Chapter 5 Quiz CIS 3060, Chapter 4 Quiz CIS 3060, Chapter 2 Quiz CIS 3060, Chapter 1 Quiz CIS 3060

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following methods of system development stresses intense team-based effort and reflects a set of community-based values?​ Select one: a. ​Object-oriented analysis b. ​Agile method c. ​Structured analysis d. ​Rapid application development

b. ​Agile method

_____ is a planned meeting during which a systems analyst obtains information from another person. Select one: a. ​A survey b. ​An interview c. ​Sampling d. ​Research

b. ​An interview

Which of the following is one of the main sectors of ecommerce? Select one: a. ​C2C (consumer-to-consumer) b. ​B2C (business-to-consumer) c. ​C2B (consumer-to-business) d. ​BPM (business process model)

b. ​B2C (business-to-consumer)

_____ components can provide automated response to sales inquiries, online order processing, and inventory tracking. Select one: a. ​Just-in-time (JIT) b. ​Customer relationship management (CRM) c. ​Automatic teller machine (ATM) d. ​Total cost of ownership (TCO)

b. ​Customer relationship management (CRM)

_____ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.​ Select one: a. ​Instructional technology b. ​Information technology c. ​Assistive technology d. ​Medical technology

b. ​Information technology

_____ are advantages that are difficult to measure in dollars but are important to a company.​ Select one: a. ​Tangible benefits b. ​Intangible benefits c. ​Tactile benefits d. ​Real benefits

b. ​Intangible benefits

_____ technology uses high-frequency radio waves to track physical objects.​ Select one: a. ​Redundant array of independent disks (RAID) b. ​Radio frequency identification (RFID) c. ​Enterprise resource planning (ERP) d. ​Management information system (MIS)

b. ​Radio frequency identification (RFID)

_____ includes ongoing support and maintenance costs, as well as acquisition costs.​ Select one: a. ​CRC (Customer relationship costs) b. ​TCO (Total cost of ownership) c. ​JIT (Just-in-time costs) d. ​RCT (Real cost of time)

b. ​TCO (Total cost of ownership)

_____ refers to the practical resources needed to develop, purchase, install, or operate a system.​ Select one: a. ​Operational feasibility b. ​Technical feasibility c. ​Schedule feasibility d. ​Market feasibility

b. ​Technical feasibility

Which of the following is a typical example of a system requirement for the output category? Select one: a. ​Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs. b. ​The contact management system must generate a daily reminder list for all sales reps. c. ​All transactions must have audit trails. d. ​As the final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits and produce tax data required by the IRS.

b. ​The contact management system must generate a daily reminder list for all sales reps.

Which of the following is a typical example of a system requirement for the control category? Select one: a. ​The customer analysis system must produce a quarterly report that identifies changes in ordering patterns. b. ​The system must maintain separate levels of security for users and the system administrator. c. ​The data entry screens must be uniform, except for background color, which can be changed by the user. d. ​The warehouse distribution system must analyze daily orders and create a routing pattern for delivery trucks.

b. ​The system must maintain separate levels of security for users and the system administrator.

_____ are internal factors that shape corporate IT choices.​ Select one or more: a. ​Technology b. ​User requests c. ​Strategic plan d. ​Company finances

b. ​User requests c. ​Strategic plan d. ​Company finances

Compared with traditional methods, when properly used, joint application development (JAD) can result in _____. Select one or more: a. ​less expense and greater manageability if the group is too large b. ​a more accurate statement of system requirements c. ​a better understanding of common goals d. ​a stronger commitment to the success of the new system

b. ​a more accurate statement of system requirements

One of the disadvantages of _____ methods of system development is that the overall project might be subject to scope change as user requirements change.​ Select one: a. ​object-oriented analysis b. ​agile c. ​structured analysis d. ​rapid application development

b. ​agile

The _____ group typically provides leadership and overall guidance, but the systems themselves are developed by teams consisting of users, managers, and IT staff members.​ Select one: a. ​web support b. ​application development c. ​systems support d. ​database administration

b. ​application development

A _____ graphically displays one or more business processes, such as handling an airline reservation, filling a product order, or updating a customer account.​ Select one: a. ​business matrix model (BMM) b. ​business process model (BPM) c. ​business indexing model (BIM) d. ​business strategic model (BSM)

b. ​business process model (BPM)

A _____ is an overview that describes a company's overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.​ Select one: a. ​business matrix b. ​business profile c. ​business index d. ​business glossary

b. ​business profile

In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.​ Select one: a. ​property b. ​class c. ​message d. ​instance

b. ​class

In an interview, _____ limit or restrict the response. Select one: a. ​open-ended questions b. ​closed-ended questions c. ​leading questions d. ​range-of-response questions

b. ​closed-ended questions

A _____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve. Select one: a. ​trigger b. ​constraint c. ​query d. ​key

b. ​constraint

Among the symbols in the accompanying figure, a _____ is a path for data to move from one part of the information system to another. Select one: a. ​data store b. ​data flow c. ​process d. ​gray hole

b. ​data flow

A data dictionary specifies a data element's _____, which is the set of values permitted for the data element. Select one: a. ​index b. ​domain c. ​array d. ​record

b. ​domain

​Balancing _____. Select one: a. ​uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system b. ​ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD) c. ​uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system d. ​ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD)

b. ​ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD)

Since diagram 0 is a(n) _____ version of process 0, it shows considerably more detail than a context diagram. Select one: a. ​contracted b. ​exploded c. ​condensed d. ​extrapolated

b. ​exploded

A popular technique for investigating causes and effects is called a _____ diagram.​ Select one: a. ​causebone b. ​fishbone c. ​jawbone d. ​crossbone

b. ​fishbone

A _____ is an analysis tool that represents the possible causes of a problem as a graphical outline.​ Select one: a. ​causebone diagram b. ​fishbone diagram c. ​jawbone diagram d. ​crossbone diagram

b. ​fishbone diagram

When using a _____ to investigate the causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.​ Select one: a. ​causebone diagram b. ​fishbone diagram c. ​jawbone diagram d. ​crossbone diagram

b. ​fishbone diagram

A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a _____. Select one: a. ​flowchart b. ​histogram c. ​tree map d. ​streamgraph

b. ​histogram

Knowledge management systems use a large database called a(n) _____ that allows users to find information by entering keywords or questions in normal English phrases.​ Select one: a. ​inference engine b. ​knowledge base c. ​knowledge database management system d. ​inference manager

b. ​knowledge base

In a data flow diagram (DFD), the Gane and Sarson symbol for a data flow is a _____. Select one: a. ​segment of a differentiable curve b. ​line with a single or double arrowhead c. ​flat rectangle that is open on the right side and closed on the left side d. ​triangle, which may be shaded to make it look three-dimensional

b. ​line with a single or double arrowhead

An example of a vertical system is a(n) _____.​ Select one or more: a. ​inventory application b. ​medical practice application c. ​payroll application d. ​database for an auto dealership

b. ​medical practice application d. ​database for an auto dealership

​If processes must be performed in a specific sequence, the information should be documented in the _____. Select one: a. ​leveling guide b. ​process descriptions c. ​data dictionary d. ​data flow diagram (DFD)

b. ​process descriptions

Structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information.​ Select one: a. ​iterative b. ​process-centered c. ​inferred d. ​model-specific

b. ​process-centered

Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called _____.​ Select one: a. ​project dilation b. ​project creep c. ​project expansion d. ​project drift

b. ​project creep

Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specifications and software quality standards.​ Select one: a. ​beta testing b. ​quality assurance c. ​alpha testing d. ​acceptance verifier

b. ​quality assurance

Product-oriented firms manufacture _____.​ Select one or more: a. ​retail services b. ​routers c. ​computers d. ​microchips

b. ​routers c. ​computers d. ​microchips

In the accompanying figure, the sequence structure is the completion of _____. Select one: a. ​one or more process steps based on the results of a test or condition b. ​steps in a chronological order, one after another c. ​a process step that is repeated until a specific condition changes d. ​a specific condition that is repeated until a process changes

b. ​steps in a chronological order, one after another

Systems development typically starts with a _____.​ Select one: a. ​feasibility study, followed by a systems request, which includes a preliminary investigation b. ​systems request, followed by a preliminary investigation, which includes a feasibility study c. ​preliminary investigation, followed by a feasibility study, which includes a systems request d. ​feasibility study, followed by a preliminary investigation, which includes a systems request

b. ​systems request, followed by a preliminary investigation, which includes a feasibility study

Of the measures of feasibility, questions such as "Does the proposed platform have sufficient capacity for future needs?" and "Will the hardware and software environment be reliable?" should be considered while assessing _____.​ Select one: a. ​schedule feasibility b. ​technical feasibility c. ​economic feasibility d. ​ethical feasibility

b. ​technical feasibility

In addition to direct evaluations, systems developers must identify and document indirect expenses that contribute to the _____. Select one: a. ​business process modeling notation (BPMN) b. ​total cost of ownership (TCO) c. ​functional decomposition diagrams (FDD) d. ​Rapid Economic Justification (REJ)

b. ​total cost of ownership (TCO)

In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values. Select one: a. ​pool b. ​type c. ​valence d. ​domain

b. ​type

In the rapid application development (RAD) model in the accompanying figure, during the _____ phase, users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs. Select one: a. ​requirements planning b. ​user design c. ​construction d. ​cutover

b. ​user design

_____ are important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively. Select one: a. ​Problem solving skills b. ​Artistic skills c. ​Interpersonal skills d. ​Confrontational skills

c. ​Interpersonal skills

Electronic data interchange (EDI) enables _____ inventory systems, which rely on computer-to-computer data exchange to minimize unnecessary inventory. Select one: a. ​CRM (Customer relationship management) b. ​EPOD (Electronic proof of delivery) c. ​JIT (Just-in-time) d. ​RFID (Radio frequency identification)

c. ​JIT (Just-in-time)

_____ means that a project can be implemented in an acceptable time frame. Select one: a. ​Operational feasibility b. ​Technical feasibility c. ​Schedule feasibility d. ​Economic feasibility

c. ​Schedule feasibility

_____ planning is the process of identifying long-term organizational goals, strategies, and resources. Select one: a. ​Prospect b. ​Pilot c. ​Strategic d. ​Vertical

c. ​Strategic

Identify a method of developing systems that is well-suited to traditional project management tools and techniques.​ Select one: a. ​Object-oriented analysis b. ​Adaptive method c. ​Structured analysis d. ​Rapid application development

c. ​Structured analysis

SAD11-CH01-06 Critical Thinking Questions Case 1-2 ​ Maddy has been performing at a very high level at a firm, and so when two of her colleagues who are currently leading other development efforts get sick or leave the company, she is asked to step in and help manage these two other efforts. When Maddy sits down at the first meeting at which the first group is gathering, she hears them discussing the feasibility study in which they are currently engaged. She knows, then, in which phase of the systems development life cycle (SDLC) this team currently is. Which phase is it?​ Select one: a. ​Systems analysis b. ​Systems design c. ​Systems planning d. ​Systems implementation

c. ​Systems planning

_____ provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.​ Select one: a. ​User support b. ​Database administration c. ​Systems support and security d. ​Network administration

c. ​Systems support and security

_____ design and construct webpages, monitor traffic, manage hardware and software, and link web-based applications to a company's information systems.​ Select one: a. ​User support specialists b. ​Database administrators c. ​Web support specialists d. ​Network administrators

c. ​Web support specialists

The iteration structure is the completion of _____. Select one: a. ​one or more process steps based on the results of a test or condition b. ​steps in a chronological order, one after another c. ​a process step that is repeated until a specific condition changes d. ​a specific condition that is repeated until a process changes

c. ​a process step that is repeated until a specific condition changes

​In a data dictionary, any name other than the standard data element name is called a(n) _____. Select one: a. ​clone b. ​cipher c. ​alias d. ​alias

c. ​alias

A _____ is logically impossible in a data flow diagram (DFD) because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow. Select one: a. ​spontaneous combustion b. ​gray matter c. ​black hole d. ​server farm

c. ​black hole

A _____ describes the information that a system must provide.​ Select one: a. ​process model b. ​data model c. ​business model d. ​network model

c. ​business model

A _____ must be achieved to fulfill a company's mission. Select one: a. ​key performance factor b. ​core competency c. ​critical success factor d. ​vision competency

c. ​critical success factor

A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage.​ Select one: a. ​process flow diagram b. ​object model c. ​data flow diagram d. ​network model

c. ​data flow diagram

Of the measures of feasibility, _____ assesses tangible and intangible benefits to a company in addition to costs.​ Select one: a. ​schedule feasibility b. ​technical feasibility c. ​economic feasibility d. ​operational feasibility

c. ​economic feasibility

The process of concentrating on what is said in an interview and noticing any nonverbal communication that takes place is called _____. Select one: a. ​brainstorming b. ​sampling c. ​engaged listening d. ​fact-finding

c. ​engaged listening

In a(n) _____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart. Select one: a. ​spontaneous b. ​unstructured c. ​informal d. ​open-ended

c. ​informal

Supporters of neutral locations for interviews believe that it _____. Select one: a. ​makes the interviewee feel comfortable during the meeting b. ​gives the interviewee easy access to supporting material that might be needed c. ​keeps interruptions to a minimum so people can concentrate fully d. ​gives the interviewee an opportunity to take calls during the interview

c. ​keeps interruptions to a minimum so people can concentrate fully

Transaction processing (TP) systems _____.​ Select one: a. ​provide job-related information to users at all levels of a company b. ​simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied c. ​process data generated by day-to-day business operations d. ​include email, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and integrated mobile computing systems

c. ​process data generated by day-to-day business operations

Determining the _____ means defining the specific boundaries, or extent, of a project.​ Select one: a. ​project index b. ​project matrix c. ​project scope d. ​project table

c. ​project scope

When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select any 20 customers. Select one: a. ​systematic sample b. ​stratified sample c. ​random sample d. ​comprehensive sample

c. ​random sample

Agile methods typically use a(n) _____ , which represents a series of iterations based on user feedback.​ Select one: a. ​incremental model b. ​extreme model c. ​spiral model d. ​evaluative model

c. ​spiral model

A(n) _____ is not as flexible as a series of interviews, but it is less expensive, generally takes less time, and can involve a broad cross-section of people.​ Select one: a. ​fishbone b. ​experiment c. ​survey d. ​research

c. ​survey

Data flow diagram (DFD) entities are also called _____ because they are data origins or final data destinations. Select one: a. ​data stores b. ​pseudocodes c. ​terminators d. ​gray holes

c. ​terminators

In a data dictionary, some data elements have _____ rules. For example, an employee's salary must be within the range defined for the employee's job classification. Select one: a. ​domain b. ​range c. ​validity d. ​mastered

c. ​validity

In a(n) _____ model, the result of each phase is called a deliverable, which flows into the next phase.​ Select one: a. ​interactive b. ​iterative c. ​waterfall d. ​spiral

c. ​waterfall

Which of the following is an example of a tangible benefit?​ Select one: a. ​A user-friendly system that improves employee job satisfaction b. ​A sales tracking system that supplies better information for marketing decisions c. ​A new website that enhances a company's image d. ​An online package tracking system that improves service and decreases the need for clerical staff

d. ​An online package tracking system that improves service and decreases the need for clerical staff

John has finished compiling a list of the various members of the joint application development (JAD) group and the list is as follows: John is the JAD project leader, Tom is the representative from top management, Jennifer is a manager, Alen and Ian are users, Linda and Alex are systems analysts, and Clark is the recorder. ​As John develops the agenda, he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of documenting the results of the JAD session and preparing the report that will be sent to JAD team members? Select one: a. ​Clark b. ​Tom c. ​Linda d. ​His own

d. ​His own

Nathan is an expert on all of the different kinds of process description tools. So, when his colleagues have questions, they know where to turn. One of the firm's trainee analysts is working on a financial process that will continue to print vendor payments until it reaches the end of the file. Which of the following processes will Nathan suggest the analyst to use? Select one: a. ​Sequence b. ​Selection c. ​Concatenation d. ​Iteration

d. ​Iteration

_____ usually focus on long-term challenges and goals, the importance of a firm's stakeholders, and a commitment to the firm's role as a corporate citizen.​ Select one: a. ​Performance assessments b. ​Relationship assessments c. ​Vision statements d. ​Mission statements

d. ​Mission statements

_____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.​ Select one: a. ​Prototyping b. ​Rapid application development c. ​Scrum d. ​Modeling

d. ​Modeling

_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.​ Select one: a. ​Accessibility b. ​Relationship c. ​Feasibility d. ​Performance

d. ​Performance

Identify a typical example of a system requirement for the input category. Select one: a. ​As a final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits. b. ​Response time must not exceed four seconds. c. ​The system must provide logon security at the operating system level and at the application level. d. ​Student grades must be entered on machine-readable forms prepared by the instructor.

d. ​Student grades must be entered on machine-readable forms prepared by the instructor.

​In addition to the Gane and Sarson symbol set, another popular symbol set is _____. Select one: a. ​Mantissa b. ​Jira c. ​Zachman d. ​Yourdon

d. ​Yourdon

In a data flow diagram (DFD), a gray hole is a process that has _____. Select one: a. ​no input b. ​at least one output and one input, but the output obviously is insufficient to generate the input shown c. ​no output d. ​at least one input and one output, but the input obviously is insufficient to generate the output shown

d. ​at least one input and one output, but the input obviously is insufficient to generate the output shown

Hardware-based security controls include _____. Select one: a. ​password fields b. ​online forms c. ​system patterns d. ​biometric devices

d. ​biometric devices

In the rapid application development (RAD) model, the _____ phase resembles the final tasks in the SDLC implementation phase. Select one: a. ​requirements planning b. ​user design c. ​construction d. ​cutover

d. ​cutover

A _____ is a central storehouse of information about a system's data.​ Select one: a. ​data cube b. ​data feed c. ​data mart d. ​data repository

d. ​data repository

In a preliminary investigation report, the _____ section contains the results of the preliminary investigation, including a description of the project's scope, constraints, and feasibility.​ Select one: a. ​appendix b. ​introduction c. ​recommendations d. ​findings

d. ​findings

User productivity systems _____.​ Select one: a. ​provide job-related information to users at all levels of a company b. ​simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied c. ​process data generated by day-to-day business operations d. ​include groupware programs that enable users to share data, collaborate on projects, and work in teams

d. ​include groupware programs that enable users to share data, collaborate on projects, and work in teams

​Using _____, an analyst starts with an overall view, which is a context diagram with a single process symbol, and then the analyst creates diagram 0, which shows more detail. Select one: a. ​balancing b. ​indexing c. ​exploding d. ​leveling

d. ​leveling

In an interview, _____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale. Select one: a. ​open-ended questions b. ​factual questions c. ​leading questions d. ​range-of-response questions

d. ​range-of-response questions

The main reasons for systems requests are _____.​ Select one or more: a. ​improved services to customers b. ​reduced support for new products and services c. ​better performance d.​reduced cost

d. ​reduced cost b. ​reduced support for new products and services c. ​better performance

When studying an information system, illustrations of actual documents should be collected using a process called _____. Select one: a. ​stratification b. ​randomization c. ​indexing d. ​sampling

d. ​sampling

Critical Thinking Questions Case 2-1 ​ Lara, managing director of an information technology firm, has received a big project from one of their highly valuable clients. However, the project received is different from the usual projects they handle. ​ Lara is involved in many other projects so she appoints a project manager for this project to ensure that the project is completed on time. This is an example of _____.​ Select one: a. ​operational feasibility b. ​economic feasibility c. ​technical feasibility d. ​schedule feasibility

d. ​schedule feasibility

A(n) _____ shows the timing of interactions between objects as they occur. Select one: a. ​timing diagram b. ​class diagram c. ​orientation diagram d. ​sequence diagram

d. ​sequence diagram

A large concentration of servers working together is called a _____.​ Select one: a. ​server window b. ​server application c. ​server ranch d. ​server farm

d. ​server farm

A(n) _____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company's information systems.​ Select one: a. ​application developer b. ​database administrator c. ​network administrator d. ​systems analyst

d. ​systems analyst

In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all documented requirements for the system.​ Select one: a. ​systems implementation phase b. ​systems planning phase c. ​systems analysis phase d. ​systems design phase

d. ​systems design phase

The systems implementation phase of the systems development life cycle (SDLC) includes an assessment, called a _____, to determine whether the system operates properly and if costs and benefits are within expectation.​ Select one: a. ​systems estimation b. ​systems verification c. ​systems validation d. ​systems evaluation

d. ​systems evaluation

During the _____ of the systems development life cycle (SDLC), a new system is constructed.​ Select one: a. ​systems planning phase b. ​systems support and security phase c. ​systems design phase d. ​systems implementation phase

d. ​systems implementation phase

The data dictionary usually records and describes a default value, which is the _____. Select one: a. ​the set of values permitted for the data element b. ​identification of the user(s) responsible for changing values for the data element c. ​specification for the origination point for the data element's value d. ​value for the data element if a value otherwise is not entered for it

d. ​value for the data element if a value otherwise is not entered for it

A list of topics should be sent to an interviewee several days before the meeting, especially when detailed information is needed, so the person can prepare for the interview and minimize the need for a follow-up meeting. Select one: True False

True

Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions. Select one: True False

True

Competition drives many information systems decisions.​ Select one: True False

True

Feasibility analysis is an ongoing task that must be performed throughout the systems development process.​ Select one: True False

True

In a data flow diagram (DFD), a data flow must have a process symbol on at least one end. Select one: True False

True

In a data flow diagram (DFD), processes contain the business logic, also called business rules, which transform the data and produce the required results.​ Select one: True False

True

Many companies find that a trend called empowerment, which gives employees more responsibility and accountability, improves employee motivation and increases customer satisfaction.​ Select one: True False

True

Most large companies require systems that combine transaction processing, business support, knowledge management, and user productivity features.​ Select one: True False

True

Network administration includes hardware and software maintenance, support, and security.​ Select one: True False

True

Personal observation allows a systems analyst to verify statements made in interviews and determine whether procedures really operate as they are described. Select one: True False

True

System requirements fall into five general categories: outputs, inputs, processes, performance, and controls. Select one: True False

True

The main objective of a sample is to ensure that it represents the overall population accurately. Select one: True False

True

User support provides users with technical information, training, and productivity support.​ Select one: True False

True

What makes one system more complex than another is the number of components, the number of levels, and the degree of interaction among its processes, entities, data stores, and data flows. Select one: True False

True

When assessing schedule feasibility, a systems analyst must consider the interaction between time and costs.​ Select one: True False

True

Examples of company-wide applications, called _____, include order processing systems, payroll systems, and company communications networks.​ Select one: a. ​enterprise applications b. ​network operating systems (NOS) c. ​operating applications d. ​legacy systems

a. ​enterprise applications

Leveling is also called _____. Select one or more: a. ​exploding b. ​partitioning c. ​decomposing d. ​indexing

a. ​exploding b. ​partitioning c. ​decomposing

In a preliminary investigation report, the _____ section contains a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.​ Select one: a. ​introduction b. ​recommendations c. ​expected benefits d. ​time and costs estimates

a. ​introduction

In object-oriented design, built-in processes called _____ can change an object's properties. Select one: a. ​methods b. ​functions c. ​attributes d. ​features

a. ​methods

The _____ method of developing systems produces code that is modular and reusable.​ Select one: a. ​object-oriented analysis b. ​adaptive c. ​structured analysis d. ​rapid application development

a. ​object-oriented analysis

The selection structure is the completion of _____. Select one: a. ​one or more process steps based on the results of a test or condition b. ​steps in a chronological order, one after another c. ​a process step that is repeated until a specific condition changes d. ​a specific condition that is repeated until a process changes

a. ​one or more process steps based on the results of a test or condition

Critical Thinking Questions Case 2-1 ​ Lara, managing director of an information technology firm, has received a big project from one of their highly valuable clients. However, the project received is different from the usual projects they handle. ​ Lara performs certain analyses and ensures that the company's image will not be at risk by taking this project. This is an example of _____.​ Select one: a. ​operational feasibility b. ​economic feasibility c. ​technical feasibility d. ​schedule feasibility

a. ​operational feasibility

Rapid application development (RAD) relies heavily on _____. Select one: a. ​prototyping b. ​management direction c. ​agile methods d. ​scrum

a. ​prototyping

In a data flow diagram (DFD), the Gane and Sarson symbol for a process is a _____. Select one: a. ​rectangle with rounded corners b. ​line with a single or double arrowhead c. ​flat rectangle that is open on the right side and closed on the left side d. ​rectangle, which may be shaded to make it look three-dimensional

a. ​rectangle with rounded corners

To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes. Select one: a. ​scalability b. ​reliability c. ​compatibility d. ​applicability

a. ​scalability

If an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should _____. Select one: a. ​switch to closed-ended questions b. ​give the interviewee easy access to supporting material that might be needed c. ​continue using open-ended questions d. ​rudely conclude the meeting

a. ​switch to closed-ended questions

When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select every tenth customer for review. Select one: a. ​systematic sample b. ​stratified sample c. ​random sample d. ​comprehensive sample

a. ​systematic sample

In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system. Select one: a. ​systems analysis phase b. ​systems implementation phase c. ​systems design phase d. ​systems support and security phase

a. ​systems analysis phase

A systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.​ Select one: a. ​systems request b. ​project scheduling report c. ​systems validation d. ​project staffing report

a. ​systems request

During the _____ of the systems development life cycle (SDLC), the IT staff maintains, enhances, and protects the system.​ Select one: a. ​systems support and security phase b. ​systems implementation phase c. ​systems analysis phase d. ​systems planning phase

a. ​systems support and security phase

A SWOT (Strength, Weakness, Opportunities, and Threats) analysis contributes to the strategic planning process by examining a firm's _____ resources.​ Select one or more: a. ​technical b. ​human c. ​financial d. ​logistical

a. ​technical b. ​human c. ​financial

A data flow diagram (DFD) does not show the external entities that provide data to the system or receive output from the system. Select one: True False

False

A mission-critical system is one that is unimportant to a company's operations.​ Select one: True False

False

A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.​ Select one: True False

False

Data stores are shown in a context diagram because data stores are external to the system Select one: True False

False

Due to the limited range of input and interaction among participants, few companies believe that a joint application development (JAD) group does not produce the best definition of a new system. Select one: True False

False

In an information system, data is information that has been transformed into input that is valuable to users.​ Select one: True False

False

In the early stages of systems analysis, interviews usually focus on specific topics, but as the fact-finding process continues, the interviews are more general. Select one: True False

False

Information systems that interact with customers usually receive low priority.​ Select one: True False

False

Since middle managers focus on a longer time frame, they need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations.​ Select one: True False

False

Systems developers use joint application development (JAD) whenever group input and interaction are not desired, because it is linked to a specific development methodology. Select one: True False

False

Systems requests seldom are aimed at improving service to users within a company. Select one: True False

False

The Pareto chart, sometimes called a scatter diagram, is a problem solving tool.​ Select one: True False

False

The primary purpose of pseudocode is to describe the underlying business logic of code. Select one: True False

False

The responsibilities of a systems analyst at a small firm are exactly the same as those at a large corporation.​ Select one: True False

False

Transaction processing (TP) systems are inefficient because they process a set of transaction-related commands individually rather than as a group. Select one: True False

False

When using fact-finding techniques, asking what is being done is the same as asking what could or should be done. Select one: True False

False

​In data flow diagrams (DFD), systems analysts call an entity that supplies data to the system a sink. Select one: True False

False

​When a data flow diagram (DFD) is exploded, the higher-level diagram is called the child diagram, and the lower-level diagram is referred to as the parent diagram. Select one: True False

False

Joint application development (JAD) is like a compressed version of the entire development process.​ Select one: True False

False - Rapid application development (RAD)

When designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics. Select one: True False

False, arrange the questions in a logical order.

Although taking notes during an interview has both advantages and disadvantages, the accepted view is that note taking should be extensive. Select one: True False

False, note taking should be kept to a minimum.

It is easier to assign dollar values to intangible benefits. Select one: True False

False, tangible

Compared with traditional methods, the entire rapid application development (RAD) process is expanded and, as a result, the new system is built, delivered, and placed in operation much later. Select one: True False

False. It is compressed.

The personal interview usually is the SAD11-CH04-85 least expensive fact-finding technique. Select one: True False

False. It is the MOST expensive.

Joint application development (JAD) provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation. Select one: True False

False; RAD Rapid application development

In a sequence diagram, SAD11-CH04-71 vertical arrows represent messages from one object to another. Select one: True False

False; horizontal

When designing a questionnaire, which of the following ideas should be kept in mind? Select one or more: a. ​Providing clear instructions that will answer all anticipated questions b. ​Arranging questions in a logical order c. ​Trying to lead the response or use questions that give clues to expected answers d. ​Phrasing all questions to avoid misunderstandings, and use simple terms and wording

a. ​Providing clear instructions that will answer all anticipated questions b. ​Arranging questions in a logical order d. ​Phrasing all questions to avoid misunderstandings, and use simple terms and wording

Internet-based commerce is called _____ and includes two main sectors: B2C (business-to-consumer) and B2B (business-to-business).​ Select one: a. ​electronic commerce b. ​network-oriented commerce c. ​virtual trading d. ​online trading

a. ​electronic commerce

​_____ maintains consistency among data flow diagrams (DFDs) by ensuring that input and output data flows align properly. Select one: a. ​Balancing b. ​Indexing c. ​Adapting d. ​Shipping

a. ​Balancing

_____ is a fact-finding technique that can help a systems analyst understand how the current system is supposed to work. Select one: a. ​Document review b. ​Brainstorming c. ​A systematic sample d. ​Productivity software

a. ​Document review

_____ technology uses radio frequency identification (RFID) tags to identify and monitor the movement of each individual product, from a factory floor to the retail checkout counter. Select one: a. ​EPC (Electronic product code) b. ​EPOD (Electronic proof of delivery) c. ​MCC (Magnetic character code) d. ​RTPD (Real-time product delivery)

a. ​EPC (Electronic product code)

Using _____, a supplier can use radio frequency identification (RFID) tags on each crate, case, or shipping unit to create a digital shipping list. Select one: a. ​EPOD (Electronic proof of delivery) b. ​PPOD (Physical proof of delivery) c. ​RPS (Radio positioning system) d. ​RDS (Radar detection system)

a. ​EPOD (Electronic proof of delivery)

_____ means that the projected benefits of a proposed system outweigh the estimated costs.​ Select one: a. ​Economic feasibility b. ​Schedule feasibility c. ​Operational feasibility d. ​Technical feasibility

a. ​Economic feasibility

_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.​ Select one: a. ​Electronic data interchange (EDI) b. ​Radio frequency identification (RFID) c. ​Enterprise resource planning (ERP) d. ​Object-oriented (O-O) analysis

a. ​Electronic data interchange (EDI)

_____ is based on combinations of the three logical structures, or control structures (one of which is shown in the accompanying figure), which serve as building blocks for the process. Select one: a. ​Modular design b. ​Interface design c. ​Visual design d. ​Product design

a. ​Modular design

_____ means that a proposed system will be used effectively after it has been developed. Select one: a. ​Operational feasibility b. ​Technical feasibility c. ​Schedule feasibility d. Economic feasibility

a. ​Operational feasibility

Projects where management has a choice in implementing them are called _____ projects.​ Select one: a. ​discretionary b. ​nondiscretionary c. ​appended d. ​concatenated

a. ​discretionary

Case 1-1 ​ Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems development method the team uses to create a new application for a major medical supplier. ​It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client will throw them a curveball and want to make changes late in the game-but that they also will be unwilling to absorb the costs of those changes. For this reason, which of the following methods of development will Roark eliminate? Select one: a. ​Structured analysis b. ​Agile/adaptive methods c. ​Object-oriented analysis d. ​Rapid application development

a. ​Structured analysis

SAD11-CH01-07 Critical Thinking Questions Case 1-2 ​ Maddy has been performing at a very high level at a firm, and so when two of her colleagues who are currently leading other development efforts get sick or leave the company, she is asked to step in and help manage these two other efforts. ​After leaving the first meeting, Maddy goes down the hall to meet with the outgoing manager of the second team. In that meeting, he shares with her the latest draft of the systems requirement document, which is nearly complete. In which phase is the second team currently? Select one: a. ​Systems analysis b. ​Systems design c. ​Systems planning d. ​Systems implementation

a. ​Systems analysis

_____ are the benefits that can be measured in dollars. Select one: a. ​Tangible benefits b. ​Intangible benefits c. ​Ethical benefits d. ​Agile benefits

a. ​Tangible benefits

_____ result from a decrease in expenses, an increase in revenues, or both. Select one: a. ​Tangible benefits b. ​Intangible benefits c. ​Agile benefits d. ​Ethical benefits

a. ​Tangible benefits

_____ are external factors that shape corporate IT choices.​ Select one or more: a. ​Technology b. ​Competitors c. ​Managers d. ​Suppliers

a. ​Technology b. ​Competitors d. ​Suppliers

Jerry has inherited an Excel sheet that lists all of the system requirements for his team's new project. But unfortunately, his predecessor did not label the requirements with categories-or in some cases failed to categorize them correctly. He needs to take care of this so the requirements can be sorted correctly. ​Jerry knows that there were supposed to be three performance examples but he finds four in the spreadsheet. Which one of these is mislabeled as a performance example? a. ​The system must automatically generate an insurance claim form. b. ​Response time must not exceed four seconds. c. ​The online inventory control system must flag all low-stock items within one hour after the quantity falls below a predetermined minimum. d. ​The records system must produce key reports within five hours of the end of each fiscal quarter.

a. ​The system must automatically generate an insurance claim form.

The _____ is a widely used method of visualizing and documenting software systems design. Select one: a. ​Unified Modeling Language (UML) b. ​total cost of ownership (TCO) c. ​functional decomposition diagram (FDD) d. ​Rapid Economic Justification (REJ)

a. ​Unified Modeling Language (UML)

When structured English is used, which of the following rules must be conformed to?​ Select one or more: a. ​Use only the three building blocks of sequence, selection, and iteration. b. ​Use indentation for readability. c. ​Use a limited vocabulary. d. ​Avoid standard terms used in the data dictionary.

a. ​Use only the three building blocks of sequence, selection, and iteration. b. ​Use indentation for readability. c. ​Use a limited vocabulary.

The kind of document shown in the accompanying figure starts with a heading, which should include all except _____. Select one: a. ​a brief statement of purpose b. ​your suggestions c. ​your signature d. ​your observations

a. ​a brief statement of purpose

In a preliminary investigation report, the _____ section is included in the report if supporting information must be attached.​ Select one: a. ​appendix b. ​introduction c. ​recommendations d. ​findings

a. ​appendix

In data flow diagrams (DFDs), a process resembles a _____, where the inputs, outputs, and general functions of the process are known, but the underlying details are not shown. Select one: a. ​black box b. ​terminator c. ​business rule d. ​decision table

a. ​black box

he term _____ refers to the reasons, or justifications, for a proposal.​ Select one: a. ​business case b. ​use case c. ​work statement d. ​problem charter

a. ​business case

A _____ is a summary of a project request and a specific recommendation.​ Select one: a. ​case for action b. ​routine report c. ​breakdown report d. ​case for approval

a. ​case for action

The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.​ Select one: a. ​computer resources committee b. ​data storage committee c. ​system networking committee d. ​topology identification committee

a. ​computer resources committee

A(n) _____ is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.​ Select one: a. ​corporate culture b. ​team guideline c. ​mission statement d. ​ongoing rule-set

a. ​corporate culture

A _____ shows how data acts through an information system but does not show program logic or processing steps. Select one: a. ​data flow diagram b. ​data tree diagram c. ​data model diagram d. ​data structure diagram

a. ​data flow diagram

In a typical organizational model, top managers _____.​ Select one: a. ​develop long-range plans, called strategic plans, which define a company's overall mission and goals b. ​provide direction, necessary resources, and performance feedback to supervisors and team leaders c. ​oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people d. ​include users who rely on transaction processing (TP) systems to enter and receive the data they need to perform their jobs

a. ​develop long-range plans, called strategic plans, which define a company's overall mission and goals

The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client. ​If they make use of the four-model approach, which of the following is a likely outcome? Select one: a. ​Time taken to develop the model increases. b. ​Costs needed to develop a logical and physical model of the current system will be less. c. ​It will not be possible to get a clear picture of the current system functions before modifications are made. d. ​The requirements of a new information system will always be different from the current information system.

​a. Time taken to develop the model increases.


Conjuntos de estudio relacionados

Biology 1030 Exam 3- Espinoza Clemson

View Set

AP Human Geography: Urban Geography Vocabulary

View Set

CIS 282 Fall 2022 - Final Studyguide

View Set

Home Owners Course Pre-test (Clearpoint) March 2022

View Set