• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/3

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

3 Cards in this Set

  • Front
  • Back

CIS 210 WK 11 Final Exam

Purchase this tutorial here:


http://xondow.com/CIS-210-WK-11-Final-Exam-CIS21011.htm

Tags: CIS 210,Systems Analysis and Development,cis210, cis210 strayer,cis 210 strayer,cis210 complete,cis 210 complete,cis 210 entire,cis210 entire, cis210 strayer complete, cis 210 strayer complete, cis 210 assignment 1, cis210 assignment 1, cis 210 assignment 2, cis210 assignment 2, cis 210 assignment 3, cis210 assignment 4, cis210 assignment 5, cis 210 assignment 1 Inventory Management Systems, cis 210 assignment 2 Use Cases, cis 210 assignment 3 Input Controls, cis210 assignment 4 Databases, cis 210 term paper Website Migration Project, CIS 210 Case Study 1 Building an Access Control System, CIS 210 Case Study 2 Application Architecture

MULTIPLE CHOICE




1. Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ____, is changing the picture dramatically.


a. Hardware as a Help c. Processing as a Product


b. Software as a Service d. Storage as a Solution






2. Microsoft’s ____ is one of the major Web-based development environments.


a. WebSphere c. NetSphere


b. .NET d. .WEB






3. Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment.


a. GUI c. cloud


b. Web-based d. multinational






4. Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.


a. freeware c. middleware


b. shareware d. public domain software






5. Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology.


a. interpolated c. outsourced


b. mainframe d. cloud






6. ____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.


a. Outsourcing c. Subscription


b. Commission d. External provision






7. A firm that offers outsourcing solutions is called a ____ provider.


a. subscription c. service


b. software d. resource






8. A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.


a. ASP c. ISP


b. OSP d. USP






9. Some firms offer ____, which provide powerful Web-based support for transactions such as order processing, billing, and customer relationship management.


a. ASP c. fixed usage


b. IBS d. fixed-fee transfer






10. Oracle Corporation offers a service called ____, which provides e-business applications on a fixed fee basis.


a. WebSphere c. Business Process Outsourcing


b. .NET d. Oracle On Demand






11. When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.


a. fixed fee model c. subscription model


b. usage model d. transaction model






12. When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.


a. fixed fee model c. subscription model


b. usage model d. transaction model






13. A(n) ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.


a. method c. transaction


b. administrative d. interpolated






14. The choice between developing versus purchasing software often is called a ____ decision.


a. build or make c. transactional


b. subscription d. build or buy






15. The software that a company’s IT department makes, builds, and develops is called ____ software.


a. in-house c. external


b. internal d. indexed






16. A software ____ is software that is obtained from a vendor or application service provider.


a. package c. subscription


b. cluster d. aggregate






17. Companies that develop software for sale are called software ____.


a. VARs c. vendors


b. resellers d. packages






18. A firm that enhances a commercial software package by adding custom features and configuring it for a particular industry is called a(n) ____.


a. BRE c. OSP


b. IRH d. VAR






19. Typically, companies choose in-house software development for all of the following reasons EXCEPT to ____.


a. minimize changes in business procedures and policies


b. meet constraints of existing systems and existing technology


c. develop internal resources and capabilities


d. obtain input from other companies who already have implemented the software






20. Advantages of purchasing a software package over developing software in-house include all of the following EXCEPT ____.


a. satisfaction of unique business requirements


b. lower costs and less time to implement


c. proven reliability and performance benchmarks


d. less technical development staff






21. Buyers can customize a software package by ____.


a. negotiating directly with the software vendor to make enhancements to meet the buyer’s needs by paying for the changes


b. purchasing a basic package that vendors will customize to suit the buyer’s needs


c. purchasing the software and making their own modifications, if this is permissible under the terms of the software license


d. all of the above

For more tutorial visit: http://xondow.com



22. A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.


a. application c. interface


b. configuration d. interpolation






23. In addition to configuring software, an IT staff can create a user ____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application.


a. montage c. interface


b. index d. package






24. Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.


a. no-access properties c. full-access properties


b. read-only properties d. write-only properties






25. A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.


a. request for quotation (RFQ) c. request for proposal (RFP)


b. net present value (NPV) d. return on investment (ROI)






26. When companies use a ____, they already know the specific products or service they want and need to obtain price quotations or bids from vendors.


a. request for quotation (RFQ) c. request for proposal (RFP)


b. net present value (NPV) d. return on investment (ROI)






27. A ____ measures the time a package takes to process a certain number of transactions.


a. newsgroup c. benchmark


b. parameter d. default






28. When planning a slide presentation to management at the end of the systems analysis phase, systems analysts should keep all of the following suggestions in mind EXCEPT ____.


a. summarize the primary viable alternatives


b. ignore time for discussion and questions and answers


c. explain why the evaluation and selection team chose the recommended alternative


d. obtain a final decision or agree on a timetable for the next step in the process






29. The physical design is developed during the ____ phase of the SDLC.


a. systems design c. systems operation and support


b. systems analysis d. systems planning






30. A ____ is a value that the user enters whenever a query is run, which provides flexibility, enables users to access information easily, and costs less.


a. newsgroup c. benchmark


b. parameter d. default






31. A ____ is a value that a system displays automatically.


a. newsgroup c. benchmark


b. parameter d. default






32. Reports that trace the entry of and changes to critical data values are called ____ and are essential in every system.


a. audit trails c. backtracks


b. protective pathways d. value tracks






33. Guidelines to follow when determining data entry and storage considerations include all of the following EXCEPT ____.


a. data should be entered into the system where and when it occurs


b. data should be verified when it is entered


c. data duplication should be encouraged


d. data should be entered into a system only once






34. System ____ produces a full-featured, working model of an information system.


a. prototyping c. coding


b. outsourcing d. benchmarking






35. In an approach called ____ prototyping, systems analysts use prototyping to verify user requirements, after which the prototype is discarded and implementation continues.


a. discard c. trash


b. design d. recycled






36. ____, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system.


a. Prototyping c. Coding


b. Outsourcing d. Benchmarking






37. Prototyping, like that illustrated in the accompanying figure, includes all of the following benefits EXCEPT ____.


a. users and systems developers can avoid misunderstandings


b. managers can evaluate a working model more effectively than a paper specification


c. system requirements, such as reliability and maintainability, can be rated adequately


d. systems analysts can develop testing and training procedures before the finished solution is available






38. In a ____, the commands tend to resemble natural statements that people use.


a. 2GL c. 4GL


b. 3GL d. 5GL






39. In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment.


a. second-generation c. fourth-generation


b. third-generation d. fifth-generation






40. Potential problems of prototyping include all of the following EXCEPT ____.


a. the rapid pace of development can create quality problems


b. some system requirements, such as reliability and maintainability, cannot be tested adequately


c. prototypes become unwieldy and difficult to manage in very complex systems


d. prototyping increases the risk and potential financial exposure that occur when a finished system fails to support business needs









All Questions are Included...