• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Which of the following automate and standardize all types of IT management best practices, from initial configuration to ongoing fault management and asset tracking?
A.
Virtualization tools
B.
Virtual reality tools
C.
Policy-based resource-management tools
D.
Policy-based service-level-management tools


page 603
Policy-based resource-management tools
Which of the following is in correct order?
A.
Identify potential vendors, choose the vendors and packages, evaluate vendors and packages
B.
Negotiate a contract, determine the evaluation criteria, evaluate vendors and packages
C.
Choose the vendor and package, negotiate a contract, establish a service level agreement
D.
Determine the evaluation criteria, identify potential vendors, establish a service level agreement


pages 611-613
Choose the vendor and package, negotiate a contract, establish a service level agreement
Acquisition of information systems refers to buying, leasing, or building.
A.
True
B.
False


page 597
true
In a typical eight-stage SDLC the stages:
A.
may never overlap
B.
use the waterfall method
C.
may overlap and can go backward more than one stage
D.
may never go backward


page 635
may overlap and can go backward more than one stage
When we discuss conversion from an older system to a newer we usually discuss four approaches. They are called:
A.
Parallel, Direct, Pilot, Phased
B.
First, Second, Third, Fourth
C.
Upstream, Downstream, mid –stream, last stream
D.
Concurrent, side-by-side, subset, implementation


pages 638-639
Parallel, Direct, Pilot, Phased
One component of a typical RAD System might include:
A.
reusable components
B.
a non-GUI development environment
C.
no reusable components
D.
no code generators


page s642-643
reusable components
In Extreme Programming (XP) the Programmers:
A.
never work in teams.
B.
never work with the “customer”
C.
always work in teams
D. program independently, elaborately designed programs, often in different programming languages, and then they merge them all together


page 646
always work in teams
In component based development components are described as:
A.
many little programs pieced together
B.
self contained packages of functionality that have clearly defined, open interfaces
C.
the exact opposite of “plug and play”
D.
designed to inhibit code reusability


page 648
self contained packages of functionality that have clearly defined, open interfaces
Systems of IT failure usually collapse due to a lack of cooperation by business partners.
A.
True
B.
False


page 599
true
Utility Computing consists of three types of value-added services and two layers of tools.
A.
True
B.
False


page 603
false
Virtualization, Policy-based resource management and Policy-based service-level-management tools are all tools that must be seamlessly integrated to create a:
A.
web-based system
B.
successful Utility Value Proposition
C.
database environment
D.
SOAP


page 656
successful Utility Value Proposition
A tool that a Systems Analyst could use to create a data-flow diagram on a computer instead of drawing it manually is called:
A.
a Java Tool
B.
a CODE Tool
C.
a CASE tool
D.
an HTML based approach
a CASE tool
An approach to software quality is to implement software development standards such as:
A.
Standards 2003
B.
CASE 2001
C.
ISO 9000
D.
ISO Y2K


page 667
ISO 9000
An Object-orientated (OO) system begins with the task to be performed with no aspects of the real world to be modeled.
A.
True
B.
False


page 645
false
This document is sent to potential vendors inviting them to submit a proposal describing their software package and how it would meet the company's needs.
A.
SLA
B.
RFP
C.
ASP
D.
SME
RFP
The inaccessibility of state data in an object is referred to as
A.
messaging.
B.
encapsulation
C.
inheritance
D.
data hiding


page 468
encapsulation
Use of outside contractors or external organizations to acquire IT services is called
A.
connecting
B.
prototyping
C.
outsourcing
D.
acquisition


page 608
outsourcing
The main difference between an outsourcer and an ASP is that an outsourcer will manage application servers in a centrally controlled location, rather than on a customer's site.
A.
True
B.
False
false
In the acquisition process of a general IT application, the second major step is
A.
testing, installation, and integration
B.
operation and maintenance
C.
IT architecture
D.
identifying, justifying, and planning


page 598
IT architecture
IT ____________ is the conceptualization of how the organization's information objectives are met by the capabilities of the specific applications.
A.
Infrastructure
B.
Architecture
C.
Technology
D.
Information


page 598
information