0% found this document useful (0 votes)
6 views27 pages

Isad Practice Tests

The document contains a series of true/false questions related to the implementation, transition, support, and data design phases of system development. It covers topics such as programming, testing, maintenance, and data management concepts. Additionally, it references various practices and methodologies in IT and software engineering.

Uploaded by

mariecarolettec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views27 pages

Isad Practice Tests

The document contains a series of true/false questions related to the implementation, transition, support, and data design phases of system development. It covers topics such as programming, testing, maintenance, and data management concepts. Additionally, it references various practices and methodologies in IT and software engineering.

Uploaded by

mariecarolettec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

PRACTICE TEST 1: IMPLEMENTATION PHASE

1. Although programmers perform the actual coding, IT managers usually assign systems
analysts to work with them as part of a team.
True
False

2. Compiling a program using a CASE tool or a language compiler detects syntax errors, which
are language grammar errors.
True
False

3. Commercial software packages must undergo unit and integration testing similar to that of
in-house developed systems, although system testing usually is not performed.
True
False

Commercial software packages must undergo system testing similar to that of in-house
developed systems, although unit and integration testing usually are not performed.

4. The skill set required to develop documentation usually is the same as that required to
develop a system.
True
False

The skill set required to develop documentation usually is not the same as that to develop a
system.

5. Effective online documentation is an important productivity tool because it empowers users


and reduces the time that IT staff members must spend in providing telephone, email, or
face-to-face assistance.
True
False

6. Data conversion is easier when a new system replaces a manual system because all data
can be entered manually, unless it must be scanned.
True
False

Data conversion is more difficult when the new system replaces a manual system, because all
data must be entered manually unless it can be scanned.
7. To minimize the need to require information from two different systems, cyclical information
systems usually are converted using the direct cutover method at the beginning of a quarter,
calendar year, or fiscal year.
True
False

8. Phased operation is more expensive than full parallel operation because the analyst has to
work with the entire system at any given time.
True
False

Phased operation is less expensive than full parallel operation because the analyst has to work
with only one part of the system at a time.

9. The post-implementation evaluation of a system verifies that the new system meets specified
requirements, complies with user objectives, and produces the anticipated benefits.
True
False

10. Modules that are independent are tightly coupled.


True
False

Modules that are independent are loosely coupled.

11. ISO requires a specific development plan, which outlines a step-by-step process for
transforming user requirements into a finished product.
True
False

12. Agile projects use various iterative and incremental models.


True
False

13. Pseudocode is a technique for representing program logic.


True
False

14. Critics of agile development often claim that because it focuses on quick iterations and fast
releases, it lacks discipline and produces systems of questionable quality.
True
False
15. Test data should contain only correct data.
True
False

Test data should contain both correct data and erroneous data and should test all possible
situations that could occur.

16. Program documentation describes the system’s functions and how they are implemented.
True
False

System documentation describes the system’s functions and how they are implemented.

17. The test environment for an information system contains copies of all programs, procedures,
and test data files.
True
False

18. The main objective of _____ is to avoid problems or to identify them as soon as possible.
application development
quality assurance
cohesion
direct cutover

19. The Software Engineering Institute (SEI) established a new model, called _____, which
incorporates software and systems development into a much larger framework.
Open Database Connectivity (ODBC) model
the Thousand-Yard Model
Capability Maturity Model Integration (CMMI)
the Department of Defense (DoD) model

Eventually the SEI established a new model, called Capability Maturity Model Integration
(CMMI)®, that integrates software and systems development into a much larger framework.

20. _____ requires that a software supplier document all testing and maintain records of test
results.
The Center for the Application of Information Technologies (CAIT)
The International Organization for Standardization (ISO)
The Software Engineering Institute (SEI)
Open Database Connectivity (ODBC)
21. _____ is the process of constructing the programs and code modules that serve as the
building blocks of an information system.
Application development
Application structuring
Application analysis
Application virtualization

22. A _____ consists of related program code organized into small units that are easy to
understand and maintain.
module
stub
decision tree
node

23. _____ graphically represent the logical rules and interaction between program modules
using a series of symbols connected by arrows.
Training plans
Simulations
Flowcharts
Acceptance tests

24. Structured application development usually involves a(n) _____, which proceeds from a
general design to a detailed structure.
test plan
top-down approach
training plan
integrated approach

25. In a structure chart, a(n) _____ line, with a diamond on one end, indicates that a control
module determines which subordinate modules will be invoked.
condition
class
attribute
Method

A condition line indicates that a control module determines which subordinate modules will be
invoked, depending on a specific condition.

26. In sequence, the steps typically followed to create a structure chart are _____.
a. reviewing the data flow diagrams (DFDs); identifying modules and relationships;
adding couples, loops, and conditions; and analyzing the structure chart
b. analyzing the structure chart and the data dictionary; reviewing the data flow diagrams
(DFDs); identifying modules and relationships; and adding couples, loops, and
conditions
c. adding couples, loops, and conditions; analyzing the structure chart and the data
dictionary; reviewing the data flow diagrams (DFDs); and identifying modules and
relationships
d. identifying modules and relationships; adding couples, loops, and conditions; analyzing
the structure chart and the data dictionary; and reviewing the data flow diagrams (DFDs)

27. A class diagram includes the class _____, which describe the characteristics of objects in
the class.
attributes
events
methods
Keys

28. In _____, two programmers work on the same task on the same computer; one drives
(programs) while the other navigates (watches).
pair programming
dual tasking
driver programming
Multitasking

29. _____ is the process of reviewing program code to spot logic errors, which produce
incorrect results.
Desk checking
Cohesion assurance
Results walkthrough
Direct cutover examination

30. In addition to analyzing logic and program code, a project team usually holds a session with
users, called a _____, to review the interface with a cross-section of people who will work with
the new system and ensure that all the necessary features have been included.
function assessment
closure meeting
design walk-through
unit test

REFERENCES
https://quizlet.com/302960062/chapter-11-managing-systems-implementation-truefalse-flash-car
ds/

https://quizlet.com/517413720/4420-quizzes-flash-cards/

https://quizlet.com/671053569/chp-11-managing-system-implementation-tf-flash-cards/
https://quizlet.com/586580178/system-analysis-design-final-flash-cards/

https://quizlet.com/206747569/chapter-11-flash-cards/

https://quizlet.com/598916868/wk-4-apply-systems-implementation-flash-cards/

https://quizlet.com/282561264/chapter-11-flash-cards/

https://quizlet.com/398061454/ch-11-flash-cards/
PRACTICE TEST 2: TRANSITION AND SUPPORT

1. Retention periods of backups can be a specific number of months or years, depending on


legal requirements and company policy.
True
False

2. In a broad sense, credentials include formal degrees, diplomas, or certificates granted by


learning institutions to show that a certain level of education has been achieved.
True
False

3. The main objective of training is to show users how the system can help them perform their
jobs.
True
False

4. Maintenance expense stay consistently the same during the system’s operational life.
True
False

Maintenance expenses vary significantly during the system’s operational life and include
spending to support maintenance activities.

5. Software leases are not considered an operational cost.


True
False

Operational costs include items such as supplies, equipment rental, and software leases.

6. Acceptance means that nothing is done; companies usually accept a risk only when the
protection clearly is not worth the expense.
True
False

7. Hard skills include communications, interpersonal, and perceptive abilities.


True
False

Soft skills include communications, interpersonal, and perceptive abilities.


8. A system in its final stages requires corrective maintenance only to keep the system
operational.
True
False

9. A continuous backup only backs up files that are new or changed since the last full backup.
True
False

A differential backup only backs up files that are new or changed since the last full backup.

10. An incremental backup only includes recent files that have never been backed up by any
method.
True
False

11. Backup media can include tape, hard drives, optical storage, and online storage.
True
False

12. When a user submits a maintenance request, the system administrator makes an initial
determination.
True
False

13. The systems support and _____ phase begins when a system becomes operational and
continues until the system reaches the end of its useful life.
implementation
verification
security
Testing

14. If significant changes take place in an existing system or if a new version is released, the IT
department might develop a _____.
user training package
user presence software
maintenance module
utility index
15. A _____ is a centralized resource staffed by IT professionals who provide users with the
support they need to do their jobs.
help desk
white spot
maintenance software module
utility point

A help desk, also called a service desk, is a centralized resource staffed by IT professionals
who provide users with the support they need to do their jobs.

16. _____ costs include expenses for items such as supplies and equipment rental.
Operational
Corrective
Maintenance
Adaptive

17. _____ expenses vary significantly during a system’s operational life and include spending to
support maintenance activities.
Secure
Maintenance
Principal
Capital

18. Corrective maintenance _____.


adds enhancements to an operational system and makes the system easier to use
diagnoses and corrects errors in an operational system
involves changing an operational system to make it more efficient, reliable, or maintainable
competes for resources in an operational system

19. Adaptive maintenance _____.


adds enhancements to an operational system and makes the system easier to use
diagnoses and corrects errors in an operational system
involves changing an operational system to make it more efficient, reliable, or maintainable
competes for resources in an operational system

20. Perfective maintenance _____.


adds enhancements to an operational system and makes the system easier to use
diagnoses and corrects errors in an operational system
involves changing an operational system to make it more efficient, reliable, or
maintainable
competes for resources in an operational system

21. To avoid problems, preventive maintenance _____.


adds enhancements to an operational system and makes the system easier to use
diagnoses and corrects errors in an operational system
involves changing an operational system to make it more efficient, reliable, or maintainable
requires analysis of areas where trouble is likely to occur

22. Many IT departments use a job title of _____ to designate positions that require a
combination of systems analysis and programming skills.
tester/programmer
strategist/analyst
programmer/analyst
designer/debugger

23. A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance


team.
tester
programmer
system validator
system administrator

24. _____ is the process of tracking system releases.


Configuration control
Version control
Source control
Quality control

25. A _____ is a formal reference point that measures system characteristics at a specific time.
feature line
baseline
product point
viewport

26. To measure system performance, companies use _____, which uses a set of standard tests
on one system to compare its performance and capacity to that of other systems.
metric analysis
benchmark testing
threat analysis
allocation testing

27. _____ is the overall time between a request for system activity and the delivery of the
response.
Response time
Throughput time
Refresh rate
Base rate
28. _____ measures the time between submitting a request for information and the fulfillment of
the request.
Bandwidth
Turnaround time
Throughput
Frequency

29. _____ is a process that monitors current activity and performance levels, anticipates future
activity, and forecasts the resources needed to provide desired levels of service.
Restructuring
Capacity planning
Resource sizing
Reorganizing

30. _____ protects information from unauthorized disclosure and safeguards privacy.
Availability
Integrity
Confidentiality
Accessibility

31. _____ prevents unauthorized users from creating, modifying, or deleting information.
Availability
Integrity
Confidentiality
Evacuation

32. _____ ensures that authorized users have timely and reliable access to necessary
information.
Availability
Integrity
Confidentiality
Concealability

33. _____ analyzes an organization's assets, threats, and vulnerabilities.


Risk uncertainty
Risk diversification
Risk identification
Risk control

34. _____ measures risk likelihood and impact.


Risk assessment
Risk marking
Risk identification
Risk control

35. A _____ is an internal or external entity that could endanger an asset.


proxy
facade
firewall
threat

36. A _____ is a security weakness or soft spot.


proxy
vulnerability
firewall
malware

37. A(n) _____ is an attack that takes advantage of a vulnerability.


proxy
exploit
firewall
archive

38. _____, a risk control strategy, eliminates risks by adding protective safeguards.
Avoidance
Acceptance
Conveyance
Transference

Critical Thinking Questions 12-1


George's firm contracts to provide risk management services for a wide range of smaller
companies that cannot provide the service for themselves. One of George's responsibilities at
the end of each month is to review the threats encountered by the companies and put them into
the appropriate categories.

39. One of his firm's clients details an incident in which a hacker — a former employee —
thieved trade secrets from the client and threatened to release them to the competition if he was
not paid. In which of the following categories should George place this incident?
Vandalism
Trespass and espionage
Extortion
Software attack

During extortion, a hacker steals trade secrets and threatens to release them if not paid.
40. Another of George's clients has software that is outdated and has become increasingly
vulnerable to attack. How does George categorize this threat?
Human error
Technical obsolescence
Service failure
Espionage

When outdated software is slow, difficult to use, and vulnerable to attacks, this indicates
technical obsolescence.

REFERENCES
https://quizlet.com/555575869/csit-241-chapter-12-quiz-flash-cards/
https://quizlet.com/351497134/chapter-12-flash-cards/
PRACTICE TEST 3: DATA DESIGN

1. In a table or file, each column represents a record and each row represents a field.
True
False

In a table or file, each column represents a field, or characteristic of the entity, and each row
represents a record, which is an individual instance, or occurrence of the entity.

2. A primary key is composed of exactly two fields.


True
False

A primary key is a field or combination of fields that uniquely and minimally identifies a particular
member of an entity. A primary key can be based on a single field or composed of two or more
fields.

3. Like a primary key, a foreign key must be unique.


True
False

Unlike a primary key, a foreign key need not be unique.

4. Field X is functionally dependent on field Y if the value of field X depends on the value of field
Y.
True
False

5. The basic elements of logical storage are alphabetic or numeric characters, such as the letter
A or the number 9.
True
False

6. Audit log files, which record details of all accesses and changes to a file or database, can be
used to recover changes made since the last backup.
True
False

7. Systems that interact with a DBMS are relatively independent of how the physical data is
maintained.
True
False
8. A secondary key is a field in one table that must match a primary key value in another table in
order to establish the relationship between the two tables.
True
False

A foreign key is a field in one table that must match a primary key value in another table in order
to establish the relationship between the two tables.

9. An M:N relationship is different from 1:1 or 1:M relationships because the event or transaction
that links the two entities is actually a third entity, called an associative entity, that has its own
characteristics.
True
False

10. College course numbers usually are assigned using a block sequence code.
True
False

11. A logical record is a set of field values that describes a single person, place, thing, or event.
True
False

12. A _____, which is a framework for organizing, storing, and managing data, consists of files
or tables that interact in various ways.
data structure
data roster
data object
data log

13. A(n) _____ is a collection of tools, features, and interfaces that enables users to add,
update, manage, access, and analyze data.
data logger framework
database management system
integrated development environment
advanced host controller system

14. _____ means that a system can be expanded, modified, or downsized easily to meet the
rapidly changing needs of a business enterprise.
Scalability
Compatibility
Cardinality
Functionality
15. Typically, a database management system is managed by a person called a _____, who
assesses overall requirements and maintains the database for the benefit of an entire
organization rather than a single department or user.
database administrator
business intelligence analyst
database consumer
big data analyst

16. A(n) _____ allows a user to specify a task without specifying how the task will be
accomplished.
procedural language
query by example language
query language
imperative language

17. With a _____, users provide an example of the data requested.


query language
data table
query by example language
data frame

18. A _____ controls database operations, including storing, retrieving, updating, and deleting
data.
data manipulation language
data device language
data definition language
data query language

19. The complete definition of a database, including descriptions of all fields, tables, and
relationships, is called a _____.
viewport
schema
framework
cell

20. During the systems design phase, _____ are used to organize, access, and maintain data
structures.
glossary fields
common fields
content fields
key fields

21. In the accompanying figure, a _____ is a field or combination of fields that uniquely and
minimally identifies a particular member of an entity.
primary key
secondary key
candidate key
foreign key

22. In the accompanying figure, any field that serves as a primary key is called a _____.
candidate key
secondary key
combination key
foreign key

23. In the accompanying figure, a _____ is a field in one table that must match a primary key
value in another table in order to establish the relationship between the two tables.
secondary key
candidate key
combination key
foreign key

24. If a primary key combines two or more fields, then it is called a _____.
foreign key
composite key
dedicated key
candidate key

25. A _____, which is not unique, is a field or combination of fields that can be used to access
or retrieve records.
no-frills key
super key
secondary key
foreign key

26. One type of validity check, called _____, is a set of rules that avoids data inconsistency and
quality problems.
candidate integrity
foreign integrity
referential integrity
combinatorial integrity

27. A(n) _____ is a graphical model of an information system that depicts the logical
relationships and interaction among system entities.
entity-relationship diagram (ERD)
illustration flow chart
query relationship diagram (QRD)
data chart
28. In an entity-relationship diagram, entities are commonly represented as _____.
triangles
circles
rectangles
hexagons

29. _____ describes the numeric relationship between two entities and shows how instances of
one entity relate to instances of another entity.
Scalability
Compatibility
Cardinality
Functionality

30. A common method of cardinality notation is called _____ because of the shapes, which
include circles, bars, and symbols that indicate various possibilities.
big O notation
dark resistor’s notation
crow's foot notation
hash topology notation

31. _____ is the process of creating table designs by assigning specific fields or attributes to
each table in a database.
Encapsulation
Normalization
Abstraction
Encryption

32. A _____ specifies the fields and identifies the primary key in a particular file.
frame design
table design
viewport
window

33. A table is in _____ if it does not contain a repeating group.


second normal form
first normal form
third normal form
fourth normal form

34. A table is in _____ if it is in first normal form and if all fields that are not part of the primary
key are functionally dependent on the entire primary key.
second normal form
zeroth normal form
third normal form
fourth normal form

35. A _____ is a set of letters or numbers that represents a data item.


business glossary
data dictionary
mnemonic
code

36. Some abbreviation codes are called _____ codes because they use a specific combination
of letters that are easy to remember.
harmonic
sequence
mnemonic
rhapsodic

37. _____ is an integrated collection of data that can include seemingly unrelated information,
no matter where it is stored in the company.
A data warehouse
A data frame
Pseudo-data
Metadata

38. _____ is designed to serve the needs of a specific department, such as sales, marketing, or
finance.
A data mart
A data frame
Pseudo-data
Metadata

39. _____ is strictly hardware related because it involves the process of reading and writing
binary data to physical media, such as a hard drive, CD/DVD, or network-based storage device.
Logical storage
Virtual storage
Simulated storage
Physical storage

40. _____ is the process of converting readable data into unreadable characters to prevent
unauthorized access to the data.
Encapsulation
Normalization
Standardization
Encryption
REFERENCES
https://quizlet.com/341165993/ch-9-data-design-flash-cards/
https://quizlet.com/280989742/chapter-9-flash-cards/
https://quizlet.com/172892716/ics-123-flash-cards/
https://quizlet.com/24821003/chap-9-flash-cards/
PRACTICE TEST 4: USER INTERFACE DESIGN

1. An interface designer does not need to understand the underlying business functions or how
the system supports individual, departmental, or enterprise goals.
True
False - they should think like a user and understand business functions

The interface designer must understand the underlying business functions and how the system
supports individual, departmental, and enterprise goals.

2. To develop a user-centered interface, a designer must learn to think like a user and see the
system through a user’s eyes.
True
False

3. Interface design should call for attention to the interface, rather than facilitating design
objectives.
True
False - design objectives should take precedence over the interface

4. User-selected help always offers assistance for a task in progress.


True
False - this is context-sensitive help

User-selected help displays information about any task when the user requests it.

5. To create an attractive user interface layout and design, when the user enters data that
completely fills the field, the data must move automatically to the next field.
True
False - users should be active in their use of the interface, this doesn't follow that
principle

When the user enters data that completely fills the field, do not move automatically to the next
field. Instead, require the user to confirm the entry by pressing the Enter key or Tab key at the
end of every fill-in field.

6. Every page in a report should include a page header, which appears at the top of the page
and includes the column headings that identify the data.
True
False
7. Using batch input, data entry is performed continuously.
​True
False - batch input is when info is entered on a specified time schedule (daily, weekly,
monthly, or longer

8. Sensitive data can be encrypted, or coded, so only users with decoding software can read it.
True
False

9. A combination check is a data validation rule that tests to ensure that a data item fits the
required data type.
True
False - data type check

10. Centralized IT departments no longer produce reams of printed reports.


True
False

11. Most users work with a varied mix of input, screen output, and data queries as they perform
their day-to-day job functions.
True

False

12. Human-computer interaction (HCI) describes the relationship between computers and the
people who use them to perform their jobs.
True
False

13. From a user’s viewpoint, coding is the most critical part of the system design.
True
False

From a user’s viewpoint, the interface is the most critical part of the system design.

14.The storyboard should be created with software, not drawn freehand.


True
False

15. All screen designs should be documented for later use by programmers.
True
False

16. The interface is where a user interacts with the system.


True
False

17. A natural language feature requires users to type commands or requests in programming
code using a set of instructions and symbols.
True
False

A natural language feature allows users to type commands or requests in normal text phrases.

18. Prototypes and mock-ups can be used to obtain feedback throughout the design process.
True
False

19. In very complex systems, the prototype can become unwieldy and difficult to manage.
True
False

20. A secure system includes _____ that can log every instance of data entry and changes.
audit trails
trap trails
batch trails
control trails

21. Apple was a pioneer in user interface development, introducing the _____, complete with
mouse and screen icons, in the early 1980s.
command line interface
binary line interface
character user interface
graphical user interface

22. A user interface (UI) is the key to _____, which includes user satisfaction, support for
business functions, and system effectiveness.
testability
usability
encapsulation
abstraction

23. In older systems, often the user interface mainly consisted of _____ screens that allowed a
user to send commands to the system.
physical-control
process-control
quality-control
network-control

When developing older systems, analysts typically designed all the printed and screen output
first and then worked on the inputs necessary to produce the results. Often, the user interface
mainly consisted of process-control screens that allowed the user to send commands to the
system.

24. In a _____ system, the distinction blurs between input, output, and the interface itself.
user-centered
topology-centered
system-centered
network-centered

25. _____ describes the relationship between computers and the people who use them to
perform their jobs.
Human-computer interaction (HCI)
Peripheral component interconnect (PCI)
Media control interaction (MCI)
Peripheral connect (PC)

26. A _____ language feature allows users to type commands or requests in normal text
phrases.
normal
natural
standard
basal

27. A(n) _____ is a data validation rule that can be used for data items that must have certain
values.
existence check
validity check
batch check
reasonableness check

28. The term "_____" is familiar to IT professionals, who know that the best time to avoid
problems is when the data is entered.
good input, bad output (GIBO)
garbage in, garbage out (GIGO)
poor start, poor finish (PSPF)
weak hand, weak hold (WHWH)
29. A _____ collects input data, triggers or authorizes an input action, and provides a record of
the original transaction.
transaction document
recovery document
source document
tester document

30. In a source document, the _____ contains codes, identification information, numbers, and
dates that are used for storing completed forms.
control zone
heading zone
totals zone
authorization zone

31. In a source document, the _____ contains any required signatures.


control zone
authorization zone
totals zone
heading zone
32. A(n) _____ produces one or more lines of output for each record processed.
detail report
exception report
summary report
exigency report

33. For upper-level managers who often want to see total figures and do not need supporting
details, a(n) _____ is appropriate.
detail report
exception report
summary report
exigency report

Critical Thinking Questions


34. Betty has a number of report templates at her disposal filed in folders to respond to her
boss's requests. In order to know where to find a report that meets the needs of her manager,
she first needs to know what category of report will satisfy the request.

Betty's lead needs to get a report of all of the purchases made only by his employees, using
their employee discount, in a given week. In which of the following folders is she likely to find
this category of report?
Exception reports
Summary reports
Detail reports
Control reports
An exception report displays only those records that meet a specific condition or conditions.

35. Betty's manager wants to see just the total sales figures without many of the supporting
details. In which of the following folders is she likely to find this category of report?
Exception reports
Summary reports
Detail reports
Control reports

36. List at least six guidelines for creating an interface that is easy to learn and use.

● Focus on system design objectives rather than on the interface


● Create a memorable design that is easy to understand
● All controls, buttons, and icons must be clearly labelled
● Users must be allowed to correct errors easily.
● Users must be able to navigate the system easily, perform actions, or return to any level
in the menu structure
● Create a design with consistent visual elements for ease of use.

37. Briefly describe (including examples in your answer) at least six of the types of data
validation rules used in the input process.

● Completeness check: ensures that all required data have been entered. For instance, a
form will not be processed and will be returned to the user if any required information is
missing.
● Format check: ensures that data are of the right format (e.g., MM/DD/YYYY) or the right
type (e.g., numeric or alphanumeric). For example, numeric fields will not permit users to
type text data or the entered data must be checked to make sure it is numeric.
● Range check: used to verify that numeric data falls between a specified minimum and
maximum value. For example, rejecting birthdates prior to 1790 because people do not
live for more than 200 years.
● Validity check: ensures that data items have certain values
● Combination check: this is performed on two or more fields to ensure consistency or
reasonableness when considered together
● Sequence check: used when data must be in a predetermined sequence

38. Describe the characteristics of a detail report.


A detail report lists detailed information about the items requested by a user. This is
usually made only in responding to a query about items matching some criteria. A detail report
is commonly read cover to cover to have a full understanding of one or more items.

39. Explain how podcasts are used for sales and marketing.
Using podcasts for sales and marketing is a way of promoting and selling a product or
service through audio content. This is where the podcaster(s) share the brand's story to reach
new audiences and promote word-of-mouth marketing. Podcasts cover a lot and a wide range
of topics and interests. Their goal, in the context of sales and marketing, is to allow brands to
tailor their content to their target audiences who have an interest in their offerings.

40. Give some examples of how the user interface continues to evolve.
One common example is the use of mobile devices, such as smartphones and tablets.
With the use of such devices, people become open or exposed to a range of gestures, such as
the difference between a tap, a long tap, and pinching in and pinching out to zoom in and out of
images, websites, and maps.

REFERENCES
https://quizlet.com/577990373/isa-387-ch-8-flash-cards/
https://quizlet.com/547504206/csit-241-chapter-8-flash-cards/
https://quizlet.com/679545806/chapter-8-flash-cards/
https://quizlet.com/198472971/systems-analysis-dr-wilson-exam-3-flash-cards/
https://quizlet.com/289048213/chap-3-14-flash-cards/
https://www.flux-academy.com/blog/introduction-to-user-interface-design-6-important-principles
https://quizlet.com/789109423/chapter-8-flash-cards/
https://www.toptal.com/designers/ui/touch-the-world-is-our-interface#:~:text=The%20evolution%
20of%20UI%20design%20can%20be%20broken%20down%20into,and%20technology%20has
%20become%20essential.

You might also like