Systems Analysis Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Microsoft's ____ is one of the major Web-based development environments. A. .NET B. WebSphere C. NetSphere D. .WEB

.NET

Nearly _____ percent of total costs occur after the purchase of hardware and software.​ A. 95 B. 15 C. 45 D. 80

80

Which of the following is true of a traditional systems development environment? A. systems design is influenced by compatibility issues B. systems are designed to run on local and wide-area company networks C. systems often utilize Internet links and resources D. scalability is not affected by telecommunications, limitations, and local networks

A,B,C

​A(n) _____ resembles a horizontal flowchart that shows the actions and events as they occur. A. sequence diagram B. state transition diagram C. activity diagram D. business model diagram

Activity diagram

In a use case, an external entity, called a(n) _____,initiates a use case by requesting the system to perform a function or process. A. beneficiary B. user C. domain D. actor

Actor

One of the disadvantages of _____ methods of system development is that the overall project might be subject to scope change as user requirements change. A. object-oriented analysis B. agile C. structured analysis D. rapid application development

Agile

The line from the actor to the use case is called a(n) _____. A. Association B. Aggregation C. Lifeline D. Observation

Association

​The line from the actor to the use case is called a(n) _____. A. observation B. lifeline C. aggregation D. association

Association

An object has certain _____,which are characteristics that describe the object, such as the make, model, and color of a car. A. keys B. attributes C. indices D. elements

Attributes

A _____ measures the time a package takes to process a certain number of transactions. A. newsgroup B. parameter C. benchmark D. middleware

Benchmark

Adding more people to a project actually might increase the time necessary to complete the project because of a principle called _____. A. Moody's Law B. Brooks' Law​ C. Hooke's Law​ D. Bernoulli's Law

Brooks' Law​

In the context of in-house software development options, the choice between developing versus purchasing software often is called a _____ decision. A. build or make B. subscription C. transactional D. build or buy

Build or buy

A(n) _____ shows the object classes and relationships involved in a use case. A. class diagram B. association diagram C. use case diagram D. modeling diagram

Class diagram

Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology. A. interpolated B. mainframe C. outsourced D. cloud

Cloud

Two or more _____ depend on a predecessor task. A. precursor tasks B. dependent tasks C. concurrent tasks D. ancestor tasks

Concurrent tasks

To produce a control break report, the records must be arranged, or sorted, in _____. A. control break order B. subgroup field order C. character break order D. control field order

Control field order

​In a source document, the _____ contains codes, identification information, numbers, and dates that are used for storing completed forms. A. totals zone B. authorization zone C. heading zone D. control zone

Control zone

A(n) _____ is a series of tasks that, if delayed, would affect the completion date of the overall project. A. dynamic path B. absolute path C. critical path D. relative path

Critical path

In a sequence diagram, a lifeline is identified by a _____ line. A. red B. dashed C. solid D. curved

Dashed

A _____ shows a logical structure, with all possible combinations of conditions and resulting actions. A. pseudo table B. decision table C. validation table D. database table

Decision table

A _____ cannot be started until a previous task is completed.​ A. predecessor task B. dependent task C. precursor task D. concurrent task

Dependent task

In an approach called ____ prototyping, systems analysts use prototyping to verify user requirements, after which the prototype is discarded and implementation continues. A. discard B. design C. trash D. recycled

Design

​In _____, systems analysts use a prototype to verify user requirements, after which the prototype is discarded and implementation continues. A. system prototyping B. command prototyping C. design prototyping D. layout prototyping

Design prototyping

Internet-based commerce is called _____ and includes two main sectors: B2C (business-to-consumer) and B2B (business-to-business). A. Electronic commerce B. network-oriented commerce C. virtual trading D. online trading

Electronic commerce

_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks. A. Electronic data interchange (EDI) B. Radio frequency identification (RFID) C. Enterprise resource planning (ERP) D. Object-oriented (O-O) analysis

Electronic data interchange (EDI)

​_____ allows objects to be used as modular components anywhere in a system. A. dynamic addressing B. encapsulation C. linear addressing D. technical feasibility

Encapsulation

The _____ must include users, who will participate in the selection process and feel a sense of ownership in the new system.​ A. quality audit team B. evaluation and selection team C. maintenance team D. development and testing team

Evaluation and selection team

A(n) _____ is a technique that uses a common yardstick to measure and compare vendor ratings.

Evaluation model

Since diagram 0 is a(n) _____ version of process 0, it shows considerably more detail than a context diagram. A. condensed B. exploded C. contracted D. extrapolated

Exploded

A data flow diagram (DFD) does not show the external entities that provide data to the system or receive output from the system. T/F?

F

A method is an adjective that describes the object's current status. T/F?

F

A request for quotation (RFQ) is less specific than a request for proposal (RFP).​ T/F?

F

A software package that can be used by many different types of organizations is called a vertical application. T/F?

F

An object includes data, but not the processes that affect that data. T/F?

F

Benchmark tests must precisely match the day-to-day situation at your company. T/F?

F

Data stores are shown in a context diagram because data stores are external to the system. T/F?

F

Due to complexity, IT generally takes longer to move offshore than manufacturing. T/F?

F

Due to the limited range of input and interaction among participants, few companies believe that a joint application development (JAD) group does not produce the best definition of a new system. T/F?

F

Empowerment makes an IT department less productive because it must spend more time responding to the daily concerns of users and less time on high-impact systems development projects that support strategic business goals. T/F?

F

In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships. T/F?

F

Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something. T/F?

F

Sensitive data can be encrypted, or coded, so only users with decoding software can read it. T/F?

F

Since middle managers focus on a longer time frame, they need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations. T/F?

F

The personal interview usually is the least expensive fact-finding technique. T/F?

F

The responsibilities of a systems analyst at a small firm are exactly the same as those at a large corporation. T/F?

F

There is a major trend toward web-based architecture; it is rare to find firms that still rely on traditional systems. T/F?

F

There is a standard method for assigning the weight factors in an evaluation model. T/F?

F

Transaction processing (TP) systems are inefficient because they process a set of transaction-related commands individually rather than as a group. T/F?

F

Using batch input, data entry is performed continuously. T/F?

F

When planning an information system, a company must consider how a new system will interface with older systems, which are called horizontal systems. T/F?

F

When use cases are identified, all the related transactions should be kept separate. T/F?

F

​Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees. T/F?

F

When determining outsourcing fees, a ____ model uses a set fee based on a specified level of service and user support A. Fixed fee B. Usage C. Subscription D. Transaction

Fixed fee

The _____ is a top-down representation of a process. A. total cost of ownership (TCO) B. functional decomposition diagram (FDD) C. Unified Modeling Language (UML) D. Rapid Economic Justification (REJ)

Functional Decomposition Diagram (FDD)

A _____ consists of horizontal bars, connected with arrows that indicate task dependencies. A. Scatter chart B. viewport C. wireframe D. Gantt chart

Gantt chart

​The term _____ is familiar to IT professionals, who know that the best time to avoid problems is when the data is entered. A. garbage in, garbage out (GIGO) B. ​poor start, poor finish (PSPF) C. ​good input, bad output (GIBO) D. ​weak hand, weak hold (WHWH)

Garbage in, garbage out (GIGO)

​Centralized IT departments no longer produce reams of printed _____ reports. A. batch B. audit C. yellowbar D. greenbar

Greenbar

Which of the following is a general category of system requirements? A. Login security​ B. Daily reports​ C. Response time D. Inputs

Inputs

Some firms offer _____, which provide powerful web-based support for transactions such as order processing, billing, and customer relationship management.​ A. Internet business services (IBS) B. outsource hosting provider (OHP) C. application service provider (ASP) D. fixed outsourcing services (FOS)

Internet business services (IBS)

In modular design, _____ also is called looping. A. process description B. iteration C. sequence D. selection

Iteration

When planning an information system, a company must consider how a new system will interface with older systems, which are called _____. A. enterprise applications B. network operating systems (NOS) C. operating applications D. legacy systems

Legacy systems

In a sequence diagram, a _____ represents the time during which an object above it is able to interact with the other objects in the use case. A. focus point B. lifeline C. schematic matrix D. validity link

Lifeline

The first step in creating a work breakdown structure (WBS) is to _____. A. determine time requirements B. list all tasks C. estimate task completion time and cost D. mark all recognizable events

List all tasks

In data and process modeling, a(n) _____ shows what the system must do, regardless of how it will be implemented physically. A. physical model B. logical model C. relational model D. organizational model

Logical model

The main reason for offshore outsourcing is to _____.​ A. ship bulky raw materials B. manage operations only in one country C. lower bottom-line costs D. manage operations only in one country

Lower bottom-line costs

A car performs a(n) _____ called OPERATE WIPERS when it is sent a message with the wiper control. A. method B. role C. command D. objective

Method

An object's _____ are the tasks or functions that the object performs when it receives a command to do so. A. roles B. utilities C. instances D. methods

Methods

​Identify a major web-based development environment. A. Microsoft's .NET B. Cisco's CSR C. Oracle DBA D. HP ArcSight

Microsoft's .NET

Web-based software usually requires additional layers, called _____, to communicate with existing software and legacy systems. A. freeware B. shareware C. middleware D. public domain software

Middleware

A major advantage of object-oriented (O-O) designs is that systems analysts can save time and avoid errors by using _____ objects. A. dynamic B. feasible C. modular D. linear

Modular

The _____ method of developing systems produces code that is modular and reusable. A. object-oriented analysis B. adaptive C. structured analysis D. rapid application development

Object-oriented analysis

Structured analysis is called a(n) _____ technique because it focuses on processes that transform data into useful information. A. iterative B. process-centered C. inferred D. model-specific

Process-centered

A _____ chart displays complex task patterns and relationships. A. Gantt B. Program Evaluation Review Technique (PERT) C. Pareto D. Scatter

Program Evaluation Review Technique (PERT)

____ produces an early, rapidly constructed working version of a proposed system. A. Prototyping B. Outsourcing C. Coding D. Benchmarking

Prototyping

The Unified Modeling Language (UML) represents an object as a _____ with the object name at the top, followed by the object's attributes and methods. A. circle B. rectangle C. pentagon D. rhombus

Rectangle

________ describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses. A. Instances B. Relationships C. Aggregates D. Clusters

Relationships

When companies use a _____, they already know the specific products or service they want and need to obtain price estimates or bids from vendors. A. request for quotation (RFQ) B. net present value (NPV) C. request for proposal (RFP) D. return on investment (ROI)

Request for quotation (RFQ)

One of the main activities in the systems analysis phase is _____, which involves fact-finding to describe the current system and identification of the specifications for the new system. A. objective modeling B. requirements modeling C. user-based modeling D. goal-based modeling

Requirements modeling

_____ is a percentage rate that compares the total net benefits received from a project to the total costs of the project. A. Net present value (NPV) B. An acquisition process C. return on investment (ROI) D. Payback analysis

Return on investment (ROI)

​_____ describes how instances of one class relate to instances of another class. A. Scope B. Cardinality C. A deliverable D. A modifier

Scope

A firm that offers outsourcing solutions is called a _____. A. subscription provider B. software provider C. service provider D. resource provider

Service provider

Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ____, is changing the picture dramatically. A. Hardware as a Help B. Processing as a Product C. Software as a Service D. Storage as a Solution

Software as a service

In the accompanying figure, the sequence structure is the completion of _____. A. a process step that is repeated until a specific condition changes B. steps in a chronological order, one after another​ C. a specific condition that is repeated until a process changes​ D. one or more process steps based on the results of a test or condition

Steps in a chronological order, one after another

When determining outsourcing fees, a _____ has a variable fee based on the number of users or workstations that have access to the application.​ A. fixed fee model B. usage model C. transaction model D. subscription model

Subscription model

If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor.​ A. supplemental maintenance agreement B. request for proposal C. fixed fee model D. software license

Supplemental maintenance agreement

For a use case diagram, the _____ shows what is included in the system and what is not included in the system. A. system design B. system boundary C. system layout D. system matrix

System boundary

When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select every tenth customer for review. A. systematic sample B. random sample C. stratified sample D. comprehensive sample

Systematic sample

In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system. A. systems analysis phase B. systems implementation phase C. systems design phase D. systems support and security phase

Systems analysis phase

A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service. T/F?

T

After one identifies a system's objects, classes, and relationships, one should develop an object relationship diagram that provides an overview of the system. T/F?

T

Although the UML can be used for business process modeling and requirements modeling, it is mainly used to support O-O system analysis and to develop object models. T/F?

T

An application service provider (ASP) provides more than a license to use the software; it rents an operational package to the customer.​ T/F?

T

An object represents a real person, place, event, or transaction T/F?

T

By designing a system in-house, companies can develop and train an IT staff that understands the organization's business functions and information support needs. T/F?

T

Cloud computing can be viewed as an online SaaS and data environment. T/F?

T

For horizontal applications or small systems, using a demo copy to enter a few sample transactions could be an acceptable application test. T/F?

T

In a state transition diagram, the states appear as rounded rectangles with the state names inside T/F?

T

Object-oriented methods provide an easy transition to O-O programming languages such as C++, Java, and Swift. T/F?

T

System requirements fall into five general categories: outputs, inputs, processes, performance, and controls. T/F?

T

The focus indicates when an object sends or receives a message. T/F?

T

​A transparent interface does not distract a user and calls no attention to itself. T/F?

T

Data flow diagram (DFD) entities are also called _____ because they are data origins or final data destinations. A. gray holes B. data stores C. terminators D. pseudocodes

Terminators

_____ is an example of a nonprofit organization that publishes standards and reports for its members and the general public.​ A. Microsoft B. Oracle C. The National Institute of Standards and Technology (NIST) D. The Transaction Processing Performance Council (TPC)

The Transaction Processing Performance Council (TPC)

Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which is a reason Priscilla will share with the new analysts for recommending that a client purchase a software package? A. The client wants to develop internal resources and capabilities B. The client is looking for the lowest possible costs C. The client has unique business requirements that must be satisfied by this software application D. The client has some existing technology in place whose requirements must be met by the new software

The client is looking for the lowest possible costs

Identify a typical example of a system requirement for the performance category. A. The purchasing system must provide suppliers with up-to-date specifications. B. The student records system must produce class lists within five hours after the end of registration. C. Each input form must include date, time, product code, customer number, and quantity. D. The manager of the sales department must approve orders that exceed a customer's credit limit.

The student records system must produce class lists within five hours after the end of registration.

A(n) _____ represents the steps in a specific business function or process. A. relationship diagram B. use case C. data flow unit D. interaction diagram

Use case

In the rapid application development (RAD) model in the accompanying figure, during the _____ phase, users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs. A. requirements planning B. cutover C. construction D. user design

User design

​In a _____ system, the distinction blurs between input, output, and the interface itself. A. topology-centered B. network-centered C. system-centered D. user-centered

User-centered

In a data dictionary, some data elements have _____ rules. For example, an employee's salary must be within the range defined for the employee's job classification. A. range B. mastered C. domain D. validity

Validity

Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment. A. GUI B. Web-based C. cloud D. multinational

Web-based

Which of the following is an example of a horizontal application? A. real estate firms B. college applications C. accounting packages D. construction companies

accounting packages

In data flow diagrams (DFDs), a process resembles a _____, where the inputs, outputs, and general functions of the process are known, but the underlying details are not shown. A. business rule B. black box C. decision table D. terminator

black box

A _____ graphically displays one or more business processes, such as handling an airline reservation, filling a product order, or updating a customer account. A. business matrix model (BMM) B. business process model (BPM) C. business indexing model (BIM) D. business strategic model (BSM)

business process model (BPM)

A(n) _____ is a condition, restriction, or requirement that the system must satisfy. A. index B. constraint C. milestone​ D. viewport

constraint

​A _____ usually causes specific actions, such as printing subtotals for a group of records in a report. A. subgroup B. character break C. concatenation character D. control break

control break

​A _____ improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. A. data mining rule B. data requirements rule C. data validation rule D. data load rule

data validation rule

In a typical organizational model, top managers _____. A. develop long-range plans, called strategic plans, which define a company's overall mission and goals B. provide direction, necessary resources, and performance feedback to supervisors and team leaders C. oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people D. include users who rely on transaction processing (TP) systems to enter and receive the data they need to perform their jobs

develop long-range plans, called strategic plans, which define a company's overall mission and goals

​If variable input data is needed, a _____ must be provided to explain what is needed. A. menu bar B. dialog box C. toggle button D. list box

dialog box

​A _____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily. A. command-line B. disked C. thick D. diskless

diskless

A data dictionary specifies a data element's _____, which is the set of values permitted for the data element. A. record​ B. domain​ C. index D. array

domain​

​A(n) _____ displays only those records that meet a specific condition or conditions. A. exigency report B. detail report C. summary report D. exception report

exception report

​In a sequence diagram, the _____ indicates when an object sends or receives a message. A. focus B. command line C. request link D. lifeline

focus

​A red Mustang is a(n) _____ of the CAR class. A. metric B. index C. instance D. key

instance

​A(n) _____ is a specific member of a class. A. file B. instance C. key D. index

instance

Knowledge management systems use a large database called a(n) _____ that allows users to find information by entering keywords or questions in normal English phrases. A. inference engine B. knowledge base C. knowledge database management system D. inference manager

knowledge base

​Input _____ is a template or pattern that restricts data entry and prevents errors. A. key B. legend C. pattern D. mask

mask

​In a sequence diagram, a _____ is identified by a line showing direction that runs between two objects. A. response B. message C. method D. procedure

message

When maintaining schedules, if enough _____ and frequent checkpoints exist, problems will be detected rapidly. A. activity diagrams B. data flow diagrams C. viewports D. milestones

milestones

​A major advantage of object-oriented (O-O) designs is that systems analysts can save time and avoid errors by using _____ objects. A. feasible B. modular C. linear D. dynamic

modular

​In a(n) _____ design, one can create individual components that connect to a higher-level program or process. A. modular B. dissociated C. integral D. archetypical

modular

In a data flow diagram (DFD), a spontaneous generation process is a process that has _____. A. no output B. at least one output and one input, but the output obviously is insufficient to generate the input shown​ C. at least one input and one output, but the input obviously is insufficient to generate the output shown​ D. no input

no input

​Companies use various _____ methods to maintain output integrity and security. A. output stream B. output control C. output data D. output aesthetic

output control

​The Unified Modeling Language (UML) symbol for a use case is a(n) _____ with a label that describes the action or event. A. triangle B. dashed line C. rectangle D. oval

oval

A _____ represents the work that one person can complete in one day.​ A. person-day B. work-day C. person-work D. work-duration

person-day

​The concept that a message gives different meanings to different objects is called _____. A. encapsulation B. polymorphism C. linear addressing D. dynamic addressing

polymorphism

A(n) _____ shows the data that flow in and out of system processes. A. process model B. object model C. business model D. network model

process model

​In older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system. A. quality-control B. physical-control C. network-control D. process-control

process-control

Business support systems _____. A. provide job-related information support to users at all levels of a company B. simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied C. process data generated by day-to-day business operations D. include email, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and integrated mobile computing systems

provide job-related information support to users at all levels of a company

​​​A(n) _____ is a data validation rule that is used to verify that data items fall between a specified minimum and maximum value. A. asynchronous check B. ​range check C. ​existence check D. sequence check​

range check

​When companies use a _____, they already know the specific products or service they want and need to obtain price estimates or bids from vendors. A. request for quotation (RFQ) B. request for proposal (RFP) C. net present value (NPV) D. return on investment (ROI)

request for quotation (RFQ)

To evaluate _____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes. A. scalability B. compatibility​ C. reliability​ D. applicability

scalability

IBM describes WebSphere as a software platform for _____ environments. ​ A. integrated development B. service-oriented architecture C. integrated development D. business process outsourcing

service-oriented architecture

_____ is the starting point for measuring the performance, accuracy, and completeness of the finished system before entering the systems design phase.​ A. software requirements specification B. software license C. maintenance agreement D. request for quoting document

software requirements specification

Prototyping includes all of the following benefits EXCEPT ____. A. users and systems developers can avoid misunderstandings B. managers can evaluate a working model more effectively than a paper specification C. system requirements, such as reliability and maintainability, can be rated adequately D. systems analysts can develop testing and training procedures before the finished solution is available

system requirements, such as reliability and maintainability, can be rated adequately

​The goal of _____ is to build a system that is effective, reliable, and maintainable. A. systems analysis B. systems design C. systems auditing D. systems reporting

systems design

The systems implementation phase of the systems development life cycle (SDLC) includes an assessment, called a _____, to determine whether the system operates properly and if costs and benefits are within expectation. A. systems estimation B. systems verification C. systems validation D. systems evaluation

systems evaluation

​Printed output is used in _____, which are output documents that are later entered back into the same or another information system. A. milestone documents B. tender documents C. turnaround documents D. policy documents

turnaround documents

A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity. A. user query B. user interface C. user application D. user configuration

user application

In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and configuring it for a particular industry is called a(n) _____. A. business process outsourcing (BPO) firm B. enterprise resource planner (ERP) C. online service provider (OSP) D. value-added reseller (VAR)

value-added reseller (VAR)

A software package developed to handle information requirements for a specific type of business is called a(n) _____.​ A. vertical application B. horizontal application C. asymmetric application D. symmetric application

vertical application

Building an application in a _____ environment can offer greater benefits, and sometimes greater risks, when compared to a traditional environment.​ A. web-based B. cloud C. GUI D. multinational

web-based

A _____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.​ A. ​request for proposal (RFP) B. ​return on investment (ROI) C. ​request for quotation (RFQ) D. ​present net value (PNV)

​request for quotation (RFQ)


संबंधित स्टडी सेट्स

Med-Surge Nursing Cardio Prep U ch 25

View Set

II.1/II.2 Use semicolons and commas to separate clauses

View Set

Chapter 4: Carpeting and Area Rugs

View Set