its productivity by using _____, which allows IT staff to take over a user’s workstation and provide support and troubleshooting. A. remote control software

    37. A kernel consists of related program code organized into small units that are easy to understand and maintain. A. False, module

    38. A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages A. platform

    39.  A patch is a specially written software module that provides temporary repairs so operations can resume. A. True

    40. A secure system includes _____ that can log every instance of data entry and changes A. audit trails

    41. A separate test environment is necessary to maintain system security and integrity and protect this kind of environment. A. Operational

    42. A software package developed to handle information requirements for a specific type of business is called a(n) _____. A. Horizontal application

    43. A software package that can be used by many different types of organizations is called a(n) _____. A. vertical application

    44. A subschema is a view of the database used by one or more systems or users A. True

    45. A system in its final stages requires corrective maintenance only to keep the system operational. A. True

    46. A test site is an alternate IT location, anywhere in the world, that can support critical systems in the event of a power outage, system crash, or physical catastrophe. A. false

    47. A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness. A. Usability

    48. A(n) _____ is a data validation rule that can be used for data items that must have certain values. A. data type check

    49. A(n) _____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device. A. podcast

    50. A(n) _____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device. A. podcast

    51. Access to the operational environment is limited to _____ and must strictly be controlled. A. users

    52. After a systems analyst documents the system’s requirements, he or she breaks the system down into subsystems and modules in a process called scaling. A. False, partitioning

    53.  After completing integration testing, a systems analyst must perform _____, which involves the entire information system and includes all typical processing situations. A. system testing

    54. After completing integration testing, a systems analyst must perform _____, which involves the entire information system and includes all typical processing situations. A. system testing

    55. After completing integration testing, a systems analyst must perform _____, which involves the entire information system and includes all typical processing situations. A. system testing

    56. Agile projects use various iterative and incremental models. A. True

    57. Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team.  A. True

    58. Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team. A. True

    59. Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team. A. True

    60. Although programmers perform the actual coding, IT managers usually assign systems analysts to work with them as part of a team. A. True

    61. Another of George’s clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat? A. Technical obsolescence

    62. Any field that is not a primary key or a candidate key is called a _____. A. non-key field

    63. As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational. A. direct cutover

    64. As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period. A. Parallel operation

    65. As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period. A. parallel operation

    66. As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system at a selected location of the company. A. pilot operation

    67. As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period. A. Parallel operation

    68 Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup. A. True

    69. By designing a system in-house, companies can develop and train an IT staff that understands the organization’s business functions and information support needs. A. True

    70. By the time the final design presentation is delivered, all necessary approvals should have been obtained from prior presentations, and the users and IT department should be onboard. A. True

    71. Ch12. _____ is the overall time between a request for system activity and the delivery of the response A. Response time

    72. Cloud computing can be viewed as an online SaaS and data environment A. True

    73. Cohesion describes the degree of interdependence among modules. A. False, coupling

    75. Commercial software packages must undergo unit and integration testing similar to that of in-house developed systems, although system testing usually is not performed. A. False, other way around

    76. Compared with software developed in-house, a software package is almost always more expensive. A. False

    77. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors. A. True

    78. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors. A. True

    79. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors. A. True

    80. Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors. A. True

    81. Critics of agile development often claim that because it focuses on quick iterations and fast releases, it lacks discipline and produces systems of questionable quality. A. True

    82. Critics of agile development often claim that because it focuses on quick iterations and fast releases, it lacks discipline and produces systems of questionable quality. A. True

    83. Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned. A. False

    84. Data conversion is easier when a new system replaces a manual system because all data can be entered manually, unless it must be scanned. A. False, more difficult

    85. Depending on the system, this can be done before, during, or after the operational environment is complete. A. Data conversion

    86. During _____, existing data is loaded into the new system. A. data conversion

    87. During _____, existing data is loaded into the new system. A. data conversion

    88. During _____, programmers must test programs that interact with other programs and files separately before they are integrated into the system. A. unit testing

    89. During _____, programmers must test programs that interact with other programs and files separately before they are integrated into the system. A. Unit testing

    90. During the systems design phase, _____ are used to organize, access, and maintain data structures. A. Key fields

    91. Effective online documentation is an important productivity tool because it empowers users and reduces the time that IT staff members must spend in providing telephone, email, or face-to-face assistance. A. True

    92. George’s firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George’s responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories. A. Extortion

    93. Human-computer interaction (HCI) describes the relationship between computers and the people who use them to perform their jobs A. Describes the relationship between computers and people who use them to perform their jobs

    94. If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor. A. Supplemental maintenance agreement

    95. If modules are loosely coupled , one module is linked to internal logic contained in another module. A. False

    96. If modules are loosely coupled, one module is linked to internal logic contained in another module. A. False, tightly

    97. In _____, two programmers work on the same task on the same computer; one drives while the other navigates. A. pair programming

    98. In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group. A. command button

    99. In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key A. False

    100. In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another A. status flag

    101. In a structure chart, a control couple shows a message, also called ___, which one module sends to another. A. Flag

    102. In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another A. status flag

    103. In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated. A. loop

    104. In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated A. loop

    105. In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control module determines which subordinate modules will be invoked. A. condition

    106. In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control module determines which subordinate modules will be invoked. A. condition

    107. In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. A. stub testing

    108. In a traditional systems development environment, security issues usually are less complex than with web-based systems, because the system operates on a private company network, rather than the Internet  A. True

    109. In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included. A. design walk-through

    110. In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included. A. Design walk-through

    111. In agile application development, this specifies when user stories will be implemented. A. Release plan

    112. In sequence, the four steps typically followed to create a structure chart are _____. A. reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart and the data dictionary

    113. In sequence, the steps typically followed to create a structure chart are _____. A. reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart

    114. In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables. A. foreign key

    115. In the given figure, a higher-level module, called a _____, directs lower-level modules. A. control module

    116. ISO requires a specific development plan, which outlines a step-by-step process for transforming user requirements into a finished product. A. True

    117. It is the process of turning program logic into specific instructions that a computer system can execute. A. Coding

    118. Lisa and her team have finished the coding of a new application, and they are ready to begin testing. She asks Tina, a senior software tester, for help in designing the types of tests that Lisa and her team should perform. A. integration testing

    119. Lisa and her team have finished the coding of a new application, and they are ready to begin testing. She asks Tina, a senior software tester, for help in designing the types of tests that Lisa and her team should perform. Tina also recommends that Lisa test groups of programs that depend on each other to confirm that they work together correctly. What is one of the names of this type of testing? A. Integration testing

    120. Lisa mentions that one program has been developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process? A. sub testing

    121. Many organizations require a more formal type of desk checking called _____. A. a structured walk-through

    122. Many organizations require a more formal type of desk checking called _____. A. Structured walk-through, code review

    123. Many organizations require a more formal type of desk checking called _____. A. structured walkthrough

    124. Meshing is the process of turning program logic into specific instructions that the computer system can execute. A. False, coding

    125. Modules that are independent are tightly coupled. A. False, loosely

    126. Most webinars are web-based broadcasts that allow a user to download multimedia files to a PC or portable device. A. False, podcast

    127. Operations documentation _____. A. contains all the information needed for processing and distributing online and printed output

    128. Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time. A. False

    129. Podcasts can be prescheduled, made available on demand, or delivered as automatic updates, depending on a user’s preference. A. True

    130. Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. A. The client has a number of very distinctive security requirements

    131. Program documentation _____. A. describes the inputs, outputs, and processing logic for all program modules

    132. Program documentation describes the system’s functions and how they are implemented. A. False, system

    133. Pseudocode is a technique for representing program logic A. True

    134. Roger is part of a team that is responsible for employing a new information system, the design of which was developed using customary structured methods. To manage the intricacy of the application development process, Roger wants to deploy structured development techniques, and he asks Pete, his coworker, for information about these techniques. Pete tells him about structure charts, which show program modules and the relationships among them using various graphical symbols. Roger enquires Pete on how to represent the fact that one program module (a control module) determines subordinate modules that will be invoked. Pete tells him that he can use a condition. What symbol is used for a condition? A. line with a diamond on one end

    135. Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure. A. top-down approach

    136. Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called _____. A. acceptance tests

    137. System developers use _____ to document and trail program defects, code changes, and replacement code. A. bug tracking software

    138. Testing two or more programs that depend on each other is called _____ A. integration testing

    139. The _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational. A. Direct cutover

    140. The environment for the actual system operation is called the ____ A. production environment

    141. The environment for the actual system operation is called the _____. A. production environment

    142. The main objective of _____ is to avoid problems or to identify them as soon as possible. A. quality assurance

    143. The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking. A. unit testing

    144. The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking. A. unit testing

    145. The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits. A. True

    146. The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits. A. True

    147. The principles of cohesion and coupling do not apply to object-oriented O-O application development. A. False, do

    148. The skill set required to develop documentation usually is the same as that required to develop a system. A. False?

    149. The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and systems development into a much larger framework. A. Capability Maturity Model Integration (CMMI)

    150. This approach is also called modular design, and it is similar to constructing a leveled set of data flow diagrams (DFDs). A. Top-down

    151. This documentation describes the inputs, outputs, and processing logic for all program modules. A. Program

    152. This is not language-specific and can be used to describe a software module in plain English without requiring strict syntax rules. A. Pseudocode

    153. This kind of operation is an inappropriate changeover method when two systems perform different functions or if a new system involves a new method of business operations. A. Parallel

    154. This should be considered early in the systems development process. A. Training plan

    155. To achieve better, faster, and less expensive methods of software development, the _____ designed the Capability Maturity Model (CMM), which improves quality, reduces development time, and cuts costs. A. Software Engineering Institute (SEI)

    156. User documentation _____ .A. consists of instructions and information for users who will interact with the system

    157. User documentation _____ A. consists of instructions and information to users who will interact with the system

    158. Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others. A. train-the-trainer

    159. Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others. A. Train-the-trainer

    160. Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others. A. Train the Trainer

    161. Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code. A. True

    162. Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code. A. True

    164. When developing a training program, which guideline should be kept in mind? A. Select the most effective place to conduct the training.

    165. When developing a training program, which guideline should be kept in mind? A. Select the most effective place to conduct the training.

    166. When developing a training program, which of the following guidelines should be kept in mind? A. Develop a single training program for distinct employee groups.
    Incorrect! Try Select the most effective place to conduct the training.

    167. When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled A. users

    168. When training is complete, many organizations conduct a full-scale test, or _____, which is a dress rehearsal for users and IT support staff. A. simulation

    169. Which is a reason why Priscilla would offer in-house software development? A. the client has a number of very distinctive security requirements

    170. Which is specified by the detailed procedures in a test plan? A. The test data to be used

    171. Which of the following is specified by the detailed procedures in a test plan? ​ A. How a separate operational and test environment is prepared? (Not sure) Incorrect!

    172. With this kind of operation, part of the system is given to all users. A. Phased

    173. XP is an agile development method. A. True

    Other Links:

    Statistics Quiz

    Networking Quiz

    See other websites for quiz:

    Check on QUIZLET

    Check on CHEGG

    Leave a Reply

    Your email address will not be published. Required fields are marked *