Deck 13: Systems Development: Design, Implementation, and Review

Full screen (f)
exit full mode
Question
Security is not an important consideration of logical design but comes latter in the system development process.
Use Space or
up arrow
down arrow
to flip the card.
Question
The use of virtual servers can help save energy and space.
Question
During the final evaluation, vendors are asked to fully demonstrate their system in as close to actual operating conditions as possible.
Question
Designing a good interface for users can improve user satisfaction with the system and lead to improved security.
Question
Programming and software acquisition, user preparation, and site and data preparation are all part of the system design process.
Question
One of the best approaches to evaluate hardware from different vendors is to rely on each vendor's published benchmark test results.
Question
Increasingly, organizations are using virtualization to create a cold site that keeps applications and databases available on a virtual computer that can take over if a disaster renders the main information system inoperable.
Question
During physical design, the characteristics of the hardware, software, database, telecommunications, personnel, and procedure and control specifications must be detailed.
Question
Designing security controls and procedures into the use of smartphones and other mobile devices can be a challenge for many organizations.
Question
Many organizations are turning to object oriented development because of its increased flexibility.
Question
The system specifications are documented in a design report, which is the primary result of systems investigation.
Question
Logical design involves planning the purpose of each system element, independent of hardware and software considerations.
Question
The most cost-effective time to deal with potential errors is late in the design phase where every possibility should be considered.
Question
Logical and physical design can be accomplished using either the traditional approach or the object-oriented approach to systems development.
Question
Organizations that use the cloud-computing approach for some applications don't have to worry about acquiring hardware for these applications.
Question
The logical design specifications that are determined and documented include output, input, process, file and database, telecommunications, procedures, controls and security, and personnel and job requirements.
Question
When a database fails, failover automatically switches applications and other programs that use the database to a redundant or replicated database so these is no interruption of service.
Question
An organization may have to hire and train new IS personnel as part of the effort to implement a new information system.
Question
The Leadership in Energy and Environmental Design (LEED) rating system was developed by the U.N. Green Building Council and includes a number of standards for the construction and operation of information systems technology.
Question
In executing the Request for Proposal process to acquire hardware or software, the number of vendors considered is high during the preliminary evaluation and then decreases as more is learned about vendors during the final evaluation.
Question
Beta testing involves testing a complete and stable system by end users.
Question
Called "on demand" computing, this approach requires an organization to ____.

A) pay the service provider periodically as requested by the provider
B) use virtual computers
C) request the service provider for services well in advance of needing them
D) pay only for the computer power it uses, just as it would for a utility such as electricity
Question
The purpose of system design is to answer the question ____.

A) "What hardware and software will be required to operate the new system?"
B) "What must the information system do to solve the problem?"
C) "How much will the new system cost and when can it be operational?"
D) "How will the information system solve a problem?"
Question
In some cases, organizations decide not to install the latest software because the amount of time and money to train employees is too much.
Question
Environmental design involves systems development efforts that ____.

A) reduce the power consumption of the new system
B) requires less physical space
C) result in systems that can be disposed of in a manner that does not negatively affect the environment
D) all of the above
Question
Virtualization ____.

A) increases hardware space requirements
B) lead to increases in power consumption
C) introduces important implementation considerations including security and backup procedures
D) all of the above
Question
SaaS allows individuals or organizations to access needed software applications over the Internet.
Question
In the ______ evaluation technique, a decision-making group is appointed and given the responsibility of making the final evaluation and selection.

A) cost/benefit analysis
B) group consensus
C) benchmark tests
D) point evaluation
Question
Data conversion involves making sure that all files and databases are ready to be used with the new computer software and systems.
Question
A good contract for new computer equipment should include ____.

A) a dispute resolution process if something goes wrong
B) ownership and property rights of the new or modified system
C) contingency provisions in case something does not work as expected
D) all of the above
Question
Data preparation may involve the conversion of old data files into a format that can be used by the new system
Question
An advantage of buying off-the-shelf software is that you have an opportunity to assess how well it meets your needs before purchasing it.
Question
Today most software is developed in-house rather than purchased from external developers.
Question
The U.S. government has the tool called ______ to analyze the energy usage of new systems.

A) Energy Star
B) Electronic Product Environmental Assessment Tool
C) Leadership in Energy and Environmental Design system
D) Gantt
Question
An advantage of purchasing of hardware equipment is _____.

A) the cost of the equipment can be depreciated
B) no risk of obsolescence
C) no long term financial investment
D) all of the above
Question
____ is an evaluation approach that compares systems operating under the same conditions.

A) Cost/benefit analysis
B) Benchmark test
C) Point evaluation system
D) Group consensus
Question
During the testing phase, if the system testing is completed successfully, no further testing is needed.
Question
A pilot start-up involves running the new system for one group of users while the rest of the users still run the old system.
Question
A key system design task is____.

A) develop an RFP
B) user preparation
C) site preparation
D) hardware acquisition
Question
Software programs developed within a company have a greater potential for providing a competitive advantage because competitors cannot easily duplicate them in the short term.
Question
______ is the implementation of the disaster plan.
Question
When users want to know more about a program or feature or what type of response is expected, they can activated the ______ facility.
Question
In comparing the pros and cons of developing application software with internal resources versus buying off-the-shelf software, an advantage of off-the-shelf is ____.

A) the organization can use the software to gain a lasting competitive advantage
B) the lead time to implement the software is greatly shortened
C) the software will match the organization's needs exactly with no need for customization
D) none of the above
Question
A legacy system ____.

A) closely matches the current needs of the organization
B) is usually easy to modify to add new features
C) requires minimal cost to maintain
D) is an old system that may have been patched or modified repeatedly over time
Question
In the ____________________ system cutover approach, components of the new system are slowly phased in while components of the old system ware slowly phased out.

A) pilot start-up
B) phase-in
C) parallel start-up
D) direct conversion
Question
With a(n) _____ system, users simply pick what they want to do from a list of alternatives.
Question
A combination of tools needed for programming with a programming language in one integrated package is called ____.

A) an integrated development environment
B) cross-platform development package
C) CASE
D) an object oriented approach
Question
Technical documentation ____.

A) contains details used by computer operators to execute the program
B) is used by analysts and programmers to solve problems or modify the program
C) explains the purpose of every major piece of code
D) all of the above
Question
_____ testing involves testing an incomplete or early version of the system

A) Alpha
B) Unit
C) Volume testing
D) Beta
Question
When purchasing used computer-related equipment via Internet auction, companies can ____.

A) always expect prices to be much lower
B) expect a broad range of equipment selection
C) obtain product warranties and support
D) frequently purchase equipment at a 20% to 30% discount
Question
Site preparation can include this task ____.

A) the hiring and training of IS personnel
B) installing special wiring and air conditioning
C) readying users for the new system
D) physically placing the computer system on the site and making it operational
Question
Installation of computer equipment typically involves this action ____.

A) someone from the customer's organization oversees the manufacturer as the equipment is installed
B) once the equipment is installed, someone performs several tests to ensure everything is working properly
C) the contract should be used to ensure that all equipment is delivered and installed
D) all of the above
Question
When following the object-oriented design approach, you might want to design the sequence of events for performing some process. The event sequence is also called a(n) ____________________.
Question
An advantage of in-house developed software is ____.

A) meeting user and organizational requirements without customization
B) greater potential for providing competitive advantage
C) increased flexibility in terms of customization and change
D) all of the above
Question
The testing of each individual program is called ____.

A) system testing
B) unit
C) acceptance testing
D) integration testing
Question
A ______ is a significant program change that often requires changes in the documentation of the program.

A) slipstream upgrade
B) patch
C) release
D) upgrade
Question
The design of a new system is broken into two phases, ____________________ design and physical design.
Question
The last of the systems implementation tasks is ____.

A) user acceptance
B) site preparation
C) testing
D) hardware acquisition
Question
The process of physically placing the computer equipment on the site and making it operational is called ____.

A) site preparation
B) user acceptance
C) start-up
D) installation
Question
The process of readying managers, decision makers, employees, stakeholders, and others for the new system is called ____.

A) user preparation
B) user acceptance
C) start-up
D) installation
Question
One system start-up approach, known as ____________________ involves stopping the old system and starting the new system on a given data.
Question
A(n) ____________________ combines the tools needed for programming with a programming language into one integrated package.
Question
____________________ is an evaluation approach that involves expressing all the costs and benefits of a new system in monetary terms.
Question
The purpose of disaster planning is to ensure ______, where the organization's critical applications, data, and information systems are continuously available.
Question
Near the end of the design stage, some organizations prohibit further changes in the design of the system in an approach called ____________________ design specifications.
Question
____________________ involves running the new system for one group of users rather than all users.
Question
The ____________________ software development technique allows programmers to develop programs that can run on computer systems that have different hardware and operating systems.
Question
____________________ is the process of readying managers, decision makers, employees, other users, and stakeholders for the new system
Question
Files and databases can be protected by making a copy of all files and databases that changed during the last few day, a technique known as ______.
Question
_______________ is documentation that shows how the program can and should be used.
Question
____________________ allows businesses to subscribe to Web-delivered application software by paying a monthly service charge or per-use fee.
Question
The location of the new system needs to be made ready, a process called ____________________.
Question
The _______________ decision is whether to purchase software from external developers or develop it in house.
Question
Acceptance testing involves conducting any additional testing required by the ____________________.
Question
A duplicate, operational hardware system that is ready for use is an example of a ____________________.
Question
A(n) ____________________ requiring identification numbers, passwords, and other safeguards is available with most systems to improve security and unauthorized use.
Question
The U.S. Department of Energy rates products with the ______ to help people select that products that save energy.
Question
______ are rules and procedures to maintain data security.
Question
A(n) ____________________ is an examination that compares computer systems operating under the same conditions.
Question
_______________ requires a company to produce corporate e-mails, documents, and other important data.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/85
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 13: Systems Development: Design, Implementation, and Review
1
Security is not an important consideration of logical design but comes latter in the system development process.
False
2
The use of virtual servers can help save energy and space.
True
3
During the final evaluation, vendors are asked to fully demonstrate their system in as close to actual operating conditions as possible.
True
4
Designing a good interface for users can improve user satisfaction with the system and lead to improved security.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
5
Programming and software acquisition, user preparation, and site and data preparation are all part of the system design process.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
6
One of the best approaches to evaluate hardware from different vendors is to rely on each vendor's published benchmark test results.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
7
Increasingly, organizations are using virtualization to create a cold site that keeps applications and databases available on a virtual computer that can take over if a disaster renders the main information system inoperable.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
8
During physical design, the characteristics of the hardware, software, database, telecommunications, personnel, and procedure and control specifications must be detailed.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
9
Designing security controls and procedures into the use of smartphones and other mobile devices can be a challenge for many organizations.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
10
Many organizations are turning to object oriented development because of its increased flexibility.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
11
The system specifications are documented in a design report, which is the primary result of systems investigation.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
12
Logical design involves planning the purpose of each system element, independent of hardware and software considerations.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
13
The most cost-effective time to deal with potential errors is late in the design phase where every possibility should be considered.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
14
Logical and physical design can be accomplished using either the traditional approach or the object-oriented approach to systems development.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
15
Organizations that use the cloud-computing approach for some applications don't have to worry about acquiring hardware for these applications.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
16
The logical design specifications that are determined and documented include output, input, process, file and database, telecommunications, procedures, controls and security, and personnel and job requirements.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
17
When a database fails, failover automatically switches applications and other programs that use the database to a redundant or replicated database so these is no interruption of service.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
18
An organization may have to hire and train new IS personnel as part of the effort to implement a new information system.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
19
The Leadership in Energy and Environmental Design (LEED) rating system was developed by the U.N. Green Building Council and includes a number of standards for the construction and operation of information systems technology.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
20
In executing the Request for Proposal process to acquire hardware or software, the number of vendors considered is high during the preliminary evaluation and then decreases as more is learned about vendors during the final evaluation.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
21
Beta testing involves testing a complete and stable system by end users.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
22
Called "on demand" computing, this approach requires an organization to ____.

A) pay the service provider periodically as requested by the provider
B) use virtual computers
C) request the service provider for services well in advance of needing them
D) pay only for the computer power it uses, just as it would for a utility such as electricity
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
23
The purpose of system design is to answer the question ____.

A) "What hardware and software will be required to operate the new system?"
B) "What must the information system do to solve the problem?"
C) "How much will the new system cost and when can it be operational?"
D) "How will the information system solve a problem?"
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
24
In some cases, organizations decide not to install the latest software because the amount of time and money to train employees is too much.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
25
Environmental design involves systems development efforts that ____.

A) reduce the power consumption of the new system
B) requires less physical space
C) result in systems that can be disposed of in a manner that does not negatively affect the environment
D) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
26
Virtualization ____.

A) increases hardware space requirements
B) lead to increases in power consumption
C) introduces important implementation considerations including security and backup procedures
D) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
27
SaaS allows individuals or organizations to access needed software applications over the Internet.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
28
In the ______ evaluation technique, a decision-making group is appointed and given the responsibility of making the final evaluation and selection.

A) cost/benefit analysis
B) group consensus
C) benchmark tests
D) point evaluation
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
29
Data conversion involves making sure that all files and databases are ready to be used with the new computer software and systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
30
A good contract for new computer equipment should include ____.

A) a dispute resolution process if something goes wrong
B) ownership and property rights of the new or modified system
C) contingency provisions in case something does not work as expected
D) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
31
Data preparation may involve the conversion of old data files into a format that can be used by the new system
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
32
An advantage of buying off-the-shelf software is that you have an opportunity to assess how well it meets your needs before purchasing it.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
33
Today most software is developed in-house rather than purchased from external developers.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
34
The U.S. government has the tool called ______ to analyze the energy usage of new systems.

A) Energy Star
B) Electronic Product Environmental Assessment Tool
C) Leadership in Energy and Environmental Design system
D) Gantt
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
35
An advantage of purchasing of hardware equipment is _____.

A) the cost of the equipment can be depreciated
B) no risk of obsolescence
C) no long term financial investment
D) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
36
____ is an evaluation approach that compares systems operating under the same conditions.

A) Cost/benefit analysis
B) Benchmark test
C) Point evaluation system
D) Group consensus
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
37
During the testing phase, if the system testing is completed successfully, no further testing is needed.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
38
A pilot start-up involves running the new system for one group of users while the rest of the users still run the old system.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
39
A key system design task is____.

A) develop an RFP
B) user preparation
C) site preparation
D) hardware acquisition
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
40
Software programs developed within a company have a greater potential for providing a competitive advantage because competitors cannot easily duplicate them in the short term.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
41
______ is the implementation of the disaster plan.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
42
When users want to know more about a program or feature or what type of response is expected, they can activated the ______ facility.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
43
In comparing the pros and cons of developing application software with internal resources versus buying off-the-shelf software, an advantage of off-the-shelf is ____.

A) the organization can use the software to gain a lasting competitive advantage
B) the lead time to implement the software is greatly shortened
C) the software will match the organization's needs exactly with no need for customization
D) none of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
44
A legacy system ____.

A) closely matches the current needs of the organization
B) is usually easy to modify to add new features
C) requires minimal cost to maintain
D) is an old system that may have been patched or modified repeatedly over time
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
45
In the ____________________ system cutover approach, components of the new system are slowly phased in while components of the old system ware slowly phased out.

A) pilot start-up
B) phase-in
C) parallel start-up
D) direct conversion
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
46
With a(n) _____ system, users simply pick what they want to do from a list of alternatives.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
47
A combination of tools needed for programming with a programming language in one integrated package is called ____.

A) an integrated development environment
B) cross-platform development package
C) CASE
D) an object oriented approach
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
48
Technical documentation ____.

A) contains details used by computer operators to execute the program
B) is used by analysts and programmers to solve problems or modify the program
C) explains the purpose of every major piece of code
D) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
49
_____ testing involves testing an incomplete or early version of the system

A) Alpha
B) Unit
C) Volume testing
D) Beta
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
50
When purchasing used computer-related equipment via Internet auction, companies can ____.

A) always expect prices to be much lower
B) expect a broad range of equipment selection
C) obtain product warranties and support
D) frequently purchase equipment at a 20% to 30% discount
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
51
Site preparation can include this task ____.

A) the hiring and training of IS personnel
B) installing special wiring and air conditioning
C) readying users for the new system
D) physically placing the computer system on the site and making it operational
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
52
Installation of computer equipment typically involves this action ____.

A) someone from the customer's organization oversees the manufacturer as the equipment is installed
B) once the equipment is installed, someone performs several tests to ensure everything is working properly
C) the contract should be used to ensure that all equipment is delivered and installed
D) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
53
When following the object-oriented design approach, you might want to design the sequence of events for performing some process. The event sequence is also called a(n) ____________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
54
An advantage of in-house developed software is ____.

A) meeting user and organizational requirements without customization
B) greater potential for providing competitive advantage
C) increased flexibility in terms of customization and change
D) all of the above
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
55
The testing of each individual program is called ____.

A) system testing
B) unit
C) acceptance testing
D) integration testing
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
56
A ______ is a significant program change that often requires changes in the documentation of the program.

A) slipstream upgrade
B) patch
C) release
D) upgrade
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
57
The design of a new system is broken into two phases, ____________________ design and physical design.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
58
The last of the systems implementation tasks is ____.

A) user acceptance
B) site preparation
C) testing
D) hardware acquisition
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
59
The process of physically placing the computer equipment on the site and making it operational is called ____.

A) site preparation
B) user acceptance
C) start-up
D) installation
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
60
The process of readying managers, decision makers, employees, stakeholders, and others for the new system is called ____.

A) user preparation
B) user acceptance
C) start-up
D) installation
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
61
One system start-up approach, known as ____________________ involves stopping the old system and starting the new system on a given data.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) ____________________ combines the tools needed for programming with a programming language into one integrated package.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
63
____________________ is an evaluation approach that involves expressing all the costs and benefits of a new system in monetary terms.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
64
The purpose of disaster planning is to ensure ______, where the organization's critical applications, data, and information systems are continuously available.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
65
Near the end of the design stage, some organizations prohibit further changes in the design of the system in an approach called ____________________ design specifications.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ involves running the new system for one group of users rather than all users.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
67
The ____________________ software development technique allows programmers to develop programs that can run on computer systems that have different hardware and operating systems.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
68
____________________ is the process of readying managers, decision makers, employees, other users, and stakeholders for the new system
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
69
Files and databases can be protected by making a copy of all files and databases that changed during the last few day, a technique known as ______.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
70
_______________ is documentation that shows how the program can and should be used.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
71
____________________ allows businesses to subscribe to Web-delivered application software by paying a monthly service charge or per-use fee.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
72
The location of the new system needs to be made ready, a process called ____________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
73
The _______________ decision is whether to purchase software from external developers or develop it in house.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
74
Acceptance testing involves conducting any additional testing required by the ____________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
75
A duplicate, operational hardware system that is ready for use is an example of a ____________________.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
76
A(n) ____________________ requiring identification numbers, passwords, and other safeguards is available with most systems to improve security and unauthorized use.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
77
The U.S. Department of Energy rates products with the ______ to help people select that products that save energy.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
78
______ are rules and procedures to maintain data security.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
79
A(n) ____________________ is an examination that compares computer systems operating under the same conditions.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
80
_______________ requires a company to produce corporate e-mails, documents, and other important data.
Unlock Deck
Unlock for access to all 85 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 85 flashcards in this deck.