DOC PREVIEW
TAMU ISYS 210 - Exam 3 Study Guide

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

ISYS 210 Exam # 3 Study Guide Exam Bank from Book1. ______ is focused on how a computer system does what it does: OOD2. _______ often called ________ categorize data requirements and create the database entities and models that ensure accurate and smooth flowing information throughout a business: Data modelers, Database Administrators(DBAs)3. ________ are a kind of relational illustration that shows how computer processes relate and interact with each other and in what order: sequence diagrams4. ________ is a computer system development methodology which takes a minimalist approach: Rapid Application Development (RAD)5. ________ is a methodology that can be used during software development by creating software prototypes: Software prototyping6. ________ that are used to find specific populations of a database: Query files7. _________ is a standardized visual modeling language for developing computer software: Unified Modeling Language (UML)8. _________ is the process of creating or altering systems that takes a strict step by step approach to every phase of development: System Development Lifecycle (SDLC)9. __________ are in charge of software application development teams that develop, design, program, and test software applications: Head applications developers10. __________ is an open-srouce business software suite that has a word processor like Microsoft Word: Apache OpenOffice11. __________ is the most widely used standard computer language for relational databases that allows a programmer to manipulate and query data: Structured Query Language (SQL) 12. __________ is when a cloud provider supplies a computer platform: Platform as a service (PaaS)13. __________ of data and information residing a DBMS can be performed by implementing procedures to safely add, delete or update records as well as back up entire networked database systems: Maintenance14. __________ software is a business-wide computer system used to administer and organize all the computer resources and information for functional departments of a business from shared data store, or database residing on a local area network: Enterprise resource planning (ERP)15. ___________ design part of applications like screen interfaces, middleware, and programming infrastructure that complies with head applications developer's design principles as well as falls into line with their SDLC: Applications architects16. ___________ prepare, plan, and implement web-based software applications. These applications include everything from shopping carts for online stores to advanced intranet deployment.: Senior web developers17. ____________ are an explanation of a computer system's behavior as it receives and responds to requests that start off from outside of that system: use case scenarios18. ____________ are directly responsible for the smooth operations and maintenance of the business' networks and networking technology which includes its hardware and software: Network Administrators19. ____________ auditors sometimes called Senior IT auditors make sure computing systems are being used correctly in specific industries within given set of regulations and compliance issues: Information Technology20. ____________ is a job title for the board level head of an information technology department within a business organization: Chief Information Officer (CIO)21. _____________ also use software development tools and techniques like SDLC and UML: Head applications developers22. _____________ make sense out of an organizations data and information, as well as external data and information to present to senior staff for the purpose of making tactical and strategic decisions: Business Intelligence Analysts23. ______________ requires the computer programmer to start analyzing what a new system will need and applies object modeling techniques to analyze the functional requirements for a system: Object Oriented Analysis (OOA)24. _______________ attempt to avoid data input errors like typing errors: Data integrity techniques25. _______________ must have great communication skills as they are the conduit between IT and the rest of the organization: Information Technology Staff Consultants26. _______________ takes the OOA diagrams and information and expands it to make implementation specifications.: Object Oriented Design (OOD)27. ________________ is the computer programming and software that connect the components an application architect designs and programming infrastructure are the actual programming language components that help and application work correctly and as designed: Middleware28. "______________" refers to the added value of a product of service over the cost of products and services used to produce it from the previous stage of production: value added29. Although information technology staff consultants are highly trained with technology backgrounds, they must be able to ______ between IT departments and perhaps a marketing department: bridge the gap30. although many businesses have IT departments, they remain ______ of the core business functional behaviors: outside31. At its core a database is made up of files called _______ that are related to each other: tables32. Avoiding data redundancy ensures accuracy system wide throughout a DBMS which can _____________: reduce reconciliation errors immensely33. Because of economies of scale, _____ can provide storage much more cost effectively that a business can itself: CSPs34. Because of the nature of a spreadsheet, only _____ accountant can use it at a time: one35. A better way to back-up your internal hard drive is to _________: an off-site hard drive that you connect to through the internet 36. Big four accounting firms like KPMG often hire and pay IT auditors very well to help their clients and their computing systems become ________ compliant: Sarbanes- Oxley37. Business databases are always distributed on a ____________: computer network for multiple users38. a common axiom for IT professional is "______________": know the business39. Companies like GoDaddy.com have offered off-site file storage for years, but they called them __________: iDrives ( short for internet drive)40. Compared to other methodologies, SDLC is more __________ which translates into a more expensive computer system: time consuming41. Database designers construct databases by using _________ which is a database-modeling method to construct a theoretical and conceptual representation of data to produce a


View Full Document

TAMU ISYS 210 - Exam 3 Study Guide

Documents in this Course
Load more
Download Exam 3 Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam 3 Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam 3 Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?