TIFKK7Ch17 - Chapter 17 Systems Analysis and Design 17-1...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 17 Systems Analysis and Design 17-1 Chapter 17 True-False If the reliability of a telecommunications network is high, it is possible to use a distributed system for business. T (p. 672) In a client/server model, servers are the users. F (p. 672) With a client/server model, users interact with unlimited parts of the application. F (p. 672) Client/server is a system that accentuates the central database as the center of the work. F (p. 672) Using a graphical user interface, individuals typically interface only with the server part. F (p. 672) A A client-based application” means that the application resides in a client computer but can also be accessed by other users on the network. F (p. 672) The file server stores the data files and application programs for all the clients on the network. T (p. 673) Typically, A back-end @ processing takes place on a client workstation. F (p. 673) Applications for the client/server model must be written as two separate software components. T (p. 674) Local area networks serve users over several miles or across entire continents. F (p. 674) A wide-area network serves individuals only within a single building. F (p. 674) A wireless “hot spot” is a place where the signal fades to such a low level that it causes the computer to lose the connection. F (p. 675) WiMax features a greater wireless access range, a little over 5 miles. F (p. 676)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 17 Successfully Implementing the Information System 17-2 A bus configuration has the advantage that users may easily connect or disconnect devices. T (p. 676) A network decomposition diagram provides an overview of the network system. T (p. 677) A hub connectivity diagram shows the various workstations and how they are to be connected. F (p. 678) Special software that supports people who work together in an organization is called "groupware." T (p. 681) Intranets are networks formed with suppliers and other important partners. F (p.682) One advantage of distributed systems is the increased reliability. F (p. 682) All people who will have secondary or primary use of the system should receive training. T (p. 683) An advantage of off site training is that it allows users to concentrate on learning the new system. T (p. 684) Gradual conversion combines the best features of parallel conversion and distributed conversion. F (p. 687) A contingency approach to deciding on a conversion strategy is a good approach. T (p. 688) Security of computer facilities is part of the conversion process. T (p. 688) Establishing policy is unimportant in achieving security. F (p. 688)
Background image of page 2
Chapter 17 Systems Analysis and Design 17-3 All except small computer equipment should be secured so that a typical user cannot move it. F (p. 688) Passwords and authorization codes are examples of logical security controls. T (p. 689) A firewall constructs a barrier between an internal network and an intranet. F (p. 689) Having the system log the number of unsuccessful sign-on attempts of users is one way of
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 12

TIFKK7Ch17 - Chapter 17 Systems Analysis and Design 17-1...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online