1.
Analyzing the current system is performed during the __________ phase.
Correct Answer
D. 4) needs analysis
Explanation
During the needs analysis phase, the current system is analyzed to identify the requirements and needs of the users. This phase involves gathering information about the existing system, understanding its strengths and weaknesses, and identifying areas for improvement. By analyzing the current system, the project team can determine the necessary changes and enhancements that need to be made in order to meet the desired goals and objectives. This analysis helps in identifying the specific needs and requirements that the new system should fulfill.
2.
In __________, team members start with the big picture and move to the details.
Correct Answer
A. 1) top-down design
Explanation
Top-down design is an approach where team members begin by understanding the overall structure and objectives of a project before diving into the specific details. This method involves breaking down a complex problem into smaller, more manageable tasks, allowing for a systematic and organized approach to problem-solving. By starting with the big picture and gradually moving towards the details, team members can ensure that their work aligns with the overall goals and objectives of the project.
3.
Many teams use working models called __________ to explore the look and feel of screens with users.
Correct Answer
B. 2) prototypes
Explanation
Teams use working models called prototypes to explore the look and feel of screens with users. Prototypes are used to test and gather feedback from users before the final product is developed. They allow teams to iterate and make improvements based on user feedback, ensuring that the final product meets user needs and expectations.
4.
In the needs analysis section of the SDLC, the __________ typically defines a need for a new system
Correct Answer
C. 3) user
Explanation
In the needs analysis section of the SDLC, the user typically defines a need for a new system. This is because the user is the one who will ultimately be using the system and therefore has the best understanding of their needs and requirements. The user's input is crucial in determining what the new system should be able to do and what problems it should solve. The manager may have some input as well, but the user's perspective is often the most important in this stage of the SDLC. The system analyst, technical writer, and others may also play a role, but the user is typically the primary driver in defining the need for a new system.
5.
This phase of the SDLC may involve a small group of testers.
Correct Answer
C. 3) implementation
Explanation
During the implementation phase of the SDLC, a small group of testers may be involved in testing the developed system or software for any bugs or issues. This phase focuses on actually building and deploying the system, and the testers play a crucial role in ensuring its functionality and quality. The other options, such as maintenance, needs analysis, and development, do not specifically involve the testing process.
6.
Companies use which of the following vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves ?
Correct Answer
C. 3) Application service providers
Explanation
Companies use application service providers (ASPs) to provide access to software and services instead of purchasing and maintaining the applications themselves. ASPs offer software solutions and services over the internet, allowing companies to access and use them on a subscription basis. This helps companies save costs on software licenses, infrastructure, and maintenance, as the ASPs handle these aspects. Therefore, the correct answer is 3) Application service providers.
7.
Which one of the following would be considered as a way that a computer virus can enter a computer system ?
Correct Answer
B. 2) Borrowed copies of software
Explanation
Borrowed copies of software can be considered as a way that a computer virus can enter a computer system because the software may have been infected with a virus or malware. When someone borrows software from another person or organization, there is a risk that the software may not be legitimate or may have been tampered with, allowing for the introduction of a virus into the computer system. It is important to only use trusted sources and obtain software legally to minimize the risk of virus infection.
8.
Collecting personal information and effectively posing as another individual is known as the crime of—
Correct Answer
B. 2) dentity theft
Explanation
Identity theft refers to the act of collecting personal information and impersonating someone else. This can involve stealing someone's social security number, credit card information, or other personal details in order to commit fraudulent activities. It is a serious crime that can result in financial loss and damage to a person's reputation.
9.
The first step in the transaction processing cycle is___________
Correct Answer
C. 3) data entry
Explanation
The first step in the transaction processing cycle is data entry. This involves capturing and inputting data into a system or database. It is the initial stage where information is collected and recorded for further processing and analysis. Data entry is crucial as it ensures accurate and reliable data for the rest of the transaction processing cycle.
10.
In the information systems concept, the output function involves__________
Correct Answer
A. 1) Capturing and assembling elements that enter the system to be processed
Explanation
The output function in the information systems concept involves capturing and assembling elements that enter the system to be processed. This means that the system takes in input from various sources and organizes them in a way that they can be processed effectively. This step is crucial as it sets the foundation for the subsequent transformation processes and ensures that the input is ready to be converted into output.