315 Chap 23
extreme programming
"A software development methodology which is intended to improve software quality and responsiveness to changing customer requirements. It is a form of agile development, and as such advocated frequent releases in short development cycles, which is intended to improve productivity and introduce checkpoints at which new customer requirements can be adopted. Other common elements of XP include: programming in pairs or doing extensive code review, flat management structures and avoiding programming of features until they are actually needed."
1. Identify approaches that organizations may take to purchase application software, vendor services, and hardware.
- purchasing software - develop software in-house - hiring a company to develop and operate the system
unified process
A development framework with four phases: inception, elaboration, construction, and transition. The last three phases are divided into a series of iterations of a predetermined length. Each incremental iteration contains additional functions or an improved version of the previously developed software.
scrum development
A process that embraces customers frequently changing their minds about what they need or want. Scrum development focuses on flexibility, responding to new requirements, adapting to evolving changes in technology, and quickly delivering a system the customer can evaluate.
Which of the following is not an advantage of outsourcing? A. Decreases operations, technology, strategy, and personnel risks B. Helps eliminate peaks-and-valleys usage of systems resources C. Allows companies to better utilize assets D. Allows companies to concentrate on core competencies E. Access to greater expertise and better technology
A. Decreases operations, technology, strategy, and personnel risks
There are many different ways to acquire software. One way is to buy software that has been developed for a broad range of users with similar needs. This is called A. canned software. B. end-user developed software. C. custom software. D. outsourced software. E. case software.
A. canned software.
There are many different ways to acquire software. One way is for a company to have its in-house software development team write the software. This is called A. custom software. B. I-HD software. C. end-user computing. D. outsourced software. E. CASE software.
A. custom software.
Sometimes software and hardware are sold together as a package. These systems are called: A. turnkey systems. B. H-S integrated systems. C. CASE systems. D. ASP systems.
A. turnkey systems.
2. Describe at least 2 reasons why an organization would choose to outsource its information systems, and 3 advantages and 3 disadvantages to doing so.
Advantages: -access to greater expertise and better technology - lower costs - less development time - elimination of peaks-and-valleys usage - facilitation of downsizing Disadvantages: - inflexibility - loss of control - reduced competitive advantage - locked-in system -unfulfilled goals -poor service -increased risk
The text mentions several ways that systems performance can be compared. Which of the following is not a valid method of evaluating proposed information systems? A. Benchmark problem, which is an input, processing, and output task that can be run through each software package to see how the system performs B. Competitor comparisons, in which the software under consideration is compared to the software used by the company's chief competitors C. Requirement costing, which estimates the cost of purchasing or developing unavailable features so that there is an equitable basis for comparing systems D. Point scoring, which assigns a weight to each evaluation criterion based on its importance
B. Competitor comparisons, in which the software under consideration is compared to the software used by the company's chief competitors
Business process management (BPM) is a systematic approach to continuously improving and optimizing an organization's business processes. Since it is supported and enabled by technology, it is a good way to introduce both a human and a technological change capability into an organization. All of the following are important principles underlying BPM, except: A. Business processes should be agile, which requires flexibility and business process automation technology that supports rapid modifications. B. Like an enterprise resource planning (ERP) system, a BPM system is an enterprise-wide system that is data centered rather than process centered. C. Business processes must be aligned with organizational strategy and need to be effective and efficient. D. Business processes can produce competitive advantages. E. Business processes are strategic organizational assets that should be understood, improved, and managed from inception to completion.
B. Like an enterprise resource planning (ERP) system, a BPM system is an enterprise-wide system that is data centered rather than process centered.
Companies that buy large or complex systems often send vendors a request for proposal (RFP) asking them to propose a system that meets their needs. Using an RFP is important for all the following reasons, except: A. it saves time since the same information is provided to all vendors, eliminating repetitive interviews and questions. B. it ensures that the best system is purchased since each vendor provides enough information that the decision as to which system is best is clear-cut. C. it simplifies the decision-making process since all responses are in the same format and based on the same information. D. it reduces errors since the chances of overlooking important factors are reduced. E. it avoids the potential for disagreement since both parties possess the same expectations, and pertinent information is captured in writing.
B. it ensures that the best system is purchased since each vendor provides enough information that the decision as to which system is best is clear-cut.
There are many different ways to acquire software. One way is for a company to hire an outside company to process its transactions using software they have developed. This is called: A. business process reengineering. B. outsourcing. C. CASE software. D. prototyping. E. customizing.
B. outsourcing.
Evaluating the overall merits of vendor proposals by assigning a weight to each evaluation criterion based on its importance is called A. requirement costing. B. point scoring. C. response time evaluation. D. benchmark problem.
B. point scoring.
There are many different ways to develop software. One way is to quickly develop a simplified working model of a system to see if it meets user needs before developing an entire system. This is called: A. complete customizing and redesign. B. prototyping. C. CASE software. D. simplified business process modeling. E. ERP software.
B. prototyping.
A predetermined time period where a team works on high priority items in the product backlog is called a ______________. A. production eruption. B. sprint. C. scrum. D. dash. E. backlog fix.
B. sprint.
A/An _________________ is written by a product owner and is a description of something a user wants to include in the system. A. modification request B. user story C. update request D. new development request
B. user story
End-user development is only appropriate for certain types of data processing or information production systems. Which of the following is not a valid use of end-user development? A. Retrieving information from company databases to produce simple reports or to answer one-time queries B. Performing "what-if," sensitivity, or statistical analyses C. Processing transactions to update accounts receivables and accounts payables D. Preparing schedules, such as depreciation schedules and loan amortizations E. Developing applications using software such as a spreadsheet or a database system
C. Processing transactions to update accounts receivables and accounts payables
Companies can rent software from companies who deliver the software over the Internet. These companies are called: A. agile service providers B. internet based providers. C. application service providers. D. RFP providers.
C. application service providers.
There are many different ways to acquire software. One way is for the people who are going to use the software to create it. This is called: A. outsourced software. B. business process reengineering. C. end-user computing. D. CASE software. E. ERP software.
C. end-user computing.
Answering employee questions and supporting, coordinating, and controlling end user computing is the responsibility of the A. user acceptance and support center. B. user stories desk. C. help desk. D. customer service center.
C. help desk.
End-user development is appropriate when there is a need to A. update database records. B. All of these are correct. C. perform "what-if," sensitivity, or statistical analyses. D. process accounts receivables and payables transactions.
C. perform "what-if," sensitivity, or statistical analyses.
All of the following are disadvantages of outsourcing, except: A. possible loss of control over the company's system and data. B. inflexibility in the event that a company is dissatisfied or has structural changes. C. the requirement of more systems development time. D. expensive and difficult to reverse outsourcing. E. reduced competitive advantage if outsourcer is not motivated to meet competitive challenges.
C. the requirement of more systems development time.
Which of the following statements is false with respect to internal controls in a BPM system? A. Application controls are strengthened as the BPMS uses the company's business rules to identify what actions must be taken and forwards the task to the appropriate person's task list. B. Segregation of duties can be improved as the BPMS reduces delays and costs by instantaneously transferring items needing approval to the manager. C. A BPMS can improve internal controls, because an organization's business-process rules are used to determine the correct person to perform a task and authorizes that person to perform it. D. A BPMS does not have a built-in audit trail, as there is no process monitoring and tracking system that documents and links all actions and process steps.
D. A BPMS does not have a built-in audit trail, as there is no process monitoring and tracking system that documents and links all actions and process steps.
Which of the following is not an advantage of end-user computing? A. User creation, control, and implementation B. Timeliness C. Systems that meet user needs D. Adequately tested applications E. Versatility and ease of use
D. Adequately tested applications
___________________ is a guiding philosophy and a set of principles for developing information systems in an unknown and rapidly changing environment. A. Nimble development B. CASE development C. Business process reengineering development D. Agile development
D. Agile development
Which of the following is not an advantage of prototyping? A. Fewer errors as they are detected and eliminated early, as users test each version of the prototype B. Better definition of user needs due to intensive involvement from end users C. More opportunity for changes, as users can suggest changes until the system is exactly what they want D. More efficient use of system resources, as well as better performance and reliability E. Faster development time, as prototypes are often functioning after a few days or weeks
D. More efficient use of system resources, as well as better performance and reliability
Which of the following are disadvantages of outsourcing? (Check all that apply.) A. Higher costs due to standardizing user applications and splitting development and maintenance costs between projects B. Migration to new technologies may be poorly planned. C. Makes downsizing very difficult to accomplish D. Responsiveness to changing business conditions is slow or nonexistent and
D. Responsiveness to changing business conditions is slow or nonexistent and B. Migration to new technologies may be poorly planned.
In which development methodology does the development team work together in an intense but relatively short process to reach a common development goal? A. CASE B. Business process reengineering C. End user development D. Scrum
D. Scrum
Grizzley Corp spent several million dollars a year on IT to gain a competitive advantage. The result was thousands of PCs, servers, e-mail systems, and different communications systems from a few dozen manufacturers. Grizzley Corp finally realized it needed to shift its emphasis from owning the latest technology to the effective use of technology. When Grizzley Corp standardized its systems it eliminated which of the following issues with end-user computing? A. Inefficient systems B. Duplication of systems and data; wasted resources C. Logic and development errors D. System incompatibilities
D. System incompatibilities
A systematic approach to continuously improving and optimizing an organization's business processes is known as A. prototyping. B. outsourcing. C. unified business processes. D. business process management.
D. business process management.
There are many different ways to develop software. One way is to do a thorough analysis of company operations and completely redesign a company's information system. This is called: A. CASE software. B. prototyping. C. outside analysis and redesign. D. business process reengineering. E. complete customizing and redesign.
D. business process reengineering.
Which of the following statements is (are) true? (Check all that apply.) A. In a client/server, a service, function, or segment of business is outsourced. B. Outsourcing was initially used for standardized applications such as payroll and accounting or by companies who wanted a cash infusion from selling their hardware. C. Few Fortune 500 companies outsource their PC support function. D. Most outsourcing contracts are for a year or less and cost millions of dollars a year. E. In mainframe outsourcing agreements, outsourcers buy client computers, hire the client's IS employees, operate and manage the system.
E. In mainframe outsourcing agreements, outsourcers buy client computers, hire the client's IS employees, operate and manage the system. B. Outsourcing was initially used for standardized applications such as payroll and accounting or by companies who wanted a cash infusion from selling their hardware. A. In a client/server, a service, function, or segment of business is outsourced.
Comparing systems by executing an input, processing, and output task on different computer systems and evaluating the results is called A. through putting. B. requirement costing. C. point scoring. D. response timing. E. benchmarking.
E. benchmarking.
All of the following are disadvantages of end-user computing, except: A. logic and development errors. B. inefficient systems. C. the duplication of systems and data, and wasted resources. D. poorly controlled and documented systems. E. the freeing up of systems resources.
E. the freeing up of systems resources.
turnkey system
Software and hardware sold as a package such that the vendor installs the system and the user "turns on the key;" often written by vendors who specialize in a particular industry.
custom software
Software developed and written in-house to meet the unique needs of a particular company.
7. Which of the following is NOT a benefit of outsourcing? a. It offers a great deal of flexibility because it is relatively easy to change outsourcers. b. It can provide access to the expertise and special services provided by outsourcers. c. It allows companies to move to a more sophisticated level of computing at a reasonable cost. d. It is a cost-effective way to handle the peaks and valleys found in seasonal businesses.
a. It offers a great deal of flexibility because it is relatively easy to change outsourcers.
5. To compare system performance, a company can create a data processing task with input, processing, and output jobs. This task is performed on the systems under consideration, and the processing times are compared. The AIS with the lowest time is the most efficient. What is this process called? a. benchmarking b. requirements costing c. point scoring d. performance testing
a. benchmarking
2. Companies that buy rather than develop an AIS must still go through the systems development life cycle. a. true b. false
a. true
3. Describe each of the following approaches and why/when they would be used: b. prototyping life cycle
an approach to system design which a simplified working model or prototype of an IS is developed. The users experiment with the prototype to determine what they like and do not like about the system. The developers make modifications until the users are satisfied with the system - allows to condense and speed up some analysis and design tasks
request for proposal (RFP)
asking vendors to propose a system that meets their needs - best proposals are investigated to verify that company requirements can be met
3. Which of the following statements is FALSE? a. As a general rule, companies should buy rather than develop software if they can find a package that meets their needs. b. As an AIS increases in size and complexity, there is a greater likelihood that canned software can be found that meets user needs. c. A company should not attempt to develop its own custom software unless experienced, in-house programming personnel are available and the job can be completed less expensively on the inside. d. As a general rule, a company should develop custom software only when it will provide a significant competitive advantage.
b. As an AIS increases in size and complexity, there is a greater likelihood that canned software can be found that meets user needs.
9. Which of the following is NOT an advantage of prototyping? a. better definition of user needs b. adequately tested and documented systems c. higher user involvement and satisfaction d. faster development time
b. adequately tested and documented systems
6. Which of the following statements is true? a. Because the AIS is so crucial, companies never outsource parts of the AIS b. Most mainframe outsourcing contracts are for two to three years and cost thousands of dollars a year. c. Outsourcers often buy the client's computers and hire all or most of its information systems employees. d. Only companies struggling to survive and wanting a quick infusion of cash from selling their hardware use outsourcing.
c. Outsourcers often buy the client's computers and hire all or most of its information systems employees.
4. When a company is buying large and complex systems, vendors are invited to submit systems for consideration. What is such a solicitation called? a. request for quotation b. request for system c. request for proposal d. good-faith estimate
c. request for proposal
10. When is it most appropriate to use prototyping? a. when there is little uncertainty about the AIS b. when it is clear what users' needs are c. when the final AIS cannot be clearly visualized because the decision process is still unclear d. when there is a very low likelihood of failure
c. when the final AIS cannot be clearly visualized because the decision process is still unclear
software as a serviceproviders
companies that rent cloud-based software applications that customers can access using the internet
requirement costing
comparing systems based on the cost of all required features; when software does not meet all requirements, the cost of developing unavailable features is estimated and added to its cost
1. Which of the following is NOT one of the difficulties accountants have experienced using the traditional systems development life cycle? a. AIS development projects are backlogged for years. b. Changes are usually not possible after requirements have been frozen. c. The AIS that is developed may not meet their needs. d. All are difficulties with the SDLC.
d. All are difficulties with the SDLC
8. Which of the following is a true statement with respect to prototyping? a. In the early stages of prototyping, system controls and exception handling may be sacrificed in the interests of simplicity, flexibility, and ease of use. b. A prototype is a scaled-down, first-draft model that is quickly and inexpensively built and given to users to evaluate. c. The first step in prototyping is to identify system requirements. d. All of the statements are true.
d. All of the statements are true
3. Describe each of the following approaches and why/when they would be used: c. Agile methodologies/agile development (e.g., scrum, XP, unified process; what are these and when would they be used?)
for when requirements change as a system is designed more iterative development focuses on the importance of 1. respond to change than follow a plan of predefined schedule 2. emphasize individuals and interactions than processes, tools, and development controls 3. emphasize customer collaboration than contract negotiations 4. produce quality software than to produce good software documentation
Computer-aided software engineering (CASE)
integrated package of tools that skilled designers use to help plan, analyze, design, program, and maintain an IS Advantages: - improved productivity -improved program quality - cost savings - improved control procedures -simplified documentation Disadvantages - incompatibility - cost - unmet expectations
commercial software
programs for sale on the open market to a broad range of users with similar needs - may not meet all company's needs
3. Describe each of the following approaches and why/when they would be used: a. Business process management (BPR)
the thorough analysis and redesign of business processes and information systems to achieve dramatic performance improvements; often a drastic one-time event