Name:     ID: 
 
Email: 

SICI4087 FINAL EXAM CHAPTERS 17 & 18 version B

Matching
 
 
UML Diagrams
a.
use case diagram
d.
sequence diagram
b.
use case scenario
e.
class diagram
c.
activity diagram
f.
statechart diagram
 

 1. 

Illustrates the overall flow of activities.
 

 2. 

Emphasizes the timing or succession of interactions between classes or object instances over time.
 

 3. 

It is a verbal articulation of exceptions to the main behavior described by the primary use case.
 

 4. 

Shows classes and relationships.
 

 5. 

Shows the state transitions.
 

 6. 

describes how the system is used. Analysts start with this type of diagram.
 
 
Conversion strategies:
a.
parallel conversion
d.
direct changeover
b.
gradual conversion
e.
modular prototype conversion
c.
distributed conversion
 

 7. 

As each module is modified and accepted, it is put into use.
 

 8. 

The volume of transactions handled by the new system is gradually increased as the system is phased in.
 

 9. 

Occurs when many installations of the same system are planned, and when conversion is done at one site at a time
 

 10. 

On a specified date, the old system is dropped and the new system is put into use. 
 

 11. 

Running the old system and the new system at the same time.
 

True/False
Indicate whether the statement is true or false.
 

 12. 

Security is the responsibility of systems analysts only.
 

 13. 

Hot Spots are Wi-Fi networks available in certain high-Internet traffic locations.
 

 14. 

One advantage of distributed systems is the increased reliability.
 

 15. 

The server performs data access and device management while the client is where users interact with a limited portion of the system.
 

 16. 

Passwords and authorization codes are examples of logical security controls.
 

 17. 

Metropolitan-area networks serve users over several miles or across entire continents in a distributed system.
 

 18. 

A hierarchical configuration works well in close quarters, such as a suite of offices where several different devices can be hooked together via a central cable which is the only path.
 

 19. 

When one class is created from another class it is called inheritance.
 

 20. 

The process of ensuring that the information system is operational and allowing users to take over its operation is called implementation.
 

 21. 

UML is a powerful tool that can greatly improve the quality of your systems analysis and design.
 

 22. 

The file server stores application programs and data files for all clients on the network.
 

 23. 

Object-oriented techniques work well in situations where complicated information systems are undergoing continuous maintenance, adaptation, and redesign.
 

 24. 

The field of disaster recovery is focused on how a business can continue in the aftermath of a disaster and how it can restore essential systems in the IT infrastructure.
 

 25. 

The information architecture model that will likely dominate networking in the near future is the centralized computing.
 

 26. 

A wide-area network serves individuals only within a single building.
 

 27. 

A print server is a PC dedicated to receiving files to be printed.
 

 28. 

In a client/server model, servers are the users.
 

 29. 

Objects are part of a general concept called classes.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 30. 

Which of the following is not one of the seven elements to consider during and after a disaster?
a.
Identify the teams responsible for managing a crisis.
b.
Establish multiple communication channels among employees and consultants who are onsite.
c.
Determine data replication technologies that match the organization’s timetable for getting systems up and running.
d.
Provide recovery solutions that include an offsite location.
e.
Provide the location of the nearest insurance claims adjuster.
 

 31. 

Which of the following is not one of the main components of UML?
a.
Things
b.
Relationships
c.
Entities
d.
Diagrams
 

 32. 

The 802.11 network standard, developed by  IEEE, is commonly associated with:
a.
Bluetooth
b.
WiMAX
c.
Wi-Fi
d.
Mobile WiMAX
 

 33. 

One configuration for a distributed systems network is to have a computer designated  the central node.  If this computer can communicate with the other nodes, but the other nodes cannot communicate with each other, what type of configuration is it?
a.
broadcast
b.
bus
c.
ring
d.
star
 

 34. 

An example of the ______ configuration for a distributed network is when there is no central computer and all nodes are of equal computing power.
a.
star
b.
ring
c.
bus
d.
hierarchical
 

 35. 

Which of the following is not true about UML?
a.
It is the acronym for Unified Modeling Language
b.
It is considered by many as the sixth generation object-oriented programming language.
c.
It is the industry standard for modeling object-oriented systems.
d.
Its toolset includes diagrams.
 

 36. 

Which of these conversion strategies has as a distinct disadvantage the fact that special attention must be paid to interfaces?
a.
direct changeover
b.
distributed conversion
c.
gradual conversion
d.
modular prototype conversion
e.
parallel conversion
 

 37. 

Which of these is not a kind of security?
a.
behavioral
b.
hierarchical
c.
logical
d.
physical
 

 38. 

Which network model shows the details of connecting individual workstations?
a.
hub connectivity diagram
b.
network decomposition diagram
c.
workstation connectivity diagram
d.
virtual memory diagram
 

 39. 

Which of the following is not used to evaluate your Web site?
a.
Learn about the pages that have been accessed.
b.
Use “Web Bugs” to gather information about the customer.
c.
Collect visitor demographics, such as the geographic region or city.
d.
Find out who is referring the Web site visitors to your Web site.
e.
Determine the browser that the visitor is using.
 

 40. 

The analyst has four major guidelines for setting up training. Which of the following is not one of them?
a.
Training methods
b.
Training materials
c.
Training sites
d.
Training objectives
e.
Training time
 

 41. 

Which network model shows an overview of the network system?
a.
hub connectivity diagram
b.
network decomposition diagram
c.
workstation connectivity diagram
d.
virtual memory diagram
 

 42. 

Which of the following is an advantage of the client/server model?
a.
less customization of applications
b.
lower start-up costs
c.
provides greater computer power
d.
fosters (promotes) a high managerial level of decision making
 

 43. 

Which of these is a potential training source?
a.
external paid trainers
b.
in-house trainers
c.
vendors
d.
systems analysts
e.
all of the above
 

 44. 

WiMax features a greater wireless access range of a little over ____ miles.
a.
5
b.
10
c.
20
d.
30
 

 45. 

Which of the following is not one of the four approaches to implementation that a system analyst must consider?
a.
evaluating the new or modified system
b.
strategies for training users and personnel
c.
movement of computer power to individual users(groups) with the help of distributed computing
d.
selecting the best type of system testing available for programmers and users
e.
choosing a conversion strategy
 



 
         Start Over