Exam 16: Quality Assurance and Implementation
Exam 1: Systems, Roles, and Development Methodologies75 Questions
Exam 2: Understanding and Modeling Organizational Systems80 Questions
Exam 3: Project Management79 Questions
Exam 4: Information Gathering: Interactive Methods80 Questions
Exam 5: Information Gathering: Unobtrusive Methods80 Questions
Exam 6: Agile Modeling and Prototyping74 Questions
Exam 7: Using Data Flow Diagrams80 Questions
Exam 8: Analyzing Systems Using Data Dictionaries80 Questions
Exam 9: Process Specifications and Structured Decisions80 Questions
Exam 10: Object-Oriented Systems Analysis and Design Using Uml80 Questions
Exam 11: Designing Effective Output76 Questions
Exam 12: Designing Effective Input79 Questions
Exam 13: Designing Databases83 Questions
Exam 14: Human-Computer Interaction78 Questions
Exam 15: Designing Accurate Data Entry82 Questions
Exam 16: Quality Assurance and Implementation81 Questions
Select questions type
When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?
(Essay)
4.9/5
(34)
With a client/server model, users interact with unlimited parts of the application.
(True/False)
4.9/5
(28)
Which is a way to use peer reviewers to monitor the system's programming and overall development?
(Multiple Choice)
4.9/5
(39)
Reducing maintenance costs is a major concern, because software maintenance alone can devour upward of 50 percent of the total data processing budget for a business.
(True/False)
4.7/5
(36)
What are seven essential items that the analyst should include in performing a Web site traffic
analysis?
(Essay)
5.0/5
(30)
Utilities of information include possession, form, place, access level and time.
(True/False)
4.8/5
(36)
Which of the following is not one of the seven elements to consider during and after a disaster?
(Multiple Choice)
4.8/5
(37)
Once the top-down design approach is taken, the ________ approach is useful in programming.
(Multiple Choice)
4.8/5
(37)
In terms of disaster recovery, what are the seven elements that need to be considered during and after a disaster?
(Essay)
4.9/5
(37)
Which is the correct testing process? I. full systems testing with test data
II. link testing with test data
III. full systems testing with live data
IV. program testing with test data
(Multiple Choice)
4.7/5
(44)
To make your Web site more secure, you must ask the user or customer to give up some privacy.
(True/False)
4.9/5
(38)
Which of the following is an advantage of the client/server model?
(Multiple Choice)
4.9/5
(36)
On-line manuals on Web sites should include a FAQ page and downloadable updates.
(True/False)
4.8/5
(42)
Security is the responsibility of all those who come into contact with the system and is only as good as the most lax behavior or policy in the organization.
(True/False)
4.9/5
(39)
Ecommerce protection must be used to prevent security threats from:
(Multiple Choice)
4.8/5
(42)
In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.
(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 81
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)