1.
A company using a service provider is engaged in a(n):
Correct Answer
C. Outsourcing arrangement
Explanation
When a company uses a service provider, it means that they are outsourcing certain tasks or functions to an external entity. This arrangement allows the company to delegate specific responsibilities to the service provider, who specializes in that area, rather than handling it in-house. This can include various services such as IT support, customer service, or manufacturing. By outsourcing, the company can focus on its core competencies while benefiting from the expertise and resources of the service provider. Therefore, the correct answer for this question is an outsourcing arrangement.
2.
Which is a compelling reason to pursue in-house software development?
Correct Answer
A. Enact a number of distinctive security requirements
Explanation
Enacting a number of distinctive security requirements can be a compelling reason to pursue in-house software development because it allows the organization to have full control over the security measures implemented in the software. By developing the software in-house, the organization can tailor the security requirements to their specific needs and ensure that sensitive data and systems are adequately protected. This level of control may not be achievable with vendor-provided software, as it may not meet all the unique security requirements of the organization.
3.
Which document is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase and contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management.
Correct Answer
C. Software requirements specification
Explanation
The software requirements specification is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase. It contains the prerequisites for the new system, describes the alternatives that were considered, and makes a specific recommendation to management. This document outlines the requirements and expectations for the software to be developed, serving as a guide for the development team and a reference for stakeholders to ensure that the final system meets the desired goals and objectives.
4.
Which of the following is an example of a horizontal application?
Correct Answer
D. Microsoft Excel
Explanation
Microsoft Excel is an example of a horizontal application because it is a widely used spreadsheet program that can be used by individuals and businesses across various industries and functions. It is not specific to any particular industry or vertical market, making it a versatile tool that can be used for a wide range of purposes such as data analysis, financial modeling, and project management.
5.
Where does the "make or buy" decision fall in the SDLC?
Correct Answer
B. After analysis
Explanation
The "make or buy" decision in the SDLC falls after the analysis phase. Once the analysis of the requirements and needs of the project has been completed, the decision is made whether to develop the solution in-house (make) or purchase it from an external vendor (buy). This decision is based on factors such as cost, time, resources, expertise, and the specific requirements of the project.
6.
A useful managerial report generating only those records that meet specific conditions...
Correct Answer
C. Exception report
Explanation
An exception report is a useful managerial report that generates only those records that meet specific conditions. It focuses on highlighting any exceptions or deviations from normal or expected results. This type of report helps managers quickly identify and address any issues or areas that require attention or further investigation. Unlike routine reports that provide regular updates on standard operations or ad-hoc reports that are generated on an as-needed basis, an exception report specifically targets and presents data that falls outside predefined parameters.
7.
A report showing the total figures of the sales without much of the supporting details is a(n):
Correct Answer
D. Summary report
Explanation
A summary report is a type of report that presents the total figures of sales without providing extensive supporting details. It provides a concise overview of the sales data, highlighting the key numbers and trends. Unlike other types of reports, such as routine reports or ad-hoc reports, a summary report focuses on summarizing the information rather than providing in-depth analysis or specific details. It is useful for quickly understanding the overall sales performance without getting into the nitty-gritty of the data.
8.
"Build a system that is effective, reliable, and maintainable." best aligns with...
Correct Answer
A. Systems design
Explanation
The statement "Build a system that is effective, reliable, and maintainable" best aligns with systems design. Systems design involves creating a plan and blueprint for a system that meets specific requirements, including effectiveness, reliability, and maintainability. It focuses on determining the overall structure, components, and functionality of the system to ensure it can fulfill its intended purpose.
9.
The result of normalization is that every ________ key attribute depends upon the whole primary key.
Correct Answer
C. Non-primary
Explanation
Normalization is a process used in database design to eliminate redundancy and ensure data integrity. When a database is normalized, every non-primary key attribute depends upon the whole primary key. This means that the values of the non-primary key attributes are uniquely determined by the values of the primary key. In other words, the primary key is the key attribute that uniquely identifies each record in a table, while the non-primary key attributes are dependent on the primary key for their values. Therefore, the correct answer is "non-primary".
10.
A(n) ________ is a coding scheme recognized by system software for representing organizational data.
Correct Answer
C. Data type
Explanation
A data type is a coding scheme recognized by system software for representing organizational data. It defines the type of data that can be stored in a variable or field, such as integers, strings, or booleans. By specifying the data type, the system software can allocate the appropriate amount of memory and perform operations on the data efficiently. Therefore, a data type is essential for organizing and manipulating data in a computer system.
11.
The process of splitting or combining normalized relations into physical tables based on affinity of use of rows and fields.
For example, when a customer views their account it uses a query that combines several tables to return their account information and all the products that were sold to them. Rather than joining all these tables for every query, we add a customer_ID attribute directly to the products_sold table.
Correct Answer
D. De-normalization
Explanation
De-normalization is the process of combining normalized relations into physical tables based on the affinity of use of rows and fields. In the given example, instead of joining multiple tables every time a customer views their account, de-normalization is applied by adding a customer_ID attribute directly to the products_sold table. This denormalized design improves query performance by reducing the need for joins and simplifying data retrieval.
12.
A(n) ________ is a file organization in which rows are stored either sequentially or non-sequentially, and an index is created that allows software to locate individual rows.
Correct Answer
A. Indexed file organization
Explanation
In an indexed file organization, rows are stored either sequentially or non-sequentially, and an index is created to allow software to locate individual rows. This means that the data can be accessed efficiently, as the index provides a quick way to locate the desired row without having to search through the entire file. This type of file organization is useful when there is a need for fast and direct access to specific rows in the file.
13.
____ involves more risk than other changeover methods.
Correct Answer
B. Direct cutover
Explanation
Direct cutover involves more risk than other changeover methods because it involves immediately switching from the old system to the new system without any overlap or testing period. This means that if any issues or problems arise with the new system, there is no fallback option and the organization may experience downtime or disruptions. In contrast, other changeover methods such as parallel cutover, pilot operation, or phased operation allow for a gradual transition, allowing for testing, training, and troubleshooting before fully implementing the new system.
14.
The environment for the actual system operation is called the _____ environment.
Correct Answer
C. Production
Explanation
The term "production" refers to the environment in which the actual system operates. This environment is where the system is deployed and used by end-users in real-world scenarios. It is the stage where the system is fully developed, tested, and ready for implementation. The production environment is different from the development or testing environments, as it is the live environment where the system performs its intended functions and serves its purpose.
15.
When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to _____ and must strictly be controlled.
Correct Answer
D. Users
Explanation
When there are no system problems to be corrected or authorized enhancements to be made, access to the operational environment is limited to users and must strictly be controlled. This means that only individuals who require access for their day-to-day tasks should be allowed into the operational environment. This helps to ensure the security and stability of the system by minimizing the number of people who have access to it. Managers, programmers, and systems analysts may have access during times when there are problems or enhancements to be made, but in the absence of such situations, their access should be restricted.
16.
Which of the following is specified by the detailed procedures in a test plan?
Correct Answer
C. The test data to be used
Explanation
The detailed procedures in a test plan specify the test data to be used. This includes the specific inputs and expected outputs that will be used to test the functionality of the system. The test data is carefully chosen to cover different scenarios and edge cases to ensure that the system is thoroughly tested. By specifying the test data in the test plan, it helps ensure consistency and repeatability of the tests across different testing environments and testers.