Wednesday, 14 August 2013

Computer Basic GK

In the binary numbering system, the number 256 associated with computer functions and applications working
behind the scenes represents the: C
O processor speed.
O data transfer rate measured in bits per second.
O number of possible combinations that can be created with eight bits being in either the state of on or off.
O maximum allowable combinations represented by eight bytes being in either an on or off state.
One byte represents: C
O a word.
O eight characters.
O eight bits.
O a single digit with two possible states.
Today the main use for a parallel port is to: D
O send and receive data in a serial fashion.
O facilitate communication between peripherals that are more than a dozen feet or so away.
O connect an infrared mouse to your computer.
O connect a printer to your system unit.
The pathway connecting internal components of the microprocessor is called the: A
O data bus.
O instruction set.
O port.
O system clock.
Which kind of memory contains instructions that have been prerecorded and will not be erased when you turn
off the computer power? C
O DRAM
O Primary cache
O ROM
O RAM
Cache memory: A
O stores frequently accessed program instructions and data.
O occupies several megabytes of storage.
O is slower than ROM.
O is less expensive than RAM.
During the ____B________ basic operation, the control unit determines what the program is telling the
computer to do.
O arithmetic
O decode
O execute
O fetch
The pulses generated by the system clock: A
O synchronize the computer’s internal activities.
O are measured in thousands of cycles per second (KHz).
O are referred to as the word size.
O transmit data to your printer.
To free up space on your desktop, choose a computer that has a small: B
O instruction set.
O footprint.
O word size.
O chipset.
The type of memory that is synchronized to the pulses of the computer’s system clock is: D
O DRAM.
O unicode.
O ROM.
O SDRAM.
CISC: D
O includes special-purpose circuits that consume low levels of power.
O stands for complex internal set computer.
O is the technology used on reduced instruction set computers.
O is becoming more like RISC processor architecture.
Which of the following is a factor that probably would NOT affect a microprocessor’s performance? D
O Clock speed
O Chip architecture
O Data bus width
O Footprint
________A____ occurs when the processor executes an instruction but then decides to store it because it
expects the instruction to be useful.
O Speculative execution
O Parallel processing
O Branch prediction
O Data dependency
A test that measures for comparison purposes the performance of hardware devices is called a(n): B
O execution test.
O benchmark.
O pipeline.
O instruction cycle.
Of the following choices, the largest measurement of storage is a: D
O gigabyte.
O kilobyte.
O megabyte.
O terabyte.
DİKKATTTTT A program written for one type of processor might not be compatible with another processor
type.A
O True
O False
Computer designers use the read-only memory to enable super-fast computers to function at maximum speed. B
O True
O False
SCSI is a type of processor. B
O True
O False
Random access memory is an example of volatile memory. A
O True
O False
ASCII character code uses 16 bits to represent characters. B
O True
O False
Match each computer term with the correct definition.
CHAPTER. 5
Which standard keyboard shortcut is used to cut a block of text from a document and place it in the clipboard? B
O Ctrl + C
O Ctrl + X
O Ctrl + V
O Backspace
Which of the following pointing devices is NOT usually associated with the notebook computer? B
O Pointing stick
O Joystick
O TouCHAPTERad
O Trackball
Which type of input device is used to copy contents of a piece of paper to a file, including both its text and
graphics? C
O Bar code reader
O Web cam
O Scanner
O Plotter
Which feature on a monitor display system determines the clarity or sharpness of the output? B
O Number of cathode ray tubes
O Resolution
O Screen size
O Refresh rate
For which of the following reasons might you purchase an inkjet printer for your home computer? C
O It has low per-page costs since ink is relatively inexpensive.
O It can print more volume in the same amount of time than a laser printer.
O It is an affordable printer with the ability to print colored text or images.
O It can produce the best quality color output of all printer types designed for personal computers.
Which of the following is NOT a reason why storage is necessary on a computer system? D
O Storage devices provide backup services.
O Storage devices are nonvolatile.
O Storage devices are cheaper than RAM.
O Access time to the data is faster with storage devices than with memory.
Which of the following storage devices use sequential storage such that files must be accessed in sequence from
beginning to end? C
O Floppy disk
O Hard disk
O Tape cassette
O Compact disc (CD)
Which of the following is an example of an optical storage device? C
O Tape cassette
O Floppy disk
O Compact disc (CD)
O Hard disk
What is the best definition of offline storage? A
O It is storage not readily available to the computer system, often located in a separate facility.
O It consists of hard copy printouts of documents used as backups in case the files are destroyed.
O It is storage immediately available to the computer system, such as a hard disk.
O It is storage that is not directly available to the computer system but can be used quickly through
intervention on part of the user, such as a floppy disk.
Assume a disk sector uses 512 bytes and there are 2 sectors per cluster. What is the minimal number of clusters
needed to store a file of 2000 bytes? C
O 2000
O 4
O 2
O 1
Which of the following best matches the storage capacity of a typical floppy disk? A
O 1.4 MB
O 10 MB
O 600 MB
O 1 GB
Which of the following correctly describes the CD-R disc? D
O You may record data to the disc surface multiple times but have no direct reading capability.
O You may read data from the disc but may not alter its contents.
O You may record data to the disc surface multiple times and can read the current contents at any time.
O You may record data to the disc surface once and then may only read its contents.
PC cards, flash memory cards, and smart cards are all examples of: D
O volatile memory chips.
O removable hard disks.
O digital video discs.
O solid state storage devices.
The concentric rings that are magnetically laid on a disk surface are called: B
O partitions.
O tracks.
O sectors.
O clusters.
The table of information created on each disk to record the contents of its clusters is called the: A
O File Allocation Table (FAT).
O partition.
O boot sector.
O folder.
The Ctrl key is called a modifier key because it is typically used in conjunction with another key, such as Ctrl +
X. A
O True
O False
Input devices collectively referred to as pointing devices enable you to select menu items without making use of
the keyboard. B
O True
O False
A file with extension .WAV is most likely a graphics file that will display an image when opened. B
O True
O False
An optical mark reader (OMR) is a scanning device used to read the marks left by a #2 pencil on specialized
forms. A
O True
O False
A monitor with a larger screen size will always display clearer images than one with a smaller screen. B
O True
O False
A thermal transfer printer is characterized by its ability to produce high quality color printouts A
O True
O False
A multifunction device is one that combines two devices, such as a fax machine with a printer. A
O True
O False
Memory chips have faster access times than storage devices. A
O True
O False
A random access storage device, such as a magnetic tape, can go directly to the requested file without
examining previous files on its surface. B
O True
O False
A CD-ROM is an example of an optical storage device because the user can read its contents but cannot write to
the disc surface. B
O True
O False
CHAPTER. 6
Which of the following is not considered a network communications device?
O Data bus
O Modem
O Router
O Network interface card (NIC)
A(n) ____________ signal is composed of on/off pulses used to transmit data within a computer system.
O twisted pair
O synchronous
O digital
O analog
Which type of physical media uses thin strands of glass that transmit signals as pulses of light?
O T1 line
O Twisted pair wire
O Fiber optic cable
O Coaxial cable
A communication channel’s bandwidth is often measured in units of:
O characters per minute.
O bits per second.
O feet per second.
O kilobytes.
Which type of transmission sends data in a stream, one bit at a time, making use of control bits to signal the
arrival and completion of the data packet?
O Sequenced
O Baud
O Synchronous
O Asynchronous
If a computer with a 9600 bps modem communicates with a computer using a 14,400 bps modem, data will be
transferred:
O at the 14,400 bps rate.
O at the 12,000 bps rate halfway between the two.
O at the 9600 bps rate.
O sometimes at the 9600 bps rate and other times at the 14,400 bps rate.
Which of the following is not considered an advantage of networking?
O Centralized data storage and management
O Reduced hardware costs due to sharing of peripherals
O Connecting people via e-mail and groupware applications
O Faster workstation boot up and software application load times
Which is the best definition of network protocols?
O They refer to online documentation and manuals distributed with a network operating system.
O They are electrical specifications determining the behavior of network interface cards.
O They refer to the packet forwarding strategies employed by routers in the network.
O They are formalized and standardized rules on how various dissimilar network components
communicate and transfer information.
A ____________ uses long-distance transmission media to link computers separated by distance.
O circuit switching network
O Wi-Fi
O WAN
O LAN
Which type of network topology is characterized by a circular wiring of nodes through which a token is passed
to control transmission rights?
O Hub
O Star
O Ring
O Bus
Which of the following events is a source of collisions on a LAN?
O The network operating system is old and needs to be upgraded to the most recent release.
O Multiple workstations attempt to transmit a signal at the exact same time.
O Two users on the network both request copies of an application software program, such as a word
processor, and there is only one copy available on the file server.
O One computer on a network using a bus topology fails, causing all others in series to the terminator to
fail also.
A high-speed transmission line that carries WAN traffic is called a(n):
O backbone.
O point-of-sale (POS) terminal.
O X.25 line.
O Point of Presence (POP).
Two popular LAN technologies that specify functions at the lower layers of the protocol stack are LocalTalk
and:
O Ethernet.
O packet switching.
O coaxial cable.
O Windows NT Server.
The control bit used to mark the beginning of a data packet in asynchronous transmission is called the:
O parity bit.
O start bit.
O negotiation bit.
O handshake bit.
The modulation protocol, called ____________, governs modem transmission rates, data compression
techniques, and error handling.
O V.90
O 10Base-T
O DSL
O SONET
The Internet is an example of a circuit switching network.
O True
O False
One advantage of a bus network topology over a star topology is its ease in connecting new users amidst
existing workstations.
O True
O False
A ring topology makes use of a token in its contention management strategy.
O True
O False
It is possible in a given LAN for some workstations to utilize coaxial cable and others to use fiber optic.
O True
O False
Two modems can exchange data only if they first negotiate to use the same transmission protocols, including
transmission speed and error detection strategy.
O True
O False
Match the following LAN components to their definitions:
Using the pull-down menus, match each item in the left column to the corresponding item in the right column.
A user’s computer attached to the network
Central computer that holds common application software and data
Interface between the workstation and the network
An operating system that manages the network
A peripheral device, such as a printer, attached to the network
21.1 File server A B C D E
21.2 Network interface card (NIC) A B C D E
21.3 Node A B C D E
21.4 Network operating system (NOS) A B C D E
21.5 Workstation A B C D E
CHAPTER 7.
Which of the following is NOT true about ARPANET, the forerunner of the Internet? D
O ARPANET was developed originally under the guidance of the U.S. Department of Defense.
O ARPANET connected a number of both university and government computers.
O ARPANET was a packet switching network.
O ARPANET was the first national network that carried commercial traffic.
Which of the following best describes the difference between the Internet and the WWW? A
O The Internet is the physical network of global computers, and the WWW is many hypertext documents
distributed globally over many computers.
O The Internet carries traffic for schools, government offices, and other public organizations, while the
WWW carries commercial traffic.
O The Internet is the collection of computers, and the WWW is the wiring and transmission protocols that
connect them.
O The Internet consists of software programs such as e-mail and IRC, while the WWW is a collection of
Web pages.
What is the best definition of hypertext? C
O Hypertext is text formatted with HTML tags to control the color or size.
O Hypertext is a file stored in binary format on an FTP server.
O Hypertext is text and other multimedia data in which the user can control the viewing sequence.
O Hypertext is any document that includes nontextual elements, such as sound or image.
Which client software runs on a user’s local computer and is used to request and display Web pages? C
O HTML
O FTP
O Web browser
O Web server
Which portion of the URL below records the directory or folder of the desired resource? B
http://www.somestore.com/firstfloor/shoes.htm
O http
O firstfloor
O shoes.htm
O www.somestore.com
One key to the success of the Internet is its interoperability. What is meant by this term? D
O All Web servers use the same operating systems and application software.
O All Web pages use the same set of HTML tags.
O TCP/IP protocols can be purchased in both Windows and Mac versions.
O Computers on the Internet can transmit messages even if they have different hardware and operating
systems.
What is the purpose of a top-level domain name? A
O It describes a type of organization or geographical location.
O It is an English name associated with the numeric IP address.
O It describes the protocol used to transmit pages from the Web site.
O It denotes whether the server is a Web server, FTP server, or mail server.
Assume you have recently purchased an exotic breed of cat. Which type of Internet service might you use if you
would like to get some advice in real-time from other pet owners across the world? B
O Instant messaging
O Internet Relay Chat
O E-mail
O Mailing lists
What is the shape of the mouse as it moves over a hyperlink on a Web page? D
O I-Beam
O Arrowhead
O Hourglass
O Hand
What is the role of an Internet Service Provider (ISP)? B
O It is software that allows your home computer to connect to the Internet.
O It is a company which sells Internet connection time.
O It is the standard protocol used on the Internet for the transmission of packets.
O It is a company which designs Web sites for individuals or businesses.
Which of the following is NOT a network client program typically offered in a software suite such as Microsoft
Internet Explorer or Netscape Communicator. C CEVABI BELİRSİZZ!!!
O E-mail
O Internet telephony
O Pop-up control
O Web browser
Which of the following statements best describes the type of Web pages found with the following search
condition? A
+whale –“fin whale”
O Pages that discuss whales other than fin whales
O All pages related to whales
O All pages that discuss fins or discuss whales
O Pages that discuss fin whales
Which search condition would produce the most similar result to the one seen below?
+circus +tiger A
O circus AND tiger
O circus NOT tiger
O “circus tiger”
O circus OR tiger
Which of the following is NOT one of the questions you should ask yourself concerning the authenticity of
comments made on a Web page? B
O Is the author affiliated with a recognized organization or company?
O Is the author someone whose name you recognize?
O Does the author include a bibliography of citations?
O Does the author use correct grammar and spelling?
Assume you have downloaded a file named catalog.zip from an FTP site. What should you do with the file to
view its contents? D
O Open the file in your Web browser
O Execute the file by entering its name in the Windows Run box or at the operating system’s command
prompt
O Open the file in your word processor
O Decompress the file using a product like WinZip
If a URL does NOT specify a resource name, the existing home page of the Web site is displayed. A
O True
O False
A Web page wriBtten in HTML cannot be viewed in a text editor since it contains formatting such as font style
or color. B
O True
O False
If you have a Mac computer at home, it will ONLY be able to access Web pages from a Mac-based Web server.
B
O True
O False
111.456.23.789.45.67 is an example of an IP address. B
O True
O False
If you wish to give an English-like name to your Web server, you must first register the name. A
O True
O False

Computer GK

A printer is an example of computer: B
O input device.
O hardware.
O software.
O programs.
A modem is necessary if you want to: D
O have voice mail added to your regular telephone service.
O display digital camera photographs on your computer screen.
O add a scanner to your computer system.
O connect to the Internet over analog phone lines.
Input, processing, output, and storage are collectively referred to as: C
O communications.
O the system unit.
O the information processing cycle.
O the systems cycle.
Storage devices are included in: B
O the central processing unit.
O the system unit.
O the microprocessor.
O RAM.
Of the following computer types, which one is the most powerful? A
O Professional workstation
O Desktop computer
O Internet appliance
O Network computer
Checking the spelling in a word processed document is an example of which of the four computer operations?
A
O Processing
O Output
O Storage
O Input
Which of the following statements is considered a disadvantage of using a computer? C
Storage devices are inadequate to hold data and programs.
Computers are unreliable.
People generate more information from computers than they can possibly use.
Computers work with text and graphics only.
Which one of the following options is considered data? B
O Program
O Sounds
O Peripheral
O Information
Which of the following is the most frequently used input device? D
O Touch screen
O Microphone
O Scanner
O Keyboard
To analyze huge amounts of scientific data and display underlying patterns, you would use a: C
O minicomputer
O mainframe.
O supercomputer.
O server
The Internet is needed in all of the following instances EXCEPT: B
O using the WWW to research ways to treat poison ivy.
O sending an original physical copy of a letter to a customer.
O conducting business with an e-tailer.
O sending and receiving instant messages with your best friend.
Which of the following statements regarding computer ethics is NOT true? C
O Computer ethics is associated with your moral beliefs.
O Computer ethics defines right and wrong principles for computer professionals.
O Standards for computer ethics support copying programs and digital music.
O Computer ethics is a new branch of philosophy.



The two major components of system software are: A
O the operating system and system utilities.
O application software and system utilities.
O primary memory and storage.
O the operating system and applications software.
Which of the following may be necessary for you to do after you install new application software? D
O Press Shift + Alt + Del.
O Turn the computer power switch off and then back on.
O Do a cold boot.
O Do a warm boot.
The power-on self-test: B
O is able to provide detailed on-screen instructions that the user finds easy to follow to correct hardware
problems.
O verifies that the computer hardware is working properly.
O is conducted before the BIOS instructions are placed in the memory.
O checks for upgrades to the application software.
The options in the setup program needed for the BIOS to find the operating system are stored in: B
O a driver.
O CMOS.
O the kernel.
O the registry.
Microsoft Windows stores your computer configuration information regarding installed hardware and software
in a: D
O catalog.
O boot.
O device driver.
O registry.
In order to see a custom system utility in Microsoft Windows after loading the operating system, you: A
O can right-click the small icon at the right side of the taskbar.
O have to load the utility from storage and then right-click on the icon at the bottom left of the screen.
O can click on the utility icon and then press F8.
O can click on the utility name that displays at the top of the screen.
The authentication process: A
O involves typing your name and your password to log into the system.
O is something that is required on your home computer.
O keeps track of who logs into your computer.
O has to be completed before the operating system completes its loading.
Which of the following is a memory management technique that makes the random access memory appear larger
than it is? B
O Caching
O Virtual memory
O Preemptive multitasking.
O Read-only memory
Which of the following displays additional options following a menu choice? A
O Dialog box
O Menu-driven user interface
O User interface
O Command-line interface
What makes Windows NT different from other earlier Windows operating systems? B
O It works on mobile computing devices.
O It was specifically designed to work on networked computers.
O It cannot prevent users from accessing confidential data.
O It requires the administrator to configure each workstation individually rather than remotely.
Which operating system shows the most rapid growth in the number of Intel-based computer users? C
O UNIX
O Microsoft Windows XP
O Linux
O Mac OS X
Which of the following is a disadvantage of the Linux operating system? D
O It works on only a few types of computers.
O Linux is powerful but very costly to purchase.
O It doesn’t have a graphical-user interface.
O It isn’t able to run some software products such as Microsoft Office.

Which of the following would NOT be performed with application software? C
O Charts for a sales meeting presentation
O Customer list used for mailing invoices
O Hard disk cleanup
O Financial report sent to investors
What kind of program would you choose to use to create computer files that you share with other people in your
company? D
O Vertical
O Videoconferencing
O Utility
O Productivity
Which of the following is an advantage of a software suite? A
O The individual applications share the same resources
O The suite includes the operating system
O The suite is less expensive than any one application within the suite
O Each application within the suite has its own set of resources
Saving files in HyperText Markup Language: A
O makes it possible for anyone to view the file in a Web browser.
O increases file conversion costs.
O requires the viewer of the file to use the same computer software as the creator used to save the file.
O decreases software compatibility.
Which of the following would you use if you wanted to use a preliminary version of the software while it is still
in the testing stages of development? B
O Time-limited trial version
O Beta version
O Service release
O Maintenance release
The purpose of printed application software documentation is to: B
O stipulate the agreement in a site license.
O provide tutorials and manuals that explain how to use the software.
O explain how the program interacts with the operating system.
O show the program source code so the user can modify it to suit specific needs.
Software piracy is: B
O a minor infraction of the software licensing agreement.
O a federal offense.
O impossible because of the increased copy protection used in software products.
O allowed in education environments.
A software upgrade could be any of the following EXCEPT: A
O customizing your software to allow the users the same default settings.
O purchasing the next version of the software.
O downloading a patch to correct a performance problem.
O downloading a service release to update your version.
Software that you can install and use before you need to pay for it to avoid copyright infringement is called: B
O public domain software.
O shareware.
O freeware.
O copy-protected software.
Which of the following statements regarding software installation is FALSE? C
O Installation and setup utilities make the job of installing programs easy to accomplish.
O Installing software on your computer’s hard drive involves both transferring the files to the hard drive
and configuring the software to work with your computer.
O The initial configuration of the software should be completed after you have used the software for a
while to see what changes you need to make.
O If you download compressed software from the Internet, you will need to decompress it before you can
install the program on your hard drive.
To return a window to the size it was before you displayed it to fit the entire window, click the: C
O Minimize window control.
O Maximize window control.
O Restore window control.
O Program icon on the Status bar.
Which application menu contains the option to save a document with a different name? B
O View
O File
O Edit
O Tools
To provide a consistent look for a fax cover sheet, you can use a ____________ that comes with the application
program. C
O pattern
O sample
O template
O help file
If you activate the autosave option in your application program, A
O your work will be automatically saved at intervals that you specify, such as every 10 minutes.
O you cannot use the regular save method in the application program.
O there is no danger in losing any of the file that you created if the program fails.
O your file will automatically save when you close it.

system analysis and design

                                             system analysis and design



Abstract Class
A class that has no direct instances, but whose descendants may have direct instances. (12) See also Concrete class.
Abstract operation
Defines the form or protocol of the operation, but not its implementation. (12)
Acceptance testing
The process whereby actual users test a completed information system, the end result of which is the users acceptance of the system. (20) See also System testing.
Access method
An operating system algorithm for storing and locating data in secondary memory. (17) See also File organization.
Action stubs
That part of a decision table that lists the actions that result for a given set of conditions. (9)
Activation
The time period during which an object performs an operation. (12)
Actor
An external entity that interacts with the system (similar to an external entity in data flow diagramming). (12) See also Use-case.
Adaptive maintenance
Changes made to a system to evolve its functionality to changing business needs or technologies. (21)
Afferent module
A module of a structure chart related to input to the system. (18) See also Efferent module.
Affinity clustering
The process of arranging planning matrix information so that clusters of information with some predetermined level or type of affinity are placed next to each other on a matrix report. (5)
Aggregation
A part-of relationship between a component object and an aggregate object. (12) See also Composition.
Alias
An alternative name given to an attribute. (16)
Alpha testing
User testing of a completed information system using simulated data. (20) See also Beta testing, System testing.
Analysis
The third phase of the SDLC in which the current system is studied and alternative replacement systems are proposed. (1)
Analysis tools
CASE tools that enable automatic checking for incomplete, inconsistent, or incorrect specifications in diagrams, forms, and reports. (4)
Anomalies
Errors or inconsistencies that may result when a user attempts to update a table that contains redundant data. There are three types of anomalies: insertion, deletion, and modification anomalies. (16) See also Normalization.
Application independence
The separation of data and the definition of data from the applications that use these data. (1)
Application program interface (API)
Software which allows a specific front-end program development platform to communicate with a particular back-end database engine, even when the front-end and back-end were not built to be compatible. (19)
Application server
A computing server where data analysis functions primarily reside. (19)
Application software
Computer software designed to support organizational functions or processes. (1)
Association
A relationship between object classes. (12) See also Association role.
Association class
An association that has attributes or operations of its own, or that participates in relationships with other classes. (12)
Association role
The end of an association which connects it to a class. (12) See also Multiplicity.
Associative entity
An entity type that associates the instances of one or more entity types and contains attributes that are peculiar to the relationship between those entity instances. Also called a gerund. (10)
Asynchronous message
A message in which the sender does not have to wait for the recipient to handle the message. (12) See also Sequence diagram, Simple message, Synchronous message.
Attribute
A named property or characteristic of an entity that is of interest to the organization. (10) See also Multivalued attribute.
Audit trail
A list of changes to a data file which allows business transactions to be traced. Both the updating and use of data should be recorded in the audit trail, since the consequences of bad data should be discovered and corrected. (17)
Authorization rules
Controls incorporated to restrict access to systems and data and also to restrict the actions that people may take once in the system. (15)
Backward recovery (rollback)
An approach to rebuilding a file in which before images of changed records are restored to the file in reverse order until some earlier state is achieved. (17) See also Forward recovery (rollforward).
Balancing
The conservation of inputs and outputs to a data flow diagram process when that process is decomposed to a lower level. (8)
Baseline modules
Software modules that have been tested, documented, and approved to be included in the most recently created version of a system. (21)
Baseline Project Plan
A major outcome and deliverable from the project initiation and planning phase which contains the best estimate of a projectâs scope, benefits, costs, risks, and resource requirements. (6)
Batch processing
Information that is collected or generated at some predetermined time interval and can be accessed via hard copy or on-line devices. (14)
Behavior
Represents how an object acts and reacts. (12)
Beta testing
User testing of a completed information system using real data in the real user environment. (20) See also Alpha testing.
Binary relationship
A relationship between instances of two entity types. This is the most common type of relationship encountered in data modeling. (10)
Biometric device
An instrument that detects personal characteristics such as fingerprints, voice prints, retina prints, or signature dynamics. (15)
Blocking factor
The number of physical records per page. (17)
Bottom-up planning
A generic information systems planning methodology that identifies and defines IS development projects based upon solving operational business problems or taking advantage of some business opportunities. (5) See also Top-down planning, Corporate strategic planning.
Boundary
The line that marks the inside and outside of a system and which sets off the system from its environment. (2)
Build routines
Guidelines that list the instructions to construct an executable system from the baseline source code. (21)
Business case
The justification for an information system, presented in terms of the tangible and intangible economic benefits and costs, and the technical and organizational feasibility of the proposed system. (6)
Business Process Reengineering (BPR)
The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services. (7) See also Disruptive technologies, key business processes.
Business rules
Specifications that preserve the integrity of a conceptual or logical data model. (10)
Calculated field
A field which can be derived from other database fields. Also called computed or derived field. (17)
Candidate key
An attribute (or combination of attributes) that uniquely identifies each instance of an entity type. (10) See also Identifier, Primary key.
Cardinality
The number of instances of entity B that can (or must) be associated with each instance of entity A. (10)
CASE
See Computer-aided software engineering.
Central transform
The area of a transform-centered information system where the most important derivation of new information takes place. (18) See also Transform analysis.
Class
See also Object class.
Class diagram
Shows the static structure of an object-oriented model: the object classes, their internal structure, and the relationships in which they participate. (12)
Class-scope attribute
An attribute of a class that specifies a value common to an entire class, rather than a specific value for an instance. (12)
Client
The (front-end) portion of the client/server database system that provides the user interface and data manipulation functions. (19)
Client/server architecture
A LAN-based computing environment in which a central database server or engine performs all database commands sent to it from client workstations, and application programs on each client concentrate on user interface functions. (19)
Closed-ended questions
Questions in interviews and on questionnaires that ask those responding to choose from among a set of prespecified responses. (7) See also Open-ended questions.
Closed system
A system that is cut off from its environment and does not interact with it. (2) See also Open system.
Code generators
CASE tools that enable the automatic generation of program and database definition code directly from the design documents, diagrams, forms, and reports stored in the repository. (4)
Cohesion
The extent to which a system or a subsystem performs a single function. (2)
Command language interaction
A human-computer interaction method where users enter explicit statements into a system to invoke operations. (15)
Competitive strategy
The method by which an organization attempts to achieve its mission and objectives. (5)
Component
An irreducible part or aggregation of parts that make up a system, also called a subsystem. (2) See also Inter-related components.
Component diagram
Shows the software components or modules and their dependencies. (12) See also Package.
Composition
A part object that belongs to only one whole object and lives and dies with the whole. (12) See also Aggregation.
Computer-aided software engineering (CASE)
Software tools that provide automated support for some portion of the systems development process. (4) See also Cross life cycle CASE, I-CASE, Lower CASE, Upper CASE.
Computing infrastructure
All the resources and practices required to help people adequately use computer systems to do their primary work. (20) See also Support.
Conceptual data model
A detailed model that captures the overall structure of organizational data while being independent of any database management system or other implementation considerations. (10) See also Entity-relationship data model, Logical data model.
Concrete class
A class that can have direct instances. (12) See also Abstract class.
Concurrency control
A method for preventing loss of data integrity due to interference between users in a multiuser environment. (19)
Condition stubs
That part of a decision table that lists the conditions relevant to the decision. (9)
Configuration management
The process of assuring that only authorized changes are made to a system. (21)
Constraint
A limit to what a system can accomplish. (2)
Constructor operation
An operation that creates a new instance of a class. (12) See also Abstract operation, Query operation, Update operation.
Context diagram
An overview of an organizational system that shows the system boundary, external entities that interact with the system, and the major information flows between the entities and the system. (8) See also Data flow diagram.
Conversion
See Installation.
Corporate strategic planning
An ongoing process that defines the mission, objectives, and strategies of an organization. (5)
Corrective maintenance
Changes made to a system to repair flaws in its design, coding, or implementation. (21)
Coupling
The extent to which subsystems depend on each other. (2)
Critical path scheduling
A scheduling technique where the order and duration of a sequence of activities directly affect the completion date of a project. (3)
Cross life cycle CASE
CASE tools designed to support activities that occur across multiple phases of the systems development life cycle. (4) See also Lower CASE, Upper CASE.
Cross referencing
A feature performed by a data dictionary that enables one description of a data item to be stored and accessed by all individuals so that a single definition for a data item is established and used. (5)
Data
Raw facts about people, objects, and events in an organization. (1)
Data compression technique
Pattern matching and other methods which replace repeating strings of characters with codes of shorter length. (17)
Data couple
A diagrammatic representation of the data exchanged between two modules in a structure chart. (18) See also Flag.
Data dictionary
The repository of all data definitions for all organizational applications. (4)
Data flow
Data in motion, moving from one place in a system to another. (1)
Data flow diagram
A picture of the movement of data between external entities and the processes and data stores within a system. (8)
Data-oriented approach
An overall strategy of information systems development that focuses on the ideal organization of data rather than where and how data are used. (1) See also Process-oriented approach.
Data store
Data at rest, which may take the form of many different physical representations. (8)
Data type
A detailed coding scheme recognized by system software for representing organizational data. (17)
Database
A shared collection of logically related data designed to meet the information needs of multiple users in an organization. (1)
Database engine
The (back-end) portion of the client/server database system running on the server and providing database processing and shared access functions. (19)
Database management system (DBMS)
Software that is used to create, maintain, and provide controlled access to user databases. (17)
Decision support systems (DSS)
Computer-based systems designed to help organization members make decisions; usually composed of a database, model base, and dialogue system. (Website) See also DSS Generators.
Decision table
A matrix representation of the logic of a decision, which specifies the possible conditions for the decision and the resulting actions. (19) See also Action stubs, Condition stubs, Rules.
Decision tree
A graphical representation of a decision situation in which decision points (nodes) are connected together by arcs (one for each alternative on a decision) and terminate in ovals (the action which is the result of all of the decisions made on the path that leads to that oval). (9)
Decomposition
See Functional decomposition.
Default value
A value a field will assume unless an explicit value is entered for that field. (17)
Degree
The number of entity types that participate in a relationship. (10)
Design strategy
A high-level statement about the approach to developing an information system. It includes statements on the systemâs functionality, hardware and system software platform, and method for acquisition. (11)
Desk checking
A testing technique in which the program code is sequentially executed manually by the reviewer. (20)
DFD completeness
The extent to which all necessary components of a data flow diagram have been included and fully described. (8)
DFD consistency
The extent to which information contained on one level of a set of nested data flow diagrams is also included on other levels. (8)
Diagramming tools
CASE tools that support the creation of graphical representations of various system elements such as process flow, data relationships, and program structures. (4)
Dialogue
The sequence of interaction between a user and a system. (15)
Dialogue diagramming
A formal method for designing and representing human-computer dialogues using box and line diagrams. (15)
Direct installation
Changing over from the old information system to a new one by turning off the old system when the new one is turned on. (20)
Discount rate
The rate of return used to compute the present value of future cash flows. (6)
Disruptive technologies
Technologies that enable the breaking of long-held business rules that inhibit organizations from making radical business changes. (7) See also Business Process Reengineering (BPR).
Distributed database
A single logical database that is spread across computers in multiple locations which are connected by a data communications link. (19) See also Location transparency.
Documentation
See External documentation, Internal documentation, System documentation, User documentation.
Documentation generators
CASE tools that enable the easy production of both technical and user documentation in standard formats. (4)
Domain
The set of all data types and values that an attribute can assume. (10)
Drop-down menu
A menu positioning method that places the access point of the menu near the top line of the display; when accessed, menus open by dropping down onto the display. (15) See also Pop-up menu.
DSS generators
General purpose computer-based tools used to develop specific decision support systems. (Website)
Economic feasibility
A process of identifying the financial benefits and costs associated with a development project. (6)
Efferent module
A module of a structure chart related to output from the system. (18) See also Afferent module.
Electronic performance support system (EPSS)
Component of a software package or application in which training and educational information is embedded. An EPSS can take several forms, including a tutorial, an expert system shell, and hypertext jumps to reference material. (20)
Encapsulation
The technique of hiding the internal implementation details of an object from its external view. (12)
Encryption
The coding (or scrambling) of data so that they cannot be read by humans. (17)
End users
Non-information-system professionals in an organization who specify the business requirements for and use software applications. End users often request new or modified applications, test and approve applications, and may serve on project teams as business experts. (1)
End-user development
An approach to systems development in which users who are not computer experts satisfy their own computing needs through the use of high-level software and languages such as electronic spreadsheets and relational database management systems. (1) See also Help desk, Support.
Entity instance (instance)
A single occurrence of an entity type. (10)
Entity-relationship data model (E-R model)
A detailed, logical representation of the entities, associations, and data elements for an organization or business area. (10)
Entity-relationshipÊdiagramÊ(E-RÊdiagram)
A graphical representation of an E-R model. (10)
Entity type
A collection of entities that share common properties or characteristics. (10)
Environment
Everything external to a system which interacts with the system. (2)
Event
Something that takes place at a certain point in time; a noteworthy occurrence that triggers a state transition. (12)
Exclusive relationships
A set of relationships for which an entity instance can participate in only one of the relationships at a time. (Website)
Executive information systems
See Executive support systems.
Executive support systems
Computer-based systems developed to support the information-intensive but limited-time decision making of executives (also referred to as executive information systems). (Website)
Expert systems
Computer-based systems designed to mimic the performance of human experts. (Website)
External documentation
System documentation that includes the outcome of structured diagramming techniques such as data flow and entity-relationship diagrams. (20) See also Internal documentation.
External information
Information that is collected from or created for individuals and groups external to an organization. (14) See also Internal information.
Feasibility
See Economic feasibility, Legal and contractual feasibility, Operational feasibility, Political feasibility, Schedule feasibility, Technical feasibility.
Field
The smallest unit of named application data recognized by system software. (17)
File organization
A technique for physically arranging the records of a file on secondary storage devices. (17) See also Access method, Hashed file organization, Indexed file organization, Sequential file organization.
File server
A device that manages file operations and is shared by each client PC attached to a LAN. (19) See also Client/server architecture.
First normal form (1NF)
A relation that contains no repeating data. (16) See also Normalization.
Flag
A diagrammatic representation of a message passed between two modules. (18) See also Data couple.
Foreign key
An attribute that appears as a nonkey attribute in one relation and as a primary key attribute (or part of a primary key) in another relation. (16)
Form
A business document that contains some pre-defined data and may include some areas where additional data are to be filled in. An instance of a form is typically based on one database record. (14)
Form and report generators
CASE tools that support the creation of system forms and reports in order to prototype how systems will "look and feel" to users. (4)
Form interaction
A highly intuitive human-computer interaction method whereby data fields are formatted in a manner similar to paper-based forms. (15)
Formal system
The official way a system works as described in organizational documentation. (7) See also Informal system.
Forward recovery (rollforward)
An approach to rebuilding a file in which one starts with an earlier version of the file and either reruns prior transactions or replaces a record with its image after each transaction. (17) See also Backward recovery (rollback).
Functional decomposition
An iterative process of breaking the description of a system down into finer and finer detail which creates a set of charts in which one process on a given chart is explained in greater detail on another chart. (8)
Functional dependency
A particular relationship between two attributes. For any relation R, attribute B is functionally dependent on attribute A if, for every valid instance of A, that value of A uniquely determines the value of B. The functional dependence of B on A is represented as A > B. (16) See also Partial functional dependency, Transitive dependency.
Gantt chart
A graphical representation of a project that shows each task activity as a horizontal bar whose length is proportional to its time for completion. (3)
Generalization
See Website.
Hashed file organization
The address for each record is determined using a hashing algorithm. (17)
Hashing algorithm
A routine that converts a primary key value into a relative record number (or relative file address). (17)
Help desk
A single point of contact for all user inquiries and problems about a particular information system or for all users in a particular department. (20) See also Computing infrastructure, Information center, Support.
Homonym
A single name that is used for two or more different attributes (for example, the term invoice to refer to both a customer invoice and a supplier invoice). (16)
Horizontal partitioning
Distributing the rows of a table into several separate tables. (19) See also Vertical partitioning.
I-CASE
An automated systems development environment that provides numerous tools to create diagrams, forms, and reports; provides analysis, reporting, and code generation facilities; and seamlessly shares and integrates data across and between tools. (4)
Icon
Graphical pictures that represent specific functions within a system. (15) See also Object-based interaction.
Identifier
A candidate key that has been selected as the unique, identifying characteristic for an entity type. (10) See also Candidate key, Primary key.
Implementation
The sixth phase of the SDLC in which the information system is coded, tested, installed, and supported in the organization. (1)
Incremental commitment
A strategy in systems analysis and design in which the project is reviewed after each phase and continuation of the project is rejustified in each of these reviews. (5)
Index
A table or other data structure used to determine the location of rows in a file that satisfy some condition. (17)
Indexed file organization
The records are either stored sequentially or nonsequentially and an index is created that allows software to locate individual records. (17)
Indifferent condition
In a decision table, a condition whose value does not affect which actions are taken for two or more rules. (9)
Informal system
The way a system actually works. (7) See also Formal system.
Information
Data that have been processed and presented in a form suitable for human interpreta-tion, often with the purpose of revealing trends or patterns. (1)
Information center
An organizational unit whose mission is to support users in exploiting information technology. (20) See also Computing infrastructure, Help desk, Support.
Information repository
Automated tools to manage and control access to organizational business information and application portfolios as components within a comprehensive repository. (4)
Information systems analysis and design
The complex organizational process whereby computer-based information systems are developed and maintained. (1)
Information systems planning (ISP)
An orderly means of assessing the information needs of an organization and defining the systems, databases, and technologies that will best satisfy those needs. (5) See also Corporate strategic planning, Top-down planning.
Inheritance
The property that occurs when entity types or object classes are arranged in a hierarchy and each entity type or object class assumes the attributes and methods of its ancestors; that is, those higher up in the hierarchy. Inheritance allows new but related classes to be derived from existing classes. (1) See also Generalization.
Input
Whatever a system takes from its environment in order to fulfill its purpose. (2)
Inspections
A testing technique in which participants examine program code for predictable language-specific errors. (20)
Installation
The organizational process of changing over from the current information system to a new one. (20) See also Direct installation, Parallel installation, Phased installation, Single location installation.
Intangible benefit
A benefit derived from the creation of an information system that cannot be easily measured in dollars or with certainty. (6) See also Tangible benefit.
Intangible cost
A cost associated with an information system that cannot be easily measured in terms of dollars or with certainty. (6) See also Tangible cost.
Integrated CASE
See I-CASE.
Integration testing
The process of bringing together all of the modules that a program comprises for testing purposes. Modules are typically integrated in a top-down, incremental fashion. (20)
Interface
In systems theory, the point of contact where a system meets its environment or where subsystems meet each other. (2) In human-computer interaction, a method by which users interact with information systems. (15)
Internal documentation
System documentation that is part of the program source code or is generated at compile time. (20) See also External documentation.
Internal information
Information that is collected, generated, or consumed within an organization. (14) See also External information.
Interrelated components
Dependence of one subsystem on one or more subsystems. (2)
JAD session leader
The trained individual who plans and leads Joint Application Design sessions. (7)
Joint Application Design (JAD)
A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements. (1)
Key business processes
The structured, measured set of activities designed to produce a specific output for a particular customer or market. (7) See also Business Process Reengineering (BPR).
Knowledge engineersÊ
Computer professionals whose job it is to elicit knowledge from domain experts in order to develop expert systems. (Website)
Legal and contractual feasibility
The process of assessing potential legal and contractual ramifications due to the construction of a system. (6)
Level-0 diagram
A data flow diagram that represents a systemâs major processes, data flows, and data stores at a high level of detail. (8)
Level-n diagram
A DFD that is the result of n nested decompositions of a series of subprocesses from a process on a level-0 diagram. (8)
Local area network (LAN)
The cabling, hardware, and software used to connect workstations, computers, and file servers located in a confined geographical area (typically within one building or campus). (19)
Location transparency
A design goal for a distributed database which says that a user (or user program) requesting data need not know at which site those data are located. (19)
Logical database model
A description of data using a notation that corresponds to an organization of data used by database management systems. (16) See also Relational database model.
Logical design
The fourth phase of the SDLC in which all functional features of the system chosen for development in analysis are described independently of any computer platform. (1)
Logical system description
Description of a system that focuses on the systemâs function and purpose without regard to how the system will be physically implemented. (2)
Lower CASE
CASE tools designed to support the implementation and maintenance phases of the systems development life cycle. (4) See also Upper CASE.
Maintainability
The ease with which software can be understood, corrected, adapted, and enhanced. (21)
Maintenance
The final phase of the SDLC in which an information system is systematically repaired and improved; or changes made to a system to fix or enhance its functionality. (1; 21) See also Adaptive maintenance, Corrective maintenance, Perfective maintenance, Preventive maintenance.
Management information systems (MIS)
Computer-based systems designed to provide standard reports for managers about transaction data. (Website)
Mean time between failures (MTBF)
A measurement of error occurrences that can be tracked over time to indicate the quality of a system. (21)
Menu interaction
A human-computer interaction method where a list of system options is provided and a specific command is invoked by user selection of a menu option. (15) See also Drop-down menu, Pop-up menu.
Method
The implementation of an operation. (12)
Middleware
A combination of hardware, software, and communication technologies that bring together data management, presentation, and analysis into a three-tiered client/server environment. (19)
Mission statement
A statement that makes it clear what business a company is in. (5)
Modularity
Dividing a system up into chunks or modules of a relatively uniform size. (2) See also Cohesion, Coupling.
Module
A self-contained component of a system, defined by function. (18)
Multiple classification
Shows that an object is an instance of more than one class. (12)
Multiplicity
Indicates how many objects participate in a given relationship. (12)
Multivalued attribute
An attribute that may take on more than one value for each entity instance. (10)
Natural language interaction
A human-computer interaction method where inputs to and outputs from a computer-based application are in a conventional speaking language such as English. (15)
Normal form
A state of a relation that can be determined by applying simple rules regarding dependencies to that relation. (16) See also Functional dependency.
Normalization
The process of converting com-plex data structures into simple, stable data structures. (16)
Null value
A special field value, distinct from 0, blank, or any other value, that indicates that the value for the field is missing or otherwise unknown. (17)
Object
An entity that has a well-defined role in the application domain and has state, behavior, and identity. (12; 1) See also Object class, Object diagram.
Object-based interaction
A human-computer interaction method where symbols are used to represent commands or functions. (15) See also Icon.
Object class (class)
A set of objects that share a common structure and a common behavior. (12; 1) See also Abstract class, Concrete class.
Object diagram
A graph of instances that are compatible with a given class diagram. (12)
Object-oriented analysis and design (OOAD)
Systems development methodologies and techniques based on objects rather than data or processes. (1)
Objective statements
A series of statements that express an organizationâs qualitative and quantitative goals for reaching a desired future position. (5)
On-line processing
The collection and delivery of the most recent available information, typically through an on-line workstation. (14)
One-time cost
A cost associated with project start-up and development, or system start-up. (6)
Open-ended questions
Questions in interviews and on questionnaires that have no prespecified answers. (7) See also Closed-ended questions.
Open system
A system that interacts freely with its environment, taking input and returning output. (2) See also Closed system.
Operation
A function or a service that is provided by all the instances of a class. (12) See also Abstract operation, Constructor operation, Method, Polymorphism, Query operation, Update operation.
Operational feasibility
The process of assessing the degree to which a proposed system solves business problems or takes advantage of business opportunities. (6)
Output
Whatever a system returns to its environment in order to fulfill its purpose. (2)
Outsourcing
The practice of turning over responsibility of some to all of an organizationâs information systems applications and operations to an outside firm. (11)
Overriding
The process of replacing a method inherited from a superclass by a more specific implementation of that method in a subclass. (12)
Package
A set of cohesive, tightly coupled classes representing a subsystem. (12) See also Component diagram.
Page
The amount of data read or written in one secondary memory (disk) input or output operation. For I/O with a magnetic tape, the equivalent term is record block. (17) See also Blocking factor.
Parallel installation
Running the old information system and the new one at the same time until management decides the old system can be turned off. (20)
Partial functional dependency
A dependency in which one or more nonkey attributes are functionally dependent on part, but not all, of the primary key. (16)
Participatory Design (PD)
A systems development approach that originated in Northern Europe in which users and the improvement in their work lives are the central focus. (1)
Perfective maintenance
Changes made to a system to add new features or to improve performance. (21)
PERT chart
A diagram that depicts project activities and their inter-relationships. PERT stands for Program Evaluation Review Technique. (3)
Phased installation
Changing from the old information system to the new one incrementally, starting with one or a few functional components and then gradually extending the installation to cover the whole new system. (20)
Physical design
The fifth phase of the SDLC in which the logical specifications of the system from logical design are transformed into technology-specific details from which all programming and system construction can be accomplished. (1)
Physical file
A named set of contiguous records. (17)
Physical record
A group of fields stored in adjacent memory locations and retrieved together as a unit. (17)
Physical system description
Description of a system that focuses on how the system will be materially constructed. (2)
Picture (or template)
A pattern of codes that restricts the width and possible values for each position of a field. (17)
Pilot installation
See Single location installation.
Pointer
A field of data that can be used to locate a related field or record of data. (17)
Political feasibility
The process of evaluating how key stakeholders within the organization view the proposed system. (6)
Polymorphism
The same operation may apply to two or more classes in different ways. (12)
Pop-up menu
A menu positioning method that places a menu near the current cursor position. (15)
Present value
The current value of a future cash flow. (6)
Preventive maintenance
Changes made to a system to avoid possible future problems. (21)
Primary key
See Identifier.
Primitive DFD
The lowest level of decomposition for a data flow diagram. (8)
Process
The work or actions performed on data so that they are transformed, stored, or distributed. (8)
Process-oriented approach
An overall strategy to information systems development that focuses on how and when data are moved through and changed by an information system. (1) See also Data-oriented approach.
Processing logic
The steps by which data are transformed or moved and a description of the events that trigger these steps. (1)
Project
A planned undertaking of related activities to reach an objective that has a beginning and an end. (3)
Project close-down
The final phase of the project management process that focuses on bringing a project to an end. (3)
Project execution
The third phase of the project management process in which the plans created in the prior phases (project initiation and planning) are put into action. (3)
Project identification and selection
The first phase of the SDLC in which an organizationâs total information system needs are identified, analyzed, prioritized, and arranged. (1)
Project initiation
The first phase of the project management process in which activities are performed to assess the size, scope, and complexity of the project and to establish procedures to support later project activities. (3)
Project initiation and planning
The second phase of the SDLC in which a potential information systems project is explained and an argument for continuing or not continuing with the project is presented; a detailed plan is also developed for conducting the remaining phases of the SDLC for the proposed system. (1)
Project management
A controlled process of initiating, planning, executing, and closing down a project. (3)
Project manager
An individual with a diverse set of skills--management, leadership, technical, conflict management, and customer relationship--who is responsible for initiating, planning, executing, and closing down a project. (3)
Project planning
The second phase of the project management process which focuses on defining clear, discrete activities and the work needed to complete each activity within a single project. (3)
Project workbook
An on-line or hard copy repository for all project correspondence, inputs, outputs, deliverables, procedures, and standards that is used for performing project audits, orientation of new team members, communication with management and customers, scoping future projects, and performing post-project reviews. (3) See also Repository.
Prototyping
An iterative process of systems development in which requirements are converted to a working system which is continually revised through close work between an analyst and users. (1) See also Rapid Application Development (RAD).
Pseudocode
A method for representing the instructions in a module with language very similar to computer programming code. (18)
Purpose
The overall goal or function of a system. (2)
Query operation
An operation that accesses the state of an object but does not alter the state. (12) See also Abstract operation, Constructor operation, Update operation.
Rapid Application Development (RAD)
Systems development methodology created to radically decrease the time needed to design and implement information systems. RAD relies on extensive user involvement, Joint Application Design sessions, prototyping, integrated CASE tools, and code generators. (13)
Record partitioning
The process of splitting logical records into separate physical segments based on affinity of use. (17) See also Horizontal partitioning, Vertical partitioning.
Recurring cost
A cost resulting from the ongoing evolution and use of a system. (6)
Recursive foreign key
A foreign key in a relation that references the primary key values of that same relation. (16)
Reengineering
Automated tools that read program source code as input, perform an analysis of the programâs data and logic, and then automatically, or interactively with a systems analyst, alter an existing system in an effort to improve its quality or performance. (4) See also CASE.
Referential integrity
An integrity constraint specifying that the value (or existence) of an attribute in one relation depends on the value (or existence) of an attribute in the same or another relation. (16)
Relation
A named, two-dimensional table of data. Each relation consists of a set of named columns and an arbitrary number of unnamed rows. (16)
Relational database model
A data model that represents data in the form of tables or relations. (16)
Relationship
An association between the instances of one or more entity types that is of interest to the organization. (10) See also Instance connection.
Repeating group
A set of two or more multivalued attributes that are logically related. (10)
Report
A business document that contains only pre-defined data; that is, it is a passive document used solely for reading or viewing. A report typically contains data from many unrelated records or transactions. (14)
Repository
A centralized database that contains all diagrams, form and report definitions, data structure, data definitions, process flows and logic, and definitions of other organizational and system components; it provides a set of mechanisms and structures to achieve seamless data-to-tool and data-to-data integration. (4) See also I-CASE, Information repository, Project workbook.
Resource
Any person, group of people, piece of equipment, or material used in accomplishing an activity. (3)
Reusability
The ability to design software modules in a manner so that they can be used again and again in different systems without significant modification. (4)
Reverse engineering
Automated tools that read program source code as input and create graphical and textual representations of program design-level information such as program control structures, data structures, logical flow, and data flow. (4) See also CASE.
Rules
That part of a decision table that specifies which actions are to be followed for a given set of conditions. (9)
Schedule feasibility
The process of assessing the degree to which the potential timeframe and completion dates for all major activities within a project meet organizational deadlines and constraints for affecting change. (6)
Scribe
The person who makes detailed notes of the happenings at a Joint Application Design session. (7)
Second normal form (2NF)
A relation is in second normal form if it is in first normal form and every nonkey attribute is fully functionally dependent on the primary key. Thus no nonkey attribute is functionally dependent on part (but not all) of the primary key. (16) See also Functional dependency, Partial functional dependency.
Secondary key
One or a combination of fields for which more than one record may have the same combination of values. (17)
Sequence diagram
Depicts the interactions among objects during a certain period of time. (12)
Sequential file organization
The records in the file are stored in sequence according to a primary key value. (17)
Service
See Method.
Simple message
A message that transfers control from the sender to the recipient without describing the details of the communication. (12) See also Asynchronous message, Sequence diagram, Synchronous message.
Single location installation
Trying out a new information system at one site and using the experience to decide if and how the new system should be deployed throughout the organization. (20)
Slack time
The amount of time that an activity can be delayed without delaying the project. (3)
Smart card
A thin plastic card the size of a credit card with an embedded microprocessor and memory. (15)
Source/sink
The origin and/or destination of data, sometimes referred to as external entities. (8)
Staged installation
See Phased installation.
Stakeholder
A person who has an interest in an existing or new information system. A stakeholder is someone who is involved in the development of a system, in the use of a system, or someone who has authority over the parts of the organization affected by the system. (1)
State
Encompasses an objectâs properties (attributes and relationships) and the values those properties have. (12) See also Behavior.
State diagram
A model of the states of an object and the events that cause the object to change from one state to another. (12)
State transition
Changes in the attributes of an object or in the links an object has with other objects. (12).
Statement of Work (SOW)
Document prepared for the customer during project initiation and planning that describes what the project will deliver and outlines generally at a high level all work required to complete the project. (6)
Structure chart
Hierarchical diagram that shows how an information system is organized. (18)
Structured English
Modified form of the English language used to specify the logic of information system processes. Although there is no single standard, Structured English typically relies on action verbs and noun phrases and contains no adjectives or adverbs. (9)
Stub testing
A technique used in testing modules, especially where modules are written and tested in a top-down fashion, where a few lines of code are used to substitute for subordinate modules. (20)
Support
Providing ongoing educational and problem solving assistance to information system users. For in-house developed systems, support materials and jobs will have to be prepared or designed as part of the implementation process. (20) See also Computing infrastructure, Help desk, Information center.
Synchronous message
A type of message in which the caller has to wait for the receiving object to finish executing the called operation before it can resume execution itself. (12) See also Asynchronous message, Sequence diagram, Simple message.
Synonyms
Two different names that are used to refer to the same data item (for example, car and automobile). (16)
System
An inter-related set of components, with an identifiable boundary, working together for some purpose. (2) See also Closed system, Open system.
System documentation
Detailed information about a systemâs design specifications, its internal workings, and its functionality. (20)
System librarian
A person responsible for controlling the checking-out and checking-in of baseline modules for a system when a system is being developed or maintained. (21)
System testing
The bringing together of all the programs that a system comprises for testing purposes. Programs are typically integrated in a top-down, incremental fashion. (20) See also Acceptance testing, Alpha testing, Beta testing, Integration testing, Stub testing.
Systems analyst
The organizational role most responsible for the analysis and design of information systems. (1)
Systems development life cycle (SDLC)
The traditional methodology used to develop, maintain, and replace information systems. (1)
Systems development methodology
A standard process followed in an organization to conduct all the steps necessary to analyze, design, implement, and maintain information systems. (1)
Tangible benefit
A benefit derived from the creation of an information system that can be measured in dollars and with certainty. (6) See also Intangible benefit.
Tangible cost
A cost associated with an information system that can be measured in terms of dollars and with certainty. (6) See also Intangible cost.
Technical feasibility
A process of assessing the development organizationâs ability to construct a proposed system. (6)
Ternary relationship
A simultaneous relationship among instances of three entity types. (10)
Third normal form (3NF)
A relation is in third normal form if it is in second normal form and no transitive dependencies exist. (16)
Three-tiered client/server
Advanced client/server architectures in which there are three logical and distinct applications--data management, presentation, and analysis--which are combined to create a single information system. (19)
Top-down planning
A generic information systems planning methodology that attempts to gain a broad understanding of the information system needs of the entire organization. (5) See also Bottom-up planning.
Transaction analysis
The process of turning data flow diagrams of a transaction-centered system into structure charts. (18) See also Transform analysis.
Transaction-centered system
An information system that has as its focus the dispatch of data to their appropriate locations for processing. (18)
Transaction processing systems (TPS)
Computer-based versions of manual organization systems dedicated to handling the organizationâs transactions; e.g., payroll. (Website)
Transactions
Individual, simple events in the life of an organization that contain data about organizational activity. (Website)
Transform analysis
The process of turning data flow diagrams of a transform-centered system into structure charts. (18) See also Transaction analysis.
Transform-centered system
An information system that has as its focus the derivation of new information from existing data. (18) See also Central transform.
Transitive dependency
A functional dependency between two (or more) nonkey attributes in a relation. (16) See also Third normal form.
Triggering operation (trigger)
An assertion or rule that governs the validity of data manipulation operations such as insert, update, and delete. (10)
Turnaround document
Information that is delivered to an external customer as an output that can be returned to provide new information as an input to an information system. (14)
Unary relationship (recursive relationship)
A relationship between the instances of one entity type. (10)
Unit testing
Method in which each module is tested alone in an attempt to discover any errors in its code. (20)
Update operation
An operation that alters the state of an object. (12) See also Abstract operation, Constructor operation, Query operation.
Upper CASE
CASE tools designed to support information planning and the project identification and selection, project initiation and planning, analysis, and design phases of the systems development life cycle. (4) See also Lower CASE.
Usability
An overall evaluation of how a system performs in supporting a particular user for a particular task. (14)
Use case
A complete sequence of related actions initiated by an actor, it represents a specific way of using the system. (12)
Use-case diagram
A diagram that depicts the use cases and actors for a system. (12)
User documentation
Written or other visual information about an application system, how it works, and how to use it. (20)
Value chain analysis
The process of analyzing an organizationâs activities to determine where value is added to products and/or services and the cost are incurred for doing so; usually also includes a comparison with the activities, added value, and costs of other organizations for the purpose of making improvements in the organizationâs operations and performance. (5)
Vertical partitioning
Distributing the columns of a table into several separate tables. (19) See also Horizontal partitioning.
View
A subset of the database that is presented to one or more users. (15)
Walkthrough
A peer group review of any product created during the systems development process. Also called structured walkthrough. (6)
Well-structured relation
A relation that contains a minimum amount of redundancy and allows users to insert, modify, and delete the rows in a table without errors or inconsistencies. (16) See also Normalization.
Work breakdown structure
The process of dividing the project into manageable tasks and logically ordering them to ensure a smooth evolution between tasks. (3)