Deck 9: Systems Development and Project Management: Corporate Responsibility
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/321
Play
Full screen (f)
Deck 9: Systems Development and Project Management: Corporate Responsibility
1
A requirements definition document prioritizes all of the business requirements by order of importance to the company.
True
A requirements definition document prioritizes all of the business requirements by order of importance to the company.
A requirements definition document prioritizes all of the business requirements by order of importance to the company.
2
Conversion occurs when a person or event is the catalyst for implementing major changes for a system to meet business changes.
False
A change agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.
A change agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.
3
Control objects for information and related technology (COBIT) is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
True
Control objects for information and related technology (COBIT) is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
Control objects for information and related technology (COBIT) is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors.
4
The systems development life cycle (SDLC) is the overall process for developing information systems, from planning and analysis through implementation and maintenance.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
5
Sign-off is the users' actual signatures indicating they approve all of the business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
6
Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
7
Business requirements include the process of transferring information from a legacy system to a new system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
8
Business requirements are the specific business requests the system must meet to be successful, so the analysis phase is critical because business requirements drive the entire systems development effort.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
9
Projects are typically dynamic in nature, and change should be expected and anticipated for successful project completion.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
10
Software engineering is a disciplined approach for constructing information systems through the use of common methods, techniques, or tools.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
11
Object-oriented languages provide a programming method that provides for interactive modules to a website.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
12
The testing phase takes all the detailed design documents from the design phase and transforms them into the actual system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
13
Brainstorming is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
14
The design phase establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
15
Conversion modifies software to meet specific user or business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
16
The planning phase establishes a high-level plan of the intended project and determines project goals.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
17
Requirements management is the process of managing changes to the business requirements throughout the project.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
18
Software engineers use computer-aided software engineering (CASE) software tools provide automated support for the development of the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
19
The analysis phase establishes descriptions of the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
20
A joint application development session is where employees meet, sometimes for several days, to define or review the business requirements for the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
21
Pilot implementation installs the new system in phases (for example by department) until it is verified that it works correctly.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
22
Bugs are defects in the code of an information system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
23
Test conditions detail the steps the system must perform along with the expected result of each step in the implementation phase the organization places the system into production so users can begin to perform actual business operations with it.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
24
Alpha testing occurs when programmers test the system to ensure it is bug-free.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
25
Integration testing verifies that the units or pieces of code function correctly when integrated together.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
26
Training is also provided for the system users and can be online or in a classroom.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
27
Pilot implementation is a small group of people use the new system until it is verified that it works correctly then the remaining users migrate.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
28
Online training runs over the Internet or on a CD or DVD, and employees complete the training on their own time at their own pace.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
29
Scripting languages group data and corresponding processes into objects.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
30
Unit testing uses both the legacy system and new system until all users verifies that the new system functions correctly.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
31
User acceptance testing (UAT) determines if the system satisfies the user and business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
32
Detailed user documentation is created that highlights how to use the system and how to troubleshoot issues or problems.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
33
User acceptance testing tests individual units or pieces of code for a system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
34
Workshop training is held in a classroom environment and led by an instructor.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
35
Development testing verifies that separate systems can work together passing data back and forth correctly.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
36
The development phase brings all the project pieces together into a special testing environment to eliminate errors and bugs, and verify that the system meets all the business requirements defined in the analysis phase.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
37
Development Testing assess if the entire system meets the design requirements of the users.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
38
Help desk or a group of people who respond to user's questions.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
39
Plunge implementation discards the legacy system completely and immediately migrates all users to the new system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
40
Fourth-generation languages (4GL) are programming languages that look similar to human languages. For example, a typical 4GL command might state, "FIND ALL RECORDS WHERE NAME IS "SMITH"."
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
41
Computer-aided software engineering (CASE) tools are software suites that automate systems analysis, design, and development.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
42
First generation machine language difficult for people to understand.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
43
A data flow diagram involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
44
Preventative maintenance makes system changes to reduce the chance of future system failure.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
45
The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
46
Summary internal reports highlight situations occurring outside of the normal operating range for a condition or standard.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
47
Corrective maintenance makes system changes to reduce the chance of future system failure.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
48
Exception reports organize and categorize data for managerial perusal.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
49
Process modeling illustrates the movement of information between external entities and the processes and data stores within the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
50
Preventing liabilities is a business-related consequence of failed software.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
51
Detailed internal reports present information with little or no filtering or restrictions of the data.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
52
Control objects for information and related technology (COBIT) are software suites that automate systems analysis, design, and development.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
53
Internal reports present data that is distributed inside the organization and is intended for employees within an organization. Internal reports typically support day-to-day operations monitoring that supports managerial decision making.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
54
Post-implementation reports are formal reports or audits of a project after it is up-and-running.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
55
Information systems audit reports assess a company's information system to determine necessary changes and to help ensure the information systems' availability, confidentiality, and integrity.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
56
Second generation assembly language difficult for people to understand.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
57
A data flow diagram (DFD) illustrates the movement of information between external entities and the processes and data stores within the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
58
Information system control reports ensure the reliability of information, consisting of policies and their physical implementation, access restrictions, or recordkeeping of actions and transactions.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
59
Process modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
60
Corrective maintenance makes system changes to repair design flaws, coding errors, or implementation issues.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
61
Prototyping is a modern design approach by which the designers and system users use an iterative approach to building the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
62
A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
63
Discovery prototyping builds a small-scale representation or working model of the system to ensure that it meets the user and business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
64
Gate one includes inception and this phase ensures that all stakeholders have a shared understanding of the proposed system and what it will do.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
65
Waterfall development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
66
Extreme programming (XP) methodology, like other agile methods, breaks a project into four phases, and developers cannot continue to the next phase until the previous phase is complete.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
67
Fourth generation programming languages that look similar to human languages.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
68
Third generation high-level programming languages, such as c+ and java.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
69
Rapid application development (RAD) methodology (also called rapid prototyping) emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system, to accelerate the systems development process.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
70
A methodology is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
71
Fifth generation programming languages for artificial intelligence and neural networks.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
72
Gate two is elaboration and this phase expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
73
The oldest and the best known is the waterfall methodology, a sequence of phases in which the output of each phase becomes the input for the next.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
74
Iterative development consists of a series of tiny projects. It has become the foundation of multiple agile methodologies.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
75
SCRUM is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
76
The oldest and the best known is the agile methodology, a sequence of phases in which the output of each phase becomes the input for the next.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
77
The rational unified process (RUP) methodology, owned by IBM, provides a framework for breaking down the development of software into four gates.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
78
The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
79
Plunge implementation is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
80
An agile methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck