Skip to main content

IS5803 Quiz

 

IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of system development.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

The database and the Internet speak the same language.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

An evaluation model is a technique that uses a common yardstick to measure and compare vendor ratings.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

Tools make it easier to build an information system, thereby boosting IT productivity and improving the quality of the finished product.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

In an efficient design, data is reentered at least two times.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

A main advantage of ERP is that it describes a specific hardware and software environment, also called a platform, which ensures connectivity and easy integration of future systems, including in-house software and commercial packages.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

Today's mobile devices have enough computing power to provide processing "at the edge," which means at the end of a network, in the user's hands.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

Internal and external factors affect every business decision that a company makes, and IT systems are no exception.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

Using a work breakdown structure (WBS) allows one to manage a project as one large task.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

When network traffic is encrypted, it is invisible and its content and purpose are masked.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

A use case represents the steps in a specific business function or process.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

In the systems design phase, a logical model is built that describes how the system will be constructed.

 a. True

 b. False

Hide Feedback

Correct

Check My Work Feedback

Correct.

_____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

a. Modeling

b. Prototyping

c. Scrum

d. Rapid application development

Hide Feedback

Correct

Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.

a. top-down approach

b. training plan

c. integrated approach

d. test plan

Hide Feedback

Correct

If processes must be performed in a specific sequence, the information should be documented in the _____.

a. process descriptions

b. leveling guide

c. data dictionary

d. data flow diagram (DFD)

Hide Feedback

Correct

_____ is the amount of data that can be transferred in a fixed time period.

a. Dimensionality

b. Topology

c. Resolution

d. Bandwidth

Hide Feedback

Correct

A(n) _____ produces one or more lines of output for each record processed.

a. detail report

b. exigency report

c. exception report

d. summary report

Hide Feedback

Correct

The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.

a. risk policy

b. concealment report

c. security policy

d. threat report

Hide Feedback

Correct

A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a _____.

a. tree map

b. streamgraph

c. histogram

d. flowchart

Hide Feedback

Correct

A software package developed to handle information requirements for a specific type of business is called a(n) _____.

a. horizontal application

b. vertical application

c. asymmetric application

d. symmetric application

Hide Feedback

Correct

Which is an example of a discretionary project?

a. Including annual updates to payroll and tax percentages

b. Creating a new report for a user

c. Updating quarterly changes in reporting requirements for an insurance processing system

d. Adding a report required by a new federal law

Hide Feedback

Correct

A _____ is a set of letters or numbers that represents a data item.

a. code

b. business glossary

c. mnemonic

d. data dictionary

Hide Feedback

Correct

An object's _____ are the tasks or functions that the object performs when it receives a command to do so.

a. roles

b. methods

c. utilities

d. instances

Hide Feedback

Correct

A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.

a. Gantt chart

b. wireframe

c. Scatter chart

d. viewport

Hide Feedback

Correct

 

Comments