Matching
|
|
|
UML Diagrams
a. | use case diagram | d. | sequence
diagram | b. | use case scenario | e. | class diagram | c. | activity diagram | f. | statechart
diagram |
|
|
1.
|
Illustrates the overall flow of activities.
|
|
2.
|
Emphasizes the timing or succession of interactions between classes or object
instances over time.
|
|
3.
|
It is a verbal articulation of exceptions to the main behavior described by the
primary use case.
|
|
4.
|
Shows classes and relationships.
|
|
5.
|
Shows the state transitions.
|
|
6.
|
describes how the system is used. Analysts start with this type of
diagram.
|
|
|
Conversion strategies:
a. | parallel conversion | d. | direct
changeover | b. | gradual conversion | e. | modular prototype conversion | c. | distributed
conversion |
|
|
7.
|
As each module is modified and accepted, it is put into use.
|
|
8.
|
The volume of transactions handled by the new system is gradually increased as
the system is phased in.
|
|
9.
|
Occurs when many installations of the same system are planned, and when
conversion is done at one site at a time
|
|
10.
|
On a specified date, the old system is dropped and the new system is put into
use.
|
|
11.
|
Running the old system and the new system at the same time.
|
True/False Indicate whether the statement is true or
false.
|
|
12.
|
Security is the responsibility of systems analysts only.
|
|
13.
|
Hot Spots are Wi-Fi networks available in certain high-Internet traffic
locations.
|
|
14.
|
One advantage of distributed systems is the increased reliability.
|
|
15.
|
The server performs data access and device management while the client is where
users interact with a limited portion of the system.
|
|
16.
|
Passwords and authorization codes are examples of logical security
controls.
|
|
17.
|
Metropolitan-area networks serve users over several miles or across entire
continents in a distributed system.
|
|
18.
|
A hierarchical configuration works well in close quarters, such as a suite of
offices where several different devices can be hooked together via a central cable which is the only
path.
|
|
19.
|
When one class is created from another class it is called inheritance.
|
|
20.
|
The process of ensuring that the information system is operational and allowing
users to take over its operation is called implementation.
|
|
21.
|
UML is a powerful tool that can greatly improve the quality of your systems
analysis and design.
|
|
22.
|
The file server stores application programs and data files for all clients on
the network.
|
|
23.
|
Object-oriented techniques work well in situations where complicated information
systems are undergoing continuous maintenance, adaptation, and redesign.
|
|
24.
|
The field of disaster recovery is focused on how a business can continue in the
aftermath of a disaster and how it can restore essential systems in the IT infrastructure.
|
|
25.
|
The information architecture model that will likely dominate networking in the
near future is the centralized computing.
|
|
26.
|
A wide-area network serves individuals only within a single building.
|
|
27.
|
A print server is a PC dedicated to receiving files to be printed.
|
|
28.
|
In a client/server model, servers are the users.
|
|
29.
|
Objects are part of a general concept called classes.
|
Multiple Choice Identify the choice that best completes the
statement or answers the question.
|
|
30.
|
Which of the following is not one of the seven elements to
consider during and after a disaster?
a. | Identify the teams responsible for managing a crisis. | b. | Establish multiple
communication channels among employees and consultants who are onsite. | c. | Determine data
replication technologies that match the organization’s timetable for getting systems up and
running. | d. | Provide recovery solutions that include an offsite location. | e. | Provide the location
of the nearest insurance claims adjuster. |
|
|
31.
|
Which of the following is not one of the main components of
UML?
a. | Things | b. | Relationships | c. | Entities | d. | Diagrams |
|
|
32.
|
The 802.11 network standard, developed by IEEE, is commonly
associated with:
a. | Bluetooth | b. | WiMAX | c. | Wi-Fi | d. | Mobile WiMAX |
|
|
33.
|
One configuration for a distributed systems network is to have a computer
designated the central node. If this computer can communicate with the other nodes, but
the other nodes cannot communicate with each other, what type of configuration is it?
a. | broadcast | b. | bus | c. | ring | d. | star |
|
|
34.
|
An example of the ______ configuration for a distributed network is when there
is no central computer and all nodes are of equal computing power.
a. | star | b. | ring | c. | bus | d. | hierarchical |
|
|
35.
|
Which of the following is not true about UML?
a. | It is the acronym for Unified Modeling Language | b. | It is considered by
many as the sixth generation object-oriented programming language. | c. | It is the industry
standard for modeling object-oriented systems. | d. | Its toolset includes
diagrams. |
|
|
36.
|
Which of these conversion strategies has as a distinct disadvantage the fact
that special attention must be paid to interfaces?
a. | direct changeover | b. | distributed conversion | c. | gradual
conversion | d. | modular prototype conversion | e. | parallel
conversion |
|
|
37.
|
Which of these is not a kind of security?
a. | behavioral | b. | hierarchical | c. | logical | d. | physical |
|
|
38.
|
Which network model shows the details of connecting individual
workstations?
a. | hub connectivity diagram | b. | network decomposition
diagram | c. | workstation connectivity diagram | d. | virtual memory
diagram |
|
|
39.
|
Which of the following is not used to evaluate your Web
site?
a. | Learn about the pages that have been accessed. | b. | Use “Web
Bugs” to gather information about the customer. | c. | Collect visitor demographics, such as the
geographic region or city. | d. | Find out who is referring the Web site visitors
to your Web site. | e. | Determine the browser that the visitor is
using. |
|
|
40.
|
The analyst has four major guidelines for setting up training. Which of the
following is not one of them?
a. | Training methods | b. | Training materials | c. | Training
sites | d. | Training objectives | e. | Training time |
|
|
41.
|
Which network model shows an overview of the network system?
a. | hub connectivity diagram | b. | network decomposition diagram
| c. | workstation connectivity diagram | d. | virtual memory
diagram |
|
|
42.
|
Which of the following is an advantage of the client/server model?
a. | less customization of applications | b. | lower start-up costs | c. | provides greater
computer power | d. | fosters (promotes) a high managerial level of decision
making |
|
|
43.
|
Which of these is a potential training source?
a. | external paid trainers | b. | in-house trainers | c. | vendors | d. | systems analysts | e. | all of the
above |
|
|
44.
|
WiMax features a greater wireless access range of a little over ____
miles.
|
|
45.
|
Which of the following is not one of the four approaches to
implementation that a system analyst must consider?
a. | evaluating the new or modified system | b. | strategies for training users and
personnel | c. | movement of computer power to individual users(groups) with the help of distributed
computing | d. | selecting the best type of system testing available for programmers and
users | e. | choosing a conversion strategy |
|