IS Design

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The last step in creating basic ERD's is to: a) Identify relationships b) Define attributes and assign identifiers c) Recognize entities d) Test them with users e) Compile them with Java

a) Identify relationships

Alice is calculating whether a system will lower costs or increase revenues. What SDLC phase is she in? a) Planning b) Analysis c) Design d) Implementation e) Evaluation

a) Planning

An example of a functional requirement is _________ a) Access to the customer order system b) System should be available in English and Spanish c) System can be accessed through a Blackberry device d) Output can be displayed in Internet Explorer, in Firefox, or in Google Chrome browsers e) System is automatically updated every 5 seconds

a) Access to the customer order system

Which was NOT given as a method for determining business requirements? a) Benchmarking b) Interviewing c) Observation d) Document analysis e) Questionnaires and surveys

a) Benchmarking

Jona's project is to take a fairly straight-forward manual process and make it an electronic process. This will make the processing more efficient. Which of the following requirements analysis strategies is she using? a) Business Process Automation b) Business Process Improvement c) Business Process Internalization d) Business Process Reengineering e) Business Process Renovation

a) Business Process Automation

PCM Incorporated will need to purchase new servers for a system. This would be a: a) Development cost b) Operating cost c) Ongoing cost d) Intangible cost e) Intangible benefit

a) Development cost

TJ is coordinating a project. Which would he probably NOT use to avoid conflicts? a) Encourage a competitive edge between team members b) Clearly defining plans for the project c) Develop a project charter d) Look at other projects and priorities and see how that might impact the project e) Communicate the business value to the team

a) Encourage a competitive edge between team members

Information in the data dictionary is called: _______________ a) Metadata b) Cached information c) Compiled data d) Data repository e) File silo

a) Metadata

Which is a true statement about IT projects? a) Most IS departments face a demand for IT projects that far exceed the ability to do them. b) Project Managers must be certified as PMP (Project Management Professionals) c) Project estimates tend to have a built-in buffer of time d) Project teams of 12 to 15 are generally considered optimum e) The majority of projects taken on by IT departments are not strategic to the business

a) Most IS departments face a demand for IT projects that far exceed the ability to do them.

When normalizing data models, if you take attributes that have multiple values for a single instance of an entity and create separate entities for those attributes you are moving from: a) O normal form to 1st normal form (1NF) b) 1st normal form (1NF) to 2nd normal form (2NF) c) 2nd normal form (2NF) to 3rd normal form (3NF) d) Generalized normal form (GNF) to fully normalized form (FNF) e) Dependent normal form (DNF) to Independent normal form (INF)

a) O normal form to 1st normal form (1NF)

The interview process has gone well. There are a few things that need clarification and what really happens when specific financial analysts use the system. Which of the following might be the best way to verify what does happen? a) Observation of how the analysts do their work b) Document analysis of what the system was to do c) A JAD session with end users, financial analysts and top managers d) Additional interviews with top level managers in the finance area e) Questionnaires / survey of end users of the system

a) Observation of how the analysts do their work

When an analyst is seeking a more wide ranging response to questions they would probably use: a) Open Ended b) Close ended c) Observation d) Probing

a) Open Ended

After creating the interview report you should: a) Send a copy to the interviewee with a request to read it and correct or clarify b) Change the document into a unchangeable format (like a pdf file) so that it cannot be changed or edited c) Distribute the interview report to all others that are on the interview schedule so they will not have to go over the same materials d) Edit the report into a bulleted format for easier analysis e) Distribute the interview report to the interviewee's manager.

a) Send a copy to the interviewee with a request to read it and correct or clarify

Which of the following project roles would identify how technology can improve business processes? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Requirements analyst

a) Systems analyst

In the initial stage of design, what are business requirements converted into? a. System Requirements b. Work Order Summary c. Computer Qualifications Checklist d. Vanilla System e. Hardware Blueprint

a. System Requirements

Which of the following methodologies is the historic standard, but is used less today because it takes the longest to complete all the SDLC steps? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

a) Waterfall

Which of the following methodologies might be most appropriate if you have a system project with: clear requirements; very familiar technologies; not all that complex; reasonably reliable; a very long time schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

a) Waterfall

Outsourcing firms called _____________ supply software applications and/or software related services through the Internet. a. Application Service Providers (ASPs) b. Enterprise Resource Providers (ERPs) c. System Development Life Cycle Companies (SDLCs) d. Information Technology Developers (ITDs) e. None of these

a. Application Service Providers (ASPs)

There are _____ primary hardware components of a system. a. 1 b. 2 c. 3 d. 4 e. 5

c. 3

Which would NOT likely be an entity on a car insurance ERD? a) Customer b) Policy c) Agent d) Zip code e) Car

d) Zip code

Typically, interviews include the following type questions: a) Probing b) Open Ended c) Close ended d) Observation

???

The outcome of the analysis phase is the: Feasibility Analysis document System proposal document System specification document System request document Business Process document

System proposal document

Micah is a fairly new project manager. He estimated for a project plan (on the planning phase) that the project would cost $50,000 and take 20 weeks. According to the margin of error guidelines for well-done estimates, that could range from: a) $0 and $100,000 - and between 15 and 25 weeks b) $10,000 and $60,000 - and between 12 and 28 weeks c) $0 and $100,000 - and between 0 and 40 weeks d) $5,000 and $100,000 - and between 10 and 30 weeks e) $25,000 and $75,000 - and between 10 and 30 weeks

a) $0 and $100,000 - and between 15 and 25 weeks

System prototyping is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

a) A 'Quick and Dirty' system

Which of the following project roles would insure that the system conforms to information systems standards? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

a) Systems analyst

Becky is a systems analyst for Laswell Consulting. She is attending a three day intensive workshop on developing applications in php. What systems analyst skill is she working on? a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

a) Technical

A sample access control requirement would be: a. Customer service reps can modify customer files but not delete them b. Data will be encrypted for secure ordering c. All uploaded files will be checked for viruses d. The system will cost $38,900 per minute of downtime in lost revenues e. None of these

a. Customer service reps can modify customer files but not delete them

Which is NOT a factor in choosing a development option? a. Data base normalization b. In-house experience c. Time frame d. Project skills e. Project management

a. Data base normalization

If (a) the business need is unique, (b) there is a desire to build in-house skills; (c) the time frame is flexible, it might be best to: a. Do in-house / custom development b. Buy an ERP system c. Outsource to India d. Purchase a software package e. Hire a consultant

a. Do in-house / custom development

The cost of development associated with Client-Based systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

a. Low

Workarounds are: a. Not supported by a vendor who supplied the software b. Designed by the vendor c. Created to interface two software packages that are compatible with each other d. Enterprise Wide Software Packages that are designed for satellite use e. None of these

a. Not supported by a vendor who supplied the software

Server virtualization involves: a. Partitioning a physical server into smaller virtual servers b. Stacking blade servers c. Using a laptop as a server d. All of these

a. Partitioning a physical server into smaller virtual servers

Which of the following lists indicates the correct ordering of deliverables in a system specification document? a. System Acquisition Weighted Alternative Matrix, Interface Design, Physical Data Model Data Storage Design b. Data Storage Design, Interface Design, Architecture Design, Updated Crud Matrix c. Hardware and Software Specifications, Interface Design, Data Storage Design, Architecture Design d. Program Design Specifications, Physical Data Model, Data Storage Design, Architecture Design e. Update CASE Repository Entries, Update CRUD Matrix, Interface Design, Architecture Design

a. System Acquisition Weighted Alternative Matrix, Interface Design, Physical Data Model Data Storage Design

Custom development is used when: a. The business need is unique b. The business need is not core to the business c. The project has a project manager who can coordinate vendor efforts d. The time frame is short e. The skills are not strategic

a. The business need is unique

An example of a multilingual requirement is: a. The system will operate in English, French and Spanish b. Country managers can define custom fields c. All date fields will be presented in a uniform format d. Personal information about English customers cannot be sent to Chinese systems e. Country managers are able to change telephone number formats

a. The system will operate in English, French and Spanish

An example of a capacity requirement would be: a. Transmissions require 287K of data b. The systems uptime will be 99% c. Response time must be <2.8 seconds for any transactions d. The inventory database will be updated in real time e. None of these

a. Transmissions require 287K of data

A time and arrangements deal is considered: a. Very flexible b. Very rigid c. Cheaper than any other option d. Useless when considering a systems design e. Always the best option for any project

a. Very flexible

An advantage of custom development might be: a. You get a system that is tailored to the current business and meets specific needs b. The rapid development of custom systems c. The low cost (as compared to buying a package) d. The low risk factor e. The ability for in-house developers to work on systems that are in new programming languages and in technologies that are unknown to them prior to the development

a. You get a system that is tailored to the current business and meets specific needs

Jack is developing an ERD for a small dental practice office patient record system. The dental practice has three dentists, six hygienists, and many patients. A patient is always assigned to the same dentist for all appointments. In particular, he is working on the relationship between dentists and patients. Should it be: a) 1 to 1, with a modality of null b) 1 to many with a modality of not null c) Many to many with a modality of null d) Many to many with a modality of not null e) 1 to many with a modality of null

b) 1 to many with a modality of not null

Parallel methodology is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

b) A series of versions

Kallie is creating use cases, data flow diagrams and entity relationship diagrams. In what phase of the SDLC would she do this? a) Planning b) Analysis c) Design d) Construction e) Implementation

b) Analysis

Michaela is a systems analyst who is determining business requirements. What would most likely be the SDLC phase for her? a) Planning b) Analysis c) Design d) Implementation e) Business requirements are not developed by systems analysts, but by business analysts

b) Analysis

Which is an activity the users probably will NOT do on a project? a) Make decisions that influence the project b) Budget funds for the project c) Perform hands-on activities for the project d) Be assigned specific tasks to perform (with clear deadlines) e) Have some official roles on the project team

b) Budget funds for the project

The type of skill that is common to systems analysts to understand how IT can be applied to business situations and to ensure that the IT delivers real business value is: a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

b) Business

Moderate changes to existing processes falls under the _________ analysis. a) Business Process Automation (BPA) b) Business Process Improvement (BPI) c) Business Process Reengineering (BPR) d) Business Process Blue-skying (BPB) e) Business Process Efficiency (BPE)

b) Business Process Improvement (BPI)

Which of the following project roles would analyze the key business aspects of the system? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

b) Business analyst

Which of the following is not a project characteristic that will affect the methodology selection decision? a) Schedule Visabiltiy b) Creating a cost/benefit spreadsheet c) User requirements clarity d) Complexity of the system e) System Reliability

b) Creating a cost/benefit spreadsheet

Which is NOT a good practice in conducting interviews? a) Be happy - happy people radiate confidence b) Explain thoroughly - it is estimated that in a strong interview session, the interviewer (you) should talk and explain about 60% of the time; and the interviewee should answer about 40% of the time c) Watch interviewees' facial expressions, how they sit and their body language; do they cross their arms; do they lean forward? d) Pay attention to what the interviewee is saying e) If the interviewee ask you a question, answer it truthfully - and if you don't know an answer, say so

b) Explain thoroughly - it is estimated that in a strong interview session, the interviewer (you) should talk and explain about 60% of the time; and the interviewee should answer about 40% of the time

Suggestions for motivation might include all of these EXCEPT: a) Setting realistic deadlines b) Giving all team members the same bonus on a project c) Recognize and reward good efforts d) Reward those with outstanding quality and effort e) Having a good working environment

b) Giving all team members the same bonus on a project

Omar has a model with 85 entities. He can: a) Compress these into at most seven entity grouping units b) Group these into related subject areas c) Stop - he has all entities defined d) Sort the entities alphabetically e) Co-validate the entities with the level 2 DFD diagrams

b) Group these into related subject areas

Amy is planning on talking with a clerk and a manager in the accounts payable area, a manager in the procurement department, and two vendors. She is probably doing: a) Observation b) Interviews c) JAD d) Documentation analysis e) Organizational Feasibility

b) Interviews

When gathering requirements, the most commonly used technique is: __________ a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

b) Interviews

The two methods to validate that an ERD is well formed are _____. a) Balancing with process models and following design guidelines created by Chen b) Normalization and balancing with process models c) Renaming theory d) Balancing with process models and renaming theory e) Normalization and following design guidelines created by Chen

b) Normalization and balancing with process models

You have entities of ITEM, SOLD-ITEM, SALE and PAYMENT. Which most likely is NOT a relationship? a) SALE is paid by PAYMENT b) PAYMENT pays for ITEM c) ITEM is included in SOLD-ITEM d) SALE involves SOLD-ITEM e) PAYMENT pays for SALE

b) PAYMENT pays for ITEM

Which of the following methodologies might be most appropriate if you have a system project with: clear requirements; very familiar technologies; not all that complex; reasonably reliable; a short time schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

b) Parallel

Another outcome of the planning phase is the: a) Feasibility Analysis document b) Project Plan c) System specification document d) System proposal document e) Business Process document

b) Project Plan

Lines on an ERD diagram indicate: a) Hierarchies between processes b) Relationships among the data c) Plurality of data items d) Uniqueness of data items e) Primary keys

b) Relationships among the data

Bob is selecting a systems analysis and design methodology. What might be the first step? a) Selecting the shortest methodology b) Researching the organizations standards and policies for 'approved' methodologies c) Interviewing senior management as to their suggestions on methodologies d) Do a quick 'cost/benefit' analysis on which methodology will provide the most benefits at the lowest cost e) Do a

b) Researching the organizations standards and policies for 'approved' methodologies

Ramya is preparing an economic feasibility study. She has a calculation where she takes total benefits minus total costs and divides that answer by the total costs. She is calculating: a) Cash flow b) Return on investment c) Break-even point d) Net present value e) Internal rate of return

b) Return on investment

Which of the following is NOT true about ERDs? a) Special symbols are added to show high-level business rules b) The diagrams are drawn in a sequential order - from top to bottom c) Similar kinds of information are listed together in entities d) ERD's are data modeling techniques e) Lines are drawn to show relationships among the data

b) The diagrams are drawn in a sequential order - from top to bottom

Modality refers to: a) Relationships of one-to-one; one-to-many; or many-to-many b) Whether a child entity can exist with or without a related instance in the parent entity c) The hierarchical structure that was developed in process models applied to data models d) The number of attributes generated by an entity e) Whether the entity has a unique identifier (aka 'primary key') or a concatenated identifier (aka 'composite key')

b) Whether a child entity can exist with or without a related instance in the parent entity

If the logical data model does not contain attributes that have repeating values it is in _____. a) base normal form b) first normal form c) non-normal form d) second normal form e) third normal form

b) first normal form

Thick clients contain: a. Enormous storage abilities b. Almost all or most of the application logic c. Almost none or less than half of the application logic d. Almost all of the data logic e. None of these

b. Almost all or most of the application logic

Maintaining a client-server architecture is: a. Easy b. Four to Five times more expensive than server-based applications c. Completely manageable with in-house expertise from the onset d. Easy since the maturity of the application is more developed e. None of these

b. Four to Five times more expensive than server-based applications

Another name for custom development might be: a. Offshore outsourcing b. In-house development c. Vendor supplied in-house consulting d. CASE tools e. Package software

b. In-house development

Client-server architectures tend to be: a. More expensive than client-based architectures b. Less expensive than client-based architectures c. More less secure than client-based architectures d. More expensive than client-based architectures and more less secure than client-based architectures e. None of these

b. Less expensive than client-based architectures

The development tools used to create mainframe-based systems are: a. Very user friendly b. Not very user friendly c. Require no special skills to maintain d. Difficult at first, but the skills are easy to acquire e. None of these

b. Not very user friendly

Server-based applications typically utilize a _______, character-based interface that can be quite powerful for the ________ user. a. Complex; Basic b. Plain; Skilled c. Complex; Skilled d. Plain; Basic e. None of these

b. Plain; Skilled

Client-server architecture holds the client responsible for_____ and server is only responsible for _____. a. Application Logic; Presentation Logic b. Presentation Logic; Data Access Logic and Data Storage c. Data Access Logic and Presentation Logic; Data Storage d. Application Logic; Data Storage e. Data Storage; Application Logic

b. Presentation Logic; Data Access Logic and Data Storage

For efficiency purposes, it is wise to___________ when there is a basic software need to be satisfied. a. Implement a company-wide project team to handle a custom software scripting b. Purchase a packaged system c. Design a blueprint and contract an outside vendor to develop a program d. Make do with the current software package e. Utilize a professional consultant to develop a system of servers

b. Purchase a packaged system

The following document is utilized with possible vendors on projects with smaller budgets, instead of sending a lengthy document to all possible vendors: a. Request for Proposal (RFP) b. Request for Information (RFI) c. Request for Quote (RFQ) d. Request for Efficient Information Distribution (REID) e. More Optimal Desires (MOD)

b. Request for Information (RFI)

DES is an example of: a. Asymmetric Encryption Algorithm b. Symmetric Encryption Algorithm c. Bi-Adjusted Encryption Algorithm d. Dynamic Encryption System e. Alternative Systems Security Algorithms

b. Symmetric Encryption Algorithm

In what SDLC stage do we determine the business needs for an information systems project? a. The design phase b. The analysis phase c. The dissection stage d. The installation stage e. The big bang stage

b. The analysis phase

One problem with using packages software systems is: a. It takes a very long time to get the system and get it installed b. The company has to accept the functionality that is provided with the system c. Many common software packages have been written and tested and are readily available d. There are many good software packages that are reasonable in price e. Most software packages allow for some customization

b. The company has to accept the functionality that is provided with the system

Fixed-price contracts are considered: a. Very flexible b. Very rigid c. Always cheaper than any other option d. Useless when considering a systems design e. Always the best option for any project

b. Very rigid

The term in the computing domain which refers to the creation of devises or storage with the use of software and not hardware is: a. Encryption b. Virtualization c. Dynamic Creation d. Alternative Devises e. None of these

b. Virtualization

The objective of architecture design is to determine_______________. a. How aesthetically pleasing the server system will be b. What parts of the application software will be assigned to what hardware c. How the computers will be arranged to provide ample storage d. Where the mainframe will be situated e. None of these

b. What parts of the application software will be assigned to what hardware

Throwaway prototyping is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

c) A method for exploring design alternatives

TJ has prepared a spreadsheet where the total benefits are $182,000; the total cumulative costs are $120,000. The ROI would be: a) $62,000 b) About 34% c) About 51.7% d) About 65.3% e) Less than 20%

c) About 51.7%

Which would normally NOT be a reason for a project? a) When a business need has been identified b) A consultant has suggest a new customer relationship management system c) An open source platform has just come on the market d) An existing system just isn't working properly and the workaround is tedious e) To support a new business initiative

c) An open source platform has just come on the market

Jack is going over financial numbers for a proposed project. Which of the following system analyst skills is he exhibiting currently? a) Technical b) Business c) Analytical d) Interpersonal e) Management

c) Analytical

A data model can __________: a) Illustrate return-on-investment, break-even point, and economic feasibility b) Represent actions or processes that occur in the to-be system c) Be used as a logical data model in analysis and as a physical data model in design d) Only be used in BPR situations e) Only be used with JAD sessions

c) Be used as a logical data model in analysis and as a physical data model in design

Ramona is preparing an economic feasibility study. She is calculating the payback period. She is calculating: a) Cash flow b) Return on investment c) Break-even point d) Net present value e) Internal rate of return

c) Break-even point

Probably the first thing to do when conducting an interview is: a) Turn on your tape recorder b) Get started by asking the first question on your list c) Build rapport with the interviewee so he or she trusts you d) Ask a close ended question e) Ask a probing question

c) Build rapport with the interviewee so he or she trusts you

Which would NOT likely be an attribute of an entity called "Student"? a) Age b) Student identification number c) Class room number d) Home phone e) Gender

c) Class room number

When an analyst is looking for specific, precise information they would probably choose this type of question: a) Probing b) Open Ended c) Close ended d) Observation e) Questionnaires

c) Close ended

When gathering requirements from processing clerks and lower level managers about 'how' a system works, the best approach might be: _____. a) JAD session b) Document analysis c) Closed ended interview questions d) Probing interview questions e) Root cause analysis

c) Closed ended interview questions

Which of the following will probably NOT be at a system walkthrough? a) User representatives b) Management representatives c) Computer Center director d) Key decision makers e) Analyst who prepared the system proposal

c) Computer Center director

Chang is working on "How will this system work". What SDLC phase is he in? a) Planning b) Analysis c) Design d) Implementation e) Transition

c) Design

Entity Relationship Diagrams show relationships between entities that are _____. a) Outputs from JAD sessions b) Consistent with the ACM guidelines c) In line with the business rules and processing d) Defined by the project sponsor e) Extensions of the process models

c) In line with the business rules and processing

Which of the following methodologies might be most appropriate if you have a system project with: somewhat unclear requirements; somewhat unfamiliar technologies; that is complex; reasonably reliable; a short time schedule and high schedule visibility? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

c) Iterative

Which of the following might result in version 1; version 2 (etc.) of a system? a) System Prototyping b) Waterfall Development c) Iterative Development d) System Prototyping e) Parallel Development

c) Iterative Development

If the skills required by a project cannot be met by the available project team, which would probably NOT be a reasonable solution? a) Use a consultant b) Use a contract employee c) Modify the project to use skills inherent on the project team d) Train the project team (or some of the team) on the skills needed e) Mentor a team member (like sending a person to work on a similar project to acquire the necessary skills)

c) Modify the project to use skills inherent on the project team

An interview report is prepared in which step of the interview process? a) Conducting the interview b) Designing interview questions c) Post interview following-up d) Preparing for the interview e) Selecting an interviewee

c) Post interview following-up

Danielle has asked some closed ended questions to start an interview; then some open ended questions. Now she wants to really wants to get a greater depth of information about the process. She would probably use _________ questions. a) More closed ended b) More open ended c) Probing d) Structured e) Boxing structure

c) Probing

When an analyst is seeking more information from a response to questions they would probably use: a) Open Ended questions b) Close ended questions c) Probing questions d) All of these

c) Probing questions

An example of a nonfunctional requirement is ____________ a) Supplier table is available b) The system must contain customer order history for three years c) System can be used in any of 100 offices worldwide d) SQL queries from customer table and order table are available e) Customer zipcode is formatted as character data

c) System can be used in any of 100 offices worldwide

The outcome of the design phase is the: a) Feasibility Analysis document b) System proposal document c) System specification document d) System request document e) Business Process document

c) System specification document

Because the cost can be immense, _________ is one of the most critical steps in implementation. a) Documentation b) Coding c) Testing d) Developing a conversion strategy e) Training

c) Testing

Andrew, an analyst for PaxMedia Inc., has just learned that the business rules for a system he has been working on have changed. This means that _____. a) Nothing - once the ERD data models have been drawn, they are 'frozen' for the system b) Andrew will be reassigned to a different project that is in its beginning stages c) The ERD components will have to be changed d) The ERD data model will have to be put on hold while new DFD diagrams are created e) The project will have to be scrapped and restarted

c) The ERD components will have to be changed

The main difference between the Parallel Development Methodology and the Iterative Development Methodology is that: a) The Parallel Development Methodology will have various releases (like version 1.0; 2.0, etc.) and the Iterative will not b) The Iterative Methodology will break the system project into sub-projects for analysis, design and implementation and then merge them into a final system and the Parallel will not c) The Parallel Methodology will have sub-projects and the Iterative Methodology will have various releases d) The Parallel Methodology will create various models or prototypes with user involvement before setting on design concepts and the Iterative will not e) The Iterative Methodology will create various models or prototypes with user involvement before setting on design concepts and the Parallel Methodology will not

c) The Parallel Methodology will have sub-projects and the Iterative Methodology will have various releases

One difference between the reports from interviews and from a JAD session is that: a) It describes information from the interview or JAD session b) The interview report will give a complete project management timeline; while the JAD session report will not c) The interview report is generally written within 48 hours of the interview; while the JAD session report may take a week or two after the JAD session. d) The JAD report will include results from questionnaires while the interview report will not e) JAD reports will include technology analysis while interviews will only include root cause analysis

c) The interview report is generally written within 48 hours of the interview; while the JAD session report may take a week or two after the JAD session.

The science (or art) of project management is in making ___________ of size, time and cost. a) Benchmark comparisons b) Analytical and educated estimates c) Trade-offs d) Maximum calculations e) Minimum calculations

c) Trade-offs

The first step to building an Entity Relationship Diagram is to _____ a) Identify data flows from the level 0 DFD diagram b) draw the relationships between the entities c) identify the attributes for each entity d) identify the entities e) identify the processes, data flows and data stores

d) identify the entities

Independent entities are: a) When a child requires attributes from the parent b) When there is only one entity for a data process model c) When an entity can exist without the help of another entity d) Where the entity identifier is also the primary key e) When an entity comes from an external source (aka 'external entity')

c) When an entity can exist without the help of another entity

A(n) _____ entity is an entity at the "1" end of a relationship or an entity with an identifier that describes only the entity. a) dependent b) incomplete c) independent d) intersection e) non-identifying

c) independent

The lines that connect the entities are referred to as? a) Data flows b) connectors c) relationships d) crow's feet e) foreign key

c) relationships

When the analyst is evaluating a data model to ensure that all fields in a record depend fully on the entire primary key, which step of normalization is being performed? a) base normal form b) first normal form c) second normal form d) third normal form e) cannot tell from this information

c) second normal form

How many advantages are client-server based architectures known for? a. 2 b. 3 c. 4 d. 5 e. 7

c. 4

_______ repository entries are updated to reflect specific technology decisions as they are made. a. DFD b. Sequential c. CASE d. Hardware e. None of these

c. CASE

Systems Integration refers to: a. The process of synching all computers to the mainframe b. The delivery of systems to the final destination office c. Combining packaged software, the legacy system and new software d. Adding the original hard drives to a newer system e. Creating a new software to monitor power consumption

c. Combining packaged software, the legacy system and new software

Which of the following is normally NOT done in the design phase of the SDLC? a. Decisions for hardware and software purchases are made b. User interactions are planned out (inputs, outputs, user interfaces) c. Cost / Benefits of the new system are carefully calculated d. Logical DFDs and ERDs are converted into physical DFDs and ERDs e. The physical data model is created

c. Cost / Benefits of the new system are carefully calculated

System design is the determination of the overall system architecture-consisting of a set of physical processing components, _______________, and the communication among them-that will satisfy the system's essential requirements. a. Workmanship b. Order entry methods, HR feedback c. Hardware, Software, People d. Engineering data plans, fiber optic specifications e. None of these

c. Hardware, Software, People

If on a limited time budget, the best way to be sure you remain efficient and effective in designing a system is to utilize the ____________. a. Porters 5 Forces Model b. Outsourcing Model c. RAD and Timeboxing Techniques d. Hire/Fire Motivational Theory e. Not Attempt the Project

c. RAD and Timeboxing Techniques

Requests for Proposals (RFPs) serve what purpose? a. Integrate systems with one another b. Create synergy amongst staff members c. Solicit information from providers d. Engage mobile computers with mainframe technology e. Develop morale amongst managers

c. Solicit information from providers

Project teams often _________ the ________ associated with creating secure, efficient client-server applications. a. Overestimate; Difficulty b. Overestimate; Simplicity c. Underestimate; Difficulty d. Underestimate; Simplicity e. None of these

c. Underestimate; Difficulty

A(n) _____ entity cannot exist without the presence of another entity and is normally on the "many" end of a relationship or has an identifier that is based on another entity's attribute. a. independent b. incomplete c. dependent d. variable e. non-complying

c. dependent

Extreme Programming (XP) is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

d) A method for stressing customer satisfaction

Wayne is a senior director of finance. His company only recently came under Sarbanes-Oxley regulations and is the project sponsor to become compliant. He realizes that examining the as-is system may not be much help as the regulations are so radical that a major analysis and design project must be completed to make the company compliant. He is leaning towards: ______________ a) Business Process Automation b) Business Process Improvement c) Business Process Internalization d) Business Process Reengineering e) Business Process Renovation

d) Business Process Reengineering

Paul is interviewing Ming. He first explains why he is there and what he wants to accomplish in the interview. This would be done in which step of the interview process? a) Selecting interviewees b) Designing interview questions c) Preparing for the interview d) Conducting the interview e) Post-interview follow-up

d) Conducting the interview

Extreme programming requires a great deal of discipline and it is recommended for: a) Large development teams b) Mission critical applications c) Large systems d) Considerable onsite user involvement e) All of these

d) Considerable onsite user involvement

Which is NOT a purpose of the requirements definition? a) To give a very high-level explanation of the business requirements b) A more precise list of requirements that can be used as inputs to the rest of analysis c) Create functional requirements d) Create cost/benefit analysis e) Create non-functional requirements

d) Create cost/benefit analysis

Michael, a systems analyst, is preparing a closed wiki site for Northstate Bank. He has written permission from eight other companies to view their internal wiki sites, and also has approval from his manager and the project team to use these other sites for ideas and structure. This would be a form of: a) Business Process Automation b) Business Process Improvement c) Informal Benchmarking d) Formal Benchmarking e) Technology Analysis

d) Formal Benchmarking

Hamid has selected one middle manager from each department that will be affected by the updated system and one lower-level manager from each department, along with a few senior staff as well as the project sponsor for a JAD session. He is trying to: _________ a) Balance the work load for departments so the regular day-to-day functions can still continue while the JAD team is off-site b) Create a new hybrid department that will beta test the final system c) Prevent domination by only a few individuals in the JAD session d) Have a broad mix of organizational levels in the JAD session e) Reduce the time necessary for the length of JAD session meetings

d) Have a broad mix of organizational levels in the JAD session

Which phase is generally the longest and most expensive part of the development process? a) Planning b) Analysis c) Design d) Implementation e) Feasibility

d) Implementation

Linda is a clerk in the accounting department. She was interviewed by David and is excited about the proposed system that will utilize electronic funds transfer. This would be an example of ______. a) Tangible benefit b) Cash flow c) Break even analysis d) Intangible benefit e) Return on investment

d) Intangible benefit

Rocky is dealing one-on-one with users and business managers (including some that have little experience with technology). He is demonstrating what system analyst skill? a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

d) Interpersonal

An entity: a) Is the association between two related processes b) Has cardinality (1:1, 1:N, or M:N) c) Shows if it can be null or no null d) Is a person, place or thing e) Is described with a verb phrase

d) Is a person, place or thing

An entity relationship diagram (ERD): a) Is a use-case diagram enhanced graphically to show data and process modeling b) Is a high-level CASE diagram of data modeling used in business systems c) Is an illustration of external data flows to and from a business systems d) Is a picture that shows the information that is created, stored and used by a business system e) Is a graphical display of the processes in a business system

d) Is a picture that shows the information that is created, stored and used by a business system

What is true about creating an entity relationship diagram? a) There will be at most seven entities b) There will be at most seven relationships c) If you identify more than seven entities, analyze and combine until you have seven or less d) It is an iterative process e) Entities will have at most seven attributes

d) It is an iterative process

What type of process is creating an ERD? a) Well defined process b) Sequential process c) Process defined by five steps d) Iterative process e) User defined process

d) Iterative process

Anthony is working on the cardinality of doctors and patients in a large urban hospital. With the large number of doctors with varying specialties and patients that may have more than one aliment, he thinks the relationship might be noted as: a) 1 to 1 b) 1 to 2 c) 1 to many d) Many to many e) Many to 1

d) Many to many

Robert is doing an economic analysis using today's dollar values. He is doing: a) Cash flow analysis b) Return on investment analysis c) Break-even point analysis d) Net present value analysis e) Internal rate of return analysis

d) Net present value analysis

What information-gathering strategy enables the analyst to see the reality of the situation rather than listen to others describe it? a) Document analysis b) Interviewing c) Joint application design (JAD) sessions d) Observation e) Questionnaires

d) Observation

Which is NOT suggested for IT development projects? a) Projects need to be prioritized b) Projects need to be carefully selected c) Projects need to be carefully managed d) Projects need to give a positive return on investment within four years e) Projects need to give value to the business

d) Projects need to give a positive return on investment within four years

A technique where a set of written (or online) questions are distributed to people (frequently to a large number of people) is: _____. a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

d) Questionnaires / surveys

The three major parts of an ERD diagram are: a) Process, data flow, data store b) Attribute, modularity, cardinality c) Relationship, data flow, entity d) Relationship, attribute, entity e) Process, entity and relationship

d) Relationship, attribute, entity

The most common reason for schedule and cost overruns is ___________ a) Team conflict b) Lack of communication from project manager to project team c) Lack of support by sponsor and champion d) Scope creep e) Adding people to a late project

d) Scope creep

A critical success factor in project management is to: a) Say "no" to all requests as they add to 'scope creep' b) Use throwaway prototyping c) Use a CASE tool to delineate requirements from work tasks d) Start with a realistic assessment of the work that needs to be done e) Hire an outside project management consulting group

d) Start with a realistic assessment of the work that needs to be done

The outcome of the planning phase is the: a) Test plan b) System proposal document c) System specification document d) System request document e) Business Process document

d) System request document

Interpersonal skills for a project manager might be important when: a) Making assignments for a project b) Creating a cost/benefit spreadsheet c) Creating the system proposal d) Working with a highly controversial project that may have political implications e) Using the V-model variation of the Waterfall Methodology.

d) Working with a highly controversial project that may have political implications

What the MAIN difference between systems prototyping and throwaway prototyping? a) Systems prototyping involves users while throwaway prototyping does not b) Throwaway prototyping involves users while systems prototyping does not c) Systems prototyping is a rapid application development methodology; while throwaway prototyping is not d) Systems prototyping works with users to quickly develop a simplified working version of the proposed system; while throwaway prototyping focuses more on exploring design alternatives e) Throwaway prototyping develops systems that will be use as 'stop-gap' systems - and generally for less than six months; while systems prototyping results in systems that will be used extensively for several years.

d) Systems prototyping works with users to quickly develop a simplified working version of the proposed system; while throwaway prototyping focuses more on exploring design alternatives

The V-model pays more explicit attention to ___________: a) Iteration b) Return on investment (ROI) c) Business Value (the "V") d) Testing e) Prototyping

d) Testing

A team of developers and customers are in close communication, with frequent communications, simplicity, feedback and courage. This would best describe: a) The parallel development methodology b) The waterfall development methodology c) The iterative development methodology d) The Extreme Programming methodology e) The throwaway prototyping methodology

d) The Extreme Programming methodology

In the interview report, what will probably NOT be included? a) Summary of what the interviewee said b) Interview's name; interviewee's name c) Details from crucial areas of the interview relating to the project at hand d) The actual questions that were asked as a permanent record e) Any materials, documents, etc. that the interviewee gave you relevant to the project at hand

d) The actual questions that were asked as a permanent record

Which of the following would BEST describe "system complexity"? a) The aspect of using technologies that analysts and developers are familiar with b) The aspect of what the business side really wants the system to do c) The aspect of how quickly the system can be developed and implemented d) The aspect of how intricate and difficult the system must be e) The aspect of how accurate the system must be (such as medical equipment or for games)

d) The aspect of how intricate and difficult the system must be

Kumar is the project manager for a revised TTP system. Which of the following most likely would NOT be considered in developing a work plan? a) Identifying tasks that need to be completed b) Estimating the time that will be needed on tasks c) Creating a dependency chart d) The organizational readiness for the project e) Key milestones that need to be met

d) The organizational readiness for the project

In adding attributes to an ERD, which of the following might NOT be a good resource for attributes? a) From the CASE tool b) Data flows from DFD's c) Requirements documents d) The system proposal document e) Through interviews (what users need for reports and processing)

d) The system proposal document

Garrett has been told by management that his project MUST be completed on time. His best estimates are more than two weeks after the absolute deadline. Which technique could he use to get a functional system on time? a) Risk management b) System prototyping c) Benchmarking d) Timeboxing e) Activity elimination

d) Timeboxing

Rapid Application Development is a collection of methodologies that include all of the following except: a) Iterative Development b) System Prototyping c) Throwaway Prototyping d) V-model Methodology

d) V-model Methodology

An ERD is a picture which shows the information that is ________ by a business system? a) created b) stored c) used d) all of these

d) all of these

A logical data model that does not lead to repeating fields and that the data models leads to tables containing fields that are dependent on the whole identifier is in _____ normal form. a) balanced b) first c) primary d) second e) third

d) second

If the logical data model contains attribute values that depend on an attribute that is not the identifier, then it is in _____. a) base normal form b) first normal form c) non-normal form d) second normal form e) third normal form

d) second normal form

Software systems can be divided into how many basic functions? a. 1 b. 2 c. 3 d. 4 e. 5

d. 4

Form(s) of network connection(s) in a system include: a. ATM b. T2 c. DSL d. ATM and DSL e. T2 and DSL

d. ATM and DSL

What makes systems integration so difficult? a. Finding the original data to install on the new server b. Creating a ghost drive to house the old information c. Installing new software packages on older machines d. Bringing legacy system data and new data together e. None of these

d. Bringing legacy system data and new data together

In terms of project management, which option might require excellent project management skills and a proven methodology? a. Outsourcing to Nebraska b. Outsourcing to India c. Buying a packaged solution d. Doing custom development e. Buying an ERP system

d. Doing custom development

The current generation of system users expect a(n)_________ to access the system. a. GUI b. Web-based interface c. ERP d. GUI or Web-based interface e. None of these

d. GUI or Web-based interface

The scalability associated with Client-Server systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

d. High

Application service providers might be best associated with: a. In-house development b. Packaged software c. Unique and strategic systems d. Outsourcing e. Internet Service Providers

d. Outsourcing

If (a) the business need is common; (b) the skills needed are not strategic; (c) the time frame is short; it might be best to: a. Use in-house / custom development b. Hire a vendor to write the code for you c. Outsource to India d. Purchase a software package e. Hire a consultant

d. Purchase a software package

The system inputs and outputs will be designed along with a plan or__________ of the way the system's features will be navigated. a. Blueprint b. Compass c. Instructional Guide d. Roadmap e. FAQ

d. Roadmap

Operational requirements of a system include all of the following, except: a. System Integration b. Technical Environment c. Portability d. Scalability e. Maintainability

d. Scalability

Which is probably true about packaged software a. In most cases, the software is a perfect fit for the companies need b. Packaged software works best where the company has a unique need c. The time frame is flexible to long d. The business need is common e. The project has a highly skills project manager who has been with the company for many years and has an excellent relationship with both business users and the IT development staff

d. The business need is common

Outsourcing is used when: a. The project has a project manager who can coordinate vendor efforts b. There is a desire to build in-house skills c. In-house functional and technical skills exist d. The business need is not core to the business e. None of these

d. The business need is not core to the business

An n-tiered architecture is distinguished by: a. The number of drives installed b. The number of logics on the local server c. The number of terminals on the network d. The number of specialized server computers e. None of these

d. The number of specialized server computers

Packaged systems are used when: a. The business need is not core to the business b. There is a desire to build in-house skills c. The time frame is flexible d. The project has a project manager who can coordinate vendor efforts e. The decision to outsource is strategic

d. The project has a project manager who can coordinate vendor efforts

Server-based architecture is: a. When the clients capture keystrokes b. The very first architecture system c. Outdated and never used d. When the clients capture keystrokes and the very first architecture system e. When the clients capture keystrokes, the very first architecture system and outdated and never used

d. When the clients capture keystrokes and the very first architecture system

A data model is a: a) The mathematical model of formulas and logic used in a system b) The abstract creating of an ideal system transformation c) The model that is produced by extreme programming d) The expanded, thoroughly balanced and normalized use case for a system e) A formal way of representing the data that are used and created by a business system

e) A formal way of representing the data that are used and created by a business system

One of the major differences between a JAD session and an interview is: a) Selecting participants b) Figuring out what is to be done c) Preparing for the session d) Writing up results and a report e) All JAD sessions are structured and must be carefully planned

e) All JAD sessions are structured and must be carefully planned

Extreme programming emphasizes: a) Customer satisfaction b) teamwork c) Communication as a core value d) Simplicity as a core value e) All of these

e) All of these

Practical tips states that interpersonal skills are important, they include: a) Paying attention b) Being honest c) Ability to summarize key points d) Be happy e) All of these

e) All of these

Balance occurs between DFDs and ERDs when the data stores _____ a) Are uniquely named b) Have only one input and one output flow c) Are named the same as the relationships on the ERD d) Can be compared to ERD data flows and attributes on the ERD are included in data stores on the DFD e) Can be equated to entities on the ERD and when entities are referred to by data stores on the DFD

e) Can be equated to entities on the ERD and when entities are referred to by data stores on the DFD

Which would likely be an entity on a car insurance ERD? a) date b) Gender c) company d) fire district e) Car

e) Car

Which of the following project roles would probably make a presentation about the objectives of a proposed project and its benefits to executives who will benefit directly from the project? a) Requirements Analyst b) Systems Analyst c) Project Manager d) Champion e) Chief Information Officer (CIO)

e) Chief Information Officer (CIO)

In creating ERD's, which would most likely NOT be a source for entities? a) Use cases b) Level 0 DFD diagrams c) External entities d) Data flows e) Cost / benefit reports

e) Cost / benefit reports

On an ERD _________________: a) Processes are listed alphabetically with relationship connections drawn between processes b) Data elements are listed alphabetically with a cross listing to the processes that manipulate them c) Data elements are described as singular (1:1); plurals (1:N); or didactic (M:N) d) Data elements are grouped in a hierarchical structure that is uniquely identified by number e) Data elements are listed together and place inside boxes called entities.

e) Data elements are listed together and place inside boxes called entities.

The authors suggest that an analyst is 'very much like a ____________' and business users are like elusive suspects. a) Police professional b) Politician c) Forensic scientist d) Air traffic controller e) Detective

e) Detective

The type of skill that is common to systems analysts to deal fairly and honestly with other project team members is: a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

e) Ethical

Which of the following methodologies might be most appropriate if you have a system project with: unclear requirements; very familiar technologies; not all that complex; reasonably reliable; a short time schedule and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Extreme Programming

e) Extreme Programming

Myles is studying a system to lessen the number of complaints about the Help Desk. He has formally studied the service counter at Wal-Mart, Target and Kohl's department stores; as well as listened in to complaint phone calls to a hotel booking site. He is trying to see how other organizations work at lessening complaints and also how they handle complaints. This would be what type of analysis? a) Complaint processing b) Design analysis c) Problem analysis d) Outcome analysis e) Informal benchmarking

e) Informal benchmarking

Which is NOT true about using Visible Analyst Workbench? a) It can be used with many different databases b) It integrates the data model with other parts of the project c) It is a full-service CASE tool d) Data modeling is one of many capabilities e) It can generate Java code when the data modeling is done

e) It can generate Java code when the data modeling is done

A technique where the analyst watches how people perform their activities is _______ a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

e) Observation

Which of the following is NOT a classic planning mistake? a) Overly optimistic schedule b) Failing to monitor the schedule c) Failing to update the schedule d) Adding people to a late project e) Omitting key requirements

e) Omitting key requirements

Rafael, Fraud Unit Manager, has just received an interview report from Stefano, a systems analyst. Rafael was interviewed by Stefano, and was asked to make corrections and clarifications to the interview report. In what interview phase would this occur? a) Selecting interviewees b) Designing interview questions c) Preparing for the interview d) Conducting the interview e) Post-interview follow-up

e) Post-interview follow-up

Which of the following project roles would serve as a primary point of contact for a project? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

e) Project manager

Blaine is using a requirements gathering technique that begins with non-threatening questions, avoids abbreviations, groups items into logically coherent sections, and might best be used with outside users. He probably is using: a) Document analysis b) Interview c) JAD session d) Observation e) Questionnaires

e) Questionnaires

Marta wants to collect facts and opinions from a wide range of geographically dispersed people quickly and with the least expense. She would probably want to use: a) Document analysis b) Interview c) JAD session d) Observation e) Questionnaires

e) Questionnaires

RAD is an acronym for: a) Real Application Development b) Rapid Application Design c) Rapid Authentic Development d) Real Autonomous Development e) Rapid Application Development

e) Rapid Application Development

Which of the following project roles would focus on stakeholder requirements? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Requirements analyst

e) Requirements analyst

Which is NOT an attribute of a systems analyst? a) Understanding what to change b) Knowing how to change it c) Convincing others of the need to change d) Serving as a change agent e) Selecting which projects to approve

e) Selecting which projects to approve

Agile development is a group of programming-centric methodologies that focus on: a) Making assignments for a project b) Creating a cost/benefit spreadsheet c) Creating the system proposal d) Working with a highly controversial project that may have political implications e) Streamlining the SDLC

e) Streamlining the SDLC

According to the authors, in moving "from here to there", an analyst needs: a) An understanding of corporate politics b) Knowledge on how to stop scope creep c) Joint Application Development facilitating skills d) Microsoft Project Management software skills e) Strong critical thinking skills

e) Strong critical thinking skills

Which is generally NOT true of non-functional requirements? a) Cultural differences can be considered b) Color interpretations on screens and forms may be different in different geographical places c) Multi-lingual interfaces many be needed d) Systems may need to adapt from global solutions to local realities e) Systems may need to have actual expenses from global operations

e) Systems may need to have actual expenses from global operations

Which of the following would BEST describe "system reliability"? a) The aspect of using technologies that analysts and developers are familiar with b) The aspect of what the business side really wants the system to do c) The aspect of how quickly the system can be developed and implemented d) The aspect of how complex the system must be e) The aspect of how accurate the system must be (such as medical equipment or for games)

e) The aspect of how accurate the system must be (such as medical equipment or for games)

Which would generally NOT be taken into consideration for project portfolio management in an organization? a) The number of large projects b) The number of tactical projects c) The number of high risk projects d) The number of strategic projects e) The number of financially feasible projects

e) The number of financially feasible projects

Which is NOT true for systems analysts? a) They create value for an organization b) They enable the organization to perform work better c) They do things and challenge the current way that an organization works d) They play a key role in information systems development projects e) They are the project sponsors for system proposals

e) They are the project sponsors for system proposals

Which of the following is true about a JAD facilitator? a) They can participate in the discussion to settle a disagreement b) They keep track of all discussions by entering information into the computer c) They allow sidebar discussions and unstructured activities d) They recognize that some people know more about the system and proposed system and will dominate the discussion and know that is a positive thing e) They set the meeting agenda

e) They set the meeting agenda

Which of the following methodologies might be most appropriate if you have a system project with: unclear user requirements; unfamiliar technologies; somewhat complex; needs to be reliable; time is not an issue and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

e) Throwaway prototyping

Which of the following methodologies might be most appropriate if you have a system project with: unclear user requirements; unfamiliar technologies; very complex; must be reliable; a short to medium time schedule and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

e) Throwaway prototyping

Which is NOT a requirements analysis strategy? a) Understanding of the as-is system b) Identifying improvements c) Developing requirements for the to-be system d) Root cause analysis e) Understanding of screen design, layout and navigation

e) Understanding of screen design, layout and navigation

Which of the following methodologies might be most appropriate if you have a system project with: clear requirements; very familiar technologies; not all that complex; must be reliable; a somewhat longer schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) V-model

e) V-model

The line between analysis and design is sometimes very blurry. One reason is that _____: a) Object-oriented methods are generally fuzzier as compared to waterfall methods b) there is inadequate funding for the analysis phase to do a complete analysis c) analysts are generally rushed to complete the system proposal d) scope creep has occurred e) the deliverables are really the first step in the design of the new system

e) the deliverables are really the first step in the design of the new system

Mobile application architectures are where the: a. Client devise is responsible for presentation logic b. Client devise is responsible for application logic c. The server is responsible for data access logic d. The server stores the data e. All of these

e. All of these

Which of the following is an advantage of client-server architectures? a. They are scalable b. They can support different types of systems c. It is easy to separate different logic functions d. Reliability e. All of these

e. All of these

The primary hardware components of a system consist of: a. Client Computers b. Servers c. Network d. Client Computers and Servers e. Client Computers, Servers and Network

e. Client Computers, Servers and Network

Designing an architecture can be_______________. a. Tedious and therefore younger members of the team are usually urged to take the lead. b. Easy and therefore more experienced members of the department take the lead. c. Difficult and therefore outside consultants are often sourced to do the task. d. Difficult and therefore experienced internal members are sourced to the task e. Difficult and therefore outside consultants are often sourced to do the task and difficult and therefore experienced internal members are sourced to the task

e. Difficult and therefore outside consultants are often sourced to do the task and difficult and therefore experienced internal members are sourced to the task

What is/are the disadvantage(s) associated with n-tiered architecture? a. Great load on the network b. When the clients capture keystrokes and the very first architecture system c. They are always slower d. When the clients capture keystrokes and the very first architecture system and they are always slower e. Great load on the network and when the clients capture keystrokes and the very first architecture system

e. Great load on the network and when the clients capture keystrokes and the very first architecture system

The major architectural components of any system are the___________. a. IT Department b. Hardware c. Software d. IT Department and Hardware e. Hardware and Software

e. Hardware and Software

Where are the decisions stored that are made regarding the hardware and software that will be purchased to support the new system? a. Order Manifest b. Hardware Sales Receipt c. Suppliers' Computer System d. President's Office e. Hardware and Software Specification

e. Hardware and Software Specification

Servers can take on what "flavors"? a. Mainframes b. Minicomputers c. Microcomputers d. Mainframes and Minicomputers e. Mainframes, Minicomputers and Microcomputers

e. Mainframes, Minicomputers and Microcomputers

The cost of infrastructure associated with Server-Based systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

e. Very High


संबंधित स्टडी सेट्स

Les Pays Francophones et Leurs Capitales

View Set

Basic Principles of Pharmacology and Therapeutics

View Set

Chapter 5 Developmental Psychology

View Set