BTMA 317
Which of the following is considered a technical architecture for a proposed system? a) A description of the needed hardware, software, and telecommunications equipment b) A drawing or graphical representation of the proposed system including proposed screens, reports, software, and databases c) A logical model that defines the structure of needed modules and sub modules and their interrelationships d) The needed data structures, definitions and business rules
a) A description of the needed hardware, software, and telecommunications equipment
Which of the following is not one of the rules of normalization? a) Assure that the operating version of your relational database is consistent throughout the organization b) Eliminate repeating groups or many-to-many relationships c) Assure that each field in a relation depends only on the primary key for that relation d) Remove all derived fields from the relations
a) Assure that the operating version of your relational database is consistent throughout the organization
Which of the following is not one of the rules of normalization? a) Assure that the operating version of your relational database is consistent throughout the organization b) Eliminate repeating groups or many-to-many relationships c) Assure that each field in a relation depends only on the primary key for that relation d) Remove all derived fields from the relations
a) Assure that the operating version of your relational database is consistent throughout the organization The other 3 are rules for normalization
Who, among the following, is responsible for overseeing the underlying IT infrastructure within an organization? a) CTO b) CSO c) CIO d) CPO
a) CTO CTO (chief technology officer) is responsible for overseeing both the underlying IT infrastructure within an organization and the user-facing technologies (such as CRM systems).
Which symbol would you use in an E-R diagram to show that a student may or may not enroll in a course? a) Circle b) Square c) Arrow d) Straight, vertical line
a) Circle
A database management system contains five important software components. Which of the following components accepts and processes requests from the other four database components? a) DBMS engine b) Data definition subsystem c) Data manipulation subsystem d) Data administration subsystem
a) DBMS engine The DBMS engine accepts logical requests from the various other DBMS subsystems, converts them into their physical equivalent, and actually accesses the database and data dictionary as they exist on a storage device.
Where does the information about field format and file sizes get stored in Microsoft Access? a) Data dictionary b) Field view c) Field properties d) Table view
a) Data dictionary
Where does the information about a field (e.g., size, type, decimals) get stored in Microsoft Access? a) Data dictionary b) Field view c) Field properties d) Table view
a) Data dictionary The data dictionary contains the logical structure for the information in a database. It includes a description of each relation (also called a table or file) and each piece of information in each relation.
What is the first step in designing and building a database? a) Defining entity classes and primary keys b) Defining relationships among entity classes c) Defining information for each relation d) Defining the maintenance cycle for future enhancements
a) Defining entity classes and primary keys
Which of the following tasks do you need to be careful of, when making changes to the information in any of the relations (tables or files) of the database structure? a) Deleting fields which establish relationships to other tables b) Adding additional information in the tables c) Deleting records in a relation d) Changing records in a relation
a) Deleting fields which establish relationships to other tables If you want to change the information in any of the relations or the structure of any of the relations, you can do so quite easily. However, you need to be careful about deleting fields that you used to establish relationships between pairs of tables.
During which phase of the decision making process do you develop all the possible solutions you can? a) Design b) Intelligence c) Choice d) Implementation
a) Design
The primary goal of which phase in the SDLC is to build a technical blueprint of how the proposed system will work a) Design b) Planning c) Analysis d) Development
a) Design
Which of the following is true of an information-literate knowledge worker? a) He or she knows how and where to obtain information b) He or she cannot define the information needed c) He or she understands the information before it is received d) He or she can transform business intelligence into information
a) He or she knows how and where to obtain information An information-literate knowledge worker can define what information is needed, knows how and where to obtain information, understands the information once it is received (i.e., can transform the information into business intelligence), and can act appropriately based on the information to help the organization achieve the greatest advantage.
_____ is the process of assuring that a relational database structure can be implemented as a series of two-dimensional relations or tables a) Normalization b) Standardization c) Planning d) Cross-functional modeling
a) Normalization
If you were to allow only a select group of people to use the new system so that you could determine if it was working correctly, what type of implementation method would you be following? a) Pilot implementation b) Parallel implementation c) Plunge implementation d) Phase implementation
a) Pilot implementation
When defining a database structure, what does Access default to when identifying the first field? a) Primary key b) Composite key c) Integrity key d) Foreign key
a) Primary key
Which of the following occurs when the scope of the project increases beyond its original intentions? a) Scope creep b) Feature creep c) Milestone d) Rolling stone
a) Scope creep
Which symbol would you use in an E-R diagram to show that a course is taught by only one teacher? a) Straight, vertical line b) Crow's foot c) Solid arrow d) Circle
a) Straight, vertical line
Which of the following activities tracks inventory and information among business processes and across companies? a) Supply chain management (SCM) b) Enterprise resource management (ERM) c) Business intelligence (BI) d) Distribution information systems (DIS)
a) Supply chain management (SCM)
_____ is a form of XP, which aims for customer satisfaction through early and continuous delivery of useful software components a) The agile methodology b) The service-oriented architecture c) Vista d) Macintosh
a) The agile methodology
Why would you define business rules for a database? a) To help define the correct structure of your database b) To ensure smooth transfer of files containing information c) To ensure that information is entered into the database correctly d) To ensure that information is maintained properly
a) To help define the correct structure of your database
The waterfall methodology is a) a sequential, activity-based process in which one phase of the SDLC is followed by another b) an assessment methodology that ensures quality applications c) an outsource development methodology to information systems d) a process management technique that identifies and includes end users and management in the SDLC
a) a sequential, activity-based process in which one phase of the SDLC is followed by another
The Web 2.0: a) is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services b) is a computer network consisting of a collection of internet sites that offer text and graphics and sound and animation resources through the hypertext transfer protocol c) is a reference that points to a whole document or to a specific element within a document d) is a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
a) is a technology that focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services Social media is fueled by Web 2.0 technologies. The Web 2.0 is the so-called second generation of the Web and focuses on online collaboration, users as both creators and modifiers of content, dynamic and customized information feeds, and many other engaging Web-based services.
When defining information (fields) for a relation, you should ensure that a) the information for this relation cannot be derived from other information b) the information for this relation can be found in other relations c) the information can be identified by the primary key and by other fields in the relation d) the information can be identified by the foreign key in this relation
a) the information for this relation cannot be derived from other information
According to Porter's model, when there are many alternative products or services to the ones your business provides: a) threat of substitute products or services is high b) supplier power is high c) buyer power is low d) threat of substitute products or services is low
a) threat of substitute products or services is high The threat of substitute products or services in the Five Forces Model is high when there are many alternatives to a product or service, and low when there are few alternatives from which to choose.
Which phase in the SDLC involves end users and IT specialist working together to gather, understand, and document the business requirements for the proposed system? 1) Initiation 2) Planning 3) Design 4) Analysis
4) Analysis
If you were developing marketing strategies and you decided to create a database that tracked the progress of your marketing efforts, what kind of development would you be engaging in? a) Outsourcing b) Netsourcing C) Selfsourcing d) Insourcing
C) Selfsourcing
_____ defines and develops the project plan, and tracks the plan to ensure that all key project milestones are completed on time. a) An end user b) A project manager c) A project executive d) An IT Administrator
b) A project manager
_____ are statements concerning the information you need to work with and the relationships within the information. a) Entity classes b) Business rules c) Instances d) Foreign keys
b) Business rules
Who, among the following, is responsible for ensuring that information is used in an ethical way? a) CIO b) CPO c) CTO d) CSO
b) CPO CPO (chief privacy officer) is responsible for ensuring that information is used in an ethical way and that only the right people have access to certain types of information such as financial records, payroll, and health care.
Which phase of the decision making process involves examining and weighing the merits of solutions, estimating the consequence of each, and choosing the best solution? a) Implementation b) Choice c) Intelligence d) Design
b) Choice
Which of the following DBMS components allows you to add, change, and delete information in a relational database? a) Data definition subsystem b) Data manipulation subsystem c) Data administration subsystem d) Application generation subsystem
b) Data manipulation subsystem
When you're creating relationships, what Access option allows you to protect your database from inconsistent data? a) Create Integrity Constraint b) Enforce Referential Integrity c) Cascading Rules d) Link Keys
b) Enforce Referential Integrity By turning on the enforcement of referential integrity, your DBMS will make sure that when you enter a foreign key in a relation it matches one of the primary keys in the other relation.
Which of the following is false about primary keys? a) Primary keys identify each record/row in a database table uniquely. b) Every primary key of your database must be a foreign key of some table in your database. c) Primary keys must contain unique values and must not be null. d) A primary key for a table may consist of multiple fields/columns.
b) Every primary key of your database must be a foreign key of some table in your database.
Which of the following methodologies breaks a project into tiny phases; programmers must develop the code for each phase before they can continue to the next phase? a) Project milestones b) Extreme programming c) Operational prototyping d) Design and build prototyping
b) Extreme programming
Which of the following occurs when developers and end users add extra features that were not part of the initial requirements? a) Scope creep b) Feature creep c) Milestone d) Rolling stone
b) Feature creep
If the marketing department were to pass information to the finance department, what type of information flow is this called? a) Downward b) Horizontal c) Upward d) Outward
b) Horizontal Information is said to flow horizontally when shared between functional business units and work teams.
Which of the following is a potential risk of selfsourcing? a) Reduced technological know-how for future innovation b) Lack of documentation and external support leads to short-lived systems c) Reduced degree of control d) Increased dependency on outside organizations
b) Lack of documentation and external support leads to short-lived systems
Allmart is a retail store chain with branches in more than 20 states in the US. They are planning to change their ERP software to a more retail management-specific one. Which of the following ERP vendors would best suit Allmart? a) SAP b) Microsoft c) Oracle d) Infor
b) Microsoft Each vendor has a specialty in one particular module area such as SAP in logistics, Oracle/PeopleSoft in financials, Infor in manufacturing, and Microsoft in retail management.
There are four main types of decisions. Which type of decision is also called an ad hoc decision? a) Nonstructured b) Nonrecurring c) Structured d) Defined
b) Nonrecurring
Which of the following phrases would indicate that you are entering information into a database table? a) Appending the table b) Populating the table c) Colonizing the table d) Inhibiting the table
b) Populating the table
Which of the following is a disadvantage to prototyping? a) Prototyping does not encourage active user participation b) Prototyping does not give an indication of performance under operational conditions c) Prototyping does not help determine technical feasibility d) Prototyping does not help resolve discrepancies among users
b) Prototyping does not give an indication of performance under operational conditions
To ensure that the newly developed information systems functions properly, what should you create that lists the expected steps that the system should perform and expected results from these steps? a) Requirement documents b) Test conditions c) Design specifications d) Logical design specifications
b) Test conditions
In relation to SCM, what is an information partnership? a) Sharing production information with potential customers b) Two or more companies cooperating by integrating their IT systems c) Competitive suppliers providing production schedules to the manufacturer d) Functional areas within your business sharing information
b) Two or more companies cooperating by integrating their IT systems Information partnership refers to two or more companies cooperating by integrating their IT systems, thereby providing customers with the best of what each can offer.
A composite primary key is: a) a merged field containing the primary key and descriptive information b) a key in the intersecting relation that contains the primary keys from the two intersecting relations c) a field composed of information from multiple sources d) a unique field that can be used throughout the organization to identify an entity
b) a key in the intersecting relation that contains the primary keys from the two intersecting relations
A project scope document is a) a document that outlines the project's strategy, the responsibilities of project team members, and the assessment measures that will determine the rate of success b) a one-paragraph statement about the scope of the proposed project c) a detailed document identifying the goals, scope and strategy for the proposed project d) a document that identifies the parameters or boundaries of the proposed system and how it fits into existing systems
b) a one-paragraph statement about the scope of the proposed project
The systems development life cycle (SDLC) is a) a method for testing new IT applications b) a structured approach for developing information systems c) the analysis and assessment tasks that need to be completed when designing and developing information systems d) a set of guidelines that an end user follows when developing their own business applications
b) a structured approach for developing information systems
A _____ is a special form of a database that contains information gathered from operational databases for the purpose of supporting decision-making tasks. a) data mine b) data warehouse c) data dictionary d) data entry
b) data warehouse
A(n) _____ is a relation you create to eliminate a many-to-many relationship. a) complex relation b) intersection relation c) query-by-example d) integrity constraint
b) intersection relation
If you were able to quickly pull information from student records with course records to build students' schedules, you would be using a _____ tool. a) data administration b) query-by-example c) data definition d) data manipulation
b) query-by-example Query-by-example (QBE) tools help you graphically design the answer to a question
Business requirements are a) the strategic and tactical goals that a business establishes for itself that software must align with b) the detailed set of requests that the proposed information system must meet to be successful c) the planning documents identifying the characteristics and functionality of the proposed information system d) the logical designs for the proposed information system
b) the detailed set of requests that the proposed information system must meet to be successful
When you drag and drop a primary key onto a foreign key, what relationship does Microsoft Access assume it to be? a) 1:1 b) M:M c) 1:M d) M:N
c) 1:M When you drag and drop a primary key onto a foreign key, Microsoft Access assumes that the relationship is one-to-many (1:M)
What is a primary key? a) The password used to protect a database b) A collection of information that you organize and access according to the logical structure of that information c) A field or group of fields that uniquely describes each record in a database d) The authorization key that establishes the usage rights for the database
c) A field or group of fields that uniquely describes each record in a database
What is the difference between an expert system and a genetic algorithm? a) An expert system uses a genetic algorithm to assist in understanding the problem. b) An expert system provides more accurate solutions than a genetic algorithm. c) A genetic algorithm provides you with (approximately) the best solution; an expert system applies reasoning capabilities to reach a conclusion. d) Expert systems belong in the category of artificial intelligence; genetic algorithms work with large database and warehouse systems that are not considered artificially intelligent.
c) A genetic algorithm provides you with (approximately) the best solution; an expert system applies reasoning capabilities to reach a conclusion.
What happens when you attempt to input incorrect information into a field that has an Enforce Referential Integrity option in effect? a) Access automatically gives you a choice of file menus to correct the problem b) Access will automatically shut down c) Access will display a dialog box informing you of the problem d) Access will accept the information but warn you that there might be a problem
c) Access will display a dialog box informing you of the problem When you attempt to input incorrect information into a field that has an Enforce Referential Integrity option in effect, Access will display a dialog box informing you of the problem.
_____ is responsible for overseeing every aspect of an organization's information resource a) CTO b) CPO c) CIO d) CSO
c) CIO
_____ is responsible for the development and use of firewalls, intranets, extranets, and anti-virus software a) CIO b) CPO c) CSO d) CTO
c) CSO
A database management system contains five important software components. Which of the following components allows you to create and maintain the data dictionary? a) Application generation subsystem b) Data manipulation subsystem c) Data definition subsystem d) Data administration subsystem
c) Data definition subsystem The data definition subsystem of a DBMS helps you create and maintain the data dictionary and define the structure of the files in a database.
Before information can be entered into a database, what is the first step you need to do? a) Determine all the queries to be made. b) Determine who will have access to the information c) Define the correct structure of the database d) Establish user responsibility
c) Define the correct structure of the database
To change the structure of a relation (table or file), what needs to be open in Microsoft Access? a) Datasheet View b) Pivot Table View c) Design View d) Field View
c) Design View
Where do you turn on the "Enforce Referential Integrity" option in Access? a) Field Properties b) Table Properties c) Edit Relationships d) Constraints
c) Edit Relationships
What is the difference between front and back office systems? a) Front office systems are external systems; back office systems are internal b) Front office systems are Web based; back office systems are built on database systems c) Front office systems process information in the beginning of a customer's transaction; back office systems process information at the end of the customer's transaction d) Front office systems focus on getting the sale; back office systems focus on follow-up
c) Front office systems process information in the beginning of a customer's transaction; back office systems process information at the end of the customer's transaction The front office systems are the primary interface to customers and sales channels; they send all the customer information they collect to the database. The back office systems are used to fulfill and support customer orders and they also send all their customer information to the database. The CRM system analyzes and distributes the customer information and provides the organization with a complete view of each customer's experience with the business.
What is the first step in the prototyping process? a) Revise and enhance the prototype b) Develop initial prototype c) Identify basic requirements d) End user reviewing
c) Identify basic requirements
Which phase of the decision making process involves carrying out the chosen solution, monitoring the results, and making adjustments as necessary? a) Choice b) Execution c) Implementation d) Maintenance
c) Implementation
Which type of constraint ensures the quality of information in a relational database? a) Environmental constraint b) Business constraint c) Integrity constraint d) Production constraint
c) Integrity constraint
What are rules that help ensure the quality of information? a) Information assurance b) Composite constraints c) Integrity constraints d) Quality control
c) Integrity constraints
Games where thousands or millions of people play and interact in a robust virtual world are known as: a) social networking b) social shopping c) MMORPGs d) multi-player gaming
c) MMORPGs (Massively multiplayer online role-playing games)
If you were using your iPad and it was analyzing and reacting to every word you typed on the pad, what type of system would you be using? a) Handwriting analysis b) Expert system c) Neural network d) Knowledge management system
c) Neural network
If you were to implement the new system while the existing system continued to run, what type of implementation method would you be following? a) Pilot implementation b) Phase implementation c) Parallel implementation d) Plunge implementation
c) Parallel implementation
_____ is the process of building a model that demonstrates the features of a proposed product, service, or system a) RAD b) XP c) Prototyping d) Modeling
c) Prototyping
Which type of database model organizes and accesses information according to its logical structure rather than its physical structure? a) Hierarchical b) File-based c) Relational d) Conventional
c) Relational Using the relational database model, you organize and access information according to its logical structure, not its physical position.
_____ is a formal document that describes in detail your logical requirements for a proposed system and invites vendors to submit bids for its development: a) Requirements document b) Design specification c) Request for proposal (RFP) d) Project scope document
c) Request for proposal (RFP)
_____ is an approach in which you allocate in terms of percentages how you will spend your IT dollars on various types of business strategies. a) Tactical information planning (TIP) b) Strategic technology planning (STP) c) Run-grow-transform (RGT) framework d) Transforming IS strategy (TISS)
c) Run-grow-transform (RGT) framework A helpful conceptual framework for viewing the bigger organizational picture and determining the use of IT in it is the run-grow-transform (RGT) framework, an approach in which you allocate in terms of percentages how you will spend your IT dollars on various types of business strategies.
What is the difference between insourcing and selfsourcing? a) Selfsourcing requires the use of internal consultants; insourcing requires staff from the IT department b) Selfsourcing is self-regulating; insourcing requires internal quality controls c) Selfsourcing allows for end user development; insourcing requires internal IT staff d) Selfsourcing allows for one person to complete the systems development life cycle; insourcing is a team effort
c) Selfsourcing allows for end user development; insourcing requires internal IT staff
After typing in the appropriate information into each field, what key can be used to get to the next field? a) Ctrl/Cmd b) Enter c) Tab d) Shift
c) Tab
What does it mean for a data warehouse to be multidimensional? a) The database stores data, facts, and definitions for all stored information. b) Data can be linked to other sources of internal and external information. c) The files stored in a warehouse contain several layers of columns and rows. d) Customer information can be related to sales, departmental, and organizational information.
c) The files stored in a warehouse contain several layers of columns and rows.
An intersection relation is a) a temporary relation that pulls information from other linked relations b) a relation that holds aggregate or summary information. c) a relation you create to eliminate a many-to-many relationship d) a relation that identifies and stores the primary key for all entity classes
c) a relation you create to eliminate a many-to-many relationship
In the framework provided by the authors, information refers to: a) a message expressing an opinion based on incomplete evidence b) a collection of facts from which conclusions may be drawn c) data that have a particular meaning within a specific context d) raw facts that describe a particular phenomenon
c) data that have a particular meaning within a specific context
If the information coming into your decision-making process is in bad form, quality, or reliability, then you'll more than likely make a poor decision. This concept is referred to as: a) first in never out (FINO) b) first in first out (FIFO) c) garbage-in-garbage-out (GIGO) d) last in first out (LIFO)
c) garbage-in-garbage-out (GIGO)
When IT specialists and end users meet in one location to define and review the business requirements of a proposed system, the meeting is called a ____. a) requirements meeting b) planning and analysis meeting c) joint application development session d) rapid prototyping
c) joint application development session
During the _____ phase of the SDLC, the new system is monitored and supported to ensure it continues to meet the business goals. a) implementation b) testing c) maintenance d) operations
c) maintenance
An intersection relation consists of a) summary information b) primary keys for all entity classes in the relational database c) primary key fields from the intersecting relations d) definitions for the intersecting relations
c) primary key fields from the intersecting relations
Which of the following is an advantage of prototyping? a) Encourages active user participation b) Helps resolve discrepancies among end users c) Gives users a feel for the final system d) All of the above
d) All of the above
Which of the following software agents can adapt and alter the manner in which it attempts to achieve its assigned task? a) Mobile agent b) Distributed agent c) Intelligent agent d) Autonomous agent
d) Autonomous agent
_____ focuses on building small self-contained blocks of code that can be reused across a variety of applications within an organization a) Rapid prototyping b) Project scoping c) Agile development d) Component-based development
d) Component-based development
Which symbol would you use in an E-R diagram to show that a student can enroll in more than one course? a) Double-line circle b) Solid arrow c) Double straight line d) Crow's foot
d) Crow's foot
Which of the following could you use to create a data dictionary in Microsoft Access? a) Field view b) Information view c) Query view d) Design view OR Datasheet View
d) Design view There are two main ways to create the data dictionary for a given relation: in Datasheet View; and in Design View. They both achieve the same result.
Which of the following is false about foreign keys? a) A foreign key is used to link two tables together. b) A foreign key is a field/column (or a collection of fields/columns) in one table that refers to the primary key of another table. c) Foreign keys let us look up more information in another table about a particular record. d) Every table in your database must have a foreign key.
d) Every table in your database must have a foreign key
Which of the following is an artificial intelligence system that applies reasoning capabilities to reach a conclusion? a) Database management b) Geographic information systems c) Web analytics d) Expert system
d) Expert system
Jake needs to analyze the types of career paths he wishes to follow. There are hundreds of different possibilities based on the geographical area, industry, salary, etc. What type of artificial intelligence system can Jake employ to find a suitable career? a) Artificial intelligence synthesis system b) Neural network c) Expert system d) Genetic algorithm
d) Genetic algorithm
What is an instance? a) It is a key that uniquely identifies a person, place, or thing b) It is a group of related information about an entity c) It is a record or row in a relation d) It is an occurrence of an entity class that can be identified by a primary key
d) It is an occurrence of an entity class that can be identified by a primary key
When developing a database structure in Microsoft Access, what icon is shown to the left of the field name to indicate that the field is a primary field? a) Bullet b) Format c) Arrow d) Key
d) Key
In a data warehouse, which data-mining tool would you use to quickly build reports without having to write programming code? a) Application report generator b) Artificial intelligence c) Multidimensional analysis tools d) Query-and-reporting tools
d) Query-and-reporting tools Query-and-reporting tools are similar to QBE tools, SQL, and report generators in the typical database environment. In fact, most data warehousing environments support simple and easy-to-use data manipulation subsystem tools such as QBE, SQL, and report generators. Most often, data warehouse users use these types of tools to generate simple queries and reports.
Which of the following methodologies emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes? a) SDLC b) Waterfall modeling c) Project scoping d) Rapid application development
d) Rapid application development
What is the difference between the design phase and the analysis phase? a) The analysis phase follows the design phase and examines the requirements developed during the design phase b) The design phase creates the code from the logical requirements developed in the analysis phase c) Analysis and design belong to the same phase and create an iterative process between the two activities d) The design phase takes the requirements developed in the analysis phase and creates a design based on that
d) The design phase takes the requirements developed in the analysis phase and creates a design based on that
What must you define before adding any information to a relational database? a) The intended audience b) The physical hardware structure c) The administrative rights of users d) The logical structure of the database
d) The logical structure of the database When you create an Excel workbook, you can immediately begin typing in information and creating formulas and functions. You can't do that with a database. You must define its logical structure before you can begin typing in any information.
What is the difference between the implementation phase and the maintenance phase? a) The implementation phase creates the physical design (code) and tests it; the maintenance phase places it into operations b) The implementation phase monitors new systems to ensure that they are working properly; the maintenance phase makes minor adjustments when needed to meet existing business goals c) The maintenance phase monitors new systems to ensure that they are working properly; the implementation phase makes minor adjustments when needed to meet new business goals d) The maintenance phase monitors and adjusts new and existing systems; the implementation phase places new systems into operation
d) The maintenance phase monitors and adjusts new and existing systems; the implementation phase places new systems into operation
The goal of regression is: a) To discover clusters with various similarities b) Compile more data and information to ease decision making c) To evaluate historical, known data to derive structures and inferences d) To find corollary and causal relationships between sets of data
d) To find corollary and causal relationships between sets of data
What is the difference between extreme programming (XP) and the agile methodology to software development? a) XP focuses on component-base development; the agile methodology focuses on the RAD b) XP uses prototyping; the agile methodology does not c) Agile methodology involves users much more than XP d) XP focuses more on team coding; the agile methodology focuses on limiting project scope
d) XP focuses more on team coding; the agile methodology focuses on limiting project scope
A(n) _____ decision involves processing a certain kind of information in a specified way so that you will always get the right answer. a) recurring b) ad hoc c) defined d) structured
d) structured