INSY 3305 EXAM 2
18. Fan-out refers to _____. a. the number of attributes a class has b. the number of messages sent by a method c. the number of times a message is sent by a method d. the number of times an attribute is passed from a class e. none of the above
b. the number of messages sent by a method
4. A(n) _____ is basically an electronic list of information that is stored on a disk. a. sequential access file b. unordered sequential access file c. ordered sequential access file d. random access file e. transaction file
b. unordered sequential access file
11. A(n) _____ occurs when data are stored redundantly in a database and only some of the instances are updated when a change is needed. a. error b. update anomaly c. data integrity concern d. storage efficiency e. none of these
b. update anomaly
Laura sorts the information on all of her reports into alphabetical order, which makes it very hard to notice the X, Y, or Z. By sorting the information in this way Laura has introduced _____ into the manager's decision process.
bias
17. A class has an attribute in which a range of values has a semantic meaning. This class has _____ connascence. a. Name b. Type or Class c. Convention d. Algorithm e. Position
c. Convention
13. Of all of the types of interaction coupling, _____ is the worst. a. stamp b. data c. content or pathological d. common or global e. control
c. content or pathological
Manipulating certain parameters to refine the way features work in a software package is called _____. a. a workaround b. adjustment c. customization d. feature adjustability e. parameterizing
c. customization
When an analyst discovers that a set of classes have a similar set of attributes and methods, it may make sense to _____ out the similarities into a separate class. a. refine b. abstract c. factor d. partition e. separate
c. factor
The layer that keeps the user interface implementation separate from the application or problem domain classes is the _____ layer. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain
c. human-computer interaction
8. The type of database that is most capable of supporting complex data types is _____. a. sequential files b. relational DBMS c. object-oriented DBMS d. object-relational DBMS e. random access files
c. object-oriented DBMS
7. In an object-oriented database, an extent is the equivalent to a(n) _____ in a relational database. a. attribute b. row c. table d. relationship e. unique identifier
c. table
5. SQL operates on _____. a. rows of data at a time b. columns of data at a time c. tables of data at a time d. the entire database e. any of the above
c. tables of data at a time
6. Which of the following is NOT a characteristic of current object-relational databases? a. storage of objects in the relational table structure b. good support for typical data management operations c. SQL support d. support for inheritance e. all of these are characteristics of object-relational databases
d. support for inheritance
The process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate everything together is called _____. a. customization b. formal methodology c. outsourcing d. systems integration e. workaround
d. systems integration
The following are all strengths of a packaged software design strategy EXCEPT _____. a. it may be bought and installed in a short time b. many business needs are not unique c. the package is already tested and generally proven to work d. there is an exact match of functionality to requirements e. none of the above
d. this is an exact match of functionality to requirements
In user interface design, user scenarios will ________.
describe the most frequent path taken through the use cases.
21. Which one in the following list is an example of NOSQL data store . a. Oracle b. SQL Server c. Access d. OODBMS e. Google's Big Table
e. Google's Big Table
23. _________ is primarily designed for supporting the decision making systems. a. Rational DBMS b. Object Relational DBMS c. Object-Oriented DBMS d. Microsoft SQL Server e. NoSQL
e. NoSQL
17. _____ is the process of estimating the amount of data that the hardware will need to support, so that the server hardware specifications are sufficient for the project's needs. a. Indexing b. Interfile clustering c. Intrafile clustering d. Raw data calculating e. Volumetrics
e. Volumetrics
2. In an object-oriented system, changes can take place at the following level of abstraction. a. variable b. method c. class/object d. cluster (examples: partition, package) e. all of the above
e. all of the above
The decision on which design strategy to use depends on _____. a. how unique the business need is b. the expertise of the project manager c. the urgency of the project d. the amount of in-house experience e. all of the above
e. all of the above
15. When a method of one object refers to the inside hidden parts of another object, these methods are exhibiting _____ coupling. a. data b. stamp c. control d. common or global e. content or pathological
e. content or pathological
3. A(n) _____ can support large volumes of data and support applications that run an entire company. a. database b. database management system c. end-user database administrative system d. end-user database management system e. enterprise database management system
e. enterprise database management system
1. Data may be stored in the following formats _____. a. databases b. entities c. entities and files d. files e. files and databases
e. files and databases
The _____ layer contains, among other things, the classes that represent the fundamental data types. a. problem domain b. system architecture c. human-computer interaction d. data management e. foundation
e. foundation
4. In terms of levels of abstraction, which of the following is at the lowest level relative to the rest? a. system b. partition/package c. library d. class/object e. method
e. method
The _____ layer addresses how the software will execute on specific computers and networks. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain
e. problem domain
9. The process of ensuring that values linking tables together through the primary and foreign keys are valid and correctly synchronized is _____. a. hierarchical integrity b. primary integrity c. table integrity d. referential unity e. referential integrity
e. referential integrity
An advantage of purchasing packaged software is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. have developers climb the knowledge ladder d. make strategic changes during implementation e. save money on the purchase
e. save money on the purchase
10. A relational database may be optimized for _____. a. data type and storage efficiency b. relational type c. speed of access d. storage efficiency e. storage efficiency and speed of access
e. storage efficiency and speed of access
14. If the logical data model contains fields that depend on another non-primary key field, then it is in violation of the rules of _____. a. base normal form b. first normal form c. non-normal form d. second normal form e. third normal form
e. third normal form
To avoid the classic design mistake of "feature creep," the analyst should _____. a. not switch or upgrade unless there is a compelling need for specific features b. increase the schedule to include learning time c. move proposed changes into future versions d. not use a design tool that appears too good to be true e. use rapid application development techniques or timeboxing
e. use rapid application development techniques or timeboxing
To avoid the classic design mistake of "reducing the design time," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade unless there is a compelling need for specific features d. not use a design tool that appears too good to be true e. use timeboxing
e. use time boxing
Novice users prefer _____ while expert users prefer ________.
ease of learning, consistency.
T/F: Custom development of software is usually the best strategy for common business needs, particularly when the business need is not unique and does not have special requirements.
false
As an addition to a regular report, a(n) _____ report may help the user understand the change in comparison values over time or show proportions that are relative to the whole.
graph
The fundamental part of the user interface that permits the system to capture information is the ________ mechanism.
input
The user interface design principle that places an emphasis on the intuitive flow of the interface (i.e. left to right and top to bottom) to minimize the user's movements is ________.
layout
The _____ design principle requires that a report not provide all the available information, only the information that is needed.
manage information load
If real-time information is required by the information system, then the appropriate input processing mechanism is _____.
on-line processing
The fundamental part of the user interface that provides information from the system to user is the ________ mechanism.
output
A(n) _____ check ensures that the numeric data entered is within the correct minimum or maximum values.
range
Which of the following interface evaluation techniques involves a highly structured assessment of the users' interaction with the system?
usability testing
Juan is designing a user interface for the data-entry clerks in the marketing department. In an interview with the department manager, Juan has learned that the department has frequent turnover and that there is very little money for training. What two interface design principles would you recommend Juan emphasize in his design?
user experience and consistency
A(n) _____ shows how all the screens, forms and reports are related, and how the user moves from one to another.
window navigation diagram
The following are all classic design mistakes EXCEPT _____. a. feature creep b. including design time c. reducing design time d. silver bullet syndrome e. switching tools in mid-project
b. including design time
7. _____ suggests that only the information required to use an object should be available outside the object. a. encapsulation b. information hiding c. polymorphism d. inheritance e. cohesion
b. information hiding
A(n) _____ is the equivalent to a subsystem. a. collaboration b. partition c. layer d. factor e. abstraction
b. partition
6. _____ means having the ability to send the same message to different objects, which can be interpreted differently by different objects. a. encapsulation b. polymorphism c. inheritance d. coupling e. cohesion
b. polymorphism
20. The audience for pseudocode is the _____. a. analyst b. programmer c. manager d. user e. customer
b. programmer
Which of the following is NOT a layer of a software architecture. a. foundation b. Problem domain c. data management d. data structure e human computer interface
D. data structure
Moving files by dragging and dropping is an example of _____ navigation controls.
Direct manipulation
T/F: Enterprise resource planning (ERP) applications are small single-function software packages that are inexpensive and easy to install and have only minor problems and fast, easily recognizable benefits.
False
T/F: Max has been a project manager for 10 years and is considered one of the best in his department of well qualified IS professionals. The approval committee is considering the approval of a new unique Internet system that could possibly catapult the firm ahead of all of the competition. Buying a packaged system would be the best design strategy.
False
T/F: Michelle would like the opportunity to increase the experience level of her IS staff by having them analyze and design a new web-based distribution system. The skills learned from this project may help with future strategic applications. Since the time period for the project is very flexible and this is a somewhat unique business need, Michelle has decided to use packaged software for this project.
False
T/F: Pirate Adventures, Inc., a company that owns and operates hotels in tropical locations, is interested in replacing the 15-year-old room reservation system in all of its hotels. Custom development would be the best design strategy.
False
T/F: When the timeframe for implementation is short, it is best to consider custom development.
False
An advantage of custom development is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. install in a short period of time d. remove all risk from the project e. save money on the purchase
b. build technical skills and functional knowledge
10. A class/object should only represent one thing, and a method should only solve a single task. This principle is often referred to as _____. a. coupling b. cohesion c. connascence d. multiple inheritance e. none of the above
b. cohesion
The interface standard that specifies the pictures that will appear on command buttons as well as in reports and forms to highlight important information is(are) the _____.
Interface icons
A(n) _____ defines the general appearance of all screens in the information system.
Interface template
Which of the following ways of enabling users to communicate with the system is most commonly used?
Natural Languages
12. Which of the following types of interaction coupling is "best?" a. stamp b. data c. content or pathological d. common or global e. control
b. data
15. In order to reduce the number of joins that must be performed in a query and to increase the speed of data access, the data analyst will _____ the physical model. a. cluster b. denormalize c. index d. normalize e. optimize
b. denormalize
13. If the data model does not have any repeating fields it is in _____. a. base normal form b. first normal form c. non-normal form d. second normal form e. third normal form
b. first normal form
T/F: A package is a logical grouping of UML elements.
True
T/F: The layer that would include the classes that would interact with middleware applications is the physical architecture layer.
True
T/F: The purpose of the design phase is to create a blueprint for the new system.
True
24. Key-value data stores essentially provide a distributed index (primary key) to where a(n) __________________ is stored. a. BLOB (binary, large object) b. field c. entity d. attribute
a. BLOB (binary, large object)
20. A simple rule to follow when creating problem domain classes and data access and manipulation classes is that there should be ______________. a. One data access and manipulation class for each concrete problem domain class b. Two data access and manipulation classes for each concrete problem domain class c. N data access and manipulation classes for each concrete problem domain class, where N is the number of methods in the problem domain class d. N data access and manipulation classes for each concrete problem domain class, where N is the number of subclasses of the problem domain class e. none of these
a. One data access and manipulation class for each concrete problem domain class
A disadvantage of purchasing packaged software is that the organization may _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. make strategic changes during implementation d. remove all risk from the project e. save money on the purchase
a. accept functionality that is not a perfect fit
A(n) ______ matrix can be used to organize the pros and cons of the design alternatives so that the best solution will be chosen in the end. a. alternative b. cost-benefit c. feasibility d. design e. evaluation
a. alternative
The design phase of the SDLC creates a(n) _____. a. blueprint for the future system b. picture of the as-is system c. understanding of who, what, when, and where the future system will be d. understanding of why build the system e. none of the above
a. blueprint for the future system
9. _____ refers to the level of interdependency or interrelationship among the modules in a system. a. coupling b. cohesion c. connascence d. multiple inheritance e. single inheritance
a. coupling
19. A mini-table that contains values from one or more columns in a table and the location of the values within the table is called a(n) _____. a. index b. interfile cluster c. intrafile cluster d. raw data calculation e. volumetric
a. index
1. Detailed design is important for two reasons. First, preexisting classes and components need to be understood, organized, and pieced together, and second, _____. a. it is common for the project team to write some code and produce original classes that support the application logic of the system b. it is tempting to jump in without planning c. modular design is outdated d. the SDLC continues to be used instead of a more reliable method of analysis for systems e. top-down modular approaches are an acceptable method of analysis that must be performed during the planning phase
a. it is common for the project team to write some code and produce original classes that support the application logic of the system
5. The basic building block of a system is the _____. a. object b. attribute c. message d. partition e. method
a. object
18. The size of a database is determined by the _____. a. amount of raw data in the tables b. amount of raw data in the tables and overhead requirements for the DBMS c. number of instances in the tables d. overhead requirements for the DBMS overhead requirements for the DBMS and number of instances in the tables
b. amount of raw data in the tables and overhead requirements for the DBMS
Which of the following is the most important principle of input design?
capture input electronically as close to the source as possible
A(n) _____ check is a type of input validation that determines if several fields have been entered before the form can be processed.
completeness
A(n) _____ check ensures that combinations of data are valid, for example, does the zip code of an address correspond to the correct state name.
consistency
_________ assures the interface will act as the users expect, while _________ assures it will look pleasing.
consistency, aesthetics
The user interface design principle that places an emphasis on the user's ability to always know where he/she is in the system and what information is being displayed is _____.
content awareness
19. Which of the following Structured English statements is an advanced form of an IF statement? a. action statement b. For statement c. While statement d. Case statement e. Do statement
d. Case statement
22. Most NoSQL data stores were created to address problems associated with storing large amounts of distributed data in __________. a. SQL Server b. ORDBMSs c. OODBMSs d. RDBMSs e. MySQL
d. RDBMSs
3. _____ has emerged as the standard for the design of object-oriented systems. a. Java b. C++ c. VisualBasic d. UML e. Microsoft .NET
d. UML
14. When a global data area exists outside individual objects, the resulting system has _____ interaction coupling. a. stamp b. data c. content or pathological d. common or global e. control
d. common or global
The _____ layer addresses the issues involving the persistence of the objects contained in the system. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain
d. data management
2. A(n) _____ is less expensive and easier for novice users to use, but it does not have the features that are necessary to support mission-critical or large scale systems. a. database b. database management system c. end-user database administrative system d. end-user database management system e. enterprise database management system
d. end-user database management system
There are three methods to create a new system. They are _____. a. buy a package, external vender, external service provider b. develop custom application in-house, external service provider, and external vender c. external service provider, rely on a developer, and external vender d. in-house custom application, buy a package, and external vender e. in-house custom application, external service provider, and external vender
d. in house custom application, buy a package, and external vender
11. What are the two types of coupling in object-oriented systems? a. interaction, data b. data, inheritance c. data, stamp d. interaction, inheritance e. data, common
d. interaction, inheritance
16. To improve the access speed of a database, similar records in a table are stored together in primary key order. This optimizing access speed process is called _____. a. denormalization b. indexing c. interfile clustering d. intrafile clustering e. volumetrics
d. intrafile clustering
The following are all strengths of a custom development design strategy EXCEPT _____. a. builds technical skills b. greater creativity c. greater flexibility d. lower risk none of the above
d. lower risk
8. In order to get an object to perform a method, a(n) _____ is sent to the object. a. state b. object c. attribute d. message e. instance
d. message
16. Object-oriented systems have three general types of cohesion: _____, _____, and _____. a. method, class, inheritance b. method, generalization/specialization, inheritance c. generalization/specialization, class, object d. method, class, generalization/specialization e. functional, sequential, procedural
d. method, class, generalization/specialization
To avoid the classic design mistake of "silver bullet syndrome," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade development tools unless there is a compelling need d. not use a design tool that appears too good to be true e. use rapid application development techniques or timeboxing
d. not use a design tool that appears too good to be true
Which of the following is not a fundamental way to approach the creation of a new information system? a. develop a custom application in-house b. rely on an external vendor to build the system c. purchase a software package and customize it d. rely on end-users to develop it themselves e. all of the above are ways to create new information systems
d. rely on end-users to develop it themselves
12. A data model that does not contain repeating fields and that the data models leads to tables containing fields that are dependent on a whole primary key is in _____ normal form. a. balanced b. first c. primary d. second e. third
d. second
