Deck 4: Management Information Systems: Software Development Models
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/27
العب
ملء الشاشة (f)
Deck 4: Management Information Systems: Software Development Models
1
1990's saw the introduction of the _____________ information systems.
A)Strategic
B)GUI
C)Decision
D)Executive
A)Strategic
B)GUI
C)Decision
D)Executive
GUI
2
Information systems that monitor the elementary activities and transactions of the organizations are:
A)Management-level system
B)Operational-level system
C)Knowledge-level system
D)Strategic level system
A)Management-level system
B)Operational-level system
C)Knowledge-level system
D)Strategic level system
Operational-level system
3
Projections and responses to queries are information output characteristics associated with a(n):
A)DSS
B)MIS
C)ESS
D)TPS
A)DSS
B)MIS
C)ESS
D)TPS
ESS
4
Summary transaction data, high-volume data, and simple models are information inputs characteristic of a(n):
A)DSS
B)MIS
C)ESS
D)TPS
A)DSS
B)MIS
C)ESS
D)TPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
5
Deciding where to locate new production facilities is a(n) example of a manufacturing and production information system operating at the:
A)Operational level
B)Management level
C)Knowledge level
D)Strategic level
A)Operational level
B)Management level
C)Knowledge level
D)Strategic level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
6
A risk response which involves eliminating a threat is called:
A)Mitigation
B)Deflection
C)Avoidance
D)b and d
A)Mitigation
B)Deflection
C)Avoidance
D)b and d
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
7
When should a risk be avoided?
A)When the risk event has a low probability of occurrence and low impact
B)When the risk event is unacceptable -- generally one with a very high probability of occurrence and high impact
C)When it can be transferred by purchasing insurance
D)none
A)When the risk event has a low probability of occurrence and low impact
B)When the risk event is unacceptable -- generally one with a very high probability of occurrence and high impact
C)When it can be transferred by purchasing insurance
D)none
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
8
An example of risk mitigation is:
A)Using proven technology in the development of a product to lessen the probability that the product will not work
B)Purchasing insurance
C)Accepting a lower profit if costs overrun
D)a and b
A)Using proven technology in the development of a product to lessen the probability that the product will not work
B)Purchasing insurance
C)Accepting a lower profit if costs overrun
D)a and b
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
9
Mitigating risk could involve
A)identifying risks, obtaining insurance and developing alternatives
B)contracting and quality assurance
C)developing standards, buying insurance, and planning for contingencies and
D)re-scoping the project and reassessing requirements
A)identifying risks, obtaining insurance and developing alternatives
B)contracting and quality assurance
C)developing standards, buying insurance, and planning for contingencies and
D)re-scoping the project and reassessing requirements
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
10
The linear sequential model of software development is
A)A reasonable approach when requirements are well defined.
B)A good approach when a working program is required quickly.
C)The best approach to use for projects with large development teams.
D)An old-fashioned model that cannot be used in a modern context.
A)A reasonable approach when requirements are well defined.
B)A good approach when a working program is required quickly.
C)The best approach to use for projects with large development teams.
D)An old-fashioned model that cannot be used in a modern context.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
11
The linear sequential model of software development is also known as the
A)Classical life cycle model
B)Fountain model
C)Spiral model
D)Waterfall model
A)Classical life cycle model
B)Fountain model
C)Spiral model
D)Waterfall model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
12
The incremental model of software development is
A)A reasonable approach when requirements are well defined.
B)A good approach when a working core product is required quickly.
C)The best approach to use for projects with large development teams.
D)A revolutionary model that is not used for commercial products.
A)A reasonable approach when requirements are well defined.
B)A good approach when a working core product is required quickly.
C)The best approach to use for projects with large development teams.
D)A revolutionary model that is not used for commercial products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
13
The rapid application development model is
A)Another name for component-based development.
B)A useful approach when a customer cannot define requirements clearly.
C)A high-speed adaptation of the linear sequential model.
D)All of the above.
A)Another name for component-based development.
B)A useful approach when a customer cannot define requirements clearly.
C)A high-speed adaptation of the linear sequential model.
D)All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
14
Evolutionary software process models
A)Are iterative in nature
B)Can easily accommodate product requirements changes
C)Do not generally produce throwaway systems
D)All of the above
A)Are iterative in nature
B)Can easily accommodate product requirements changes
C)Do not generally produce throwaway systems
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
15
The prototyping model of software development is
A)A reasonable approach when requirements are well defined.
B)A useful approach when a customer cannot define requirements clearly.
C)The best approach to use for projects with large development teams.
D)A risky model that rarely produces a meaningful product.
A)A reasonable approach when requirements are well defined.
B)A useful approach when a customer cannot define requirements clearly.
C)The best approach to use for projects with large development teams.
D)A risky model that rarely produces a meaningful product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
16
The spiral model of software development
A)Ends with the delivery of the software product
B)Is more chaotic than the incremental model
C)Includes project risks evaluation during each iteration
D)All of the above
A)Ends with the delivery of the software product
B)Is more chaotic than the incremental model
C)Includes project risks evaluation during each iteration
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
17
The concurrent development model is
A)Another name for the rapid application development model.
B)Often used for the development of client/server applications.
C)Only used for development of parallel or distributed systems.
D)Used whenever a large number of change requests are anticipated.
A)Another name for the rapid application development model.
B)Often used for the development of client/server applications.
C)Only used for development of parallel or distributed systems.
D)Used whenever a large number of change requests are anticipated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
18
The component-based development model is
A)Only appropriate for computer hardware design.
B)Not able to support the development of reusable components.
C)Works best when object technologies are available for support.
D)Not cost effective by known quantifiable software metrics.
A)Only appropriate for computer hardware design.
B)Not able to support the development of reusable components.
C)Works best when object technologies are available for support.
D)Not cost effective by known quantifiable software metrics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
19
The formal methods model of software development makes use of mathematical methods to
A)Develop defect free computer-based systems
B)Define the specification for computer-based systems
C)Verify the correctness of computer-based systems
D)All of the above
A)Develop defect free computer-based systems
B)Define the specification for computer-based systems
C)Verify the correctness of computer-based systems
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
20
The analysis and design of application systems are the responsibility of a _____
A)Computer Operator
B)Programmer
C)System Analyst
D)Data entry operator
A)Computer Operator
B)Programmer
C)System Analyst
D)Data entry operator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
21
The DBA is
A)a person
B)a computer device
C)a communication technique
D)All of the above
A)a person
B)a computer device
C)a communication technique
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
22
Computer support to the manager has been least in
A)alternative identification
B)alternative selection
C)problem identification
D)alternative evaluation
A)alternative identification
B)alternative selection
C)problem identification
D)alternative evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
23
A _____ is a brief message to an operator that describes what data are to be entered.
A)prompt
B)passwords
C)MIS
D)Tactical
A)prompt
B)passwords
C)MIS
D)Tactical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is not true about expert systems?
A)Expert systems are collections of human knowledge
B)Export systems are expensive to design.
C)export systems are usually designed to run on small general-purpose computers
D)Maintenance support may be difficult to obtain for an expert system.
A)Expert systems are collections of human knowledge
B)Export systems are expensive to design.
C)export systems are usually designed to run on small general-purpose computers
D)Maintenance support may be difficult to obtain for an expert system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
25
General ledger is also referred to as:
A)extra ledger
B)main ledger
C)nominal ledger
D)All of the above
A)extra ledger
B)main ledger
C)nominal ledger
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
26
In ……………… system the interaction between various subsystems cannot be defined with certainty
A)Open System
B)Closed System
C)Deterministic System
D)Probabilistic System
A)Open System
B)Closed System
C)Deterministic System
D)Probabilistic System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck
27
……………… is a tabular method for describing the logic of the decisions to be taken.
A)Decision tables
B)Decision tree
C)Decision Method
D)Decision Data
A)Decision tables
B)Decision tree
C)Decision Method
D)Decision Data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 27 في هذه المجموعة.
فتح الحزمة
k this deck