INFX 380 Final Exam Review

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/141

flashcard set

Earn XP

Description and Tags

SP2023 INFX 380 Review Flashcards

142 Terms

1
New cards
\_____ combine data from different item attributes, or characteristics, to build code.
Derivation codes
2
New cards
In the accompanying figure, a \___ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.
Primary key
3
New cards
\_____ is designed to serve the needs of a specific department, such as sales, marketing, or finance
A data mart
4
New cards
If a primary key combines two or more fields, then it is called a \_____.
Composite key
5
New cards
\_____ describes the numeric relationship between two entities and shows how instances of one entity relate to an instance of another entity
Cardinality
6
New cards
\___ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data.
Open Database Connectivity (ODBC)
7
New cards
Designing tables is easier if a \_____ is used to show a table’s structure, fields, and primary key
Standard notation format
8
New cards
One type of validity check, called \_____, is a set of rules that avoids data inconsistency and quality problems
Referential integerity
9
New cards
A \_____ is a set of letters or numbers that represents a data item
Code
10
New cards
Some abbreviation codes are called \_____ codes because they use a specific combination of letters that are easy to remember.
Mnemonic
11
New cards
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a \_____.
Schema
12
New cards
The data mining technique that relies on association rule learning is often called \_____.
Market basket analysis
13
New cards
\_____, a coding method that uses one byte per character, is used on mainframe computers and high-capacity servers.
EBCDIC (Extended Binary Coded Decimal Interchange Code)
14
New cards
To bridge the gap between a database and the internet, it is necessary to use \_____, which is software that integrates different applications and allows them to exchange data.
Middleware
15
New cards
In the accompanying figure, any field that serves as a primary key is called a \_____.
candidate key
16
New cards
\_____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.
Data warehouse
17
New cards
\_____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise
Scalability
18
New cards
A \_____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables
Foreign key
19
New cards
With a \_____, users provide an example of the data requested
Query by example language
20
New cards
In an entity-relationship diagram, entities are commonly represented as \______.
Rectangle
21
New cards
\_____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data
Encryption
22
New cards
\_____ uses a keyword to encode a number
Cipher codes
23
New cards
\_____ enables Java applications to exchange data with any database that uses SQL statements and is compliant with its standard
Java Database Connectivity (JDBC)
24
New cards
When developing e-business systems, an in-house solution usually requires a \______ for a company that must adapt quickly in a dynamic e-commerce enviroment
Greater initial investment but provides more flexibility
25
New cards
When an individual user works in \______, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface
Stand-alone mode
26
New cards
\_____ relies on collective data paths to increase bandwidth and range
Multiple input/multiple output (MIMO) technology
27
New cards
Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called \_____.
Supply chain management (SCM)
28
New cards
A \_____ design locates all or most of the processing logic on the server.
Thin client
29
New cards
Which configuration has a central wireless device that is used to serve all wireless clients?
The Basic Service Set (BSS)
30
New cards
The \_____ was formed in 1999 to certify interoperability of wireless network products based on IEEE 802.11 specifications.
Wi-Fi Alliance
31
New cards
A \_____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
Wireless local area network (WLAN)
32
New cards
A \_____ resembles a group of computers in which data flows in only one direction from one device to the next.
Ring network
33
New cards
In it’s wireless configuration, the \_____ is similar to a hub in the local area network (LAN) star topology, except it provides network services to wireless clients instead of wired clients
Access point
34
New cards
\_____ establishes a company-wide strategy for IT resources and specific standards for data, processing, network, and user interface design
Enterprise Resource Planning (ERP)
35
New cards
A main advantage of enterprise resource planning (ERP) is that it describes a \_____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages
Platform
36
New cards
The \_____ standard uses multiple input/multiple output (MIMO) technology to boost performance
802.11ac
37
New cards
\_____ describes the way the components in a network interact
logical topology
38
New cards
A disadvantage of a bus network is that \_____
Performance can decline as more users and device are added
39
New cards
\_____ translate(s) the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.
System architecture
40
New cards
The term “\_____” generally refers to systems that divide processing between one or more networked clients and a central server.
Client/server
41
New cards
User documentation \_____.
consists of instructions and information for users who will interact with the system
42
New cards
A(n) \_____ refers to a web-based broadcast that allows a user to download multimedia files to a PC or portable device.
Podcast
43
New cards
Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called \_____.
Acceptance test
44
New cards
When developing a training program, which guideline should be kept in mind?
Select the most effective place to conduct the training
45
New cards
\_____ requires that a software supplier document all testing and maintain records of test results.
The International Organization for Standardization (ISO)
46
New cards
As the accompanying figure illustrates, the \_____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational.
Direct cutover
47
New cards
The environment for the actual system operation is called the \_____.
Production environment
48
New cards
\_____ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows.
Flowcharts
49
New cards
\_____ is the process of putting a new information system online and retiring the old system.
System changeover
50
New cards
\_____ measures a module’s scope and processing characteristics.
Cohesion
51
New cards
Using a \_____ strategy, knowledgeable users can be selected who then conduct sessions for others
train-the-trainer
52
New cards
\_____ describes the degree of of interdependence among modules
Coupling
53
New cards
\_____ involves more risk than other changeover methods
Direct cutover
54
New cards
Which is specified by the detailed procedures in a test plan?
The test data to be used
55
New cards
A \_____ consists of related program code organized into small units that are easy to understand and maintain
module
56
New cards
The Software Engineering Institute (SEI) established a new model, called \_____, which incorporates software and systems development into a much larger framework
Capability Maturity Model Integration (CMMI)
57
New cards
A class diagram includes the class \_____, which describes the characteristics of objects in the class
attributes
58
New cards
The \_____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features
Allocated baseline
59
New cards
In maintenance management, \_____ involves studying the parts of a system to understand the overall system
synthesis
60
New cards
Many IT departments use a job title of \_____ to designate positions that require a combination of systems analysis and programming skills
programmer/analyst
61
New cards
In addition to benchmark testing, performance measurements, called \_____, can monitor the number of transactions processed in a given time period, the number of records accessed, and the volume of online data
metrics
62
New cards
\_____ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action
fault management
63
New cards
\_____ costs include expenses for items such as supplies and equipment rental
operational
64
New cards
Perfective maintenance usually is cost effective \_____ a system’s operational life.
during the middle of
65
New cards
The first step in managing IT security is to develop a \_____ based on confidentiality, integrity, and availability
security policy
66
New cards
\_____ measures the time between submitting a request for information and the fulfillment of the request
Turnaround time
67
New cards
A ______ displays the same information as the Gantt chart, including task dependencies, but uses task boxes to include much more details
Network diagram
68
New cards
\_____ lists each risk and assesses the likelihood that it could affect a project
Risk identification
69
New cards
Project monitoring, an activity of a project manager, \_____
Requires guiding, supervising, and coordinating a project team’s workload
70
New cards
\_____, a free cloud-based project management tool, runs in a browser window, so there is no software to install to use it
Gantter
71
New cards
A \_____ is a proactive effort to anticipate risk and describe an action plan to deal with it
Risk response plan
72
New cards
When maintaining schedules, if enough \_____ and frequent checkpoints exist, problems will be detected rapidly
milestones
73
New cards
A \_____ chart displays complex task patterns and relationships
PERT
74
New cards
Two or more \_____ depend on a predecessor task
concurrent tasks
75
New cards
Project planning, an activity of a project manager, \______
Includes identifying project tasks and estimating completion times and costs
76
New cards
Using a(n) \_____, a project manager can convert task start and finish times to actual dates by laying out the entire project on a calendar
Program Evaluation Review Technique (PERT) chart
77
New cards
What is a scrum development team expected to do during the first Sprint? Two correct answers.
Test the product & Build a thin slice of potentially shippable functionality
78
New cards
Who is the product owner? Three correct answers.
Accept/reject work results; Responsible for ROI; Focuses more on what than how
79
New cards
Which is NOT part of a family of methods designed to respond to the challenges of unpredictable projects?
Fixed scope
80
New cards
A person who acts on behalf of customer to represent their interests is called a
Product owner
81
New cards
The CEO asks the Development Team to add an activity to the current Sprint. What should the Development Team do?
Inform the Product Owner so he/she can work with the CEO
82
New cards
Which of these agile principles is where teams reflect, learn, and adapt to change; work informs the plan?
Continuous improvement
83
New cards
What is included in the manifesto for Agile Software Development? Two correct answers
Working Software & Responding to change
84
New cards
All of the following are part of the Agile Project Management model except \_____.
Design up front
85
New cards
What is NOT the question to ask at the daily scrum?
What is the newest schedule changes?
86
New cards
Who is the scrum master? Two correct answers.
Focuses more on the how than the what & Has no authority
87
New cards
How often do experienced Agile software developers test?
Every time the code changes
88
New cards
What’s a good use for velocity?
To help the product owner make forecasts on what might be done by a given release date
89
New cards
Which of thee following are more effective solutions? Three correct answers.
A volunteer agrees to a specific action by a specific date; Team writes concrete adjustments to its working agreements; Team agrees to try a different approach as an experiment for one Sprint
90
New cards
What is the first thing we should see at the Sprint Review Meeting?
Live demonstration of a potentially shippable (properly tested) product increment
91
New cards
What is the definition of “done” int eh project development team? Three correct answers.
Code refactored, Properly tested, Potentially shippable
92
New cards
When is Sprint execution completed?
When the timebox expires
93
New cards
When were product backlogs committed to the Sprint?
During the sprint planning meeting
94
New cards
What is the best time within the Sprint Review Meeting to discuss feedback from outside stakeholders?
The end, after demo and measurement of which goals were achieved
95
New cards
What should we do now that we’ve seen the product demonstration, the declaration of what’s done, and a measurement of velocity?
Get feedback from stakeholders leading to a new PBIs and the possible re-prioritization
96
New cards
Many companies had an installed base of data, called \____, which was difficult to access and transport to a client/server environment.
Legacy data
97
New cards
The \____ describes how data actually moves from an application on one computer to an application on another networked computer.
OSI (Open Systems Interconnection) model
98
New cards
A \____ follows Internet design protocols and enables a company to integrate new applications into its e-commerce strategy.
Web-centric architecture
99
New cards
\____ is the amount of data that can be transferred in a fixed time period.
Bandwidth
100
New cards
The \____ allows the expansion of wireless access over a wide area.
Extended Service Set (ESS) topology