Deck 16: Quality Assurance and Implementation
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/81
Play
Full screen (f)
Deck 16: Quality Assurance and Implementation
1
In the client/server model, which of the following is not handled by the server?
A)access to databases
B)managing peripheral devices
C)retrieving data
D)user interface
A)access to databases
B)managing peripheral devices
C)retrieving data
D)user interface
D
2
What is not contained in procedure manuals?
A)background comments
B)steps to accomplish different transactions
C)instructions on how to recover from problems
D)what to do next if something worked
E)trouble-shooting
A)background comments
B)steps to accomplish different transactions
C)instructions on how to recover from problems
D)what to do next if something worked
E)trouble-shooting
D
3
Which is not a reason that systems and programs are undocumented or under-documented?
A)systems
B)technicians
C)programs
D)systems analysts
E)programmers
A)systems
B)technicians
C)programs
D)systems analysts
E)programmers
B
4
The barrier between an internal and external network is called:
A)a firewall.
B)physical security.
C)encryption software.
D)behavioral security.
E)netlock.
A)a firewall.
B)physical security.
C)encryption software.
D)behavioral security.
E)netlock.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is not a guideline to help choose an appropriate documentation technique?
A)is compatible with existing documentation
B)is understood by others in the organization
C)allows you to return to working on the system after you have been away from it for a period of time
D)is suitable for the size of the system you are working on
E)allows for an unstructured design approach if it is considered to be more important than other factors
A)is compatible with existing documentation
B)is understood by others in the organization
C)allows you to return to working on the system after you have been away from it for a period of time
D)is suitable for the size of the system you are working on
E)allows for an unstructured design approach if it is considered to be more important than other factors
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
6
Which is not an advantage of using a top-down approach to systems design?
A)avoiding the chaos of attempting to design a system "all at once"
B)the ability to have separate systems analysis teams working in parallel on different but necessary subsystems
C)avoiding bias from the systems analyst
D)eventually the subsystems must be reintegrated
A)avoiding the chaos of attempting to design a system "all at once"
B)the ability to have separate systems analysis teams working in parallel on different but necessary subsystems
C)avoiding bias from the systems analyst
D)eventually the subsystems must be reintegrated
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
7
Which people are not involved in structured walkthroughs?
A)a programmer or analyst
B)a walkthrough coordinator
C)a programmer or analyst peer
D)the information system department manager
A)a programmer or analyst
B)a walkthrough coordinator
C)a programmer or analyst peer
D)the information system department manager
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
8
Which is a way to use peer reviewers to monitor the system's programming and overall development?
A)systems design
B)systems development
C)structured walkthroughs
D)structure charts
A)systems design
B)systems development
C)structured walkthroughs
D)structure charts
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
9
At what stage do operators and end-users become actively involved in testing?
A)link testing with test data
B)full systems testing with test data
C)program testing with test data
D)full systems testing with live data
A)link testing with test data
B)full systems testing with test data
C)program testing with test data
D)full systems testing with live data
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is an action that does not help to provide security for an ecommerce site?
A)email filtering products
B)virus protection software
C)URL filtering products
D)private key infrastructure
E)secure socket layering
A)email filtering products
B)virus protection software
C)URL filtering products
D)private key infrastructure
E)secure socket layering
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
11
What type of computing allows the use of Web services, database services, and application services over the Internet, without having to invest in corporate or personal hardware, software, or software tools?
A)broadcast computing
B)central computing
C)ring computing
D)cloud computing
E)client computing
A)broadcast computing
B)central computing
C)ring computing
D)cloud computing
E)client computing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is not a part of the Six Sigma methodology?
A)Define the problem.
B)Analyze the cause.
C)Standardize the changes.
D)Implement the solution.
E)Draw conclusions.
A)Define the problem.
B)Analyze the cause.
C)Standardize the changes.
D)Implement the solution.
E)Draw conclusions.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
13
Which of these is not a kind of security?
A)behavioral
B)hierarchical
C)logical
D)physical
A)behavioral
B)hierarchical
C)logical
D)physical
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
14
While cloud computing is not immune to outages, it can spread the risk of service interruption to multiple servers by:
A)providing many redundant sites.
B)allowing sites to back up their own content as often as they would like.
C)connecting to the internet via satellite.
D)providing both database services and Web services.
A)providing many redundant sites.
B)allowing sites to back up their own content as often as they would like.
C)connecting to the internet via satellite.
D)providing both database services and Web services.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
15
Which is not an advantage of modular programming?
A)Modules make it easier to see the whole program code.
B)Tracing an error in a module is less complicated.
C)Modules are easier to maintain.
D)Modules are easier to grasp.
A)Modules make it easier to see the whole program code.
B)Tracing an error in a module is less complicated.
C)Modules are easier to maintain.
D)Modules are easier to grasp.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
16
Ecommerce protection must be used to prevent security threats from:
A)external users.
B)internal Web users.
C)both external and internal users.
D)extranet users.
A)external users.
B)internal Web users.
C)both external and internal users.
D)extranet users.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not related to structured walkthroughs?
A)to use peer reviewers to monitor the system's programming
B)to monitor the system's specific development
C)to point out problems
D)to allow the programmer or analyst responsible for that portion to make suitable changes
A)to use peer reviewers to monitor the system's programming
B)to monitor the system's specific development
C)to point out problems
D)to allow the programmer or analyst responsible for that portion to make suitable changes
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
18
Which is an incorrect guideline for modular programming?
A)Keep each module to a manageable size.
B)Pay particular attention to the critical interfaces.
C)Maximize the number of modules the user needs to modify when making changes.
D)Maintain the hierarchical relationships set up in the top-down phases.
A)Keep each module to a manageable size.
B)Pay particular attention to the critical interfaces.
C)Maximize the number of modules the user needs to modify when making changes.
D)Maintain the hierarchical relationships set up in the top-down phases.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
19
Which is the correct testing process? I. full systems testing with test data
II. link testing with test data
III. full systems testing with live data
IV. program testing with test data
A)IV - II - I - III
B)IV - I - II - III
C)II - IV - I - III
D)IV - I - III - II
E)II - IV - III - I
II. link testing with test data
III. full systems testing with live data
IV. program testing with test data
A)IV - II - I - III
B)IV - I - II - III
C)II - IV - I - III
D)IV - I - III - II
E)II - IV - III - I
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is an advantage of the client/server model?
A)less customization of applications
B)lower start-up costs
C)provides greater computer power
D)fosters a high managerial level of decision making
A)less customization of applications
B)lower start-up costs
C)provides greater computer power
D)fosters a high managerial level of decision making
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
21
Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.
A)geographic
B)user
C)growing
D)topic
A)geographic
B)user
C)growing
D)topic
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
22
________ checks to see if programs that are interdependent actually work together as planned.
A)Link testing
B)Desk checking
C)Full systems testing
D)Production testing
A)Link testing
B)Desk checking
C)Full systems testing
D)Production testing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
23
At the program testing stage, programmers must first ________ their programs to verify the way a routine will work.
A)desk check
B)live check
C)encode
D)encrypt
A)desk check
B)live check
C)encode
D)encrypt
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
24
In a structured walkthrough, the ________ records what is said so that the others present can interact without encumbrance.
A)notetaker
B)user
C)manager
D)programmer
A)notetaker
B)user
C)manager
D)programmer
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
25
Use structured walkthroughs as a way to obtain valuable ________ from a perspective that you lack.
A)feedback
B)data
C)interaction
D)stories
A)feedback
B)data
C)interaction
D)stories
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
26
Finding more about the Web page visitors includes:
A)whether the visitor is a new or returning visitor.
B)the geographic region of the visitor.
C)who the top visitors are.
D)All of the above.
A)whether the visitor is a new or returning visitor.
B)the geographic region of the visitor.
C)who the top visitors are.
D)All of the above.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is not one of the seven elements to consider during and after a disaster?
A)Identify the teams responsible for managing a crisis.
B)Establish multiple communication channels among employees and consultants who are onsite.
C)Determine data replication technologies that match the organization's timetable for getting systems up and running.
D)Provide recovery solutions that include an offsite location.
E)Provide the location of the nearest insurance claims adjuster.
A)Identify the teams responsible for managing a crisis.
B)Establish multiple communication channels among employees and consultants who are onsite.
C)Determine data replication technologies that match the organization's timetable for getting systems up and running.
D)Provide recovery solutions that include an offsite location.
E)Provide the location of the nearest insurance claims adjuster.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
28
________ are brief statements representing generalizations or advice.
A)Sayings
B)Tales
C)Customs
D)Art forms
A)Sayings
B)Tales
C)Customs
D)Art forms
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is not a privacy consideration for ecommerce?
A)Have a corporate policy on privacy that is displayed on the Web site.
B)Make it mandatory for users to fill out personal information on a Web site, while ensuring them that the information will be kept confidential.
C)Use sources that allow you to obtain anonymous information about classes of customers.
D)Only ask for the information the application requires to complete the transaction.
E)Avoid the latest trick that permits your client to gather information about the customer.
A)Have a corporate policy on privacy that is displayed on the Web site.
B)Make it mandatory for users to fill out personal information on a Web site, while ensuring them that the information will be kept confidential.
C)Use sources that allow you to obtain anonymous information about classes of customers.
D)Only ask for the information the application requires to complete the transaction.
E)Avoid the latest trick that permits your client to gather information about the customer.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
30
________ is a culture built on quality that has a project leader called a Black Belt.
A)Six Sigma
B)Total Quality Management
C)Systems Design
D)Systems Analysis and Design
A)Six Sigma
B)Total Quality Management
C)Systems Design
D)Systems Analysis and Design
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
31
A three-tiered client/server model includes which of the following?
A)Web server
B)application server
C)database server
D)All of the above.
A)Web server
B)application server
C)database server
D)All of the above.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
32
Products that assess and report on the potential risks in a system are called:
A)vulnerability management products.
B)intrusion detection products.
C)URL filtering products.
D)firewalls.
E)secure socket layering products.
A)vulnerability management products.
B)intrusion detection products.
C)URL filtering products.
D)firewalls.
E)secure socket layering products.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
33
In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.
A)data-couples
B)control labels
C)data-flags
D)control modules
A)data-couples
B)control labels
C)data-flags
D)control modules
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
34
The most rapidly growing type of computing is ________.
A)cloud computing
B)client/server computing
C)desktop computing
D)laptop computing
A)cloud computing
B)client/server computing
C)desktop computing
D)laptop computing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
35
A factor to consider when full systems testing with test data is to examine whether operators have adequate ________ in procedure manuals.
A)documentation
B)testing
C)maintenance
D)data
A)documentation
B)testing
C)maintenance
D)data
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is not used to evaluate a corporate Web site?
A)Learn about the pages that have been accessed.
B)Use "Web bugs" to gather information about the customer.
C)Collect visitor demographics, such as the geographic region or city.
D)Find out who is referring the Web site visitors to your Web site.
E)Determine the browser that the visitor is using.
A)Learn about the pages that have been accessed.
B)Use "Web bugs" to gather information about the customer.
C)Collect visitor demographics, such as the geographic region or city.
D)Find out who is referring the Web site visitors to your Web site.
E)Determine the browser that the visitor is using.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
37
________ is performed most often to improve the existing software.
A)Maintenance
B)Testing
C)Documentation
D)Cloud computing
A)Maintenance
B)Testing
C)Documentation
D)Cloud computing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
38
________ allow(s)users, programmers, and analysts to see the system, its software, and procedures without having to interact with it.
A)Documentation
B)Procedures
C)Stories and folklore
D)Customers
A)Documentation
B)Procedures
C)Stories and folklore
D)Customers
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
39
Once the top-down design approach is taken, the ________ approach is useful in programming.
A)modular
B)system-wide
C)feedback
D)database design
A)modular
B)system-wide
C)feedback
D)database design
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following are the main advantages that FOLKLORE has over blogs and commonly found user communities?
A)It is structured, resulting in more organized, more complete documentation.
B)It encourages someone familiar with the software to seek out information rather than depend on users to come forth on their own.
C)Both A and B.
D)Neither A nor B.
A)It is structured, resulting in more organized, more complete documentation.
B)It encourages someone familiar with the software to seek out information rather than depend on users to come forth on their own.
C)Both A and B.
D)Neither A nor B.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
41
Passwords and authorization codes are examples of logical security controls.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
42
Security of computer facilities is part of the conversion process.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
43
A firewall constructs a barrier between an internal network and an intranet.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
44
When a system is tested with normal transactions, variations are added, including invalid data used to ensure that the system can properly detect errors.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
45
The top-down approach provides the systems group with a ready made division of users into task forces for subsystems.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
46
A firewall is attack-proof.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
47
The program author should not defend his thinking, rationalize problems, or argue.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
48
Six Sigma is more than a methodology, it is a culture built on quality.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
49
With a client/server model, users interact with unlimited parts of the application.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
50
If the reliability of a telecommunications network is high, it is possible to use a distributed system for business.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
51
The fewer data couples and control flags in the system, the more difficult it is to change the system.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
52
On-line manuals on Web sites should include a FAQ page and downloadable updates.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
53
A "client-based application" means that the application resides in a client computer but can also be accessed by other users on the network.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
54
In a client/server model, servers are the users.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
55
At the stage of full systems testing with live data, operators and end-users become actively involved in testing.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
56
Security has three interrelated aspects: physical, logical, and behavioral.As long as at least two aspects are in place, the quality of security is considered high.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
57
When performing a structured walkthrough, the analyst oversees that others adhere to any roles assigned and assures that any activities scheduled are accomplished.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
58
Structured walkthroughs fit well within a total quality assurance program when accomplished throughout the systems development life cycle.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
59
Maintenance is performed most often to improve the existing software, rather than to respond to crisis or system failure.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
60
Reducing maintenance costs is a major concern, because software maintenance alone can devour upward of 50 percent of the total data processing budget for a business.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
61
Define what is meant by doing a structured walkthrough.Who should be involved?
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
62
Conversion by direct changeover means that, on a specified date, users stop using the old system and the new system is put into use.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
63
Distributed systems allow the storage of data where they are not in the way of any online real-time transactions.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
64
Often organizations that are using cloud computing do not find it necessary to make up-front capital expenditures on IT infrastructure, so it enables smaller companies with smaller and less predictable budgets to make advances in processing more quickly.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
65
To make your Web site more secure, you must ask the user or customer to give up some privacy.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
66
Define the terms physical, logical, and behavioral security, and give an example of each one that illustrates the differences among them.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
67
One way to evaluate your Web site is to find out more about the Web site's visitors.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
68
Utilities of information include possession, form, place, access level and time.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
69
Security is the responsibility of all those who come into contact with the system and is only as good as the most lax behavior or policy in the organization.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
70
All people who will have primary or secondary use of a system must be involved in the system design.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
71
The most rapidly growing type of computing is desktop computing.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
72
During disaster planning, redundancy of data provides the key for eliminating single points of failure for servers running Web applications.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
73
Parallel conversion attempts to combine the best features of parallel and direct conversion, without incurring all the risks.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
74
In terms of disaster recovery, what are the seven elements that need to be considered during and after a disaster?
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
75
The fields of disaster preparedness and disaster recovery are independent of each other.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
76
When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
77
There are many different evaluation approaches available, including cost-benefit analysis, the revised decision evaluation approach, and user involvement evaluations.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
78
The hub decomposition diagram is useful for showing how the major hubs are connected.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
79
Systems analysts engage in an educational process with users that is called training.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
80
What are the four major guidelines an analyst should use to set-up training for a new system?
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck