Exam 16: Quality Assurance and Implementation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is not related to structured walkthroughs?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

What is not contained in procedure manuals?

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

________ is a culture built on quality that has a project leader called a Black Belt.

Free
(Multiple Choice)
4.8/5
(23)
Correct Answer:
Verified

A

At the stage of full systems testing with live data, operators and end-users become actively involved in testing.

(True/False)
4.8/5
(40)

Which people are not involved in structured walkthroughs?

(Multiple Choice)
4.8/5
(37)

In the client/server model, which of the following is not handled by the server?

(Multiple Choice)
4.8/5
(29)

________ checks to see if programs that are interdependent actually work together as planned.

(Multiple Choice)
4.8/5
(41)

________ are brief statements representing generalizations or advice.

(Multiple Choice)
4.8/5
(34)

Which of the following is not a privacy consideration for ecommerce?

(Multiple Choice)
4.8/5
(34)

Structured walkthroughs fit well within a total quality assurance program when accomplished throughout the systems development life cycle.

(True/False)
4.8/5
(35)

Security has three interrelated aspects: physical, logical, and behavioral. As long as at least two aspects are in place, the quality of security is considered high.

(True/False)
4.9/5
(42)

The barrier between an internal and external network is called:

(Multiple Choice)
4.8/5
(31)

Often organizations that are using cloud computing do not find it necessary to make up-front capital expenditures on IT infrastructure, so it enables smaller companies with smaller and less predictable budgets to make advances in processing more quickly.

(True/False)
4.7/5
(29)

When a system is tested with normal transactions, variations are added, including invalid data used to ensure that the system can properly detect errors.

(True/False)
4.9/5
(32)

What type of computing allows the use of Web services, database services, and application services over the Internet, without having to invest in corporate or personal hardware, software, or software tools?

(Multiple Choice)
4.8/5
(34)

Which of the following is an action that does not help to provide security for an ecommerce site?

(Multiple Choice)
4.9/5
(32)

The fewer data couples and control flags in the system, the more difficult it is to change the system.

(True/False)
4.7/5
(44)

Utilities of information include possession, form, place, access level and time.

(True/False)
4.8/5
(29)

Which of the following are the main advantages that FOLKLORE has over blogs and commonly found user communities?

(Multiple Choice)
4.8/5
(30)

Passwords and authorization codes are examples of logical security controls.

(True/False)
4.8/5
(30)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)