INLS 382 Final Exam Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

1. Special cases (like customer cancels an appointment or returns an item) are: ____________ a) Frequently overlooked by users b) Described on special 'exception' use cases c) Not of importance at this stage d) Written as exceptions at the bottom of the relevant use case e) Given use case ID's of "SC" (for special case) and a number

a) Frequently overlooked by users

1. The cost of development associated with Client-Based systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

a. Low

1. Integration testing focuses on ___________; while system tests focus on _______________. a) Modules working together; meeting business requirements b) Black-box tests; white-box tests c) End-users acceptance; project sponsor acceptance d) DFDs; ERDs e) Beta tests; alpha tests

a) Modules working together; meeting business requirements

1. Becky is a systems analyst for Laswell Consulting. She is attending a three-day intensive workshop on developing applications in php. What systems analyst skill is she working on? a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

a) Technical

1. The type of processing system that creates reports for supervisors (and other functional users) probably would be a: a) Transaction Processing System (TPS) b) Management Information System (MIS) c) Executive Support System (ESS) d) Decision Support System (DSS) e) Rebate Management System (RMS)

b) Management Information System (MIS)

1. Generally, transaction structures on a structure chart will have: a) Many afferent processes b) Many efferent processes c) Many data couples d) Many control couples e) Many conditional couples

b) Many efferent processes

1. Which of the following is NOT a general test stage? a) Unit tests b) Module tests c) Integration tests d) System tests e) Acceptance tests

b) Module tests

1. f the logical data model does not contain attributes that have repeating values it is in _____. a) base normal form b) first normal form c) non-normal form d) second normal form e) third normal form

b) first normal form

1. A data flow is: a) An activity of a function that is performed for some specific business reason b) A single fact c) A collection of data within a system d) A person, organization or system that is external to the system e) A combination of function and the data it acts upon

b) A single fact

1. A data flow is: a) An activity or a function that is performed for some specific business reason b) A single fact c) A collection of entities d) A trigger to a use case e) A person, organization or system outside of the system

b) A single fact

1. Operational requirements of a system include all of the following, except: a. System Integration b. Technical Environment c. Portability d. Scalability e. Maintainability

d. Scalability

1. A process model is: a) The output of the interviewing process b) The work plan c) The model that is produced by extreme prototyping d) The expanded and thoroughly balanced use case for a system e) A graphical way of representing how a business system operates

e) A graphical way of representing how a business system operates

1. An external entity is: a) An activity or a function that is performed for some specific business reason b) A single piece of data c) A collection of data d) A trigger to a use case e) A person, organization or system outside of the system

e) A person, organization or system outside of the system

1. Extreme programming emphasizes: a) Customer satisfaction b) Teamwork c) Communication as a core value d) Simplicity as a core value e) All of these

e) All of these

1. Practical tips states that interpersonal skills are important, they include: a) Paying attention b) Being honest c) Ability to summarize key points d) Be happy e) All of these

e) All of these

1. Many ________ tools like ERwin can help you with database size information and the calculation of volumetrics. a) ERD master b) DFD master c) Denormalization d) Pop-up menu e) CASE

e) CASE

1. What is probably NOT a part of a Use Case? a) Name b) Number c) Trigger d) Major inputs e) Statement of business value

e) Statement of business value

1. The lines that connect the entities are referred to as a) Data flows b) connectors c) relationships d) crow's feet e) foreign key

c) relationships

1. When the analyst is evaluating a data model to ensure that all fields in a record depend fully on the entire primary key, which step of normalization is being performed? a) base normal form b) first normal form c) second normal form d) third normal form e) cannot tell from this information

c) second normal form

1. Typically, interviews include the following type questions: a) Probing b) Open Ended c) Close ended d) Observation

d) Observation

1. An ERD is a picture which shows the information that is ________ by a business system. a) created b) stored c) used d) all of these

d) all of these

1. Information in the data dictionary is called: _______________ a) Metadata b) Cached information c) Compiled data d) Data repository e) File silo

a) Metadata

1. Approximately _______ percent of men are color blind (and thus improper use of color can impair their ability to read information) a) 5% b) 10% c) 15% d) 20% e) More than 20%

b) 10%

Which is NOT a post-implementation activity? a) system support b) system maintenance c) system request d) project assessment e) providing help desk and telephone support for users

c) system request

1. Which of the following is NOT a classic planning mistake? a) Overly optimistic schedule b) Failing to monitor the schedule c) Failing to update the schedule d) Adding people to a late project e) Omitting key requirements

e) Omitting key requirements

1. Which of the following project roles would serve as a primary point of contact for a project? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project sponsor

e) Project sponsor

1. System prototyping is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

a) A 'Quick and Dirty' system

Considering conversion style, conversion locations, and conversion modules, the most risky approach is probably: a) direct, simultaneous, whole-system b) direct, phased, whole-system c) direct, pilot, modular d) parallel, simultaneous, modular e) parallel, phased, modular

a) direct, simultaneous, whole-system

1. A default value is: a) The first value in a table b) The median value in a table c) The smallest value in a table d) A value that specifies what should be placed in a column e) A mistake made by Dee (aka the name "Dee's fault")

d) A value that specifies what should be placed in a column

1. The third step in creating a Physical Data Flow Diagram is a) Update the metadata in the CASE repository b) Draw a human-machine boundary c) Add implementation references d) Add system-related data stores, data flows, and processes e) Update the data elements in the data flows

d) Add system-related data stores, data flows, and processes

1. The authors describe "writing programs" as: a) A fun, creative activity b) A tedious process c) A very mathematical and logical process d) An excellent learning process for end-users e) Answers B and C

a) A fun, creative activity

1. Which is NOT a factor in choosing a development option? a. Data base normalization b. In-house experience c. Time frame d. Project skills e. Project management

a. Data base normalization

1. Jack is developing an ERD for a small dental practice office patient record system. The dental practice has three dentists, six hygienists, and many patients. A patient is always assigned to the same dentist for all appointments. In particular, he is working on the relationship between dentists and patients. Should it be: a) 1 to 1, with a modality of null b) 1 to many with a modality of not null c) Many to many with a modality of null d) Many to many with a modality of not null e) 1 to many with a modality of null

b) 1 to many with a modality of not null

1. The second step in creating a Physical Data Flow Diagram is a) Update the metadata in the CASE repository b) Draw a human-machine boundary c) Add implementation references d) Add system-related data stores, data flows and processes e) Update the data elements in the data flows

b) Draw a human-machine boundary

1. The two basic formats for data storage: a) Spreadsheets and documents b) Files and databases c) Databases and presentations d) Flash and web forms e) ERDs and Use cases

b) Files and databases

1. The authors suggest that: a) "All testing must include live production data" b) "All testing must include both alphabetic and numeric data" c) "It is impossible to test every possible combination of input and situation" d) "Testing rarely pays for itself" e) "Testing should only be used for complex programs and situations"

c) "It is impossible to test every possible combination of input and situation"

Research has shown that about __________ of potential adopters will be ready adopters. a) 5% to 10% b) 10% to 20% c) 20% to 30% d) 40% to 50% e) 90 to 100%

c) 20% to 30%

1. What diagram will have processes with one decimal place (like 3.1, 3.2, and 3.3) and might have flows coming in (or going out) that are not illustrated? a) Context diagram b) Level 0 diagram c) Level 1 diagram d) UML state diagram e) Level 0 diagram

c) Level 1 diagram

1. Destination would be described on a use case in which of the following areas? a) Trigger b) Major inputs c) Major outputs d) Primary actor e) Importance level

c) Major outputs

1. There are _____ primary hardware components of a system. a. 1 b. 2 c. 3 d. 4 e. 5

c. 3

1. Where are the decisions stored that are made regarding the hardware and software that will be purchased to support the new system? a. Order Manifest b. Hardware Sales Receipt c. Suppliers' Computer System d. President's Office e. Hardware and Software Specification

e. Hardware and Software Specification

1. Which was NOT given as a method for determining business requirements? a) Benchmarking b) Interviewing c) Observation d) Document analysis e) Questionnaires and surveys

a) Benchmarking

Training is probably the most _________ part of any change management initiative. a) self-evident b) expensive c) overused d) wasted e) tedious

a) self-evident

1. If the skills required by a project cannot be met by the available project team, which would probably NOT be a reasonable solution? a) Use a consultant b) Use a contract employee c) Modify the project to use skills inherent on the project team d) Train the project team (or some of the team) on the skills needed e) Mentor a team member (like sending a person to work on a similar project to acquire the necessary skills)

c) Modify the project to use skills inherent on the project team

1. The outcome of the design phase is the: a) Feasibility analysis document b) System proposal document c) System specification document d) System request document e) Business process document

c) System specification document

1. Because the cost can be immense, _________ is one of the most critical steps in implementation. a) Documentation b) Coding c) Testing d) Developing a conversion strategy e) Training

c) Testing

1. Some organizations may choose to include additional sections on their use case forms, these may include: a) Frequency of use b) Assumptions c) Notes and issues d) Business rules e) All of these

IDK

1. Micah is a fairly new project manager. He estimated for a project plan (on the planning phase) that the project would cost $50,000 and take 20 weeks. According to the margin of error guidelines for well-done estimates, that could range from: a) $0 and $100,000 - and between 15 and 25 weeks b) $10,000 and $60,000 - and between 12 and 28 weeks c) $0 and $100,000 - and between 0 and 40 weeks d) $5,000 and $100,000 - and between 10 and 30 weeks e) $25,000 and $75,000 - and between 10 and 30 weeks

a) $0 and $100,000 - and between 15 and 25 weeks

1. On your level 0 diagram you have a process #2 and when you create a level 1 diagram for process #2, you might have processes like: a) 2.1, 2.2, 2.3 b) 2-1, 2-2, 2-3 c) 2A, 2B, 2C d) 2-A, 2-B, 2-C e) 2-initial, 2-main, 2-end

a) 2.1, 2.2, 2.3

1. Which is NOT true about the content awareness design principle? a) A date of 8/6/09 will be understood internationally b) Drawing boxes around related items (like name / address / city / state / zip) will help users c) Field labels should be fairly short, yet with long enough so that users can not be confused d) Input fields should follow a logical progression that is familiar to users e) All printed forms should have version numbers for better control

a) A date of 8/6/09 will be understood internationally

1. Vanessa has a data flow diagram with an item called 'Register for Class'. That item would be: a) A process b) A data flow c) A data store d) An external entity e) A process relationship

a) A process

1. An example of a functional requirement is _________ a) Access to the customer order system b) System should be available in English and Spanish c) System can be accessed through a Blackberry device d) Output can be displayed in Internet Explorer, in Firefox, or in Google Chrome browsers e) System is automatically updated every 5 seconds

a) Access to the customer order system

1. When changing a logical DFD into a physical DFD, it might be necessary to ________. a) Add system-related data stores, data flows and processes b) Normalize the logical DFD into 3NF c) Create the user-interface with smaller fonts d) Change the system architecture to three-tiered architecture e) Delete extraneous data stores and delete extraneous data flows

a) Add system-related data stores, data flows and processes

1. Acceptance testing is generally done in two stages: a) Alpha tests and beta tests b) Black-box tests and white-box tests c) Integration tests and systems tests d) Unit tests and module tests e) Inductive tests and deductive tests

a) Alpha tests and beta tests

1. A process is: a) An activity of a function that is performed for some specific business reason b) A single piece of data within a system c) A collection of data within a system d) A person, organization or system that is external to the system e) A combination of function and the data it acts upon

a) An activity of a function that is performed for some specific business reason

1. The primary actor in a use case is generally: a) An external user of the system b) The Project Sponsor c) The Champion d) The Project manager e) The Systems Analyst

a) An external user of the system

1. Marco is working for iTunes and needs to have a database that can store complex data. His best choice might be: a) An object database b) A relational database c) A red-green database d) A tree database e) A spanning database

a) An object database

1. It is better to make menus ______. a) Broad and shallow b) Narrow and deep c) Broad and deep d) Narrow and shallow e) Wide and tall

a) Broad and shallow

1. Joan's project is to take a fairly straight-forward manual process and make it an electronic process. This will make the processing more efficient. Which of the following requirements analysis strategies is she using? a) Business process automation b) Business process improvement c) Business process internalization d) Business process reengineering e) Business process renovation

a) Business process automation

1. The process of coordinating a program as it changes through construction (like keeping files and programs in different places) is called: a) Change control b) Separation of duties c) Judicial control d) Scope creep e) None of these

a) Change control

1. A ___________ is used when several fields must be entered before the form can be processed. a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

a) Completeness check

1. Which Data Flow Diagram shows the entire system with its environment with only one process? a) Context Diagram b) Level 0 diagrams c) Level 1 diagrams d) Level 2 diagrams e) All DFDs show this

a) Context Diagram

1. Andre has a diagram that shows only one process and external entities. He is developing a: a) Context diagram b) Use case diagram c) Level 0 diagram d) Level 1 diagram e) Level 2 diagram

a) Context diagram

1. Which Data Flow Diagram does not have data stores? a) Context diagram b) Level 0 diagram c) Level 1 diagrams d) Level 2 diagrams e) Process Diagram

a) Context diagram

1. The relationship between use cases and data flow diagrams is: a) Data flow diagrams start with information in the use cases and the requirements. The set of DFDs that make up the process model simply integrates the individual use cases. b) Both are tools in a systems analysts toolbox, although they do unrelated things c) Use cases are developed by users exclusively; while DFD's are developed by analysts exclusively d) Use cases come out of JAD sessions and clarify what was discussed by users in those sessions; DFD's come out of analysts interviews. e) They are the same thing - use cases are process models using the DeMarco and Yourdon notation; and DFD's are process models using the Gane and Sarson notation.

a) Data flow diagrams start with information in the use cases and the requirements. The set of DFDs that make up the process model simply integrates the individual use cases.

1. The purpose of creating physical ERDs is to: a) Depict the "business view" of the data, but omit any implementation details b) Normalize the database to third normal form c) Do a new technology analysis d) Drive the users nuts e) Help junior analysts to find the transactions between systems

a) Depict the "business view" of the data, but omit any implementation details

1. Barton is an analyst developing a use case. Which of the following will probably NOT be on his use case? a) Description of data flows b) Use case name c) A use case number d) Source for the major inputs e) Type of trigger

a) Description of data flows

1. Typically, the third step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

a) Design interface standards

1. PCM Incorporated will need to purchase new servers for a system. This would be a: a) Development cost b) Operating cost c) Ongoing cost d) Intangible cost Intangible benefit

a) Development cost

1. On test plans: a) Each individual test has a specific objective and describes a set of very specific test cases to examine b) Each user must contribute to the specific goals of the test plan c) Each member of the project team, plus all developers (programmers) must identify one specific application that they will test d) Only the master project manager tests, and only after all coding has been completed in what is called the "Omega" test e) The use of multiple choice options has been shown to effectively assess to a 99.9% accuracy rate

a) Each individual test has a specific objective and describes a set of very specific test cases to examine

1. Some systems that are used infrequently should probably emphasize: a) Ease of learning b) Higher user flexibility c) Ease of use d) More short-cut keys and built in keyboard functions e) Organizational feasibility

a) Ease of learning

1. TJ is coordinating a project. Which would he probably NOT use to avoid conflicts? a) Encourage a competitive edge between team members b) Clearly defining plans for the project c) Develop a project charter d) Look at other projects and priorities and see how that might impact the project e) Communicate the business value to the team

a) Encourage a competitive edge between team members

1. When you join two relational database tables together, frequently the primary key in one table will be a(n) ____________ in the other table. a) Foreign key b) International key c) Primary key d) Linked list e) Entity

a) Foreign key

1. Ruth is an analyst. On her DFD diagram she has just placed a process. She will a) Give it a verb phrase name, like 'search inventory' b) Give it a noun description phrase, like 'Inventory-process-1' c) Give it only a number - and depending on whether it is a major process (a whole number) or a subsidiary process (a whole number with a decimal point and value - like 1.3) d) Give it a sentence name, like 'Customer arrives at checkout counter' e) Use whatever process she feels comfortable with - as long as she is consistent

a) Give it a verb phrase name, like 'search inventory'

1. As a structure chart is constructed, it is generally best to build modules with: a) High cohesion b) Highly coupled c) High fan-out d) Have the word "and" in the module title e) A high level of coincidental cohesion

a) High cohesion

1. Interface evaluations almost always ______________. a) Identify improvements b) Are conducted with other analysts in a structured walkthrough c) Find coding errors d) Are part of the training and implementation process e) Cause additional scope creep in the project

a) Identify improvements

1. The last step in creating basic ERD's is to: a) Identify relationships b) Define attributes and assign identifiers c) Recognize entities d) Test them with users e) Compile them with Java

a) Identify relationships

1. As compared to integration testing, system testing: a) Is much broader in scope b) Uses production data (rather than test data) c) Is done by hand-picked end-users (rather than systems analysts) d) Involves both black-box and red-box testing e) Makes more extensive use of stubs

a) Is much broader in scope

1. Chunxia is balancing her DFD. This means she is: a) Making sure that all information presented at one level is accurately represented in the next level b) Making sure that each data store has at least one input data flow and at least one output data flow c) Making sure that each process has at least one input data flow and at least one output data flow d) Making sure that all processes start with action verb phrases e) Making sure that all data flows have noun names

a) Making sure that all information presented at one level is accurately represented in the next level

1. Generally, transform structures on a structure chart will have: a) Many afferent processes b) Many efferent processes c) Many data couples d) Many control couples e) Many conditional couples

a) Many afferent processes

1. Logical process models are: a) Models that describe processes without suggesting how they are conducted b) Coded logic models c) Models based upon implementing the if-then-else programming structure d) Developed by the infrastructure analyst e) Created in the system walkthough

a) Models that describe processes without suggesting how they are conducted

1. Which is a true statement about IT projects? a) Most IT departments face a demand for IT projects that far exceed the ability to do them. b) Project Managers must be certified as PMP (Project Management Professionals) c) Project estimates tend to have a built-in buffer of time d) Project teams of 12 to 15 are generally considered optimum e) The majority of projects taken on by IT departments are not strategic to the business

a) Most IT departments face a demand for IT projects that far exceed the ability to do them.

1. When normalizing data models, if you take attributes that have multiple values for a single instance of an entity and create separate entities for those attributes you are moving from: a) O normal form to 1st normal form (1NF) b) 1st normal form (1NF) to 2nd normal form (2NF) c) 2nd normal form (2NF) to 3rd normal form (3NF) d) Generalized normal form (GNF) to fully normalized form (FNF) e) Dependent normal form (DNF) to Independent normal form (INF)

a) O normal form to 1st normal form (1NF)

1. The interview process has gone well. There are a few things that need clarification and what really happens when specific financial analysts use the system. Which of the following might be the best way to verify what does happen? a) Observation of how the analysts do their work b) Document analysis of what the system was to do c) A JAD session with end users, financial analysts and top managers d) Additional interviews with top level managers in the finance area e) Questionnaires / survey of end users of the system

a) Observation of how the analysts do their work

1. The authors suggest a good time to start the documentation process is: a) Once the interface design and program specifications are complete b) Once the system test is complete c) Once the alpha acceptance test is complete d) Once the beta acceptance test is complete e) Once the logical ERDs and DFDs have been translated into physical ERDs and DFDs

a) Once the interface design and program specifications are complete

1. When an analyst is seeking a more wide ranging response to questions they would probably use: a) Open Ended b) Close ended c) Observation d) Probing

a) Open Ended

In a structure chart, the purpose of a control couple is to: a) Pass parameters from a subordinate module to the control module b) Pass parameters from the control modules to a subordinate module c) Pass data from a subordinate module to the control module d) Pass data from the control module to a subordinate module e) Chaperone the dance for programmers on the project

a) Pass parameters from a subordinate module to the control module

1. A use scenario is one commonly used ________________. a) Path through a use case b) Normalized ERD structure c) Context diagram d) Buy-in flowchart e) Throwaway prototyping tool

a) Path through a use case

1. Alice is calculating whether a system will lower costs or increase revenues. What SDLC phase is she in? a) Planning b) Analysis c) Design d) Implementation e) Evaluation

a) Planning

1. Thomas is trying to change his Use Case into a Data Flow Diagram. He has found that a use case step generally is the same as a ________ on the Level 1 Data flow diagram. a) Process b) External Entity c) Data flow d) Internal Entity e) Data store

a) Process

1. This type of documentation is designed to be used when the user needs to learn how to perform a specific function (such as updating a field or adding a new record): a) Reference documentation b) Procedures manuals c) Tutorials d) Systems documentation e) Final documentation

a) Reference documentation

1. Most relational database systems support: a) Referential integrity b) Pop-up menus c) Customizable user-interface colors and graphics d) The 'three-clicks' rule e) Broadband connectivity

a) Referential integrity

1. Processes in data flow diagramming are represented by: a) Rounded rectangles b) Arrows c) Rectangles that is open on the right end d) Enclosed rectangles e) Circles

a) Rounded rectangles

1. After creating the interview report you should: a) Send a copy to the interviewee with a request to read it and correct or clarify b) Change the document into a unchangeable format (like a pdf file) so that it cannot be changed or edited c) Distribute the interview report to all others that are on the interview schedule so they will not have to go over the same materials d) Edit the report into a bulleted format for easier analysis e) Distribute the interview report to the interviewee's manager.

a) Send a copy to the interviewee with a request to read it and correct or clarify

1. The Major Inputs section on a use case will give the _____________ a) Sources of that input b) Destinations of that input c) Creator of that input d) User of that input e) What triggers the input to occur

a) Sources of that input

1. Ramesh has drawn a set of DFD's that are not properly balanced. This is probably a: a) Syntax error b) Semantic error c) Modeling error d) First law of conservation of data error e) Second law of conservation of data error

a) Syntax error

1. Which of the following project roles would identify how technology can improve business processes? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Requirements analyst

a) Systems analyst

1. Which of the following project roles would insure that the system conforms to information systems standards? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

a) Systems analyst

1. The project team is very knowledgeable about relational database management systems. In terms of feasibility, this might be best known as: a) Technical feasibility ('can we build it') b) Economic feasibility ('should we build it') c) Managerial feasibility ('why would we build it') d) Graphical feasibility ('does it fit this project') e) Organizational feasibility ('if we build it, will they use it')

a) Technical feasibility ('can we build it')

1. Marta has asked the users of a system to picture themselves performing the processes and to write down those processes in a sequential order. She should get a good idea of ________. a) The major steps for each use case b) The use case c) The elements within steps d) The temporal triggers e) The external actors

a) The major steps for each use case

1. The fifth step in creating a Physical Data Flow Diagram is a) Update the metadata in the CASE repository b) Draw a human-machine boundary c) Add implementation references d) Add system-related data stores, data flows and processes e) Update the data elements in the data flows

a) Update the metadata in the CASE repository

1. Which of the following is NOT an approach to integration testing? a) Use-case testing b) User interface testing c) Use scenario testing d) Data flow testing e) System interface testing

a) Use-case testing

1. Omar is an analyst building a use case. Which of the following project roles might be the most important in terms of getting information about building the use case? a) Users b) Programmers c) Other analysts d) Project Sponsor e) Equipment vendors

a) Users

1. The concept for planning good performance of databases is known as: a) Volumetrics b) Econometrics c) Moving averages d) Correlation e) PERT

a) Volumetrics

1. Which of the following methodologies might be most appropriate if you have a system project with: clear requirements; very familiar technologies; not all that complex; reasonably reliable; a very long time schedule, and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

a) Waterfall

1. Which of the following methodologies takes the longest to complete all the SDLC steps? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

a) Waterfall

Connie knows that _________ when trying to motivate people to change a) people act on what they believe to be true, not what actually is true b) people act out of political reasons, such as trying to please the manager c) people will change only when it is best for the organization d) change is generally related to age; younger employees will embrace change; while older employees will not embrace change e) change can only occur when negative pressures are in play

a) people act on what they believe to be true, not what actually is true

1. Outsourcing firms called _____________ supply software applications and/or software related services through the Internet. a. Application Service Providers (ASPs) b. Enterprise Resource Providers (ERPs) c. System Development Life Cycle Companies (SDLCs) d. Information Technology Developers (ITDs) e. None of these

a. Application Service Providers (ASPs)

1. A sample access control requirement would be: a. Customer service reps can modify customer files but not delete them b. Data will be encrypted for secure ordering c. All uploaded files will be checked for viruses d. The system will cost $38,900 per minute of downtime in lost revenues e. None of these

a. Customer service reps can modify customer files but not delete them

1. If (a) the business need is unique, (b) there is a desire to build in-house skills; (c) the time frame is flexible, it might be best to: a. Do in-house / custom development b. Buy an ERP system c. Outsource to India d. Purchase a software package e. Hire a consultant

a. Do in-house / custom development

1. Workarounds are: a. Not supported by a vendor who supplied the packaged software b. Designed by the vendor c. Created to interface two software packages that are compatible with each other d. Enterprise Wide Software Packages that are designed for satellite use e. None of these

a. Not supported by a vendor who supplied the packaged software

1. Server virtualization involves: a. Partitioning a physical server into smaller virtual servers b. Stacking blade servers c. Using a laptop as a server d. All of these

a. Partitioning a physical server into smaller virtual servers

1. Which of the following lists indicates the correct ordering of deliverables in a system specification document? a. System Acquisition Weighted Alternative Matrix, Interface Design, Physical Data Model Data Storage Design b. Data Storage Design, Interface Design, Architecture Design, Updated Crud Matrix c. Hardware and Software Specifications, Interface Design, Data Storage Design, Architecture Design d. Program Design Specifications, Physical Data Model, Data Storage Design, Architecture Design e. Update CASE Repository Entries, Update CRUD Matrix, Interface Design, Architecture Design

a. System Acquisition Weighted Alternative Matrix, Interface Design, Physical Data Model Data Storage Design

1. In the initial stage of design, what are business requirements converted into? a. System Requirements b. Work Order Summary c. Computer Qualifications Checklist d. Vanilla System e. Hardware Blueprint

a. System Requirements

1. Custom development is used when: a. The business need is unique b. The business need is not core to the business c. The project has a project manager who can coordinate vendor efforts d. The time frame is short e. The skills are not strategic

a. The business need is unique

1. An example of a multilingual requirement is: a. The system will operate in English, French and Spanish b. Country managers can define custom fields c. All date fields will be presented in a uniform format d. Personal information about English customers cannot be sent to Chinese systems e. Country managers are able to change telephone number formats

a. The system will operate in English, French and Spanish

1. An example of a capacity requirement would be: a. Transmissions require 300K of data b. The systems uptime will be 99% c. Response time must be <2.8 seconds for any transactions d. The inventory database will be updated in real time e. None of these

a. Transmissions require 300K of data

1. A time and arrangements deal is considered: a. Very flexible b. Very rigid c. Cheaper than any other option d. Useless when considering a systems design Always the best option for any project

a. Very flexible

1. An advantage of custom development might be: a. You get a system that is tailored to the current business and meets specific needs b. The rapid development of custom systems c. The low cost (as compared to buying a package) d. The low risk factor e. The ability for in-house developers to work on systems that are in new programming languages and in technologies that are unknown to them prior to the development

a. You get a system that is tailored to the current business and meets specific needs

1. Pseudocode is: a) A language popularized by Feinstein and Longenecker in the 1990's b) A detailed outline of the lines of code that need to be written c) A 'pretend' syntax inherent in all CASE tools d) The translation of code into ASCII e) A dialect of Visual Basic only used in program design

b) A detailed outline of the lines of code that need to be written

1. Which of the following would be a 'black hole' error on a DFD? a) A process has no input b) A process has no output c) A process has four inputs and only three outputs d) Data moves directly from a data store from an external entity e) Two processes send data flows to the same data store

b) A process has no output

1. Parallel methodology is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

b) A series of versions

1. Pseudocode is: a) The same as structured English b) A technique similar to structured English c) A subset of the Java programming language d) A coding environment sponsored by Oracle e) The term for designing language prototyping screens with Visual Basic or HTML

b) A technique similar to structured English

1. Bridget is managing a systems development project. The programmers have gotten farther and farther behind in the schedule. One thing she should NOT do is: a) Use a code generator that comes with high-end CASE tools b) Add more programmers to the development team c) Keep communication channels open d) Hold weekly meetings e) Keep close tabs on the process so it doesn't slip farther

b) Add more programmers to the development team

1. Austin is a systems analyst. Which of the follow people might be the most valuable to him in developing a use case for an accounts payable system upgrade? a) Beth, a software vendor for Peachtree Accounting Software b) Amy, a team manager in the accounts payable department c) Lisa, the project manager for the project d) Casey, a fellow analyst who is more experienced in making use cases e) Bill, a Java programmer in the applications development area.

b) Amy, a team manager in the accounts payable department

1. Michaela is a systems analyst who is determining business requirements. What would most likely be the SDLC phase for her? a) Planning b) Analysis c) Design d) Implementation Business requirements are not developed by systems analysts, but by business analysts

b) Analysis

1. By definition, external entities on the DFD: a) Are used as the starting point for the physical data flow diagram b) Are outside the scope of the system c) Will be the top of the structure chart d) Will become database table entries e) Are updated with metadata to become part of the physical DFD

b) Are outside the scope of the system

1. As a last step in building a use case for the study-abroad registration system, Brianna will: a) Ask Patrick in the study abroad office to confirm the use case b) Ask Wendy in the registrar's office to confirm the use case c) Ask Jonathan, a student who just completed a study-abroad experience, to confirm the use case d) Ask Drew in the students affairs office to confirm the use case e) Ask Taylor, another systems analyst to confirm the use case

b) Ask Wendy in the registrar's office to confirm the use case

1. This type of file records "before" and "after" images of data as the data gets altered. a) Intelligent files b) Audit files c) Master files d) Raw files e) Prime files

b) Audit files

1. Decomposing a DFD means: a) Balancing the processes so that each process has three and only three sub-processes b) Breaking complex processes into a structured set of detailed diagrams c) Doing a walk through on the entire DFD structure with all the analysts on the project team d) Taking lower levels of process refinement and aggregating them into a major system e) Making sure that all data stores are shown on each child DFD diagram

b) Breaking complex processes into a structured set of detailed diagrams

1. Which is an activity the users probably will NOT do on a project? a) Make decisions that influence the project b) Budget funds for the project c) Perform hands-on activities for the project d) Be assigned specific tasks to perform (with clear deadlines) e) Have some official roles on the project team

b) Budget funds for the project

1. The type of skill that is common to systems analysts to understand how IT can be applied to business situations and to ensure that the IT delivers real business value is: a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

b) Business

1. Which of the following project roles would analyze the key business aspects of the system? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

b) Business analyst

1. Moderate changes to existing processes falls under the _________ analysis. a) Business process automation (BPA) b) Business process improvement (BPI) c) Business process reengineering (BPR) d) Business process blue-skying (BPB) Business process efficiency (BPE)

b) Business process improvement (BPI)

1. The concept of putting records that are somehow related together on the same server (or storage device) is called: a) Carmelization b) Clustering c) Joining d) Normalization e) Hybrid technologies

b) Clustering

1. Which of the following is not a project characteristic that will affect the methodology selection decision? a) Schedule visibility b) Creating a cost/benefit spreadsheet c) User requirements clarity d) Complexity of the system e) System reliability

b) Creating a cost/benefit spreadsheet

1. Typically, the fourth step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

b) Creating an interface design prototype

1. The Major Outputs section on a use case will give the _________ a) Sources of that input b) Destinations of that input c) Creator of that input d) User of that input e) What triggers the input to occur

b) Destinations of that input

1. Which is generally the best understood component of the SDLC and may offer the fewest problems? a) Developing the database design b) Developing the system's software c) Writing onscreen documentation d) Changing the data into third normal form e) Doing interviews

b) Developing the system's software

1. The CRUD matrix shows a) The crud that is coming into the system and how to quarantine it b) Exactly how data are used and created by the major processes in the system c) The 1:M relationships on an ERD diagram d) The external entities, process and major data flows from the Context DFD diagram e) Where customer, relationships, users and developers will interact with a system

b) Exactly how data are used and created by the major processes in the system

1. Which is NOT a good practice in conducting interviews? a) Be happy - happy people radiate confidence b) Explain thoroughly - it is estimated that in a strong interview session, the interviewer (you) should talk and explain about 60% of the time; and the interviewee should answer about 40% of the time c) Watch interviewees' facial expressions, how they sit and their body language; do they cross their arms; do they lean forward? d) Pay attention to what the interviewee is saying e) If the interviewee ask you a question, answer it truthfully - and if you don't know an answer, say so

b) Explain thoroughly - it is estimated that in a strong interview session, the interviewer (you) should talk and explain about 60% of the time; and the interviewee should answer about 40% of the time

1. According to the textbook, which of the following is not a cause of project failure? a) Flaws in analysis b) Flaws in aesthetics c) Flaws in user interface design d) Flaws in database design e) Flaws in developing correct system specifications

b) Flaws in aesthetics

1. A ___________ is used when fields are numeric or contain coded data. a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

b) Format check

1. Suggestions for motivation might include all of these EXCEPT: a) Setting realistic deadlines b) Giving all team members the same bonus on a project c) Recognize and reward good efforts d) Reward those with outstanding quality and effort e) Having a good working environment

b) Giving all team members the same bonus on a project

1. Omar has a model with 85 entities. He can: a) Compress these into at most seven entity grouping units b) Group these into related subject areas c) Stop - he has all entities defined d) Sort the entities alphabetically e) Co-validate the entities with the level 2 DFD diagrams

b) Group these into related subject areas

1. The most efficient tables (in terms of storage efficiency) in relational database management systems: a) Have duplicate data, especially for when more than one table is joined together for queries b) Have no redundant data c) Are denormalized d) Have entire tables duplicated e) Use plasma technologies

b) Have no redundant data

1. Juan is using a file that is created by an older, legacy system. It is likely that the data is: a) Unusable b) In a proprietary format c) In a standard format (like comma separated value) d) Is sorted by customer's middle name e) In an object-oriented structure like Ariel

b) In a proprietary format

1. Generally, most errors (defects) are found in which two testing periods? a) Unit testing and integration testing b) Integration testing and system testing c) System testing and acceptance testing d) Unit testing and acceptance testing e) Alpha testing and beta testing

b) Integration testing and system testing

1. Amy is planning on talking with a clerk and a manager in the accounts payable area, a manager in the procurement department, and two vendors. She is probably doing: a) Observation b) Interviews c) JAD d) Documentation analysis e) Organizational Feasibility

b) Interviews

1. When eliciting requirements, the most commonly used technique is: __________ a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

b) Interviews

1. A general suggestion about using couples in drawing structure charts is: a) The use of many couples clarify the processing b) It is best to be conservative when applying couples to your diagram c) To use 'combination' couples when both data couples and control couples are needed d) You should have at least twice as many afferent couples as efferent couples e) Use only data couples and no control couples

b) It is best to be conservative when applying couples to your diagram

1. Which of the following is not a RDBMS? a) Oracle b) NoSQL c) SQL d) MySQL e) None of these

b) NoSQL

1. The two methods to validate that an ERD is well formed are _____. a) Balancing with process models and following design guidelines created by Chen b) Normalization and balancing with process models c) Renaming theory d) Balancing with process models and renaming theory e) Normalization and following design guidelines created by Chen

b) Normalization and balancing with process models

1. You have entities of ITEM, SOLD-ITEM, SALE and PAYMENT. Which most likely is NOT a relationship? a) SALE is paid by PAYMENT b) PAYMENT pays for ITEM c) ITEM is included in SOLD-ITEM d) SALE involves SOLD-ITEM e) PAYMENT pays for SALE

b) PAYMENT pays for ITEM

1. This output is poor at helping users recognize precise numeric values and should be replaced by tables when precision is important. a) Detail report b) Summary report c) Graphs d) Turnaround document e) None are poor

c) Graphs

1. Which of the following methodologies might be most appropriate if you have a system project with: clear requirements; very familiar technologies; not all that complex; reasonably reliable; a short time schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

b) Parallel

1. Which of the following is NOT a suggestion for preventing mistakes? a) Label commands and actions appropriately b) Place menu items in alphabetical order c) Limiting choices d) Gray-out commands that cannot be used e) Create secondary menus when there are many similar choices on a menu

b) Place menu items in alphabetical order

1. Another outcome of the planning phase is the: a) Feasibility analysis document b) Project plan c) System specification document d) System proposal document e) Business process document

b) Project plan

1. In determining if a process is to be automated, the project team will do all of the following EXCEPT: a) Weigh the costs b) Redraw the logical DFD as a combined logical/physical DFD c) Determine benefits d) Evaluate the efficiency e) Consider the integrity of the process to the system

b) Redraw the logical DFD as a combined logical/physical DFD

1. Lines on an ERD diagram indicate: a) Hierarchies between processes b) Relationships among the data c) Plurality of data items d) Uniqueness of data items e) Primary keys

b) Relationships among the data

1. Bob is selecting a systems analysis and design methodology. What might be the first step? a) Selecting the shortest methodology b) Researching the organizations standards and policies for 'approved' methodologies c) Interviewing senior management as to their suggestions on methodologies d) Do a quick 'cost/benefit' analysis on which methodology will provide the most benefits at the lowest cost e) Do an analysis on which methodology might lessen or eliminate scope creep

b) Researching the organizations standards and policies for 'approved' methodologies

1. Ramya is preparing an economic feasibility study. She has a calculation where she takes total benefits minus total costs and divides that answer by the total costs. She is calculating: a) Cash flow b) Return on investment c) Break-even point d) Net present value Internal rate of return

b) Return on investment

1. Which of the following is probably NOT a part of most use cases? a) Primary Actor b) Secondary Actor c) Major inputs descriptions d) Major steps performed e) Identification of the trigger

b) Secondary Actor

_________________ is the process of refining the system to make sure it continues to meet business needs. a) Business contingency plan b) System maintenance c) Help desk d) SDLC e) all of these

b) System maintenance

1. The outcome of the analysis phase is the: a) Feasibility analysis document b) System proposal document c) System specification document d) System request document e) Business process document

b) System proposal document

1. Which of the following is NOT true about ERDs? a) Special symbols are added to show high-level business rules b) The diagrams are drawn in a sequential order - from top to bottom c) Similar kinds of information are listed together in entities d) ERD's are data modeling techniques e) Lines are drawn to show relationships among the data

b) The diagrams are drawn in a sequential order - from top to bottom

1. The test objective is taken directly from: a) The results of the JAD session b) The program specification c) The use-cases d) The project sponsor e) The questions raised in a focus-group application

b) The program specification

1. When creating the index, which of these will probably NOT be a place to find terms to include in the index: a) The set of commands in the user interface (like open file, modify, etc.) b) The set of user interface design standards (like aesthetics, layout, consistency, etc.) c) The set of major concepts in the system (like in the Tune Source example of artist, tune, music genre, etc.) d) The set of business tasks (like ordering replacement units or making an appointment) e) The set of synonyms for other sets (like 'quit', 'stop', 'end' for 'exit' or 'erase' for 'delete')

b) The set of user interface design standards (like aesthetics, layout, consistency, etc.)

1. You might have to go back and adjust the steps in a use case, if ____________ a) There are more than three major inputs to a step b) The steps are of varying size c) The trigger is an external one d) The importance level is 'high' e) The primary actor is an external customer

b) The steps are of varying size

1. The term 'bug' in software came from: a) An English translation of the word for defect in German b) The story of a moth getting caught inside an early computer c) The acronym BUG - for binary unknown glitch d) No one knows the reason e) None of these

b) The story of a moth getting caught inside an early computer

1. Which is NOT true of structure charts? a) They show sequence b) They show the user interface c) They show couples d) They show selection e) They emphasize structure and reusability

b) They show the user interface

1. When implementing the 'minimize user effort' factor, most interface designers follow the ____. a) Two-clicks rule b) Three-clicks rule c) Four-clicks rule d) User Experience rule e) The menu option rule

b) Three-clicks rule

1. In Use Scenario Development, the goal is: a) To describe all possible use scenarios within a use case b) To describe the most commonly occurring use scenarios c) To accurately model all possible DFDs d) To give complex and complete narrative descriptions of all scenarios e) To effectively model all data flows and data models

b) To describe the most commonly occurring use scenarios

1. Primary keys are: a) The same as default keys (or default values) b) Unique values for each record in a file or table c) Elementary values (like 'primary' school) d) Prime numbers in a Fibonacci sequence e) The same as foreign keys

b) Unique values for each record in a file or table

1. Acceptance tests are done primarily by: a) Programmers b) Users c) Developers d) Systems Analysts e) Project Managers

b) Users

1. Modality refers to: a) Relationships of one-to-one; one-to-many; or many-to-many b) Whether and entity can exist with or without a related instance in the related entity c) The hierarchical structure that was developed in process models applied to data models d) The number of attributes generated by an entity e) Whether the entity has a unique identifier (aka 'primary key') or a concatenated identifier (aka 'composite key')

b) Whether and entity can exist with or without a related instance in the related entity

1. _____ refers to how well the lines of code within each module in a structure chart relate to each other. a) calculation b) cohesion c) control d) coupling e) fan-in

b) cohesion

Generally the cheapest training to deliver would be: a) classroom training b) computer-based training (CBT) c) one-on-one training d) mentoring e) sending employees to a nearby college or university

b) computer-based training (CBT)

In a structure chart, a transaction structure _____. a) contains a control module that calls several subordinate modules in sequence, after which something "happens" b) contains a control module that calls subordinate modules, each handling a particular transaction c) contains a transactional loop d) is a subordinate module that handles a particular transaction is subordinate to subordinal modules

b) contains a control module that calls subordinate modules, each handling a particular transaction

With resistant adopters (those that simply refuse to accept the change with the new system), it might be better to: a) bring them together for a meeting and open debate on a unimpassioned, logical approach b) ignore this small minority of resistant adopters and focus on the larger majority of ready and reluctant adopters c) find the more vocal resistant adopters and 'bribe' them to accept the new system with such actions as updated computer systems, time off, and 'trinkets' (like banners, buttons, stuffed animals) d) find the leaders of this resistance and fire one of two of them as a message to the others to get 'on board' e) use an implementation JAD session with leaders from the ready adopters, reluctant adopters, and resistant adopters to find common ground

b) ignore this small minority of resistant adopters and focus on the larger majority of ready and reluctant adopters

It has been a busy project experience for Omar. During the analysis phase, he encountered some negative feedback from users. During design, his best user-interface analyst left for a new position and a novice user-interface designer took over. And during the coding, the team had to rely on some off-shore developers who had trouble understand the programming specifications. To get the system running as expected, the testing time was reduced. Which of the following conversion approaches might be the safest approach for Omar and the project team? a) direct, whole-system, simultaneous conversion b) parallel, pilot site, simultaneous conversion c) direct, phased, simultaneous conversion d) direct, pilot and phased conversion e) parallel, modular and top-down conversion

b) parallel, pilot site, simultaneous conversion

What is probably a common scenario in most organizations when installing a new system? a) users are excited about the new system b) resistance to change exists c) scope creep delays implementation by at least two months d) the change agent is a member of the business unit adopting the change e) the project sponsor is the lead systems analyst

b) resistance to change exists

Which of the following is a true statement about successful change? a) the migration plan is not clear b) the likelihood of successful change is increased when the cost of the transition to individuals who must change is low c) there is a need for significantly different new skills d) there is a strong possibility of disruptions in how the company has done business with the new system e) the change agent is a newcomer who has been viewed as 'pushy' by potential adopters

b) the likelihood of successful change is increased when the cost of the transition to individuals who must change is low

Once the project team has installed the system and performed the change management activities, the system is officially turned over to: a) the users b) the operations group c) management d) vendors e) consultants

b) the operations group

The authors suggest that "with new systems," it may be best: a) to expect success with optimism b) to expect the worst c) to add three additional weeks of alpha and beta testing d) to keep the existing system for two additional years e) to hold daily developer & user troubleshooting meetings during the implementation stage

b) to expect the worst

A comment about why people resist change might be: a) people like change and feeling part of a successful organization b) what is good for the organization is not necessarily good for the people c) change can be very uplifting and comforting d) change is the motto of Wal-Mart e) using new and updated systems makes a person look like a "yes-person"

b) what is good for the organization is not necessarily good for the people

When installing hardware, it is best to: a) leave this to the last minute, so to get the latest versions of the hardware from the vendor(s) b) work closely with the vendors who are supplying the hardware c) create a RFP two weeks before install date d) call Home Depot e) outsource the hardware installation to India

b) work closely with the vendors who are supplying the hardware

1. Thick clients contain: a. Enormous storage abilities b. Almost all or most of the application logic c. Almost none or less than half of the application logic d. Almost all of the data logic e. None of these

b. Almost all or most of the application logic

1. Another name for custom development might be: a. Offshore outsourcing b. In-house development c. Vendor supplied in-house consulting d. CASE tools e. Package software

b. In-house development

1. Client-server architecture holds the client responsible for_____ and server is only responsible for _____. a. Application Logic; Presentation Logic b. Presentation Logic; Data Access Logic and Data Storage c. Data Access Logic and Presentation Logic; Data Storage d. Application Logic; Data Storage e. Data Storage; Application Logic

b. Presentation Logic; Data Access Logic and Data Storage

1. For efficiency purposes, it is wise to___________ when there is a basic software need to be satisfied. a. Implement a company-wide project team to handle a custom software scripting b. Purchase a packaged system c. Design a blueprint and contract an outside vendor to develop a program d. Make do with the current software package e. Utilize a professional consultant to develop a system of servers7

b. Purchase a packaged system

1. The following document is utilized with possible vendors on projects with smaller budgets, instead of sending a lengthy document to all possible vendors: a. Request for Proposal (RFP) b. Request for Information (RFI) c. Request for Quote (RFQ) d. Request for Efficient Information Distribution (REID) e. More Optimal Desires (MOD)

b. Request for Information (RFI)

1. DES is an example of: a. Asymmetric Encryption Algorithm b. Symmetric Encryption Algorithm c. Bi-Adjusted Encryption Algorithm d. Dynamic Encryption System e. Alternative Systems Security Algorithms

b. Symmetric Encryption Algorithm

1. In what SDLC stage do we determine the business needs for an information systems project? a. The design phase b. The analysis phase c. The dissection stage d. The installation stage The big bang stage

b. The analysis phase

1. One problem with using packages software systems is: a. It takes a very long time to get the system and get it installed b. The company has to accept the functionality that is provided with the system c. Many common software packages have been written and tested and are readily available d. There are many good software packages that are reasonable in price Most software packages allow for some customization

b. The company has to accept the functionality that is provided with the system

1. Fixed-price contracts are considered: a. Very flexible b. Very rigid c. Always cheaper than any other option d. Useless when considering a systems design e. Always the best option for any project

b. Very rigid

1. The term in the computing domain which refers to the creation of devices or storage with the use of software and not hardware is: a. Encryption b. Virtualization c. Dynamic Creation d. Alternative Devises e. None of these

b. Virtualization

1. The objective of architecture design is to determine_______________. a. How aesthetically pleasing the server system will be b. What parts of the application software will be assigned to what hardware c. How the computers will be arranged to provide ample storage d. Where the mainframe will be situated e. None of these

b. What parts of the application software will be assigned to what hardware

1. Which of the following might be a good choice of an icon for saving on a user interface? a) A piggy bank b) A dollar sign c) A computer diskette d) A hard drive image e) A green "S"

c) A computer diskette

1. A payroll data flow diagram has a data store called Accumulated Salary Data. At one stage in the DFD, a process "Calculate YTD-Taxes" gets data from that data store, updates it in the process, and writes it back out. The diagram should show: a) A single line with arrows on both ends labeled YTD Payroll Details b) A dashed line with arrows on both ends labeled YTD Payroll Details c) A line out of the data store labeled: Current YTD Payroll Details; and a line into the data store labeled: Updated YTD Payroll Details d) Two separate data flow lines but each with the same name YTD Payroll Details e) Two dashed lines but each with the same name of YTD Payroll Details

c) A line out of the data store labeled: Current YTD Payroll Details; and a line into the data store labeled: Updated YTD Payroll Details

1. Andrea is creating a diagram model for processes (without regard to whether it is computerized or a manual process). She is probably creating _______________. a) A physical process model b) A PMT (process management tool) model c) A logical process model d) A user process model e) A UML system case model

c) A logical process model

1. Throwaway prototyping is BEST characterized as: a) A 'quick and dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction More explicit testing

c) A method for exploring design alternatives

1. Unit tests focus on: a) All modules (all units) b) Users and their acceptance of how a specific unit works c) A program or a program module d) Interact screen forms e) How the overall system functions

c) A program or a program module

1. TJ has prepared a spreadsheet where the total benefits are $182,000; the total cumulative costs are $120,000. The ROI would be: a) $62,000 b) About 34% c) About 51.7% d) About 65.3% e) Less than 20%

c) About 51.7%

1. The three types of basic processes on a process model: a) Sequence, selection and iteration processes b) Navigation, status and work processes c) Afferent, central and efferent processes d) Batch, online and real time processes e) Singular, bilateral and library processes

c) Afferent, central and efferent processes

1. When developing the Major Inputs and Major Outputs for a use case, the analyst and users should consider: a) Only the common inputs and outputs b) Developing separate use cases for every possible input and every possible output c) All possible inputs and outputs (even with rare occurrences) d) What triggers these inputs and outputs e) Using activity elimination to see if these inputs and outputs are really needed

c) All possible inputs and outputs (even with rare occurrences)

1. Which would normally NOT be a reason for a project? a) When a business need has been identified b) A consultant has suggested a new customer relationship management system c) An open source platform has just come on the market d) An existing system just isn't working properly and the workaround is tedious e) To support a new business initiative

c) An open source platform has just come on the market

1. Jack is going over financial numbers for a proposed project. Which of the following system analyst skills is he exhibiting currently? a) Technical b) Business c) Analytical d) Interpersonal e) Management

c) Analytical

1. Every part of a system that is not automated will: a) Be ignored in the implementation of the system b) Be drawn as only logical DFDs not physical DFDs c) Be outside the human-machine boundary d) Go back through the analysis phase to become automated e) Will be drawn as diamond shapes on the structure charts

c) Be outside the human-machine boundary

1. A data model can __________: a) Illustrate return-on-investment, break-even point, and economic feasibility b) Represent actions or processes that occur in the to-be system c) Be used as a logical data model in analysis and as a physical data model in design d) Only be used in BPR situations e) Only be used with JAD sessions

c) Be used as a logical data model in analysis and as a physical data model in design

1. Ramona is preparing an economic feasibility study. She is calculating the payback period. She is calculating: a) Cash flow b) Return on investment c) Break-even point d) Net present value Internal rate of return

c) Break-even point

1. Probably the first thing to do when conducting an interview is: a) Turn on your tape recorder b) Get started by asking the first question on your list c) Build rapport with the interviewee so he or she trusts you d) Ask a close ended question e) Ask a probing question

c) Build rapport with the interviewee so he or she trusts you

1. Which would NOT likely be an attribute of an entity called "Student"? a) Age b) Student identification number c) Class room number d) Home phone e) Gender

c) Class room number

1. When an analyst is looking for specific, precise information they would probably choose this type of question: a) Probing b) Open Ended c) Close ended d) Observation e) Questionnaires

c) Close ended

1. When eliciting requirements from processing clerks and lower level managers about 'how' a system works, the best approach might be: _____. a) JAD session b) Document analysis c) Closed-ended interview questions d) Probing interview questions e) Root cause analysis

c) Closed-ended interview questions

1. Which of the following will probably NOT be at a system walkthrough? a) User representatives b) Management representatives c) Computer Center director d) Key decision makers e) Analyst who prepared the system proposal

c) Computer Center director

1. Which of the following is probably something that system testing WILL NOT verify? a) Systems documentation b) Ability to perform under heavy load c) Conformance to Sarbanes-Oxley requirements d) How well the system meets business requirements e) The systems usability

c) Conformance to Sarbanes-Oxley requirements

1. After working with Chris (who is a staff member in the registrar's office) on major steps in the registration process, Maureen (a systems analyst) will: a) Discuss these steps with Thomas, the project manager b) Create data-entity maps c) Create use cases d) Create user interface screens e) Create narrative storyboards

c) Create use cases

1. The second principal part of use cases is 'input and output'. Another name might be: a) Origin and ending b) Data normalization c) Data flows d) Parallelism e) Program specifications

c) Data flows

1. One common method to increase access speed is to: a) Use legacy databases in a indexed sequential access method b) Encrypt all data with 256 byte encryption c) Denormalize the tables d) Delete all primary keys e) Only use alphabetic data

c) Denormalize the tables

1. Chang is working on "How will this system work." What SDLC phase is he in? a) Planning b) Analysis c) Design d) Implementation e) Transition

c) Design

1. Kallie is creating use cases, data flow diagrams, and entity relationship diagrams. In what phase of the SDLC would she do this? a) Planning b) Analysis c) Design d) Construction e) Implementation

c) Design

1. Typically, the fifth step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

c) Do an interface evaluation

1. A process model can __________: a) Only document the as-is system b) Only document the to-be system c) Document both the as-is and the to-be system d) Only be used in BPR situations e) Only be used with JAD sessions

c) Document both the as-is and the to-be system

1. Which of the following is NOT correct? a) Every set of DFD's must have one context diagram b) Every process is wholly and completely described by the processes on its children DFD's c) Every process must be broken down farther on Level 1 and Level 2 diagrams d) Every data store has at least one input data flow someplace in the entire DFD system e) Every process has a unique name that is an action oriented verb phrase

c) Every process must be broken down farther on Level 1 and Level 2 diagrams

1. In most cases, decision support systems are best at: a) Finding particular records that are stored in legacy databases b) Finding processes that are stored in object databases c) Finding aggregated data d) Analyzing audit (or log) files for possible intrusion and security breaches e) Red and green linked list processing

c) Finding aggregated data

1. Legacy databases might include ________ and ______________ a) Master files and transaction files b) Audit files and look-up files c) Hierarchical databases and network databases d) Tree databases and leaf databases e) Red databases and Green databases

c) Hierarchical databases and network databases

1. Entity Relationship Diagrams show relationships between entities that are _____. a) Outputs from JAD sessions b) Consistent with the ACM guidelines c) In line with the business rules and processing d) Defined by the project sponsor e) Extensions of the process models

c) In line with the business rules and processing

1. Michael, a systems analyst, is preparing a closed wiki site for Northstate Bank. He has written permission from eight other companies to view their internal wiki sites, and also has approval from his manager and the project team to use these other sites for ideas and structure. This would be a form of: a) Business Process Automation b) Business Process Improvement c) Informal Benchmarking d) Formal Benchmarking e) Technology Analysis

c) Informal Benchmarking

1. Which would be the normal order of tasks? a) Requirements gathering, creating DFDs, creating use cases b) Creating use cases; creating DFD, holding JAD sessions c) Interviewing and/or JAD sessions; creating use cases; creating data flow diagrams d) Doing BPR, analyzing documents, creating DFDs, creating use cases e) Doing activity elimination, doing use cases, doing DFDs

c) Interviewing and/or JAD sessions; creating use cases; creating data flow diagrams

1. Which of the following is NOT a general type of navigation control for help topics? a) Table of contents b) Index c) Inverted pointer d) Text search e) Intelligence agents

c) Inverted pointer

1. The Human-Machine Boundary a) Is the keyboard and screen b) Builds on research in ergonometry c) Is a line drawn on the physical DFD to separate human action from automated processes d) Is a part of developing the HCI interface e) Separates where manual processes are separated by human completed processes

c) Is a line drawn on the physical DFD to separate human action from automated processes

1. Which of the following methodologies might be most appropriate if you have a system project with: somewhat unclear requirements; somewhat unfamiliar technologies; that is complex; reasonably reliable; a short time schedule and high schedule visibility? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

c) Iterative

1. Which of the following might result in version 1; version 2 (etc.) of a system? a) System Prototyping b) Waterfall Development c) Iterative Development d) System Prototyping e) Parallel Development

c) Iterative Development

1. This type of file stores 'core information that is important to the business' and for the application (such as customer mailing lists). a) History Files b) Audit files c) Master files d) Transaction files e) Intelligent files

c) Master files

1. If a program module is taking longer to develop than expected, the recommended action is: a) Put more programmers on the staff b) Force the developers to work weekends to catch up c) Move the expected completion date back d) Incorporate scope creep into the requirements e) Change the development environment into an object-oriented language

c) Move the expected completion date back

1. Which of the following is an open source DBMS? a) Microsoft Access b) SQL Server c) MySQL d) Excel e) CASE

c) MySQL

1. Test plans: a) Are generally developed by the programmers informally b) Generally only cover main processing and not the various sub-processes c) Often have 20 to 30 pages d) Can be massive with over 200 pages of very explicit plans and directions e) Can generally be written in three pages or less

c) Often have 20 to 30 pages

1. An interview report is prepared in which step of the interview process? a) Conducting the interview b) Designing interview questions c) Post interview following-up d) Preparing for the interview e) Selecting an interviewee

c) Post interview following-up

1. Danielle has asked some closed-ended questions to start an interview; then some open-ended questions. Now she wants to really wants to get a greater depth of information about the process. She would probably use _________ questions. a) More closed ended b) More open ended c) Probing d) Structured e) Boxing structure

c) Probing

1. When an analyst is seeking more information from a response to questions they would probably use: a) Open Ended questions b) Close ended questions c) Probing questions d) All of these

c) Probing questions

1. A ___________ is used when you want to verify that data fits within correct minimum and maximum values. a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

c) Range check

1. One strong suggestion for navigation design is: a) Limit menu items to at most ten items b) Color code common menu items with green (go) and red (stop) c) Simplify recovery from mistakes (like having an undo button) d) Lock the user's computer when a mistake has been made e) Log all mistakes, and log the user's computer when 1000 mistakes have been made

c) Simplify recovery from mistakes (like having an undo button)

1. An example of a nonfunctional requirement is ____________ a) Supplier table is available b) The system must contain customer order history for three years c) System can be used in any of 100 offices worldwide d) SQL queries from customer table and order table are available e) Customer zipcode is formatted as character data

c) System can be used in any of 100 offices worldwide

1. Andrew, an analyst for PaxMedia Inc., has just learned that the business rules for a system he has been working on have changed. This means that _____. a) Nothing - once the ERD data models have been drawn, they are 'frozen' for the system b) Andrew will be reassigned to a different project that is in its beginning stages c) The ERD components will have to be changed d) The ERD data model will have to be put on hold while new DFD diagrams are created e) The project will have to be scrapped and restarted

c) The ERD components will have to be changed

1. The main difference between the Parallel Development Methodology and the Iterative Development Methodology is that: a) The Parallel Development Methodology will have various releases (like version 1.0; 2.0, etc.) and the Iterative will not b) The Iterative Methodology will break the system project into sub-projects for analysis, design and implementation and then merge them into a final system and the Parallel will not c) The Parallel Methodology will have subprojects and the Iterative Methodology will have various releases d) The Parallel Methodology will create various models or prototypes with user involvement before setting on design concepts and the Iterative will not e) The Iterative Methodology will create various models or prototypes with user involvement before setting on design concepts and the Parallel Methodology will not

c) The Parallel Methodology will have subprojects and the Iterative Methodology will have various releases

1. One difference between the reports from interviews and from a JAD session is that: a) It describes information from the interview or JAD session b) The interview report will give a complete project management timeline; while the JAD session report will not c) The interview report is generally written within 48 hours of the interview; while the JAD session report may take a week or two after the JAD session. d) The JAD report will include results from questionnaires while the interview report will not e) JAD reports will include technology analysis while interviews will only include root cause analysis

c) The interview report is generally written within 48 hours of the interview; while the JAD session report may take a week or two after the JAD session.

1. Carlos has a Level 0 DFD diagram where one of the external entities is the "Internal Revenue Service" - and he has a data store called "Tax Rate Table". He has drawn a data flow arrow from the Internal Revenue Service to the data store as the data has been loaded into the Tax Rate Table prior to the processing. What would be true? a) This is correct b) This is incorrect, 'data at rest stays at rest until moved by a process' so he needs a process (like 'load Tax Rate Table') first in this system c) This is incorrect - he doesn't need a data flow as the data was loaded into the Tax Rate Table someplace else (within the payroll system someplace, but not in this process) d) This is almost correct. The correct diagram would be a dashed line indicating that the loading of the data was implied prior to the start of this process e) This is incorrect. What should happen is an 'external process' should be called at the start of the process - like "Call IRS for data load"

c) This is incorrect - he doesn't need a data flow as the data was loaded into the Tax Rate Table someplace else (within the payroll system someplace, but not in this process)

1. The goal of acceptance testing is: a) That modules and units work together with each other b) That the databases are properly organized for both efficiency in storage and access c) To confirm that the system is complete and meets the business needs d) That both black-box and white-box tests have been approved by upper management e) To verify that the use-cases, ERDs and DFD's have been properly converted

c) To confirm that the system is complete and meets the business needs

1. The first principle of designing navigation controls is _______. a) It was tough to build, it should be tough to use b) Users have attended training c) To prevent users from making mistakes d) See that all screens can be reached in the four-click rule e) Build appropriate icons (like a blank page for new document or form)

c) To prevent users from making mistakes

1. The objective of an interface evaluation is ______. a) To measure the processing speed of an interface design b) To determine the database processing requirements for an interface c) To understand how to improve the interface design d) To get users input on colors, menu names and flexibility e) To determine if all use cases and ERDs have been built into the interface

c) To understand how to improve the interface design

1. The science (or art) of project management is in making ___________ of size, time, and cost. a) Benchmark comparisons b) Analytical and educated estimates c) Trade-offs d) Maximum calculations e) Minimum calculations

c) Trade-offs

1. The relation between use cases and data flow diagrams is generally: a) Use cases are developed by users and data flow diagrams are developed by systems analysts b) Data flow diagrams are developed first and then use cases follow c) Use cases are developed first and then data flow diagrams follow d) Use cases show logical processes, while data flow diagrams show physical processes e) There is not a relationship between use cases and data flow diagrams

c) Use cases are developed first and then data flow diagrams follow

1. A _______________ is an outline of the steps that the users perform to accomplish some part of their work. a) Step walkthrough b) User design flow c) Use scenario d) Process model e) Layout verification

c) Use scenario

1. Data flow diagrams are: a) Usually created by users and reviewed by analysts b) Usually jointly created by analysts and users c) Usually created by the project team and reviewed by users for correctness d) Usually created by the project champion and reviewed by the project team e) Usually created by business analyst and reviewed by the infrastructure analyst

c) Usually created by the project team and reviewed by users for correctness

1. Independent entities are: a) When a child requires attributes from the parent b) When there is only one entity for a data process model c) When an entity can exist without the help of another entity d) Where the entity identifier is also the primary key e) When an entity comes from an external source (aka 'external entity')

c) When an entity can exist without the help of another entity

In a structure chart, the element that communicates that a message or a system flag is being passed from one module to another is known as a(n) _____. a) conditional line b) connector c) control couple d) data couple e) loop

c) control couple

Which is NOT a step involved in preparing the technology? a) install the hardware b) install the telecommunications system c) convert the logical DFDs into physical DFDs d) convert the data e) install the software

c) convert the logical DFDs into physical DFDs

A lot of the 'unfreeze' part of Lewin's three step model for managing organization change: a) is part of the user interface design activities b) is generally accomplished by a strongly worded e-mail from the project sponsor to the development / project management team c) has been accomplished to this point in the project by the systems development life cycle (SDLC) processes d) is done by 'turning up the heat' (i.e. unfreeze) on the users to make them want to change e) is accomplished by the organization's marketing vice president

c) has been accomplished to this point in the project by the systems development life cycle (SDLC) processes

Training should focus on: a) how management views the new system b) the enhanced and beneficial features of the new system c) helping the users to accomplish their jobs d) the underlying programming of the new system e) how the analysts went from users use-cases to DFDs and ERDs

c) helping the users to accomplish their jobs

1. A(n) _____ entity is an entity with an identifier that describes only the entity. a) dependent b) incomplete c) independent d) intersection e) non-identifying

c) independent

The goal of postimplementation activities is to: a) praise the ready adopters b) give encouragement to the reluctant adopters who joined in c) institutionalize the use of the new system d) quickly modify the system with the changes that were suggested during the project that were deemed as 'good', but identified as 'scope creep' e) finally be able to relax and bond together (frequently with a post-implementation party)

c) institutionalize the use of the new system

Reusable modules, which are represented in the structure chart as rectangles with vertical lines on both sides, may often appear several times in a structure chart. These are called _____ modules. a) conditional b) control c) library d) loop e) off-page connector

c) library

The two types of conversion modules are: a) whole-system and waterfall b) waterfall and phased c) modular conversion and whole-system d) pilot and modular e) parallel and modular

c) modular conversion and whole-system

Which is NOT a basic tool for structuring work processes in organizations? a) formal standard operating procedures b) defining how people assign meaning to events (such as to 'be successful') c) promoting earlier adopters to management positions d) allocating funds for training e) allocating funds for positive infrastructure

c) promoting earlier adopters to management positions

Connie is trying to motivate users to adopt the new system. The first step she needs to consider is: a) how to cajole the users into adopting the system b) that people need to be paid to adopt a new system c) the factors that inhibit change and the perception of costs and benefits d) the standard operating procedures of the organization e) the informal politics and the informal 'boss' of the users (and how to reach this person)

c) the factors that inhibit change and the perception of costs and benefits

1. How many advantages are client-server based architectures known for? a. 2 b. 3 c. 4 d. 5 e. 7

c. 4

1. _______ repository entries are updated to reflect specific technology decisions as they are made. a. DFD b. Sequential c. CASE d. Hardware e. None of these

c. CASE

1. Systems Integration refers to: a. The process of synching all computers to the mainframe b. The delivery of systems to the final destination office c. Combining packaged software, the existing legacy system, and new software d. Adding the original hard drives to a newer system e. Creating a new software to monitor power consumption

c. Combining packaged software, the existing legacy system, and new software

1. Which of the following is normally NOT done in the design phase of the SDLC? a. Decisions for hardware and software purchases are made b. User interactions are planned out (inputs, outputs, user interfaces) c. Cost / Benefits of the new system are carefully calculated d. Logical DFDs and ERDs are converted into physical DFDs and ERDs e. The physical data model is created

c. Cost / Benefits of the new system are carefully calculated

1. System design is the determination of the overall system architecture-consisting of a set of physical processing components, _______________, and the communication among them-that will satisfy the system's essential requirements. a. Workmanship b. Order entry methods, HR feedback c. Hardware, Software, People d. Engineering data plans, fiber optic specifications e. None of these

c. Hardware, Software, People

1. If on a limited time budget, the best way to be sure you remain efficient and effective in designing a system is to utilize the ____________. a. Porters 5 Forces Model b. Outsourcing Model c. RAD and Timeboxing Techniques d. Hire/Fire Motivational Theory e. Not Attempt the Project

c. RAD and Timeboxing Techniques

1. Requests for Proposals (RFPs) serve what purpose? a. Integrate systems with one another b. Create synergy amongst staff members c. Solicit information from providers d. Engage mobile computers with mainframe technology e. Develop morale amongst managers

c. Solicit information from providers

1. Project teams often _________ the ________ associated with creating secure, efficient client-server applications. a. Overestimate; Difficulty b. Overestimate; Simplicity c. Underestimate; Difficulty d. Underestimate; Simplicity e. None of these

c. Underestimate; Difficulty

1. A(n) _____ entity cannot exist without the presence of another entity or has an identifier that is based on another entity's attribute. a. independent b. incomplete c. dependent d. variable e. non-complying

c. dependent

1. Extreme Programming (XP) is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for emphasizing customer satisfaction e) More explicit testing

d) A method for emphasizing customer satisfaction

1. When you are updating the data elements in the data flows (when creating a physical DFD) you might need to: a) Return to users to interview them about the physical data flows b) Update the original cost/benefit analysis to reflect the physical storage c) Do a technology analysis d) Add physical data elements to the metadata descriptions in the CASE repository e) Do formal benchmarking of the data flows

d) Add physical data elements to the metadata descriptions in the CASE repository

1. Which of the following is NOT a file type described in the textbook? a) History files b) Audit files c) Look-up files d) Algebra files e) Transaction files

d) Algebra files

1. Which of the following is not a characteristic of Big Data? a) Huge volume b) Rapid velocity c) Great variety d) All are characteristics e) None are characteristics

d) All are characteristics

1. During the implementation phase of the SDLC: a) System is developed b) System is tested c) System is documented d) All of these

d) All of these

Plans to handle potential business disruption due to technical problems during conversion are covered in the: a) System back-out plan b) Conversion disruption plan c) Alignment alteration plan d) Business Contingency Plan e) Help Desk plan

d) Business Contingency Plan

1. Wayne is a senior director of finance. His company only recently came under Sarbanes-Oxley regulations and is the project sponsor to become compliant. He realizes that examining the as-is system may not be much help as the regulations are so radical that a major analysis and design project must be completed to make the company compliant. He is leaning towards: ______________ a) Business process automation b) Business process improvement c) Business process internalization d) Business process reengineering e) Business process renovation

d) Business process reengineering

1. Which of the following project roles would probably make a presentation about the objectives of a proposed project and its benefits to executives who will benefit directly from the project? a) Requirements analyst b) Systems analyst c) Project manager d) Champion e) Chief Information Officer (CIO)

d) Champion

1. A ___________ is used when an extra digit is added to a coded field to make sure it the entered data is correct (like Social Security numbers). a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

d) Check digit check

1. Paul is interviewing Ming. He first explains why he is there and what he wants to accomplish in the interview. This would be done in which step of the interview process? a) Selecting interviewees b) Designing interview questions c) Preparing for the interview d) Conducting the interview e) Post-interview follow-up

d) Conducting the interview

1. Role-playing the use case with actual users is a good way to: a) Identify the use case b) Identify the major steps within each use case c) Identify elements within steps d) Confirm the use case e) Identify the primary actor

d) Confirm the use case

1. Extreme programming requires a great deal of discipline and it is recommended for: a) Large development teams b) Mission critical applications c) Large systems d) Considerable onsite user involvement e) All of these

d) Considerable onsite user involvement

1. Which is NOT a purpose of the requirements definition? a) To give a very high-level explanation of the business requirements b) A more precise list of requirements that can be used as inputs to the rest of analysis c) Create functional requirements d) Create cost/benefit analysis e) Create non-functional requirements

d) Create cost/benefit analysis

1. Amy has created a context diagram. What one DFD component is probably not shown? a) Process b) Data flow c) UML Stage d) Data store e) External Entity

d) Data store

1. Barb is an analyst developing a use case. Which of the following will probably NOT be on her use case? a) Importance level b) Short Description c) Information for steps d) Destination for the major inputs e) Type of trigger

d) Destination for the major inputs

1. Typically, the first step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

d) Examine DFDs and use cases to develop use scenarios

1. James is developing a DFD. What would be a good name for him to use on a data flow from the Calculate Federal Withholding process to a data store called YTD Payroll Data? a) Move withholding to YTD storage b) Transfer fed taxes to YTD storage c) Calculation Result d) Federal Withholding Taxes e) Add amounts to YTD total

d) Federal Withholding Taxes

1. Document-oriented databases have the following characteristics, except: a) Large bit files b) Audio files c) Video files d) Files with uniform structure e) image files

d) Files with uniform structure

1. Data flow diagramming is: a) The only process modeling currently used b) A detailed description of data c) Almost the same as a flow chart d) Focused on the processes or activities that are performed e) A visual version of a use case

d) Focused on the processes or activities that are performed

1. Hamid has selected one middle manager from each department that will be affected by the updated system and one lower-level manager from each department, along with a few senior staff as well as the project sponsor for a JAD session. He is trying to: _________ a) Balance the work load for departments so the regular day-to-day functions can still continue while the JAD team is off-site b) Create a new hybrid department that will beta test the final system c) Prevent domination by only a few individuals in the JAD session d) Have a broad mix of organizational levels in the JAD session e) Reduce the time necessary for the length of JAD session meetings

d) Have a broad mix of organizational levels in the JAD session

1. Which of the following is probably NOT a step for writing a use case? a) Identify the use case b) Identify the major steps within each use case c) Identify elements within steps d) Identify the analyst e) Confirm the use case

d) Identify the analyst

1. Which phase is generally the longest and most expensive part of the development process? a) Planning b) Analysis c) Design d) Implementation e) Feasibility

d) Implementation

1. Linda is a clerk in the accounting department. She was interviewed by David and is excited about the proposed system that will utilize electronic funds transfer. This would be an example of ______. a) Tangible benefit b) Cash flow c) Break-even analysis d) Intangible benefit e) Return on investment

d) Intangible benefit

1. The ____________ defines the basic components of the interface and how they work together to provide functionality to users. a) Use Scenario Design b) Interface Standards Design c) Interface Metaphor d) Interface Structure Design e) Interface Template Design

d) Interface Structure Design

1. The ______________ defines the basic components of the interface and how they work together to provide functionality to users. a) User Scenario plan b) Layout schema c) Consistency structure design d) Interface structure design e) Completeness diagrams

d) Interface structure design

1. Rocky is dealing one-on-one with users and business managers (including some that have little experience with technology). He is demonstrating what system analyst skill? a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

d) Interpersonal

1. In most automated cases, data stores from logical DFDs will be converted to: a) Binary tables b) CD Rom disks c) Paper files d) Into database files / tables e) Encrypted hexadecimal values

d) Into database files / tables

1. An entity: a) Is the association between two related processes b) Has cardinality (1:1, 1:N, or M:N) c) Shows if it can be null or no null d) Is a person, place or thing e) Is described with a verb phrase

d) Is a person, place or thing

1. An entity relationship diagram (ERD): a) Is a use-case diagram enhanced graphically to show data and process modeling b) Is a high-level CASE diagram of data modeling used in business systems c) Is an illustration of external data flows to and from a business systems d) Is a picture that shows the information that is created, stored, and used by a business system e) Is a graphical display of the processes in a business system

d) Is a picture that shows the information that is created, stored, and used by a business system

1. A program is not considered finished until: a) It has been used successfully for six months b) The cost of developing the program 'breaks-even' with the benefits of the program c) The ROI is positive d) It has passed its testing e) It 'dies' and is replaced by a newer version

d) It has passed its testing

1. What is true about creating an entity relationship diagram? a) There will be at most seven entities b) There will be at most seven relationships c) If you identify more than seven entities, analyze and combine until you have seven or less d) It is an iterative process e) Entities will have at most seven attributes

d) It is an iterative process

1. What type of process is creating an ERD? a) Well defined process b) Sequential process c) Process defined by five steps d) Iterative process e) User defined process

d) Iterative process

1. In a registration database, Ross has tables for student, professor, classroom, class, class-hour. Since his campus has about 12,000 students, when he runs queries about what student is in what class, taught by what professor in what classroom at which hour, the DBMS software will have to perform many _________ a) Axes b) Parallels c) Concretes d) Joins e) Enrolls

d) Joins

1. Which of the following is not a general function of any application program? a) Data storage b) Presentation logic c) Data access logic d) Linked-list modules e) Application logic

d) Linked-list modules

1. Which is probably NOT true about building use cases? a) Analysts are involved b) Users are involved c) Major processes are analyzed d) Major costs are analyzed e) External or internal triggers are analyzed

d) Major costs are analyzed

1. Anthony is working on the cardinality of doctors and patients in a large urban hospital. With the large number of doctors with varying specialties and patients that may have more than one aliment, he thinks the relationship might be noted as: a) 1 to 1 b) 1 to 2 c) 1 to many d) Many to many e) Many to 1

d) Many to many

1. Robert is doing an economic analysis using today's dollar values. He is doing: a) Cash flow analysis b) Return on investment analysis c) Break-even point analysis d) Net present value analysis e) Internal rate of return analysis

d) Net present value analysis

1. Which of the following is a concept not generally associated with decision support systems? a) Data warehouses b) Data marts c) Aggregated data d) Object orientation e) Multidimensional databases

d) Object orientation

1. What information-eliciting strategy enables the analyst to see the reality of the situation rather than listen to others describe it? a) Document analysis b) Interviewing c) Joint application design (JAD) sessions d) Observation e) Questionnaires

d) Observation

1. Rapid Application Development is a collection of methodologies that include all of the following except: a) Iterative Development b) System Prototyping c) Throwaway Prototyping d) V-model Methodology

d) V-model Methodology

1. Which of the following is NOT true? a) Analysts design programs in the design phase of the SDLC, programmers code programs in the Implementation phase b) Analysts can use structure charts to design programming logic c) Analysts can build in the three structures of sequence, selection and iteration into structure charts d) Programmers can take the logical DFDs and directly implement into code by compiling the metadata in the CASE tools e) Physical DFDs show additional details, such as what tables in the database replace data stores on the logical DFD

d) Programmers can take the logical DFDs and directly implement into code by compiling the metadata in the CASE tools

1. Which is NOT suggested for IT development projects? a) Projects need to be prioritized b) Projects need to be carefully selected c) Projects need to be carefully managed d) Projects need to give a positive return on investment within four years e) Projects need to give value to the business

d) Projects need to give a positive return on investment within four years

1. A technique where a set of written questions are distributed to people (frequently to a large number of people) is: _____. a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires e) Observation

d) Questionnaires

1. Barb is working on a database design. For the most efficient storage she should remove: ______ and ______. a) Primary keys and foreign keys b) International keys and redundancy c) Adjectives and adverbs d) Redundancy and null values e) Special characters and primary keys

d) Redundancy and null values

1. The most popular type of database today is the: a) Hierarchical database b) Tree database c) Green database d) Relational database e) Piecemeal database

d) Relational database

1. The three major parts of an ERD diagram are: a) Process, data flow, data store b) Attribute, modularity, cardinality c) Relationship, data flow, entity d) Relationship, attribute, entity e) Process, entity and relationship

d) Relationship, attribute, entity

1. Suggestions for motivation might include all of these EXCEPT: a) Setting realistic deadlines b) Giving all team members the same bonus on a project c) Recognize and reward good efforts d) Reward those with outstanding quality and effort e) Having a good working environment

d) Reward those with outstanding quality and effort

1. The most common reason for schedule and cost overruns is ___________ a) Team conflict b) Lack of communication from project manager to project team c) Lack of support by sponsor and champion d) Scope creep e) Adding people to a late project

d) Scope creep

1. The Major Inputs section of a use case describes their: a) File structure b) Cardinality c) Modality d) Source e) Destination

d) Source

1. A critical success factor in project management is to: a) Say "no" to all requests as they add to 'scope creep' b) Use throwaway prototyping c) Use a CASE tool to delineate requirements from work tasks d) Start with a realistic assessment of the work that needs to be done e) Hire an outside project management consulting group

d) Start with a realistic assessment of the work that needs to be done

1. Not all program modules are likely to be finished at the same time, so the programmer usually writes _______ for the unfinished modules to enable the modules around them to be tested. a) By-passes b) Temporary Modules c) Placeholder Modules d) Stubs e) End Modules

d) Stubs

1. This report is used when a user needs brief information on many items a) Detail Report b) Turnaround document c) Exception report d) Summary report e) Consistency check

d) Summary report

1. The two fundamental documentation types are: a) System documentation and integration documentation b) Screen documentation and batch documentation c) User documentation and online documentation d) System documentation and user documentation e) Acceptance documentation and integration documentation

d) System documentation and user documentation

1. The outcome of the planning phase is the: a) Test plan b) System proposal document c) System specification document d) System request document e) Business process document

d) System request document

1. Use cases are used to more fully delineate _____. a) Resources used in the system b) System boundaries c) System proposals d) System requirements e) Data flows

d) System requirements

1. System tests are usually conducted by: a) Programmers (developers) b) Project managers c) Users d) Systems analysts e) Project sponsors or project champions

d) Systems analysts

1. What the MAIN difference between systems prototyping and throwaway prototyping? a) Systems prototyping involves users while throwaway prototyping does not b) Throwaway prototyping involves users while systems prototyping does not c) Systems prototyping is a rapid application development methodology; while throwaway prototyping is not d) Systems prototyping works with users to quickly develop a simplified working version of the proposed system; while throwaway prototyping focuses more on exploring design alternatives e) Throwaway prototyping develops systems that will be use as 'stop-gap' systems - and generally for less than six months; while systems prototyping results in systems that will be used extensively for several years.

d) Systems prototyping works with users to quickly develop a simplified working version of the proposed system; while throwaway prototyping focuses more on exploring design alternatives

1. The V-model pays more explicit attention to ___________: a) Iteration b) Return on investment (ROI) c) Business Value (the "V") d) Testing e) Prototyping

d) Testing

1. When designing navigational controls, which is NOT commonly assumed? a) That users have not read the manual b) That users have not attended training c) That users do not have help readily at hand d) That users have knowledge of the system and the interface e) That users have not read the documentation

d) That users have knowledge of the system and the interface

1. The context diagram shows: a) Detailed processing logic b) All major processes c) All the data stores in the system d) The "big picture" of the system with external entities and only one process e) The system in context with all other systems in that department (for example, accounts payable, accounts receivable, etc.)

d) The "big picture" of the system with external entities and only one process

1. In the interview report, what will probably NOT be included? a) Summary of what the interviewee said b) Interview's name; interviewee's name c) Details from crucial areas of the interview relating to the project at hand d) The actual questions that were asked as a permanent record e) Any materials, documents, etc. that the interviewee gave you relevant to the project at hand

d) The actual questions that were asked as a permanent record

1. Which of the following would BEST describe "system complexity"? a) The aspect of using technologies that analysts and developers are familiar with b) The aspect of what the business side really wants the system to do c) The aspect of how quickly the system can be developed and implemented d) The aspect of how intricate and difficult the system must be e) The aspect of how accurate the system must be (such as medical equipment or for games)

d) The aspect of how intricate and difficult the system must be

1. Beth is considering a simple process for immediate orders. When processing an immediate order, a phone clerk writes the order on a paper form. Which of the following might be a reason NOT to automate this process? a) The clerk could make errors when writing the information wrong on the paper form b) The paper form could be lost when sent to the order filling /shipping area c) The writing on the paper form could be hard to decipher d) The costs to automate might be significantly higher than doing it manually e) The time to get the paper form from the clerk's desk to the order filling / shipping area is one day or longer

d) The costs to automate might be significantly higher than doing it manually

1. A 'temporal' trigger might be which of the following: a) A patient calls to make an appointment with a doctor b) The accounting department needs information for a report c) The human resources department needs a tax withholding form to be filled out by a new employee d) The date changes to the first day of the month e) A new shipping of goods arrives and needs to be added to the inventory

d) The date changes to the first day of the month

1. A team of developers and customers are in close communication, with frequent communications, simplicity, feedback and courage. This would best describe: a) The parallel development methodology b) The waterfall development methodology c) The iterative development methodology d) The extreme programming methodology e) The throwaway prototyping methodology

d) The extreme programming methodology

1. Kumar is the project manager for a revised TTP system. Which of the following most likely would NOT be considered in developing a work plan? a) Identifying tasks that need to be completed b) Estimating the time that will be needed on tasks c) Creating a dependency chart d) The organizational readiness for the project e) Key milestones that need to be met

d) The organizational readiness for the project

1. In adding attributes to an ERD, which of the following might NOT be a good resource for attributes? a) From the CASE tool b) Data flows from DFDs c) Requirements documents d) The system proposal document e) Through interviews (what users need for reports and processing)

d) The system proposal document

1. Which is NOT true of Structure Charts when designing programs? a) They show all the components of code that must be included in a program at a high level b) They are arranged in a hierarchical format that implies sequence c) They help analysts create programs that are easy to understand and maintain d) They are generally implemented with control flags that pass from the control modules to the subordinate modules e) They may have on-page and off-page connectors

d) They are generally implemented with control flags that pass from the control modules to the subordinate modules

1. Which is NOT true of use cases? a) They are formal ways of representing how a business system interacts with its environment b) They illustrates the activities that are performed by the users of the system c) They can be thought of as an external or functional view of a business process d) They illustrate what starts (or triggers) an event, all the people that are involved, and how the system provides value e) They sometimes are called 'business scenarios' (although 'use case' is generally preferred)

d) They illustrate what starts (or triggers) an event, all the people that are involved, and how the system provides value

1. Brianna has a process that has two inputs but only one output. a) This is an error as there needs to be the same amount of inputs as outputs b) This is an error as process do not have inputs or outputs c) This is normal as all processes have two inputs and one output d) This is normal as all processes need at least one input and at least one output e) This is an error as processes only produce output

d) This is normal as all processes need at least one input and at least one output

1. Garrett has been told by management that his project MUST be completed on time. His best estimates are more than two weeks after the absolute deadline. Which technique could he use to get a functional system on time? a) Risk management b) System prototyping c) Benchmarking d) Timeboxing e) Activity elimination

d) Timeboxing

1. FoodTitan is a large grocery store chain in the Chicago, Milwaukee, and the Upper Midwest. Generally their stores have from 18 to 36 checkout lanes with scanners. When somebody scans a bar code, the system is probably using a _____ to process the purchased items. a) Executive support system (ESS) b) Barcode processing system (BPS) c) Management information system (MIS) d) Transaction Processing system (TPS) e) A grocery store processing system (GSPS)

d) Transaction Processing system (TPS)

1. This type of file is used to update a master file: a) Roster Files b) Training files c) Master files d) Transaction files e) Integrated files

d) Transaction files

1. Ralph wants to illustrate how a system interacts with the environment. The best solution for him would be to use a ________: a) Requirements flow chart b) Storyboard c) HIPO chart (hierarchy, input, process, output) d) Use case e) Gantt chart

d) Use case

1. Use scenarios builds upon ___________. a) Entity relationship diagrams b) JAD sessions c) PERT charts d) Use cases e) HIPO charts

d) Use cases

1. Which of the following is NOT a common Interface Evaluation technique? a) Interactive evaluation b) Walk-through evaluation c) Heuristic evaluation d) Use scenario normalization e) Formal usability testing

d) Use scenario normalization

1. Interpersonal skills for a project manager might be important when: a) Making assignments for a project b) Creating a cost/benefit spreadsheet c) Creating the system proposal d) Working with a highly controversial project that may have political implications e) Using the V-model variation of the Waterfall Methodology.

d) Working with a highly controversial project that may have political implications

1. The largest single component of any systems development project in terms of both time and cost could be: a) Conducting JAD sessions b) Gamma testing c) Developing the user interface d) Writing programs e) Having meetings

d) Writing programs

1. Which would NOT likely be an entity on a car insurance ERD? a) Customer b) Policy c) Agent d) Zip code e) Car

d) Zip code

Which is most likely NOT a part of Project Assessment? a) project team review (reports on activities and performance with an eye for improvement) b) system review of the costs that were initially used in starting the analysis c) identifying mistakes in the project and understanding the causes of those mistakes d) a thorough analysis of the software coding as to standards, cohesion and coupling e) system review of the proposed benefits that were used in analysis

d) a thorough analysis of the software coding as to standards, cohesion and coupling

1. In a structure chart, the element that is drawn as an empty circle with an attached arrow is known as a(n) _____. a) conditional line b) connector c) control couple d) data couple e) module

d) data couple

1. The first step to building an Entity Relationship Diagram is to _____ a) Identify data flows from the level 0 DFD diagram b) draw the relationships between the entities c) identify the attributes for each entity d) identify the entities e) identify the processes, data flows and data stores

d) identify the entities

Which is NOT a change management plan step? a) revising management policies b) assessing the costs and benefit models of potential adopters c) motivating adoption d) installing 'user friendly' hardware e) enabling people to adopt through training

d) installing 'user friendly' hardware

There are two symbols that describe special types of control in a structure chart. They are a curved arrow and a diamond. These symbols represent _____ and _____. a) connector, conditional line b) control, subordinate c) library module, conditional line d) loop, conditional line e) loop, connector

d) loop, conditional line

1. A logical data model that does not lead to repeating fields and that the data models leads to tables containing fields that are dependent on the whole identifier is in _____ normal form. a) balanced b) first c) primary d) second e) third

d) second

1. If the logical data model contains attribute values that depend on an attribute that is not the identifier, then it is in _____. a) base normal form b) first normal form c) non-normal form d) second normal form e) third normal form

d) second normal form

The habitual routines for how work is performed are called: a) work norms b) policies, processes and procedures (the "3Ps") c) resource allocations d) standard operating procedures e) assignment infrastructures

d) standard operating procedures

When considering costs of a new system conversion, which is NOT a common cost to consider? a) the cost of running two systems with a parallel conversion b) the costs of more staff at more locations for support in a simultaneous conversion c) the salary costs of users, trainers, administrators, consultants d) the hardware costs for a pilot system e) the extra programming costs for a modular conversion

d) the hardware costs for a pilot system

One of the problems with a parallel conversion is: a) there is a higher risk b) the old hardware might fail c) there is a lower risk d) the users have to enter data into both systems e) there is an abrupt conversion

d) the users have to enter data into both systems

1. Software systems can be divided into how many basic functions? a. 1 b. 2 c. 3 d. 4 e. 5

d. 4

1. Form(s) of network connection(s) in a system include: a. ATM b. T2 c. DSL d. ATM and DSL e. T2 and DSL

d. ATM and DSL

1. What makes systems integration so difficult? a. Finding the original data to install on the new server b. Creating a ghost drive to house the old information c. Installing new software packages on older machines d. Bringing legacy system data and new data together e. None of these

d. Bringing legacy system data and new data together

1. In terms of project management, which option might require excellent project management skills and a proven methodology? a. Outsourcing to Nebraska b. Outsourcing to India c. Buying a packaged solution d. Doing custom development e. Buying an ERP system

d. Doing custom development

1. The scalability associated with Client-Server systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

d. High

1. Application service providers might be best associated with: a. In-house development b. Packaged software c. Unique and strategic systems d. Outsourcing e. Internet Service Providers

d. Outsourcing

1. If (a) the business need is common; (b) the skills needed are not strategic; (c) the time frame is short; it might be best to: a. Use in-house / custom development b. Hire a vendor to write the code for you c. Outsource to India d. Purchase a software package e. Hire a consultant

d. Purchase a software package

1. The system inputs and outputs will be designed along with a plan or__________ of the way the system's features will be navigated. a. Blueprint b. Compass c. Instructional Guide d. Roadmap e. FAQ

d. Roadmap

1. Which is probably true about packaged software? a. In most cases, the software is a perfect fit for the companies need b. Packaged software works best where the company has a unique need c. The time frame is flexible to long d. The business need is common e. The project has a highly skills project manager who has been with the company for many years and has an excellent relationship with both business users and the IT development staff

d. The business need is common

1. Outsourcing is used when: a. The project has a project manager who can coordinate vendor efforts b. There is a desire to build in-house skills c. In-house functional and technical skills exist d. The business need is not core to the business e. None of these

d. The business need is not core to the business

1. An n-tiered architecture is distinguished by: a. The number of drives installed b. The number of logics on the local server c. The number of terminals on the network d. The number of specialized server computers e. None of these

d. The number of specialized server computers

1. Packaged systems are used when: a. The business need is not core to the business b. There is a desire to build in-house skills c. The time frame is flexible d. The project has a project manager who can coordinate vendor efforts e. The decision to outsource is strategic

d. The project has a project manager who can coordinate vendor efforts

1. Server-based architecture is: a. When the clients capture keystrokes b. The very first architecture system c. Outdated and never used d. When the clients capture keystrokes and the very first architecture system e. When the clients capture keystrokes, the very first architecture system and outdated and never used

d. When the clients capture keystrokes and the very first architecture system

1. A data model is a: a) The mathematical model of formulas and logic used in a system b) The abstract creating of an ideal system transformation c) The model that is produced by extreme programming d) The expanded, thoroughly balanced and normalized use case for a system e) A formal way of representing the data that are used and created by a business system

e) A formal way of representing the data that are used and created by a business system

1. Which of the following methodologies might be most appropriate if you have a system project with: unclear requirements; very familiar technologies; not all that complex; reasonably reliable; a short time schedule and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Agile development

e) Agile development

1. One of the major differences between a JAD session and an interview is: a) Selecting participants b) Figuring out what is to be done c) Preparing for the session d) Writing up results and a report e) All JAD sessions are structured and must be carefully planned

e) All JAD sessions are structured and must be carefully planned

1. Use cases generally have three parts: _____. a) Basic information, details, and event-driven modeling b) Inputs and outputs, and events c) Details, event-driven modeling, basic information d) Technical feasibility, economic feasibility and organizational feasibility e) Basic information, inputs and outputs, and details

e) Basic information, inputs and outputs, and details

1. Balance occurs between DFDs and ERDs when the data stores _____ a) Are uniquely named b) Have only one input and one output flow c) Are named the same as the relationships on the ERD d) Can be compared to ERD data flows and attributes on the ERD are included in data stores on the DFD e) Can be equated to entities on the ERD and when entities are referred to by data stores on the DFD

e) Can be equated to entities on the ERD and when entities are referred to by data stores on the DFD

1. Which would likely be an entity on a car insurance ERD? a) date b) Gender c) company d) fire district e) Car

e) Car

1. A ___________ is used when all combinations of data are valid (like birth year is prior to marriage year). a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

e) Consistency check

1. In creating ERD's, which would most likely NOT be a source for entities? a) Use cases b) Level 0 DFD diagrams c) External entities d) Data flows e) Cost / benefit reports

e) Cost / benefit reports

1. On an ERD _________________: a) Processes are listed alphabetically with relationship connections drawn between processes b) Data elements are listed alphabetically with a cross listing to the processes that manipulate them c) Data elements are described as singular (1:1); plurals (1:N); or didactic (M:N) d) Data elements are grouped in a hierarchical structure that is uniquely identified by number e) Data elements are listed together and place inside boxes called entities.

e) Data elements are listed together and place inside boxes called entities.

1. The authors suggest that an analyst is 'very much like a ____________' and business users are like elusive suspects. a) Police professional b) Politician c) Forensic scientist d) Air traffic controller e) Detective

e) Detective

1. Typically, the second step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

e) Develop the interface structure diagram (ISD)

1. The type of skill that is common to systems analysts to deal fairly and honestly with other project team members is: a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

e) Ethical

1. Which is NOT a type of database file? a) Hierarchical databases b) Relational databases c) Object databases d) Multidimensional databases e) Federal database

e) Federal database

1. Myles is studying a system to lessen the number of complaints about the Help Desk. He has formally studied the service counter at Wal-Mart, Target and Kohl's department stores; as well as listened in to complaint phone calls to a hotel booking site. He is trying to see how other organizations work at lessening complaints and also how they handle complaints. This would be what type of analysis? a) Complaint processing b) Design analysis c) Problem analysis d) Outcome analysis e) Informal benchmarking

e) Informal benchmarking

1. The Major Steps Performed section on a use case will give the _________ a) Name of the user for each step b) What triggers each step c) Where the processes will run (such as manual processes, client-server processes, etc.) d) The telecommunications infrastructure requirements for that step e) Information for each step

e) Information for each step

1. Which is NOT true about using Visible Analyst Workbench? a) It can be used with many different databases b) It integrates the data model with other parts of the project c) It is a full-service CASE tool d) Data modeling is one of many capabilities e) It can generate Java code when the data modeling is done

e) It can generate Java code when the data modeling is done

1. Which is generally NOT true for interface evaluations? a) It is iterative b) It almost always identifies improvements c) It generally involves users working with analysts d) It is cyclic e) It is built on ERDs

e) It is built on ERDs

1. What diagram will have sub-processes with numbers like 3.3.1, 3.3.2, 3.3.3 (etc.) and also have flows coming in (or going out) that are not illustrated? a) Context diagram b) Level 0 diagram c) Gantt diagram d) Level 1 diagram e) Level 2 diagram

e) Level 2 diagram

1. Black-box testing: a) Is reserved for special circumstances in which the tester wants to review the actual program code b) Is reserved for NASA space missions c) Is reserved for very complex systems d) Is only used by highly skilled testers e) None of these

e) None of these

1. During the implementation phase of the SDLC: a) Analysts will write programs b) Programmers will develop user interfaces c) Project managers will convert logical ERDs into physical DFDs d) Champions will do the data management design e) None of these

e) None of these

1. A technique where the analyst watches how people perform their activities is _______ a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

e) Observation

1. Rafael, Fraud Unit Manager, has just received an interview report from Stefano, a systems analyst. Rafael was interviewed by Stefano, and was asked to make corrections and clarifications to the interview report. In what interview phase would this occur? a) Selecting interviewees b) Designing interview questions c) Preparing for the interview d) Conducting the interview e) Post-interview follow-up

e) Post-interview follow-up

1. Blaine is using a requirements eliciting technique that begins with non-threatening questions, avoids abbreviations, groups items into logically coherent sections, and might best be used with outside users. He probably is using: a) Document analysis b) Interview c) JAD session d) Observation e) Questionnaires

e) Questionnaires

1. Marta wants to collect facts and opinions from a wide range of geographically dispersed people quickly and with the least expense. She would probably want to use: a) Document analysis b) Interview c) JAD session d) Observation e) Questionnaires

e) Questionnaires

1. RAD is an acronym for: a) Real Application Development b) Rapid Application Design c) Rapid Authentic Development d) Real Autonomous Development e) Rapid Application Development

e) Rapid Application Development

1. Omar is creating an order database for a multiple site car dealership. The data will be fairly simple: names, addresses, city, state, zip code, make of car, model, style, color, etc. Probably the best choice for him would be a _____________ database. a) Multidimensional b) Hierarchical c) Legacy d) Object e) Relational

e) Relational

1. New databases collectively referred to as NoSQL databases have appeared in recent years. Which of the following are categorized as a NoSQL database? a) Document-oriented database b) Wide column stores c) Graph databases d) Extensible record stores e) Relational Database system

e) Relational Database system

1. Which of the following project roles would focus on stakeholder requirements? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Requirements analyst

e) Requirements analyst

1. The acronym for the standard language used to access data in relational databases is: a) ERD b) CRM c) ERP d) BPR e) SQL

e) SQL

1. Which is NOT an attribute of a systems analyst? a) Understanding what to change b) Knowing how to change it c) Convincing others of the need to change d) Serving as a change agent e) Selecting which projects to approve

e) Selecting which projects to approve

1. Agile development is a group of programming-centric methodologies that focus on: a) Making assignments for a project b) Creating a cost/benefit spreadsheet c) Creating the system proposal d) Working with a highly controversial project that may have political implications e) Streamlining the SDLC

e) Streamlining the SDLC

1. According to the authors, in moving "from here to there", an analyst needs: a) An understanding of corporate politics b) Knowledge on how to stop scope creep c) Joint Application Development facilitating skills d) Microsoft Project Management software skills e) Strong critical thinking skills

e) Strong critical thinking skills

1. Which is generally NOT true of non-functional requirements? a) Cultural differences can be considered b) Color interpretations on screens and forms may be different in different geographical places c) Multi-lingual interfaces many be needed d) Systems may need to adapt from global solutions to local realities e) Systems may need to have actual expenses from global operations

e) Systems may need to have actual expenses from global operations

1. This particular type of documentation control lists the information in a logical form, as though the users were to read the reference documentation from start to finish: a) Index b) Text search c) Content sensitive help d) Intelligence agents e) Table of contents

e) Table of contents

1. Which of the following would BEST describe "system reliability"? a) The aspect of using technologies that analysts and developers are familiar with b) The aspect of what the business side really wants the system to do c) The aspect of how quickly the system can be developed and implemented d) The aspect of how complex the system must be e) The aspect of how accurate the system must be (such as medical equipment or for games)

e) The aspect of how accurate the system must be (such as medical equipment or for games)

1. Which would generally NOT be taken into consideration for project portfolio management in an organization? a) The number of large projects b) The number of tactical projects c) The number of high risk projects d) The number of strategic projects e) The number of financially feasible projects

e) The number of financially feasible projects

1. Which is NOT true for systems analysts? a) They create value for an organization b) They enable the organization to perform work better c) They do things and challenge the current way that an organization works d) They play a key role in information systems development projects e) They are the project sponsors for system proposals

e) They are the project sponsors for system proposals

1. Which of the following is true about a JAD facilitator? a) They can participate in the discussion to settle a disagreement b) They keep track of all discussions by entering information into the computer c) They allow sidebar discussions and unstructured activities d) They recognize that some people know more about the system and proposed system and will dominate the discussion and know that is a positive thing e) They set the meeting agenda

e) They set the meeting agenda

1. Mark has a data store called 'Items' and it includes all the items sold in a convenience store - sorted by UPC code with the retail price of the item. He has only one data flow called 'Item Details' that flows from the data store to the Process Checkout process. What will be true in this case? a) This is incorrect as every data store must have both inputs and outputs b) This is incorrect as every process must have both inputs and outputs c) This is incorrect as the data flow should have a verb phrase like 'Get Item Details' d) This is incorrect as there is no way to update the 'Items' data store e) This is correct

e) This is correct

1. Which of the following methodologies might be most appropriate if you have a system project with: unclear user requirements; unfamiliar technologies; somewhat complex; needs to be reliable; time is not an issue and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

e) Throwaway prototyping

1. Which of the following methodologies might be most appropriate if you have a system project with: unclear user requirements; unfamiliar technologies; very complex; must be reliable; a short to medium time schedule and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

e) Throwaway prototyping

1. A use case helps: a) Define interview questions b) Clarify ongoing costs for a system c) Identify risks with the project d) Refine project management milestones e) Understand system activities and requirements

e) Understand system activities and requirements

1. Which is NOT a requirements analysis strategy? a) Understanding of the as-is system b) Identifying improvements c) Developing requirements for the to-be system d) Root cause analysis e) Understanding of screen design, layout and navigation

e) Understanding of screen design, layout and navigation

1. The fourth step in creating a Physical Data Flow Diagram is a) Update the metadata in the CASE repository b) Draw a human-machine boundary c) Add implementation references d) Add system-related data stores, data flows and processes e) Update the data elements in the data flows

e) Update the data elements in the data flows

1. Which is NOT true of use cases? a) They contain all the information needed to build one part of a process model b) Each use case has a name, a number, importance level, brief description, primary actor, trigger, major inputs and outputs, and a list of major steps c) Use cases can be identified by reviewing the functional requirements d) Use cases should be confirmed by users e) Use cases normally contain ten to twelve major steps

e) Use cases normally contain ten to twelve major steps

1. Systems that support decision making will probably: a) Do a lot of updating of data b) Be transaction processing systems c) Be audit files d) Use Gantt charts e) Usually just read data - and often in ad hoc ways

e) Usually just read data - and often in ad hoc ways

1. Which of the following methodologies might be most appropriate if you have a system project with: clear requirements; very familiar technologies; not all that complex; must be reliable; a somewhat longer schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) V-model

e) V-model

1. Which is not a common data type? a) Character b) Text c) Integer d) Date e) Video

e) Video

1. There are many types of reports, they include: a) Summary reports b) Exception reports c) Turnaround documents d) graphs e) all of these are outputs

e) all of these are outputs

Early adopters in the new customer resource management system received faster computers with more memory. In terms of management policy, this is probably an example of: a) standard operating procedures b) checks and balances c) bonus processes d) fair play e) resource allocation

e) resource allocation

1. The line between analysis and design is sometimes very blurry. One reason is that _____: a) Object-oriented methods are generally fuzzier as compared to waterfall methods b) there is inadequate funding for the analysis phase to do a complete analysis c) analysts are generally rushed to complete the system proposal d) scope creep has occurred e) the deliverables are really the first step in the design of the new system

e) the deliverables are really the first step in the design of the new system

1. Mobile application architectures are where the: a. Client devise is responsible for presentation logic b. Client devise is responsible for business logic c. The server is responsible for data access logic d. The server stores the data e. All of these

e. All of these

1. Which of the following is an advantage of client-server architectures? a. They are scalable b. They can support different types of systems c. It is easy to separate different logic functions d. Reliability e. All of these

e. All of these

1. The primary hardware components of a system consist of: a. Client Computers b. Servers c. Network d. Client Computers and Servers e. Client Computers, Servers, and Network

e. Client Computers, Servers, and Network

1. Designing an architecture can be_______________. a. Tedious and therefore younger members of the team are usually urged to take the lead. b. Easy and therefore more experienced members of the department take the lead. c. Easy and therefore outside consultants are often sourced to do the task. d. Easy and therefore experienced internal members are sourced to the task. e. Difficult and therefore, many organizations use the skills of experienced, expert system architects (consultants or employees) who specialize in the task.

e. Difficult and therefore, many organizations use the skills of experienced, expert system architects (consultants or employees) who specialize in the task.

1. What is/are the disadvantage(s) associated with n-tiered architecture? a. Great load on the network b. When the clients capture keystrokes and the very first architecture system c. They are always slower d. When the clients capture keystrokes and the very first architecture system and they are always slower e. Great load on the network and it is more difficult to program and test software

e. Great load on the network and it is more difficult to program and test software

1. The major architectural components of any system are the___________. a. IT Department b. Hardware c. Software d. IT Department and Hardware e. Hardware and Software

e. Hardware and Software


Ensembles d'études connexes

PNE 104. Ch. 21 Sedatives and hypnotics. Clinical Pharm. Susan Ford 11th Ed.

View Set

CHAPTER 4/II. REAL PROPERTY VS. PERSONAL PROPERTY

View Set

Human Capital, Social Capital, and Cultural Capital

View Set

AP Statistics Semester 2 Quiz/Checkpoint Questions

View Set

Immunity, Infection, & Inflammation PP1 EAQs

View Set

Intermediate 2 Computing Exam S3

View Set