• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/120

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

120 Cards in this Set

  • Front
  • Back
Custom-built systems require minimal programming by in-house staff or outsourced consultants and programmers.
False
Outsourcing of all IS functions is a long-term, strategic decisions.
True
Three-layer architecture is a client/server architecture that divides an application into the view layer, business logic layer, and the data layer.
True
Web services architecture is a client/server architecture that packages software into server processes that can be accessed by the Web protocols.
True
Organizing a project team is usually a simple task of grouping developers together based on the work to be done.
True
Mixing of models between structured development and object-oriented development is a common practice in industry.
False.
Data couples represent the individual data items that are passed between modules in a program call.
True
In object-oriented programming (OOP), the attributes of a class must be declared as private.
False
Use case realization is the programming of each use case.
False
Information maintained on a CRC card is limited to class name, class responsibilities, and data relationships between classes.
False
Method signature consist of visibility, name, parameters and return type.
True
The first-cut sequence diagram should contain only the view layer and the business layer.
False
A loop or repeating message in a sequence diagram is depicted by a rectangle box.
True
The factory method pattern is used to create classes that can be used to instantiate objects from utility classes.
True
A relational database is in third normal form (3NF) if it is is in second normal form (2NF) and if every non-key field is functionally dependent on the primary key.
False
Relationships in an object-oriented database are usually represented by embedding a foreign key in each participating class.
False
A many-to-many relationship is represented differently depending on whether the relationship has any attributes.
True
Object-oriented databases have a data type called LONGRAW that provides a way to store binary data.
False.
In the object-oriented approach, objects send messages back and forth, listening to and responding to each other in sequence.
True
De factor traditions for the placement of buttons are developing based on the standards of the large development firms.
True
___ refers to the amount of computer support that exists for the functions that are included in the new application system.
Level of automation.
A good ___ includes a detailed explanation of the information needs of an organization and the processing requirements that must be fulfilled.
request for proposal (RFP)
Scope creep refers to ___.
requests to add new functions after decisions have been finalized.
Brainstorming and thinking "outside the box" to create new processed and procedures is necessary to generate a ___.
high level of automation.
The decision to outsource all information systems functions is typically made by ___.
top executives
Information systems that are tailored to the exact needs of an organization are referred to as ___.
custom-built software systems.
The initial decision to develop a new information system is frequently an outgrowth of a long-term ___.
strategic plan.
Which of the following would most likely be included in the "Overview of need" section of a request for proposal (RFP)?
Expected business benefits
Which of the following would most likely be included in the "Description of technical requirements" section of a request for proposal (RFP)?
Hardware specifications
The ___ committee usually consists of people are first and foremost, business executives.
oversight
A common approach to determining the ___ of the project is to list each requested function and rate its importance, using categories such as "mandatory", "important", and "desirable".
scope
High-level design that defines the overall structure of a system is called ___ design.
architectural
___ architecture refers to a group of dissimilar computers that share processing load through specialization of function.
Multicomputer
A(n) ___ deploys computing resources in multiple locations connected by a computer network.
distributed architecture
A ___ is typically less than one kilometer long and connects computers within a single building or floor.
local area network (LAN)
Which of the following is the part of the three-layer architecture that contains the user interface?
View layer
Which of the following terms described computer software that implements communication protocols on the network and help different systems communicate?
Middleware
Which of the following shows how application layers are distributed across locations and computer systems?
Network diagram
During network ___, the analyst expands the information content of location diagrams and activity-data matrices to include processing locations, communication protocols, middleware, and communication capacity.
design
Systems ___ is the process of describing, organizing, and structuring the components of a system at both the architecual level and a detailed level with a view toward constructing the proposed system.
design
During ___ design, the analyst first determines the overall structure and form of the solution before trying to design the details.
architectural
During the ___ phase of the systems development life cycle (SDLC), analysts identify the scope of the problem before trying to understand the details.
analysis
The suits of electronic tools that help a project team to coordinate their activities and their information is called computer support for ___.
collaborative work
In structured design, an executable entity comprised of a set of modules is called a(n) ___.
computer program
___ are used primarily to describe large information systems consisting of distinct subsystems and dozens or more programs.
System flowcharts
On a structure diagram, the arrow with the darkened circle represents a ___.
control flag
The best coupling is through simple ___ coupling.
data
What are the three equivalent methods that are used to describe algorithm logic?
Flowchart, structured English, psuedocode
Modules with poor cohesion tend to have high ___.
coupling
A ___ occurs when one module invokes a lower-level module to perform a needed service or calculation.
program call
___ refers to the degree to which all of the code within a module contributes to implementing one well-defined task.
Cohesion
Which of the following is NOT part of a multilayer object-oriented design (OOD)?
Function module layer
Which analysis model servers as an input model to design a class diagram?
Domain model class diagram
In design notation, the ___ property of an attribute is enclosed in curly braces {}.
property
Method signatures are added to each class based on the design decisions made when creating the ___ diagrams for the use cases.
interaction
___ refers to the ability of one object to view and interact with another object.
navigation visibility
Which of the following is true of information hiding?
Access to data is provided through a set of methods.
A(n) ___ is a class invented by a system designer to handle a needed system function.
artifact
Which of the following diagrams is used for architectural design?
Component diagrams
The kind of diagram that documents the ports and socket interfaces is called a(n) ___.
Component diagram
A(n) ___ provides a way of categorizing a model element by its characteristics, indicated by guillements
stereotype
Which is NOT a layer of three layer design.
Controller layer
If the use case is more complex, a set of CRC cards can be given to a developer to be expanded into a ___ diagram for a more complete solution.
sequence.
A ___ diagram shows the placement of various physical nodes (components) across different locations.
deployment
Which of the following is an example of an interaction diagram?
Communication diagram
The final step in multilayer design of a particular use case is to add the ___.
view layer
Drawing a ___ diagram is an effective way to get a quick overview of the objects that work together.
communication
A(n) ___ diagram in UML is simply a high-level diagram that allows designers to associate classes of related groups.
package
What is the least cohesive approach in creating use case controllers in a system?
Define a single use case controller for all use cases.
Every object that sends a message to another object first has ___ to that object.
navigation visibility
When denoting a specific object in a sequence diagram, a ___ serves as the divider between the object name and a reference variable name.
colon
Communication diagrams indicate the order of the messages with ___.
sequential numbers
___ methods must be included in a design class diagram.
Use case specific
The basic package notation is a ___.
tabbed rectangle
Domain layer classes should ___.
prepare persistent classes for storage to the database
Data access layer classes should ___.
contain all Strcutured Query Language (SQL) statements.
Which is the correct syntax for an input message on a sequence diagram?
*[true/false condition] return-value := message-name (parameter-list)
The perfect technology assumption implies that
issues related to technology are ignored
View layer classes should do all of the following EXCEPT ___.
create problem domain classes
Given the following code, indentify the pattern:

Class Connection
{
private static Connection conn = null;
public synchronized static getConnection ( )
{
if (conn == null) {
conn = new Connection ( ) ;}
return conn;
}
}
Singleton Pattern
Given the observer pattern and the method "onActionPerformed( )," which class/interface contains the above method?
the Listenable class
A(n) ___ describes the structure, content, and access controls of a physical data store or database.
schema
Which of the following is an example of access control?
Lists of users allowed to read or update data element contents
ObjectStore is an example of a(n) ___ .
object database management system (ODBMS)
A(n) ___ relational database management system stores data in tables.
relational
In a relational database, a row can be referred to as a(n) ___.
tuple
Data elements in a relational database are organized into ___.
tables
___ are a critical element of relational database design because they are the bases for representing relationships among tables.
Keys
A(n) ___ is a field or set of fields stored in one table that also exists as a primary key in another table.
foreign key
Using ___ key values adds complexity to processes that manipulate key fields.
redundant
All ___ in a table are guaranteed to be unique if the table's primary key is guaranteed to be unique.
rows
A relational database table is in ___ normal form if every non-key field is functionally dependent on the entire primary key.
second (2NF)
___ first appears as fledging commercial products in the early 1990s.
Object database management systems (ODBMSs)
A(n) ___ is a physical storage address or a reference that can be converted to a physical storage address at run time.
object indentifier
null
null
The class and relationship definitions for an object database management system (ODBMS) are written in ___.
Object Definition Language (ODL)
A(n) ___ class must be created to store the attributes of a many-to-many relationship among two other classes.
association
null2
null2
Each class on a class diagram can be represented by a(n) ___ in a relational database.
table
A ___ database server architecture is the simplest to build and operate if sufficient network capacity is already available for database access.
single
A significant disadvantage of a single server database architecture is that it ___.
can result in performance bottlenecks.
A ___ database server architecture is only feasible when a database schema can be cleanly divided among client access user groups.
partitioned
In an object-oriented approach, inputs and outputs are included in the event table model as ___.
triggers and responses
The study of end users and their interactions with computers is called ___.
human-computer interaction (HCI)
Which of the following is NOT one of the principles of user-centered design?
Business requirements drive development.
Office works who use the system all day are most concerned about having an interface which ___.
utilizes shortcuts and hot keys
Which of the following is NOT a good technique for evaluating interface designs?
Ensure that all observation is formal.
The study of human interaction with machines in general is called ___.
human factors engineering
A metaphor of human-computer interaction (HCI) in which interacting with the computer is much like carrying on a conversation is called the ___.
dialog metaphor
User-interface design is often referred to as dialog design because the ___.
interaction is much like a conversation between the user and the computer.
A key principle of human-computer interaction (HCI) that states that all controls should be noticeable and provide an indication that the control is responding to the user's action is called ___.
visibility
Each dialog within the system should be organized with a clear sequence -- a begining, middle, and end. This describes which of the eight golden rules for designing interactive interfaces?
Design dialogs to yield closure
Which of the following statements regarding dialog design is FALSEW?
Dialog design must be completed after the other design activities.
A technique used to document dialog designs by showing a sequence of display screen sketches is ___.
storyboarding
Browser forms produced by Visual Studio .NET are now called ___ forms.
Web
Forms programmed using HTML that follow internet conventions are called ___ forms.
browser
Which of the following forms are used primarily for displaying information?
output forms
A variation of the list box that presents multiple entries in a text box from which the user can select is called a ___.
spin box
Radio buttons are sometimes called ___ buttons.
option
Context-sensitive help automatically displays the appropriate help topic based on ___.
the location of the insertion point