Shared Flashcard Set

Details

CIST 2921 Final
Final Exam
71
Computer Networking
Graduate
04/21/2019

Additional Computer Networking Flashcards

 


 

Cards

Term
A request for quotation (RFQ) is less specific than a request for proposal (RFP).

• True
• False
Definition
False
Term
A _____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.

• Return on investment (ROI)
• Present net value (PNV)
• Request for quotation (RFQ)
• Request for proposal (RFP)
Definition
Request for Quotation ( RFQ )
Term
A _____ represents the work that one person can complete in one day.

• Person-work
• Work-duration
• Work-day
• Person-day
Definition
Person-Day
Term
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

• Cardinality
• Scalability
• Compatibility
• Functionality
Definition
Scalability
Term
In a data dictionary, some data elements have _____ rules. For example, an employee’s salary must be within the range defined for the employee’s job classification.

• Range
• Domain
• Validity
• Mastered
Definition
Validity
Term
In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support.

• Evaluation team
• Planning center
• Planning center
• Service desk
Definition
Service Desk
Term
A table design is in third normal form (3NF) if it is in 2NF and if all nonkey fields are dependent on one another.

• True
• False
Definition
False
Term
In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values.

• Type
• Domain
• Valence
• Pool
Definition
Type
Term
The inherent efficiency of high-volume processing on larger computers is called _____.

• Economy of scope
• Economy of scale
• Cardinality
• Monopoly
Definition
Economy of Scale
Term
In a state transition diagram, the states appear as rounded rectangles with the state names inside.

• True
• False
Definition
True
Term
_____ determines how long it takes an information system to spend for itself through reduced costs and increased benefits.
• Acquisition process
• Return on investment (ROI)
• Net present value (NPV)
• Payback analysis
Definition
Payback Analysis
Term
Before publishing a form on the Internet or a company intranet, a systems analyst should protect it so users can change the layout or design but cannot fill it in.

• True
• False
Definition
False
Term
In a web-based design, the Internet serves as the _____ for the database management system.

• Middleware
• Interface
• Back end
• Front end
Definition
Interface

Front End
Term
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.

• True
• False
Definition
True
Term
_____ are internal factors that shape corporate IT choices.

• Technology
• Company Finances
• User Requests
• Strategic Plan
Definition
Company Finances

User Requests

Strategic Plan
Term
Typically, customers purchase licenses that give them the right to use the software under the terms of the license agreement.

• True
• False
Definition
True
Term
Generally, systems analysts review the work of other systems analysts, and programmers review the work of other programmers, as a form of peer review, in structured walk-throughs.

• True
• False
Definition
True
Term
In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships

• True
• False
Definition
False
Term
Identify the letters of the choices that best match the sentences or definitions.

• It typically starts with a systems request, followed by a preliminary investigation, which includes a feasibility study.
• This might propose enhancements for an existing system, the correction of problems, or the development of an entirely new information system.
• It is a system that provides the right products at the right place at the right time.
• It is a technology that is expected to overshadow bar code technology in the future.
• They provide automated responses to sales inquiries, online order processing, and inventory tracking.
• With this application, a supplier can use radio frequency identification (RFID) tags on each crate, case, or shipping unit to create a digital shipping list.
• When assessing this, a systems analyst must consider the interaction between time and costs.
• Its end product is a report to management.
• It shows formal reporting relationships of a group.
• It is a summary of a project request and a specific recommendation.
Definition
System Development
System Request
Just-in-time
Electronic product code
Customer relationship management components
Electronic proof of delivery
Schedule feasibility
Preliminary Investigation
Organization Chart
Case of action
Term
The selection structure is the completion of _____.

• One or more process steps based on the results of a test or condition
• A specific condition that is repeated until a process changes
• A process step that is repeated until a specific condition changes
• Steps in a chronological order, one after another
Definition
One or more process steps based on the results of a test or condition
Term
The selection structure is the completion of _____.

• One or more process steps based on the results of a test or condition
• A specific condition that is repeated until a process changes
• A process step that is repeated until a specific condition changes
• Steps in a chronological order, one after another
Definition
One or more process steps based on the results of a test or condition
Term
One of the disadvantages of _____ methods of system development is that the overall project might be subject to scope change as user requirements change.

• Rapid application development
• Object-oriented analysis
• Structured analysis
• Agile
Definition
Agile
Term
A business process describes a specific set of _____.

• Results
• Events
• Employees
• Transactions
Definition
Results

Events

Transactions
Term
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.

• Fourth normal
• Second normal form
• Third normal form
• Zeroth normal form
Definition
Second Normal Form
Term
In a(n) _____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.

• Spontaneous
• Open-ended
• Unstructured
• Informal
Definition
Informal
Term
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

• Random sample
• Comprehensive Sample
• Stratified sample
• Systematic sample
Definition
Stratified Sample
Term
The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client.

If they make use of the four-model approach, which of the following is a likely outcome?

• It will not be possible to get a clear picture of the current system functions before modifications are made
• The requirements of the new system will always be different from the current information system.
• Time taken to develop the model increases.
• Costs need to develop a logical and physical model of the current system will be less.
Definition
Time taken to develop the model increases
Term
The line from the actor to the use case is called a(n) _____.

• Association
• Aggregation
• Lifeline
• Observation
Definition
Association
Term
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.

• Multinational
• GUI
• Web-based
• Cloud
Definition
Web-based
Term
_____, a human resource issue, is a possible cause of cost overruns in an organization.
• Unrealistic estimates
• Inadequate training
• Inaccurate demand forecast
• Poor monitoring of progress
Definition
Inadequate Training
Term
_____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.

• Flowcharts
• Training plans
• Acceptance tests
• Simulations
Definition
Flowcharts
Term
In a Program Evaluation Review Technique (PERT)/Critical Path Method (CPM) chart, each rectangular box, called a task box, has five sections that contain important information about a task.

• True
• False
Definition
True
Term
Which of the following is true of web-based development?

• When companies acquire web-based software as a service rather than a product they purchase, they can limit in-house involvement to a minimum.
• Web-based software treats the software as a product that is more dependent on desktop computing powers and resources.
• Web-based systems can run on multiple hardware environments.
• Web-based software usually requires middleware to communicate with existing software and legacy systems.
Definition
When companies acquire web-based software as a service rather than a product they purchase, they can limit in-house involvement to a minimum.

Web-based systems can run on multiple hardware environments

Web-based software usually requires middleware to communicate with existing software and legacy systems.
Term
_____ is the process of reviewing a program code to spot logic errors, which produce incorrect results.

• Direct cutover examination
• Results walkthrough
• Desk checking
• Cohesion assurance
Definition
Desk Checking
Term
The term _____ generally refers to systems that divide processing between one or more networked clients and a central server.

• Glueware
• Mission-critical
• Fat client
• Client/server
Definition
Integration Testing
Term
If team members lack experience with certain aspects of the required technology, temporary help might be obtained from IT consultants or part-time staff.

• True
• False
Definition
True
Term
Each _____ contains data about people, places, things, or events.

• File
• Table
• Nonkey field
• Cardinality notation
Definition
File

Table
Term
Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.

• Test plan
• Training plan
• Top-down approach
• Integrated approach
Definition
Top-Down Approach
Term
The characteristics of online processing systems are that _____.

• Users can access data randomly
• Users interact with the information system
• The system process transactions completely when and where they occur
• The systems avoid a constant dialog between the user and the system.
Definition
Users can access data randomly

Users interact with the information system

The system process transactions completely when and where they occur
Term
Agile methods typically use a(n) _____ , which represents a series of iterations based on user feedback.

• Evaluative model
• Spiral model
• Incremental model
• Extreme model
Definition
Spiral Model
Term
The skill set required to develop documentation usually is the same as that required to develop a system.

• True
• False
Definition
False
Term
Many analysts follow _____, which means that they develop a physical model of the current system, a logical model of the current system, a logical model of the new system, and a physical model of the new system.

• The Gane and Sarson symbol
• A four-model approach
• A process description
• The Zachman Framework
Definition
A four-model approach
Term
A(n) _____ represents a person, a place, an event, or a transaction that is significant to the information system.

• Model
• Object
• Class
• Instance
Definition
Object
Term
_____ includes ongoing support and maintenance costs, as well as acquisition costs.

• RCT (Real cost of time)
• JIT (Just-in-time costs)
• CRC (Customer relationship costs)
• TCO (Total cost of ownership)
Definition
TCO (Total cost of ownership)
Term
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.

• True
• False
Definition
True
Term
Creating a standard list of interview questions helps a systems analyst to keep on track and avoid unnecessary tangents.

• True
• False
Definition
True
Term
A _____ defines what must take place, not how it will be accomplished.

• Physical design
• Quantitive design
• Logical design
• Qualitative design
Definition
Logical Design
Term
Emily is functioning with her customer, Anna, on the design of a new database. She describes to Anna that key fields are utilized to access, coordinate, and preserve the data records.
Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.

• Primary key
• Secondary key
• Super key
• Foreign key
Definition
Super Key
Term
In a data flow diagram (DFD), a process symbol can have only one outgoing data flow.

• True
• False
Definition
False
Term
Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services.

• True
• False
Definition
False
Term
_____ combine data from different item attributes, or characteristics, to build a code.

• Significant digit code
• Sequence codes
• Derivation codes
• Category codes
Definition
Derivation Codes
Term
_____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.

• Multipath design
• System architecture
• System file checker
• Legacy data
Definition
System Architecture
Term
Project managers always must be aware of the _____, so they can monitor the vital tasks and keep a project on track.
• Relative path
• Critical path
• Dynamic path
• Absolute path
Definition
Critical Path
Term
Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management.

• Outsource hosting provider (OHP)
• Internet business services (IBS)
• Fixed outsourcing services (FOS)
• Application service provider (ASP)
Definition
Internet business services (IBS)
Term
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

• Candidate key
• Secondary key
• Combination key
• Foreign key
Definition
Foreign Key
Term
A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.

• True
• False
Definition
False
Term
Which of the following are the advantages of using a distributed database management system (DDBMS)?

• The system is less likely to experience a catastrophic failure when data is stored in various locations.
• The data stored closer to users can reduce network traffic.
• The data is stored in various locations thereby making it is easy to maintain controls and standards.
• The system is scalable, so new data sites can be added without reworking the system design.
Definition
The system is less likely to experience a catastrophic failure when data is stored in various locations.

The data stored closer to users can reduce network traffic.
The system is scalable, so new data sites can be added without reworking the system design.
Term
Each activity within the systems analysis phase has an end product and one or more milestones.

• True
• False
Definition
True
Term
An object has certain _____, which are characteristics that describe the object, such as the make, model, and color of a car.

• Attributes
• Elements
• Keys
• Indices
Definition
Attributes
Term
Migrating a traditional database design to the web can require design modification, additional software, and some added expense.

• True
• False
Definition
False
Term
When structured English is used, which of the following rules must be conformed to?

• Avoid standard terms used in the data dictionary.
• Use a limited vocabulary.
• Use indentation for readability.
• Use only the three building blocks of sequence, selection, and iteration.
Definition
Use a limited vocabulary.

Use indentation for readability.

Use only the three building blocks of sequence, selection, and iteration.
Term
A _____ might involve maximums for one or more resources, such as time, dollars, or people.

• Milestone
• Constraint
• Successor task
• Task ID
Definition
Constraints
Term
To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.

• Compatibility
• Scalability
• Applicability
• Reliability
Definition
Scalability
Term
In a data flow diagram (DFD), a data flow must have a process symbol on at least one end.

• True
• False
Definition
True
Term
Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.

• True
• False
Definition
True
Term
Structured analysis is a traditional systems development technique that uses a series of phases, called the _____, to plan, analyze, design, implement, and support an information system.

• object-oriented (O-O) analysis
• enterprise resource planning system (ERP)
• transaction processing (TP) system
• systems development life cycle (SDLC)
Definition
systems development life cycle (SDLC)
Term
A _____ describes the information that a system must provide.

• Data model
• Process model
• Business model
• Network model
Definition
Business Model
Term
EBCDIC and ASCII both require _____ bits for storage of each character.
• Sixteen
• Twelve
• Six
• Eight
Definition
Eight
Term
A class can belong to a more general category called a _____.

• Subclass
• Register
• Catalog
• Superclass
Definition
Superclass
Term
Product-oriented firms manufacture _____.

• Routers
• Computers
• Microchips
• Retail services
Definition
Routers

Computers

Microchips
Term
A combination key can also be called a _____.

• Concatenated key
• Composite key
• Foreign key
• Multivalued key
Definition
Composite Key

Multivalued key
Supporting users have an ad free experience!