Exam 16: Quality Assurance and Implementation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the four major guidelines an analyst should use to set-up training for a new system?

(Essay)
4.8/5
(43)

To make your website more secure,you must ask the user or customer to give up some privacy.

(True/False)
4.9/5
(32)

During disaster planning,redundancy of data provides the key for eliminating single points of failure for servers running Web applications.

(True/False)
4.9/5
(35)

Which of the following is an action that does not help to provide security for an ecommerce site?

(Multiple Choice)
4.9/5
(36)

Often organizations that are using cloud computing do not find it necessary to make up-front capital expenditures on IT infrastructure,so it enables smaller companies with smaller and less predictable budgets to make advances in processing more quickly.

(True/False)
4.8/5
(33)

In terms of disaster recovery,what are the seven elements that need to be considered during and after a disaster?

(Essay)
4.8/5
(43)

On-line manuals on websites should include a FAQ page and downloadable updates.

(True/False)
4.9/5
(31)

Once the top-down design approach is taken,the ________ approach is useful in programming.

(Multiple Choice)
4.7/5
(32)

Which of these is not a kind of security?

(Multiple Choice)
4.9/5
(33)

The program author should not defend his thinking,rationalize problems,or argue.

(True/False)
4.8/5
(43)

What are seven essential items that the analyst should include in performing a Web site traffic analysis?

(Essay)
4.9/5
(37)

Conversion by direct changeover means that,on a specified date,users stop using the old system,and the new system is put into use.

(True/False)
4.8/5
(39)

Which is a way to use peer reviewers to monitor the system's programming and overall development?

(Multiple Choice)
4.9/5
(31)

One way to evaluate your website is to find out more about the website's visitors.

(True/False)
4.7/5
(40)

The most rapidly growing type of computing is:

(Multiple Choice)
4.8/5
(36)

Which is the correct testing process? I. full systems testing with test data II) link testing with test data III) full systems testing with live data IV) program testing with test data

(Multiple Choice)
4.8/5
(33)

Security is the responsibility of all those who come into contact with the system and is only as good as the most lax behavior or policy in the organization.

(True/False)
4.8/5
(33)

Which of the following is not a part of the Six Sigma methodology?

(Multiple Choice)
4.9/5
(37)

At the stage of full systems testing with live data,operators and end-users become actively involved in testing.

(True/False)
4.9/5
(36)

Security has three interrelated aspects: physical,logical,and behavioral. As long as at least two aspects are in place,the quality of security is considered high.

(True/False)
4.8/5
(27)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)