Professional Documents
Culture Documents
4
4
4
11. Which of the following system descriptions depicts Logical system de-
the function and purpose (the What) of the system scription
without reference to, or implications for, the actual
way in which the system will be implemented?
13. As defined in the textbook, the generic system de- definition, construc-
velopment life cycle consists of the following 3 tion, and implemen-
phases: tation
14. Which of the following best describes the definition Business and sys-
of the systems life cycle? tems professionals
document system
needs and feasibility
15. Which of the following best describes the construc- the system is func-
tion phase of the systems life cycle? tionally designed,
and then its physical
design is specified
16. Which of the following describes an early step in the Data and procedures
implementation phase of the systems life cycle? from the old system
are converted
21. When developing a logical data flow diagram, a cir- a process compo-
cle indicates: nent
22. When developing a logical data flow diagram, a rec- data at rest
tangle (or open rectangle) indicates:
23. All of the following are tools for representing the program chart
Logical To-Be model of an information system ex-
cept a(n):
24. The most common approach to defining data ele- data dictionary/direc-
ments in a DFD is to create a(n) tory
25. In the object-oriented (O-O) approach to software storing data and re-
engineering, the term "encapsulation" refers to: lated operations to-
gether within objects
26. Which of the following diagrams is NOT part of the Context diagram
Unified Modeling Language for O-O modeling?
27. Which of the following statements is NOT true about Users are not in-
system testing controls in the construction phase volved in systems
of the systems life cycle? testing
29. Controls for the validity of data entered into an ap- edit rules
plication program (such as ensuring that only num-
bers are entered into a numeric field) are referred to
as:
3/4
CIS 850 - Chapter 8
Online çal1_: https://quizlet.com/_437vb4
30. Security measures that are concerned with whether logical access con-
or not users can run an application, read a file, or trols
change data in a database, or can change who can
access to data that others have created are referred
to as:
32. System testing only occurs when systems are ini- False
tially developed. (TF)
4/4