Intro AIS Unit 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

b

Updating a computer program due to changed user needs, fixing bugs, or regulatory changes is called: a. routine program upkeep b. program maintenance c. unstructured programming d. debugging improvements

A

All of the following are disadvantages of outsourcing, except: a) the requirement of more systems development time b) inflexibility in the event that a company is dissatisfied or has structural changes c) possible loss of control over the company's system and data d) reduced competitive advantage if outsourcer is not motivated to meet competitive challenges e) expensive and difficult to reverse outsourcing

b

An analyst asks the question, "Is the system safeguarded against errors, fraud, and intrusion?" What post implementation factor is the analyst investigating? a. Reliability b. Controls and security c. Errors d. Accuracy

d

An approach to inventory management that seeks to reduce required inventory levels by improving the accuracy of forecasting techniques to better schedule purchases to satisfy production needs is called a. just-in-time inventory system. b. economic order quantity. c. reorder point. d. materials requirements planning.

a

Cancelling all supporting documents when payment is made to a supplier is a control procedure designed to mitigate the threat of: a. Duplicate payments b. Failure to take advantage of discounts for prompt payment c. Cash flow problems d. Paying for items not received

b

Cash flow budgets minimize the risk of which threat? a. Paying for items not received b. Failure to take advantage of discounts for prompt payment c. Duplicate payments d. Theft of cash

a

The conversion approach where the new system in implemented in one part of the organization, such as a branch location, is called: a. Pilot conversion b. Location-by-location conversion c. Single-location conversion d. Partial conversion

a

The conversion method of changing from an old system to a new one by terminating the old IS when the new one is introduced is called a. direct conversion. b. parallel conversion. c. phase-in conversion. d. pilot conversion.

a

Which of the following is the proper sequence of activities for transactions when an organization acquires inventory or raw materials? a. Order, receive, pay b. Order, pay, receive c. Pay, receive, order d. Pay, order, receive e. Receive, order, pay

A

A __________________ is written by a product owner and is a description of something a user wants to include in the system. a. User story b. Modification request C. New development request d. Update request

A

A predetermined time period where a team works on high priority items in the product backlog is called a ________________ a. Sprint b. Dash c. Scrum d. Backlog fix e. Production eruption

A

A systematic approach to continuously improving and optimizing an organizations business processes is known as: a. Business process management b. Prototyping c. Outsourcing d. Unified business processes

a

After a design alternative is selected, conceptual design specifications are created for all the following elements, except: a. procedures to convert existing data to the new data format that will be selected b. how to process data inputs and stored data to produce the information users need c. the data that needs to be entered into the system, and how to collect the data d. output specifications designed to meet user information needs e. the data elements that must be stored to produce the information needed

C

All of the following are disadvantages of end user computing, except: a. Inefficient systems b. Poorly controlled and documented systems c. The freeing up of systems resources d. Logic and development errors e. The duplication of systems and data, and wasted resources

A

Answering employee questions and supporting, coordinating, and controlling end user computing is the responsibility of the _________________ a. Help desk b. Customers service center c. User stories desk d. User acceptance and support center

A

Business process management is a systematic approach to continuously improving and optimizing an organization's business processes. Since it is supported and enabled by technology, it is a good way to introduce both a human and a technological change capability into an organization. All of the following are important principles underlying BPM, except: a. Like an enterprise resource planning (ERP) system, a BPM system is an enterprise wide system that is data centered rather than process centered b. Business processes can produce competitive advantages c. Business processes are strategic organizational assets that should be understood, improved, and managed from inception to completion d. Business processes should be agile, which requires flexibility and business process automation technology that supports rapid modifications e. Business process must be aligned with organizational strategy and need to be effective and efficient

C

Companies can rent software from companies who deliver the software over the Internet. These companies are called ____________ a. Agile service providers b. Internet based providers c. Application service providers d. RFP providers

A

Companies that buy large or complex systems often send vendors a request for proposal (RFP) asking them to propose a system that meets their needs. Using an RFP is important for all the following reasons, except: a. It ensures that the best system is purchased since each vendor provides enough information that the decision as to which system is best is clear cut b. It reduces errors since the chances of overlooking important factors are reduced c. It saves time since the Same information is provided to all vendors, eliminating repetitive interviews and questions d. It simplifies the decision making process since all responses are in the same format and based on the same information e. It avoids the potential for disagreement since both parties possess the same expectations, and pertinent information is captured in writing

A

Companies that buy rather than develop an AIS must still go through the systems development life cycle. a. True b. False

A

Comparing systems by executing an input, processing, and output task on different computer systems and evaluating the results is called: a. Benchmarking b. Point scoring c. Requirement costing d. Through putting e. Response timing

d

Computer input screens are most effective when certain procedures are followed. Which of the following is not a best practice for input screen design? a. Logically group related data together and organize data so that the user can complete the screen from left to right and top to bottom. b. Minimize data input by retrieving as much data as possible from the system. c. Enter data in the same order as displayed on paper forms that capture the data. d. Place as much data, or as many menu options, on a screen as possible to enhance user efficiency. e. Organize the screen so that data can be entered quickly, accurately, and completely.

A

End user development is appropriate when there is need to a. Perform "what if," sensitivity, or statistical analyses b. Update database records c. Process accounts receivables and payables transactions d. All of these are correct

A

Grizzley Corp. spent several millions dollars a year on IT to gain a competitive advantage. The result was thousands of PCs, servers, e-mail systems, and different communications systems from a few dozen manufacturers. Grizzley Corp finally realized it needed to shift its emphasis from owning the latest technology to the effective use of technology. When Grizzley Corp. standardized its systems it eliminated which of the following issues with end user computing? a. System incompatibilities b. Logic and development errors c. Inefficient systems d. Duplication of systems and data; wasted resources

a

Report with a pre-specified content and format, prepared only in response to abnormal conditions is known as: a. triggered exception report. b. demand report. c. scheduled report. d. special-purpose analysis report.

a, b

Restricting access to master data reduces the risk of which threat(s)? (Check all that apply.) a. Inaccurate or invalid master data b. Unauthorized disclosure of sensitive information c. Loss or destruction of data d. Poor performance

D

Sometimes software and hardware are sold together as a package. These systems are called _____________ a. ASP systems b. CASE systems c. H-S integrated systems d. Turnkey systems

c

Step-by-step reviews of procedures or program logic to find incorrect logic, errors, omissions, or other problems is known as a. logic reviews b. processing test data. c. walk-throughs d. acceptance tests.

d

A method for processing accounts payable in which each approved invoice is posted to individual supplier records in the accounts payable file and is then stored in an open invoice file is called a. voucher package. b. disbursement voucher. c. voucher system. d. nonvoucher system.

A

End user development is only appropriate for certain types of data processing or information production systems. Which of the following is not a valid use of end user development? a. Processing transaction to update accounts receivables and accounts payables b. Preparing schedules, such as depreciation schedules and loan amortizations c. Performing "what if," sensitivity, or statistical analyses d. Developing applications using software such as a spreadsheet or a database system e. Retrieving information from company databases to produce simple reports or to answer one time queries

c

Evaluated Receipt Settlement reduces the threat of: a. Mistakes in posting to accounts payable b. Theft of inventory c. Errors in supplier invoices d. Accepting unordered items

A

Evaluating the overall merits of vendor proposals by assigning a weight to each evaluation criterion based on its importance is called: a. Point scoring b. Benchmark problem c. Requirement costing d. Response time evaluation

b, c, e

Identify all the controls that mitigate the threat of mistakes when counting deliveries from suppliers. (Check all that apply.) a. Documentation of all transfers of inventory b. Use of bar codes and RFID tags c. Not informing receiving employees about the quantities ordered d. Requiring the existence of an approached purchase order prior to accepting any delivery e. Requiring receiving employees to sign the receiving report

a, b, c

Identify all the controls that mitigate the threat of the theft of inventory. (Check all that apply.) a. Restriction of physical access to inventory b. Documentation of all transfers of inventory c. Segregation of duties of inventory custody and receiving d. Budgetary controls e. Use of bar codes and RFID tags

A

In which development methodology does the development team work together in an intense but relatively short process to reach a common development goal? a. Scrum b. CASE c. Business process reengineering d. End user development

b

Over the life of a typical system, what percent of the work takes place during development, and what percent is spent on software modifications and updates. a. 15% development, 85% modifications and updates. b. 30% development, 70% modifications and updates. c. 60% development, 40% modifications and updates. d. 45% development, 55% modifications and updates. e. 75% development, 25% modifications and updates.

c

Sending the receiving report to the inventory control department first, before it is then sent on to accounts payable, is a control procedure designed to minimize the risks of which threats? a. Theft of cash b. Theft of cash c. Paying for items not received d. Duplicate payments

d

Separation of the check-writing and accounts payable functions is designed to mitigate the threat of: a. Duplicate payments b. Failure to take advantage of discounts for prompt payment c. Paying for items not received d. Theft of cash

c

Supplier invoices are sent to which function? a. Ordering b. Cash Disbursements c. Approve Supplier Invoices d. Receiving

a

The _____ identifies factors that decrease the likelihood of successful implementation and develops a strategy for coping with each factor. a. implementation team. b. operation team. c. design team. d. conversion team.

a

The _____, who reports to the treasurer, is responsible for paying suppliers. a. cashier b. chief executive officer c. chief financial officer d. controller

a

The control procedure of requiring competitive bidding is primarily designed to mitigate the risk of a. purchasing at inflated prices. b. stockouts and excess inventory. c. purchasing items not needed. d. unreliable suppliers. e. purchasing goods of inferior quality.

a

The control procedure of supplier audits is designed to mitigate the risk of a. kickbacks. b. stockouts and excess inventory. c. purchasing at inflated prices d. purchasing items not needed. e. purchasing goods of inferior quality.

a

The disadvantage(s) of phase-in-conversion include a. the cost of creating the temporary interfaces between the old and the new AIS. b. no backup AIS. c. the pilot locations are using different software until all locations are converted. d. the cost and stress of processing transactions twice.

a, b

The external entity from whom an organization purchases inventory and raw materials is called a _____ . (Check all that apply.) a. supplier b. vendor c. distributor d. common carrier

d

The process of ordering inventory can be initiated by communication from a. Inventory control b. The revenue cycle c. The production cycle d. All of these are correct

b

The process of subdividing computer programs into small, well-defined modules to reduce complexity and enhance reliability is called a. subdivided module programming b. structured programming. c. extreme programming. d. extreme programming.

a, c

The set of activities involved in ordering inventory, receiving it, and paying for it is referred to as the ____. (Check all that apply.) a. expenditure cycle b. order-to-pay process c. purchase-to-pay (or cash disbursement) process d. revenue cycle

a

The source of back orders for inventory items is a. Revenue cycle b. Production cycle c. Inventory control d. Suppliers

d

The text mentioned three ways to test a system. Which of the following was not mentioned in the text? a. Processing test data, including all valid transactions and all possible error conditions, determine whether a program operates as designed b. Walk-throughs are step-by-step reviews of procedures or program logic that find incorrect logic, errors, omissions, or other problems c. Acceptance tests use copies of real transactions and files, rather than hypothetical ones, to help make the final decision whether to accept a system d. Controls testing tests each internal control built into the system to make sure they work as intended

C

The text mentions several ways that systems performance can be compared. Which of the following is not a valid method of evaluating proposed information systems? a. Requirement costing, which estimates the cost of purchasing or developing unavailable features so that there is an equitable basis for comparing systems b. Point scoring, which assigns a weight to each evaluation criterion based on its importance c. Competitor comparisons, in which the software under consideration is compared to the software used by the company's chief competitors d. Benchmark problem, which is an input, processing, and output task that can be run through each software package to see how the system performs

a

The text mentions three different types of documentation that must be prepared for new systems. Which of the following was not mentioned? a. Policies and procedures documentation, which explains all the policies and procedures to be used in the new system b. Operations documentation, which includes operating schedules, files and databases accessed, and equipment and security requirements c. User documentation, which includes a procedures manual and training materials, and teaches users how to operate the system d. Development documentation, which includes a system description and copies of output, input, and file and database layouts, as well as test results

a

The text states that output usually fits into four categories. Which of the following is not one of those categories? a. Information control reports with no pre-specified content or format, prepared frequently and confidentially on a regular schedule b. Demand reports with a pre-specified content and format, prepared only on request c. Scheduled reports with a pre-specified content and format, prepared on a regular schedule d. Special-purpose analysis reports with no pre-specified content or format, not prepared on a regular schedule. e. Triggered exception reports with a pre-specified content and format, prepared only in response to abnormal conditions

C

There are many different ways to acquire software. One way is for a company to have its in-house software development team write the software. This is called _______________ a. CASE software b. I-HD software c. Custom software d. End-user computing e. Outsourced software

A

There are many different ways to acquire software. One way is for a company to hire an outside company to process its transaction using software they have developed. This is called: a. Outsourcing b. Customizing c. Prototyping d. Business process reengineering e. CASE software

D

There are many different ways to acquire software. One way is for the people who are going to use the software to create it. This is called _______________ a. Business process reengineering b. CASE software c. Outsourced software d. End-user computing e. ERP software

C

There are many different ways to acquire software. One way is to buy software that has been developed for a broad range of users with similar needs. This is called _________ a. Case software b. Custom software c. Canned software d. Outsourced software e. End-user developed software

A

There are many different ways to develop software. One way is to do a thorough analysis of company operations and redesign a company's information system. This is called: a. Business process reengineering b. Complete customizing and redesign c. Prototyping d. Outside analysis and redesign e. CASE software

A

There are many different ways to develop software. One way is to quickly develop a simplified working model of a system to see if it meets user needs before developing an entire system. This is called a. Prototyping b. Complete customization and redesign c. Simplified business process modeling d. ERP software e. CASE software

A

To compare system performance, a company can create a data processing task with input, processing, and output jobs. This task is performed on the systems under consideration and the processing times are compared. The AIS with the lowest time is the most efficient. What is this process called? a. Benchmarking b. Requirements costing c. Point scoring d. Performance testing

a, c

To minimize the risk of the theft of cash, the person who makes cash disbursements should not also have the duties of: (Check all that apply.) a. approving supplier invoices. b. ordering goods. c. reconciling the bank account. d. receiving goods.

a, b, d, e

What are the benefits of procurement cards? (Check all that apply.) a. Account numbers can be linked to general ledger accounts for different supplies b. Spending limits reduce risk of purchasing too much supplies c. None of these are benefits d. Simplify accounts payable because receive only one monthly statement e. Improve efficiency of accounts payable by reducing the number of payments made for purchase of supplies

C

When a company is buying large and complex systems, vendors are invited to submit systems for considerations. What is such a solicitation called? a. Request for quotation b. Request for system c. Request for proposal d. Good faith estimate

b

Which approach is an organization following if it posts each individual supplier invoice in accounts payable and stores the invoices in an open-invoice file until they are paid? a. ERS b. Nonvoucher system c. Disbursement voucher d. Voucher system e. Procurement card

a, d

Which controls are designed to minimize the risk of making duplicate payments? (Check all that apply.) a. Require a complete voucher package before issuing payment b. Restrict access to blank checks c. Regularly reconcile the bank account d. Pay only from original copies of supplier invoices e. Use "Positive Pay" arrangements with banks

c, d

Which controls are designed to reduce the risk of unauthorized disclosure of sensitive data about a company's purchases? (Check all that apply.) a. Review of all changes to master data b. Data processing integrity controls c. Encryption d. Access controls

a

Which document is no longer used to approve a supplier payment when a company is using ERS? a. Supplier invoice b. Credit memo c. Receiving report d. Purchase order

c

Which document is sent to a supplier when an organization wants to buy something? a. Sales order b. Sales invoice c. Purchase order d. Purchase requisition

c

Which document is sent to suppliers in order to acquire inventory? a. Receiving report b. Purchase requisition c. Purchase order d. Packing slip

b

Which document is used to reduce the balance owed to a supplier? a. Supplier invoice b. Debit memo c. Purchase order d. Credit memo

b, c, d

Which documents are used to create a three-way match when approving the payment of a supplier invoice? (Check all that apply.) a. Credit memo b. Receiving report c. Purchase order d. Supplier invoice

A, b

Which of the following are disadvantages of outsourcing? a. Responsiveness to changing business conditions is slow or nonexistent b. Migration to new technologies may be poorly planned c. Higher costs due to standardizing user applications and splitting development and maintenance costs between projects d. Makes downsizing very difficult to accomplish

a, c, d, e, g

Which of the following are factors to investigate during post implementation review? (Check all that apply.) a. Are organizational changes beneficial or harmful? b. How effective are the company's hiring and firing practices and procedures? c. Does the system produce accurate and complete data? d. Is the system safeguarded against errors, fraud, and intrusion? e. Are users satisfied? What would they like changed or improved? f. How many of the company's departmental budgets need to be increased? Decreased? g. Is the system reliable? Has it failed? If so, what caused its failure?

a, c, d, e

Which of the following are factors to investigate during post-implementation review? (Check all that apply.) a. Is system documentation complete and accurate? b. How many users had negative reactions to the systems and were they disciplined appropriately? c. Is the communications system adequate? d. Does the system produce information on a timely basis? e. Are hardware, software, data, and procedures compatible with existing systems?

a, d, e

Which of the following are likely to be included in a post-implementation review report? (Check all that apply.) a. Analysis of actual versus expected costs and benefits b. Evaluation of top management c. Executive summary of systems design d. Degree to which system objectives were met e. Recommendations for improving the new system

c, d

Which of the following control procedures are most effective to reduce the threat of paying for services (e.g., painting, janitorial, landscape, etc.) that were not performed? (Check all that apply.) a. Job rotation and mandatory vacations b. Competitive bidding c. Audits d. Budgetary controls e. Use of bar codes or RFID tags

a, b, c

Which of the following control procedures is designed to mitigate the threat of the theft of cash? (Check all that apply.) a. Restriction of access to the supplier master file b. Use of a dedicated computer and browser for online banking c. Physical security of blank checks d. Filing invoices by discount due date e. Requiring that all supplier invoices be matched to supporting documents

d

Which of the following controls could be used to mitigate the threat of accepting unordered items? a. Use of bar codes and RFID tags b. Configuration of the ERP system to flag discrepancies between received and ordered quantities that exceed tolerance threshold for investigation c. Supplier audits d. Requiring existence of approved purchase order prior to accepting any delivery

a

Which of the following controls could be used to mitigate the threat of kickbacks? a. Job rotation and mandatory vacations b. Centralized purchasing function c. Competitive bidding d. Review and approval of purchase requisitions

b

Which of the following controls could be used to mitigate the threat of unauthorized disclosure of sensitive information in the expenditure cycle? a. Competitive bidding b. Encryption c. Tracking and monitoring product quality by supplier d. Review and approval of purchases from new suppliers

b

Which of the following controls is designed to mitigate the risk of purchasing goods of inferior quality? a. Price lists b. Holding purchasing managers responsible for the costs associated with rework and scrap c. Collecting and monitoring supplier delivery performance data d. Periodic physical counts of the inventory

a

Which of the following controls is designed to reduce the risk of errors in counting inventory delivered by suppliers? a. Not informing receiving employees about the expected quantities b. Periodic physical counts of inventory and reconciliation to of the counts with recorded quantities in the system c. Requiring the existence of approved purchase orders prior to accepting any delivery d. All three controls are designed to reduce the risk of errors in counting inventory.

E

Which of the following is NOT an advantage of end user computing? a. User creation, control, and implementation b. Timeliness c. Versatility and ease of the use d. Systems that meet user needs e. Adequately tested applications

A

Which of the following is NOT an advantage of outsourcing? a. Decreases operations, technology, strategy, and personnel risks b. Allows companies to concentrate on core competencies c. Allows companies to better utilize assets d. Access to greater expertise and better technology e. Helps eliminate peaks and valleys usage of systems resources

e

Which of the following is not a conceptual systems design consideration alternative? a. Telephone, Internet, cable, fiber optics, or satellite communication channel b. Instantaneous, hourly, daily, weekly, or monthly output and update frequency c. In-house or outsourcing operations d. Centralized, decentralized, distributed, or local area communications network e. File or database input format

d

Which of the following is not a subprocess of conceptual systems design? a. Prepare conceptual system design report b. Evaluate design alternatives c. Prepare design specifications d. Systems survey

B

Which of the following is not an advantage of prototyping? a. Better definition of user needs b. Adequately tested and documented systems c. Higher user involvement and satisfaction d. Faster development time

A

Which of the following is not an advantage of prototyping? a. More efficient use of system resources, as well as better performance and reliability b. Better definition of user needs due to intensive involvement from end users c. Fewer errors as they are detected and eliminated early, as users test each version of the prototype d. More opportunity fo changes, as suers can suggest changes until the system is exactly what they want e. Faster development time, as prototypes are often functioning after a few days or weeks

d

Which of the following is not one of the conceptual design steps? a. Preparing design specifications b. Preparing the conceptual systems design report c. Evaluating design alternatives d. Designing system controls

D

Which of the following is not one of the difficulties software developers have experienced using the traditional systems development life cycle? a. AIS development projects are backlogged for years b. Changes are usually not possible after requirements have been frozen c. The AIS developed may not meet their needs d. All are difficulties with the traditional SDLC

a

Which of the following places conceptual design in the proper order in the SDLC? a. Analysis, conceptual design, physical design, implementation, operation b. Implementation, operation, analysis, conceptual design, physical design c. Operation, analysis, physical design, conceptual design, implementation d. Analysis, conceptual design, physical design, operation, conversion

a, b

Which of the following purposes does a receiving report fulfill? (Check all that apply.) a. Document the quantity received b. Document the quality of items received c. Document the need to order items d. Document the need to back order items

d

Which of the following puts system implementation activities in the proper order? a. Implementation planning, prepare site, conversion, complete documentation and test system b. Prepare site, implementation planning, conversion, complete documentation and test system c. Select and train personnel, implementation planning, complete documentation and test system, conversion d. Implementation planning, prepare site, complete documentation and test system, conversion

d

Which of the following represents the sequence of elements in developing the conceptual design specifications? a. Processing procedures and operations, input, data storage, and output b. Input, output, data storage, and processing procedures and operations c. Input, data storage, processing procedures and operations, and output d. Output, data storage, input, and processing procedures and operations

a

Which of the following specifies when to reorder supplies and inventory? a. Reorder point b. EOQ formula c. Purchase requisition d. Purchase order

A, c, e

Which of the following statements is (are) true? a. In mainframe outsourcing agreements, outsourcer buy client computers, hire the client's IS employees, operate and manage the system b. Most outsourcing contracts are for a year or less and cost millions of dollars a year c. In a client/server, a service, function, or segment of business is outsourced d. Few Fortune 500 companies outsource their PC support functions e. Outsourcing was initially used for standardized applications such as payroll and accounting or by companies who wanted a cash infusion from selling their hardware

A

Which of the following statements is false with respect to internal controls in a BPM system? a. A BPMS does not have a built-in audit trail, as there is no process monitoring and tracking system that documents and links all actions and process steps b. A BPMS can improve internal controls, because of an organizations business process rules are used to determine the correct person to perform a task and authorizes that person to perform it c. Segregation of duties can be improved as the BPMS reduces delays and costs by instantaneously transferring items needing approval to the manager d. Application controls are strengthened as the BPMS uses the company's business rules to identify what actions must be taken and forwards the task to the appropriate person's task list

B

Which of the following statements is false? a. As a general rule, companies should buy rather than develop software if they can find commercial software that meets their needs b. As an AIS increases in size and complexity, there is a greater likelihood that commercial software can be found that meets user needs c. A company should not attempt to develop its own custom software unless experienced, in house programming personnel are available and the job can be completed less expensively on the inside d. As a general rule, a company should develop custom software only when it will provide a significant competitive advantage

C

Which of the following statements is true? a. Because the AIS is so crucial, companies never outsource parts of the AIS b. Most mainframe outsourcing contracts are for two to three years and cost thousands of dollars a year c. Outsourcer often buy the client's computers and hire all or most of its information system employees d. Only companies struggling to survive and wanting a quick infusion of cash from selling their hardware use outsourcing

a

Which of the following threat(s) are data processing integrity controls designed to reduce? (Check all that apply.) a. Mistakes in posting to accounts payable b. Paying for items not received c. Errors in supplier invoices d. Failure to take advantage of discounts for prompt payment

b

Which process directly updates the Accounts Payable file? a. Receiving b. Approve Supplier Invoices c. Ordering

A

With respect to conceptual system design, which of the following statements is false? a. There are no standards that can be used to evaluate conceptual systems design alternatives b. Systems designers must make many design decisions because there are many different ways to design a system c. In conceptual design, the developer creates a framework for implementing user requirements and solving problems identified in the analysis phase d. The steering committee has the responsibility of evaluating the conceptual system alternatives and selecting the one that best meets the organization's needs e. A description of one of more recommended system design's is the main component of a conceptual systems design report

e

With respect to implementation planning and site preparation, which of the following statements is false? a. An implementation team should identify factors that decrease the likelihood of successful implementation and develop a plan for coping with each factor b. Implementing a new system may require organizational changes, such as creating a new department, eliminating a department, or changing the IS department c. Installing a large computer may require changes, such as additional power outlets, raised floors, humidity controls, air conditioning, and fire protection d. An implementation plan consists of implementation tasks, expected completion dates, cost estimates, and who is responsible for each task e. Site preparation is a relatively quick process, if the proper implementation planning takes place

d

With respect to output design, which of the following statements is false? a. To avoid expensive time delays later in the SDLC, many organizations require users to sign a document stating that the output form and content are acceptable. b. Designers often prepare sample outputs and ask users to evaluate whether they are complete, relevant, and useful. c. Tailoring output to user needs requires cooperation between users and designers. d. Paper-based output is always designed first, as it is the most difficult to prepare and it can be easily adapted to computer-based output. e. If an output design is unacceptable, it is modified and reviewed again as many times as necessary to make it acceptable.

b

With respect to physical systems design, which of the following statements is false? a. Determining the nature, format, content, and timing of reports, documents, and screen displays is the objective of output design. b. Once users have specified their needs, software designers are easily able to tailor output to meet those specified needs. c. Companies and developers that do not spend sufficient time on conceptual and physical design can run into problems later in the SDLC. d. In physical design, user-oriented requirements of conceptual design are translated into detailed specifications used to code and test the computer program.

a

With respect to procedures and control design, which of the following statements is false? a. Since the software developers created the system, they are usually the only ones qualified to document all the system procedures. b. Controls must be built into a system to ensure its effectiveness, efficiency, and accuracy, and to detect and correct errors when they occur. c. The adage "garbage in, garbage out" emphasizes that improperly controlled input, processing, and data storage functions produce unreliable information. d. Procedures documentation and training may take the form of system manuals, user instruction classes, training materials, or online help screens. e. Those who interact with an information system need procedures that answer the who, what, when, where, why, and how questions related to IS activities.

d

With respect to selecting and training personnel, which of the following statements is false? a. A company will not achieve the expected benefits and return on its investment in a new system if users are not adequately trained b. In most instances, training employees to use a new system should be scheduled just before systems testing and conversion c. Many companies provide insufficient training because management feels that it is too time consuming and expensive d. Hiring new employees is less costly than transferring internal employees, since new employees already understand the firm's business and operations e. A hidden cost of inadequate training is users turning to coworkers who mastered the system for help, decreasing productivity and increasing costs

b

With respect to systems conversion approaches, which of the following statements is false? a. Direct conversion is best when a new system is so different that comparisons between the old and the new are meaningless b. Phase-in conversion is inexpensive and can be accomplished in a relatively short period of time c. Parallel processing protects companies from errors, but it is costly and stressful to process transactions twice d. Pilot conversion localizes conversion problems and allows training in a live environment

a, b, c, e

With respect to systems conversion, which of the following statements is (are) true? (Check all that apply.) a. Once the files and databases are converted and tested for accuracy, the new system is functional b. Data should be checked for completeness and errors and inconsistencies removed c. If data conversion is lengthy, new files should be updated with the transactions that occurred during data conversion d. The next to the last step in data conversion is to decide which data files need to be converted e. Following data conversion, new files should be validated to ensure data were not lost during conversion

e

With respect to systems conversion, which of the following statements is false? a. Conversion is complete when all files and databases are converted and tested, and the system is a functional and ongoing part of the company b. Systems conversion includes many elements, including converting hardware, software, data files, and procedures c. Data conversion can be time consuming, tedious, and expensive, and its difficulty and magnitude are easily underestimated d. Data files may need to be moved to a different storage medium, their format may be changed, and the content of the files may need to be changed e. Conversion is one SDLC activity where documentation is not needed, since all new files are validated to ensure data were not lost during conversion

c

With respect to the operation and maintenance phase of the SDLC, which of the following statements is false? a. During this phase, a post-implementation review is conducted to determine whether a system meets its planned objectives. b. The final activity in the systems development process is the system users' accepting a final report on the system. c. Once control of a new system is passed to the data processing department, all system development activities are finished. d. Any problems uncovered after a system is put into operation are brought to management's attention so that the necessary adjustments can be made.

A

___________________ is a guiding philosophy and a set of principles for developing information systems in an unknown and rapidly changing environment a. Agile development b. Business process reengineering development c. CASE development d. Nimble development


Kaugnay na mga set ng pag-aaral

Chapter Quiz: Labor and Financial Markets

View Set

Chapter 12: Production and Growth

View Set

Nursing Health Alterations: Practice test

View Set

Gray's Anatomy Review Questions: Head and Neck

View Set