Exam 16: Quality Assurance and Implementation
Exam 1: Systems, Roles, and Development Methodologies75 Questions
Exam 2: Understanding and Modeling Organizational Systems80 Questions
Exam 3: Project Management79 Questions
Exam 4: Information Gathering: Interactive Methods80 Questions
Exam 5: Information Gathering: Unobtrusive Methods80 Questions
Exam 6: Agile Modeling and Prototyping74 Questions
Exam 7: Using Data Flow Diagrams80 Questions
Exam 8: Analyzing Systems Using Data Dictionaries80 Questions
Exam 9: Process Specifications and Structured Decisions80 Questions
Exam 10: Object-Oriented Systems Analysis and Design Using Uml80 Questions
Exam 11: Designing Effective Output76 Questions
Exam 12: Designing Effective Input79 Questions
Exam 13: Designing Databases83 Questions
Exam 14: Human-Computer Interaction78 Questions
Exam 15: Designing Accurate Data Entry82 Questions
Exam 16: Quality Assurance and Implementation81 Questions
Select questions type
In a structured walkthrough, the ________ records what is said so that the others present can interact without encumbrance.
(Multiple Choice)
5.0/5
(27)
All people who will have primary or secondary use of a system must be involved in the system design.
(True/False)
4.8/5
(45)
When a system is tested with normal transactions, variations are added, including invalid data used to ensure that the system can properly detect errors.
(True/False)
4.9/5
(40)
Which of the following is not used to evaluate a corporate Web site?
(Multiple Choice)
4.8/5
(32)
Maintenance is performed most often to improve the existing software, rather than to respond to crisis or system failure.
(True/False)
4.8/5
(45)
Which is not a reason that systems and programs are undocumented or under-documented?
(Multiple Choice)
5.0/5
(39)
At the stage of full systems testing with live data, operators and end-users become actively involved in testing.
(True/False)
4.9/5
(42)
Often organizations that are using cloud computing do not find it necessary to make up-front capital expenditures on IT infrastructure, so it enables smaller companies with smaller and less predictable budgets to make advances in processing more quickly.
(True/False)
4.7/5
(40)
Distributed systems allow the storage of data where they are not in the way of any online real-time transactions.
(True/False)
4.8/5
(27)
The top-down approach provides the systems group with a ready made division of users into task forces for subsystems.
(True/False)
4.8/5
(44)
The program author should not defend his thinking, rationalize problems, or argue.
(True/False)
4.8/5
(43)
Define the terms physical, logical, and behavioral security, and give an example of each one that illustrates the differences among them.
(Essay)
5.0/5
(35)
The most rapidly growing type of computing is desktop computing.
(True/False)
4.7/5
(35)
What type of computing allows the use of Web services, database services, and application services over the Internet, without having to invest in corporate or personal hardware, software, or software tools?
(Multiple Choice)
4.8/5
(38)
Parallel conversion attempts to combine the best features of parallel and direct conversion, without incurring all the risks.
(True/False)
4.8/5
(32)
Which of the following is not a privacy consideration for ecommerce?
(Multiple Choice)
4.9/5
(36)
A three-tiered client/server model includes which of the following?
(Multiple Choice)
4.7/5
(38)
One way to evaluate your Web site is to find out more about the Web site's visitors.
(True/False)
4.8/5
(40)
________ allow(s)users, programmers, and analysts to see the system, its software, and procedures without having to interact with it.
(Multiple Choice)
4.9/5
(40)
Which of the following is an action that does not help to provide security for an ecommerce site?
(Multiple Choice)
4.8/5
(46)
Showing 21 - 40 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)