Companies use various _____ methods to maintain output integrity and security.

Cards Return to Set Details

Term
Tom started the process of selecting a new system for the firm and he is weighing all of the various issues that need to be considered and the resources he has at his disposal as he makes this important decision.As Tom prepares to remove the field in his selection of a new system, he wants a quick refresher on the difference between a request for proposal (RFP) and a request for quotation (RFQ). If he needs a request for proposal (RFP), Simone will write it, and if he needs an RFQ, Marny is responsible for writing that. Which of the following is true?• An RFP that Simon writes is more specific than an RFQ will write • RFPs and RGQs have very different objectives• When Simone is tasked with the job, Tom Already knows the specific product or service he wants and he needs to obtain price quotations or bids.

• When Marny is tasked with the job, her output can involve outright purchase or a variety of leasing options.

Definition
When Simone is tasked with the job, Tom Already knows the specific product or service he wants and he needs to obtain price quotations or bids.
Term
A secure system includes _____ that can log every instance of data entry and changes.• Control trails• Trap trails• Audit trails

• Batch trails

Definition
Term
To produce a control break report, the records must be arranged, or sorted, in _____.• Control field order• Subgroup field order • Control break order

• Character break order

Definition
Term
When determining outsourcing fees, a _____ uses a set fee based on a specified level of service and user support.• Subscription model• Fixed fee model• Transaction model

• Usage model

Definition
Term
Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.• Dialog box• Toolbar• Menu box

• Taskbar

Definition
Term
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity.• True

• False

Definition
Term
_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data.• Standardization• Encapsulation• Normalization

• Encryption

Definition
Term
The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.• Software as a Service (SAAS)• Web 2.0• Command-line

• Outsourcing

Definition
Term
A(n) _____ displays only those records that meet a specific condition or conditions.• Summary report • Exigency report• Exception report

• Detail report

Definition
Term
In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues.• Design prototyping• Layout prototyping • Command prototyping

• System prototyping

Definition
Term
EBCDIC and ASCII both require _____ bits for storage of each character.• Sixteen• Twelve• Eight

• Six

Definition
Term
A common field is an attribute that appears in only one entity.• True

• False

Definition
Term
_____ is an online data entry method, where a blank form that duplicates or resembles the source document is completed on the screen.• Form pulling• Form resetting• Form filling

• Form uploading

Definition
Term
_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.• Unicode• ISO (International Organization for Standardization)• EBCDIC (Extended Binary Coded Decimal Interchange Code)

• ASCII (American Standard Code for Information Interchange)

Definition
EBCDIC (Extended Binary Coded Decimal Interchange Code)
Term
A _____ is a set of letters or numbers that represents a data item.• Code• Business glossary• Data dictionary

• Mnemonic

Definition
Term
Input _____ is a template or pattern that restricts data entry and prevents errors.• Key• Pattern• Mask

• Legend

Definition
Term
The _____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur.• Return on investment (ROI)• Acquisition process• Payback analysis

• Net present value (NPV)

Definition
Term
____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.• Java virtual connector (JVC)• ActiveX data object (ADO)• Open embedded connectivity (OEC)

• Open database connectivity (ODBC)

Definition
Open database connectivity (ODBC)
Term
Migrating a traditional database design to the web can require design modification, additional software, and some added expense.• True

• False

Definition
Term
Which of the following is true of a traditional systems development environment? • Systems design is influenced by compatibility• Systems often utilize Internet links and resources• Systems are designed to run local and wide-area company networks

• Systems applications require fewer desktop computing power and resources

Definition
•Systems design is influenced by compatibility•Systems often utilize Internet links and resources

•Systems are designed to run local and wide-area company networks

Term
Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals.• True

• False

Definition
Term
Three main types of relationships can exist between entities: a one-to-one relationship, abbreviated 1:1; a one-to-many relationship, abbreviated 1:M; and a many-to-many relationship, abbreviated M:N.• True

• False

Definition
Term
Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of _____.• Four digits for the year, two for the month, and two for the day (YYYYMMDD)• Four digits for the year, two for the month, and four for the day (YYYYMMDDDD)• Two digits for the year, two for the month, and two for the day (YYMMDD)

• Two digits foe the day, two for the month, and four for the year (DDMMYYYY

Definition
Four digits for the year, two for the month, and two for the day (YYYYMMDD)
Term
In a source document, the main part of a form, called the _____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.• Instruction zone• Body zone• Heading zone

• Authorization zone

Definition
Term
_____ is strictly hardware-related because it involves the process of reading and writing binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.• Virtual storage• Simulated storage • Logical storage

• Physical storage

Definition
Term
_____ is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase.• Maintenance agreement• Software license• Request for quoting document

• Software requirements specification

Definition
Software requirements specification
Term
IBM describes WebSphere as a software platform for _____ environments. • Service-orientated• Integrated development• Integrated development

• Business process outsourcing

Definition
Term
A(n) _____ does not distract a user and calls no attention to itself.• Pellucid interface• Transparent interface• Translucent interface

• Opaque interface

Definition
Term
In most large and medium-sized companies, a(n) _____ within the IT department is responsible for providing user support.• Evaluation team• Planning center• Service desk

• Planning center

Definition
Term
For upper-level managers who often want to see total figures and do not need supporting details, a(n) _____ is appropriate.• Exigency report• Detail report• Exception report

• Summary report

Definition
Term
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.• Scalability• Compatibility• Cardinality

• Functionality

Definition
Term
The _____, which appears at the beginning of a report, identifies the report and contains the report title, date, and other necessary information.• Report header • Character head• Control head

• report footer

Definition
Term
A long integer format uses _____ bits to represent the number 1,234,567,890 in binary form.• 30• 12• 32

• 24

Definition
Term
Which of the following is true of web-based development?• Web-based software treats the software as a product that is more dependent on he desktop computing powers and resources• Web-based software usually requires middleware to communicate with existing software and legacy systems• When companies acquire web-based software as a service rather than a product purchase, they can limit in-house involvement to a minimum

• Web-based systems can run on multiple hardware environments

Definition
•Web-based software usually requires middleware to communicate with existing software and legacy systems•When companies acquire web-based software as a service rather than a product purchase, they can limit in-house involvement to a minimum

•Web-based systems can run on multiple hardware environments

Term
In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms.• Heading zone• Control zone• Totals zone

• Authorization zone

Definition
Term
Interface design should call for attention to the interface, rather than facilitating design objectives.• True

• False

Definition
Term
Eamon is planning to start an online store that specializes in books and electronics. Since it’s his first business, he has a lot of doubts. Help Eamon set up his business by answering the following questions. Eamon plans to operate three warehouses, in different cities, to support his business. To find the exact location of a product, he wants to establish a code that identifies a product’s warehouse location, floor number, section number, aisle number, and bin number. By doing this, he can ship the ordered products faster. Which of the following codes would you suggest Eamon to use?• Significant digit code• Block sequence code• Action code

• Sequence code

Definition
Term
A _____ describes the actual processes of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reports, and so on.• Logical design• Physical design• Qualitative design

• Quantitative design

Definition
Term
To create an attractive user interface layout and design, when the user enters data that completely fills the field, the data must move automatically to the next field.• True

• False

Definition
Term
Audit log files, which record details of all accesses and changes to a file or database, can be used to recover changes made since the last backup.• True

• False

Definition
Term
A common method of cardinality notation is called _____ because of the shapes, which include circles, bars, and symbols that indicate various possibilities.• Hash topology notation• Big O notation• Dark resistor’s notation

• Crow’s foot notation

Definition
Term
_____ combine data from different item attributes, or characteristics, to build a code.• Significant digit code• Derivation code• Sequence code

• Category code

Definition
Term
Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she has never before taken the time to learn the names of the actual dialog box features aligned with their functions.If Siobhan has a dialog box option that is either on or off, which of the following is she most likely to use?• Toggle button• Drop-down list box• List box

• Text box

Definition
Term
A _____ system allows a customer to request a fax using email, via the company website or by telephone.• Turnfax• Frontfax• Digifax

• Faxback

Definition
Term
Which of the following is a software collection obtained from a vendor or application service provider?• Software package• Software aggregate• Software cluster

• Software metric

Definition
Term
In an entity-relationship diagram, entities are commonly represented as _____.• Rectangles• Circles• Hexagons

• Triangles

Definition
Term
When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.• Usage model• Subscription model• Fixed fee model

• Transaction model

Definition
Term
The data mining technique that relies on association rule learning is often called _____.• Strategy-orientated analysis• Market basket analysis• Simulated analysis

• Virtual storage analysis

Definition
Term
A(n) _____ is a data validation rule that is used for applying to mandatory data items.• Asynchronic check• Range check• Sequence check

• Existence check

Definition
Term
Companies use various _____ methods to maintain output integrity and security.• Output data• Output aesthetic• Output control

• Output stream

Definition
Term
Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems.• Shareware• Freeware• Public domain software

• Middleware

Definition
Term
Sensitive data can be encrypted, or coded, so only users with decoding software can read it.• True

• False

Definition
Term
Which of the following are the advantages of a DBMS (database management system)?• Database systems can support enterprise-wide applications more effectively than file processing systems.• A DBMS is scalable which makes it easier to meet the rapidly changing needs of the business• Systems that interact with DBMS are relatively dependent of how the physical data is maintained

• Effective database administration helps ensure that standards for data names, formats, and documentation are followed uniformly throughout an organization

Definition
•Database systems can support enterprise-wide applications more effectively than file processing systems.•A DBMS is scalable which makes it easier to meet the rapidly changing needs of the business

•Effective database administration helps ensure that standards for data names, formats, and documentation are followed uniformly throughout an organization

Term
Betty has a number of report templates at her disposal filed in folders to respond to her boss's requests. In order to know where to find a report that meets the needs of her manager, she first needs to know what category of report will satisfy the request.Betty's lead needs to get a report of all of the purchases made only by his employees, using their employee discount, in a given week. In which of the following folders is she likely to find this category of report?• Detail reports• Control reports• Summary reports

• Exception reports

Definition
Term
In a traditional systems development environment, security issues usually are less complex than with web-based systems, because the system operates on a private company network, rather than the Internet.• True

• False

Definition
Term
In a(n) _____, the web becomes an integral part of the application, rather than just a communication channel, and systems analysts need new application development tools and solutions to handle the new systems.• File-based system• Agent-based system• Quality-based system

• Internet-based system

Definition
Term
A software package that can be used by many different types of organizations is called a(n) _____.• Symmetric application• Asymmetric application• Vertical application

• Horizontal application

Definition
Term
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.• Multinational• GUI• Cloud

• Web-based

Definition
Term
Benchmark tests must precisely match the day-to-day situation at your company.• True

• False

Definition
Term
A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong.• Sequence check• Reasonableness check• Validity check

• Range check

Definition
Term
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.• Combinatorial integrity• Foreign integrity• Candidate integrity

• Referential integrity

Definition
Term
In _____, systems analysts use prototyping to verify user requirements, after which the prototype is discarded and implementation continues.• Throwaway prototyping• Application prototyping• System prototyping

• Design prototyping

Definition
•Throwaway prototyping
•Design prototyping
Term
A subscription model charges a variable fee based on the volume of transactions or operations performed by the application.• True

• False

Definition
Term
A web-based data design requires users to have powerful workstations.• True

• False

Definition
Term
A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.• Data requirement rule• Data validation rule• Data mining rule

• Data load rule

Definition
Term
Nearly _____ percent of total costs occur after the purchase of hardware and software.• 95• 80• 15

• 45

Definition
Term
If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor. • Request for proposal• Software license• Fixed fee model

• Supplemental maintenance agreement

Definition
Supplemental maintenance agreement
Term
User-selected help always offers assistance for a task in progress.• True

• False

Definition
Term
A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness.• Abstraction• Testability • Usability

• Encapsulation

Definition
Term
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.• Java eclipse framework connectivity (JEFC)• Java runtime environment (JRE)• Java database connectivity (JDBC)

• Java virtual machine (JVM)

Definition
Java database connectivity (JDBC)
Term
Which of the following is a guideline for the design of data entry screens that are easy to learn and use?• Provide a descriptive caption for every field• Display a default value when a field value will be constant for successive records• Require users to type leading zeros for numeric fields

• Restrict user access to screen locations where data is entered

Definition
•Provide a descriptive caption for every field•Display a default value when a field value will be constant for successive records

•Restrict user access to screen locations where data is entered

Term
_____ describes the relationship between computers and the people who use them to perform their jobs.• Media control interaction (MCI)• Peripheral connect (PC)• Human-computer interaction (HCI)

• Peripheral component interconnect (PCI)

Definition
Human-computer interaction (HCI)
Term
A table is in _____ if it is in first normal form and if all fields that are not part of the primary key are functionally dependent on the entire primary key.• Zeroth normal form• Second normal form• Third normal form

• Fourth normal form

Definition
Term
Some abbreviation codes are called _____ codes because they use a specific combination of letters that are easy to remember.• Rhapsodic• Harmonic• Sequence

• Mnemonic

Definition
Term
_____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.• Utility computing• Mainframe computing• Grid computing

• Cloud computing

Definition
Term
_____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.• Normalization• Encryption• Encapsulation

• Abstraction

Definition
Term
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.• Query by example language• Imperative language• Query language

• Procedural language

Definition
Term
Using batch input, data entry is performed continuously.• True

• False

Definition
Term
A _____ controls database operations, including storing, retrieving, updating, and deleting data.• Data definition language• Data device language• Data query language

• Data manipulation language

Definition
Data manipulation language
Term
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity. • Compatibility • Cardinality • Scalability

• Functionality

Definition

Supporting users have an ad free experience!

Companies use various _____ methods to maintain output integrity and security.

Companies use various _____ methods to maintain output integrity and security.

Companies use various _____ methods to maintain output integrity and security.