Exam 16: Quality Assurance and Implementation
Exam 1: Systems, Roles, and Development Methodologies75 Questions
Exam 2: Understanding and Modeling Organizational Systems80 Questions
Exam 3: Project Management79 Questions
Exam 4: Information Gathering: Interactive Methods80 Questions
Exam 5: Information Gathering: Unobtrusive Methods80 Questions
Exam 6: Agile Modeling and Prototyping74 Questions
Exam 7: Using Data Flow Diagrams80 Questions
Exam 8: Analyzing Systems Using Data Dictionaries80 Questions
Exam 9: Process Specifications and Structured Decisions80 Questions
Exam 10: Object-Oriented Systems Analysis and Design Using Uml80 Questions
Exam 11: Designing Effective Output76 Questions
Exam 12: Designing Effective Input79 Questions
Exam 13: Designing Databases83 Questions
Exam 14: Human-Computer Interaction78 Questions
Exam 15: Designing Accurate Data Entry82 Questions
Exam 16: Quality Assurance and Implementation81 Questions
Select questions type
A "client-based application" means that the application resides in a client computer but can also be accessed by other users on the network.
(True/False)
4.8/5
(30)
Six Sigma is more than a methodology, it is a culture built on quality.
(True/False)
4.7/5
(41)
The fewer data couples and control flags in the system, the more difficult it is to change the system.
(True/False)
4.8/5
(36)
Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.
(Multiple Choice)
4.7/5
(39)
Which is not an advantage of using a top-down approach to systems design?
(Multiple Choice)
4.8/5
(36)
A factor to consider when full systems testing with test data is to examine whether operators have adequate ________ in procedure manuals.
(Multiple Choice)
4.8/5
(51)
________ checks to see if programs that are interdependent actually work together as planned.
(Multiple Choice)
4.9/5
(39)
During disaster planning, redundancy of data provides the key for eliminating single points of failure for servers running Web applications.
(True/False)
4.9/5
(36)
Security has three interrelated aspects: physical, logical, and behavioral.As long as at least two aspects are in place, the quality of security is considered high.
(True/False)
4.8/5
(38)
Conversion by direct changeover means that, on a specified date, users stop using the old system and the new system is put into use.
(True/False)
4.9/5
(39)
Products that assess and report on the potential risks in a system are called:
(Multiple Choice)
4.8/5
(38)
When performing a structured walkthrough, the analyst oversees that others adhere to any roles assigned and assures that any activities scheduled are accomplished.
(True/False)
4.9/5
(40)
Which of the following is not a guideline to help choose an appropriate documentation technique?
(Multiple Choice)
4.8/5
(43)
Define what is meant by doing a structured walkthrough.Who should be involved?
(Essay)
4.8/5
(37)
At what stage do operators and end-users become actively involved in testing?
(Multiple Choice)
4.8/5
(40)
In the client/server model, which of the following is not handled by the server?
(Multiple Choice)
4.9/5
(38)
________ is a culture built on quality that has a project leader called a Black Belt.
(Multiple Choice)
4.8/5
(31)
Showing 41 - 60 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)