Deck 16: Quality Assurance and Implementation

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is not a guideline to help choose an appropriate documentation technique?

A) is compatible with existing documentation
B) is understood by others in the organization
C) allows you to return to working on the system after you have been away from it for a period of time
D) is suitable for the size of the system you are working on
E) allows for an unstructured design approach if it is considered to be more important than other factors
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
What type of computing allows the use of Web services, database services, and application services over the Internet, without having to invest in corporate or personal hardware, software, or software tools?

A) broadcast computing
B) central computing
C) ring computing
D) cloud computing
E) client computing
سؤال
In the client/server model, which of the following is not handled by the server?

A) access to databases
B) managing peripheral devices
C) retrieving data
D) user interface
سؤال
While cloud computing is not immune to outages, it can spread the risk of service interruption to multiple servers by:

A) providing many redundant sites.
B) allowing sites to back up their own content as often as they would like.
C) connecting to the internet via satellite.
D) providing both database services and Web services.
سؤال
Ecommerce protection must be used to prevent security threats from:

A) external users.
B) internal Web users.
C) both external and internal users.
D) extranet users.
سؤال
Which is not an advantage of using a top-down approach to systems design?

A) avoiding the chaos of attempting to design a system "all at once"
B) the ability to have separate systems analysis teams working in parallel on different but necessary subsystems
C) avoiding bias from the systems analyst
D) eventually the subsystems must be reintegrated
سؤال
Which of the following is not a part of the Six Sigma methodology?

A) Define the problem.
B) Analyze the cause.
C) Standardize the changes.
D) Implement the solution.
E) Draw conclusions.
سؤال
Which of the following is an action that does not help to provide security for an ecommerce site?

A) email filtering products
B) virus protection software
C) URL filtering products
D) private key infrastructure
E) secure socket layering
سؤال
What is not contained in procedure manuals?

A) background comments
B) steps to accomplish different transactions
C) instructions on how to recover from problems
D) what to do next if something worked
E) trouble-shooting
سؤال
Which people are not involved in structured walkthroughs?

A) a programmer or analyst
B) a walkthrough coordinator
C) a programmer or analyst peer
D) the information system department manager
سؤال
Which of the following is an advantage of the client/server model?

A) less customization of applications
B) lower start-up costs
C) provides greater computer power
D) fosters a high managerial level of decision making
سؤال
Which is a way to use peer reviewers to monitor the system's programming and overall development?

A) systems design
B) systems development
C) structured walkthroughs
D) structure charts
سؤال
The barrier between an internal and external network is called:

A) a firewall.
B) physical security.
C) encryption software.
D) behavioral security.
E) netlock.
سؤال
Which is not a reason that systems and programs are undocumented or under-documented?

A) systems
B) technicians
C) programs
D) systems analysts
E) programmers
سؤال
Which is an incorrect guideline for modular programming?

A) Keep each module to a manageable size.
B) Pay particular attention to the critical interfaces.
C) Maximize the number of modules the user needs to modify when making changes.
D) Maintain the hierarchical relationships set up in the top-down phases.
سؤال
Which is not an advantage of modular programming?

A) Modules make it easier to see the whole program code.
B) Tracing an error in a module is less complicated.
C) Modules are easier to maintain.
D) Modules are easier to grasp.
سؤال
Which is the correct testing process?
I) full systems testing with test data
II) link testing with test data
III) full systems testing with live data
IV) program testing with test data

A) IV - II - I - III
B) IV - I - II - III
C) II - IV - I - III
D) IV - I - III - II
E) II - IV - III - I
سؤال
At what stage do operators and end-users become actively involved in testing?

A) link testing with test data
B) full systems testing with test data
C) program testing with test data
D) full systems testing with live data
سؤال
Which of these is not a kind of security?

A) behavioral
B) hierarchical
C) logical
D) physical
سؤال
Which of the following is not related to structured walkthroughs?

A) to use peer reviewers to monitor the system's programming
B) to monitor the system's specific development
C) to point out problems
D) to allow the programmer or analyst responsible for that portion to make suitable changes
سؤال
The most rapidly growing type of computing is:

A) cloud computing.
B) client/server computing.
C) desktop computing.
D) laptop computing.
سؤال
________ checks to see if programs that are interdependent actually work together as planned.

A) Link testing
B) Desk checking
C) Full systems testing
D) Production testing
سؤال
________ is performed most often to improve the existing software.

A) Maintenance
B) Testing
C) Documentation
D) Cloud computing
سؤال
Which of the following is not one of the seven elements to consider during and after a disaster?

A) Identify the teams responsible for managing a crisis.
B) Establish multiple communication channels among employees and consultants who are onsite.
C) Determine data replication technologies that match the organization's timetable for getting systems up and running.
D) Provide recovery solutions that include an off-site location.
E) Provide the location of the nearest insurance claims adjuster.
سؤال
A factor to consider when full systems testing with test data is to examine whether operators have adequate ________ in procedure manuals.

A) documentation
B) testing
C) maintenance
D) data
سؤال
Use structured walkthroughs as a way to obtain valuable ________ from a perspective that you lack.

A) feedback
B) data
C) interaction
D) stories
سؤال
________ are brief statements representing generalizations or advice.

A) Sayings
B) Tales
C) Customs
D) Art forms
سؤال
Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.

A) geographic
B) user
C) growing
D) topic
سؤال
Which of the following is not used to evaluate a corporate website?

A) Learn about the pages that have been accessed.
B) Use "Web bugs" to gather information about the customer.
C) Collect visitor demographics, such as the geographic region or city.
D) Find out who is referring the Web site visitors to your Web site.
E) Determine the browser that the visitor is using.
سؤال
In a structured walkthrough, the ________ records what is said so that the others present can interact without encumbrance.

A) notetaker
B) user
C) manager
D) programmer
سؤال
________ allow(s) users, programmers, and analysts to see the system, its software, and procedures without having to interact with it.

A) Documentation
B) Procedures
C) Stories and folklore
D) Customers
سؤال
Which of the following are the main advantages that FOLKLORE has over blogs and commonly found user communities?

A) It is structured, resulting in more organized, more complete documentation.
B) It encourages someone familiar with the software to seek out information rather than depend on users to come forth on their own.
C) Both A and B.
D) Neither A nor B.
سؤال
In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.

A) data-couples
B) control labels
C) data-flags
D) control modules
سؤال
Products that assess and report on the potential risks in a system are called:

A) vulnerability management products.
B) intrusion detection products.
C) URL filtering products.
D) firewalls.
E) secure socket layering products.
سؤال
At the program testing stage, programmers must first ________ their programs to verify the way a routine will work.

A) desk check
B) live check
C) encode
D) encrypt
سؤال
A three-tiered client/server model includes which of the following?

A) Web server
B) application server
C) database server
D) All of the above.
سؤال
________ is a culture built on quality that has a project leader called a Black Belt.

A) Six Sigma
B) Total Quality Management
C) Systems Design
D) Systems Analysis and Design
سؤال
Which of the following is not a privacy consideration for ecommerce?

A) Have a corporate policy on privacy that is displayed on the Web site.
B) Make it mandatory for users to fill out personal information on a Web site, while ensuring them that the information will be kept confidential.
C) Use sources that allow you to obtain anonymous information about classes of customers.
D) Only ask for the information the application requires to complete the transaction.
E) Avoid the latest trick that permits your client to gather information about the customer.
سؤال
Once the top-down design approach is taken, the ________ approach is useful in programming.

A) modular
B) system-wide
C) feedback
D) database design
سؤال
Finding more about the Web page visitors includes:

A) whether the visitor is a new or returning visitor.
B) the geographic region of the visitor.
C) who the top visitors are.
D) All of the above.
سؤال
Maintenance is performed most often to improve the existing software, rather than to respond to crisis or system failure.
سؤال
With a client/server model, users interact with unlimited parts of the application.
سؤال
Security has three interrelated aspects: physical, logical, and behavioral. As long as at least two aspects are in place, the quality of security is considered high.
سؤال
A firewall constructs a barrier between an internal network and an intranet.
سؤال
Reducing maintenance costs is a major concern, because software maintenance alone can devour upward of 50 percent of the total data processing budget for a business.
سؤال
If the reliability of a telecommunications network is high, it is possible to use a distributed system for business.
سؤال
Six Sigma is more than a methodology, it is a culture built on quality.
سؤال
The fewer data couples and control flags in the system, the more difficult it is to change the system.
سؤال
The top-down approach provides the systems group with a ready-made division of users into task forces for subsystems.
سؤال
Security of computer facilities is part of the conversion process.
سؤال
At the stage of full systems testing with live data, operators and end-users become actively involved in testing.
سؤال
In a client/server model, servers are the users.
سؤال
When a system is tested with normal transactions, variations are added, including invalid data used to ensure that the system can properly detect errors.
سؤال
Structured walkthroughs fit well within a total quality assurance program when accomplished throughout the systems development life cycle.
سؤال
The program author should not defend his thinking, rationalize problems, or argue.
سؤال
A firewall is attack-proof.
سؤال
On-line manuals on websites should include a FAQ page and downloadable updates.
سؤال
When performing a structured walkthrough, the analyst oversees that others adhere to any roles assigned and assures that any activities scheduled are accomplished.
سؤال
Passwords and authorization codes are examples of logical security controls.
سؤال
A "client-based application" means that the application resides in a client computer but can also be accessed by other users on the network.
سؤال
When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?
سؤال
All people who will have primary or secondary use of a system must be involved in the system design.
سؤال
What are seven essential items that the analyst should include in performing a Web site traffic
analysis?
سؤال
Define the terms physical, logical, and behavioral security, and give an example of each one that
illustrates the differences among them.
سؤال
Define what is meant by doing a structured walkthrough. Who should be involved?
سؤال
Often organizations that are using cloud computing do not find it necessary to make up-front capital expenditures on IT infrastructure, so it enables smaller companies with smaller and less predictable budgets to make advances in processing more quickly.
سؤال
Security is the responsibility of all those who come into contact with the system and is only as good as the most lax behavior or policy in the organization.
سؤال
One way to evaluate your website is to find out more about the website's visitors.
سؤال
To make your website more secure, you must ask the user or customer to give up some privacy.
سؤال
The hub decomposition diagram is useful for showing how the major hubs are connected.
سؤال
The fields of disaster preparedness and disaster recovery are independent of each other.
سؤال
Conversion by direct changeover means that, on a specified date, users stop using the old system, and the new system is put into use.
سؤال
Utilities of information include possession, form, place, access level and time.
سؤال
What are the four major guidelines an analyst should use to set-up training for a new system?
سؤال
Parallel conversion attempts to combine the best features of parallel and direct conversion, without incurring all the risks.
سؤال
The most rapidly growing type of computing is desktop computing.
سؤال
Conversion by direct changeover means that, on a specified date, users stop using the old system and the new system is put into use.
سؤال
During disaster planning, redundancy of data provides the key for eliminating single points of failure for servers running Web applications.
سؤال
Systems analysts engage in an educational process with users that is called training.
سؤال
In terms of disaster recovery, what are the seven elements that need to be considered during and after a disaster?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Quality Assurance and Implementation
1
Which of the following is not a guideline to help choose an appropriate documentation technique?

A) is compatible with existing documentation
B) is understood by others in the organization
C) allows you to return to working on the system after you have been away from it for a period of time
D) is suitable for the size of the system you are working on
E) allows for an unstructured design approach if it is considered to be more important than other factors
E
2
What type of computing allows the use of Web services, database services, and application services over the Internet, without having to invest in corporate or personal hardware, software, or software tools?

A) broadcast computing
B) central computing
C) ring computing
D) cloud computing
E) client computing
D
3
In the client/server model, which of the following is not handled by the server?

A) access to databases
B) managing peripheral devices
C) retrieving data
D) user interface
D
4
While cloud computing is not immune to outages, it can spread the risk of service interruption to multiple servers by:

A) providing many redundant sites.
B) allowing sites to back up their own content as often as they would like.
C) connecting to the internet via satellite.
D) providing both database services and Web services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
5
Ecommerce protection must be used to prevent security threats from:

A) external users.
B) internal Web users.
C) both external and internal users.
D) extranet users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which is not an advantage of using a top-down approach to systems design?

A) avoiding the chaos of attempting to design a system "all at once"
B) the ability to have separate systems analysis teams working in parallel on different but necessary subsystems
C) avoiding bias from the systems analyst
D) eventually the subsystems must be reintegrated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is not a part of the Six Sigma methodology?

A) Define the problem.
B) Analyze the cause.
C) Standardize the changes.
D) Implement the solution.
E) Draw conclusions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is an action that does not help to provide security for an ecommerce site?

A) email filtering products
B) virus protection software
C) URL filtering products
D) private key infrastructure
E) secure socket layering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is not contained in procedure manuals?

A) background comments
B) steps to accomplish different transactions
C) instructions on how to recover from problems
D) what to do next if something worked
E) trouble-shooting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which people are not involved in structured walkthroughs?

A) a programmer or analyst
B) a walkthrough coordinator
C) a programmer or analyst peer
D) the information system department manager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is an advantage of the client/server model?

A) less customization of applications
B) lower start-up costs
C) provides greater computer power
D) fosters a high managerial level of decision making
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which is a way to use peer reviewers to monitor the system's programming and overall development?

A) systems design
B) systems development
C) structured walkthroughs
D) structure charts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
13
The barrier between an internal and external network is called:

A) a firewall.
B) physical security.
C) encryption software.
D) behavioral security.
E) netlock.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which is not a reason that systems and programs are undocumented or under-documented?

A) systems
B) technicians
C) programs
D) systems analysts
E) programmers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which is an incorrect guideline for modular programming?

A) Keep each module to a manageable size.
B) Pay particular attention to the critical interfaces.
C) Maximize the number of modules the user needs to modify when making changes.
D) Maintain the hierarchical relationships set up in the top-down phases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which is not an advantage of modular programming?

A) Modules make it easier to see the whole program code.
B) Tracing an error in a module is less complicated.
C) Modules are easier to maintain.
D) Modules are easier to grasp.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which is the correct testing process?
I) full systems testing with test data
II) link testing with test data
III) full systems testing with live data
IV) program testing with test data

A) IV - II - I - III
B) IV - I - II - III
C) II - IV - I - III
D) IV - I - III - II
E) II - IV - III - I
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
18
At what stage do operators and end-users become actively involved in testing?

A) link testing with test data
B) full systems testing with test data
C) program testing with test data
D) full systems testing with live data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of these is not a kind of security?

A) behavioral
B) hierarchical
C) logical
D) physical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is not related to structured walkthroughs?

A) to use peer reviewers to monitor the system's programming
B) to monitor the system's specific development
C) to point out problems
D) to allow the programmer or analyst responsible for that portion to make suitable changes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
21
The most rapidly growing type of computing is:

A) cloud computing.
B) client/server computing.
C) desktop computing.
D) laptop computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
22
________ checks to see if programs that are interdependent actually work together as planned.

A) Link testing
B) Desk checking
C) Full systems testing
D) Production testing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
23
________ is performed most often to improve the existing software.

A) Maintenance
B) Testing
C) Documentation
D) Cloud computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is not one of the seven elements to consider during and after a disaster?

A) Identify the teams responsible for managing a crisis.
B) Establish multiple communication channels among employees and consultants who are onsite.
C) Determine data replication technologies that match the organization's timetable for getting systems up and running.
D) Provide recovery solutions that include an off-site location.
E) Provide the location of the nearest insurance claims adjuster.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
25
A factor to consider when full systems testing with test data is to examine whether operators have adequate ________ in procedure manuals.

A) documentation
B) testing
C) maintenance
D) data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
26
Use structured walkthroughs as a way to obtain valuable ________ from a perspective that you lack.

A) feedback
B) data
C) interaction
D) stories
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
27
________ are brief statements representing generalizations or advice.

A) Sayings
B) Tales
C) Customs
D) Art forms
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
28
Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.

A) geographic
B) user
C) growing
D) topic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is not used to evaluate a corporate website?

A) Learn about the pages that have been accessed.
B) Use "Web bugs" to gather information about the customer.
C) Collect visitor demographics, such as the geographic region or city.
D) Find out who is referring the Web site visitors to your Web site.
E) Determine the browser that the visitor is using.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
30
In a structured walkthrough, the ________ records what is said so that the others present can interact without encumbrance.

A) notetaker
B) user
C) manager
D) programmer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
31
________ allow(s) users, programmers, and analysts to see the system, its software, and procedures without having to interact with it.

A) Documentation
B) Procedures
C) Stories and folklore
D) Customers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following are the main advantages that FOLKLORE has over blogs and commonly found user communities?

A) It is structured, resulting in more organized, more complete documentation.
B) It encourages someone familiar with the software to seek out information rather than depend on users to come forth on their own.
C) Both A and B.
D) Neither A nor B.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
33
In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.

A) data-couples
B) control labels
C) data-flags
D) control modules
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
34
Products that assess and report on the potential risks in a system are called:

A) vulnerability management products.
B) intrusion detection products.
C) URL filtering products.
D) firewalls.
E) secure socket layering products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
35
At the program testing stage, programmers must first ________ their programs to verify the way a routine will work.

A) desk check
B) live check
C) encode
D) encrypt
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
36
A three-tiered client/server model includes which of the following?

A) Web server
B) application server
C) database server
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
37
________ is a culture built on quality that has a project leader called a Black Belt.

A) Six Sigma
B) Total Quality Management
C) Systems Design
D) Systems Analysis and Design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is not a privacy consideration for ecommerce?

A) Have a corporate policy on privacy that is displayed on the Web site.
B) Make it mandatory for users to fill out personal information on a Web site, while ensuring them that the information will be kept confidential.
C) Use sources that allow you to obtain anonymous information about classes of customers.
D) Only ask for the information the application requires to complete the transaction.
E) Avoid the latest trick that permits your client to gather information about the customer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
39
Once the top-down design approach is taken, the ________ approach is useful in programming.

A) modular
B) system-wide
C) feedback
D) database design
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
40
Finding more about the Web page visitors includes:

A) whether the visitor is a new or returning visitor.
B) the geographic region of the visitor.
C) who the top visitors are.
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
41
Maintenance is performed most often to improve the existing software, rather than to respond to crisis or system failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
42
With a client/server model, users interact with unlimited parts of the application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
43
Security has three interrelated aspects: physical, logical, and behavioral. As long as at least two aspects are in place, the quality of security is considered high.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
44
A firewall constructs a barrier between an internal network and an intranet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
45
Reducing maintenance costs is a major concern, because software maintenance alone can devour upward of 50 percent of the total data processing budget for a business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
46
If the reliability of a telecommunications network is high, it is possible to use a distributed system for business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
47
Six Sigma is more than a methodology, it is a culture built on quality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
48
The fewer data couples and control flags in the system, the more difficult it is to change the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
49
The top-down approach provides the systems group with a ready-made division of users into task forces for subsystems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
50
Security of computer facilities is part of the conversion process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
51
At the stage of full systems testing with live data, operators and end-users become actively involved in testing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
52
In a client/server model, servers are the users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
53
When a system is tested with normal transactions, variations are added, including invalid data used to ensure that the system can properly detect errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
54
Structured walkthroughs fit well within a total quality assurance program when accomplished throughout the systems development life cycle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
55
The program author should not defend his thinking, rationalize problems, or argue.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
56
A firewall is attack-proof.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
57
On-line manuals on websites should include a FAQ page and downloadable updates.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
58
When performing a structured walkthrough, the analyst oversees that others adhere to any roles assigned and assures that any activities scheduled are accomplished.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
59
Passwords and authorization codes are examples of logical security controls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
60
A "client-based application" means that the application resides in a client computer but can also be accessed by other users on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
61
When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
62
All people who will have primary or secondary use of a system must be involved in the system design.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
63
What are seven essential items that the analyst should include in performing a Web site traffic
analysis?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
64
Define the terms physical, logical, and behavioral security, and give an example of each one that
illustrates the differences among them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
65
Define what is meant by doing a structured walkthrough. Who should be involved?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
66
Often organizations that are using cloud computing do not find it necessary to make up-front capital expenditures on IT infrastructure, so it enables smaller companies with smaller and less predictable budgets to make advances in processing more quickly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
67
Security is the responsibility of all those who come into contact with the system and is only as good as the most lax behavior or policy in the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
68
One way to evaluate your website is to find out more about the website's visitors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
69
To make your website more secure, you must ask the user or customer to give up some privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
70
The hub decomposition diagram is useful for showing how the major hubs are connected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
71
The fields of disaster preparedness and disaster recovery are independent of each other.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
72
Conversion by direct changeover means that, on a specified date, users stop using the old system, and the new system is put into use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
73
Utilities of information include possession, form, place, access level and time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
74
What are the four major guidelines an analyst should use to set-up training for a new system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
75
Parallel conversion attempts to combine the best features of parallel and direct conversion, without incurring all the risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
76
The most rapidly growing type of computing is desktop computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
77
Conversion by direct changeover means that, on a specified date, users stop using the old system and the new system is put into use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
78
During disaster planning, redundancy of data provides the key for eliminating single points of failure for servers running Web applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
79
Systems analysts engage in an educational process with users that is called training.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
80
In terms of disaster recovery, what are the seven elements that need to be considered during and after a disaster?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 80 في هذه المجموعة.