Faisal Vaid
Quiz por , criado more than 1 year ago

Quiz sobre Chapter 16 (Multiple Choice), criado por Faisal Vaid em 29-02-2016.

40
0
0
Sem etiquetas
Faisal Vaid
Criado por Faisal Vaid aproximadamente 8 anos atrás
Fechar

Chapter 16 (Multiple Choice)

Questão 1 de 40

1

1) Which of the following is not a part of the Six Sigma methodology?

Selecione uma das seguintes:

  • A) Define the problem.

  • B) Analyze the cause.

  • C) Standardize the changes.

  • D) Implement the solution.

  • E) Draw conclusions.

Explicação

Questão 2 de 40

1

2) Which is a way to use peer reviewers to monitor the system's programming and overall development?

Selecione uma das seguintes:

  • A) systems design

  • B) systems development

  • C) structured walkthroughs

  • D) structure charts

Explicação

Questão 3 de 40

1

3) Which of the following is not related to structured walkthroughs?

Selecione uma das seguintes:

  • A) to use peer reviewers to monitor the system's programming

  • B) to monitor the system's specific development

  • C) to point out problems

  • D) to allow the programmer or analyst responsible for that portion to make suitable changes

Explicação

Questão 4 de 40

1

4) Which people are not involved in structured walkthroughs?

Selecione uma das seguintes:

  • A) a programmer or analyst

  • B) a walkthrough coordinator

  • C) a programmer or analyst peer

  • D) the information system department manager

Explicação

Questão 5 de 40

1

5) Which is not an advantage of using a top-down approach to systems design?

Selecione uma das seguintes:

  • A) avoiding the chaos of attempting to design a system "all at once"

  • B) the ability to have separate systems analysis teams working in parallel on different but necessary subsystems

  • C) avoiding bias from the systems analyst

  • D) eventually the subsystems must be reintegrated

Explicação

Questão 6 de 40

1

6) Which is not an advantage of modular programming?

Selecione uma das seguintes:

  • A) Modules make it easier to see the whole program code.

  • B) Tracing an error in a module is less complicated.

  • C) Modules are easier to maintain.

  • D) Modules are easier to grasp.

Explicação

Questão 7 de 40

1

7) Which is an incorrect guideline for modular programming?

Selecione uma das seguintes:

  • A) Keep each module to a manageable size.

  • B) Pay particular attention to the critical interfaces.

  • C) Maximize the number of modules the user needs to modify when making changes.

  • D) Maintain the hierarchical relationships set up in the top-down phases.

Explicação

Questão 8 de 40

1

8) Which is not a reason that systems and programs are undocumented or under-documented?

Selecione uma das seguintes:

  • A) systems

  • B) technicians

  • programs

  • D) systems analysts

  • E) programmers

Explicação

Questão 9 de 40

1

9) What is not contained in procedure manuals?

Selecione uma das seguintes:

  • A) background comments

  • B) steps to accomplish different transactions

  • C) instructions on how to recover from problems

  • D) what to do next if something worked

  • E) trouble-shooting

Explicação

Questão 10 de 40

1

10) Which of the following is not a guideline to help choose an appropriate documentation technique?

Selecione uma das seguintes:

  • A) is compatible with existing documentation

  • B) is understood by others in the organization

  • C) allows you to return to working on the system after you have been away from it for a period of time

  • D) is suitable for the size of the system you are working on

  • E) allows for an unstructured design approach if it is considered to be more important than other factors

Explicação

Questão 11 de 40

1

11) Which is the correct testing process?
I. full systems testing with test data
II. link testing with test data
III. full systems testing with live data
IV. program testing with test data

Selecione uma das seguintes:

  • A) IV - II - I - III

  • B) IV - I - II - III

  • C) II - IV - I - III

  • D) IV - I - III - II

  • E) II - IV - III - I

Explicação

Questão 12 de 40

1

12) At what stage do operators and end-users become actively involved in testing?

Selecione uma das seguintes:

  • A) link testing with test data

  • B) full systems testing with test data

  • C) program testing with test data

  • D) full systems testing with live data

Explicação

Questão 13 de 40

1

13) In the client/server model, which of the following is not handled by the server?

Selecione uma das seguintes:

  • A) access to databases

  • B) managing peripheral devices

  • C) retrieving data

  • D) user interface

Explicação

Questão 14 de 40

1

14) Which of the following is an advantage of the client/server model?

Selecione uma das seguintes:

  • A) less customization of applications

  • B) lower start-up costs

  • C) provides greater computer power

  • D) fosters a high managerial level of decision making

Explicação

Questão 15 de 40

1

15) What type of computing allows the use of Web services, database services, and application services over the Internet, without having to invest in corporate or personal hardware, software, or software tools?

Selecione uma das seguintes:

  • A) broadcast computing

  • B) central computing

  • C) ring computing

  • D) cloud computing

  • E) client computing

Explicação

Questão 16 de 40

1

16) While cloud computing is not immune to outages, it can spread the risk of service interruption to multiple servers by:

Selecione uma das seguintes:

  • A) providing many redundant sites.

  • B) allowing sites to back up their own content as often as they would like.

  • C) connecting to the internet via satellite.

  • D) providing both database services and Web services.

Explicação

Questão 17 de 40

1

17) The barrier between an internal and external network is called:

Selecione uma das seguintes:

  • A) a firewall.

  • B) physical security.

  • C) encryption software.

  • D) behavioral security.

  • E) netlock.

Explicação

Questão 18 de 40

1

18) Ecommerce protection must be used to prevent security threats from:

Selecione uma das seguintes:

  • A) external users.

  • B) internal Web users.

  • C) both external and internal users.

  • D) extranet users.

Explicação

Questão 19 de 40

1

19) Which of these is not a kind of security?

Selecione uma das seguintes:

  • A) behavioral

  • B) hierarchical

  • C) logical

  • D) physical

Explicação

Questão 20 de 40

1

20) Which of the following is an action that does not help to provide security for an ecommerce site?

Selecione uma das seguintes:

  • A) email filtering products

  • B) virus protection software

  • C) URL filtering products

  • D) private key infrastructure

  • E) secure socket layering

Explicação

Questão 21 de 40

1

21) Products that assess and report on the potential risks in a system are called:

Selecione uma das seguintes:

  • A) vulnerability management products.

  • B) intrusion detection products.

  • C) URL filtering products.

  • D) firewalls.

  • E) secure socket layering products.

Explicação

Questão 22 de 40

1

22) Which of the following is not a privacy consideration for ecommerce?

Selecione uma das seguintes:

  • A) Have a corporate policy on privacy that is displayed on the Web site.

  • B) Make it mandatory for users to fill out personal information on a Web site, while ensuring them that the information will be kept confidential.

  • C) Use sources that allow you to obtain anonymous information about classes of customers.

  • D) Only ask for the information the application requires to complete the transaction.

  • E) Avoid the latest trick that permits your client to gather information about the customer.

Explicação

Questão 23 de 40

1

23) Which of the following is not one of the seven elements to consider during and after a disaster?

Selecione uma das seguintes:

  • A) Identify the teams responsible for managing a crisis.

  • B) Establish multiple communication channels among employees and consultants who are onsite.

  • C) Determine data replication technologies that match the organization's timetable for getting systems up and running.

  • D) Provide recovery solutions that include an offsite location.

  • E) Provide the location of the nearest insurance claims adjuster.

Explicação

Questão 24 de 40

1

24) Which of the following is not used to evaluate a corporate Web site?

Selecione uma das seguintes:

  • A) Learn about the pages that have been accessed.

  • B) Use "Web bugs" to gather information about the customer.

  • C) Collect visitor demographics, such as the geographic region or city.

  • D) Find out who is referring the Web site visitors to your Web site.

  • E) Determine the browser that the visitor is using.

Explicação

Questão 25 de 40

1

25) Finding more about the Web page visitors includes:

Selecione uma das seguintes:

  • A) whether the visitor is a new or returning visitor.

  • B) the geographic region of the visitor.

  • C) who the top visitors are.

  • D) All of the above.

Explicação

Questão 26 de 40

1

26) ________ is a culture built on quality that has a project leader called a Black Belt.

Selecione uma das seguintes:

  • A) Six Sigma

  • B) Total Quality Management

  • C) Systems Design

  • D) Systems Analysis and Design

Explicação

Questão 27 de 40

1

27) In a structured walkthrough, the ________ records what is said so that the others present can interact without encumbrance.

Selecione uma das seguintes:

  • A) notetaker

  • B) user

  • C) manager

  • D) programmer

Explicação

Questão 28 de 40

1

28) Use structured walkthroughs as a way to obtain valuable ________ from a perspective that you lack.

Selecione uma das seguintes:

  • A) feedback

  • B) data

  • C) interaction

  • D) stories

Explicação

Questão 29 de 40

1

29) Once the top-down design approach is taken, the ________ approach is useful in programming.

Selecione uma das seguintes:

  • A) modular

  • B) system-wide

  • C) feedback

  • D) database design

Explicação

Questão 30 de 40

1

30) In a structure chart, the arrows with the empty circles are called ________, while the arrows with the filled-in circles are called control flags.

Selecione uma das seguintes:

  • A) data-couples

  • B) control labels

  • C) data-flags

  • D) control modules

Explicação

Questão 31 de 40

1

31) ________ allow(s) users, programmers, and analysts to see the system, its software, and procedures without having to interact with it.

Selecione uma das seguintes:

  • A) Documentation

  • B) Procedures

  • C) Stories and folklore

  • D) Customers

Explicação

Questão 32 de 40

1

32) Which of the following are the main advantages that FOLKLORE has over blogs and commonly found user communities?

Selecione uma das seguintes:

  • A) It is structured, resulting in more organized, more complete documentation.

  • B) It encourages someone familiar with the software to seek out information rather than depend on users to come forth on their own.

  • C) Both A and B.

  • D) Neither A nor B.

Explicação

Questão 33 de 40

1

33) ________ are brief statements representing generalizations or advice.

Selecione uma das seguintes:

  • A) Sayings

  • B) Tales

  • C) Customs

  • D) Art forms

Explicação

Questão 34 de 40

1

34) At the program testing stage, programmers must first ________ their programs to verify the way a routine will work.

Selecione uma das seguintes:

  • A) desk check

  • B) live check

  • C) encode

  • D) encrypt

Explicação

Questão 35 de 40

1

35) ________ checks to see if programs that are interdependent actually work together as planned.

Selecione uma das seguintes:

  • A) Link testing

  • B) Desk checking

  • C) Full systems testing

  • D) Production testing

Explicação

Questão 36 de 40

1

36) A factor to consider when full systems testing with test data is to examine whether operators have adequate ________ in procedure manuals.

Selecione uma das seguintes:

  • A) documentation

  • B) testing

  • C) maintenance

  • D) data

Explicação

Questão 37 de 40

1

37) ________ is performed most often to improve the existing software.

Selecione uma das seguintes:

  • A) Maintenance

  • B) Testing

  • C) Documentation

  • D) Cloud computing

Explicação

Questão 38 de 40

1

38) Although networks can be characterized by their shape or topology, they are also discussed in terms of their ________ coverage and the kinds of services they offer.

Selecione uma das seguintes:

  • A) geographic

  • B) user

  • C) growing

  • D) topic

Explicação

Questão 39 de 40

1

39) The most rapidly growing type of computing is ________.

Selecione uma das seguintes:

  • A) cloud computing

  • B) client/server computing

  • C) desktop computing

  • D) laptop computing

Explicação

Questão 40 de 40

1

40) A three-tiered client/server model includes which of the following?

Selecione uma das seguintes:

  • A) Web server

  • B) application server

  • C) database server

  • D) All of the above.

Explicação