In what phase of the software development would you fix errors in the new program system choose two

What is the structured approach called for developing software and information systems?
A) Software design
B) Prototyping
C) Systems development life cycle
D) Systems methodology

Systems development life cycle

Who is the person who typically manages the software development project?
A) Software engineer
B) Project manager
C) IT manager
D) Technology director

In which phase of the software design and development project would you try to understand the proposed project?
A) Planning phase
B) Initial phase
C) Requirements phase
D) Analysis phase

In which phase of the software design and development project would you build a blueprint of the proposed system?
A) Analysis phase
B) Design phase
C) Requirements phase
D) Development phase

In which phase of the software design and development project would you build the proposed system?
A) Design phase
B) Requirements phase
C) Development phase
D) Implementation phase

In which phase of the software design and development project would you take the newly built system and place in operations?
A) Requirements phase
B) Development phase
C) Implementation phase
D) Execution phase

In which phase of the software design and development project would you fix errors in the new built and operational system?
A) Development phase
B) Maintenance phase
C) Implementation phase
D) Execution phase

What term refers to the fast-paced building or construction of a software prototype?
A) Rapid application development (RAD)
B) Rapid agility programming (RAP)
C) Speed programming
D) Express development (ED)

Rapid application development (RAD)

What type of software design and development methodology does Microsoft Corporation employ?
A) Rapid application development
B) Extreme programming
C) Speed programming
D) Express development

What term refers to the end user developing software without the assistance of IT?
A) User development
B) In-sourcing
C) Self service
D) Selfsourcing

What type of information should you avoid including on your Web site?
A) Links to sites of interest
B) Private personal information
C) Work and academic experience
D) Graphical

Private personal information

Which of the following web elements should you know about before building your web site?
A) The web audience
B) The operating environment of your ISP
C) The operating system of your visitor
D) Each consideration should determine your web design choices

What is the language of the Web?
A) Basic
B) C++
C) MS Visual Basic
D) HTML

What does an HTML tag do?
A) It specifies formatting and layout instructions for your web page
B) It hides programming instructions from view
C) It determines the organizational structure of your Web site
D) It connects your web site to an operating environment

It specifies formatting and layout instructions for your web page

A Web document is broken into sections. What are the tags called that create these sections?
A) Structure tags
B) HTML tags
C) Heading tags
D) Body tags

What should be the first and last pair of tags in your Web document?
A) <html></html>
B) <start><end>
C) <head><body>
D) <title></title>

There are two main sections in every HTML document. What are they?
A) Introduction and instructions
B) Head and body
C) System and Wed content
D) Code and content

For every Web document, you can add words that appear in the upper left bar area of your browser. What set of tags allows you to provide this information?
A) <head></head>
B) <head><head>
C) <label><label>
D) <title></title>

If you wanted to create text that was a different color or font than other text in your Web page, what type of tag would you use?
A) Layout
B) Basic formatting
C) Design
D) Outline

What tag would you use if you wanted a blank line in your Web document?
A) <line>
B) <br>
C) <li>
D) <cr>

Three primary choices as to who will build your system. _____, selfsourcing (aka end-user development), and outsourcing.

Three primary choices as to who will build your system. Insourcing, _____(aka end-user development), and outsourcing.

Three primary choices as to who will build your system. Insourcing, selfsourcing (aka end-user development), and _____.

Involves in-house IT specialists within your organization to develop the system.

The development and support of IT systems by end users ( knowledge workers) with little or no help from IT specialists.

Selfsourcing (aka end-user development)

The delegation of specific work to a third party for a special length of time, at a specified cost, and at a specified level of service.

A structured step-by-step approach for developing information systems. Includes seven key phases.

Systems Development Life Cycle (SDLC)

In the Systems Development Life Cycle (SDLC), what phase is the activity: Define the system to be developed?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Set the project scope?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Develop the project plan including tasks, resources, and timeframes?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Gather the business requirements for the system?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Design the technical architecture required to support the system?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Design system models?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Build the technical architecture?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Build the database and programs?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Write the test conditions?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Preform the testing of the system?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Write detailed user documentation?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Provide training for the system users?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Build a help desk to support the system users?

In the Systems Development Life Cycle (SDLC), what phase is the activity: Provide an environment to support system changes?

During the _____ phase of the SLDC you crate a solid plan for developing your information system.

The _____ phase of the SLDC involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system.

The primary goal of the _____ phase of the SLDC is to build a technical blueprint of how the proposed system will work.

The _____ phase of the SLDC verifies that the system works and meets all the business requirements defined in the analysis phase.

During the _____ phase of the SLDC you distribute the system to all the users and they begin using the system to perform their everyday jobs.

During the ______ phase of the SLDC, you monitor and support the new system to ensure it continues to meet business goals.

The advantages of selfsourcing are:
1. Improves _____ determination
2. Increases end user participation and sense of ownership
3. Increases speed of systems development
4. Reduces the invisible backlog

The advantages of selfsourcing are:
1. Improves requirement determination
2. Increases end user _____ and sense of _____
3. Increases speed of systems development
4. Reduces the invisible backlog

participation / ownership

The advantages of selfsourcing are:
1. Improves requirement determination
2. Increases end user participation and sense of ownership
3. Increases _____ of systems development
4. Reduces the invisible backlog

The advantages of selfsourcing are:
1. Improves requirement determination
2. Increases end user participation and sense of ownership
3. Increases speed of systems development
4. Reduces the _____ _____

_____ is the process of building a model that demonstrates the features of a proposed product, service, or system

The five main reasons behind rapid growth:
1. _____
2. The Internet
3. Growing economy and low unemployment rate
4. Technology
5. Deregulation

The five main reasons behind rapid growth:
1. Globalization
2. The _____
3. Growing economy and low unemployment rate
4. Technology
5. Deregulation

The five main reasons behind rapid growth:
1. Globalization
2. The Internet
3. Growing _____ and low _____ rate
4. Technology
5. Deregulation

The five main reasons behind rapid growth:
1. Globalization
2. The Internet
3. Growing economy and low unemployment rate
4. _____
5. Deregulation

The five main reasons behind rapid growth:
1. Globalization
2. The Internet
3. Growing economy and low unemployment rate
4. Technology
5. _____

The three geopolitical outsourcing options:
1. _____ outsourcing
2. Nearshore outsourcing
3. Offshore outsourcing

The three geopolitical outsourcing options:
1. Onshore outsourcing
2. _____ outsourcing
3. Offshore outsourcing

The three geopolitical outsourcing options:
1. Onshore outsourcing
2. Nearshore outsourcing
3. _____ outsourcing

A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups:
______
End Users
Software Development
Information Needs
Hardware Requirements

A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups:
Customers
___ _____
Software Development
Information Needs
Hardware Requirements

A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups:
Customers
End Users
_____ _____
Information Needs
Hardware Requirements

A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups:
Customers
End Users
Software Development
_____ _____
Hardware Requirements

A Service-Oriented Architecture (SOA) Philosophy is made up of the following focus groups:
Customers
End Users
Software Development
Information Needs
_____ _____

In what phase of the software development would you fix errors in the new program system choose two

Service-Oriented Architecture (SOA)

Involves distributing the information and processing power of IT systems via a network.( This is the the first true network infrastructure)

Distributed infrastructure

What are the four tiers of an n-Tier infrastructure model?
__________
2-tier Application Tier
3-tier Data Teir
n-tier Logic Teir

What are the four tiers of an n-Tier infrastructure model?
1-tier Presentation Tier
___________
3-tier Data Teir
n-tier Logic Teir

What are the four tiers of an n-Tier infrastructure model?
1-tier Presentation Tier
2-tier Application Tier
__________
n-tier Logic Teir

What are the four tiers of an n-Tier infrastructure model?
1-tier Presentation Tier
2-tier Application Tier
3-tier Data Teir
__________

A _____ infrastructure is the most basic setup because it involves a single tier on a single machine.Think of an application that runs on your PC-everything you need to run the application is wrapped up together. An example is a basic word processor or a desktop file utility program.

A _____ infrastructure is the basic client/server relationship. In essence, the client handles the display, the server handles the request, and this tier is contained on one or both of the tiers.

A _____ infrastructure is the most common approach used for Web applications today. A typical example if this model is the Web browser that acts as the client, an application server that handles the business logic, and a seperate tier (such as a DBMS) that handles database functions.

An _____ infrastructure balances the work of the network over several different servers. The letter stands for any number of tiers. Traditionally it starts with a basic 3-tier model and expands on it to allow for greater performance, scalability, and a host of other benefits.

A delivery model for software in which you pay for software on a pay-per-use basis instead of buying the software outright.

Software-As-A-Service (Saas)

A delivery model for software identical to SaaS with additional features of (1) the ability to customize data entry forms, screens, reports, and the like and (2) access to software development tools to alter the way in which the software works by adding new modules (services) and/or making modifications to existing modules.

Platform-as-a-Service (PaaS)

The cloud computing model in which you acquire all your technology needs in the cloud.

Infrastructure-as-a-Service (IAAS)

The process of continuously measuring system results and comparing those results.

Baseline values a system seeks to attain.

To justify costs of technology, you need to be able to measure the success of technology. With these metrics in hand you can make a cost/benefit judgement about technology. ______ can lead to identifying steps and procedures to improve system performance.

A _____ metric is a measure of the success of your Web and e-business initiatives.

Common Web-centric metrics include:
_____ Visitors
Total hits
Page exposures
Conversion rate
Click-through
cost-per-thousand(CPM)
Abandoned registrations
Abandoned shopping carts

Common Web-centric metrics include:
Unique Visitors
Total _____
Page exposures
Conversion rate
Click-through
cost-per-thousand(CPM)
Abandoned registrations
Abandoned shopping carts

Common Web-centric metrics include:
Unique Visitors
Total hits
_____ exposures
Conversion rate
Click-through
cost-per-thousand(CPM)
Abandoned registrations
Abandoned shopping carts

Common Web-centric metrics include:
Unique Visitors
Total hits
Page exposures
_____ rate
Click-through
cost-per-thousand(CPM)
Abandoned registrations
Abandoned shopping carts

Common Web-centric metrics include:
Unique Visitors
Total hits
Page exposures
Conversion rate
_____-through
cost-per-thousand(CPM)
Abandoned registrations
Abandoned shopping carts

Common Web-centric metrics include:
Unique Visitors
Total hits
Page exposures
Conversion rate
Click-through
cost-per-_____(CPM)
Abandoned registrations
Abandoned shopping carts

Common Web-centric metrics include:
Unique Visitors
Total hits
Page exposures
Conversion rate
Click-through
cost-per-thousand(CPM)
Abandoned _____
Abandoned shopping carts

Common Web-centric metrics include:
Unique Visitors
Total hits
Page exposures
Conversion rate
Click-through
cost-per-thousand(CPM)
Abandoned registrations
Abandoned _____ _____

Measure the success of call center efforts.

Typical call center metrics include:
_____ rate
Average speed to answer (ASA)
Time service factor (TSF)
First call resolution (FCR)

Typical call center metrics include:
Abandon rate
Average _____ to _____ (ASA)
Time service factor (TSF)
First call resolution (FCR)

Typical call center metrics include:
Abandon rate
Average speed to answer (ASA)
_____ _____ factor (TSF)
First call resolution (FCR)

Typical call center metrics include:
Abandon rate
Average speed to answer (ASA)
Time service factor (TSF)
_____ ____ resolution (FCR)

The __________ methodology looks very similar to the systems development life cycle. It starts with the oraganization's strategic plan and moves through various phases including analysis ,design, implementation, testing, and maintenance.

Business Continuity Planning (BCP)

Principles and standards that guide our behavior toward other people.

_____ people have integrity.

Intangible creative work that is embodied in physical form.

The legal protection afforded an expression of an idea.

A program that when installed on your computer, records every keystroke and mouse click.

Key logger aka Key trapper

The forging of someones identity for the purpose of fraud.

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.

Phishing (aka carding or brand spoofing)

Phishing that is targeted to a specific individual.

The use of phishing targeted at senior business executives, government leaders, and other types of high-profile individuals.

The rerouting of your request for a legitimate Web site.

A small file that contains information about you and your Web activities, which a Web site you visit places on your computer.

Software to generate ads that installs itself on your computer when you download some other program.

Software you do not want hidden inside software you do want.

Malicious software that collects information about you and your computer and reports it to someone without your permission.

Spyware (aka sneakware or stealthware)

Floods a server or network with so many requests for service that is slows down or crashes.

Denial of Service Attack (DOS)

A delivery model for personal productivity software such as Microsoft Office in which you pay for personal productivity software on a pay-per-use basis instead of buying the software outright.

Personal Software-as-a-Service (Personal SaaS)

Allows you to send voice communications over the Internet and avoid the toll charges that you would normally recieve from your long distance carrier.

Voice over Internet Protocol (VoIP)

Not only captures spoken words but also distinguishes word groupings to form a sentence.

Automatic Speech Recognition (ASR)

The three steps of Automatic Speech Recognition are:
1. Feature Analysis
2. Pattern Classification
3. Language _____

The three steps of Automatic Speech Recognition are:
1. Feature _____
2. Pattern Classification
3. Language Processing

The three steps of Automatic Speech Recognition are:
1. Feature Analysis
2. Pattern _____
3. Language Processing

The system captures your words as you speak into a microphone, eliminates any background noise, and converts the digital signals of your speech into phonemes (syllables)

The system matches your spoken phonemes to a phoneme sequence stored in an acoustic model database.

The system attempts to make sense of what you're saying by comparing the word phonemes generated in step 2 with a language model database.

A three dimensional computer simulation in which you actively and physically participate.

An input device that captures and records the shape and movement of your hand and fingers and the strength of your hand and finger movements.

A combined input and output device that (1) captures and records the movement of your head and (2) contains a screen that covers your entire field of vision and displays various views of an environment based on your movements.

Headset (head-mounted display)

An input device that captures and records the movement of your feet as you walk or turn in different directions.

Technology to add the sense of touch to an environment that previously only had visual and textual elements.

Use of physiological characteristics-such as your fingerprint, the blood vessels in the iris of your eye, the sound of your voice, or perhaps even your breath-to provide identification.

Custom shoes, Custom wedding gowns, and custom bathrobes are all examples of the use of _____ technology.

A technology chip that can perform a variety of physiological functions when inserted into the human body.

A technology-enabled microchip implanted into the human body that stores important information about you (such as your identification and medical history) and that may be GPS-enabled to offer a method of tracking.

Software that provides identification by evaluating facial characteristics.

Facial recognition software

A standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet.

A standard for transmitting information in the form of radio waves over distances up to about several miles.

A wireless transmission technology developed primarily for mobile phones to support mobile commerce (m-commerce) and other phone activities.

Near Field Communication (NFC)

Examples of RFID in use today include:
-_____-_____ car keys
-Library book tracking
-Livestock tracking
-Supply chain
-Passports

Examples of RFID in use today include:
-Anti-theft car keys
-Library book _____
-Livestock tracking
-Supply chain
-Passports

Examples of RFID in use today include:
-Anti-theft car keys
-Library book tracking
-______tracking
-Supply chain
-Passports

Examples of RFID in use today include:
-Anti-theft car keys
-Library book tracking
-Livestock tracking
-______ chain
-Passports

Examples of RFID in use today include:
-Anti-theft car keys
-Library book tracking
-Livestock tracking
-Supply chain
-_____

Microchip in a tag or label to store information, and information is transmitted from, or written to, the tag or label when the microchip is exposed to the correct frequency of radio waves.

RFID (radio frequency identification)

What are the steps in software development?

7 core phases of software development.
Phase 1 – Brainstorming. ... .
Phase 2 – Business analysis. ... .
Phase 3 – Design. ... .
Phase 4 – Programming. ... .
Phase 5 – Integration. ... .
Phase 6 – Quality assurance. ... .
Phase 7 – Release. ... .
SDLC Example – DICEUS SDLC..

What is the structured approach called for developing software and information systems?

The Systems Development Lifecycle (SDLC) provides a template for that development process. The structured approach to systems development was popularized in the 1980 s, and is still widely used by many practitioners today.

Which of the following is the correct order of the SDLC?

What Are the 7 Phases of SDLC? The new seven phases of SDLC include planning, analysis, design, development, testing, implementation, and maintenance.

What is the first step of the system development life cycle SDLC )?

The first step in the systems development life cycle is Preliminary investigation. 1) Planning/Preliminary Investigation: This is the first phase of the systems development process. It identifies whether or not there is a need for a new system to achieve a business"s strategic objectives.