Assignment 4 Quiz Results
True/False, multiple choice, ranking
Forms of closed-ended questions
Users are locked into requirements.
Which of the following is a drawback of the traditional waterfall SDLC approach?
Run applications for customers
Which of the following is a function of an IT service firm?
Nominal Group Technique (NGT)
A facilitated process that supports idea generation by groups, where members work alone to generate ideas and then pool them under the guidance of a facilitator.
Prime questions, listen carefully, be neutral, review notes in 48hrs
A part of the guidelines for effective interviewing.
Unary
A recursive relationship is also known as a ________ relationship.
Joint Application Design (JAD)
A structured process where users, managers, and analysts work together for several days in meetings to clarify or review requirements.
Entity
A(n) ________ is a person, place, object, event, or concept in the user environment about which the organization wishes to maintain data.
Relationship
A(n) ________ is an association between the instances of one or more entity types that is of interest to the organization.
Multi-valued attribute
A(n) ________ is an attribute that may take on more than one value for each entity instance.
Type; instances
An entity ________ is described just once in a data model, whereas many ________ of that may be represented by data stored in the database.
Prototyping
An iterative process converting requirements to a working system, continually revised through organized user collaboration.
Attention to detail, impenitence, relax constraints
Characteristics that is of a good systems analyst.
Process
Data cannot move directly from one data store to another data store. Data must be moved by a ________.
Guidelines during the actual interview
Do not set expectations about the new system, listen carefully, look for a variety of perspectives.
Assign a new unique ID, create a composite attribute by using the identifiers of both entities the relationship
For an associative entity, you may use which of the following attribute as the identifier:
Cloud computing
If an organization is using applications rented from a third party vendor running in a remote location, they are most likely using what type of software system?
A nominal group technique (NGT)
If group members work alone in the beginning of the project and then pool the ideas with guidance, they are participating in ________.
Analysis
In which phase of the SDLC are the system requirements studied and structured?
Design
In which phase of the SDLC is the description of the recommended solution converted into logical and then physical system specifications?
Implementation
In which phase of the SDLC is the information system coded, tested, installed, and supported in the organization?
Pros to Group Interviews
More effective use of time, can hear agreements and disagreements at once, opportunity for synergy
Systems development methodology
Most organizations find it beneficial to use a standard set of steps, called ________, to develop and support their information systems.
Outputs
No process can have only ________. It would be making data from nothing (a miracle). If an object has only outputs, then it must be a source.
Contemporary methods of collecting system requirements
Prototyping, CASE tools, JAD
Closed-ended questions
Questions in interviews that ask those responding to choose from among a set of specified responses.
Open-ended questions
Questions in interviews that have no prespecified answers.
Closed-ended questions
Questions in interviews that have prespecified answers for respondents to choose from.
Users of the current system, reports, procedures
Sources of requirements gathering for the systems analyst.
Overlap
The ________ rule specifies that an entity instance can simultaneously be a member of two (or more) subtypes.
Request for proposal
The document sent to vendors asking them to propose hardware and software that will meet the requirements of your new system is called a ________.
Unary relationship
The example of bill-of-materials is an example of ________.
Formal system
The official way a system works as described in organizational documentation.
Business process reengineering
The overall process by which current methods are replaced with new methods is referred to as ________.
Scheduling
The primary disadvantage of a group interview.
A nominal group technique
The process where group members work alone and then pool ideas with guidance.
Business process reengineering
The search for and implementation of radical change in business processes to achieve breakthrough improvements in products and services.
Informal system
The way a system actually works.
Coding; testing
Under eXtreme Programming, ________ and ________ are intimately related parts of the same process.
Reviewing software documentation and technical marketing literature, sending prospective vendors a questionnaire asking specific questions about their packages, using the software yourself and running it through a series of tests based on the criteria for selecting software
Ways of validating purchased software information
Recontextualization, Abstraction, Storage
What are basic reuse software steps?
Tools
What are computer programs that make it easy to use and benefit from techniques and to faithfully follow the guidelines of the overall development methodology?
Data programs
What are data flow diagram symbols?
MySQL, FireFox, Linux
What are examples of open-source software?
Context DFD, DFDs of the system, thorough descriptions of each DFD component
What are the deliverables of process modeling?
Package software, in-house developers, cloud computing vendors
What are the major categories of sources of software?
Ideas for a new system
What is a possible outcome of NGT?
Outsourcing
What is the practice of a company running a computer application for another organization?
Security
What is the primary concern of IT managers as it relates to cloud computing?
To gather systems requirements simultaneously
What is the primary purpose of JAD?
Primary key
What unique characteristic(s) distinguish(es) each object from other objects of the same type?
In-house development
When an organization has the resources and a system must be built from scratch, an organization should choose what type of software?
A presentation of why the system should or should not be developed by the organization is given.
Which activity happens during the SDLC planning phase?
Domains
Which business rule specifies constraints on valid values for attributes?
Referential integrity constraints
Which business rule specifies rules concerning the relationships between entity types?
Entity integrity
Which business rule specifies that each instance of an entity type must have a unique identifier that is not null?
SDLC
Which of the below is a traditional methodology used to develop, maintain, and replace information systems?
The life cycle can be thought of as a circular process in which the end of the useful life of one system leads to the beginning of another project to develop a new version of or replace an existing system.
Which of the below is a true statement regarding the systems development life cycle?
Reputation of the firm
Which of the following is NOT a common criterion when choosing off-the-shelf software?
Procedure
Which of the following is NOT a part of the Evolutionary model of the SDLC process?
Outsource noncore activities
Which of the following is a reason why a company may outsource certain operations?
Cloud computing application provider
Which of the following is an organization that hosts and runs computer applications for other companies, typically on a per use or license basis?
Systems analyst
Who has the primary responsibility for the design and analysis of information systems?
The source code is free.
Why is open source software different than the other types of software?
Enterprise-wide systems
________ are large, complex systems that consist of a series of independent system modules.
Formal systems
________ are recognized in official documentation of the organization.
Storage
________ is the software reuse step that involves making software assets available for others to use.
Turnkey Systems
________ is/are off-the-shelf software systems that cannot be modified to meet the specific, individual needs of a particular organization.
A description of the alternative solution
________ is/are the final output from the analysis phase.
Response time
________ refers to how long it takes the software package to respond to the user's request in an interactive session.
Functionality
________ refers to the tasks the software can perform and the mandatory, essential, and desired system features.
Enterprise Resource Planning
________ software solutions consist of a series of integrated modules.