Deck 9: Systems Development and Project Management: Corporate Responsibility

Full screen (f)
exit full mode
Question
Control objects for information and related technology (COBIT)is a set of best practices that helps an organization to maximize the benefits of an information system,while at the same time establishing appropriate controls to ensure minimum errors.
Use Space or
up arrow
down arrow
to flip the card.
Question
Conversion occurs when a person or event is the catalyst for implementing major changes for a system to meet business changes.
Question
Software engineering is a disciplined approach for constructing information systems through the use of common methods,techniques,or tools.
Question
The analysis phase establishes descriptions of the desired features and operations of the system including screen layouts,business rules,process diagrams,pseudo code,and other documentation.
Question
The design phase establishes descriptions of the desired features and operations of the system including screen layouts,business rules,process diagrams,pseudo code,and other documentation.
Question
The planning phase establishes a high-level plan of the intended project and determines project goals.
Question
Business requirements are the specific business requests the system must meet to be successful,so the analysis phase is critical because business requirements drive the entire systems development effort.
Question
Object-oriented languages provide a programming method that provides for interactive modules to a website.
Question
Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs.
Question
The testing phase takes all the detailed design documents from the design phase and transforms them into the actual system.
Question
Sign-off is the users' actual signatures indicating they approve all of the business requirements.
Question
Conversion modifies software to meet specific user or business requirements.
Question
Brainstorming is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
Question
Business requirements include the process of transferring information from a legacy system to a new system.
Question
Requirements management is the process of managing changes to the business requirements throughout the project.
Question
The systems development life cycle (SDLC)is the overall process for developing information systems,from planning and analysis through implementation and maintenance.
Question
Projects are typically dynamic in nature,and change should be expected and anticipated for successful project completion.
Question
A joint application development session is where employees meet,sometimes for several days,to define or review the business requirements for the system.
Question
Software engineers use computer-aided software engineering (CASE),software tools that provide automated support for the development of the system.
Question
A requirements definition document prioritizes all of the business requirements by order of importance to the company.
Question
The development phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verifies that the system meets all the business requirements defined in the analysis phase.
Question
Help desk is a group of people who respond to user's questions.
Question
Training is also provided for the system users and can be online or in a classroom.
Question
Scripting languages group data and corresponding processes into objects.
Question
Fourth-generation languages (4GL)are programming languages that look similar to human languages.For example,a typical 4GL command might state,"FIND ALL RECORDS WHERE NAME IS 'SMITH'."
Question
User acceptance testing (UAT)determines if the system satisfies the user and business requirements.
Question
Online training runs over the Internet or on a CD or DVD,and employees complete the training on their own time at their own pace.
Question
Development testing verifies that separate systems can work together passing data back and forth correctly.
Question
Integration testing verifies that the units or pieces of code function correctly when integrated together.
Question
Development testing assesses if the entire system meets the design requirements of the users.
Question
Plunge implementation discards the legacy system completely and immediately migrates all users to the new system.
Question
Pilot implementation installs the new system in phases (for example by department)until it is verified that it works correctly.
Question
Workshop training is held in a classroom environment and led by an instructor.
Question
Test conditions detail the steps the system must perform along with the expected result of each step in the implementation phase the organization places the system into production so users can begin to perform actual business operations with it.
Question
Pilot implementation is a small group of people use the new system until it is verified that it works correctly.Then the remaining users migrate.
Question
Unit testing uses both the legacy system and new system until all users verifies that the new system functions correctly.
Question
User acceptance testing tests individual units or pieces of code for a system.
Question
Bugs are defects in the code of an information system.
Question
Detailed user documentation is created that highlights how to use the system and how to troubleshoot issues or problems.
Question
Alpha testing occurs when programmers test the system to ensure it is bug-free.
Question
Information systems audit reports assess a company's information system to determine necessary changes and to help ensure the information systems' availability,confidentiality,and integrity.
Question
Internal reports present data that is distributed inside the organization and is intended for employees within an organization.Internal reports typically support day-to-day operations monitoring that supports managerial decision making.
Question
Second generation assembly languages are difficult for people to understand.
Question
A data flow diagram (DFD)illustrates the movement of information between external entities and the processes and data stores within the system.
Question
Corrective maintenance makes system changes to reduce the chance of future system failure.
Question
Detailed internal reports present information with little or no filtering or restrictions of the data.
Question
Exception reports organize and categorize data for managerial perusal.
Question
Preventing liabilities is a business-related consequence of failed software.
Question
Information system control reports ensure the reliability of information,consisting of policies and their physical implementation,access restrictions,or recordkeeping of actions and transactions.
Question
Process modeling illustrates the movement of information between external entities and the processes and data stores within the system.
Question
Summary internal reports highlight situations occurring outside of the normal operating range for a condition or standard.
Question
Preventative maintenance makes system changes to reduce the chance of future system failure.
Question
First generation machine languages are difficult for people to understand.
Question
Control objects for information and related technology (COBIT)are software suites that automate systems analysis,design,and development.
Question
The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
Question
Corrective maintenance makes system changes to repair design flaws,coding errors,or implementation issues.
Question
Computer-aided software engineering (CASE)tools are software suites that automate systems analysis,design,and development.
Question
Process modeling involves graphically representing the processes that capture,manipulate,store,and distribute information between a system and its environment.
Question
A data flow diagram involves graphically representing the processes that capture,manipulate,store,and distribute information between a system and its environment.
Question
Post-implementation reports are formal reports or audits of a project after it is up-and-running.
Question
Plunge implementation is a set of policies,procedures,standards,processes,practices,tools,techniques,and tasks that people apply to technical and management challenges.
Question
The oldest and the best known method is the waterfall methodology,a sequence of phases in which the output of each phase becomes the input for the next.
Question
Discovery prototyping builds a small-scale representation or working model of the system to ensure that it meets the user and business requirements.
Question
Gate two is elaboration,and this phase expands on the agreed-upon details of the system,including the ability to provide an architecture to support and build it.
Question
Extreme programming (XP)methodology,like other agile methods,breaks a project into four phases,and developers can't continue to the next phase until the previous phase is complete.
Question
A methodology is a set of policies,procedures,standards,processes,practices,tools,techniques,and tasks that people apply to technical and management challenges.
Question
Gate one includes inception,and this phase ensures that all stakeholders have a shared understanding of the proposed system and what it will do.
Question
Fourth generation programming languages look similar to human languages.
Question
Waterfall development consists of a series of tiny projects.It has become the foundation of multiple agile methodologies.
Question
The oldest and the best known method is the agile methodology,a sequence of phases in which the output of each phase becomes the input for the next.
Question
The rational unified process (RUP)methodology,owned by IBM,provides a framework for breaking down the development of software into four gates.
Question
SCRUM is a sequential,activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Question
The traditional waterfall methodology is a sequential,activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Question
Iterative development consists of a series of tiny projects.It has become the foundation of multiple agile methodologies.
Question
Third generation high-level programming languages are languages such as C+ and Java.
Question
Fifth generation programming languages for artificial intelligence and neural networks.
Question
An agile methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.
Question
Rapid application development (RAD)methodology (also called rapid prototyping)emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system,to accelerate the systems development process.
Question
Prototyping is a modern design approach by which the designers and system users use an iterative approach to building the system.
Question
A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/321
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Systems Development and Project Management: Corporate Responsibility
1
Control objects for information and related technology (COBIT)is a set of best practices that helps an organization to maximize the benefits of an information system,while at the same time establishing appropriate controls to ensure minimum errors.
True
Explanation: Control objects for information and related technology (COBIT)is a set of best practices that helps an organization to maximize the benefits of an information system,while at the same time establishing appropriate controls to ensure minimum errors.
2
Conversion occurs when a person or event is the catalyst for implementing major changes for a system to meet business changes.
False
Explanation: A change agent is a person or event that is the catalyst for implementing major changes for a system to meet business changes.
3
Software engineering is a disciplined approach for constructing information systems through the use of common methods,techniques,or tools.
True
Explanation: Software engineering is a disciplined approach for constructing information systems through the use of common methods,techniques,or tools.
4
The analysis phase establishes descriptions of the desired features and operations of the system including screen layouts,business rules,process diagrams,pseudo code,and other documentation.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
5
The design phase establishes descriptions of the desired features and operations of the system including screen layouts,business rules,process diagrams,pseudo code,and other documentation.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
6
The planning phase establishes a high-level plan of the intended project and determines project goals.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
7
Business requirements are the specific business requests the system must meet to be successful,so the analysis phase is critical because business requirements drive the entire systems development effort.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
8
Object-oriented languages provide a programming method that provides for interactive modules to a website.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
9
Off-the-shelf application software supports general business processes and does not require any specific software customization to meet the organization's needs.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
10
The testing phase takes all the detailed design documents from the design phase and transforms them into the actual system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
11
Sign-off is the users' actual signatures indicating they approve all of the business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
12
Conversion modifies software to meet specific user or business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
13
Brainstorming is a technique for generating ideas by encouraging participants to offer as many ideas as possible in a short period without any analysis until all the ideas have been exhausted.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
14
Business requirements include the process of transferring information from a legacy system to a new system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
15
Requirements management is the process of managing changes to the business requirements throughout the project.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
16
The systems development life cycle (SDLC)is the overall process for developing information systems,from planning and analysis through implementation and maintenance.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
17
Projects are typically dynamic in nature,and change should be expected and anticipated for successful project completion.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
18
A joint application development session is where employees meet,sometimes for several days,to define or review the business requirements for the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
19
Software engineers use computer-aided software engineering (CASE),software tools that provide automated support for the development of the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
20
A requirements definition document prioritizes all of the business requirements by order of importance to the company.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
21
The development phase brings all the project pieces together into a special testing environment to eliminate errors and bugs and verifies that the system meets all the business requirements defined in the analysis phase.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
22
Help desk is a group of people who respond to user's questions.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
23
Training is also provided for the system users and can be online or in a classroom.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
24
Scripting languages group data and corresponding processes into objects.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
25
Fourth-generation languages (4GL)are programming languages that look similar to human languages.For example,a typical 4GL command might state,"FIND ALL RECORDS WHERE NAME IS 'SMITH'."
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
26
User acceptance testing (UAT)determines if the system satisfies the user and business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
27
Online training runs over the Internet or on a CD or DVD,and employees complete the training on their own time at their own pace.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
28
Development testing verifies that separate systems can work together passing data back and forth correctly.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
29
Integration testing verifies that the units or pieces of code function correctly when integrated together.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
30
Development testing assesses if the entire system meets the design requirements of the users.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
31
Plunge implementation discards the legacy system completely and immediately migrates all users to the new system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
32
Pilot implementation installs the new system in phases (for example by department)until it is verified that it works correctly.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
33
Workshop training is held in a classroom environment and led by an instructor.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
34
Test conditions detail the steps the system must perform along with the expected result of each step in the implementation phase the organization places the system into production so users can begin to perform actual business operations with it.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
35
Pilot implementation is a small group of people use the new system until it is verified that it works correctly.Then the remaining users migrate.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
36
Unit testing uses both the legacy system and new system until all users verifies that the new system functions correctly.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
37
User acceptance testing tests individual units or pieces of code for a system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
38
Bugs are defects in the code of an information system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
39
Detailed user documentation is created that highlights how to use the system and how to troubleshoot issues or problems.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
40
Alpha testing occurs when programmers test the system to ensure it is bug-free.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
41
Information systems audit reports assess a company's information system to determine necessary changes and to help ensure the information systems' availability,confidentiality,and integrity.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
42
Internal reports present data that is distributed inside the organization and is intended for employees within an organization.Internal reports typically support day-to-day operations monitoring that supports managerial decision making.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
43
Second generation assembly languages are difficult for people to understand.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
44
A data flow diagram (DFD)illustrates the movement of information between external entities and the processes and data stores within the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
45
Corrective maintenance makes system changes to reduce the chance of future system failure.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
46
Detailed internal reports present information with little or no filtering or restrictions of the data.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
47
Exception reports organize and categorize data for managerial perusal.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
48
Preventing liabilities is a business-related consequence of failed software.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
49
Information system control reports ensure the reliability of information,consisting of policies and their physical implementation,access restrictions,or recordkeeping of actions and transactions.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
50
Process modeling illustrates the movement of information between external entities and the processes and data stores within the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
51
Summary internal reports highlight situations occurring outside of the normal operating range for a condition or standard.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
52
Preventative maintenance makes system changes to reduce the chance of future system failure.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
53
First generation machine languages are difficult for people to understand.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
54
Control objects for information and related technology (COBIT)are software suites that automate systems analysis,design,and development.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
55
The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
56
Corrective maintenance makes system changes to repair design flaws,coding errors,or implementation issues.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
57
Computer-aided software engineering (CASE)tools are software suites that automate systems analysis,design,and development.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
58
Process modeling involves graphically representing the processes that capture,manipulate,store,and distribute information between a system and its environment.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
59
A data flow diagram involves graphically representing the processes that capture,manipulate,store,and distribute information between a system and its environment.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
60
Post-implementation reports are formal reports or audits of a project after it is up-and-running.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
61
Plunge implementation is a set of policies,procedures,standards,processes,practices,tools,techniques,and tasks that people apply to technical and management challenges.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
62
The oldest and the best known method is the waterfall methodology,a sequence of phases in which the output of each phase becomes the input for the next.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
63
Discovery prototyping builds a small-scale representation or working model of the system to ensure that it meets the user and business requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
64
Gate two is elaboration,and this phase expands on the agreed-upon details of the system,including the ability to provide an architecture to support and build it.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
65
Extreme programming (XP)methodology,like other agile methods,breaks a project into four phases,and developers can't continue to the next phase until the previous phase is complete.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
66
A methodology is a set of policies,procedures,standards,processes,practices,tools,techniques,and tasks that people apply to technical and management challenges.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
67
Gate one includes inception,and this phase ensures that all stakeholders have a shared understanding of the proposed system and what it will do.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
68
Fourth generation programming languages look similar to human languages.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
69
Waterfall development consists of a series of tiny projects.It has become the foundation of multiple agile methodologies.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
70
The oldest and the best known method is the agile methodology,a sequence of phases in which the output of each phase becomes the input for the next.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
71
The rational unified process (RUP)methodology,owned by IBM,provides a framework for breaking down the development of software into four gates.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
72
SCRUM is a sequential,activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
73
The traditional waterfall methodology is a sequential,activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
74
Iterative development consists of a series of tiny projects.It has become the foundation of multiple agile methodologies.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
75
Third generation high-level programming languages are languages such as C+ and Java.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
76
Fifth generation programming languages for artificial intelligence and neural networks.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
77
An agile methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process using the bare minimum requirements.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
78
Rapid application development (RAD)methodology (also called rapid prototyping)emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system,to accelerate the systems development process.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
79
Prototyping is a modern design approach by which the designers and system users use an iterative approach to building the system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
80
A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.
Unlock Deck
Unlock for access to all 321 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 321 flashcards in this deck.