32. In the implantation stage of the SDLC, it is important that the system offer
ID: 383204 • Letter: 3
Question
32. In the implantation stage of the SDLC, it is important that the system offers end users flexibility. For example, they should be able to make changes such as screen colors, mouse sensitivity and keyboard speed adjustments to suit their personal preferences (T/F) 33. When developing and building computer information systems, programmers and analysts use techniques. This technique is a loosely structured method to describe the logic of a program or outline a system. It uses basic programming techniques but ignores issues of syntax and relies on verbal descriptions 34. The fourth stage in the SDLC is the This stage involves the installation and changeover from the previous system to the new one, including training users and making adjustments to the system 35. Runaway projects occur because some projects A. End up two to five times over budget and behind schedule B. Are canceled because they never meet their objectives C. Fail because of design problems and conflicts among users, management, and developers D. All of the above 36. CASE stands for: A. Computer analysis standards enforcement B. Computer aided standards enforcement C. Computer aided software engineering D. Computer aided standards engineering 37. Centralization of software offers organizations advantages over decentralization. For example, if software is standardized there are fewer compatibility problem and it is easy for users to exchange data with coworkers. (T/F) 38. One of the biggest disadvantages of centralized data is that making backup copies of corporate data is difficult. For example, if data files become damaged or lost, it is extremely difficult to restore them (T/F) 39. One of the primary goals of a client server system is that it provides the advantages of centralized 40. There are four basic areas that subject to consideration concerning centralization or decentralization 41. One of the disadvantages of software control of software and data (T/F) hardware, software, data and is that it forces users to work with packages that may not be their personal choice. As well, users may have different requirements that could be made easier with a different software package. 42. MIS staff provide software support by all the following methods except A. Assisting users in selecting the right software and installing t B. Training users on the various software features C. Delivering and setting up computers with appropriate software D. Installing new releases of existing software 43. Many large organizations have a chief information officer. This individual is responsible for: A. Developing long term and strategic information systems plans B. Ensuring that data is stored in a form that can be used by all the applications and users C. Providing data integrity, which means that data must contain as few errors as possible D. Maintaining security controls on the databases 44. There are three major issues involved in computer security: unauthorized disclosure of information, unauthorized modification and unauthorized withholding of information(T/F) 45. The clipper chip, an encryption method created by the U.S. top secret National Security Agency (NSA), uses a secret algorithm to encrypt and decrypt digital messages. Its key feature is the use of two escrow keys assigned to each chip (T/F)Explanation / Answer
Answer 32 - True
Flexibility in the SDLC is useful for the user, as user can make the changes as required by the user. This will help the user to use the software and sytem with respect to their needs. These are the operational flexibilities generally demanded by the user and are useful for user with respect to their speed of working.
Answer33 - Basic Programming Technique
This is the techniue generally uses by the programmer and the analysts. This is a basic technique in programing and eveloping computers.
Answer 34 - Implementation Stage
This stage in SDLC involves installation and change over from current system to the new system.
Answer 35 - All of the above
A runaway project could be because of all of the above reason mentioned in the question. A runaway project needs to be manage urgently as it going to result in major losses in terms of time, money and resources.
Answer 36 : CASE : Computer Aided Software Engineering
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.