Send a link to your students to track their progress
100 Terms
1
New cards
Unified Modeling Language (UML)
_____ is a widely used method of visualizing and documenting an information system.
2
New cards
Object
A(n) _____ represents a person, a place, an event, or a transaction that is significant to the information system.
3
New cards
Attributes
An object has certain _____, which are characteristics that describe the object, such as the make, model, and color of a car.
4
New cards
Method
An object's _____ are the tasks or functions that the object performs when it receives a command to do so.
5
New cards
Method
A car performs a(n) _____ called OPERATE WIPERS when it is sent a message with the wiper control.
6
New cards
Class
An object belongs to a group or category called a(n) _____.
7
New cards
Instance
A(n) _____ is a specific member of a class.
8
New cards
Instance
A red Mustang is a(n) _____ of the CAR class.
9
New cards
Rectangle
The Unified Modeling Language (UML) represents an object as a _____ with the object name at the top, followed by the object's attributes and methods.
10
New cards
inherit/acquire
In an object-oriented system, objects can _____ certain attributes from other objects.
11
New cards
State
The _____ of an object is an adjective that describes the object's current status.
12
New cards
State
A bank account object can have a specific attribute called a(n) _____ that can be active, inactive, closed, or frozen.
13
New cards
Method
A(n) _____ resembles a verb and defines specific tasks that an object can perform.
14
New cards
Message
A _____ is a command that tells an object to perform a certain method.
15
New cards
Polymorphism
The concept that a message gives different meanings to different objects is called _____.
16
New cards
Black box
An object can be viewed as a(n) _____, because a message to the object triggers changes within the object without specifying how the changes must be carried out.
17
New cards
Encapsulation
The black box concept is an example of _____, which means that all data and methods are self-contained.
18
New cards
Encapsulation
_____ allows objects to be used as modular components anywhere in a system.
19
New cards
Modular
A major advantage of object-oriented (O-O) designs is that systems analysts can save time and avoid errors by using _____ objects.
20
New cards
Class
All objects within a(n) _____ share common attributes and methods.
21
New cards
Software as a Service (SaaS)
_____ is a model of software deployment in which an application is hosted as a service provided to customers over the Internet.
22
New cards
Software as a Service (SaaS)
_____ reduces the customer's need for software maintenance, operation, and support.
23
New cards
Microsoft's.NET
Identify a major web-based development environment.
24
New cards
Internet-based system
In a(n) _____, the web becomes an integral part of the application, rather than just a communication channel, and systems analysts need new application development tools and solutions to handle the new systems.
25
New cards
web-based environment
Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.
26
New cards
middleware
Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems.
27
New cards
service
When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.
28
New cards
Many applications require substantial desktop computing power and resources
Which is true of a traditional systems development environment?
29
New cards
Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.
Which is true of a web-based systems development environment?
30
New cards
Web 2.0
The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.
31
New cards
Cloud computing
_____ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
32
New cards
Outsourcing
_____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.
33
New cards
Service Provider
A firm that offers outsourcing solutions is called a _____.
34
New cards
Application Service Provider (ASP)
A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
35
New cards
Internet Business Services (IBSs)
Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management.
36
New cards
fixed fee model
When determining outsourcing fees, a _____ uses a set fee based on a specified level of service and user support.
37
New cards
subscription model
When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.
38
New cards
lower bottom-line costs
The main reason for offshore outsourcing is to _____.
39
New cards
transaction model
A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.
40
New cards
Make or Buy/Build or Buy
In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision.
41
New cards
audit trails
A secure system includes _____ that can log every instance of data entry and changes.
42
New cards
Graphical User Interface (GUI)
Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s.
43
New cards
usability
A user interface (UI) is the key to _____, which includes user satisfaction, support for business functions, and system effectiveness.
44
New cards
process-control
In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system.
45
New cards
user-centered
In a _____ system, the distinction blurs between input, output, and the interface itself.
46
New cards
Human-computer Interaction (HCI)
_____ describes the relationship between computers and the people who use them to perform their jobs.
47
New cards
transparent interface
A(n) _____ does not distract a user and calls no attention to itself.
48
New cards
storyboard
Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design.
49
New cards
usability metrics
Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system.
50
New cards
natural language
A _____ language feature allows users to type commands or requests in normal text phrases.
51
New cards
Context-sensitive
_____ help offers assistance for a task in progress.
52
New cards
tool bar
Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands.
53
New cards
toggle button
In a data entry screen, such as that shown in the accompanying figure, a(n) _____ is a control feature that is used to represent on or off status and switches to the other status when clicked.
54
New cards
check box
In a data entry screen, such as that shown in the accompanying figure, a _____ is a control feature that is used to select one or more choices from a group.
55
New cards
dialog box
If variable input data is needed, a _____ must be provided to explain what is needed.
56
New cards
Form filling
_____ is an online data entry method where a blank form that duplicates or resembles the source document is completed on the screen.
57
New cards
input mask
An input _____ is a template or pattern that restricts data entry and prevents errors.
58
New cards
data validation rule
A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions.
59
New cards
Existence Check
A(n) _____ is a data validation rule that should be applied to mandatory data items.
60
New cards
Range Check
A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value.
61
New cards
data structure
A _____, which is a framework for organizing, storing, and managing data, consists of files or tables that interact in various ways.
62
New cards
Database Management System (DBMS)
A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data.
63
New cards
Scalability
_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.
64
New cards
Economy of Scale
The inherent efficiency of high-volume processing on larger computers is called _____.
65
New cards
Database Administrator (DBA)
Typically, a database management system is managed by a person called a _____, who assesses overall requirements and maintains the database for the benefit of an entire organization rather than a single department or user.
66
New cards
Query Language
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished.
67
New cards
Query by Example (QBE)
With a _____, users provide an example of the data requested.
68
New cards
Data Manipulation Language (DML)
A _____ controls database operations, including storing, retrieving, updating, and deleting data.
69
New cards
schema
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.
70
New cards
Open Database Connectivity (ODBC)
_____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
71
New cards
Java Database Connectivity (JDBC)
_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard.
72
New cards
middleware
To bridge the gap between a database and the Internet, it is necessary to use _____, which is software that integrates different applications and allows them to exchange data.
73
New cards
key fields
During the systems design phase, _____ are used to organize, access, and maintain data structures.
74
New cards
Candidate key
In the accompanying figure, any field that serves as a primary key is called a _____.
75
New cards
foreign key
In the accompanying figure, a _____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.
76
New cards
nonkey field
Any field that is not a primary key or a candidate key is called a _____.
77
New cards
Combination key
If a primary key combines two or more fields, then it is called a _____.
78
New cards
Secondary key
A _____, which is not unique, is a field or combination of fields that can be used to access or retrieve records.
79
New cards
Referential Integrity
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.
80
New cards
Entity-relationship Diagram (ERD)
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities.
81
New cards
System Architecture
_____ translate(s) the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.
82
New cards
Entity Resource Planning (ERP)
_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design.
83
New cards
platform
A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages.
84
New cards
supply chain management (SCM)
Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____.
85
New cards
Extensibility
_____ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.
86
New cards
applications
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the required output.
87
New cards
web-centric
A _____ follows Internet design protocols and enables a company to integrate new applications into its e-commerce strategy.
88
New cards
legacy systems
A new system might have to interface with one or more _____, which are older systems that use outdated technology.
89
New cards
corporate portal
A(n) _____ provides access for customers, employees, suppliers, and the public.
90
New cards
portal
A _____ is an entrance to a multifunction website.
91
New cards
Mainframe architecture
A system design where the server performs all the processing is described as _____.
92
New cards
Data processing center
In addition to centralized data processing, the earliest systems performed all data input and output at a central location, often called a _____.
93
New cards
stand-alone mode
When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.
94
New cards
Local Area Network (LAN)
Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.
95
New cards
Thin Client
A _____ design locates all or most of the processing logic on the server.
96
New cards
Distributed Systems
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.
97
New cards
client/server architecture
The term "_____" generally refers to systems that divide processing between one or more networked clients and a central server.
98
New cards
Legacy Data
Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment.
99
New cards
Middleware
In a multitier system, special utility software called _____ enables the tiers to communicate and pass data back and forth.
100
New cards
Distributed Database Management System (DDBMS)
In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a _____.