Exam 12: Information System Development
Exam 1: Introduction to Computers181 Questions
Exam 2: The Internet and the World Wide Web181 Questions
Exam 3: Application Software181 Questions
Exam 4: The Components of the Unit System181 Questions
Exam 5: Input181 Questions
Exam 6: Output181 Questions
Exam 7: Storage181 Questions
Exam 8: Operating Systems and Utility Programs181 Questions
Exam 9: Communications and Networks181 Questions
Exam 10: Database Management181 Questions
Exam 11: Computer Security and Safety, Ethics, and Privacy181 Questions
Exam 12: Information System Development181 Questions
Exam 13: Programming Languages and Program Development181 Questions
Exam 14: Enterprise Computing181 Questions
Exam 15: Computer Careers and Certification181 Questions
Select questions type
In an object, each data element is called a(n) ____________________.
(Short Answer)
4.6/5
(23)
Because they are easy to understand, analysts find that class diagrams like the one in the accompanying figure are an ideal tool for communicating system requirements with users.
(True/False)
5.0/5
(32)
Which of the following occurs when one activity in a project has led to another that was not originally planned; thus, the scope of the project has grown?
(Multiple Choice)
4.9/5
(30)
In developing a computer security plan, the CSO should recognize that some degree of risk is unavoidable.
(True/False)
4.9/5
(38)
The ____________________ phase consists of two major activities: (1) conduct a preliminary investigation and (2) perform detailed analysis.
(Short Answer)
4.8/5
(23)
Critical Thinking Questions Case 12-1 You have taken a temporary position as an IT consultant for a large firm with a variety of database solutions that you and your team are working to consolidate into one enterprise-wide solution. You are currently in the process of gathering information about where things stand with each of the individual database solutions. The CIO has weighed in on the situation and has decided that the risks associated with conversion are too great if there is a chance that the registration system will not work for registering users for the conference. Instead, she is willing to absorb the cost of running the new system in tandem with the old one. What conversion type is a good match for this approach?
(Multiple Choice)
4.9/5
(34)
Critical Thinking Questions Case 12-2 In your work in the IT department, you are charged with asking the difficult questions about the feasibility of new systems as they are being developed. Knowing that you are an expert on feasibility assessment, a colleague has come to you for advice on an issue of schedule feasibility. His project deadline has been adjusted twice before and cannot be extended again. What is an option for him?
(Multiple Choice)
4.9/5
(33)
On a class diagram, every object in a class shares methods and attributes that are part of its higher-level class.
(True/False)
4.8/5
(34)
COGNITIVE ASSESSMENT What is the formal review of any system development deliverable called?
(Multiple Choice)
4.8/5
(39)
An important responsibility of a CSO is to develop a computer security plan.
(True/False)
4.9/5
(34)
The purpose of this phase is to provide ongoing assistance for an information system and its users after the system is implemented. What is this phase?
(Multiple Choice)
4.9/5
(31)
With this kind of conversion, only one location in the company uses a new system - so it can be tested. What is this kind of conversion?
(Multiple Choice)
4.8/5
(33)
Which of the following is any tangible item such as a chart, diagram, report, or program file?
(Multiple Choice)
4.9/5
(36)
Companies today often have a person who is responsible for the physical security of a company's property and people and also is in charge of securing computing resources. What is the title of this person?
(Multiple Choice)
4.9/5
(33)
The advantage of the direct conversion strategy is that it is extremely safe and will not disrupt operations seriously if the new system does not work correctly the first time.
(True/False)
4.8/5
(37)
A(n) ____________________ is an item that can contain both data and the procedures that read or manipulate that data.
(Short Answer)
4.8/5
(27)
To obtain information from a large number of people, system developers use interviews.
(True/False)
4.8/5
(38)
Systems analysts and other IT professionals use several techniques to gather data and information.
(True/False)
4.8/5
(30)
Showing 61 - 80 of 181
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)