<p>HW10</p><p>Student: ______</p><p>1. Which kind of testing runs the system in a simulated environment using simulated data? </p><p>A. validation testing B. verification testing C. audit testing D. matrix testing E. litmus testing</p><p>2. Which kind of validation testing might lead to rescheduling some processing to other parts of the day? </p><p>A. systems performance B. peak workload processing C. human engineering D. methods and procedures E. backup and recovery</p><p>3. Which of the following is NOT a support activity? </p><p>A. technical support B. user training C. program maintenance D. system recovery E. system enhancement</p><p>4. Which kind of validation testing makes sure the system is easy to use? </p><p>A. systems performance B. peak workload processing C. human engineering D. methods and procedures E. backup and recovery</p><p>5. Which installation strategy is the most costly if there are no major problems with the new system? </p><p>A. abrupt cut-over B. parallel conversion C. location conversion D. staged conversion E. there is no difference in the cost</p><p>6. Which of the following terms means to modify or expand the application system in response to constantly changing requirements? </p><p>A. system requirements B. system modifications C. system changes D. system maintenance E. system enhancement</p><p>7. System enhancement can be done in response to all of the following events EXCEPT: </p><p>A. new business requirements B. new business problems C. new design requirements D. new technology requirements E. new recovery requirements</p><p>8. When after a system crash, partially completed transactions must be undone, it is called a: </p><p>A. roll back B. roll forward C. ABEND D. version control E. none of these</p><p>9. Which kind of validation testing involves simulating a data loss disaster? </p><p>A. systems performance B. peak workload processing C. human engineering D. methods and procedures E. backup and recovery</p><p>10. Where are system models and specifications stored? </p><p>A. repository B. program library C. business data D. model store E. system library</p><p>11. Which of the following is NOT a task of the Systems Construction phase? </p><p>A. build and test databases B. build and test networks C. conduct system test D. install and test new software packages E. write and test new programs</p><p>12. Which of the following extrapolates the impact of the changes on program and application throughput and response time from the before and after results using the test data? </p><p>A. unit testing B. system testing C. regression testing D. alpha testing E. beta testing</p><p>13. Which kind of testing runs the system in a live environment using real data? </p><p>A. validation testing B. verification testing C. audit testing D. matrix testing E. litmus testing</p><p>14. The on-going maintenance of a system(s) after it has been placed into operation, including program maintenance and system improvements is called: </p><p>A. systems planning B. systems analysis C. systems support D. systems design E. systems implementation</p><p>15. A system acceptance test addresses which level(s) of acceptance testing? </p><p>A. validation testing B. verification testing C. audit testing D. unit testing E. a, b, and c</p><p>16. A test of the programming to implement an entire use case would be a(n): </p><p>A. systems test B. stub test C. unit test D. systems performance test E. sub test</p><p>17. Which of the following ensures that the stand-alone program not only fixes the bug, but does so without side effects? </p><p>A. unit testing B. system testing C. regression testing D. alpha testing E. beta testing</p><p>18. Which installation strategy is the riskiest? </p><p>A. abrupt cut-over B. parallel conversion C. location conversion D. staged conversion E. there is no difference in the risk</p><p>19. Which of the following is NOT a reason why understanding applications can be slow? </p><p>A. poor modular structure B. inadequate testing C. prior maintenance (quick fixes and poorly designed extensions) D. dead code E. poor or inadequate documentation</p><p>20. When after a system crash, transactions must be recovered that occurred between the last backup and the database's recovery, it is called a: </p><p>A. roll back B. roll forward C. ABEND D. version control E. none of these</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages5 Page
-
File Size-