Exam 16: Quality Assurance and Implementation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?

(Essay)
4.9/5
(34)

With a client/server model, users interact with unlimited parts of the application.

(True/False)
4.9/5
(28)

Which is a way to use peer reviewers to monitor the system's programming and overall development?

(Multiple Choice)
4.9/5
(39)

The most rapidly growing type of computing is ________.

(Multiple Choice)
4.8/5
(38)

Reducing maintenance costs is a major concern, because software maintenance alone can devour upward of 50 percent of the total data processing budget for a business.

(True/False)
4.7/5
(36)

What are seven essential items that the analyst should include in performing a Web site traffic analysis?

(Essay)
5.0/5
(30)

Which of these is not a kind of security?

(Multiple Choice)
5.0/5
(41)

Utilities of information include possession, form, place, access level and time.

(True/False)
4.8/5
(36)

Which of the following is not one of the seven elements to consider during and after a disaster?

(Multiple Choice)
4.8/5
(37)

A firewall is attack-proof.

(True/False)
4.8/5
(39)

Once the top-down design approach is taken, the ________ approach is useful in programming.

(Multiple Choice)
4.8/5
(37)

In terms of disaster recovery, what are the seven elements that need to be considered during and after a disaster?

(Essay)
4.9/5
(37)

Which is the correct testing process? I. full systems testing with test data II. link testing with test data III. full systems testing with live data IV. program testing with test data

(Multiple Choice)
4.7/5
(44)

To make your Web site more secure, you must ask the user or customer to give up some privacy.

(True/False)
4.9/5
(38)

Which of the following is an advantage of the client/server model?

(Multiple Choice)
4.9/5
(36)

In a client/server model, servers are the users.

(True/False)
4.7/5
(43)

On-line manuals on Web sites should include a FAQ page and downloadable updates.

(True/False)
4.8/5
(42)

Security is the responsibility of all those who come into contact with the system and is only as good as the most lax behavior or policy in the organization.

(True/False)
4.9/5
(39)

Ecommerce protection must be used to prevent security threats from:

(Multiple Choice)
4.8/5
(42)

In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.

(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)