Chapter 7 Review
1. Another
term for IBS is ____, because system operations are managed by the outside
firm, or host.
A: managed hosting
B: direct hosting
C: outside hosting
D: enterprise hosting
A: managed hosting
B: direct hosting
C: outside hosting
D: enterprise hosting
2.
The choice between developing versus purchasing software often is called a ____
decision.
A: make or buy
B: build or buy
C: either a. or b.
D: neither a. nor b.
A: make or buy
B: build or buy
C: either a. or b.
D: neither a. nor b.
3.
A software package that can be used by many different types of organizations is
called a(n) ____ application.
A: vertical
B: horizontal
C: limited
D: unlimited
A: vertical
B: horizontal
C: limited
D: unlimited
4.
____ was NOT listed as a reason that companies would develop software in-house
versus buying it from an outside source.
A: Meet constraints of existing systems
B: Develop internal resources and capabilities
C: Lower costs
D: Satisfy unique business requirements
A: Meet constraints of existing systems
B: Develop internal resources and capabilities
C: Lower costs
D: Satisfy unique business requirements
5.
Some user applications have powerful screen and report ____ that allow users to
design their own data entry forms and reports.
A: generators
B: creators
C: templates
D: files
A: generators
B: creators
C: templates
D: files
6.
The ____ of a project is the total value of the benefits minus the total value
of the costs, with both costs and benefits adjusted to reflect the point in
time at which they occur.
A: ROI
B: NPV
C: EPS
D: IRR
A: ROI
B: NPV
C: EPS
D: IRR
7.
When you use an ____, you already know the specific product or service you want
and you need to obtain price quotations or bids.
A: RFP
B: RFQ
C: NPV
D: TCO
A: RFP
B: RFQ
C: NPV
D: TCO
8.
The goal of systems design is to build a system that is ____.
A: effective
B: reliable
C: maintainable
D: all of the above
A: effective
B: reliable
C: maintainable
D: all of the above
9.
____ is a model of software deployment where an application is hosted as a
service provided to customers over the Internet.
A: SAS
B: SaaS
C: SSA
D: SSaa
A: SAS
B: SaaS
C: SSA
D: SSaa
10.
Web-based software usually requires additional layers, called ____, to
communicate with existing software and legacy systems.
A: hubs
B: portals
C: channels
D: middleware
A: hubs
B: portals
C: channels
D: middleware
11.
The outsourcing of a basic business process is often called ____.
A: BPO
B: BOP
C: ISB
D: IBS
A: BPO
B: BOP
C: ISB
D: IBS
12.
A ____ model has a variable fee based on the number of users or workstations
that have access to the application.
A: managed
B: subscription
C: service
D: cloud computing
A: managed
B: subscription
C: service
D: cloud computing
13.
The ____ makes, builds, and develops in-house software.
A: company's IT department
B: company's ASP
C: company's IBS
D: all of the above
A: company's IT department
B: company's ASP
C: company's IBS
D: all of the above
14.
An accounting package is a good example of a(n) ____ application because it can
be utilized by many different businesses, or separate divisions that exist in
large, diversified companies.
A: vertical
B: horizontal
C: limited
D: unlimited
A: vertical
B: horizontal
C: limited
D: unlimited
15.
The following is NOT one of the three ways the chapter listed as a way to
customize a software package: ____.
A: You can merge two existing packages into one solution
B: You can purchase a basic package that vendors will customize to suit your needs.
C: You can purchase the package and make your own modifications, if this is permissible under the terms of the software license.
D: You can negotiate directly with the software vendor to make enhancements to meet your needs by paying for the changes.
A: You can merge two existing packages into one solution
B: You can purchase a basic package that vendors will customize to suit your needs.
C: You can purchase the package and make your own modifications, if this is permissible under the terms of the software license.
D: You can negotiate directly with the software vendor to make enhancements to meet your needs by paying for the changes.
16.
Read-only properties means that users can ____.
A: view the data
B: change the data
C: either a. or b.
D: neither a. nor b.
A: view the data
B: change the data
C: either a. or b.
D: neither a. nor b.
17.
The Systems Analyst's Toolkit explains how to use three main cost analysis
tools that do NOT include ____.
A: payback analysis
B: ROI
C: NPV
D: EPS
A: payback analysis
B: ROI
C: NPV
D: EPS
18.
Another valuable resource is the Internet bulletin board system that contains
thousands of forums, called ____, that cover every imaginable topic.
A: gatherings
B: newsgroups
C: social groups
D: feeds
A: gatherings
B: newsgroups
C: social groups
D: feeds
19.
The two major Web-based development environments are IBM's WebSphere and
Microsoft's ____.
A: .NET
B: JavaScript
C: Office
D: Access
A: .NET
B: JavaScript
C: Office
D: Access
20.
____ development treats the Web as the platform, rather than just a
communication channel.
A: Internet-based
B: Traditional
C: both a. and b.
D: neither a. nor b.
A: Internet-based
B: Traditional
C: both a. and b.
D: neither a. nor b.
21.
Although the traditional model of software acquisition still accounts for more
software acquisition, a new model called ____ is changing the picture
dramatically.
A:
Hardware as a Help
B: Software as a
Service
C:
Processing as a Product
D:
Storage as a Solution
22.
A ____ measures the time a package takes to process a certain number of
transactions.
A:
newsgroup
B:
parameter
C:
benchmark
D:
default
23.
A user ____ utilizes standard business software, such as Microsoft Word or
Microsoft Excel, which has been configured in a specific manner to enhance user
productivity.
A: application
B:
configuration
C:
interface
D:
interpolation
24.
____, produces an early, rapidly constructed working version of a proposed
system.
A:
Prototyping
B:
Outsourcing
C:
Coding
D:
Benchmarking
25.
IBM’s ____ is one of the major Web-based development environments.
A:
WebSphere
B:
.NET
C:
NetSphere
D:
.WEB
26.
A(n: ____ model is an outsourcing fee model that charges a variable fee based
on the volume of transactions or operations performed by the application.
A:
method
B:
administrative
C:
transaction
D:
interpolated
27.
In combination, the powerful tools that systems analysts use to provide a
framework for rapid, efficient software development, is called a ____
environment.
A:
2GL
B:
3GL
C: 4GL
D:
5GL
28.
In addition to configuring software, an IT staff can create a user ____, which
includes screens, commands, controls, and features that enable users to
interact more effectively with the application.
A:
montage
B:
index
C: interface
D:
package
29.
Guidelines to follow when determining data entry and storage considerations
include all of the following except ____.
A:
data should be entered into the system where and when it occurs
B:
data should be verified when it is entered
C:
data duplication should be encouraged
D:
data should be entered into a system only once
30.
Reports that trace the entry of and changes to critical data values are called
____ and are essential in every system.
A:
audit trails
B:
protective pathways
C:
backtracks
D:
value tracks
1 comments:
Chapter 7 Review >>>>> Download Now
>>>>> Download Full
Chapter 7 Review >>>>> Download LINK
>>>>> Download Now
Chapter 7 Review >>>>> Download Full
>>>>> Download LINK N0
Post a Comment