MIDTERM EXAM Flashcards

1
Q

With a report generator, users can control how a screen will display captions, data fields, data, and other visual attributes.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Widespread use of object-oriented languages has spurred interest in object-oriented (O-O) computer-aided systems engineering (CASE) and Unified Modeling Language (UML)-based modeling tools,
which can provide a seamless development sequence from planning to actual coding.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Although generic computer-aided systems engineering (CASE) tools can be used to plan and design any type of information system, it usually is easier to use an integrated development environment (IDE).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Carnegie Mellon University’s Software Engineering Institute (SEI) is a world leader in software engineering and development.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A drawback of a computer-aided systems engineering (CASE) environment is that it does not provide an overall framework for a developer to create a series of graphical models based on data available
in a central repository.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

One of the most vexing problems for computer-aided systems engineering (CASE) tools has always been integration.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a specific software environment, an integrated development tool is ineffective.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Using a forward engineering computer-aided systems engineering (CASE) tool, an analyst can transform existing application source code into a working model of the system.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Agile teams use only whiteboard sketching for drawing instead of modeling tools.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A code generator allows users to modify a report easily at any stage of the design process.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Once a data element has been defined in the repository, it can no longer be accessed and used by processes and other information systems.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Object-oriented development relies heavily on data flow diagrams (DFDs) and structure charts.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) _____ represents the steps in a specific business function or process.

A

use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ enable objects to communicate and interact as they perform business functions and transactions required by a system.

A

Relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a class diagram, each class appears as a(n) _____, with the class name at the top, followed by the class’s attributes and methods.

A

rectangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ describes how instances of one class relate to instances of another class.

A

Cardinality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An object has certain _____, which are characteristics that describe the object, such as the make, model, and color of a car.

A

attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.

A

Gantt chart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A _____ might involve maximums for one or more resources, such as time, dollars, or people.

A

constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Project reporting, an activity of a project manager, _____.

A

includes informing management, users, and the project team about the progress of a project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _____ represents the work that one person can complete in one day.

A

person-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

_____ give the project managers an opportunity to seek input and conduct brainstorming sessions.

A

Project status meetings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

_____, a free cloud-based project management tool, runs in a browser window, so there is no software to install to use it.

A

Gantter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Critical Thinking Questions

Mauricio, a project manager at a reputed firm, has been assigned to handle a new project that the firm has received. This project involves a lot of scheduling that has to be handled by Mauricio.

Mauricio estimates that the first module of the project could be completed in as few as 15 days or could take as many as 25 days, but most likely will require 20 days. What is the 20 day estimate called?

A

probable-case estimate (P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values.
type
26
The major benefit of _____ is that it gives a clear picture of current system functions before any modifications or improvements are made.
the four-model approach
27
Typical process description tools include _____.
decision trees
28
A data flow diagram (DFD) shows _____.
how a system transforms input data into useful information
29
Since diagram 0 is a(n) _____ version of process 0, it shows considerably more detail than a context diagram.
exploded
30
In a data flow diagram (DFD), a gray hole is a process that has _____.
at least one input and one output, but the input obviously is insufficient to generate the output shown
31
Among the symbols in the accompanying figure, a _____ receives input data and produces output that has a different content, form, or both.
process
32
In a data dictionary, a(n) _____ is the smallest piece of data that has meaning within an information system.
field
33
In a data flow diagram (DFD), the Gane and Sarson symbol for a process is a _____.
rectangle with rounded corners
34
The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.
computer resources committee
35
Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called _____.
project creep
36
_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.
Performance
37
Which is an example of a tangible benefit?
An online package tracking system that improves service and decreases the need for clerical staff
38
Hardware-based security controls include _____.
biometric devices
39
_____ includes ongoing support and maintenance costs, as well as acquisition costs.
TCO (total cost of ownership)
40
In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
class
41
During the _____ of the systems development life cycle (SDLC), a new system is constructed.
systems implementation phase
42
Transaction processing (TP) systems _____.
process data generated by day-to-day business operations
43
_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
Electronic data interchange (EDI)
44
A(n) _____ shows the data that flow in and out of system processes.
process model
45
_____ design and construct web pages, monitor traffic, manage hardware and software, and link web-based applications to a company’s information systems.
Web support specialists
46
Supporters of neutral locations for interviews believe that it _____.
keeps interruptions to a minimum so people can concentrate fully
47
Representing requirements deals with _____ the problem.
describing
48
When phrasing interview questions, a systems analyst should avoid _____ that suggest or favor a particular reply.
leading questions
49
To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.
scalability
50
Critical Thinking Questions Case 4-1 ​ John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder. There have been some rumblings within the firm that this development project is not necessary so John and others feel it is important to explain the reason for the project at the outset. Whose name goes next to this point on the agenda?
Tom
51
A _____ shows a logical structure, with all possible combinations of conditions and resulting actions.
decision table
52
In a data flow diagram (DFD), a black hole is a process that has _____
no output
53
A _____ documents the details of a functional primitive and represents a specific set of processing steps and business logic.
process description
54
A data dictionary specifies a data element’s _____, which is the set of values permitted for the data element.
domain
55
By showing processes as _____, an analyst can create data flow diagrams (DFDs) that show how the system functions but avoid unnecessary detail and clutter.
black boxes
56
The data dictionary usually records and describes a default value, which is the _____.
value for the data element if a value otherwise is not entered for it
57
The iteration structure is the completion of _____.
process step that is repeated until a specific condition changes
58
The selection structure is the completion of _____
one or more process steps based on the results of a test or condition
59
User productivity systems _____.
include groupware programs that enable users to share data, collaborate on projects, and work in teams
60
Transaction processing (TP) systems _____.
process data generated by day-to-day business operations
61
In a typical company organizational model, middle managers _____.
provide direction, necessary resources, and performance feedback to supervisors and team leaders
62
_____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.
Prototyping
63
A _____ answers questions, troubleshoots problems, and serves as a clearinghouse for user problems and solutions.
user support specialist
64
Agile methods typically use a(n) _____ , which represents a series of iterations based on user feedback.
spiral model
65
The process of concentrating on what is said in an interview and noticing any nonverbal communication that takes place is called _____.
engaged listening
66
In an interview, _____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.
range-of-response questions
67
Critical Thinking Questions Case 4-1 ​ John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder. As John develops the agenda, he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of documenting the results of the JAD session and preparing the report that will be sent to JAD team members?
His own
68
In addition to direct evaluations, systems developers must identify and document indirect expenses that contribute to the _____.
total cost of ownership (TCO)
69
A repository, a computer-aided systems engineering (CASE) tool feature, organizes and documents system development tasks.
False
70
It seems clear that computer-aided systems engineering (CASE) tools will continue to evolve and become more powerful.
True
71
Currently, use of completely online cloud-based development environments is increasing.
True
72
Structured development methods use a variety of diagrams, such as use case, class, sequence, and transition state diagrams.
False
73
The features of an object-oriented (O-O) approach include modular design and single-use code, which increases costs and slows down development.
False
74
Nonspecific CASE tools such as Visible Analyst can be used in any development environment.
True
75
Project managers always must be aware of the _____, so they can monitor the vital tasks and keep a project on track.
critical path
76
A(n) _____ is a recognizable reference point that can be used to monitor progress.
event
77
Two or more _____ depend on a predecessor task.
concurrent tasks
78
Adding more people to a project actually might increase the time necessary to complete the project because of a principle called _____.
Brooks’ law
79
A(n) _____ is an event that could affect a project negatively.
risk
80
_____ components can provide automated responses to sales inquiries, online order processing, and inventory tracking.
Customer relationship management (CRM)
81
Determining the _____ means defining the specific boundaries, or extent, of a project.
project scope
82
_____ are advantages that are difficult to measure in dollars but are important to a company.
Intangible benefits
83
Which is an example of a discretionary project?
Creating a new report for a user
84
The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.
Pareto chart
85
A car performs a(n) _____ called OPERATE WIPERS when it is sent a message with the wiper control.
method
86
A _____ shows how an object changes from one state to another, depending on events that affect the object.
state transition diagram
87
A major advantage of object-oriented (O-O) designs is that systems analysts can save time and avoid errors by using _____ objects.
modular
88
A _____ is a visual summary of several related use cases within a system or subsystem.
use case diagram
89
_____ can involve a modeling process called what-if analysis, which allows a project manager to vary one or more element(s) in a model to measure the effect on other elements.
Quantitative risk analysis
90
A _____ includes a review of a project’s scope, stakeholders, budget, schedule, and any other internal or external factors that might affect the project.
risk management plan
91
A _____ displays the same information as the Gantt chart, including task dependencies, but uses task boxes to include much more detail.
network diagram
92
The first step in the creation of a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart is to _____.
identify all the project tasks
93
A _____ is a review of a project team member’s work by other members of a team.
structured walk-through
94
A _____ (sometimes called an epic) is a simple, high-level statement of a requirement.
feature
95
Which technique involves each participant speaking or passing when it is his or her turn?
structured brainstorming
96
_____ is a planned meeting during which a systems analyst obtains information from another person.
An interview
97
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select any 20 customers.
random sample
98
Microsoft OneNote is a type of _____ software.
information management
99
Which method of system development stresses intense team-based effort and reflects a set of community-based values?
Agile method
100
A _____ describes the information that a system must provide.
business model
101
Knowledge management systems use a large database called a(n) _____ that allows users to find information by entering keywords or questions in normal English phrases.
knowledge base
102
In a(n) _____ model, the result of each phase is called a deliverable, which flows into the next phase.
waterfall
103
The objective of _____ is to gather data about project usability, costs, benefits, and schedules.
fact-finding
104
Of the measures of feasibility, questions such as “Does management support the project?” and “Will the new system require training for users?” would help predict a system’s _____.
operational feasibility
105
Projects where management has a choice in implementing them are called _____ projects.
discretionary
106
A systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.
systems request
107
Many companies implement _____ systems that integrate all customer-related events and transactions.
CRM (customer relationship management)
108
The computer-aided systems engineering (CASE) tool marketplace includes a limited variety of vendors and products, and all the tools dominate the marketplace.
False
109
As early as the 1960s, programmers used tools such as editors and code debuggers to write mainframe computer applications.
True
110
Using _____, an analyst starts with an overall view, which is a context diagram with a single process symbol, and then creates diagram 0, which shows more detail.
leveling
111
In addition to the Gane and Sarson symbol set, another popular symbol set is the _____ symbol set.
Yourdon
112
Among the symbols in the accompanying figure, a _____ is used to represent data that a system stores because one or more processes need to use the data at a later time.
data store
113
In data flow diagrams (DFDs), a process resembles a _____, where the inputs, outputs, and general functions of the process are known, but the underlying details are not shown.
black box
114
_____ is a widely used method of visualizing and documenting an information system.
Unified Modeling Language (UML)
115
The systems support and _____ phase begin when a system becomes operational and continues until the system reaches the end of its useful life.
security
116
In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version _____.
1.1
117
The _____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.
functional baseline
118
When a new version of a system is installed, the prior release is _____ or stored.
archived
119
_____ measures risk likelihood and impact.
Risk assessment
120
If significant changes take place in an existing system or if a new version is released, the IT department might develop a _____.
user training package
121
To avoid problems, preventive maintenance _____.
requires analysis of areas where the trouble is likely to occur
122
The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information.
report header
123
Companies use various _____ methods to maintain output integrity and security.
output control
124
A(n) _____ does not distract a user and calls no attention to itself.
transparent interface
125
To produce a control break report, the records must be arranged, or sorted, in _____.
control field order
126
In a source document, the _____ contains any required signatures.
authorization zone
127
In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.
process-control
128
A new system might have to interface with one or more _____, which are older systems that use outdated technology.
legacy systems
129
In a typical system design specification, the _____ section describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.
system environment
130
_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design.
Enterprise resource planning (ERP)
131
At the center of a star network is the _____, which manages the network and acts as a communications conduit for all network traffic.
switch
132
The _____ allows the expansion of wireless access over a wide area.
Extended Service Set (ESS) topology
133
The term "_____" generally refers to systems that divide processing between one or more networked clients and a central server.
client/server
134
_____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.
Scalability
135
Identify an example of fixed costs.
Hardware rental charges
136
Payback analysis that is recorded and calculated in spreadsheets requires a formula to display cumulative totals, year by year.
True
137
In a fixed charge method, the IT group is regarded as a _____ center, which is a department that is expected to break even or show a profit.
profit
138
Indirect costs, or overhead expenses, cannot be attributed to the development of a particular information system.
True
139
The cost of customer dissatisfaction, lower employee morale, and reduced information availability are examples of _____.
intangible costs
140
When comparing the net present values of projects, all things being equal, the project with the lowest net present value is the best investment.
False
141
Positive benefits increase revenues, improve services, or otherwise contribute to an organization as a direct result of a new information system.
True
142
Critics of return on investment analysis raised a point that return on investment (ROI) measures the overall rate of return for a total period and annual return rates vary considerably.
True
143
Critics of return on investment analysis raised a point that the return on investment (ROI) technique does not recognize the timing of costs and benefits.
True
144
Return on investment analysis considers costs and benefits over a shorter time span than payback analysis.
False
145
Critical Thinking Questions 11-1 Lisa and her team have finished the coding of a new application, and they are ready to begin testing. She asks Tina, a senior software tester, for help in designing the types of tests that Lisa and her team should perform. Lisa mentions that one program has been developed to interact with other programs, and she wants to begin by testing the programs individually. Tina tells her about a process in which a programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. What is the name of this process?
Stub testing
146
_____ is the process of putting a new information system online and retiring the old system.
System changeover
147
A _____ consists of related program code organized into small units that are easy to understand and maintain.
module
148
User documentation _____
consists of instructions and information for users who will interact with the system
149
During _____, existing data is loaded into the new system.
data conversion
150
Access to the operational environment is limited to _____ and must strictly be controlled.
users
151
Critical Thinking Questions Case 9-1 Eamon is planning to start an online store that specializes in books and electronics. Since it’s his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. Eamon wants to provide a discount to premium buyers who order in large quantities. He wants to create a code for each price and share it with them. Also, he wants to ensure that only premium buyers can decipher the code shared. In this scenario, which of the following codes would you suggest that Eamon use?
Cipher code
152
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
entity-relationship diagram (ERD)
153
With a _____, users provide an example of the data requested.
query by example language
154
The data mining technique that relies on association rule learning is often called _____.
market basket analysis
155
To bridge the gap between a database and the Internet, it is necessary to use _____, which is software that integrates different applications and allows them to exchange data.
middleware
156
_____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
data warehouse
157
Typically, a database management system is managed by a person called a _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.
database administrator
158
CASE Critical Thinking Questions Case 7-1 Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which is a reason Priscilla will share with the new analysts for recommending that a client purchase a software package?
The client is looking for the lowest possible costs.
159
When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.
subscription model
160
The software that a company’s IT department makes, builds, and develops is called _____.
in-house software
161
The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.
Web 2.0
162
Which is true of a web-based systems development environment?
Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.
163
An accurate forecast of TCO is critical, because nearly _____ percent of total costs occur after the purchase of the hardware and software, according to Gartner, Inc.
80
164
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.
32
165
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
Open database connectivity (ODBC)
166
A table is in _____ if it does not contain a repeating group.
first normal form
167
A _____ specifies the fields and identifies the primary key in a particular file.
table design
168
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.
mnemonic
169
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.
Normalization
170
_____ is strictly hardware related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
Physical storage
171
_____ reduces the customer's need for software maintenance, operation, and support.
Software as a Service
172
CASE Critical Thinking Questions Case 7-1​ Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which is a reason why Priscilla would offer in-house software development?
The client has a number of very distinctive security requirements.
173
A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
application service provider
174
When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.
software license
175
The main reason for offshore outsourcing is to _____
lower bottom-line costs
176
Developmental costs are incurred after a system is implemented and continues while the system is in use.
False
177
In present value analysis, most companies require a rate of return that is higher than the discount rate because of the degree of risk in any project compared with investing in a bond.
True
178
Intangible costs are costs that can be assigned a specific dollar value.
False
179
Variable costs are costs that vary depending on the level of activity.
True
180
Direct costs usually are more difficult to identify and predict than indirect costs.
False
181
Identify an example of direct costs.
Project team members’ salaries
182
When comparing the net present values of projects, all things being equal, the project with the lowest net present value is the best investment.
False
183
When conducting a payback analysis, the time it takes for the accumulated benefits of an information system to equal the accumulated costs of developing and operating the system is calculated.
True
184
The _____ value of a future dollar is the amount of money that, when invested today at a specified interest rate, grows to exactly one dollar at a certain point in the future.
present
185
_____ describes the way the components in a network interact.
Logical topology
186
_____ is the amount of data that can be transferred in a fixed time period.
Bandwidth
187
Cloud computing provides _____, which matches resources to needs at any given time.
scaling on demand
188
Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.
local area network (LAN)
189
A _____ design locates all or most of the processing logic on the server.
thin client
190
The objective of _____ is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.
unit-testing
191
The main objective of _____ is to avoid problems or to identify them as soon as possible.
quality assurance
192
The Software Engineering Institute (SEI) established a new model, called _____, which incorporates software and systems development into a much larger framework.
Capability Maturity Model Integration (CMMI)
193
_____ involves more risk than other changeover methods.
Direct cutover
194
​As the accompanying figure illustrates, the _____ changeover method requires that both the old and the new information systems operate fully for a specific period.
parallel operation
195
A class diagram includes the class _____, which describe the characteristics of objects in the class
attributes
196
As the accompanying figure illustrates, the _____ changeover method involves implementing the complete new system at a selected location of the company.
pilot operation
197
_____, a risk control strategy, eliminates risks by adding protective safeguards.
Avoidance
198
_____ prevents unauthorized users from creating, modifying, or deleting information.
Integrity
199
A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.
system administrator
200
A _____ is a security weakness or soft spot.
vulnerability
201
_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.
Fault management
202
_____ measures risk likelihood and impact.
Risk assessment
203
_____ protects information from unauthorized disclosure and safeguards privacy.
Confidentiality
204
To reach prospective customers and investors, companies use a live or prerecorded _____, which is an audio or video media file distributed over the Internet.
webcast
205
A(n) _____ is a data validation rule that should be applied to mandatory data items.
existence check
206
Although the vast majority of reports are designed graphically, some systems still produce one or more _____ reports that use a character set with fixed spacing.
character-based reports
207
In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.
body zone
208
Printed output is used in _____, which are output documents that are later entered back into the same or another information system.
turnaround documents
209
A(n) _____ is a data validation rule that is performed on two or more fields to ensure that they are consistent or reasonable when considered together.
combination check
210
_____ measures the time between submitting a request for information and the fulfillment of the request.
Turnaround time
211
A(n) _____ is an attack that takes advantage of a vulnerability.
exploit
212
Adaptive maintenance _____.
adds enhancements to an operational system and makes the system easier to use
213
_____ is the overall time between a request for system activity and the delivery of the response.
Response time
214
A _____ is an internal or external entity that could endanger an asset.
threat
215
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.
web-based
216
A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.
usage model
217
Which is true of a traditional systems development environment?
Many applications require substantial desktop computing power and resources.
218
In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application.
user interface
219
Which is a software collection obtained from a vendor or application service provider?
software package
220
The term "_____" is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered.
garbage in, garbage out (GIGO)
221
A(n) _____ displays only those records that meet a specific condition or conditions.
exception report
222
Critical Thinking Questions Case 8-1 Betty has a number of report templates at her disposal filed in folders to respond to her boss's requests. In order to know where to find a report that meets the needs of her manager, she first needs to know what category of report will satisfy the request. Betty's lead needs to get a report of all of the purchases made only by his employees, using their employee discount, in a given week. In which of the following folders is she likely to find this category of report?
Exception reports
223
A secure system includes _____ that can log every instance of data entry and changes.
audit trails
224
Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.
graphical user interface
225
In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms.
control zone
226
A _____ follows Internet design protocols and enables a company to integrate new applications into its e-commerce strategy.
web-centric architecture
227
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
wireless local area network (WLAN)
228
In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.
distributed database management system (DDBMS)
229
_____ relies on collective data paths to increase bandwidth and range.
Multiple inputs / multiple-output (MIMO) technology
230
The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
OSI (Open Systems Interconnection) model
231
A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.
platform
232
A(n) _____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device.
podcast
233
In sequence, the steps typically followed to create a structure chart are _____.
reviewing the data flow diagrams (DFDs); identifying modules and relationships; adding couples, loops, and conditions; and analyzing the structure chart ^
234
In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated.
loop
235
In a technique called _____, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.
stub testing
236
_____ measures a module’s scope and processing characteristics.
Cohesion
237
Tangible costs are costs whose dollar value cannot be calculated easily.
False
238
Which concept includes ongoing support and maintenance costs as well as acquisition costs?
total cost of ownership
239
Which is an example of variable costs?
Printer paper costs
240
Critics of return on investment analysis raised a point that the return on investment (ROI) technique does not recognize the timing of costs and benefits.
True
241
The inherent efficiency of high-volume processing on larger computers is called _____.
economy of scale
242
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.
EBCDIC (Extended Binary Coded Decimal Interchange Code)
243
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
foreign key
244
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.
schema