Exam 16: Quality Assurance and Implementation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Ecommerce protection must be used to prevent security threats from:

(Multiple Choice)
4.8/5
(35)

Define the terms physical, logical, and behavioral security, and give an example of each one that illustrates the differences among them.

(Essay)
4.7/5
(31)

In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.

(Multiple Choice)
4.8/5
(34)

Which of the following is an advantage of the client/server model?

(Multiple Choice)
4.8/5
(36)

________ allow(s) users, programmers, and analysts to see the system, its software, and procedures without having to interact with it.

(Multiple Choice)
4.9/5
(37)

Which is not a reason that systems and programs are undocumented or under-documented?

(Multiple Choice)
4.9/5
(37)

Which of the following is not a guideline to help choose an appropriate documentation technique?

(Multiple Choice)
4.9/5
(35)

Parallel conversion attempts to combine the best features of parallel and direct conversion, without incurring all the risks.

(True/False)
4.8/5
(31)

If the reliability of a telecommunications network is high, it is possible to use a distributed system for business.

(True/False)
4.9/5
(39)

________ is performed most often to improve the existing software.

(Multiple Choice)
4.8/5
(29)

Which is the correct testing process? I. full systems testing with test data II. link testing with test data III. full systems testing with live data IV. program testing with test data

(Multiple Choice)
4.7/5
(36)

During disaster planning, redundancy of data provides the key for eliminating single points of failure for servers running Web applications.

(True/False)
4.9/5
(46)

Security of computer facilities is part of the conversion process.

(True/False)
4.9/5
(27)

When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?

(Essay)
4.7/5
(37)

Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.

(Multiple Choice)
4.9/5
(42)

When performing a structured walkthrough, the analyst oversees that others adhere to any roles assigned and assures that any activities scheduled are accomplished.

(True/False)
4.8/5
(46)

At the program testing stage, programmers must first ________ their programs to verify the way a routine will work.

(Multiple Choice)
4.8/5
(34)

A firewall constructs a barrier between an internal network and an intranet.

(True/False)
4.7/5
(38)

Which is not an advantage of using a top-down approach to systems design?

(Multiple Choice)
4.7/5
(31)

All people who will have primary or secondary use of a system must be involved in the system design.

(True/False)
4.9/5
(35)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)