Exam 16: Quality Assurance and Implementation
Exam 1: Systems, Roles, and Development Methodologies74 Questions
Exam 2: Understanding and Modeling Organizational Systems80 Questions
Exam 3: Project Management78 Questions
Exam 4: Information Gathering: Interactive Methods80 Questions
Exam 5: Information Gathering: Unobtrusive Methods80 Questions
Exam 6: Agile Modeling, Prototyping, and Scrum65 Questions
Exam 7: Using Data Flow Diagrams75 Questions
Exam 8: Analyzing Systems Using Data Dictionaries78 Questions
Exam 9: Process Specifications and Structured Decisions78 Questions
Exam 10: Object-Oriented Systems Analysis and Design Using Uml80 Questions
Exam 11: Designing Effective Output75 Questions
Exam 12: Designing Effective Input79 Questions
Exam 13: Designing Databases75 Questions
Exam 14: Human-Computer Interaction and Ux Design78 Questions
Exam 15: Designing Accurate Data Entry Procedures80 Questions
Exam 16: Quality Assurance and Implementation80 Questions
Select questions type
Ecommerce protection must be used to prevent security threats from:
(Multiple Choice)
4.8/5
(35)
Define the terms physical, logical, and behavioral security, and give an example of each one that
illustrates the differences among them.
(Essay)
4.7/5
(31)
In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.
(Multiple Choice)
4.8/5
(34)
Which of the following is an advantage of the client/server model?
(Multiple Choice)
4.8/5
(36)
________ allow(s) users, programmers, and analysts to see the system, its software, and procedures without having to interact with it.
(Multiple Choice)
4.9/5
(37)
Which is not a reason that systems and programs are undocumented or under-documented?
(Multiple Choice)
4.9/5
(37)
Which of the following is not a guideline to help choose an appropriate documentation technique?
(Multiple Choice)
4.9/5
(35)
Parallel conversion attempts to combine the best features of parallel and direct conversion, without incurring all the risks.
(True/False)
4.8/5
(31)
If the reliability of a telecommunications network is high, it is possible to use a distributed system for business.
(True/False)
4.9/5
(39)
________ is performed most often to improve the existing software.
(Multiple Choice)
4.8/5
(29)
Which is the correct testing process?
I. full systems testing with test data
II. link testing with test data
III. full systems testing with live data
IV. program testing with test data
(Multiple Choice)
4.7/5
(36)
During disaster planning, redundancy of data provides the key for eliminating single points of failure for servers running Web applications.
(True/False)
4.9/5
(46)
Security of computer facilities is part of the conversion process.
(True/False)
4.9/5
(27)
When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?
(Essay)
4.7/5
(37)
Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.
(Multiple Choice)
4.9/5
(42)
When performing a structured walkthrough, the analyst oversees that others adhere to any roles assigned and assures that any activities scheduled are accomplished.
(True/False)
4.8/5
(46)
At the program testing stage, programmers must first ________ their programs to verify the way a routine will work.
(Multiple Choice)
4.8/5
(34)
A firewall constructs a barrier between an internal network and an intranet.
(True/False)
4.7/5
(38)
Which is not an advantage of using a top-down approach to systems design?
(Multiple Choice)
4.7/5
(31)
All people who will have primary or secondary use of a system must be involved in the system design.
(True/False)
4.9/5
(35)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)