Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following automate and standardize all types of IT management best practices, from initial configuration to ongoing fault management and asset tracking?
A. Virtualization tools B. Virtual reality tools C. Policy-based resource-management tools D. Policy-based service-level-management tools page 603 |
Policy-based resource-management tools
|
|
Which of the following is in correct order?
A. Identify potential vendors, choose the vendors and packages, evaluate vendors and packages B. Negotiate a contract, determine the evaluation criteria, evaluate vendors and packages C. Choose the vendor and package, negotiate a contract, establish a service level agreement D. Determine the evaluation criteria, identify potential vendors, establish a service level agreement pages 611-613 |
Choose the vendor and package, negotiate a contract, establish a service level agreement
|
|
Acquisition of information systems refers to buying, leasing, or building.
A. True B. False page 597 |
true
|
|
In a typical eight-stage SDLC the stages:
A. may never overlap B. use the waterfall method C. may overlap and can go backward more than one stage D. may never go backward page 635 |
may overlap and can go backward more than one stage
|
|
When we discuss conversion from an older system to a newer we usually discuss four approaches. They are called:
A. Parallel, Direct, Pilot, Phased B. First, Second, Third, Fourth C. Upstream, Downstream, mid –stream, last stream D. Concurrent, side-by-side, subset, implementation pages 638-639 |
Parallel, Direct, Pilot, Phased
|
|
One component of a typical RAD System might include:
A. reusable components B. a non-GUI development environment C. no reusable components D. no code generators page s642-643 |
reusable components
|
|
In Extreme Programming (XP) the Programmers:
A. never work in teams. B. never work with the “customer” C. always work in teams D. program independently, elaborately designed programs, often in different programming languages, and then they merge them all together page 646 |
always work in teams
|
|
In component based development components are described as:
A. many little programs pieced together B. self contained packages of functionality that have clearly defined, open interfaces C. the exact opposite of “plug and play” D. designed to inhibit code reusability page 648 |
self contained packages of functionality that have clearly defined, open interfaces
|
|
Systems of IT failure usually collapse due to a lack of cooperation by business partners.
A. True B. False page 599 |
true
|
|
Utility Computing consists of three types of value-added services and two layers of tools.
A. True B. False page 603 |
false
|
|
Virtualization, Policy-based resource management and Policy-based service-level-management tools are all tools that must be seamlessly integrated to create a:
A. web-based system B. successful Utility Value Proposition C. database environment D. SOAP page 656 |
successful Utility Value Proposition
|
|
A tool that a Systems Analyst could use to create a data-flow diagram on a computer instead of drawing it manually is called:
A. a Java Tool B. a CODE Tool C. a CASE tool D. an HTML based approach |
a CASE tool
|
|
An approach to software quality is to implement software development standards such as:
A. Standards 2003 B. CASE 2001 C. ISO 9000 D. ISO Y2K page 667 |
ISO 9000
|
|
An Object-orientated (OO) system begins with the task to be performed with no aspects of the real world to be modeled.
A. True B. False page 645 |
false
|
|
This document is sent to potential vendors inviting them to submit a proposal describing their software package and how it would meet the company's needs.
A. SLA B. RFP C. ASP D. SME |
RFP
|
|
The inaccessibility of state data in an object is referred to as
A. messaging. B. encapsulation C. inheritance D. data hiding page 468 |
encapsulation
|
|
Use of outside contractors or external organizations to acquire IT services is called
A. connecting B. prototyping C. outsourcing D. acquisition page 608 |
outsourcing
|
|
The main difference between an outsourcer and an ASP is that an outsourcer will manage application servers in a centrally controlled location, rather than on a customer's site.
A. True B. False |
false
|
|
In the acquisition process of a general IT application, the second major step is
A. testing, installation, and integration B. operation and maintenance C. IT architecture D. identifying, justifying, and planning page 598 |
IT architecture
|
|
IT ____________ is the conceptualization of how the organization's information objectives are met by the capabilities of the specific applications.
A. Infrastructure B. Architecture C. Technology D. Information page 598 |
information
|