Cnit180 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

____ is an example of a discretionary project. A. Creating a new report for a user B. Adding a report required by a new federal law C. Including annual updates to payroll and tax percentages D. All of the above

A. creating a new report for a user

A _____ cannot be started until one or more other tasks are completed. A. dependent task B. concurrent task C. predecessor task D. all of the above

A. dependent task

Program documentation ____. A. describes the inputs, outputs, and processing logic for all program modules B. describes a system's functions and how they are implemented C. contains all the information needed for processing and distributing printed output D. consists of instructions and information to users who will interact with the system

A. describes the inputs, outputs, and processing logic for all program modules

A(n) ____ produces one or more lines of output for each record processed. A. detail report B. exception report C. summary report D. all of the above

A. detail report

For upper-level managers who often want to see total figures and do not need supporting details, a(n) ____ is appropriate. A. detail report B. exception report C. summary report D. all of the above

C. summary report

A batch processing system has all of the following characteristics EXCEPT ____. A. transactions are collected, processed, and grouped periodically B. the IT operations group can run batch programs on a predetermined schedule C. the information system is available whenever necessary to support business operations D. batch programs require significantly fewer network resources than online systems

C. the information system is available whenever necessary to support business operations

____ is a typical example of a system requirement for the process category. A. The Web site must report online volume statistics every four hours and hourly during peak periods B. The system must be operated seven days a week, 365 days a year C. The video rental system must not execute new rental transactions for customers who have overdue tapes D. All transactions must have audit trails

C. the video rental system must not execute new rental transactions for customers who have overdue tapes

Printed output is used in ____ documents, which are output documents that are later entered back into the same or another information system. A. detail B. output C. turnaround D. report

C. turnaround

In a data dictionary, some data elements have ____ rules, such as an employee's salary must be within the range defined for the employee's job classification. A. domain B. range C. validity D. mastered

C. validity

With a variable charge method based on resource usage, indirect IT department costs are _____. A. treated as general organizational costs and not charged to other departments B. allocated to other departments based on user-oriented activity C. varied from month to month, depending on a department's use of resources D. divided among all departments in the form of a set monthly charge

C. varied from month to month, depending on a department's use of resources

____ also is called looping. A. Sequence B. Selection C. Iteration D. All of the above

C.Iteration

____ maintains consistency among DFDs by ensuring that input and output data flows align properly. A. Balancing B. Indexing C. Leveling D. Exploding

A. balancing

A form of wireless transmission called ____ is very popular for short-distance wireless communication that does NOT require high power. A. Bluetooth B. USB C. RFID D. Mbps

A. bluetooth

Inheritance enables a ____ to derive one or more of its attributes from a parent. A. child B. user C. package D. class

A. child

When you construct a ____, you review the use case and identify the classes that participate in the underlying business transaction. A. class diagram B. sequence diagram C. use case schematic D. DFD

A. class diagram

____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution. A. Analytical skills B. Artistic skills C. Interpersonal skills D. Confrontational skills

A. Analytical skills

____ codes use a keyword to encode a number. A. Cipher B. Identifier C. Encryption D. Associative

A. Cipher

A ____ report is a type of detail report in which a control break causes specific actions, such as printing subtotals for a group of records. A. control break B. stratified C. subgroup D. character

A. control break

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks. A. enterprise applications B. network operating systems (NOS) C. operating applications D. legacy systems

A. Enterprise applications

_____can model networks, business processes, and many types of special diagrams. A. Microsoft Visio B. Visible Analyst C. System Architect D. Oracle Designer

A. Microsoft Visio

The ____ method of developing systems produces code that is modular and reusable. A. object-oriented analysis B. adaptive C. structured analysis D. rapid application development

A. Object- oriented analysis

During business hours, a salesperson can enter a sale on a ____ terminal, which is part of an information system that handles daily sales transactions and maintains the online inventory file. A. POS B. batch C. topological D. portal

A. POS

Because every piece of information should be traceable back to the input data that produced it, a(n) ____ trail must be provided that records the source of each data item and when it entered the system. A. audit B. index C. source D. control

A. audit

ROI is calculated with the formula _____. A. ROI = (total benefits - total costs) / total costs B. ROI = (total costs - total benefits) / total costs C. ROI = (total benefits - total costs) / total benefits D. ROI = (total costs - total benefits) / total benefits

A. ROI = (total benefits - total costs) / total costs

The primary advantage of RAD is that ____. A. systems can be developed more quickly with significant cost savings B. the company's strategic business needs are emphasized and the mechanics of the system are not stressed C. the decelerated time cycle allows more time to develop quality, consistency, and design standards D. all of the above

A. Systems can be developed more quickly with significant cost savings

The ____ is a widely used method of visualizing and documenting software systems design. A. UML B. TCO C. FDD D. REJ

A. UML

In sequence, the interviewing process involves a series of steps: ____, conduct the interview, document the interview, and evaluate the interview. A. determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interview B. establish objectives for the interview, develop interview questions, prepare for the interview, determine the people to interview C. develop interview questions, prepare for the interview, determine the people to interview, establish objectives for the interview D. prepare for the interview, determine the people to interview, establish objectives for the interview, develop interview questions

A. determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interview

____ cutover involves more risk than other changeover methods. A. Direct B. Pilot C. Parallel D. Phased

A. direct

A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs. A. economic B. schedule C. operational D. technical

A. economic

In a data dictionary, a(n) ____ is the smallest piece of data that has meaning within an information system. A. field B. index C. record D. pixel

A. field

_____ means translating business processes and functions into applications. A. Forward engineering B. Code generating C. Reverse engineering D. Screen generating

A. forward engineering

In a ____, one or more powerful servers controls the network, and departmental servers control lower levels of processing and network devices. A. hierarchical network B. star network C. bus network D. ring network

A. hierarchical network

In a specific software environment, an integrated development tool is highly effective because _____. A. it is built into the vendor's software package B. every IDE is the same and uses a readily transferable learning curve and skills C. it can be used in any development environment D. all of the above

A. it is built into the vendor's software package

A feasibility study includes tests for ____ feasibility, which means that a proposed system will be used effectively after it has been developed. A. operational B. technical C. schedule D. economic

A. operational

____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis. A. Outsourcing B. Commission C. Subscription D. External provision

A. outsourcing

A(n) ____ describes the logic that programmers use to write code modules. A. process model B. object model C. business model D. network model

A. process model

In all cases, a network must use a ____, which is a set of standards that govern network data transmission. A. protocol B. hub C. switch D. router

A. protocol

Advantages of purchasing a software package over developing software in-house include all of the following EXCEPT ____. A. satisfaction of unique business requirements B. lower costs and less time to implement C. proven reliability and performance benchmarks D. less technical development staff

A. satisfaction of unique business requirements

Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design. A. storyboard B. turnaround document C. faxback D. output control

A. storyboard

A data ____, which is a framework for organizing and storing data, consists of one or more files or tables. A. structure B. roster C. index D. integral

A. structure

When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select every tenth customer for review. A. systematic sample B. stratified sample C. random sample D. comprehensive sample

A. systematic sample

A range check is a data validation check that ____. A. tests data items to verify that they fall between a specified minimum and maximum value B. identifies values that are questionable, but not necessarily wrong C. is performed on two or more fields to ensure that they are consistent or reasonable when considered together D. is used for mandatory data items

A. tests data items to verify that they fall between a specified minimum and maximum value

In a(n) ____ approach, the systems analyst defines the overall objectives of a system and then breaks them down into subsystems and modules. A. top-down B. piloted C. indexed D. integrated

A. top-down

With a no charge method, indirect IT department costs are _____. A. treated as general organizational costs and not charged to other departments B. allocated to other departments based on user-oriented activity C. varied from month to month, depending on a department's use of resources D. divided among all departments in the form of a set monthly charge

A. treated as general organizational costs and not charged to other departments

During ____ testing, programmers must test programs that interact with other programs and files individually, before they are integrated into the system. A. unit B. integrated C. link D. outcome

A. unit

____ offers tools for data and application modeling, code generation, and software configuration management. A. Visible Analyst B. Code Generator C. Microsoft Office D. All of the above

A. visible analyst

____ methods include the latest trends in software development. A. Object-oriented analysis B. Agile/Adaptive C. Structured analysis D. Rapid application development

B. Agile/ adaptive

A(n) ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database. A. RMS B. DBMS C. scale set D. HCI

B. DBMS

IBM offers many systems development and modeling products, including the powerful tool called _____. A. Visible Analyst B. Rational System Architect C. Rational Software Architect D. Visual Studio .NET

B. Rational System Architect

Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system. A. O-O B. SDLC C. MSF D. RUP

B. SDLC

Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ____, is changing the picture dramatically. A. Hardware as a Help B. Software as a Service C. Processing as a Product D. Storage as a Solution

B. Software as a Service

Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment. A. GUI B. Web-based C. cloud D. multinational

B. Web-based

With a variable charge method based on volume, indirect IT department costs are _____. A. treated as general organizational costs and not charged to other departments B. allocated to other departments based on user-oriented activity C. varied from month to month, depending on a department's use of resources D. divided among all departments in the form of a set monthly charge

B. allocated to other departments based on user-oriented activity

An object has certain ____, like the make, model, and color of a car. A. keys B. attributes C. indices D. packets

B. attributes

____ are characteristics that describe the object. A. Indices B. Attributes C. Packets D. Keys

B. attributes

All of the following are metrics of a successful project EXCEPT ____. A. on-time completion B. completion with the same personnel as were on the team at the outset C. completion within budget D. delivery of a quality product that satisfies users

B. completion with the same personnel as were on the team at the outset

In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included. A. unit B. design C. testing D. user

B. design

A use case ____ is a visual summary of several related use cases within a system or subsystem. A. description B. diagram C. schematic D. outline

B. diagram

A data dictionary specifies a data element's ____, which is the set of values permitted for the data element. A. range B. domain C. array D. any of the above

B. domain

All of the following are categories of system requirements EXCEPT ____. A. outputs B. dynamics C. performance D. controls

B. dynamics

Software ____ is a software development process that stresses solid design, effective structure, accurate documentation, and careful testing. A. analysis B. engineering C. agility D. synthesis

B. engineering

A(n) ____ displays only those records that meet a specific condition or conditions. A. detail report B. exception report C. summary report D. all of the above

B. exception report

A popular technique for investigating causes and effects is called a(n) ____ diagram, which is an analysis tool that represents the possible causes of a problem as a graphical outline. A. wishbone B. fishbone C. jawbone D. crossbones

B. fishbone

A reasonableness check is a data validation check that ____. A. tests data items to verify that they fall between a specified minimum and maximum value B. identifies values that are questionable, but not necessarily wrong C. is performed on two or more fields to ensure that they are consistent or reasonable when considered together D. is used for mandatory data items

B. identifies values that are questionable, but not necessarily wrong

For a project manager, monitoring _____. A. involves controlling capital B. includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target C. consists of staffing, which includes selecting the project team and assigning specific tasks to team members D. includes identifying and arranging project tasks and estimating completion times and costs

B. includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target

Sequence diagrams include symbols that represent all of the following EXCEPT ____. A. classes B. indices C. lifelines D. messages

B. indices

A(n) ____ defines specific tasks that an object can perform. A. attribute B. method C. command D. message

B. method

A ____ is a value that the user enters whenever a query is run, which provides flexibility, enables users to access information easily, and costs less. A. newsgroup B. parameter C. benchmark D. default

B. parameter

The _____ of a future dollar is the amount of money that, when invested today at a specified interest rate, grows to exactly one dollar at a certain point in the future. A. past value B. present value C. probable value D. projected value

B. present value

Traditional code was written in _____ languages such as COBOL, which required a programmer to create code statements for each processing step. A. event-driven B. procedural C. fourth-generation D. non-procedural

B. procedural

In the OSI (Open System Interconnection) model, the application layer ____. A. defines specific methods of transmitting data over the physical layer B. provides network services requested by a local workstation C. defines control structures that manage the communications link between computers D. contains physical components that carry data

B. provides network services requested by a local workstation

____ describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses. A. Aggregates B. Relationships C. Clusters D. Linkages

B. relationships

____ enable objects to communicate and interact as they perform business functions and transactions required by the system. A. Aggregates B. Relationships C. Clusters D. Linkages

B. relationships

Knowledge management systems are called expert systems because they ____. A. provide job-related information to users at all levels of a company B. simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied C. process data generated by day-to-day business operations D. include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

B. simulate human reasoning by combining knowledge base and inference rules that determine how the knowledge is applied

In a technique called ____ testing, the programmer simulates each program outcome or result and displays a message to indicate whether or not the program executed successfully. A. modular B. stub C. outcome D. unit

B. stub

The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies. A. systems planning B. systems analysis C. systems design D. systems implementation

B. systems analysis

Systems development typically starts with a ____. A. feasibility study, followed by a systems request, which includes a preliminary investigation B. systems request, followed by a preliminary investigation, which includes a feasibility study C. preliminary investigation, followed by a feasibility study, which includes a systems request D. feasibility study, followed by a preliminary investigation, which includes a systems request

B. systems request, followed by a preliminary investigation, which includes a feasibility study

____ is a typical example of a system requirement for the control category. A. The customer analysis system must produce a quarterly report that identifies changes in ordering patterns B. The system must maintain separate levels of security for users and the system administrator C. The data entry screens must be uniform, except for background color, which can be changed by the user D. The warehouse distribution system must analyze daily orders and create a routing pattern for delivery trucks

B. the system must maintain separate levels of security for users and the system administrator

A decision ____ is a graphical representation of the conditions, actions, and rules found in a decision table. A. base B. tree C. icon D. index

B. tree

In a data dictionary, ____ refers to whether the data element contains numeric, alphabetic, or character values. A. value B. type C. valence D. domain

B. type

Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____. A. 2 months B. 12 months C. 24 months D. 48 months

C. 24 months

____ means that the projected benefits of a proposed system outweigh the estimated costs. A. Operational feasibility B. Technical feasibility C. Economic feasibility D. Schedule feasibility

C. Economic feasibility

Determining the project ____ means to define the boundaries, or extent, of a project — being as specific as possible. A. index B. matrix C. scope D. estimation

C. scope

A(n) ____ chart displays complex task patterns and relationships. A. Gantt B. index C. PERT/CPM D. task

C. PERT/CPM

With a(n) ____ language, the user provides an example of the data requested. A. SQL B. IDE C. QBE D. interpolated

C. QBE

A firm that offers outsourcing solutions is called a ____ provider. A. subscription B. software C. service D. resource

C. service

Agile methods typically use a(n) ____model, which represents a series of iterations based on user feedback. A. gradual B. extreme C. spiral D. evaluative

C. Spiral

____ planning is the process of identifying long-term organizational goals, strategies, and resources. A. Opportunity B. Preliminary C. Strategic D. Vertical

C. Strategic

A popular network protocol is ____, which today is the backbone of the Internet. A. FTP B. Telnet C. TCP/IP D. all of the above

C. TCP/IP

_____ allows an existing application to be examined and broken down into a series of diagrams, structure charts, and, in some cases, source code. A. Forward engineering B. Code generating C. Reverse engineering D. Screen generating

C. reverse engineering

In the OSI (Open System Interconnection) model, the presentation layer ____. A. defines network addresses and determines how data is routed over the network B. provides reliable data flow and error recovery C. assures that data is uniformly structured and formatted for network transmission D. contains physical components that carry data

C. assures that data is uniformly structured and formatted for network transmission

A ____, or requirements model, describes the information that a system must provide. A. process model B. data model C. business model D. network model

C. business model

One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities. A. scalability B. compatibility C. cardinality D. functionality

C. cardinality

A(n) ____ is a group of similar objects. A. aggregate B. concatenation C. class D. packet

C. class

A module that performs a single function or task has a high degree of ____, which is desirable. A. piloting B. indexing C. cohesion D. resolution

C. cohesion

A ____ might involve maximums for one or more resources. A. successor task B. task group C. constraint D. bottom-up technique

C. constraint

Guidelines to follow when determining data entry and storage considerations include all of the following EXCEPT ____. A. data should be entered into the system where and when it occurs B. data should be verified when it is entered C. data duplication should be encouraged D. data should be entered into a system only once

C. data duplication should be encouraged

Application ____ is the process of constructing the programs and code modules that serves as the building blocks of an information system. A. structuring B. analysis C. development D. connectivity

C. development

In an object-oriented system, objects can ____ certain attributes from other objects. A. relate B. concatenate C. inherit D. reformat

C. inherit

The cost of customer dissatisfaction, lower employee morale, and reduced information availability are examples of _____. A. tangible costs B. fixed costs C. intangible costs D. variable costs

C. intangible costs

____ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively. A. Analytical skills B. Artistic skills C. Interpersonal skills D. Confrontational skills

C. interpersonal skills

A combination check is a data validation check that ____. A. tests data items to verify that they fall between a specified minimum and maximum value B. identifies values that are questionable, but not necessarily wrong C. is performed on two or more fields to ensure that they are consistent or reasonable when considered together D. is used for mandatory data items

C. is performed on two or more fields to ensure that they are consistent or reasonable when considered together

In a data dictionary, ____ is the maximum number of characters for an alphabetic or character data element or the maximum number of digits and number of decimal positions for a numeric data element. A. domain B. valence C. length D. index

C. length

In data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically. A. operational B. physical C. logical D. relational

C. logical

With a report generator, sample fields can be input to create a _____ for users to review and approve. A. code report B. final report C. mock-up report D. summary report

C. mock-up report

A black hole process is a process that has ____. A. no input B. at least one output and one input, but the output obviously is insufficient to generate the input shown C. no output D. at least one input and one output, but the input obviously is insufficient to generate the output shown

C. no output

A survey is ____, generally takes less time, and can involve a broad cross-section of people. A. more flexible than a series of interviews, and it is less expensive B. more flexible than a series of interviews, but it is more expensive C. not as flexible as a series of interviews, but it is less expensive D. not as flexible as a series of interviews, and it is more expensive

C. not as flexible as a series of interviews, but it is less expensive

Wireless capability allows all of the following EXCEPT ____. A. Web access B. synchronization with office networks C. random sampling D. streaming multimedia

C. random sampling

One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems. A. candidate B. combinatorial C. referential D. foreign

C. referential

A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required. A. request for quotation (RFQ) B. net present value (NPV) C. request for proposal (RFP) D. return on investment (ROI)

C. request for proposal (RFP)

A systems analyst should provide ____ so managers can understand the full cost impact and timetable. A. time figures for the next development phase B. cost figures for the next development phase C. an estimate for the overall project D. all of the above

D. All of the above

When several tasks can start at the same time, each is called a(n) ____ task. A. synchronous B. asynchronous C. baseline D. concurrent

D. concurrent

____ describes the degree of interdependence among modules. A. Resolution B. Modularity C. Dynamism D. Coupling

D. coupling

In a client/server architecture, just as processing can be done at various places, data can be stored in more than one location using a(n) ____. A. SQL B. RDBMS C. DDBMS D. both B and C

D. DDBMS

A(n) ____ is a graphical model of an information system that depicts the relationships among system entities. A. SQL B. OCE C. ODBC D. ERD

D. ERD

____ is the process of converting readable data into unreadable characters to prevent unauthorized access to the data. A. Encapsulation B. Normalization C. Standardization D. Encryption

D. Encryption

Project managers always must be aware of the ____ path, so they can monitor the vital tasks and keep the project on track. A. vital B. baseline C. foundational D. critical

D. critical

A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices. A. HCI B. PCI C. UI D. GUI

D. GUI

A(n) _____typically includes built-in tools such as real-time error detection, syntax hints, highlighted code, class browsers, and version control. A. Oracle Designer B. Visual Studio C. code generator D. IDE

D. IDE

Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects. A. the MSF B. the SDLC C. RUP D. O-O

D. O-O

Many database programs generate ____, which is a language that allows PC client workstations to communicate with servers and mainframe computers. A. DDE B. DBL C. DML D. SQL

D. SQL

One problem in a file processing environment is ____, which means that data common to two or more information systems is stored in several places. A. rigid data structure B. data integrity C. referential integrity D. data redundancy

D. data redundancy

A systems analyst needs ____. A. solid technical knowledge and good analytical ability B. strong oral and written communication skills C. an understanding of business operations and processes D. all of the above

D. all of the above

Buyers can customize a software package by ____. A. negotiating directly with the software vendor to make enhancements to meet the buyer's needs by paying for the changes B. purchasing a basic package that vendors will customize to suit the buyer's needs C. purchasing the software and making their own modifications, if this is permissible under the terms of the software license D. all of the above

D. all of the above

Every information system involves ____. A. data storage and access methods B. application programs to handle the programming logic C. an interface that allows users to interact with the system D. all of the above

D. all of the above

If a spreadsheet program includes a built-in present value function, the program inputs the formula and users input the _____. A. amount B. discount rate C. number of time periods D. all of the above

D. all of the above

Selecting a CASE tool depends on the _____. A. type of project and its size and scope B. possible budgetary and time constraints C. preferences and experience of the system development team D. all of the above

D. all of the above

When a project manager first recognizes that a project is in trouble, the options available to her include ____. A. trimming the project requirements B. delaying the project deadline C. adding to the project resources D. all of the above

D. all of the above

When an information system does not meet business requirements, causes might include ____. A. unidentified requirements B. inadequately defined scope C. imprecise targets D. all of the above

D. all of the above

____ is/are logically impossible in a DFD because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow. A. Spontaneous generation B. Gray holes C. Black holes D. All of the above

D. all of the above

In a(n) ____ design, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen. A. closed B. distributed C. open D. centralized

D. centralized

All objects within a(n) ____ share common attributes and methods. A. catalog B. roster C. index D. class

D. class

Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology. A. interpolated B. mainframe C. outsourced D. cloud

D. cloud

With a fixed charge method, indirect IT department costs are _____. A. treated as general organizational costs and not charged to other departments B. allocated to other departments based on user-oriented activity C. varied from month to month, depending on a department's use of resources D. divided among all departments in the form of a set monthly charge

D. divided among all departments in the form of a set monthly charge

When building an information system, all of the following basic guidelines should be considered EXCEPT ____. A. stick to an overall development plan B. identify major milestones for project review and assessment C. provide accurate and reliable cost and benefit information D. ensure that users are not involved in the development process

D. ensure that users are not involved in the development process

When setting priorities for systems requests, the highest priority goes to projects that provide the ____. A. least benefit, at the highest cost, in the longest period of time B. least benefit, at the lowest cost, in the longest period of time C. greatest benefit, at the highest cost, in the shortest period of time D. greatest benefit, at the lowest cost, in the shortest period of time

D. greatest benefit, at the lowest cost, in the shortest period of time

A project manager's planning _____. A. involves guiding, supervising, and coordinating the project team's workload B. includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target C. consists of staffing, which includes selecting the project team and assigning specific tasks to team members D. includes identifying project tasks and estimating completion times and costs

D. includes identifying project tasks and estimating completion times and costs

An existence check is a data validation check that ____. A. tests data items to verify that they fall between a specified minimum and maximum value B. identifies values that are questionable, but not necessarily wrong C. is performed on two or more fields to ensure that they are consistent or reasonable when considered together D. is used for mandatory data items

D. is used for mandatory data items

During the systems design phase, ____ fields are used to organize, access, and maintain data structures. A. glossary B. tabular C. content D. key

D. key

An object's ____ are the tasks or functions the object performs. A. messages B. commands C. instances D. methods

D. methods

A ____ consists of related program code organized into small units that are easy to understand and maintain. A. mode B. stub C. decision tree D. module

D. module

Typically, companies choose in-house software development for all of the following reasons EXCEPT to ____. A. minimize changes in business procedures and policies B. meet constraints of existing systems and existing technology C. develop internal resources and capabilities D. obtain input from other companies who already have implemented the software

D. obtain input from other companies who already have implemented the software

Examples of intangible benefits include all of the following EXCEPT a(n) ____. A. user-friendly system that improves employee job satisfaction B. sales tracking system that supplies better information for marketing decisions C. new Web site that enhances the company's image D. online package tracking system that decreases the need for clerical staff

D. online package tracking system that decreases the need for clerical staff

Potential problems of prototyping include all of the following EXCEPT ____. A. the rapid pace of development can create quality problems B. some system requirements, such as reliability and maintainability, cannot be tested adequately C. prototypes become unwieldy and difficult to manage in very complex systems D. prototyping increases the risk and potential financial exposure that occur when a finished system fails to support business needs

D. prototyping increases the risk and potential financial exposure that occur when a finished system fails to support business needs

In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale. A. open-ended questions B. closed-ended questions C. leading questions D. range-of-response questions

D. range of response questions

A ____ resembles a circle of computers that communicate with each other. A. hierarchical network B. star network C. bus network D. ring network

D. ring network

A ____ is an event that could affect a project negatively. A. menace B. threat C. doubt D. risk

D. risk

When studying an information system, examples of actual documents should be collected using a process called ____. A. stratification B. randomization C. indexing D. sampling

D. sampling

____ is a typical example of a system requirement for the performance category. A. The purchasing system must provide suppliers with up-to-date specifications B. Each input form must include date, time, product code, customer number, and quantity C. The manager of the sales department must approve orders that exceed a customer's credit limit D. The student records system must produce class lists within five hours after the end of registration

D. the student records system must produce class lists within five hours after the end of registration

Cost-benefit analysis is performed _____ to determine the economic feasibility of an information system project and to compare alternative solutions. A. at the beginning of the SDLC B. in the middle of the SDLC C. at the end of the SDLC D. throughout the SDLC

D. throughout the SDLC


Conjuntos de estudio relacionados

Thermoregulation and Newborn Complications (2.4)

View Set

Civil Litigation Of Procedures 1345 chat 1-7

View Set

Chapter 6- Disorders of the Breasts (ob)

View Set