subject

1. In the context of systems development, which of the following most closely matches the definition of a requirement? (A)the guidelines to be met in the design of a system
(B)the expectation of how the system will work
(C)a system that is needed or wanted
(D) a best-case scenario for the final system
2. Which of the following situations demonstrates a weakness of the systems development life cycle (SDLC)?
(A)The information systems department is finding the system difficult to maintain
(B)The manager cannot find documentation on the design process.
(C)The information systems staff cannot be changed because it would affect the development process.
(D)The client decides he or she wants to change the purpose of the project.
3. 3. Which of the following is the worst reason to upgrade the operating system on your company’s computers?
(A)The new operating system has stronger security, so the company will not have to worry about data integrity
(B)The new operating system is faster, so the company can process data in a shorter time period
(C)The new operating system is easier to use, so there will be less training for employees.
(D)The new operating system is able to play modern games, so employees will have some leisure time.
4. 4. Your team has almost completed work on developing a system designed to track inventory at grocery store. The client then sends an e-mail asking if the system can also track employee work hours. This challenge is an example of
(A)time and budget constraints
(B)determining user requirements
(C)requirements creep
(D)technological advances.
5. Which of the following is a disadvantage of outsourcing?
(A)It is harder to communicate with an outside company.
(B)Outsourcing has higher costs
(C)The contracting company may not be able to perform the task.
(D)Outsourcing does not allow businesses to focus on important tasks.
6. Which of the following accurately portrays the correct sequence for the five phases in the Systems Development Life Cycle (SDLC)?
(A)analysis; planning; maintenance; design; implementation
(B)planning; analysis; design; implementation; maintenance
(C)analysis; design; planning; implementation; maintenance
(D)planning; design; analysis; implementation; maintenance
7. Which of the following situations demonstrates a strength of the Systems Development Life Cycle (SDLC)?
(A)The team is able to complete the project quicker than projects using other development methods.
(B)The cost of the project is relatively low.
(C)The client has lots of input on what will be in the final system
(D)The process set up by the team allows for lots of flexibility.
8. 8. During which phase of the Systems Development Life Cycle is the feasibility study conducted?
(A)analysis
(B)design
(C)implementation
(D)planning
9. Which of the following happens during the implementation phase of the Systems Development Life Cycle (SDLC)?
(A)Search for hardware appropriate to the task of the new system.
(B)Convert data to be compatible with the new system.
(C)Create a model for the data to be used in new databases
(D)Identify problems with the new system and provide patches to fix them.
10. After defining the scope of the system, the next step is to...
(A)plan the project
(B)conduct a feasibility study
(C)determine requirements
(D)form the project team.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 00:20
Ihave been given the number of guns per 100, and the total firearm-related deaths per 100,000. i have to find the actual number of guns per country and actual number of gun-related deaths. if somebody could show me how to do 1 question, i can finish the rest, i am just confused. tia
Answers: 3
question
Computers and Technology, 23.06.2019 10:00
Install and use wireshark program ( send back screen shots and other vital information) case project 3-2: decode a tcp segment in a wireshark capture in this chapter, you walked through tcp segment to interpret the data included in its header. in this project, you use wireshark to capture your own http messafes, examine the tcp headers, and practice interpreting the data you'll find there. 1. open wireshark and snap the window to one side of your screen. open a browser and snap that window to the other side of your screen so you can see both windows.
Answers: 2
question
Computers and Technology, 23.06.2019 21:50
Description: write function lastfirst() that takes one argument—a list of strings of the format "lastname, firstname" —and returns a list consisting of two lists: (a) a list of all the last names (b) a list of all the first names
Answers: 2
question
Computers and Technology, 24.06.2019 07:00
Why would a business likely use a java applet - to back up their data files for the business - to create a program that a customer can launch in their web browser - to create music on a powerpoint presentation - to organize files on their company directory
Answers: 3
You know the right answer?
1. In the context of systems development, which of the following most closely matches the definition...
Questions
question
Mathematics, 14.05.2021 04:00
question
Mathematics, 14.05.2021 04:00
question
Mathematics, 14.05.2021 04:00
question
Mathematics, 14.05.2021 04:00
Questions on the website: 13722362