Systems Analysis and Design

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The UML notation ____ identifies a zero or many relation. a)1..* b)0..0 c)0..1 d)0..*

0..*

___ describes the amount of data that a system can transfer in a fixed time period.​ a)Latency b)Dimensionality c)Bandwidth d)Resolution

Bandwidth

In addition to centralized data processing, the earliest systems performed all data input and output at a central location, often called a _____.​ a)portal b)data processing center c)thin client d)web-centric hub

Data processing center

A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.​

False

As enterprise-wide information systems grow more complex, configuration management becomes trivial. T/F

False

Bandwidth requirements are expressed in bytes per minute. T/F

False

__ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.​ a)Benchmark testing b)Fault management c)Responsive testing d)Throughput management

Fault management

__ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods.​ a)Multipath design b)Legacy data c)System file checker d)System architecture

System architecture

​_____ are the benefits that can be measured in dollars. a)Intangible benefits b)Agile benefits c)Ethical benefits d)Tangible benefits

Tangible benefits

A _____ locates all or most of the processing logic on the server. a)batch client b)topological client c)portal client d)thin client

Thin client

Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy. T/F

True

System requirements serve as benchmarks to measure the overall acceptability of a finished system.

True

The cloud computing concept envisions a cloud of remote computers that provide a total online software and data environment that is hosted by third parties.​ T/F

True

The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits. T/F

True

____ is a widely used method of visualizing and documenting an information system. a)UML b)DFD c)UNIX d)Java

UML

A table design that contains a repeating group is called _____. a)normalized b)unsynchronized c)synchronized d)unnormalized

Unnormalized

The UML represents an object as a(n) ____ with the object name at the top, followed by the object's attributes and methods. a)circle b)oval c)rectangle d)triangle

rectangle

A(n) _____ does not distract a user and calls no attention to itself. a)opaque interface b)transparent interface c)translucent interface d)pellucid interface

transparent interface

In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values. a)valence b)pool c)domain d)type

type

A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power.​ a)Microsoft Visio b)multipath design c)Wi_MAX d)Bluetooth

Bluetooth

A subscription model charges a variable fee based on the volume of transactions or operations performed by the application.​ T/F

False

A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.​ T/F

False

A web-based data design requires users to have powerful workstations. T/F

False

An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals. T/F

False

Commercial software packages must undergo unit and integration testing similar to that of in-house developed systems, although system testing usually is not performed. T/F

False

Context-sensitive help displays information about any task when the user requests it. T/F

False

Data stores are shown in a context diagram because data stores are external to the system. T/F

False

Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services.​ T/F

False

In a data flow diagram (DFD), a process symbol can have only one outgoing data flow. T/F

False

In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships.​ T/F

False

In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key. T/F

False

In an information system, data is information that has been transformed into output that is valuable to users. T/F

False

​_____ describes the relationship between computers and the people who use them to perform their jobs. a)Human-computer interaction (HCI) b)Peripheral connect (PC) c)Peripheral component interconnect (PCI) d)Media control interaction (MCI)

Human-computer interaction (HCI)

____ requires that a software supplier document all testing and maintain records of test results. a)​Center for the Application of Information Technologies (CAIT) b)International Organization for Standardization (ISO) c)Open Database Connectivity (ODBC) d)Software Engineering Institute (SEI)

International Organization for Standardization (ISO)

Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment.​ a)legacy data b)primary data c)advanced data d)qualitative data

Legacy data

__ costs include expenses for items such as supplies, equipment rental, and software leases.​ a)Maintenance b)Adaptive c)Operational d)Corrective

Operational

​_____ means that a proposed system will be used effectively after it has been developed. a)Schedule feasibility b)Operational feasibility c)Economic feasibility d)Technical feasibility

Operational feasibility

​_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. a)Output security b)Ergonomics c)Aesthetics d)Interface technology

Output security

The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.​ a)Scatter chart b)Gantt chart c)Pareto chart d)XY chart

Pareto chart

A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages. a)data frame b)hub c)bandwidth d)platform

Platform

With a _____, users provide an example of the data requested. a)query by example language b)data frame c)data table d)query language

Query by example language

One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems. a)candidate integrity b)referential integrity c)combinatorial integrity d)foreign integrity

Referential integrity

_____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project.​ a)Payback analysis b)Net Present Value (NPV) c)Return on Investment (ROI) d)Acquisition process

Return on Investment (ROI)

__ measures risk likelihood and impact. a)Risk control b)Risk marker c)Risk identification d)Risk assessment

Risk assessment

_ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. a)Redundancy b)Scalability c)Interoperability d)Transparency

Scalability

​_____ means that a project can be implemented in an acceptable time frame. a)Operational feasibility b)Schedule feasibility c)Economic feasibility d)Technical feasibility

Schedule feasibility

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____. a)cell b)schema c)framework d)viewport

Schema

When developing a training program, which of the following guidelines should be kept in mind? a)Select the most effective place to conduct the training. b)Train people individually. c)Develop a single training program for distinct employee groups. d)Provide only hands-on experience training.

Select the most effective place to conduct the training.

_____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.​ a)Consulting as a Consideration b)Process as a Product c)Hardware as a Help d)Software as a Service

Software as a Service

When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface.​ a)mission-critical mode b)safe mode c)stand-alone mode d)quirks mode

Stand-alone mode

Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____.​ a)cloud computing b)stand-alone computing c)​supply chain management (SCM) d)behavioral management

Supply chain management(SCM)

At the center of the network is the _____, which manages the network and acts as a communications conduit for all network traffic.​ a)log b)portal c)scale d)switch

Switch

A typical preliminary investigation report might consist of each of the following except ____. a)Project Roles b)System Development Tools c)Systems Request Summary d)Findings

System Development Tools

___ is the process of putting a new information system online and retiring the old system. a)System changeover b)System integration c)System override d)Online system documentation

System changeover

​_____ produces a full-featured, working model of the information system a)Design prototyping b)System prototyping c)Application prototyping d)Throwaway protyping

System prototyping

​_____ is a model that asks the traditional fact-finding questions in a systems development context. a)A functional decomposition diagram b)The Zachman Framework for Enterprise Architecture c)A class diagram d)The Unified Modeling Language

The Zachman Framework for Enterprise Architecture

Jerry has inherited an Excel sheet that lists all of the system requirements for his team's new project. But unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly. He needs to take care of this so the requirements can be sorted correctly. Jerry knows that there were supposed to be three performance examples but he finds four in the spreadsheet. Which one of these is mislabeled as a performance example? a)Response time must not exceed for seconds. b)The online inventory control system flag all low-stock items within one hour after the quantity falls below a predetermined minimum. c)The system must automatically generate an insurance claim form. d)The records system must produce key reports within five hours of the end of each fiscal quarter.

The system must automatically generate an insurance claim form.

Which of the following is specified by the detailed procedures in a test plan?​ a)Who will work with the new system and ensure that all necessary features have been included b)The test data to be used c)How a separate operational and test environment is prepared d)The result of the final test of all programs

The test data to be used

A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service.​ T/F

True

A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects. T/F

True

A request for quotation (RFQ) is more specific than a request for proposal (RFP).​ T/F

True

As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support.​ T/F

True

Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors. T/F

True

Creating a standard list of interview questions helps a systems analyst to keep on track and avoid unnecessary tangents.

True

Deciding whether to explode a process further or determine that it is a functional primitive is a matter of experience, judgment, and interaction with programmers who must translate the logical design into code. T/F

True

Every page in a report should include a page header, which appears at the top of the page and includes the column headings that identify the data. T/F

True

Field X is functionally dependent on field Y if the value of field X depends on the value of field Y. T/F

True

In a data flow diagram (DFD), a data flow must have a process symbol on at least one end. T/F

True

In contrast to a centralized system, a client/server design separates applications and data.​ T/F

True

Internal and external factors affect every business decision that a company makes, and IT systems are no exception.​

True

Migrating a traditional database design to the web can require design modification, additional software, and some added expense. T/F

True

Most large companies require systems that combine transaction processing, business support, knowledge management, and user productivity features.​ T/F

True

Network administration includes hardware and software maintenance, support, and security.​ T/F

True

Personal observation allows a systems analyst to verify statements made in interviews and determine whether procedures really operate as they are described. T/F

True

The advantage of the application logic layer is that a three-tier design enhances overall performance by reducing the data server's workload. T/F

True

Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity. T/F

True

When a context diagram is expanded into data flow diagram (DFD) diagram 0, all the connections that flow into and out of process 0 must be retained. T/F

True

____ is the process of tracking system releases.​ a)Source control b)Version control c)Quality control d)Configuration control

Version control

The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications.​ a)command-line b)Software as a Service c)outsourcing d)Web 2.0

Web 2.0

Which of the following is true of a web-based systems development environment?​ a)Internet-based development treats the web only as a communication channel. b)Web-based solutions do not open complex security issues that should be addressed. c)Scalability of web-based systems can be affected by network limitations and constraints. d)Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.

Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.

A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location. a)local area network (LAN) b)storage area network (SAN) c)metropolitan area network (MAN) d)wireless local area network (WLAN)

Wireless local area network (WLAN)

In addition to the Gane and Sarson symbol set, another popular symbol set is _____. a)Mantissa b)Zachman c)Yourdon d)Jira

Yourdon

Many analysts follow _____, which means that they develop a physical model of the current system, a logical model of the current system, a logical model of the new system, and a physical model of the new system. a)​the Zachman Framework b)a process description c)the Gane and Sarson symbol d)a four-model approach

a four-model approach

The iteration structure is the completion of _____. a)a specific condition that is repeated until a process changes b)a process step that is repeated until a specific condition changes c)steps in a chronological order, one after another d)one or more process steps based on the results of a test or condition

a process step that is repeated until a specific condition changes

Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called _____. a)acceptance tests b)modular tests c)unit tests d)integrated tests

acceptance tests

As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance.​ a)perfective b)corrective c)adaptive d)preventive

adaptive

One of the disadvantages of _____ methods of system development is that the overall project might be subject to scope change as user requirements change.​ a)rapid application development b)structured analysis c)agile d)object-oriented analysis

agile

In maintenance management, _____ means examining the whole in order to learn about the individual elements.​ a)adoption b)elucidation c)synthesis d)analysis

analysis

A class diagram includes the class _____, which describe the characteristics of objects in the class. a)events b)attributes c)methods d)keys

attributes

An object has certain ____, like the make, model, and color of a car. a)indices b)keys c)attributes d)packets

attributes

A _____ is an overview that describes a company's overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.​ a)business index b)business matrix c)business profile d)business glossary

business profile

A _____ is a summary of a project request and a specific recommendation.​ a)routine report b)case for approval c)case for action d)breakdown report

case for action

Inheritance enables a ____ to derive one or more of its attributes from a parent. a)package b)user c)child d)class

child

(n) ____ is a group of similar objects. a)class b)aggregate c)packet d)concatenation

class

In an interview, _____ limit or restrict the response. a)open-ended questions b)close-ended questions c)range-of-response questions d)leading questions

close-ended questions

A _____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve. a)constraint b)key c)query d)trigger

constraint

A(n) _____ is a condition, restriction, or requirement that the system must satisfy. a)index b)milestone c)viewport d)constraint

constraint

​In the rapid application development (RAD) model in the accompanying figure, the _____ phase focuses on program and application development tasks similar to the SDLC. a)cutover b)user design c)construction d)requirements planning

construction

A _____ usually causes specific actions, such as printing subtotals for a group of records in a report. a)concatenation character b)subgroup c)character break d)control break

control break

A higher-level module, called a _____, directs lower-level modules. a)library module b)subordinate module c)control module d)data module

control module

In a sequence diagram, a lifeline is identified by a ____ line. a)dashed b)curved c)solid d)red

dashed

A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage.​ ​a)process flow diagram b)object model c)data flow diagram ​d)network model

data flow diagram

A _____ controls database operations, including storing, retrieving, updating, and deleting data. a)data device language b)​data query language c)data manipulation language d)data definition language

data manipulation language

A _____ is a central storehouse of information about a system's data.​ a)data feed b)data repository c)data cube d)data mart

data repository

A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. a)data load rule b)data mining rule c)data requirements rule d)data validation rule

data validation rule

A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data. a)database management system b)​integrated development environment c)advanced host controller system d)data logger framework

database management system

A _____ is a graphical representation of the conditions, actions, and rules found in a decision table. a)decision board b)decision tree c)decision element d)decision point

decision tree

Typical process description tools include _____. a)pseudocode b)database tables c)context diagrams d)decision trees

decision trees

When a project manager first recognizes that a project is in trouble, one of the options available to the manager includes _____. a)eliminating controls and procedures b)delaying the project deadline c)expanding the project requirements d)reducing the project resources

delaying the project deadline

​In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. a)design prototyping b)command prototyping c)system prototyping d)layout prototyping

design prototyping

In a typical company organizational model, top managers ____. a)include users who rely on TP systems to enter and receive the data they need to perform their jobs b)develop long-range plans, called strategic plans, which define the company's overall mission and goals c)provide direction, necessary resources, and performance feedback to supervisors and team leaders d)oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people

develop long-range plans, called strategic plans, which define the company's overall mission and goals

Corrective maintenance _____.​ a)diagnoses and corrects errors in an operational system b)competes for resources in an operational system c)adds enhancements to an operational system and makes the system easier to use d)involves changing an operational system to make it more efficient, reliable, or maintainable

diagnoses and corrects errors in an operational system

If variable input data is needed, a _____ must be provided to explain what is needed. a) toggle button b) menu bar c) list box d) dialog box

dialog box

As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational. a)direct cutover b)parallel operation c)phased operation d)pilot operation

direct cutover

Of the measures of feasibility, _____ assesses tangible and intangible benefits to a company in addition to costs.​ a)economic feasibility b)technical feasibility c)schedule feasibility d)operational feasibility

economic feasibility

The process of concentrating on what is said in an interview and noticing any nonverbal communication that takes place is called _____. a)fact-finding b)brainstorming c)ampling d)engaged listening

engaged listening

A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities. a)entity-relationship diagram (ERD) b)illustration flow chart c)data chart d)query relationship diagram (QRD)

entity-relationship diagram (ERD)

A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings. a)fixed fee model b)subscription model c)evaluation model d)usage model

evaluation model

A(n) _____ is a data validation rule that is used for applying to mandatory data items. a) asynchronic check b)existence check c)sequence check d)range check

existence check

A(n) _____ is an attack that takes advantage of a vulnerability. a)proxy b)archive c)exploit d)firewall

exploit

The objective of _____ is to gather data about project usability, costs, benefits, and schedules.​ a)project execution b)fact-finding c)project maintenance d)mediation

fact-finding

In a data dictionary, a(n) _____ is the smallest piece of data that has meaning within an information system. a)pixel b)field c)record d)index

field

A popular technique for investigating causes and effects is called a _____ diagram.​ a)fishbone b)jawbone c)crossbone d)causebone

fishbone

The _____ is a top-down representation of a process. a)Unified Modeling Language (UML) b)functional decomposition diagram (FDD) c)total cost of ownership (TCO) d)Rapid Economic Justification (REJ)

functional decomposition diagram (FDD)

The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered. a)weak hand, weak hold (WHWH) b)good input, bad output (GIBO) c) poor start, poor finish 9PSPF) d)garbage in, garbage out (GIGO)

garbage in, garbage out (GIGO)

Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s. a)command line interface b)graphical user interface c)character user interface d)binary line interface

graphical user interface

Centralized IT departments no longer produce reams of printed _____ reports. a)greenbar b)batch c)yellowbar d)audit

greenbar

The software that a company's IT department makes, builds, and develops is called _____.​ a)external software b)in-house software c)indexed software d)internal software

in-house software

In a(n) _____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart. a)spontaneous b)open-ended c)unstructured d)informal

informal

In an object-oriented system, objects can ____ certain attributes from other objects. a)reformat b)relate c)inherit d)concatenate

inherit

____ is a specific member of a class. a)index b)instance c)key d)lifeline

instance

Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management.​ a)fixed outsourcing services (FOS) b)application service provider (ASP) c)internet business services (IBS) d)​outsource hosting provider (OHP)

internet business services (IBS)

Project scheduling, an activity of a project manager, _____.​ a)​includes monitoring the progress of a project, evaluating results, and taking corrective action when necessary to stay on target b)includes budgeting a project based on the number of modules and their complexity in a project c)​requires guiding, supervising, and coordinating a project team's workload d)involves staffing, which includes selecting the project team and assigning specific tasks to team members

involves staffing, which includes selecting the project team and assigning specific tasks to team members

In a DFD, the Gane and Sarson symbol for a data flow is a ____. a)flat rectangle that is open on the right side and closed on the left side b)line with a single or double arrowhead c)rectangle with rounded corners d)rectangle, which may be shaded to make it look three-dimensional

line with a single or double arrowhead

​The first step in creating a work breakdown structure (WBS) is to _____. a)estimate task completion time and cost b)determine time requirements c)list all tasks d)mark all recognizable events

list all tasks

In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated. a)status flag b)loop c)freeform d)pie

loop

A system design where the server performs all the processing is described as _ a)dataflow architecture b)cache architecture c)mainframe architecture d)workstation architecture

mainframe architecture

The data mining technique that relies on association rule learning is often called _____. a)​simulated analysis b)market basket analysis c)​strategy-oriented analysis d)virtual storage analysis

market basket analysis

____ is a command that tells an object to perform a certain method. a)message b)statement c)dictum d)baseline

message

A class diagram includes the class _____, which represent the program logic. a)events b)attributes c)methods d)characters

methods

An object's ____ are the tasks or functions the object performs. a)messages b)instances c)methods d)commands

methods

In object-oriented design, built-in processes called _____ can change an object's properties. a)methods b)functions c)features d)attributes

methods

When maintaining schedules, if enough _____ and frequent checkpoints exist, problems will be detected rapidly. a)activity diagrams b)viewports c)data flow diagrams d)milestones

milestones

A major advantage of O-O designs is that systems analysts can save time and avoid errors by using ____ objects. a)modular b)dynamic c)feasible d)linear

modular

Greater user involvement in the system development process usually results in _____. a)poorer communication b)lower quality deliverable c)slower development times d)more satisfied users

more satisfied users

A _____ displays the same information as the Gantt chart, including task dependencies, but uses task boxes to include much more detail. a)semantic wireframe b)ring topology c)mesh topology d)network diagram

network diagram

Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas.​ a)report generators b)newsgroups c)service desks d)benchmarks

newsgroups

​In a data flow diagram (DFD), a black hole is a process that has _____. a)no input b)at least one output and one input, but the output obviously is insufficient to generate the input shown c)no output d)at least one input and one output, but the input obviously is insufficient to generate the output shown

no output

A(n) ____ represents a real person, place, event, or transaction. a)method b)command c)object d)instance

object

Of the measures of feasibility, questions such as "Does management support the project?" and "Will the new system require training for users?" would help predict a system's _____.​ a)economic feasibility b)technical feasibility c)schedule feasibility d)operational feasibility

operational feasibility

Companies use various _____ methods to maintain output integrity and security. a)output data b)output stream c)output aesthetic d)output control

output control

Which of the following is NOT an attribute of a car? a)model b)make c)parking d)color

parking

A _____ represents the work that one person can complete in one day.​ a)person-day b)work-duration c)work-day d)person-work

person-day

A _____ describes the actual processes of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reports, and so on.​ a)qualitative design b)logical design c)physical design d)quantitative design

physical design

A _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity. a)secondary key b)foreign key c)primary key d)candidate key

primary key

Microsoft's risk management model includes _____, which represents the likelihood that the risk will happen. a)description b)category c)trigger d)probability

probability

A _____ documents the details of a functional primitive, which represents a specific set of processing steps and business logic. a)primitive description b)function-based description c)logical description d)process description

process description

If processes must be performed in a specific sequence, the information should be documented in the _____. a)process descriptions b)data flow diagram (DFD) c)leveling guide d)data dictionary

process descriptions

Structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information.​ a)model-specific b)iterative c)processed-centered d)inferred

processed-centered

Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called _____.​ a)project creep b)project dilation c)project drift d)project expansion

project creep

Software such as Microsoft OneNote is a type of _____ software. a)project data management b)personal data management c)personal digital assistant (PDA) d)personal information manager (PIM)

project data management

In object-oriented analysis, objects possess characteristics called _____.​ a)orientations b)classes c)inheritances d)properties

properties

A(n) _____ allows a user to specify a task without specifying how the task will be accomplished. a)query language b)imperative language c)query by example language d)procedural language

query language

​In projects where it is desirable to obtain input from a large number of people, a(n) _____ can be a valuable tool. a)title b)questionnaire c)suggestion d)observation

questionnaire

A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong. a)validity check b)sequence check c)range check d)reasonableness check

range check

A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. a)existence check b)asynchronous check c)range check d)sequence check

range check

In a DFD, the Gane and Sarson symbol for a process is a ____. a)rectangle with rounded corners b)line with a single or double arrowhead c)flat rectangle that is open on the right side and closed on the left side d)rectangle, which may be shaded to make it look three-dimensional

rectangle with rounded corners

An object ____ diagram shows the objects and how they interact to perform business functions and transactions. a)relationship b)antecedent c)precedent d)parent

relationship

One of the main activities in the systems analysis phase is _____, which involves fact-finding to describe the current system and identification of the specifications for the new system. a)user-based modeling b)goal-based modeling c)requirements modeling d)objective modeling

requirements modeling

A _____ is a proactive effort to anticipate a risk and describe an action plan to deal with it. a)risk balance plan b)risk identification plan c)risk response plan d)risk management plan

risk response plan

The term _____ refers to a system's ability to handle increased business volume and transactions in the future. a)compatibility b)reliability c)applicability d)scalability

scalability

In a(n) _____, team members prepare to lunge at each other to achieve their objectives. a)pool b)adaptation c)resequencing session d)scrum

scrum

The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.​ a)risk policy b)concealment report c)threat report d)security policy

security policy

When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum.​ a)service b)process c)outsource d)product

service

When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions.​ a)request for proposal b)software license c)fixed fee model d)supplemental maintenance agreement

software license

Which of the following is a software collection obtained from a vendor or application service provider? a)software aggregate b)software metric c)software package d)software cluster

software package

In the context of in-house software development options, companies that develop software for sale are called _____. a)software vendors b)software dealers c)software distributers d)software stockers

software vendors

​A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction. a)tester document b)recovery document c)source document d)transaction document

source document

In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another. a)open loop b)unit plan c)status flag d)a pilot

status flag

​Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design. a)wireframe b)viewport c)viewbox d)storyboard

storyboard

A _____ is a review of a project team member's work by other members of a team.​ a)critical walk-through b)structured walk-through c)foundational walk-through d)baseline walk-through

structured walk-through

A(n) _____ is not as flexible as a series of interviews, but it is less expensive, generally takes less time, and can involve a broad cross-section of people.​ a)fishbone b)experiment c)survey d)research

survey

In maintenance management, _____ involves studying the parts of a system to understand the overall system. a)fusion b)synthesis c)adoption d)elucidation

synthesis

A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team.​ a)programmer b)system validator c)tester d)system administrator

system administrator

​In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system. a)​systems implementation phase b)​systems support and security phase c)systems design phase d)systems analysis phase

systems analysis phase

A(n) _____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company's information systems.​ a)application developer b)systems analyst c)network administrator d)database administrator

systems analyst

The goal of _____ is to build a system that is effective, reliable, and maintainable. a) systems analysis b) systems design c) system auditing d) systems reporting

systems design

The systems implementation phase of the systems development life cycle (SDLC) includes an assessment, called a _____, to determine whether the system operates properly and if costs and benefits are within expectation.​ a)systems estimation b)​systems validation c)systems verification d)systems evaluation

systems evaluation

A systems analyst conducts a preliminary investigation to study the _____ and recommend specific action.​ a)systems validation b)systems request c)project staffing report d)project scheduling report

systems request

A task that represents several activities is known as a _____. a)task name b)task group c)task ID d)task review

task group

Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands. a)dialog box b)toolbar c) taskbar d) menu box

toolbar

​In addition to direct evaluations, systems developers must identify and document indirect expenses that contribute to the _____. a)Rapid Economic Justification (REJ) b)business process modeling notation (BPMN) c)total cost of ownership (TCO) d)functional decomposition diagram (FDD)

total cost of ownership (TCO)

Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others. a)train-the-trainer b)direct cutover c)top-down design d)structured walkthrough

train-the-trainer

___ analyzes an organization's assets, threats, and vulnerabilities.​ a)​Risk identification b)​Risk control c)Risk diversification d)Risk uncertainty

​Risk identification

The overall aim of a _____ is to avoid seeking goals that are unrealistic, unprofitable, or unachievable. a)CSF (Critical Success Factor) analysis b)​SWOT (Strength, Weakness, Opportunities, and Threats) analysis c)BCF (Business Case Factor) analysis d)SWCT (Strategy, Weakness, Cost, and Technology) analysis

​SWOT (Strength, Weakness, Opportunities, and Threats) analysis

The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.​ a)operational baseline b)​product baseline c)​allocated baseline d)​functional baseline

​allocated baseline

When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic ecommerce environment.​ a)smaller initial investment and provides more flexibility b)smaller initial investment but provides less flexibility c)greater initial investment but provides more flexibility d)greater initial investment and provides less flexibility

Greater initial investment but provides more flexibility

​_____ lists each risk and assesses the likelihood that it could affect a project. a)Risk identification b)Risk averting c)Risk analytics d)Risk dominance

Risk identification

Many organizations require a more formal type of desk checking called _____. a)a control module b)integration testing c)a structured walkthrough d)a data couple

a structured walkthrough

A(n) _____ is a series of tasks that, if delayed, would affect the completion date of the overall project. a)dynamic path b)critical path c)absolute path d)relative path

critical path

At the end of the systems implementation phase, the final report to management should include _____. a)final versions of all system documentation b)​quality and effectiveness of training c)adequacy of system controls and security measures d)hardware efficiency and platform performance

final versions of all system documentation

A _____ is the main line of defense between a local network, or intranet, and the Internet. a)spyware b)malware c)firewall d)threat

firewall

The _____ method of developing systems produces code that is modular and reusable.​ a)adaptive b)object-oriented analysis c)​rapid application development d)structured analysis

object-oriented analysis

In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed version of the entire SDLC with users involved every step of the way. a)brainstorming b)agile method c)rapid application development d)sampling

rapid application development

Systems development typically starts with a ____. a)feasibility study, followed by a systems request, which includes a preliminary investigation b)systems request, followed by a preliminary investigation, which includes a feasibility study c)preliminary investigation, followed by a feasibility study, which includes a systems request d)feasibility study, followed by a preliminary investigation, which includes a systems request

systems request, followed by a preliminary investigation, which includes a feasibility study

During the _____ of the systems development life cycle (SDLC), the IT staff maintains, enhances, and protects the system.​ a)​systems planning phase b)systems analysis phase c)systems support and security phase d)systems implementation phase

systems support and security phase

During _____, programmers must test programs that interact with other programs and files separately before they are integrated into the system. a)unit testing b)functional testing c)integrated testing d)acceptance testing

unit testing

Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system. a)abstraction metrics b)usability metrics c)encapsulation metrics d)ergonomic metrics

usability metrics

​_____ give the project managers an opportunity to seek input and conduct brainstorming sessions. a)Project status meetings b)Status reports c)Project review reports d)Board meetings

Project status meetings

​Systems requests seldom are aimed at improving service to users within a company. T/F

False

Which of the following is an example of a horizontal application?​ a)Accounting packages b)College applications c)Real estate firms d)Construction companies

Accounting packages

Which of the following methods of system development stresses intense team-based effort and reflects a set of community-based values?​ a)Object-oriented analysis b)Rapid application development c)​Structured analysis d)Agile method

Agile method

___ ensures that authorized users have timely and reliable access to necessary information.​ a)Integrity b)Concealability c)Availability d)Confidentiality

Availability

_ is the amount of data that can be transferred in a fixed time period.​ a)Dimensionality b)Bandwidth c)Topology d)Resolution

Bandwidth

Adding more people to a project actually might increase the time necessary to complete the project because of a principle called _____. a)Moody's Law b)Hooke's Law c)Brook's Law d)Bernoulli's Law

Brook's Law

____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.​ a)Reorganizing b)Resource sizing c)Restructuring d)Capacity planning

Capacity planning

_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.​ a)Functionality b)Normalization c)Scalability d)Cardinality

Cardinality

A _____ is a set of letters or numbers that represents a data item. a)business glossary b)mnemonic c)data dictionary d)code

Code

___ measures a module's scope and processing characteristics. a)Coupling b)Indexing c)Cohesion d)Partitioning

Cohesion

If a primary key combines two or more fields, then it is called a _____. a)dedicated key b)composite key c)foreign key d)candidate key

Composite key

___ protects information from unauthorized disclosure and safeguards privacy.​ a)Accessibility b)Integrity c)Confidentiality d)Availability

Confidentiality

A(n) _____ provides access for customers, employees, suppliers, and the public. a)application server b)corporate portal c)thick client d)​mainframe architecture

Corporate portal

A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company. a)data warehouse b)metadata c)data frame d)pseudo-data

Data warehouse

__ combine data from different item attributes, or characteristics, to build a code. a)Derivation codes b)Sequence codes c)Category codes d)Significant digit codes

Derivation codes

Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.​ a)mission-critical systems b)web-centric systems c)distributed systems d)legacy systems

Distributed systems

​_____ is a fact-finding technique that can help a systems analyst understand how the current system is supposed to work. a)Document review b)Productivity software c)A systematic sample d)Brainstorming

Document review

_____ technology uses radio frequency identification (RFID) tags to identify and monitor the movement of each individual product, from a factory floor to the retail checkout counter. a)EPOD (Electronic proof of delivery) b)RTPD (Real-time product delivery) c)EPC (Electronic product code) d)MCC (Magnetic character code)

EPC (Electronic product code)

__ is a6the process of converting readable data into unreadable characters to prevent unauthorized access to the data. a)Encapsulation b)Encryption c)Normalization d)Standardization

Encryption

Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something. T/F

False

Like a primary key, a foreign key must be unique. T/F

False

Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms.​ T/F

False

Most large companies rely on one person to evaluate systems requests instead of relying on a systems review committee.​ T/F

False

One highly publicized form of social engineering is called post texting, which is a method of obtaining personal information under false pretenses. T/F

False

Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time. T/F

False

The responsibilities of a systems analyst at a small firm are exactly the same as those at a large corporation.​ T/F

False

When designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics.

False

lass diagram resembles a horizontal flowchart that shows the actions and events as they occur. T/F

False

​Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals. T/F

False

​Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees. T/F

False

​In addition to helping to gather and analyze facts, many programs also automatically perform fact-finding for systems analysts.

False

​Interface design should call for attention to the interface, rather than facilitating design objectives. T/F

False

A table is in _____ if it does not contain a repeating group. a)second normal form b)third normal form c)first normal form d)fourth normal form

First normal form

__ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows. a)Acceptance tests b)Simulations c)Training plans d)Flowcharts

Flowcharts

____, a human resource issue, is a possible cause of cost overruns in an organization. a)Inaccurate demand forecast b)Unrealistic estimates c)Poor monitoring of progress d)Inadequate training

Inadequate training

__ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.​ a)Instructional technology b)Information technology c)Assistive technology ​d)Medical technology

Information technology

_____ are advantages that are difficult to measure in dollars but are important to a company.​ a)Tangible benefits b)Tactile benefits c)Real benefits d)Intangible benefits

Intangible benefits

___ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively. a)Analytical skills b)Confrontational skills c)Artistic skills d)Interpersonal skills

Interpersonal skills

Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources.​ a)storage area network (SAN) b)local area network (LAN) c)wide area network (WAN) d)desk area network (DAN)

Local area network (LAN)

__ describes the way the components in a network interact.​ a)Logical topology b)Interactive topology c)Physical topology d)Engagement topology

Logical topology

___ expenses vary significantly during a system's operational life and include spending to support maintenance activities.​ a)Principal b)Secure c)Capital d)Maintenance

Maintenance

Which of the following is true of a traditional systems development environment?​ a)​Systems are easily scalable and can run on multiple hardware environments. b)​Systems are developed and delivered in an Internet-based framework such as .NET or WebSphere. c)​Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel. d)Many applications require substantial desktop computing power and resources.

Many applications require substantial desktop computing power and resources.

Identify a major web-based development environment. a)Cisco's CSR b)HP ArcSight c)Microsoft's .NET d)Oracle DBA

Microsoft's .NET

To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data. a)firmware b)stack c)server d)middleware

Middleware

__ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.​ a)Scrum b)Rapid application development c)Prototyping d)Modeling

Modeling

​_____ is based on combinations of the three logical structures, or control structures which serve as building blocks for the process. a)Product design b)Modular design c)Interface design d)Visual design

Modular design

__ is the process of creating table designs by assigning specific fields or attributes to each table in a database.​ a)Abstraction b)Normalization c)Encryption d)Encapsulation

Normalization

The _____ describes how data actually moves from an application on one computer to an application on another networked computer.​ a)five forces mode b)object-oriented database model c)OSI (Open Systems Interconnection) model d)subscription model

OSI (Open Systems Interconnection) model

_ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data. a)Open embedded connectivity (OEC) b)Java virtual connector (JVC) c)Open database connectivity (ODBC) d)ActiveX data object (ADO)

Open database connectivity (ODBC)

A _____ chart displays complex task patterns and relationships. a)Gantt b)Scatter c)Pareto d)Program Evaluation Review Technique (PERT)

Program Evaluation Review Technique (PERT)

Using a(n) _____, a project manager can convert task start and finish times to actual dates by laying out the entire project on a calendar.​ a)Program Evaluation Review Technique (PERT) chart b)XY chart c)Scatter chart d)Pedrigree chart

Program Evaluation Review Technique (PERT) chart

​_____ give team members of a project an opportunity to share information, discuss common problems, and explain new techniques. a)Board meetings b)Project review reports c)Status reports d)Project status meetings

Project status meetings

To create use cases, you start by reviewing the information that you gathered during the requirements modeling phase. T/F

True

To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year. T/F

True

__ design and construct webpages, monitor traffic, manage hardware and software, and link web-based applications to a company's information systems.​ a)Network administrators b)User support specialists c)Web support specialists d)Database administrators

Web support specialists

In a data dictionary, any name other than the standard data element name is called a(n) _____. a)cipher b)alias c)clone d)mirror

alias

To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems.​ a)metric analysis b)allocation testing c)benchmark testing d)threat analysis

benchmark testing

A _____ is logically impossible in a data flow diagram (DFD) because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow. a)server farm b)black hole c)spontaneous combustion d)gray template

black hole

​System developers use _____ to document and trail program defects, code changes, and replacement code. a)bug tracking software b)the obstruction generator c)the defect distribution policy d)fault promotion analysis

bug tracking software

In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision. a)build or buy b)subscription c)build or make d)transactional

build or buy

The term _____ refers to the reasons, or justifications, for a proposal.​ a)work statement b)use case c)problem charter d)business case

business case

A _____ describes the information that a system must provide.​ a)process model b)business model c)network model d)data model

business model

For complex models, analysts can choose computer-based modeling tools that use _____, which includes standard shapes and symbols to represent events, processes, workflows, and more. a)​joint application development (JAD) b)electronic data interchange (EDI) c)​rapid application development (RAD) d)business process modeling notation (BPMN)

business process modeling notation (BPMN)

A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.​ a)interpolated model b)method model c)usage model d)administrative model

usage model

A _____ is a Unified Modeling Language (UML) technique that visually represents the interaction between users and an information system. a)surface flowchart b)scatter diagram c)user-based flowchart d)use case diagram

use case diagram

A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity. a)user configeration b)user query c)user application d)user interface

user application

In the rapid application development (RAD), during the _____ phase users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs. a)user design b)requirements planning c)construction d)cutover

user design

In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application. a)user agent b)user manual c)user interface d)user story

user interface

Leveling _____. a)uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system b)ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD) c)ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD) d)uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system

uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system

In a(n) _____ model, the result of each phase is called a deliverable, which flows into the next phase.​ a)waterfall b)spiral c)iterative d)interactive

waterfall

A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify.​ a)wiki b)portal c)iOS d)blog

wiki

The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client. Which of the following is a benefit if they use the four-model approach? a)​It will not incur additional costs to develop logical and physical model of the current system. b)​It will take less time to build a logical and physical model of the current system. c)​It will provide time to create the current system models even for projects with tight schedules. d)​It will provide a clear picture of current system functions before any modifications or improvements are made.

​It will provide a clear picture of current system functions before any modifications or improvements are made.

Which of the following is a typical example of a system requirement for the output category? a)As the final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits and produce tax data required by the IRS. b)​The contact management system must generate a daily reminder list for all sales reps. c)All transactions must have audit trails. d)Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs.

​The contact management system must generate a daily reminder list for all sales reps.

The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.​ a)system networking committee b)topology identification committee c)data storage committee d)​computer resources committee

​computer resources committee

User documentation _____. a)allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) b)describes a system's functions and how they are implemented c)​consists of instructions and information to users who will interact with the system d)contains all the information needed for users to process and distribute online and printed output

​consists of instructions and information to users who will interact with the system

Operations documentation _____. a)​contains all the information needed for processing and distributing online and printed output b)describes the inputs, outputs, and processing logic for all program modules c)describes a system's functions and how they are implemented d)consists of instructions and information to users who will interact with the system

​contains all the information needed for processing and distributing online and printed output

Decision trees show the logic structure in a _____. a)​horizontal form that resembles a tree with the roots at the left and the branches to the right b)vertical form that resembles a tree with the roots at the bottom and the branches at the top c)vertical form that resembles a tree with the roots at the top and the branches at the bottom d)​horizontal form that resembles a tree with the roots at the right and the branches to the left

​horizontal form that resembles a tree with the roots at the left and the branches to the right

Project reporting, an activity of a project manager, _____. a)includes identifying and arranging project tasks and estimating completion times and costs b)​includes informing management, users, and the project team about the progress of a project c)​involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that might delay a project d)​consists of staffing, which includes selecting the project team and assigning specific tasks to team members

​includes informing management, users, and the project team about the progress of a project

​In a data flow diagram (DFD), a spontaneous generation process is a process that has _____. a)no output b)​no input c)​at least one output and one input, but the output obviously is insufficient to generate the input shown d)at least one input and one output, but the input obviously is insufficient to generate the output shown

​no input

In a typical company organizational model, middle managers _____.​ a)​include users who rely on transaction processing (TP) systems to enter and receive the data they need to perform their jobs b)oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people c)​provide direction, necessary resources, and performance feedback to supervisors and team leaders d)develop long-range plans, called strategic plans, which define the company's overall mission and goals

​provide direction, necessary resources, and performance feedback to supervisors and team leaders


Ensembles d'études connexes

Interactive Animation: Stream Terrace Formation

View Set

Organizational Behavior Final Exam

View Set