Make your own free website on Tripod.com
 
Name:     ID: 
 
Email: 

SICI4087 FINAL EXAM CHAPTERS 17 & 18 version A

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of the following is not one of the four approaches to implementation that a system analyst must consider?
a.
evaluating the new or modified system
b.
strategies for training users and personnel
c.
movement of computer power to individual users(groups) with the help of distributed computing
d.
selecting the best type of system testing available for programmers and users
e.
choosing a conversion strategy
 

 2. 

WiMax features a greater wireless access range of a little over ____ miles.
a.
5
b.
10
c.
20
d.
30
 

 3. 

The 802.11 network standard, developed by  IEEE, is commonly associated with:
a.
Bluetooth
b.
WiMAX
c.
Wi-Fi
d.
Mobile WiMAX
 

 4. 

Which of the following is an advantage of the client/server model?
a.
less customization of applications
b.
lower start-up costs
c.
provides greater computer power
d.
fosters (promotes) a high managerial level of decision making
 

 5. 

Which network model shows the details of connecting individual workstations?
a.
hub connectivity diagram
b.
network decomposition diagram
c.
workstation connectivity diagram
d.
virtual memory diagram
 

 6. 

An example of the ______ configuration for a distributed network is when there is no central computer and all nodes are of equal computing power.
a.
star
b.
ring
c.
bus
d.
hierarchical
 

 7. 

The analyst has four major guidelines for setting up training. Which of the following is not one of them?
a.
Training methods
b.
Training materials
c.
Training sites
d.
Training objectives
e.
Training time
 

 8. 

Which of the following is not one of the seven elements to consider during and after a disaster?
a.
Identify the teams responsible for managing a crisis.
b.
Establish multiple communication channels among employees and consultants who are onsite.
c.
Determine data replication technologies that match the organization’s timetable for getting systems up and running.
d.
Provide recovery solutions that include an offsite location.
e.
Provide the location of the nearest insurance claims adjuster.
 

 9. 

Which of the following is not used to evaluate your Web site?
a.
Learn about the pages that have been accessed.
b.
Use “Web Bugs” to gather information about the customer.
c.
Collect visitor demographics, such as the geographic region or city.
d.
Find out who is referring the Web site visitors to your Web site.
e.
Determine the browser that the visitor is using.
 

 10. 

Which network model shows an overview of the network system?
a.
hub connectivity diagram
b.
network decomposition diagram
c.
workstation connectivity diagram
d.
virtual memory diagram
 

 11. 

Which of the following is not true about UML?
a.
It is the acronym for Unified Modeling Language
b.
It is considered by many as the sixth generation object-oriented programming language.
c.
It is the industry standard for modeling object-oriented systems.
d.
Its toolset includes diagrams.
 

 12. 

Which of the following is not one of the main components of UML?
a.
Things
b.
Relationships
c.
Entities
d.
Diagrams
 

 13. 

Which of these is a potential training source?
a.
external paid trainers
b.
in-house trainers
c.
vendors
d.
systems analysts
e.
all of the above
 

 14. 

Which of these is not a kind of security?
a.
behavioral
b.
hierarchical
c.
logical
d.
physical
 

 15. 

One configuration for a distributed systems network is to have a computer designated  the central node.  If this computer can communicate with the other nodes, but the other nodes cannot communicate with each other, what type of configuration is it?
a.
broadcast
b.
bus
c.
ring
d.
star
 

 16. 

Which of these conversion strategies has as a distinct disadvantage the fact that special attention must be paid to interfaces?
a.
direct changeover
b.
distributed conversion
c.
gradual conversion
d.
modular prototype conversion
e.
parallel conversion
 

Matching
 
 
Conversion strategies:
a.
parallel conversion
d.
direct changeover
b.
gradual conversion
e.
modular prototype conversion
c.
distributed conversion
 

 17. 

The volume of transactions handled by the new system is gradually increased as the system is phased in.
 

 18. 

Running the old system and the new system at the same time.
 

 19. 

As each module is modified and accepted, it is put into use.
 

 20. 

Occurs when many installations of the same system are planned, and when conversion is done at one site at a time
 

 21. 

On a specified date, the old system is dropped and the new system is put into use. 
 
 
UML Diagrams
a.
use case diagram
d.
sequence diagram
b.
use case scenario
e.
class diagram
c.
activity diagram
f.
statechart diagram
 

 22. 

Illustrates the overall flow of activities.
 

 23. 

describes how the system is used. Analysts start with this type of diagram.
 

 24. 

Emphasizes the timing or succession of interactions between classes or object instances over time.
 

 25. 

Shows classes and relationships.
 

 26. 

Shows the state transitions.
 

 27. 

It is a verbal articulation of exceptions to the main behavior described by the primary use case.
 

True/False
Indicate whether the statement is true or false.
 

 28. 

One advantage of distributed systems is the increased reliability.
 

 29. 

The field of disaster recovery is focused on how a business can continue in the aftermath of a disaster and how it can restore essential systems in the IT infrastructure.
 

 30. 

A hierarchical configuration works well in close quarters, such as a suite of offices where several different devices can be hooked together via a central cable which is the only path.
 

 31. 

Passwords and authorization codes are examples of logical security controls.
 

 32. 

UML is a powerful tool that can greatly improve the quality of your systems analysis and design.
 

 33. 

Objects are part of a general concept called classes.
 

 34. 

The process of ensuring that the information system is operational and allowing users to take over its operation is called implementation.
 

 35. 

The information architecture model that will likely dominate networking in the near future is the centralized computing.
 

 36. 

The file server stores application programs and data files for all clients on the network.
 

 37. 

In a client/server model, servers are the users.
 

 38. 

When one class is created from another class it is called inheritance.
 

 39. 

Security is the responsibility of systems analysts only.
 

 40. 

Hot Spots are Wi-Fi networks available in certain high-Internet traffic locations.
 

 41. 

A print server is a PC dedicated to receiving files to be printed.
 

 42. 

Metropolitan-area networks serve users over several miles or across entire continents in a distributed system.
 

 43. 

The server performs data access and device management while the client is where users interact with a limited portion of the system.
 

 44. 

Object-oriented techniques work well in situations where complicated information systems are undergoing continuous maintenance, adaptation, and redesign.
 

 45. 

A wide-area network serves individuals only within a single building.
 



 
         Start Over