CPT 264 Test 3 questions and
answers(verified for accuracy)
The _____ of a project is the total value of the benefits minus the total
value of the costs, with both costs and benefits adjusted to reflect the
point in time at which they occur. - answer net present value (NPV)
When companies use a _____, they already know the specific products or
service they want and need to obtain price estimates or bids from
vendors. - answer request for quotation (RFQ)
If a software package is purchased, consider a _____, which offers
additional support and assistance from the vendor. - answer supplemental
maintenance agreement
In a(n) _____, the web becomes an integral part of the application, rather
than just a communication channel, and systems analysts need new
application development tools and solutions to handle the new systems. -
answer Internet-based system
In addition to configuring software, the IT staff can create a _____, which
includes screens, commands, controls, and features that enable users to
interact more effectively with the application. - answer user interface
The main reason for offshore outsourcing is to _____. - answer lower
bottom-line costs
A _____ collects input data and provides a record of the original
transaction. - answer source document
A _____ improves input quality by testing the data and rejecting any entry
that fails to meet specified conditions. - answer data validation rule
, A(n) _____ is a data validation rule that is used to verify that data items fall
between a specified minimum and maximum value. - answer range check
A _____ is a data validation rule that identifies values that are
questionable, but not necessarily wrong. - answer reasonableness check
A _____ usually causes specific actions, such as printing subtotals for a
group of records in a report. - answer control break
A common method of cardinality notation is called _____ because of the
shapes, which include circles, bars, and symbols that indicate various
possibilities. - answer crow's foot notation
One type of validity check, called _____, is a set of rules that avoids data
inconsistency and quality problems. - answer referential integrity
Any field that is not a primary key or a candidate key is called a _____. -
answer nonkey field
In an entity-relationship diagram, entities are commonly represented as
_____. - answer rectangles
_____ is the process of creating table designs by assigning specific fields or
attributes to each table in a database. - answer Normalization
The data mining technique that relies on association rule learning is often
called _____. - answer market basket analysis
The system design specification is a document that presents the complete
design for a new information system, along with _____ for completing the
next SDLC phase — systems implementation. - answer detailed costs
A _____ follows Internet design protocols and enables a company to
integrate new applications into its e-commerce strategy. - answer web-
centric architecture
answers(verified for accuracy)
The _____ of a project is the total value of the benefits minus the total
value of the costs, with both costs and benefits adjusted to reflect the
point in time at which they occur. - answer net present value (NPV)
When companies use a _____, they already know the specific products or
service they want and need to obtain price estimates or bids from
vendors. - answer request for quotation (RFQ)
If a software package is purchased, consider a _____, which offers
additional support and assistance from the vendor. - answer supplemental
maintenance agreement
In a(n) _____, the web becomes an integral part of the application, rather
than just a communication channel, and systems analysts need new
application development tools and solutions to handle the new systems. -
answer Internet-based system
In addition to configuring software, the IT staff can create a _____, which
includes screens, commands, controls, and features that enable users to
interact more effectively with the application. - answer user interface
The main reason for offshore outsourcing is to _____. - answer lower
bottom-line costs
A _____ collects input data and provides a record of the original
transaction. - answer source document
A _____ improves input quality by testing the data and rejecting any entry
that fails to meet specified conditions. - answer data validation rule
, A(n) _____ is a data validation rule that is used to verify that data items fall
between a specified minimum and maximum value. - answer range check
A _____ is a data validation rule that identifies values that are
questionable, but not necessarily wrong. - answer reasonableness check
A _____ usually causes specific actions, such as printing subtotals for a
group of records in a report. - answer control break
A common method of cardinality notation is called _____ because of the
shapes, which include circles, bars, and symbols that indicate various
possibilities. - answer crow's foot notation
One type of validity check, called _____, is a set of rules that avoids data
inconsistency and quality problems. - answer referential integrity
Any field that is not a primary key or a candidate key is called a _____. -
answer nonkey field
In an entity-relationship diagram, entities are commonly represented as
_____. - answer rectangles
_____ is the process of creating table designs by assigning specific fields or
attributes to each table in a database. - answer Normalization
The data mining technique that relies on association rule learning is often
called _____. - answer market basket analysis
The system design specification is a document that presents the complete
design for a new information system, along with _____ for completing the
next SDLC phase — systems implementation. - answer detailed costs
A _____ follows Internet design protocols and enables a company to
integrate new applications into its e-commerce strategy. - answer web-
centric architecture