Exam 16: Quality Assurance and Implementation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

At the program testing stage,programmers must first ________ their programs to verify the way a routine will work.

(Multiple Choice)
4.7/5
(42)

The hub decomposition diagram is useful for showing how the major hubs are connected.

(True/False)
4.7/5
(27)

Define the terms physical,logical,and behavioral security,and give an example of each one that illustrates the differences among them.

(Essay)
4.8/5
(34)

Although networks can be characterized by their shape or topology,they are also discussed in terms of their ________ coverage and the kinds of services they offer.

(Multiple Choice)
4.8/5
(37)

Which of the following is not related to structured walkthroughs?

(Multiple Choice)
4.8/5
(31)

What type of computing allows the use of Web services,database services,and application services over the Internet,without having to invest in corporate or personal hardware,software,or software tools?

(Multiple Choice)
4.9/5
(40)

In a structured walkthrough,the ________ records what is said so that the others present can interact without encumbrance.

(Multiple Choice)
5.0/5
(38)

With a client/server model,users interact with unlimited parts of the application.

(True/False)
4.8/5
(25)

Parallel conversion attempts to combine the best features of parallel and direct conversion,without incurring all the risks.

(True/False)
4.9/5
(38)

In a client/server model,servers are the users.

(True/False)
4.7/5
(36)

Systems analysts engage in an educational process with users that is called training.

(True/False)
4.8/5
(44)

Passwords and authorization codes are examples of logical security controls.

(True/False)
4.8/5
(39)

Which is not an advantage of modular programming?

(Multiple Choice)
4.7/5
(32)

While cloud computing is not immune to outages,it can spread the risk of service interruption to multiple servers by:

(Multiple Choice)
4.9/5
(37)

________ are brief statements representing generalizations or advice.

(Multiple Choice)
4.9/5
(34)

Utilities of information include possession,form,place,access level and time.

(True/False)
4.7/5
(36)

Ecommerce protection must be used to prevent security threats from:

(Multiple Choice)
4.8/5
(37)

________ is performed most often to improve the existing software.

(Multiple Choice)
4.8/5
(34)

Maintenance is performed most often to improve the existing software,rather than to respond to crisis or system failure.

(True/False)
4.9/5
(37)

A firewall is attack-proof.

(True/False)
4.9/5
(33)
Showing 61 - 80 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)