Home » Cis 210 final exam 40/40 correct answers

Cis 210 final exam 40/40 correct answers

CIS 210 Final Exam 40/40 Correct Answers

 

 

• Question 1

Application ____ is the process of constructing the programs and code modules that serves as the building blocks of an information system.
Answer

• Question 2

Integration testing is sometimes known as ____ testing.
Answer

• Question 3

A class diagram includes the class ____, which represent the program logic.
Answer

• Question 4

In a structure chart, a(n) ____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invoked.
Answer

• Question 5

In a technique called ____ testing, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully.
Answer

• Question 6

Many organizations require a more formal type of desk checking called a structured walkthrough, or ____ review.
Answer

• Question 7

When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.
Answer

• Question 8

Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology.
Answer

• Question 9

Buyers can customize a software package by ____.
Answer

• Question 10

The choice between developing versus purchasing software often is called a ____ decision.
Answer

• Question 11

A software ____ is software that is obtained from a vendor or application service provider.
Answer

• Question 12

A firm that enhances a commercial software package by adding custom features and configuring it for a particular industry is called a(n) ____.
Answer

• Question 13

Although the vast majority of reports are designed graphically, some systems still produce one or more ____ reports that use a character set with fixed spacing.
Answer

• Question 14

Input ____ are templates that make it easier for users to enter data.
Answer

• Question 15

In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system.
Answer

• Question 16

Good interface design is based partly on ____, which provides the operational structure required to carry out the design objectives.
Answer

• Question 17

Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.
Answer

• Question 18

Interface designers can obtain data, called ____ metrics, by using software that can record and measure user interaction with a system.
Answer

• Question 19

A key physical design element is the ____, which describes how users interact with a computer system.
Answer

• Question 20

____ is a process for controlling changes in system requirements during software development.
Answer

• Question 21

____ means examining the whole in order to learn about the individual elements.
Answer

• Question 22

When setting priorities, many IT managers believe that evaluating all projects together leads to the best possible decisions because ____.
Answer

• Question 23

Perfective maintenance usually is cost effective ____ the system’s operational life.
Answer

• Question 24

Corrective maintenance ____.
Answer

• Question 25

____ expenses vary significantly during a system’s operational life and include spending to support maintenance activities.
Answer

• Question 26

If significant changes take place in an existing system or if a new version is released, the IT department might develop a ____.
Answer

• Question 27

In all cases, a network must use a ____, which is a set of standards that govern network data transmission.
Answer

• Question 28

A popular network protocol is ____, which today is the backbone of the Internet.
Answer

• Question 29

A ____ resembles a circle of computers that communicate with each other.
Answer

• Question 30

A(n) ____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.
Answer

• Question 31

In the OSI (Open System Interconnection) model, the session layer ____.
Answer

• Question 32

In a(n) ____ design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen.
Answer

• Question 33

In a client/server design, a database server ____.
Answer

• Question 34

Any field that is not a primary key or a candidate key is called a ____ key.
Answer

• Question 35

A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.
Answer

• Question 36

A(n) ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database.
Answer

• Question 37

JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.
Answer

• Question 38

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.
Answer

• Question 39

A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.
Answer

• Question 40

In a file-oriented information system, a security file ____.
Answer

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more