Systems Analysis and Design
The UML notation ____ identifies a zero or many relation. a)1..* b)0..0 c)0..1 d)0..*
0..*
___ describes the amount of data that a system can transfer in a fixed time period. a)Latency b)Dimensionality c)Bandwidth d)Resolution
Bandwidth
In addition to centralized data processing, the earliest systems performed all data input and output at a central location, often called a _____. a)portal b)data processing center c)thin client d)web-centric hub
Data processing center
A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.
False
As enterprise-wide information systems grow more complex, configuration management becomes trivial. T/F
False
Bandwidth requirements are expressed in bytes per minute. T/F
False
__ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action. a)Benchmark testing b)Fault management c)Responsive testing d)Throughput management
Fault management
__ translates the logical design of an information system into a physical structure that includes hardware, software, network support, and processing methods. a)Multipath design b)Legacy data c)System file checker d)System architecture
System architecture
_____ are the benefits that can be measured in dollars. a)Intangible benefits b)Agile benefits c)Ethical benefits d)Tangible benefits
Tangible benefits
A _____ locates all or most of the processing logic on the server. a)batch client b)topological client c)portal client d)thin client
Thin client
Retention periods of backups can be a specific number of months or years, depending on legal requirements and company policy. T/F
True
System requirements serve as benchmarks to measure the overall acceptability of a finished system.
True
The cloud computing concept envisions a cloud of remote computers that provide a total online software and data environment that is hosted by third parties. T/F
True
The post-implementation evaluation of a system verifies that the new system meets specified requirements, complies with user objectives, and produces the anticipated benefits. T/F
True
____ is a widely used method of visualizing and documenting an information system. a)UML b)DFD c)UNIX d)Java
UML
A table design that contains a repeating group is called _____. a)normalized b)unsynchronized c)synchronized d)unnormalized
Unnormalized
The UML represents an object as a(n) ____ with the object name at the top, followed by the object's attributes and methods. a)circle b)oval c)rectangle d)triangle
rectangle
A(n) _____ does not distract a user and calls no attention to itself. a)opaque interface b)transparent interface c)translucent interface d)pellucid interface
transparent interface
In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values. a)valence b)pool c)domain d)type
type
A form of wireless transmission called _____ is very popular for short-distance wireless communication that does not require high power. a)Microsoft Visio b)multipath design c)Wi_MAX d)Bluetooth
Bluetooth
A subscription model charges a variable fee based on the volume of transactions or operations performed by the application. T/F
False
A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved. T/F
False
A web-based data design requires users to have powerful workstations. T/F
False
An interface designer does not need to understand the underlying business functions or how the system supports individual, departmental, or enterprise goals. T/F
False
Commercial software packages must undergo unit and integration testing similar to that of in-house developed systems, although system testing usually is not performed. T/F
False
Context-sensitive help displays information about any task when the user requests it. T/F
False
Data stores are shown in a context diagram because data stores are external to the system. T/F
False
Even if a user's Internet connection becomes unavailable, the user will still be able to access certain cloud-based services. T/F
False
In a data flow diagram (DFD), a process symbol can have only one outgoing data flow. T/F
False
In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships. T/F
False
In a public key encryption environment, each user on the network has a pair of keys: a foreign key and a private key. T/F
False
In an information system, data is information that has been transformed into output that is valuable to users. T/F
False
_____ describes the relationship between computers and the people who use them to perform their jobs. a)Human-computer interaction (HCI) b)Peripheral connect (PC) c)Peripheral component interconnect (PCI) d)Media control interaction (MCI)
Human-computer interaction (HCI)
____ requires that a software supplier document all testing and maintain records of test results. a)Center for the Application of Information Technologies (CAIT) b)International Organization for Standardization (ISO) c)Open Database Connectivity (ODBC) d)Software Engineering Institute (SEI)
International Organization for Standardization (ISO)
Many companies had an installed base of data, called _____, which was difficult to access and transport to a client/server environment. a)legacy data b)primary data c)advanced data d)qualitative data
Legacy data
__ costs include expenses for items such as supplies, equipment rental, and software leases. a)Maintenance b)Adaptive c)Operational d)Corrective
Operational
_____ means that a proposed system will be used effectively after it has been developed. a)Schedule feasibility b)Operational feasibility c)Economic feasibility d)Technical feasibility
Operational feasibility
_____ protects privacy rights and shields an organization's proprietary data from theft or unauthorized access. a)Output security b)Ergonomics c)Aesthetics d)Interface technology
Output security
The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph. a)Scatter chart b)Gantt chart c)Pareto chart d)XY chart
Pareto chart
A main advantage of enterprise resource planning (ERP) is that it describes a _____ that ensures connectivity and easy integration of future systems, including in-house software and commercial packages. a)data frame b)hub c)bandwidth d)platform
Platform
With a _____, users provide an example of the data requested. a)query by example language b)data frame c)data table d)query language
Query by example language
One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems. a)candidate integrity b)referential integrity c)combinatorial integrity d)foreign integrity
Referential integrity
_____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project. a)Payback analysis b)Net Present Value (NPV) c)Return on Investment (ROI) d)Acquisition process
Return on Investment (ROI)
__ measures risk likelihood and impact. a)Risk control b)Risk marker c)Risk identification d)Risk assessment
Risk assessment
_ is the measure of a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise. a)Redundancy b)Scalability c)Interoperability d)Transparency
Scalability
_____ means that a project can be implemented in an acceptable time frame. a)Operational feasibility b)Schedule feasibility c)Economic feasibility d)Technical feasibility
Schedule feasibility
The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____. a)cell b)schema c)framework d)viewport
Schema
When developing a training program, which of the following guidelines should be kept in mind? a)Select the most effective place to conduct the training. b)Train people individually. c)Develop a single training program for distinct employee groups. d)Provide only hands-on experience training.
Select the most effective place to conduct the training.
_____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet. a)Consulting as a Consideration b)Process as a Product c)Hardware as a Help d)Software as a Service
Software as a Service
When an individual user works in _____, the workstation performs all the functions of a server by storing, accessing, and processing data as well as providing a user interface. a)mission-critical mode b)safe mode c)stand-alone mode d)quirks mode
Stand-alone mode
Many companies are extending internal enterprise resource planning (ERP) systems to their suppliers and customers, using a concept called _____. a)cloud computing b)stand-alone computing c)supply chain management (SCM) d)behavioral management
Supply chain management(SCM)
At the center of the network is the _____, which manages the network and acts as a communications conduit for all network traffic. a)log b)portal c)scale d)switch
Switch
A typical preliminary investigation report might consist of each of the following except ____. a)Project Roles b)System Development Tools c)Systems Request Summary d)Findings
System Development Tools
___ is the process of putting a new information system online and retiring the old system. a)System changeover b)System integration c)System override d)Online system documentation
System changeover
_____ produces a full-featured, working model of the information system a)Design prototyping b)System prototyping c)Application prototyping d)Throwaway protyping
System prototyping
_____ is a model that asks the traditional fact-finding questions in a systems development context. a)A functional decomposition diagram b)The Zachman Framework for Enterprise Architecture c)A class diagram d)The Unified Modeling Language
The Zachman Framework for Enterprise Architecture
Jerry has inherited an Excel sheet that lists all of the system requirements for his team's new project. But unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly. He needs to take care of this so the requirements can be sorted correctly. Jerry knows that there were supposed to be three performance examples but he finds four in the spreadsheet. Which one of these is mislabeled as a performance example? a)Response time must not exceed for seconds. b)The online inventory control system flag all low-stock items within one hour after the quantity falls below a predetermined minimum. c)The system must automatically generate an insurance claim form. d)The records system must produce key reports within five hours of the end of each fiscal quarter.
The system must automatically generate an insurance claim form.
Which of the following is specified by the detailed procedures in a test plan? a)Who will work with the new system and ensure that all necessary features have been included b)The test data to be used c)How a separate operational and test environment is prepared d)The result of the final test of all programs
The test data to be used
A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service. T/F
True
A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects. T/F
True
A request for quotation (RFQ) is more specific than a request for proposal (RFP). T/F
True
As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support. T/F
True
Compiling a program using a CASE tool or a language compiler detects syntax errors, which are language grammar errors. T/F
True
Creating a standard list of interview questions helps a systems analyst to keep on track and avoid unnecessary tangents.
True
Deciding whether to explode a process further or determine that it is a functional primitive is a matter of experience, judgment, and interaction with programmers who must translate the logical design into code. T/F
True
Every page in a report should include a page header, which appears at the top of the page and includes the column headings that identify the data. T/F
True
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y. T/F
True
In a data flow diagram (DFD), a data flow must have a process symbol on at least one end. T/F
True
In contrast to a centralized system, a client/server design separates applications and data. T/F
True
Internal and external factors affect every business decision that a company makes, and IT systems are no exception.
True
Migrating a traditional database design to the web can require design modification, additional software, and some added expense. T/F
True
Most large companies require systems that combine transaction processing, business support, knowledge management, and user productivity features. T/F
True
Network administration includes hardware and software maintenance, support, and security. T/F
True
Personal observation allows a systems analyst to verify statements made in interviews and determine whether procedures really operate as they are described. T/F
True
The advantage of the application logic layer is that a three-tier design enhances overall performance by reducing the data server's workload. T/F
True
Web-based systems are popular because they offer ease of access, cost-effectiveness, and worldwide connectivity. T/F
True
When a context diagram is expanded into data flow diagram (DFD) diagram 0, all the connections that flow into and out of process 0 must be retained. T/F
True
____ is the process of tracking system releases. a)Source control b)Version control c)Quality control d)Configuration control
Version control
The _____ environment enhances interactive experiences, including wikis and blogs, and social networking applications. a)command-line b)Software as a Service c)outsourcing d)Web 2.0
Web 2.0
Which of the following is true of a web-based systems development environment? a)Internet-based development treats the web only as a communication channel. b)Web-based solutions do not open complex security issues that should be addressed. c)Scalability of web-based systems can be affected by network limitations and constraints. d)Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.
Web-based software treats the software application as a service that is less dependent on desktop computing power and resources.
A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location. a)local area network (LAN) b)storage area network (SAN) c)metropolitan area network (MAN) d)wireless local area network (WLAN)
Wireless local area network (WLAN)
In addition to the Gane and Sarson symbol set, another popular symbol set is _____. a)Mantissa b)Zachman c)Yourdon d)Jira
Yourdon
Many analysts follow _____, which means that they develop a physical model of the current system, a logical model of the current system, a logical model of the new system, and a physical model of the new system. a)the Zachman Framework b)a process description c)the Gane and Sarson symbol d)a four-model approach
a four-model approach
The iteration structure is the completion of _____. a)a specific condition that is repeated until a process changes b)a process step that is repeated until a specific condition changes c)steps in a chronological order, one after another d)one or more process steps based on the results of a test or condition
a process step that is repeated until a specific condition changes
Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called _____. a)acceptance tests b)modular tests c)unit tests d)integrated tests
acceptance tests
As shown in the accompanying figure, once a system becomes stable, maintenance costs usually remain low and involve minor _____ maintenance. a)perfective b)corrective c)adaptive d)preventive
adaptive
One of the disadvantages of _____ methods of system development is that the overall project might be subject to scope change as user requirements change. a)rapid application development b)structured analysis c)agile d)object-oriented analysis
agile
In maintenance management, _____ means examining the whole in order to learn about the individual elements. a)adoption b)elucidation c)synthesis d)analysis
analysis
A class diagram includes the class _____, which describe the characteristics of objects in the class. a)events b)attributes c)methods d)keys
attributes
An object has certain ____, like the make, model, and color of a car. a)indices b)keys c)attributes d)packets
attributes
A _____ is an overview that describes a company's overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction. a)business index b)business matrix c)business profile d)business glossary
business profile
A _____ is a summary of a project request and a specific recommendation. a)routine report b)case for approval c)case for action d)breakdown report
case for action
Inheritance enables a ____ to derive one or more of its attributes from a parent. a)package b)user c)child d)class
child
(n) ____ is a group of similar objects. a)class b)aggregate c)packet d)concatenation
class
In an interview, _____ limit or restrict the response. a)open-ended questions b)close-ended questions c)range-of-response questions d)leading questions
close-ended questions
A _____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve. a)constraint b)key c)query d)trigger
constraint
A(n) _____ is a condition, restriction, or requirement that the system must satisfy. a)index b)milestone c)viewport d)constraint
constraint
In the rapid application development (RAD) model in the accompanying figure, the _____ phase focuses on program and application development tasks similar to the SDLC. a)cutover b)user design c)construction d)requirements planning
construction
A _____ usually causes specific actions, such as printing subtotals for a group of records in a report. a)concatenation character b)subgroup c)character break d)control break
control break
A higher-level module, called a _____, directs lower-level modules. a)library module b)subordinate module c)control module d)data module
control module
In a sequence diagram, a lifeline is identified by a ____ line. a)dashed b)curved c)solid d)red
dashed
A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage. a)process flow diagram b)object model c)data flow diagram d)network model
data flow diagram
A _____ controls database operations, including storing, retrieving, updating, and deleting data. a)data device language b)data query language c)data manipulation language d)data definition language
data manipulation language
A _____ is a central storehouse of information about a system's data. a)data feed b)data repository c)data cube d)data mart
data repository
A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. a)data load rule b)data mining rule c)data requirements rule d)data validation rule
data validation rule
A(n) _____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze data. a)database management system b)integrated development environment c)advanced host controller system d)data logger framework
database management system
A _____ is a graphical representation of the conditions, actions, and rules found in a decision table. a)decision board b)decision tree c)decision element d)decision point
decision tree
Typical process description tools include _____. a)pseudocode b)database tables c)context diagrams d)decision trees
decision trees
When a project manager first recognizes that a project is in trouble, one of the options available to the manager includes _____. a)eliminating controls and procedures b)delaying the project deadline c)expanding the project requirements d)reducing the project resources
delaying the project deadline
In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. a)design prototyping b)command prototyping c)system prototyping d)layout prototyping
design prototyping
In a typical company organizational model, top managers ____. a)include users who rely on TP systems to enter and receive the data they need to perform their jobs b)develop long-range plans, called strategic plans, which define the company's overall mission and goals c)provide direction, necessary resources, and performance feedback to supervisors and team leaders d)oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people
develop long-range plans, called strategic plans, which define the company's overall mission and goals
Corrective maintenance _____. a)diagnoses and corrects errors in an operational system b)competes for resources in an operational system c)adds enhancements to an operational system and makes the system easier to use d)involves changing an operational system to make it more efficient, reliable, or maintainable
diagnoses and corrects errors in an operational system
If variable input data is needed, a _____ must be provided to explain what is needed. a) toggle button b) menu bar c) list box d) dialog box
dialog box
As the accompanying figure illustrates, the _____ approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational. a)direct cutover b)parallel operation c)phased operation d)pilot operation
direct cutover
Of the measures of feasibility, _____ assesses tangible and intangible benefits to a company in addition to costs. a)economic feasibility b)technical feasibility c)schedule feasibility d)operational feasibility
economic feasibility
The process of concentrating on what is said in an interview and noticing any nonverbal communication that takes place is called _____. a)fact-finding b)brainstorming c)ampling d)engaged listening
engaged listening
A(n) _____ is a graphical model of an information system that depicts the logical relationships and interaction among system entities. a)entity-relationship diagram (ERD) b)illustration flow chart c)data chart d)query relationship diagram (QRD)
entity-relationship diagram (ERD)
A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings. a)fixed fee model b)subscription model c)evaluation model d)usage model
evaluation model
A(n) _____ is a data validation rule that is used for applying to mandatory data items. a) asynchronic check b)existence check c)sequence check d)range check
existence check
A(n) _____ is an attack that takes advantage of a vulnerability. a)proxy b)archive c)exploit d)firewall
exploit
The objective of _____ is to gather data about project usability, costs, benefits, and schedules. a)project execution b)fact-finding c)project maintenance d)mediation
fact-finding
In a data dictionary, a(n) _____ is the smallest piece of data that has meaning within an information system. a)pixel b)field c)record d)index
field
A popular technique for investigating causes and effects is called a _____ diagram. a)fishbone b)jawbone c)crossbone d)causebone
fishbone
The _____ is a top-down representation of a process. a)Unified Modeling Language (UML) b)functional decomposition diagram (FDD) c)total cost of ownership (TCO) d)Rapid Economic Justification (REJ)
functional decomposition diagram (FDD)
The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered. a)weak hand, weak hold (WHWH) b)good input, bad output (GIBO) c) poor start, poor finish 9PSPF) d)garbage in, garbage out (GIGO)
garbage in, garbage out (GIGO)
Apple was a pioneer in user interface development, introducing the _____, complete with mouse and screen icons, in the early 1980s. a)command line interface b)graphical user interface c)character user interface d)binary line interface
graphical user interface
Centralized IT departments no longer produce reams of printed _____ reports. a)greenbar b)batch c)yellowbar d)audit
greenbar
The software that a company's IT department makes, builds, and develops is called _____. a)external software b)in-house software c)indexed software d)internal software
in-house software
In a(n) _____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart. a)spontaneous b)open-ended c)unstructured d)informal
informal
In an object-oriented system, objects can ____ certain attributes from other objects. a)reformat b)relate c)inherit d)concatenate
inherit
____ is a specific member of a class. a)index b)instance c)key d)lifeline
instance
Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management. a)fixed outsourcing services (FOS) b)application service provider (ASP) c)internet business services (IBS) d)outsource hosting provider (OHP)
internet business services (IBS)
Project scheduling, an activity of a project manager, _____. a)includes monitoring the progress of a project, evaluating results, and taking corrective action when necessary to stay on target b)includes budgeting a project based on the number of modules and their complexity in a project c)requires guiding, supervising, and coordinating a project team's workload d)involves staffing, which includes selecting the project team and assigning specific tasks to team members
involves staffing, which includes selecting the project team and assigning specific tasks to team members
In a DFD, the Gane and Sarson symbol for a data flow is a ____. a)flat rectangle that is open on the right side and closed on the left side b)line with a single or double arrowhead c)rectangle with rounded corners d)rectangle, which may be shaded to make it look three-dimensional
line with a single or double arrowhead
The first step in creating a work breakdown structure (WBS) is to _____. a)estimate task completion time and cost b)determine time requirements c)list all tasks d)mark all recognizable events
list all tasks
In a structure chart, a curved arrow represents a _____, which indicates that one or more modules are repeated. a)status flag b)loop c)freeform d)pie
loop
A system design where the server performs all the processing is described as _ a)dataflow architecture b)cache architecture c)mainframe architecture d)workstation architecture
mainframe architecture
The data mining technique that relies on association rule learning is often called _____. a)simulated analysis b)market basket analysis c)strategy-oriented analysis d)virtual storage analysis
market basket analysis
____ is a command that tells an object to perform a certain method. a)message b)statement c)dictum d)baseline
message
A class diagram includes the class _____, which represent the program logic. a)events b)attributes c)methods d)characters
methods
An object's ____ are the tasks or functions the object performs. a)messages b)instances c)methods d)commands
methods
In object-oriented design, built-in processes called _____ can change an object's properties. a)methods b)functions c)features d)attributes
methods
When maintaining schedules, if enough _____ and frequent checkpoints exist, problems will be detected rapidly. a)activity diagrams b)viewports c)data flow diagrams d)milestones
milestones
A major advantage of O-O designs is that systems analysts can save time and avoid errors by using ____ objects. a)modular b)dynamic c)feasible d)linear
modular
Greater user involvement in the system development process usually results in _____. a)poorer communication b)lower quality deliverable c)slower development times d)more satisfied users
more satisfied users
A _____ displays the same information as the Gantt chart, including task dependencies, but uses task boxes to include much more detail. a)semantic wireframe b)ring topology c)mesh topology d)network diagram
network diagram
Regardless of the topics of interest, there are one or more _____, where people gather to meet, offer support, and exchange ideas. a)report generators b)newsgroups c)service desks d)benchmarks
newsgroups
In a data flow diagram (DFD), a black hole is a process that has _____. a)no input b)at least one output and one input, but the output obviously is insufficient to generate the input shown c)no output d)at least one input and one output, but the input obviously is insufficient to generate the output shown
no output
A(n) ____ represents a real person, place, event, or transaction. a)method b)command c)object d)instance
object
Of the measures of feasibility, questions such as "Does management support the project?" and "Will the new system require training for users?" would help predict a system's _____. a)economic feasibility b)technical feasibility c)schedule feasibility d)operational feasibility
operational feasibility
Companies use various _____ methods to maintain output integrity and security. a)output data b)output stream c)output aesthetic d)output control
output control
Which of the following is NOT an attribute of a car? a)model b)make c)parking d)color
parking
A _____ represents the work that one person can complete in one day. a)person-day b)work-duration c)work-day d)person-work
person-day
A _____ describes the actual processes of entering, verifying, and storing data; the physical layout of data files and sorting procedures, the format of reports, and so on. a)qualitative design b)logical design c)physical design d)quantitative design
physical design
A _____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity. a)secondary key b)foreign key c)primary key d)candidate key
primary key
Microsoft's risk management model includes _____, which represents the likelihood that the risk will happen. a)description b)category c)trigger d)probability
probability
A _____ documents the details of a functional primitive, which represents a specific set of processing steps and business logic. a)primitive description b)function-based description c)logical description d)process description
process description
If processes must be performed in a specific sequence, the information should be documented in the _____. a)process descriptions b)data flow diagram (DFD) c)leveling guide d)data dictionary
process descriptions
Structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information. a)model-specific b)iterative c)processed-centered d)inferred
processed-centered
Projects with very general scope definitions are at risk of expanding gradually, without specific authorization, in a process called _____. a)project creep b)project dilation c)project drift d)project expansion
project creep
Software such as Microsoft OneNote is a type of _____ software. a)project data management b)personal data management c)personal digital assistant (PDA) d)personal information manager (PIM)
project data management
In object-oriented analysis, objects possess characteristics called _____. a)orientations b)classes c)inheritances d)properties
properties
A(n) _____ allows a user to specify a task without specifying how the task will be accomplished. a)query language b)imperative language c)query by example language d)procedural language
query language
In projects where it is desirable to obtain input from a large number of people, a(n) _____ can be a valuable tool. a)title b)questionnaire c)suggestion d)observation
questionnaire
A _____ is a data validation rule that identifies values that are questionable, but not necessarily wrong. a)validity check b)sequence check c)range check d)reasonableness check
range check
A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. a)existence check b)asynchronous check c)range check d)sequence check
range check
In a DFD, the Gane and Sarson symbol for a process is a ____. a)rectangle with rounded corners b)line with a single or double arrowhead c)flat rectangle that is open on the right side and closed on the left side d)rectangle, which may be shaded to make it look three-dimensional
rectangle with rounded corners
An object ____ diagram shows the objects and how they interact to perform business functions and transactions. a)relationship b)antecedent c)precedent d)parent
relationship
One of the main activities in the systems analysis phase is _____, which involves fact-finding to describe the current system and identification of the specifications for the new system. a)user-based modeling b)goal-based modeling c)requirements modeling d)objective modeling
requirements modeling
A _____ is a proactive effort to anticipate a risk and describe an action plan to deal with it. a)risk balance plan b)risk identification plan c)risk response plan d)risk management plan
risk response plan
The term _____ refers to a system's ability to handle increased business volume and transactions in the future. a)compatibility b)reliability c)applicability d)scalability
scalability
In a(n) _____, team members prepare to lunge at each other to achieve their objectives. a)pool b)adaptation c)resequencing session d)scrum
scrum
The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability. a)risk policy b)concealment report c)threat report d)security policy
security policy
When companies acquire web-based software as a(n) _____, they can limit in-house involvement to a minimum. a)service b)process c)outsource d)product
service
When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms and conditions. a)request for proposal b)software license c)fixed fee model d)supplemental maintenance agreement
software license
Which of the following is a software collection obtained from a vendor or application service provider? a)software aggregate b)software metric c)software package d)software cluster
software package
In the context of in-house software development options, companies that develop software for sale are called _____. a)software vendors b)software dealers c)software distributers d)software stockers
software vendors
A _____ collects input data, triggers or authorizes an input action, and provides a record of the original transaction. a)tester document b)recovery document c)source document d)transaction document
source document
In a structure chart, a control couple shows a message, also called a(n) _____, which one module sends to another. a)open loop b)unit plan c)status flag d)a pilot
status flag
Initial screen designs can be presented to users in the form of a _____, which is a sketch that shows the general screen layout and design. a)wireframe b)viewport c)viewbox d)storyboard
storyboard
A _____ is a review of a project team member's work by other members of a team. a)critical walk-through b)structured walk-through c)foundational walk-through d)baseline walk-through
structured walk-through
A(n) _____ is not as flexible as a series of interviews, but it is less expensive, generally takes less time, and can involve a broad cross-section of people. a)fishbone b)experiment c)survey d)research
survey
In maintenance management, _____ involves studying the parts of a system to understand the overall system. a)fusion b)synthesis c)adoption d)elucidation
synthesis
A _____ is responsible for assigning maintenance tasks to individuals or to a maintenance team. a)programmer b)system validator c)tester d)system administrator
system administrator
In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system. a)systems implementation phase b)systems support and security phase c)systems design phase d)systems analysis phase
systems analysis phase
A(n) _____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company's information systems. a)application developer b)systems analyst c)network administrator d)database administrator
systems analyst
The goal of _____ is to build a system that is effective, reliable, and maintainable. a) systems analysis b) systems design c) system auditing d) systems reporting
systems design
The systems implementation phase of the systems development life cycle (SDLC) includes an assessment, called a _____, to determine whether the system operates properly and if costs and benefits are within expectation. a)systems estimation b)systems validation c)systems verification d)systems evaluation
systems evaluation
A systems analyst conducts a preliminary investigation to study the _____ and recommend specific action. a)systems validation b)systems request c)project staffing report d)project scheduling report
systems request
A task that represents several activities is known as a _____. a)task name b)task group c)task ID d)task review
task group
Some forms use a _____ that contains icons or buttons that represent shortcuts for executing common commands. a)dialog box b)toolbar c) taskbar d) menu box
toolbar
In addition to direct evaluations, systems developers must identify and document indirect expenses that contribute to the _____. a)Rapid Economic Justification (REJ) b)business process modeling notation (BPMN) c)total cost of ownership (TCO) d)functional decomposition diagram (FDD)
total cost of ownership (TCO)
Using a _____ strategy, knowledgeable users can be selected who then conduct sessions for others. a)train-the-trainer b)direct cutover c)top-down design d)structured walkthrough
train-the-trainer
___ analyzes an organization's assets, threats, and vulnerabilities. a)Risk identification b)Risk control c)Risk diversification d)Risk uncertainty
Risk identification
The overall aim of a _____ is to avoid seeking goals that are unrealistic, unprofitable, or unachievable. a)CSF (Critical Success Factor) analysis b)SWOT (Strength, Weakness, Opportunities, and Threats) analysis c)BCF (Business Case Factor) analysis d)SWCT (Strategy, Weakness, Cost, and Technology) analysis
SWOT (Strength, Weakness, Opportunities, and Threats) analysis
The _____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features. a)operational baseline b)product baseline c)allocated baseline d)functional baseline
allocated baseline
When developing e-business systems, an in-house solution usually requires a _____ for a company that must adapt quickly in a dynamic ecommerce environment. a)smaller initial investment and provides more flexibility b)smaller initial investment but provides less flexibility c)greater initial investment but provides more flexibility d)greater initial investment and provides less flexibility
Greater initial investment but provides more flexibility
_____ lists each risk and assesses the likelihood that it could affect a project. a)Risk identification b)Risk averting c)Risk analytics d)Risk dominance
Risk identification
Many organizations require a more formal type of desk checking called _____. a)a control module b)integration testing c)a structured walkthrough d)a data couple
a structured walkthrough
A(n) _____ is a series of tasks that, if delayed, would affect the completion date of the overall project. a)dynamic path b)critical path c)absolute path d)relative path
critical path
At the end of the systems implementation phase, the final report to management should include _____. a)final versions of all system documentation b)quality and effectiveness of training c)adequacy of system controls and security measures d)hardware efficiency and platform performance
final versions of all system documentation
A _____ is the main line of defense between a local network, or intranet, and the Internet. a)spyware b)malware c)firewall d)threat
firewall
The _____ method of developing systems produces code that is modular and reusable. a)adaptive b)object-oriented analysis c)rapid application development d)structured analysis
object-oriented analysis
In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed version of the entire SDLC with users involved every step of the way. a)brainstorming b)agile method c)rapid application development d)sampling
rapid application development
Systems development typically starts with a ____. a)feasibility study, followed by a systems request, which includes a preliminary investigation b)systems request, followed by a preliminary investigation, which includes a feasibility study c)preliminary investigation, followed by a feasibility study, which includes a systems request d)feasibility study, followed by a preliminary investigation, which includes a systems request
systems request, followed by a preliminary investigation, which includes a feasibility study
During the _____ of the systems development life cycle (SDLC), the IT staff maintains, enhances, and protects the system. a)systems planning phase b)systems analysis phase c)systems support and security phase d)systems implementation phase
systems support and security phase
During _____, programmers must test programs that interact with other programs and files separately before they are integrated into the system. a)unit testing b)functional testing c)integrated testing d)acceptance testing
unit testing
Interface designers can obtain data, called _____, by using software that can record and measure user interaction with a system. a)abstraction metrics b)usability metrics c)encapsulation metrics d)ergonomic metrics
usability metrics
_____ give the project managers an opportunity to seek input and conduct brainstorming sessions. a)Project status meetings b)Status reports c)Project review reports d)Board meetings
Project status meetings
Systems requests seldom are aimed at improving service to users within a company. T/F
False
Which of the following is an example of a horizontal application? a)Accounting packages b)College applications c)Real estate firms d)Construction companies
Accounting packages
Which of the following methods of system development stresses intense team-based effort and reflects a set of community-based values? a)Object-oriented analysis b)Rapid application development c)Structured analysis d)Agile method
Agile method
___ ensures that authorized users have timely and reliable access to necessary information. a)Integrity b)Concealability c)Availability d)Confidentiality
Availability
_ is the amount of data that can be transferred in a fixed time period. a)Dimensionality b)Bandwidth c)Topology d)Resolution
Bandwidth
Adding more people to a project actually might increase the time necessary to complete the project because of a principle called _____. a)Moody's Law b)Hooke's Law c)Brook's Law d)Bernoulli's Law
Brook's Law
____ is a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service. a)Reorganizing b)Resource sizing c)Restructuring d)Capacity planning
Capacity planning
_____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity. a)Functionality b)Normalization c)Scalability d)Cardinality
Cardinality
A _____ is a set of letters or numbers that represents a data item. a)business glossary b)mnemonic c)data dictionary d)code
Code
___ measures a module's scope and processing characteristics. a)Coupling b)Indexing c)Cohesion d)Partitioning
Cohesion
If a primary key combines two or more fields, then it is called a _____. a)dedicated key b)composite key c)foreign key d)candidate key
Composite key
___ protects information from unauthorized disclosure and safeguards privacy. a)Accessibility b)Integrity c)Confidentiality d)Availability
Confidentiality
A(n) _____ provides access for customers, employees, suppliers, and the public. a)application server b)corporate portal c)thick client d)mainframe architecture
Corporate portal
A _____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company. a)data warehouse b)metadata c)data frame d)pseudo-data
Data warehouse
__ combine data from different item attributes, or characteristics, to build a code. a)Derivation codes b)Sequence codes c)Category codes d)Significant digit codes
Derivation codes
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a)mission-critical systems b)web-centric systems c)distributed systems d)legacy systems
Distributed systems
_____ is a fact-finding technique that can help a systems analyst understand how the current system is supposed to work. a)Document review b)Productivity software c)A systematic sample d)Brainstorming
Document review
_____ technology uses radio frequency identification (RFID) tags to identify and monitor the movement of each individual product, from a factory floor to the retail checkout counter. a)EPOD (Electronic proof of delivery) b)RTPD (Real-time product delivery) c)EPC (Electronic product code) d)MCC (Magnetic character code)
EPC (Electronic product code)
__ is a6the process of converting readable data into unreadable characters to prevent unauthorized access to the data. a)Encapsulation b)Encryption c)Normalization d)Standardization
Encryption
Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something. T/F
False
Like a primary key, a foreign key must be unique. T/F
False
Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms. T/F
False
Most large companies rely on one person to evaluate systems requests instead of relying on a systems review committee. T/F
False
One highly publicized form of social engineering is called post texting, which is a method of obtaining personal information under false pretenses. T/F
False
Phased operation is more expensive than full parallel operation because the analyst has to work with the entire system at any given time. T/F
False
The responsibilities of a systems analyst at a small firm are exactly the same as those at a large corporation. T/F
False
When designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics.
False
lass diagram resembles a horizontal flowchart that shows the actions and events as they occur. T/F
False
Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals. T/F
False
Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees. T/F
False
In addition to helping to gather and analyze facts, many programs also automatically perform fact-finding for systems analysts.
False
Interface design should call for attention to the interface, rather than facilitating design objectives. T/F
False
A table is in _____ if it does not contain a repeating group. a)second normal form b)third normal form c)first normal form d)fourth normal form
First normal form
__ graphically represent the logical rules and interaction between program modules using a series of symbols connected by arrows. a)Acceptance tests b)Simulations c)Training plans d)Flowcharts
Flowcharts
____, a human resource issue, is a possible cause of cost overruns in an organization. a)Inaccurate demand forecast b)Unrealistic estimates c)Poor monitoring of progress d)Inadequate training
Inadequate training
__ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information. a)Instructional technology b)Information technology c)Assistive technology d)Medical technology
Information technology
_____ are advantages that are difficult to measure in dollars but are important to a company. a)Tangible benefits b)Tactile benefits c)Real benefits d)Intangible benefits
Intangible benefits
___ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively. a)Analytical skills b)Confrontational skills c)Artistic skills d)Interpersonal skills
Interpersonal skills
Most companies resolved the problems of stand-alone computing by joining clients into a _____ that allows sharing of data and hardware resources. a)storage area network (SAN) b)local area network (LAN) c)wide area network (WAN) d)desk area network (DAN)
Local area network (LAN)
__ describes the way the components in a network interact. a)Logical topology b)Interactive topology c)Physical topology d)Engagement topology
Logical topology
___ expenses vary significantly during a system's operational life and include spending to support maintenance activities. a)Principal b)Secure c)Capital d)Maintenance
Maintenance
Which of the following is true of a traditional systems development environment? a)Systems are easily scalable and can run on multiple hardware environments. b)Systems are developed and delivered in an Internet-based framework such as .NET or WebSphere. c)Internet-based development treats the traditional systems development environment as the platform, rather than just a communication channel. d)Many applications require substantial desktop computing power and resources.
Many applications require substantial desktop computing power and resources.
Identify a major web-based development environment. a)Cisco's CSR b)HP ArcSight c)Microsoft's .NET d)Oracle DBA
Microsoft's .NET
To bridge the gap between a database and the Internet, it is necessary to use a _____, which is software that integrates different applications and allows them to exchange data. a)firmware b)stack c)server d)middleware
Middleware
__ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify. a)Scrum b)Rapid application development c)Prototyping d)Modeling
Modeling
_____ is based on combinations of the three logical structures, or control structures which serve as building blocks for the process. a)Product design b)Modular design c)Interface design d)Visual design
Modular design
__ is the process of creating table designs by assigning specific fields or attributes to each table in a database. a)Abstraction b)Normalization c)Encryption d)Encapsulation
Normalization
The _____ describes how data actually moves from an application on one computer to an application on another networked computer. a)five forces mode b)object-oriented database model c)OSI (Open Systems Interconnection) model d)subscription model
OSI (Open Systems Interconnection) model
_ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data. a)Open embedded connectivity (OEC) b)Java virtual connector (JVC) c)Open database connectivity (ODBC) d)ActiveX data object (ADO)
Open database connectivity (ODBC)
A _____ chart displays complex task patterns and relationships. a)Gantt b)Scatter c)Pareto d)Program Evaluation Review Technique (PERT)
Program Evaluation Review Technique (PERT)
Using a(n) _____, a project manager can convert task start and finish times to actual dates by laying out the entire project on a calendar. a)Program Evaluation Review Technique (PERT) chart b)XY chart c)Scatter chart d)Pedrigree chart
Program Evaluation Review Technique (PERT) chart
_____ give team members of a project an opportunity to share information, discuss common problems, and explain new techniques. a)Board meetings b)Project review reports c)Status reports d)Project status meetings
Project status meetings
To create use cases, you start by reviewing the information that you gathered during the requirements modeling phase. T/F
True
To minimize the need to require information from two different systems, cyclical information systems usually are converted using the direct cutover method at the beginning of a quarter, calendar year, or fiscal year. T/F
True
__ design and construct webpages, monitor traffic, manage hardware and software, and link web-based applications to a company's information systems. a)Network administrators b)User support specialists c)Web support specialists d)Database administrators
Web support specialists
In a data dictionary, any name other than the standard data element name is called a(n) _____. a)cipher b)alias c)clone d)mirror
alias
To measure system performance, companies use _____, which uses a set of standard tests on one system to compare its performance and capacity to that of other systems. a)metric analysis b)allocation testing c)benchmark testing d)threat analysis
benchmark testing
A _____ is logically impossible in a data flow diagram (DFD) because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow. a)server farm b)black hole c)spontaneous combustion d)gray template
black hole
System developers use _____ to document and trail program defects, code changes, and replacement code. a)bug tracking software b)the obstruction generator c)the defect distribution policy d)fault promotion analysis
bug tracking software
In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision. a)build or buy b)subscription c)build or make d)transactional
build or buy
The term _____ refers to the reasons, or justifications, for a proposal. a)work statement b)use case c)problem charter d)business case
business case
A _____ describes the information that a system must provide. a)process model b)business model c)network model d)data model
business model
For complex models, analysts can choose computer-based modeling tools that use _____, which includes standard shapes and symbols to represent events, processes, workflows, and more. a)joint application development (JAD) b)electronic data interchange (EDI) c)rapid application development (RAD) d)business process modeling notation (BPMN)
business process modeling notation (BPMN)
A(n) _____ is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application. a)interpolated model b)method model c)usage model d)administrative model
usage model
A _____ is a Unified Modeling Language (UML) technique that visually represents the interaction between users and an information system. a)surface flowchart b)scatter diagram c)user-based flowchart d)use case diagram
use case diagram
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity. a)user configeration b)user query c)user application d)user interface
user application
In the rapid application development (RAD), during the _____ phase users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs. a)user design b)requirements planning c)construction d)cutover
user design
In addition to configuring software, the IT staff can create a _____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application. a)user agent b)user manual c)user interface d)user story
user interface
Leveling _____. a)uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system b)ensures that the input and output data flows of the child data flow diagram (DFD) are maintained on the parent data flow diagram (DFD) c)ensures that the input and output data flows of the parent data flow diagram (DFD) are maintained on the child data flow diagram (DFD) d)uses a series of increasingly sketchy data flow diagrams (DFDs) to describe an information system
uses a series of increasingly detailed data flow diagrams (DFDs) to describe an information system
In a(n) _____ model, the result of each phase is called a deliverable, which flows into the next phase. a)waterfall b)spiral c)iterative d)interactive
waterfall
A(n) _____ is a web-based repository of information that anyone can access, contribute to, or modify. a)wiki b)portal c)iOS d)blog
wiki
The analysts at Techno InfoSystems are considering the four-model approach to system development for a new client. Which of the following is a benefit if they use the four-model approach? a)It will not incur additional costs to develop logical and physical model of the current system. b)It will take less time to build a logical and physical model of the current system. c)It will provide time to create the current system models even for projects with tight schedules. d)It will provide a clear picture of current system functions before any modifications or improvements are made.
It will provide a clear picture of current system functions before any modifications or improvements are made.
Which of the following is a typical example of a system requirement for the output category? a)As the final step in year-end processing, the payroll system must update employee salaries, bonuses, and benefits and produce tax data required by the IRS. b)The contact management system must generate a daily reminder list for all sales reps. c)All transactions must have audit trails. d)Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs.
The contact management system must generate a daily reminder list for all sales reps.
The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects. a)system networking committee b)topology identification committee c)data storage committee d)computer resources committee
computer resources committee
User documentation _____. a)allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) b)describes a system's functions and how they are implemented c)consists of instructions and information to users who will interact with the system d)contains all the information needed for users to process and distribute online and printed output
consists of instructions and information to users who will interact with the system
Operations documentation _____. a)contains all the information needed for processing and distributing online and printed output b)describes the inputs, outputs, and processing logic for all program modules c)describes a system's functions and how they are implemented d)consists of instructions and information to users who will interact with the system
contains all the information needed for processing and distributing online and printed output
Decision trees show the logic structure in a _____. a)horizontal form that resembles a tree with the roots at the left and the branches to the right b)vertical form that resembles a tree with the roots at the bottom and the branches at the top c)vertical form that resembles a tree with the roots at the top and the branches at the bottom d)horizontal form that resembles a tree with the roots at the right and the branches to the left
horizontal form that resembles a tree with the roots at the left and the branches to the right
Project reporting, an activity of a project manager, _____. a)includes identifying and arranging project tasks and estimating completion times and costs b)includes informing management, users, and the project team about the progress of a project c)involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that might delay a project d)consists of staffing, which includes selecting the project team and assigning specific tasks to team members
includes informing management, users, and the project team about the progress of a project
In a data flow diagram (DFD), a spontaneous generation process is a process that has _____. a)no output b)no input c)at least one output and one input, but the output obviously is insufficient to generate the input shown d)at least one input and one output, but the input obviously is insufficient to generate the output shown
no input
In a typical company organizational model, middle managers _____. a)include users who rely on transaction processing (TP) systems to enter and receive the data they need to perform their jobs b)oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people c)provide direction, necessary resources, and performance feedback to supervisors and team leaders d)develop long-range plans, called strategic plans, which define the company's overall mission and goals
provide direction, necessary resources, and performance feedback to supervisors and team leaders