Answer the following statements true (T) or false (F)

1. In the third phase of the systems development life cycle, analysts can use data flow diagrams to chart the input, processes, and output of the business functions.
2. The three major tools for analyzing structured decisions are structured English, decision tables, and decision trees.
3. In the design phase of the SDLC, the systems analyst uses the information collected earlier to accomplish the logical design of the information system.
4. After a system is implemented, businesses spend little money on system maintenance.
5. CASE tools were created explicitly to improve an analyst's routine work through the use of automated support.


1. TRUE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

When you derive a class from an existing class, you

A) can add new data, but cannot add new functions. B) can add new functions, but cannot add new data. C) can add both new data and new functions. D) must add both new data and new functions. E) None of the above

Computer Science & Information Technology

The extraction operator used with cin is ____.

A. << B. >> C. , D. <>

Computer Science & Information Technology

Revision marks made directly on a document using a stylus are called:

A) direct markup. B) direct markings. C) ink. D) inked markings.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The IDS component responsible for collecting data is the user interface. 2. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. 3. The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts. 4. Signature-based approaches attempt to define normal, or expected, behavior, whereas anomaly approaches attempt to define proper behavior. 5. Anomaly detection is effective against misfeasors.

Computer Science & Information Technology