Sie sind auf Seite 1von 2

Chapter Reinforcement Solutions Chapter 1 Chapter 1 page # Chapter 1 Chapter 1 page # Chapter 2 Chapter 2 page # Chapter 2 Chapter 2 page

# Chapter 3 Chapter 3 page # Chapter 3 Chapter 3 page # Chapter 4 Chapter 4 page # Chapter 4 Chapter 4 page # Chapter 5 Chapter 5 page # Chapter 5 Chapter 5 page # Chapter 6 Chapter 6 page # Chapter 6 Chapter 6 page # Chapter 7 Chapter 7 page # Chapter 7 Chapter 7 page # Chapter 8 Chapter 8 page # Chapter 8 Chapter 8 page # Chapter 9 Chapter 9 page # Chapter 9 Chapter 9 page # Chapter 10 Chapter 10 page # Chapter 10 Chapter 10 page # Chapter 11 Chapter 11 page # Chapter 11 Chapter 11 page # Chapter 12 Chapter 12 page # Chapter 12 Chapter 12 page #

Chapter 1
1. information system 2. mission-critical system 3. Data 4. business process 5. business process modeling notation 6. Enterprise computing 7. Groupware 8. inference rules 9. interactive 10. requirements modeling

True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice True / False True / False Multiple Choice Multiple Choice page # 7 7 7 10 10 15 17 17 21 23 page # 68 73 60 55 81 74 68 70 67 74 page # 103 104 105 111 111 113 121 122 114 118 page # 142 143 150 151 155 151 142 153

1 F 4 c 24 T 52 b 52 T 102 a 103 T 139 a 142 T 220 a 209 F 251 a 250 F 287 a 287 T 354 a 358 F 399 a 394 F 452 c 454 F 508 a 515 T 574 d 572

2 F 7 a 27 F 53 c 54 F 103 c 106 F 142 c 142 T 221 b 211 F 256 c 250 T 290 c 289 F 371 b 352 T 394 b 394 T 456 d 457 F 514 b 514 F 577 b 575

3 T 7 d 28 F 54 d 59 T 106 b 124 F 143 b 143 F 224 c 212 F 262 b 250 F 293 b 290 F 352 c 371 F 395 d 398 F 460 a 460 T 515 c 514 F 583 c 582

4 F 7 b 28 T 55 a 60 F 107 a 105 T 144 d 150 T 224 d 212 T 263 d 254 T 291 b 291 T 348 d 348 T 401 c 399 T 464 b 464 T 525 d 515 T 585 b 585

5 T 8 b 32 F 56 c 63 T 105 c 105 F 145 d 159 T 225 d 213 T 250 a 255 F 293 d 294 T 346 a 343 F 395 b 433 F 470 a 472 F 515 a 516 T 590 a 587

6 F 9 c 26 F 59 d 63 F 113 d 110 T 146 b 160 F 225 c 217 T 259 c 258 T 306 a 312 F 348 c 348 T 422 a 411 F 472 c 479 F 514 b 521 F 594 a 592

7 T 12 b 19 T 60 a 67 F 116 c 113 T 149 a 165 F 225 b 217 F 256 d 258 T 297 a 306 T 368 b 361 F 402 c 407 T 478 d 480 T 525 c 525 F 599 d 597

8 F 14 d 22 T 62 b 67 F 106 d 121 F 151 c 169 T 226 d 217 T 250 a 260 F 299 b 305 T 360 a 367 T 402 b 424 F 479 a 483 T 543 d 525 T 601 c 604

9 F 14 c 20 F 63 d 68 T 122 c 121 F 154 b 169 T 230 a 219 T 259 c 262 T 297 a 312 F 367 d 363 F 423 a 432 T 477 d 485 T 545 a 526 T 606 b 608

10 T 24 a 19 T 69 b 73 T 104 d 118 T 159 a 173 F 231 b 220 F 266 d 264 F 318 c 315 F 361 c 371 T 434 d 435 T 482 b 486 T 534 b 537 F 609 a 611

Chapter 2
1. Tangible 2. fishbone 3. Biometric 4. mission statement 5. case for action 6. scope 7. Economic 8. discretionary 9. Technical 10. creep

Chapter 3
1. reporting 2. Gantt 3. Path 4. dependent 5. concurrent 6. critical 7. risk 8. response 9. structured 10. Open-source

Chapter 4
1. 2. 3. 4. 5. 6. 7. 8. Security Agile functional decomposition data flow indirect actor Processes system requirement

9. systematic 10. histogram

168 171 page # 198 198 200 201 202 203 205 205 205 208 page # 251 250 250 250 256 263 262 250 264 254 page # 297 289 291 293 312 315 303 299 307 315 page # 350 352 358 348 368 345 368 367 363 372 page # 392 392 395 399 400 398 424 412 413 402 page # 456 459 461 464 470 475 480 481 483 484 page # 547 546 544 537 534 529 526 525 516 519 page # 575 578 584 586 591 595 599 601 607 611

Chapter 5
1. logical model 2. physical model 3. process 4. business logic 5. data flow 6. black hole 7. terminators 8. source 9. sink 10. context diagram

Chapter 6
1. class 2. message 3. object 4. model 5. subclass 6. Cardinality 7. class diagram 8. method 9. sequence 10. state

Chapter 7
1. help desk 2. Cloud computing 3. application service provider (ASP) 4. value-added reseller (VAR) 5. systems design 6. prototype 7. evaluation model 8. Payback 9. license 10. design

Chapter 8
1. turnaround 2. character-based 3. microfilm 4. menu bar 5. batch 6. Context-sensitive 7. Hash 8. range 9. Data capture 10. encryption

Chapter 9
1. data structure 2. file-oriented system 3. database administrator 4. browser 5. protocols 6. Open database connectivity 7. Action 8. first normal form 9. functionally 10. candidate

Chapter 10
1. scalability 2. data processing center 3. client/server 4. thin client 5. portal 6. batch 7. switch 8. router 9. access point 10. peer-to-peer

Chapter 11
1. post-implementation 2. phased operation 3. direct cutover 4. tutorial 5. test 6. patches 7. Integration testing 8. Logic errors 9. Cohesion 10. Attributes

Chapter 12
1. Corrective 2. System administrator 3. baseline 4. Bandwidth 5. exploit 6. uninterruptible 7. firewall 8. Malware 9. Recovery 10. credentials

Das könnte Ihnen auch gefallen