Chapter 1 - 6: Systems Analysis & Design (Tilley, Rosenblatt, 10th Ed)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Horizontal

A _______ system is a system, such as an inventory or payroll application, that can be adapted for use in many different types of companies.

data dictionary

A central storehouse of documentation for an information system

successor task

A concurrent task dependent upon a single prior task

d. flow

A data ________ , which is represented as a line with a single or double arrow on a DFD, is a path for data to move from one part of an information system to another. a. repository b. element c. store d. flow

b. False

A gray hole is a process that produces output, but has no input data flow. a. True b. False

task box

A rectangular box in a PERT/CPM chart

critical path

A series of tasks whose delay would affect a project's completion date

instance

A specific member of a class

b. use case

A systems analyst can draw ________ diagrams that visually represent the interaction between users and information systems. a. functional decomposition b. use case c. sequence d. data flow

d. Unified Modeling Language

A systems analyst can utilize the ________ to represent an information system from a user's viewpoint. a. Zachman Framework b. Hawthorne Effect c. Scrum d. Unified Modeling Language

nondiscretionary

A type of project where management has no choice in implementing it is referred to as a(n) _______ project.

code review

A type of structured walk-through that takes place during the SDLC

c. message

A(n) ________ is a command that tells an object to perform a certain method. a. class b. instance c. message d. attribute

d. instance

A(n) ________ is a specific member of a class. a. attribute b. state c. message d. instance

d. JAD project leader

A(n) ________ is typically responsible for developing an agenda, acting as a facilitator, and leading the JAD session. a. user b. recorder c. manager d. JAD project leader

c. lifeline

A(n) ________ represents the time during which the object above it is able to interact with the other objects in the use case. a. class b. focus c. lifeline d. message

d. multicondition

A(n) ________ table can be simplified because some rules might be duplicates, redundant, or unrealistic. a. Gane and Sarson b. Yourdon c. diverging d. multicondition

c. systems analyst

A(n) ________ transforms business requirements into IT projects. a. operational employee b. programmer c. systems analyst d. stakeholder

context diagram

A(n) _______is a top-level view of an information system that shows the system's boundaries and scope.

a. arrows

Activity diagrams can display multiple use cases in the form of a grid, where classes are shown as vertical bars and actions appear as horizontal ________ . a. arrows b. rectangles c. swim lanes d. bars

intangible benefits

Advantages that are difficult to measure in dollars but are important to a company

object relationships

After you identify the system's objects, classes, and relationships, you should develop an _______diagram that provides an overview of the system.

b. False

Although each data element must be documented in the data dictionary, documenting the data flows isn't necessary. a. True b. False

state

An adjective that describes an object's current status

alias

Any name(s) other than the standard data element name

d. technical support

Application development and systems support are two of the seven main functions of ________ . a. business support b. business development c. desktop support d. technical support

a. True

As a rule, data flow diagrams should only show a data store when two or more processes use that data store. a. True b. False

a. logic

Business rules, which transform data and produce required results, are also referred to as business ________ . a. logic b. approaches c. sequences d. models

b. logic

Business rules, which transform data and produce required results, are also referred to as business ________ . a. sequences b. logic c. approaches d. models

a. True

CASE tools are used by systems analysts to speed up the process of creating diagrams, which can be time consuming and tedious if completed by hand. a. True b. False

personal observation

Can be used to determine whether procedures operate as they are described

task group

Combination of several activities that contain subsidiary tasks

Information System

Combines technology, people, and data to provide support for business functions such as order processing, inventory control, human resources, accounting, and many more.

message

Command that tells an object to perform a certain method

preliminary investigation

Conducted to study a systems request and recommend a specific action

c. 0

Creating diagram ________ allows a systems analyst to show the major internal processes, data flows, and data stores contained in the context diagram's single process symbol. a. 1 b. 2 c. 0 d. 3

c. transaction processing

Custom order processing and accounts receivable are examples of ________ systems. a. enterprise computing b. knowledge management c. transaction processing d. user productivity

sink

Data flow diagram entity that receives data from a system

diverging data flow

Data flow in which the same data travels to two or more different locations

field

Data that is also referred to as a data element or data item

system requirements document

Deliverable, or end product, of the systems analysis phase

b. testing

Depending on the phase of the SDLC, a structured walk-through may be referred to as a design review, code review, or ________ review. a. risk b. testing c. duration d. gateway

child

Derives one or more of its attributes from another object

swim lanes

Designated customer areas in the BPMN are called _______.

JAD project leader

Develops an agenda, acts as a facilitator, and leads the JAD session

process description

Documents the details of a functional primitive

outputs

Electronic or printed information produced by a system

b. False

Examples of static modeling tools include sequence diagrams, state transition diagrams, and activity diagrams. a. True b. False

user survey

Fact-finding form that users complete and return for tabulation

research

Fact-finding technique that can include the Internet and IT magazines

a. table

For each use case, a use case description, in the form of a(n) ________ , is developed. a. table b. use case diagram c. object model d. activity diagram

d. IBM

Frederick Brooks Jr., a(n) ________ engineer, observed that adding manpower to a late software project only made it later because new team members first had to be educated and instructed by existing employees whose own productivity was reduced accordingly. a. U.S. Navy b. Microsoft c. Intaver Institute d. IBM

a. True

Gathering data about project usability, cost, benefits, and schedules is the objective of fact-finding. a. True b. False

model

Helps users, managers, and IT professionals understand a system's design

critical success factors

High-priority objectives that must be achieved to fulfill the company's mission are called _______.

Gantt chart

Horizontal bar chart that represents a set of tasks

b. False

IT professionals handle almost every aspect of systems development with little to no user participation. a. True b. False

a. True

In situations in which the same data travels to two or more different locations, it is appropriate to use a diverging data flow. a. True b. False

e-commerce (electronic commerce) or I-commerce (Internet commerce)

Internet-based commerce is called ________ or _______.

work breakdown structure

Involves breaking a project down into a series of smaller tasks

association

Line linking a particular actor to a use case

processes

Logical rules that are applied to transform data into information

sequence

Logical structure that completes steps one after another

decision table

Logical structure that shows every combination of conditions and outcomes

balancing

Maintains consistency among a set of DFDs

subclass

More specific category within a class

predecessor task

Must be completed before another task can start

inputs

Necessary data that enters the system

a. predecessor

Often, two or more concurrent tasks, depend on a single prior task, which is called a ________ task. a. predecessor b. structured c. successor d. dependent

concurrent task

One of several tasks that can start at the same time

project status meetings

Opportunity for project manager to seek input and hold brainstorming sessions

a. True

Outputs, inputs, processes, performance, and controls are the five general categories of system requirements. a. True b. False

interview

Planned meeting during which information is obtained from another person

project creep

Process in which projects expand gradually without specific authorization

sampling

Process of collecting examples of actual documents

a. documenting

Recording findings in such a way that they can be understood by someone else is a principle of ________ your work. a. documenting b. interviewing c. sampling d. observing

object

Represents a real person, place, event, or transaction

project monitoring

Requires guiding, supervising, and coordinating a project team's workload

security

Safeguards and protects the system and its data from threats

encryption

Security control that codes data to keep it safe from unauthorized users

lifeline

Sequence diagram symbol that is identified by a dashed line

task name

Should be brief and descriptive, but does not have to be unique in a project

swim lane

Shows a specific event or action in a business process modeling diagram

sequence diagram

Shows the timing of interactions between objects as they occur

a. True

Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product, from the factory floor to the retail checkout counter. a. True b. False

End users

Stakeholders are sometimes referred to as _______ _______.

systems development life cycle (SDLC)

Structured analysis uses a series of phases, called the _______ to plan, analyze, design, implement, and support an information system.

performance

System characteristics such as speed and capacity

c. flow

Systems analysts draw sets of data ________ diagrams as a graphical technique to describe an information system. a. store b. structure c. flow d. element

d. groups

Task ________ can be used when managing a complex project with many tasks. a. boxes b. patterns c. names d. groups

dependent tasks

Tasks that must be completed one after another

electronic product code

Technology that uses RFID tags to identify and monitor the movement of products

Legacy systems

Term used to describe older systems that are typically less technologically advanced than currently available systems.

a. True

The XY chart, which is a problem-solving tool, is sometimes called a scatter diagram. a. True b. False

d. Gantt chart

The ________ was developed by a mechanical engineer and management consultant over 100 years ago. a. Critical Path Method b. PERT c. WBS d. Gantt chart

data flow label

The data flow name as it appears on the DFDs

d. schedule

The decision to appoint a project manager is a choice that relates to ________ feasibility. a. economic b. technical c. operational d. schedule

object model

The end product of object-oriented analysis

business case

The reasons, or justification, for a proposal

b. flow

The symbol for a data ________ is a line with a single or double arrowhead. a. element b. flow c. tree d. item

a. empowerment

The trend toward operational users handling tasks and making decisions previously assigned to supervisors is known as ________ . a. empowerment b. enrichment c. enlightenment d. enticement

b. class

To create a(n) ________ diagram, the use case is reviewed and the classes that participate in the underlying business process are identified. a. state transition b. class c. activity d. use case

business logic

Transforms data and produces required results

agile methods

Trend that stresses intense interaction between system developers and users

a. True

Two examples of tools that are used for systems development include IBM's Rational software and the Microsoft Solutions Framework. a. True b. False

b. Yourdon

Two popular data flow diagram symbol sets are the Gane and Sarson symbol set and the ________ symbol set. a. modular design b. Yourdon c. four-model d. structured English

c. rapid application developmen

Two popular systems development methodologies that include teams composed of IT staff, users, and managers are joint application development and ________ . a. the waterfall model b. object-oriented analysis c. rapid application development d. structured analysis

leveling

Two techniques, _______ and balancing, must be used if lower-level data flow diagrams are being created.

open source

Type of program that is supported by a community of users and developers

a. True

Typical characteristics of a data store include the data store name, a description, alternate name(s), attributes, and volume and frequency. a. True b. False

systems development

Typically starts with a systems request

data flow diagram (DFD)

Uses symbols to show how a system transforms input data into useful information

default value

Value for a data element if a value otherwise is not entered for it

site visit

Visit to a physical location

use case diagram

Visual summary of several related use cases within a system or subsystem

use case diagram

Visually represents the interaction between users and the information system

d. user productivity

Voice mail, e-mail, and word processing are examples of ________ systems. a. enterprise computing b. business support c. knowledge management d. user productivity

Horizontal and vertical

What are the 2 types of application software?

unified modeling language

Widely used method of visualizing and documenting an information system

business process modeling

Works well with object modeling and focuses on the actors and their behavior

d. JIT

________ inventory systems rely on computer-to-computer data exchange to minimize unnecessary inventory. a. EPC b. CRM c. RFID d. JIT

d. Polymorphism

________ is the concept that a message gives different meanings to different objects. a. State transition b. Encapsulation c. Cardinality d. Polymorphism

d. Requirements

________ modeling involves fact-finding to describe the current system as well as identification of the requirements for the new system. a. Waterfall b. Unified c. Business process d. Requirements

a. Dependent

________ tasks must be completed one after another. a. Dependent b. Concurrent c. Open source d. Structured

b. open source

GanttProject is a free ________ program that is supported by a community of users and developers. a. design review b. open source c. code review d. testing review

d. collaboration

Google Docs is an example of Web-based ________ software. a. personal data management b. project data management c. graphics modeling d. collaboration

decision tree

Graphical representation of a decision table's conditions, actions, and rules

systems review committee

Group of key managers and users responsible for evaluating systems requests

computer resources committee

Group that is also known as a systems review committee

a. True

Groupware programs enable users to share data, collaborate on projects, and work in teams. a. True b. False

project coordinator

Handles administrative responsibilities for a project team

task

Has a beginning and an end and requires the use of company resources

a. True

Identifying all project tasks and estimating the completion time and cost of each is referred to as project planning. a. True b. False

a. successor

If a predecessor task has more than one successor task, the predecessor task's finish time is used to determine the start time for all ________ tasks. a. successor b. concurrent c. predecessor d. dependent

c. black hole

If a process has input, but produces no output, it is called a ________ process. a. spontaneous generation b. gray hole c. black hole d. data structure

a. spontaneous generation

If a process produces output, but has no input data flow, it is called a ________ process. a. spontaneous generation b. gray hole c. black hole d. data structure

d. systems support and security

If a site has a large number of remote clients, the ________ group often includes a deployment team that installs and configures the workstations. a. network administration b. application development c. user support d. systems support and security

d. latest

If a successor task has more than one predecessor task, the ________ finish time of the predecessor tasks should be used to determine the start time for the successor task. a. earliest b. quickest c. previous d. latest

d. systems implementation

If a system was purchased as a package, systems analysts configure the software and perform any necessary modifications during the ________ phase. a. systems support and security b. systems design c. systems analysis d. systems implementation

d. gathered cost and benefit data

If a systems analyst ________ during fact-finding, financial statements and impact statements should be prepared. a. conducted surveys b. conducted interviews c. observed current operations d. gathered cost and benefit data

c. observed current operations

If a systems analyst ________ during fact-finding, the results should be reviewed and key facts that will be useful in the feasibility analysis should be highlighted. a. conducted surveys b. conducted interviews c. observed current operations d. gathered cost and benefit data

b. critical path

If the series of tasks, known as the ________ , is delayed, the completion date of the overall project will be affected. a. risk response plan b. critical path c. design review d. testing review

xy chart

Important problem-solving tool that shows a correlation between variables

d. Gordon Moore

In 1965, ________ predicted that the number of transistors on an integrated circuit would double about every 24 months. a. Bill Gates b. Steve Jobs c. Samuel J. Palmisano d. Gordon Moore

b. boxes

In a PERT/CPM chart, project tasks are shown as task ________ , arranged in the sequence in which they must be performed. a. names b. boxes c. patterns d. groups

b. system boundary

In a case diagram, the ________ shows what is included in a system and what is not included in a system. a. lifeline b. system boundary c. swim lane d. black box

Gane and Sarson

In a data flow diagram, the _______ symbol for a data store is a flat rectangle that is open on the right side and closed on the left side

c. lifeline

In a sequence diagram, a ________ is identified by a dashed line and represents the time during which the object above it is able to interact with the other objects in the use case. a. class b. focus c. lifeline d. message

a. class

In a sequence diagram, a ________ is identified by a rectangle with the name inside. a. class b. focus c. lifeline d. message

a. focus

In a sequence diagram, the ________ is identified by a narrow vertical shape that covers the lifeline and indicates when an object sends or receives a message. a. focus b. parent c. child d. pool

b. rounded rectangles

In a state transition diagram, the states appear as ________ with the state names inside. a. triangles b. rounded rectangles c. squares d. circles

d. project leader

In a systems project, the program manager, or ________ , usually is a senior systems analyst or an IT department manager if the project is large. a. project analyst b. project coordinator c. project programmer d. project leader

b. project leader

In a systems project, the program manager, or ________ , usually is a senior systems analyst or an IT department manager if the project is large. a. project programmer b. project leader c. project analyst d. project coordinator

c. project owner

In a typical JAD session, the ________ explains the reason for the project and expresses top management authorization and support. a. project leader b. recorder c. project owner d. systems analyst

b. pool

In a typical business process modeling diagram, the outside rectangle is called a(n) ________ . a. swim lane b. pool c. focus d. actor

b. informal

In a(n) ________ structure, some people have more influence or knowledge than appears on an organization chart. a. observational b. informal c. security d. formal

c. network administrators

In addition to controlling user access, ________ install, configure, manage, monitor, and maintain network applications. a. help desk staff members b. systems analysts c. network administrators d. database managers

b. business process

In addition to sequence diagrams and activity diagrams, ________ modeling can be used to represent the people, events, and interaction in a system. a. state transition b. business process c. unified d. inheritance

d. critical thinking skills

In addition to traditional hardware and software certifications, some firms are exploring ways to assess ________ . a. user support skills b. communication skills c. business skills d. critical thinking skills

C. data

In an information system, the system's raw material is ________ . A.. information B. knowledge C. data D. people

d. data

In an information system, the system's raw material is ________ . a. people b. knowledge c. information d. data

b. False

In an interview, closed-ended questions encourage spontaneous and unstructured responses. a. True b. False

d. gateway

In business process modeling notation, a(n) ________ is like a fork in the road, allowing the flow to go one way or another. a. finish day/date b. start day/date c. activity d. gateway

a. enterprise resource planning

In many large companies, applications called ________ systems provide cost-effective support for users and managers throughout the business. a. enterprise resource planning b. business support c. user productivity d. knowledge management

c. constraints

In order for a project to be successful, there must be a balance of cost, scope, and time against a set of ________ . a. milestones b. activities c. constraints d. tasks

c. project creep

In order to avoid ________ , the project scope should be defined as clearly as possible. a. intangible costs b. constraints c. project creep d. intangible benefits

c. Brooks' Law

In some situations, adding more people to a project might increase the time necessary to complete the project because of a principle called ________ . a. slack time b. project creep c. Brooks' Law d. open source

personal information manager

Includes a personal calendar and powerful contact management features

risk management plan

Includes a review of internal or external factors that might affect a project

cutover phase

Includes data conversion, testing, changeover to the new system, and training

project planning

Includes identifying all project tasks and estimating their completion time

project management

Includes planning, scheduling, and reporting on information system development

project reporting

Includes regular progress reports to management, users, and the project team

sequence diagram

Includes symbols representing classes, lifelines, messages, and focuses

project triangle

Includes three legs, which often represent cost, scope, and time

productivity software

Includes word processing, spreadsheet, and collaboration software programs

a. scalability

Information about projected future volume for all outputs, inputs, and processes is required in order to evaluate ________ . a. scalability b. agile methods c. sampling d. range-of-response questions

actor

Initiates a use case by requesting a system to perform a function or process

d. entities

Input data flows and output data flows are characteristics of ________ , which are included in the documentation that is entered into a data dictionary. a. processes b. records c. data stores d. entities

project scheduling

Involves the creation of a specific timetable, usually in the form of charts

c. 50

It is important for the interviewer to record facts and evaluate information following an interview because studies have shown that ________ percent of a conversation is forgotten within 30 minutes. a. 75 b. 25 c. 50 d. 33

a. 1

It is recommended that interviews be limited to no more than ________ hour(s). a. 1 b. 2.5 c. 1.5 d. 2

a. True

It is recommended that use cases and use case diagrams be organized so they can be linked to the appropriate class, state transition, sequence, and activity diagrams. a. True b. False

c. object-oriented

Java, Smalltalk, VB.Net, Python, and Perl are examples of ________ programming languages. a. business process b. unified c. object-oriented d. use case

rapid application development (RAD)

Joint application development focuses on team-based fact-finding, which is only one phase of the development process, whereas _______ is more like a compressed version of the entire process.

b. False

Knowledge workers develop long-range plans, called strategic plans, which define the company's overall mission and goals. a. True b. False

d. type

Length and ________ , which refers to whether data elements contain numeric, alphabetic, or character values, are attributes that are usually recorded and described in a data dictionary. a. sink b. selection c. source d. type

b. decomposing

Leveling may also be referred to as exploding, partitioning, or ________ . a. looping b. decomposing c. validating d. balancing

a. logical

Like a data flow diagram, a class diagram is a(n) ________ model, which evolves into a physical model and finally becomes a functioning information system. a. logical b. unified c. object d. class

a. decision tree

Like a decision table, a(n) ________ shows all combinations of conditions and outcomes, but presents them in a graphical format that many viewers find easier to interpret. a. decision tree b. iteration c. black box d. four-model approach

risk identification

Lists each risk and assesses the likelihood that it could affect a project

b. four-model

Many analysts follow a(n) ________ approach, which means they develop a physical model of the current system, a logical model of the current system, a logical model of the new system, and a physical model of the new system. a. Gane and Sarson b. four-model c. modular design d. Yourdon

a. True

Many organizations assign responsibility for evaluating systems requests to a computer resources committee. a. True b. False

b. systems review committee

Many organizations assign responsibility for evaluating systems requests to a group called a. technical support group b. systems review committee c. systems analysts d. top managers

c. systems review committee

Many organizations assign responsibility for evaluating systems requests to a group called the ________ . a. top managers b. technical support group c. systems review committee d. systems analysts

d. structured walk-through

Many project managers have project members review the work of other team members, which is referred to as a ________ . a. qualitative risk analysis b. bottom-up technique c. risk management plan d. structured walk-through

c. structured walk-throughs

Many project managers institute ________ , which are reviews of a project team member's work by other members of the team. a. predecessor tasks b. project triangles c. structured walk-throughs d. probable-case estimates

record

Meaningful combination of related data elements

schedule feasibility

Means that a project can be implemented in an acceptable time frame

operational feasibility

Means that a proposed system will be used effectively after it has been developed

encapsulation

Means that all data and methods are self-contained

economic feasibility

Means the projected benefits of a proposed system outweighs the estimated costs

a. management

Members of a project team regularly report their progress to the project manager, who in turn reports to ________ and users. a. management b. software developers c. network administrators d. project leaders

d. productivity

Microsoft Office is the best-known suite of ________ software. a. personal data management b. project data management c. graphics modeling d. productivity

a. True

Microsoft Outlook and Novell's GroupWise are examples of popular personal information managers, which include a personal calendar, a to-do list, and contact management features. a. True b. False

a. information management

Microsoft Outlook is a type of ________ program that includes a personal calendar and a to-do list with priorities and the capability to check off completed tasks. a. information management b. project data management c. graphics modeling d. productivity

critical path

Microsoft Project and other project management software can highlight the series of tasks that form the _______.

d. calendar view

Microsoft Project's ________ shows tasks, similar to a PERT chart, as an overlay on the actual calendar. a. task group b. gateway c. structured walk-through d. calendar view

c. graphic modeling

Microsoft Visio is a popular ________ tool that includes a library of templates, stencils, and shapes. a. personal data management b. project data management c. graphic modeling d. collaboration

b. fill-in

Microsoft Word can be used to create convenient ________ forms that include data fields, text boxes, and drop-down lists. a. stratified b. fill-in c. sequence d. observation

OneNote

Microsoft _______ is powerful information management software that allows an interviewer to record a meeting, store the results, and create a searchable file for easy access.

Rapid Economic Justification

Microsoft developed method for measuring total costs and benefits

b. False

Microsoft has developed a method for measuring scalability called Rapid Economic Justification (REJ). a. True b. False

network diagram

Microsoft's name for a PERT chart

d. nontechnical

Modeling involves graphical methods and ________ language that represent the system at various stages of development. a. closed-ended b. technical c. open-ended d. nontechnical

CASE

Modern _______ tools can help in simplifying the difficult task of maintaining full and accurate documentation for complex systems.

a. CASE

Modern ________ tools simplify the difficult task of maintaining full and accurate documentation for complex systems. a. CASE b. Gane and Sarson c. Yourdon d. pseudocode

b. iteration

Modular design is based on combinations of three logical structures, which are called sequence, selection, and ________ . a. length b. iteration c. type d. alias

d. project coordinator

Most large projects have a project manager and a ________ who handles administrative responsibilities for the team. a. project programmer b. project leader c. project analyst d. project coordinator

critical success factor

Must be achieved to fulfill a company's mission

parent

Object from which another object derives one or more of its attributes

b. objects

Object-oriented (O-O) analysis describes an information system by identifying things called ________ . a. pools b. objects c. methods d. attributes

a. True

Object-oriented methodology is popular because it provides an easy transition to O-O programming languages such as Java, Smalltalk, C++, Python, and Perl. a. True b. False

d. state

Objects can have a specific attribute, called a(n) ________ , that describes the object's current status. a. object model b. focus c. superclass d. state

d. subclass

Objects within a class can be grouped into a ________ , which is a more specific category within a class. a. superclass b. pool c. black box d. subclass

a. True

Objects within a class can be grouped into subclasses, which are more specific categories within a class. a. True b. False

a. IT director

On a systems review committee, the ________ usually serves as a technical consultant to ensure that committee members are aware of crucial issues, problems, and opportunities. a. IT director b. business analyst c. database administrator d. systems analyst

d. 9

On lower-level DFDs with multiple processes, it is recommended that no more than ________ process symbols be included. a. 7 b. 6 c. 8 d. 9

a. indirect

One problem with calculating TCO is that cost estimates tend to understate ________ costs such as user support and downtime productivity losses. a. indirect b. use case c. security d. direct

structured English

One rule to follow when writing in _______ is to use limited vocabulary, including standard terms used in the data dictionary and specific words that describe the processing rules.

b. external

Only ________ entities, that provide data to the system or receive output from the system, are included in data flow diagrams. a. diverging b. external c. internal d. exploding

System software

Operating system software, security software that protects the computer from intrusion, device drivers that communicate with hardware, and utility programs that handle data backup and disk management are what types of software.

pool

Outside rectangle in a typical business process modeling diagram

d. bottom-up

PERT is a ________ technique because it analyzes a large, complex project as a series of individual tasks. a. top-down b. quantitative c. qualitative d. bottom-up

data flow

Path for data to move from one part of an information system to another

c. stakeholders

People who have an interest in an information system are called ________ . a. shareholders b. consumers c. stakeholders d. staff

Stakeholders

People who have an interest in an information systems are called _______.

a. True

People working in teams can use collaboration software, such as Google Docs and Microsoft Web Apps, to access data and share files. a. True b. False

observation

Personal _______ is a fact-finding technique used by systems analysts to verify statements made in interviews and determine if procedures operate as they are described.

a. OneNote

Powerful information management software, such as Microsoft ________ , can be used to record a meeting, store the results, and create a searchable file for easy access. a. OneNote b. Outlook c. Visio d. Access

Moore's Law (Gordon Moore in 1965)

Prediction that the number of transistors on an integrated circuit chip would double about every 24 months is known as _________.

interview

Primary method of obtaining information during the preliminary investigation

b. probable-case

Prior to assigning a weight to each estimate, a project manager will make a best-case estimate, a(n) ________ estimate, and worst-case estimate for each task. a. risk-response b. probable-case c. person-day d. task-pattern

risk response plan

Proactive effort to anticipate a risk and describe a plan to deal with it

scatter diagram

Problem-solving tool that is sometimes referred to as a XY chart

logical structures

Process building blocks that must have a single entry and exit point

functional primitive

Process consisting of a single function that isn't exploded further

strategic planning

Process of identifying long-term organizational goals

engaged listening

Process of listening carefully and observing nonverbal communication

project creep

Process of projects expanding gradually without specific authorization

gray hole

Process that has input and output, but the input is unable to produce the output

black hole

Process that has input, but produces no output data flow

spontaneous generation

Process that produces output, but has no input data flow

risk management

Process whose purpose is to minimize the impact of risks on a project

b. logic

Processes contain the business ________ that transform data and produce the required results. a. dictionary b. logic c. structures d. records

Hawthorne Effect

Productivity improves when workers know they're being observed

Deliverables

Products that will be provided to the client at the product completion such as new pages or graphic elements created, and a timeline for their delivery.

Microsoft Project

Program having a dominant share of the project management software industry

c. scheduling

Project ________ involves selecting and staffing a project team and assigning specific tasks to team members. a. reporting b. planning c. scheduling d. monitoring

a. monitoring

Project ________ requires guiding, supervising, and coordinating the project team's workload. a. monitoring b. planning c. scheduling d. reporting

a. True

Project managers often use a weighted formula for estimating the duration of each task. a. True b. False

brainstorming

Project status meetings provide a project manager with an opportunity to seek input and conduct _______ sessions.

discretionary projects

Projects where management has a choice in implementing them

d. discretionary

Projects where management has a choice in implementing them are called ________ projects. a. nondiscretionary b. intangible c. tangible d. discretionary

b. False

Projects where management has a choice in implementing them are called voluntary projects. a. True b. False

nondiscretionary projects

Projects where management has no choice in implementing them

CASE tools

Provide an overall framework for documenting system components

b. False

Pseudocode is a subset of standard English that describes logical processes clearly and accurately. a. True b. False

risk matrix

A Microsoft Excel XY chart can be used to display a(n) _______ that shows risk probability and potential impact.

Vertical

A _______ system is designed to meet the unique requirements of a specific business or industry, such as a Web-based retailer, a medical practice, or an auto dealership.

d. constraint

A ________ , which is a requirement or condition that the system must satisfy or an outcome it must achieve, can involve hardware, software, time, policy, law or cost. a. critical success factor b. tangible cost c. business case d. constraint

b. horizontal system

A ________ can be adapted for use in many different types of companies. a. legacy system b. horizontal system c. vertical system d. data system

a. feasibility study

A ________ examines operational, technical, economic, and schedule factors. a. feasibility study b. constraint c. business case d. mission statement

b. business process

A ________ is a specific set of transactions, events, and results that can be described and documented. a. business system b. business process c. business model d. business profile

c. vertical system

A ________ is designed to meet the unique requirements of a specific business or industry. a. legacy system b. horizontal system c. vertical system d. data system

b. strategic plan

A ________ looks beyond day-to-day activities and focuses on a horizon that is three, five, ten, or more years in the future. a. business case b. strategic plan c. SWOT analysis d. critical success factor

b. gray hole

A ________ process has at least one input and one output, but the input is clearly insufficient to produce the output shown. a. spontaneous generation b. gray hole c. black hole d. data structure

d. knowledge management

A ________ system uses inference rules, which are logical rules that identify patterns and relationships. a. user productivity b. transaction processing c. business support d. knowledge management

b. False

A business profile is a specific set of transactions, events, and results that can be described and documented. a. True b. False

a. superclass

A class can belong to a more general category called a ________ . a. superclass b. pool c. black box d. subclass

b. False

A class diagram is a physical model that evolves into a logical model and finally becomes a functioning information system. a. True b. False

a. 4

A common approach to calculating expected task duration is to use a ratio of B = 1, P = ________ , and W =1. a. 4 b. 1 c. 2 d. 5

b. top managers

A company's ________ focus on the overall business enterprise and use IT to set the company's course and direction. a. team leaders b. top managers c. middle managers d. knowledge workers

d. field

A data item, which is also referred to as a(n) ________ , is the smallest piece of data that has meaning within an information system. a. alias b. record c. terminator d. field

c. process

A data store symbol is being used incorrectly if an analyst attempts to connect two data stores by a data flow without an intervening ________ . a. level b. record c. process d. rule

b. record

A data structure, which is also referred to as a(n) ________ , is a combination of related data elements that is included in a data flow or retained in a data store. a. alias b. record c. terminator d. field

b. False

A decision table is a physical structure that shows every combination of conditions and outcomes. a. True b. False

a. strategic business

A disadvantage of RAD is that it stresses the mechanics of a system without emphasizing the company's ________ needs. a. strategic business b. scalability c. documentation d. security

c. current

A four-model development approach may not be an option when tight project schedules, as well as management and user pressure, limit a systems analyst's ability to create models of a(n) ________ system. a. proposed b. new c. current d. optimal

class

A group of similar objects

c. one

A guideline for drawing data flow diagrams is to fit the diagram on ________ page(s). a. two b. three c. one d. four

d. reference

A guideline for drawing data flow diagrams is to provide a unique name and ________ number for each process. a. context b. decision c. sequence d. reference

b. process

A guideline for drawing data flow diagrams is to use the name of the information system as the ________ name in the context diagram. a. domain b. process c. parent d. business

inference rules

A knowledge management system uses _______, which are logical rules that identify data patterns and relationships.

Server Farm

A large concentration of servers working together.

modular

A major advantage of object-oriented designs is that systems analysts can save time and avoid errors by using _______ objects.

b. False

A mitigation plan identifies a condition that would initiate a contingency plan. a. True b. False

b. process description

A model that is accurate, complete, and concise can be created using ________ tools, such as structured English, decision tables, and decision trees. a. leveling b. process description c. decomposing d. balancing

superclass

A more general category in which a class can belong

c. black box

A network router is an example of a ________ because cables carry data into and out of it, but the router's internal operations are not revealed. a. black hole b. gray hole c. black box d. data structure

a. tangible

A new scheduling system that reduces overtime is an example of a(n) ________ benefit. a. tangible b. nondiscretionary c. discretionary d. intangible

task id

A number or code that provides unique identification

Yourdon

A popular data flow diagram symbol set

b. Microsoft Visio

A popular graphics modeling tool that can be used to create many types of charts and diagrams is ________ . a. Microsoft Access b. Microsoft Visio c. Evernote d. Novell's GroupWise

c. fishbone diagram

A popular technique for investigating causes and effects is called a ________ . a. SWOT analysis b. Pareto chart c. fishbone diagram d. scatter diagram

a. fishbone diagram

A popular technique for investigating causes and effects is called a ________ . a. fishbone diagram b. XY chart c. Pareto chart d. scatter diagram

a. True

A potential disadvantage of rapid application development is its lack of emphasis on a company's strategic business needs. a. True b. False

a. True

A principle called Brook's Law demonstrates that adding more people to a project might increase the time necessary to complete the project. a. True b. False

d. project creep

A process referred to as ________ can increase risk when a project does not have clear scope definitions. a. slack time b. Brooks' Law c. risk identification d. project creep

black box

A process symbol in a data flow diagram

a. looping

A process that continues to print payroll checks until it reaches the end of the payroll file is an example of ________ . a. looping b. balancing c. leveling d. sequencing

c. status

A project ________ meeting provides team members with an opportunity to share information, discuss common problems, and explain new techniques. a. monitoring b. scheduling c. status d. reporting

c. PERT chart

A project manager can use a ________ to convert task start and finish times to actual dates by laying out an entire project on a calendar. a. quantitative risk analysis b. structured walk-through c. PERT chart d. Gantt chart

b. False

A project manager's best course of action is to attempt to handle all situations single-handedly and avoid alerting management until a problem is serious. a. True b. False

project manager

A project team member who is usually a senior systems analyst

b. False

A project triangle displays the same information as the Gantt chart, but uses task boxes to include much more detail. a. True b. False

benchmark

A prototype can serve as an initial model that is used as a(n) ______ to evaluate the finished system, or the prototype itself can develop into the final version of the system.

survey

A questionnaire, which can be used to obtain information about a wide range of topics, can also be referred to as a(n) _______.

d. management

A risk ________ plan includes a review of a project's scope, stakeholders, budget, schedule, and any other internal or external factors that might affect a project. a. identification b. response c. analysis d. management

b. response

A risk ________ plan is a proactive effort to anticipate risk and describe an action plan to deal with it. a. identification b. response c. management d. analysis

a. True

A risk management plan should define project roles and responsibilities, risk management methods and procedures, categories of risk, and contingency plans. a. True b. False

System

A set of related components that produces specific results.

d. integrated

A significant advantage of ________ project management software is that it allows the project manager to adjust schedules, estimates, and resource assignments rapidly. a. quantitative b. gateway c. structured d. integrated

business process modeling notation (BPMN)

A standard language used during requirements modeling that includes various shapes and symbols to represent events, processes, and workflows.

a. True

A state transition diagram shows how an object changes from one state to another, depending on events that affect the object. a. True b. False

d. systems analysis and design

A step-by-step process for developing high-quality information systems is referred to as ________ . a. software packaging b. systems application c. information design d. systems analysis and design

Systems Analysis and Design

A step-by-step process for developing high-quality information systems.

Mission-critical system

A system that is vital to a company's operations. For example, an order processing system.

b. total cost of ownership

A system's ________ includes ongoing system support and maintenance costs, as well as acquisition costs. a. intangible cost b. total cost of ownership c. tangible cost d. constraint

a. corporate culture

A systems analyst must understand a firm's ________ , which is a set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business. a. corporate culture b. corporate climate c. corporate behavior d. corporate identity

b. False

A task ID does not need to be unique in a project and should be brief and descriptive. a. True b. False

actor

A use case is initiated by a(n) _______, which is an external entity that requests the system to perform a function or process.

d. actor

A user assumes the role of a(n) ________ in a use case diagram. a. project sponsor b. project leader c. recorder d. actor

d. intangible

A user-friendly system that improves employee job satisfaction is an example of a(n) ________ benefit. a. tangible b. nondiscretionary c. discretionary d. intangible

c. Pareto chart

A widely used tool for visualizing issues that need attention is the ________ , which is drawn as a vertical bar graph. a. fishbone diagram b. scatter diagram c. Pareto chart d. XY chart

use case description

A(n) _______ documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks and actions required for successful completion, a description of alternative courses of action, preconditions, postconditions, and assumptions.

systems review committee

A(n) _______ evaluates systems requests at most large companies.

sequence diagram

A(n) _______ graphically documents the use case by showing the classes, the messages, and the timing of the messages.

decision tree

A(n) _______ is a graphical representation of the conditions, actions, and rules found in a decision table.

corporate culture

A(n) _______ is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

object

A(n) _______ represents a real person, place, event, or transaction.

person-day

A(n) _______ represents the work that one person can complete in one day.

data element

A(n) _______, which is the smallest piece of data that has meaning within an information system, may also be referred to as a data item or field.

c. record

A(n) ________ , also known as a data structure, is a meaningful combination of related data elements that is included in a data flow or retained in a data store. a. logical structure b. field c. record d. domain

a. record

A(n) ________ , also known as a data structure, is a meaningful combination of related data elements that is included in a data flow or retained in a data store. a. record b. field c. logical structure d. domain

a. milestone

A(n) ________ , or event, is a recognizable reference point that you can use to monitor a project's progress. a. milestone b. gateway c. activity d. task

d. decision table

A(n) ________ , which can be created in Microsoft Word, PowerPoint, or Excel, is a logical structure that shows every combination of conditions and outcomes. a. process table b. domain c. alias d. decision table

b. agile method

A(n) ________ attempts to develop a system incrementally by building a series of prototypes and constantly adjusting them to user requirements. a. hybrid method b. agile method c. object-oriented analysis d. structured analysis

b. information system

A(n) ________ combines technology, people, and data to provide support for business functions. a. server farm b. information system c. object-oriented analysis d. preliminary investigation

c. information system

A(n) ________ combines technology, people, and data to provide support for many business functions. a. electronic system b. communal system c. information system d. active data system

a. method

A(n) ________ defines specific tasks that an object can perform. a. method b. attribute c. state d. class

d. sequence

A(n) ________ diagram is a dynamic model of a use case, showing the interaction among classes during a specified time period. a. activity b. class c. use case d. sequence

a. context

A(n) ________ diagram is a top-level view of an information system that shows the system's boundaries and scope. a. context b. parent c. child d. iteration

c. activity

A(n) ________ diagram resembles a horizontal flowchart that shows the actions and events as they occur. a. class b. sequence c. activity d. state transition

d. state transition

A(n) ________ diagram shows how an object changes from one state to another, depending on events that affect the object. a. activity b. use case c. class d. state transition

c. class

A(n) ________ diagram shows the object classes and relationships involved in a use case. a. activity b. use case c. class d. state transition

c. sequence

A(n) ________ diagram shows the timing of interactions between objects as they occur. a. functional decomposition b. use case c. sequence d. data flow

a. fill-in

A(n) ________ form, which is an alternative to a traditional paper-based survey, can be used to collect data on the Internet or a company intranet. a. fill-in b. closed-ended c. open-ended d. data flow

a. focus

A(n) ________ indicates when an object sends or receives a message and is identified by a narrow vertical shape that covers the lifeline. a. focus b. subclass c. instance d. activity

a. attribute

A(n) ________ is a characteristic that describes an object. a. attribute b. class c. instance d. message

a. survey

A(n) ________ is a document containing a number of standard questions that can be sent to many individuals. a. survey b. use case diagram c. systems requirements document d. sequence diagram

c. business process model

A(n) ________ is a graphical representation of one or more business processes. a. analytic profile b. business model c. business process model d. business profile

b. class

A(n) ________ is a group of similar objects. a. attribute b. class c. state d. message

c. biometric device

A(n) ________ is a hardware-based security control that can identify a person by a retina scan or by mapping a facial pattern. a. RFID b. encryption c. biometric device d. EPC

d. broad viewpoint

A(n) ________ is a potential advantage of a committee approach to systems request evaluation. a. action on request delay b. member's bias c. internal political difference d. broad viewpoint

a. instance

A(n) ________ is a specific member of a class. a. instance b. state c. message d. attribute

d. use case diagram

A(n) ________ is a visual summary of several related use cases within a system or subsystem. a. state transition diagram b. activity diagram c. class diagram d. use case diagram

d. survey

A(n) ________ is not as flexible as a series of interviews, but it is less expensive, generally takes less time, and can involve a broad cross-section of people. a. operations observation b. data analysis c. documentation review d. survey

c. system requirements document

A(n) ________ is the end product of the systems analysis phase. a. histogram b. stratified sample c. system requirements document d. sequence diagram

c. system requirements document

A(n) ________ is the end product of the systems analysis phase. a. stratified sample b. sequence diagram c. system requirements document d. histogram

a. process

A(n) ________ receives input data and produces output that has a different content, form, or both. a. process b. domain c. entity d. alias

c. supply chain

A(n) ________ refers to all the companies who provide the materials, services, and functions needed to provide a product to a customer. a. raw material source b. electronic data interchange c. supply chain d. global marketplace

d. object

A(n) ________ represents a person, place, event, or transaction that is significant to an information system. a. child b. parent c. pool d. object

d. use case

A(n) ________ represents the steps in a specific business function or process. a. superclass b. activity c. subclass d. use case

d. use case

A(n) ________ represents the steps in a specific business function or process. a. superclass b. subclass c. activity d. use case

c. use case

A(n) ________ represents the steps in a specific business function or process. a. swim lane b. pool c. use case d. inheritance

c. object relationship

After a system's objects, classes, and relationships have been identified, a(n) ________ diagram that provides an overview of the system should be developed. a. use case b. sequence c. object relationship d. activity

scrum

Agile approach whose name comes from a rugby term

b. adaptive

Agile, or ________ , methods are very flexible and efficient in dealing with change and reflect a set of community-based values. a. stratified b. adaptive c. functional d. constructive

user design phase

Allows users to understand, modify, and approve a working model of a system

slack time

Amount of time a task can be late without delaying a project's completion date

fishbone diagram

An Ishikawa diagram, which is a popular technique for investigating causes and effects, is also called a(n) _______.

d. technical

An assessment of whether or not a proposed platform has sufficient capacity for future needs is part of ________ feasibility. a. economic b. schedule c. operational d. technical

b. False

An attribute defines specific tasks that an object can perform. a. True b. False

a. True

An entity name is the singular form of a department, outside organization, other information system, or person. a. True b. False

c. operational

An evaluation of whether or not the new system will result in a workforce reduction is part of ________ feasibility. a. economic b. schedule c. operational d. technical

risk

An event that could affect a project negatively

control

An example of a(n) _______ requirement is when a system must maintain separate levels of security for users and the system administrator.

c. nondiscretionary

An example of a(n) ________ project is a system for the annual updates to payroll. a. tangible b. discretionary c. nondiscretionary d. intangible

d. economy

An example of an external factor that affects corporate IT choices is the ________ . a. strategic plan b. existing system and data c. IT department d. economy

a. child

An exploded data flow diagram includes a higher-level diagram called the parent and a lower-level diagram referred to as the ________ . a. child b. branch c. sibling d. subordinate

a. actor

An external entity, called a(n) ________ , initiates a use case by requesting the system to perform a function or process. a. actor b. child c. black box d. parent

weight

An importance value that managers assign to each time estimate

Tables

An information system can store data in various locations called _______.

b. relationship

An object ________ diagram, which will provide an overview of the system, is prepared after the objects, classes, and relationships have been identified. a. case b. relationship c. sequence d. transition

a. black box

An object can be viewed as a ________ because a message to the object triggers changes within the object without specifying how the changes must be carried out. a. black box b. actor c. system boundary d. lifeline

a. attributes

An object has certain ________ , which are characteristics that describe the object. a. attributes b. classes c. messages d. methods

c. design

An object's attributes are defined by the systems analyst during the systems ________ process. a. planning b. implementation c. design d. integration

a. mission-critical system

An order processing system that is necessary for a company to do business is an example of a ________ . a. mission-critical system b. user productivity system c. vertical system d. business support system

a. business profile

An overview of a company's mission, functions, organization, products, services, customers, suppliers, competitors, constraints, and future direction is referred to as a ________ . a. business profile b. business process c. business model d. business system

structured analysis

Analysis that includes transformation of entities, data stores, and processes

Ishikawa diagram

Analysis tool that is also referred to as a fishbone diagram

fishbone diagram

Analysis tool that represents possible causes of a problem as a graphical outline

c. structured English

Analysts must use indentation, a limited vocabulary, and the three building blocks of sequence, selection, and iteration, when documenting in ________ . a. pseudocode b. business logic c. structured English d. standard English

process modeling notation

Analysts often create models that use a standard language called business _______ during requirements modeling.

c. activity

Any work that has a beginning and an end and requires the use of company resources, such as people, time, or money, is referred to as a task or a(n) ________ . a. milestone b. event c. activity d. estimate

d. Microsoft Excel spreadsheet

As a planning tool, some systems developers prefer to use a ________ because it is easy to display priorities and the relative importance of planning assumptions. a. Microsoft Word table b. text-based method c. CASE tool d. Microsoft Excel spreadsheet

d. Visible Analyst

As an alternative to recording notes in online or manual forms, some analysts prefer to enter the information directly into a CASE tool, such as ________ . a. Gane and Sarson b. Yourdon c. structured English d. Visible Analyst

c. document review

As part of a(n) ________ , copies of actual forms and operating documents currently in use should be obtained. a. observation b. random sample c. document review d. site visit

Zachman Framework

Asks traditional fact-finding questions in a systems development context

d. human resources

Assembling and guiding a development team is part of the ________ factor that is considered when developing duration estimates. a. project size b. constraints c. experience with similar projects d. human resources

modular design

Based on combinations of three logical structures

informal structure

Based on interpersonal relationships and can develop from physical proximity

activity

Basic units of work that a project manager plans, schedules, and monitors

a. True

Because it allows companies to reach the global marketplace, B2B is especially important to smaller suppliers and customers who need instant information about prices and availability. a. True b. False

tangible benefits

Benefits that can be measured in dollars

b. actors

Business process modeling works well with object modeling, because both methods focus on the ________ and the way they behave. a. pools b. actors c. children d. parents

questionnaire

Can be used to obtain information about a wide range of topics

document review

Can help in understanding how the current system is supposed to work

biometric device

Can identify a person by retina scan or by mapping a facial pattern

quantitative risk analysis

Can involve a modeling process called what-if analysis

task pattern

Can involve dependent, multiple successor, and multiple predecessor tasks

attribute

Characteristic that describes an object

requirements planning phase

Combines elements of the systems planning and systems analysis phases

histogram

Common tool for showing the distribution of questionnaire or sampling results

Enterprise applications

Company-wide applications are known as _______ _______, and include payroll systems, order processing systems, and company communications networks.

iteration

Completion of a process step that is repeated until a specific condition changes

selection

Completion of one of two or more process steps based on results of a test

c. functional primitives

Complex systems, which have many processes, require analysts to create lower-level DFDs until all processes are identified as ________ . a. types b. control structures c. functional primitives d. sinks

b. computer-aided software engineering

Computer-aided systems engineering, which uses CASE tools to help systems analysts develop and maintain information systems, is also called ________ . a. computer-aided structural engineering b. computer-aided software engineering c. computer-assisted systems engineering d. computer-assisted software engineering

polymorphism

Concept that a message gives different meanings to different objects

tasks (activities)

Conducting interviews, designing a report, selecting software, waiting for the delivery of equipment, and training users are examples of _______.

requirements

Consideration of development strategies, object modeling, data and process modeling, and _______ modeling are the four main activities of the systems analysis phase.

Data

Consists of basic facts that are the system's raw material. It is the raw material that an information system transforms into useful information.

Hardware

Consists of everything in the physical layers of the information system. For example, servers, workstations, networks, telecommunications equipment, fiber-optic cables, mobile devices, scanners, digital capture devices, etc.

intangible costs

Costs that are difficult to measure in dollars but are important to a company

tangible costs

Costs that can usually be measured in dollars

a. True

Customer relationship management systems integrate all customer-related events and transactions, including marketing, sales, and customer service activities. a. True b. False

d. development

Cutting ________ time and expense by involving users in every phase of systems development is the main objective of RAD. a. scalability b. sampling c. processing d. development

source

Data flow diagram entity that supplies data to a system

terminators

Data origins and final destinations on a data flow diagram

Information

Data that has been transformed into output that is valuable to users.

b. False

Database specialists design and construct Web pages, monitor traffic, manage hardware and software, and link Web-based applications to the company's information systems. a. True b. False

process description

Decision tables are an example of a(n) _______ tool that can be used to create accurate, complete, and concise models.

project scope

Defines the specific boundaries, or extent, of a project

b. project scope

Defining the specific boundaries, or extent, of the project is referred to as determining the ________ . a. critical success factors b. project scope c. project creep d. constraints

physical model

Describes how a system will be constructed in the systems design phase

cardinality

Describes how instances of one class relate to instances of another class

structured English

Describes logical processes clearly and accurately

business process model (BPM)

Describes one or more business process

Processes

Describes the tasks and business functions that users, managers, and IT staff members perform to achieve specific results.

Critical Path Method

Developed by private industry to manage complex projects

program evaluation review technique

Developed by the U.S. Navy to manage very complex projects

b. large

Developing time and cost estimates using the experience method may not be reliable for projects involving ________ systems. a. medium-size b. large c. small d. Web-based

c. requirements

Development of a graphical model of an information system is based on the fact-finding that is completed during ________ modeling. a. decision b. logical c. requirements d. physical

b. False

Diagram 0 contains a single process symbol and provides the most general view of an information system. a. True b. False

object relationship diagram

Diagram developed after objects, classes, and relationships have been identified

d. functional primitives

Documentation that pertains to processes should include a description of the process's characteristics and for ________ , a process description, which is a model that documents processing steps and business logic. a. sources b. business rules c. entities d. functional primitives

use case description

Documents the name and description of a use case as well as the actor

a. project leader

During a typical JAD session, the ________ prepares a report that will be sent to JAD team members. a. project leader b. user c. group leader d. top management

c. user design

During the ________ phase of the RAD model, prototypes and models that represent all systems processes, outputs, and inputs are developed. a. construction b. requirements planning c. user design d. sampling

d. systems analysis

During the sixth step of the preliminary investigation, a systems analyst may recommend that the project proceed to the ________ phase. a. SWOT analysis b. systems implementation c. systems testing d. systems analysis

d. organization charts

During the third step of the preliminary investigation, a systems analyst should obtain ________ to understand the functions and identify the people to interview. a. surveys b. fishbone diagrams c. systems documentation d. organization charts

a. True

Economic feasibility means that the projected benefits of a proposed system outweigh the estimated costs. a. True b. False

d. reporting

Effective project ________ requires strong communication skills and a sense of what others want and need to know about the project. a. monitoring b. planning c. scheduling d. reporting

d. electronic data interchange

Electronic commerce between two companies using a data share arrangement was initially referred to as ________ . a. Internet module exchange b. transaction processing c. B2C d. electronic data interchange

relationships

Enable objects to communicate and interact as they perform business functions

inheritance

Enables an object to derive one or more of its attributes from another object

b. modular

Encapsulation allows objects to be used as ________ components anywhere in the system, because objects send and receive messages but do not alter the internal methods of other objects. a. legacy b. modular c. predefined d. wireless

requirements model

End product of joint application development

qualitative risk analysis

Estimates the probability that a risk will occur and its degree of impact

SWOT analysis

Examines a firm's technical, human, and financial resources

feasibility study

Examines operational, technical, economic, and schedule factors

Smalltalk

Example of an object-oriented program language

black box

Example of encapsulation that does not need or want outside interference

event

Examples may include the start of user training or completion of interviews

d. knowledge workers

Examples of ________ include systems analysts, programmers, accountants, researchers, trainers, and human resource specialists. a. operational employees b. top managers c. middle managers d. knowledge workers

b. hardware

Examples of ________ include workstations, mobile devices, servers, and scanners. a. software b. hardware c. data d. information

construction phase

Focuses on program and application development tasks similar to the SDLC

systems request

Formal way of asking for IT support and starting point for most projects

radio frequency identification

RFID stands for _______.

milestone

Recognizable reference point that can be used to monitor progress

Information Technology (IT)

Refers to the combination of hardware, software, and services that people use to manage, communicate, and share information.

Software

Refers to the programs that control the hardware and produce the desired information or results.

mission statement

Reflects a firm's vision, purpose, and values

entity

Represented as a rectangle in a data flow diagram

use case

Represents the steps in a specific business function or process

constraint

Requirement or condition a system must satisfy or an outcome it must achieve

construction

Requirements planning, user design, _______ , and cutover are the four phases of the rapid application development model.

c. output

Requiring a Web site to report online volume statistics every four hours is an example of a(n) ________ requirement. a. control b. input c. output d. performance

a. process

Requiring a prescription system to automatically generate insurance claim forms is an example of a(n) ________ requirement. a. process b. input c. output d. performance

b. control

Requiring a system to provide logon security at the operating system level and at the application level is an example of a(n) ________ requirement. a. process b. control c. output d. performance

activity diagram

Resembles a horizontal flowchart that shows actions and events as they occur

focus

Sequence diagram symbol that is identified by vertical shape covering a lifeline

dynamic modeling tool

Sequence diagrams and activity diagrams are examples of this type of tool

d. dynamic

Sequence diagrams, state transition diagrams, and activity diagrams are ________ modeling tools that can help a systems analyst understand how objects behave and interact with the system. a. static b. methods c. unified d. dynamic

system requirement

Serves as a benchmark to measure the overall acceptability of a new system

data flow diagram (DFD)

Shows how a system stores, processes, and transforms data

state transition diagram

Shows how an object changes from one state to another

calendar view

Shows tasks as an overlay on the actual calendar

class diagram

Shows the object classes and relationships involved in a use case

logical model

Shows what a system must do, regardless of how it is implemented physically

system boundary

Shows what is included and what is not included in a system

entity name

Singular form of a department, outside organization, other system, or person

a. True

Slack time is the amount of time a task can be late without pushing back the completion date of an entire project. a. True b. False

unstructured brainstorming

Small group discussion in which anyone can speak at any time

structured brainstorming

Small group discussion in which each participant speaks when it is his turn

brainstorming

Small group discussion of a specific problem, opportunity, or issue

data element

Smallest piece of data that has meaning within an information system

b. False

Software consists of everything in the physical layer of the information system. a. True b. False

System software and application software

Software consists of what two types?

System software

Software that controls the flow of data provides data security, and manages network operations is what type of software?

System software

Software type that manages the hardware components, which can include a single workstation or a global network with many thousands of clients. Supplied by either the hardware manufacturer or purchased by company through a vendor.

d. neutral location

Some analysts believe that the best location for conducting interviews is a(n) ________ because interruptions will be kept to a minimum. a. interviewer's meeting room b. interviewer's office c. interviewee's office d. neutral location

c. interviewee's office

Some analysts believe that the best location for conducting interviews is a(n) ________ because it can make the interviewee feel comfortable during the meeting. a. offsite location b. interviewer's office c. interviewee's office d. neutral location

encryption

Some common security controls include passwords, various levels of user access, and _______, or coding data to keep it safe from unauthorized users.

d. encryption

Some common security controls include various levels of user access, ________ , and passwords. a. XY charts b. CASE tools c. Pareto charts d. encryption

b. IT department

Some companies still see the role of the ________ as a gatekeeper, responsible for screening and evaluating systems requests. a. consulting group b. IT department c. middle management team d. senior management team

b. electronic product code

Some industry experts predict that bar code technology will be overshadowed in the future by ________ technology. a. just-in-time b. electronic product code c. electronic data interchange d. supply chain management

a. True

Sometimes companies will waive educational requirements if a candidate for employment has significant experience, skills, or professional certifications. a. True b. False

b. source

Specification of a data element's ________ , which is the set of values permitted for a data element, would be included in a data dictionary as an acceptable values attribute. a. default value b. source c. domain d. type

G. All of the above

Stakeholders include which of the following: A. End users B. Programmers C. Management D. IT Staff E. Analysts F. None of the above G. All of the above

output data flows

Standard DFD names for the data flows leaving an entity

attributes

Standard DFD names that enter or leave a data store

data repository

Storehouse of information that is also called a data dictionary

c. mission statement

Strategic planning starts with a ________ that reflects the firm's vision, purpose, and values. a. case for action b. project scope c. mission statement d. business case

a. True

Stronger controls and reduced cost are two of the main reasons for systems requests. a. True b. False

a. predictive

Structured analysis is called a ________ approach because it is based on an overall plan. a. predictive b. foundation c. managed d. basic

time

Successful projects must balance cost, scope, and _______ against a set of constraints.

leading questions

Suggest or favor a particular reply

case for action

Summary of a project request and a specific recommendation

scalability

System's ability to handle future increases in business volume and transactions

Pareto chart

Systems analysts may use a(n) _______, which is a widely used tool for visualizing issues that need attention.

a. sink

Systems analysts refer to an entity that supplies data to a system as a source, and an entity that receives data from the system as a(n) ________ . a. sink b. record c. primitive d. field

a. CASE

Systems analysts rely on ________ tools to speed up the process of creating diagrams, which can be time consuming and tedious if completed by hand. a. CASE b. O-O c. UML d. BPM

c. repository

Systems analysts use a data ________ to collect, document, and organize specific facts about a system, such as the contents of data flows. a. table b. structure c. repository d. tree

c. JAD

Systems developers use ________ , a team-based approach, whenever group input and interaction are desired. a. BPMN b. RAD c. JAD d. UML

c. RAD

Systems developers use ________ , a team-based technique, to speed up information systems development and produce a functioning information system. a. BPMN b. JAD c. RAD d. UML

True

Systems planning is the first of five phases in the systems development life cycle (SDLC). A. True B. False

c. systems development life cycle

Systems planning, systems analysis, systems design, systems implementation, and systems support and security are the five steps of the ________ model. a. business b. business process c. systems development life cycle d. spiral

customer relationship management

Systems that integrate all customer-related events and transactions

c. duration

Task ________ can be measured in person-days, which are units that represent the work that one person can complete in one day. a. groups b. patterns c. duration d. management

c. patterns

Task ________ determine the order in which tasks are performed. a. groups b. names c. patterns d. IDs

method

Task or function that an object performs when it receives a message or command

c. statement

Task patterns can be identified by looking carefully at the wording of the task ________ . a. name b. ID c. statement d. summary

work breakdown structure

Tasks in a(n) _______ must be arranged in a logical sequence called a task pattern.

technical feasibility

Technical resources needed to develop, purchase, install, or operate a system

Hardware, software, data, processes, people

The 5 key components of an information system.

b. False

The Critical Path Method (CPM) was developed by the U.S. Navy to manage very complex projects. a. True b. False

origin

The DFD beginning for a data flow

destination

The DFD ending point for a data flow

d. store

The Gane and Sarson symbol for a data ________ is a flat rectangle that is open on the right side and closed on the left side. a. tree b. element c. item d. store

b. False

The Hawthorne Effect is a model that asks traditional fact-finding questions in a systems development context. a. True b. False

c. systems review committee

The IT director usually serves as a technical consultant to ensure that members of the ________ are aware of crucial issues, problems, and opportunities. a. discretionary project b. preliminary investigation c. systems review committee d. business case

c. U.S. Navy

The Program Evaluation Review Technique was developed by the ________ to manage very complex projects. a. U.S. Army b. private sector c. U.S. Navy d. IT industry

a. U.S. Navy

The Program Evaluation Review Technique was developed by the ________ to manage very complex projects. a. U.S. Navy b. IT industry c. U.S. Army d. private sector

d. oval

The UML symbol for a use case is a(n) ________ with a label that describes the action or event. a. square b. diamond c. triangle d. oval

c. stick figure

The UML symbol for an actor is a(n) ________ with a label that identifies the actor's role. a. half circle b. face icon c. stick figure d. arrow

a. True

The Unified Modeling Language is a popular technique for documenting and modeling a system. a. True b. False

a. True

The Unified Modeling Language uses object-oriented design concepts and provides various graphical tools, such as use case diagrams and sequence diagrams. a. True b. False

b. Zachman Framework

The Visible Analyst CASE tool includes a(n) ________ interface that allows users to view a systems project from different perspectives and levels of detail. a. Evernote b. Zachman Framework c. Rapid Economic Justification d. Unified Modeling Language

c. scatter diagram

The XY chart, sometimes called a(n) ________ , is a problem-solving tool. a. Ishikawa diagram b. fishbone diagram c. scatter diagram d. Pareto chart

findings

The ______ section of a typical preliminary investigation report contains the results of the investigation, including a description of the project's scope, constraints, and feasibility.

Visible Analyst

The _______ CASE tool includes a Zachman Framework interface that allows users to view a systems project from different perspectives and levels of detail.

b. recorder

The ________ documents the results of JAD sessions and works with systems analysts to build system models and develop CASE tool documentation. a. user b. recorder c. manager d. JAD project leader

a. case for action

The ________ is a section of the preliminary investigation report that includes a summary of the project results and a specific recommendation. a. case for action b. systems request summary c. mission statement d. business case

d. UML

The ________ is a widely used method of visualizing and documenting an information system. a. BPM b. O-O c. SQL d. UML

d. UML

The ________ is a widely used method of visualizing and documenting an information system. a. ISO b. O-O c. BPM d. UML

a. UML

The ________ is a widely used method of visualizing and documenting an information system. a. UML b. O-O c. SQL d. BPM

d. risk response plan

The ________ is effective if the overall impact of a risk can be reduced by triggering timely and appropriate action. a. quantitative analysis b. qualitative analysis c. risk management plan d. risk response plan

d. interview

The ________ is the primary method of obtaining information during a preliminary investigation. a. survey b. operations observation c. documentation review d. interview

c. interview

The ________ is the primary method of obtaining information during the preliminary investigation. a. survey b. documentation review c. interview d. data analysis

a. waterfall

The ________ model shows sequential SDLC phases, but it is common for several phases to interact during the development process. a. waterfall b. unified c. business process d. requirements

d. business case

The ________ refers to the reasons, or justification, for a proposal. a. case for action b. fishbone diagram c. project scope d. business case

c. business case

The ________ refers to the reasons, or justification, for a proposal. a. fishbone diagram b. project scope c. business case d. case for action

b. UML

The ________ represents an object as a rectangle with the object name at the top, followed by the object's attributes and methods. a. O-O b. UML c. SQL d. BPM

a. Bizagi Modeler

The ________ site offers free BPM software that uses a swimming pool and swim lanes to represent interactive business processes and events. a. Bizagi Modeler b. Visible Analyst c. IBM d. Microsoft

four-model

The additional cost and time associated with developing a logical and physical model of a system is one disadvantage of the_______ approach.

duration

The amount of time it will take to complete a task

b. slack

The amount of time that a task can be late without delaying the completion date of an entire project is called ________ time. a. risk b. slack c. worst-case d. creep

c. encapsulation

The black box concept is an example of ________ , which means that all data and methods are self-contained. a. polymorphism b. cardinality c. encapsulation d. inheritance

a. cardinality

The class diagram includes a concept called ________ , which describes how instances of one class relate to instances of another class. a. cardinality b. state transition c. inheritance d. polymorphism

d. eBay

The company that has transformed a traditional auction concept into a popular and successful method of selling goods and services online is ________ . a. Facebook b. Microsoft c. IBM d. eBay

b. critical path

The completion of a project will be delayed if any task on the ________ falls behind schedule. a. risk management plan b. critical path c. work breakdown structure d. testing review

a. True

The default value is the value for a data element if a value otherwise is not entered for it. a. True b. False

a. system requirement document

The deliverable for the systems analysis phase is the ________ , which describes management and user requirements, costs and benefits, and outlines alternative development strategies. a. system requirement document b. process flow document c. system design document d. contingency planning document

a. model

The end product of object-oriented analysis is an object ________ . a. model b. state c. relationship d. class

a. True

The end product of object-oriented analysis is an object model, which represents the information system in terms of objects and object-oriented concepts. a. True b. False

d. TCO

The estimated costs for a new system are referred to as the ________ , which includes ongoing support and maintenance costs, as well as acquisition costs. a. JIT b. EPOD c. CRM d. TCO

c. prepare a report to management

The final task in a preliminary investigation is to ________ . a. complete a survey for management b. select a data sample for management c. prepare a report to management d. complete interviews with management

b. case for action

The final task in the preliminary investigation is to prepare a report to management that includes an evaluation of the systems request, an estimate of costs and benefits, and a ________ , which is a summary of the project request and a specific recommendation. a. project scope b. case for action c. business case d. total cost of ownership

b. False

The first section of a typical preliminary investigation report is the case for action. a. True b. False

system boundary

The first step in creating a use case diagram is to identify the _______, which shows what is included in a system and what is not included in the system.

feasibility

The first step in evaluating _______ is to identify and weed out systems requests that are not achievable.

d. to identify and weed out systems requests that are not feasible

The first step in evaluating feasibility is ________ . a. to set priorities b. to identify nondiscretionary projects c. to identify discretionary projects d. to identify and weed out systems requests that are not feasible

d. stores

The four basic symbols used in data flow diagrams depict processes, data flows, data ________ , and entities. a. repositories b. dictionaries c. tables d. stores

entities

The four basic symbols used in data flow diagrams represent processes, _______, data flows, and data stores.

d. cutover

The four phases of the RAD model are requirements planning, user design, construction, and ________ . a. document b. productivity c. sampling d. cutover

parent diagram

The higher-level diagram on a DFD that has been exploded

c. 0

The highest-level data flow diagram contains process ________ , which represents the entire information system, but does not show any internal workings. a. 1 b. 2 c. 0 d. 3

c. opportunities

The letters SWOT stand for strengths, weaknesses, ________ , and threats. a. offerings b. options c. opportunities d. objectives

b. False

The letters SWOT stand for strengths, weaknesses, options, and threats. a. True b. False

child diagram

The lower-level diagram on a DFD that has been exploded

b. enterprise computing

The main objective of ________ is to integrate a company's primary functions to improve efficiency, reduce costs, and help managers make key decisions. a. transaction processing b. enterprise computing c. business support d. knowledge management

d. sample

The main objective of a(n) ________ is to ensure that it represents the overall population accurately. a. range-of-response question b. requirements model c. observation d. sample

c. CASE tool

The most effective approach to IT project planning is to use a ________ to define and document the overall environment. a. Microsoft Word table b. text-based method c. CASE tool d. Microsoft Excel spreadsheet

b. structured analysis

The most popular options for developing information systems are agile methods, object-oriented analysis, and ________ . a. modeling b. structured analysis c. network methods d. data flow analysis

d. RFID

The newest development in data acquisition is called ________ technology, which uses high-frequency radio waves to track physical objects. a. TP b. ERP c. RAID d. RFID

d. business

The number of attributes that are needed is dependent upon the ________ requirements of the information system and its users. a. physical b. logical c. activity d. business

c. systems support and security

The objective during the ________ phase is to maximize return on the IT investment. a. systems analysis b. systems implementation c. systems support and security d. systems design

d. site visit

The objective of a(n) ________ is to observe a system in use at another location. a. stratified sample b. systematic sample c. actor d. site visit

a. True

The objective of the systems analysis phase is to understand the proposed project, ensure that it will support business requirements, and build a solid foundation for system development. a. True b. False

pool

The overall diagram of the BPMN is called a _______.

a. dependent

The pattern of tasks for a large project can be broken down into ________ tasks, multiple successor tasks, and multiple predecessor tasks. a. dependent b. milestone c. activity d. critical

a. IT staff members

The people who develop and support an information system are ________ . a. IT staff members b. staff users c. users d. end users

b. sources

The process of determining which entities and data flows to include in a context diagram begins with a review of system requirements and identification of all data ________ and destinations. a. repositories b. sources c. trees d. stores

a. strategic planning

The process of identifying long-term organizational goals, strategies, and resources is referred to as ________ . a. strategic planning b. SWOT analysis c. economic feasibility d. preliminary investigation

d. just-in-time

The purpose of a(n) ________ system is to provide the right products at the right place at the right time. a. RFID b. electronic product code c. electronic data interchange d. just-in-time

a. systems analysis

The purpose of the ________ phase is to build a logical model of the new system. a. systems analysis b. systems design c. systems implementation d. systems support and security

c. systems planning

The purpose of the ________ phase of the SDLC model is to perform a preliminary investigation to evaluate an IT-related business opportunity or model. a. systems design b. systems analysis c. systems planning d. systems implementation

b. Hawthorne study

The purpose of the ________ was to determine how various changes in the work environment would affect employee productivity. a. systematic sample b. Hawthorne study c. Zachman Framework d. Scrum

b. False

The purpose of the systems analysis phase is to perform a preliminary investigation to evaluate an IT-related business opportunity or problem. a. True b. False

a. dictionary

The second component of structured analysis is the data ________ , which includes the details that are contained in a set of DFDs. a. dictionary b. table c. structure d. tree

domain

The set of values permitted for a data element

b. False

The starting point for creating use cases is the review of the information gathered during the methods modeling phase. a. True b. False

systems request

The starting point for most projects is called a(n) _______ , which is a formal way of asking for IT support.

c. inheritance

The strongest relationship is referred to as ________ . a. parent b. cardinality c. inheritance d. object-oriented

inheritance

The strongest relationship, which enables an object to derive one or more of its attributes from another object, is called _______.

d. rectangle

The symbol for a process is a ________ with rounded corners. a. square b. pentagon c. triangle d. rectangle

d. rectangle

The symbol for a process is a ________ with rounded corners. a. triangle b. square c. pentagon d. rectangle

a. entity

The symbol for a(n) ________ is a rectangle, which may be shaded to make it look three-dimensional. a. entity b. data store c. data flow d. diagram

b. preliminary investigation

The systems analyst conducts a ________ to study the systems request and recommend specific action. a. discretionary project b. preliminary investigation c. business case d. nondiscretionary project

d. network diagram

The term ________ is the Microsoft equivalent to the PERT chart. a. probable-case estimate b. worst-case estimate c. project triangle d. network diagram

a. business case

The term ________ refers to the reasons, or justification, for a proposal. a. business case b. strategic planning c. SWOT analysis d. critical success factor

a. fact-finding

The third step a systems analyst performs during a typical preliminary investigation is ________ . a. fact-finding b. technical feasibility c. strategic planning d. SWOT analysis

c. business-to-consumer

The two main sectors of e-commerce are business-to-business and ________ . a. Web-to-Web b. consumer-to-consumer c. business-to-consumer d. consumer-to-business

c. PERT/CPM

The two primary chart types that should be understood before creating work breakdown structures are Gantt charts and ________ charts. a. Microsoft Project b. WBS c. PERT/CPM d. risk management

help desk

The user support function usually is called a service desk or _______.

Application software

This type of software consists of programs that support the day-to-day business functions and provide users with the information they need. Examples include spreadsheets, presentation software, database management, etc.

a. business

To be successful, an information system must satisfy ________ requirements, stay within budget, be completed on time, and be managed effectively. a. business b. user c. project team d. security

b. Microsoft Visio

To create business process modeling notation (BPMN) models, you can use a CASE tool such as Visible Analyst or a multiple purpose application such as ________ . a. Microsoft Access b. Microsoft Visio c. Microsoft Excel d. Microsoft Project

PERT/CPM

To transform a task list into a(n) _______ chart, you first enter the task name, ID, duration, and predecessors for each task.

functional decomposition diagram (FDD)

Top-down representation of a function or process

context diagram

Top-level view of an information system that shows its boundaries and scope

d. brick-and-mortar

Traditional businesses that conduct business primarily from physical locations are referred to as ________ companies. a. hands-on b. pickup c. consumer-to-business d. brick-and-mortar

pseudocode

Used in program design as a shorthand notation for actual code

project leader

Used interchangeably with the term project manager

rapid application development

User-oriented method resembling a condensed version of entire SDLC

joint application development

User-oriented technique for fact-finding and requirements modeling

leveling

Uses a series of increasingly detailed DFDs to describe an information system

a. EPOD

Using ________ , a supplier uses RFID tags on each crate, case, or shipping unit to create a digital shipping list. a. EPOD b. EPC c. EDI d. JIT

a. functional decomposition

Using a(n) ________ diagram, an analyst can show business functions and break them down into lower-level functions and processes. a. functional decomposition b. use case c. sequence d. data flow

Systems Analyst

Valued member of IT department who helps plan, develop, and maintain information systems.

B2C (business-to-consumer) B2B (business-to-business)

What are the two main sectors of e-commerce?

Scope creep

What is the term used for making impromptu changes or additions to a project without corresponding increases in the schedule or budget?

c. parent

When a data flow diagram is partitioned, the higher-level diagram is referred to as the ________ diagram. a. context b. control c. parent d. child

d. functional primitives

When a set of DFDs is created, the processing logic is broken down into ________ , which are used by programmers to develop code. a. types b. decision trees c. sources d. functional primitives

d. business requirements

When an information system does not meet ________ , causes might include inadequately defined scope, imprecise targets, and lack of change control procedures. a. budget requirements b. probable-case estimates c. schedule requirements d. business requirements

schedule

When assessing _______ feasibility, a systems analyst must consider the interaction between time and costs.

d. dependencies

When constructing a PERT/CPM chart from a task list, the first step is to identify the tasks, determine task ________ , and enter the task name, ID, and duration. a. groups b. risks c. patterns d. dependencies

c. managers

When first introduced, management information systems (MIS) was a category of systems used primarily by ________ . a. maintenance staff b. administrative staff c. managers d. operational personnel

b. problem

When interacting with users, systems analysts should be careful in their use of the word ________ because it has a negative meaning. a. opportunity b. problem c. investigation d. dilemma

b. site visit

When performing research regarding a vendor's software, it could be beneficial to make a(n) ________ to observe the system in use at another location. a. histogram b. site visit c. scrum d. data flow diagram

d. concurrent

When several tasks can start at the same time, each is called a ________ task. a. dependent b. multiple predecessor c. predecessor d. concurrent

cost overrun

When the progress of a project is poorly monitored and responses to early warning signs of problems are slow, the result can be a(n) _______ .

b. Gantt charts

When the project manager provides status reports to management and users, ________ are often included as a means for showing the project's status graphically. a. critical paths b. Gantt charts c. task patterns d. design reviews

C. structured analysis

When using a(n) ________ method, system development is organized into phases, with deliverables and milestones to measure progress. A. object-oriented analysis B. adaptive C. structured analysis D. agile

c. structured analysis

When using a(n) ________ method, system development is organized into phases, with deliverables and milestones to measure progress. a. object-oriented analysis b. adaptive c. structured analysis d. agile

c. diamond

When using control structures to document processing logic, a(n) ________ shape represents a condition or decision. a. triangle b. square c. diamond d. oval

b. rectangle

When you create a use case diagram, the first step is to identify the system boundary, which is represented by a(n) ________ . a. triangle b. rectangle c. square d. oval

unified modeling language (UML)

Widely used method of visualizing and documenting software systems design

Pareto chart

Widely used tool for visualizing issues that need attention

action words

Words that signal a sequence of events

Activity diagrams

_______ are able to display multiple use cases in the form of a grid, where classes are shown as vertical bars and actions appear as horizontal arrows.

Data

_______ consists of basic facts that are the system's raw material.

Application software

_______ consists of programs that support day-to-day business functions and provide users with the information they need.

E-commerce

_______ includes two main sectors: business-to-consumer and business-to-business.

GanttProject

_______ is a free open source program that has a similar look and feel as Microsoft Project.

Structured analysis

_______ is a popular, traditional technique that describes a system in terms of data and the processes that act on the data.

polymorphism

_______ is the concept that a message can give different meanings to different objects.

Presentation graphics

_______ software, such as Microsoft PowerPoint, can be used to create organization charts, which are helpful during a preliminary investigation.

c. Scrum

________ , an agile approach whose name comes from a rugby term, has sessions in which team members play roles. a. Unified modeling b. Swim lanes c. Scrum d. Pool

b. Cardinality

________ , which describes how instances of one class relate to instances of another class, is a concept that is included in a class diagram. a. Polymorphism b. Cardinality c. Encapsulation d. Inheritance

c. Type

________ , which is an attribute that is recorded and described in a data dictionary, refers to whether a data element contains numeric, alphabetic, or character values. a. Iteration b. Selection c. Type d. Alias

d. REJ

________ , which was developed by Microsoft, is a method for measuring total costs and benefits. a. FDD b. BPM c. UML d. REJ

a. Volume

________ and frequency, which are data flow attributes that are included in a data dictionary, describe the expected number of occurrences for the data flow per unit of time. a. Volume b. Record c. Flow d. length

b. Critical success factors

________ are high-priority objectives that must be achieved to fulfill the company's mission. a. Cases for action b. Critical success factors c. Values d. Business cases

a. Systems requests

________ are often aimed at improving service to customers or users within a company. a. Systems requests b. Constraints c. Findings d. Values

c. Systems analysts

________ are often the company's best line of defense against an IT disaster involving a system that is technically sound, but fails because it doesn't meet the needs of users and managers. a. Top managers b. Knowledge workers c. Systems analysts d. Stakeholders

a. Processes

________ are the building blocks of an information system because they represent actual day-to-day business operations. a. Processes b. End users c. Networks d. Stakeholders

a. Tangible benefits

________ can be measured in dollars and result from a decrease in expenses, an increase in revenues, or both. a. Tangible benefits b. Intangible costs c. Intangible benefits d. Tangible costs

c. Biometric devices

________ can identify a person by retina scan or by mapping a facial pattern. a. CASE tools b. Ishikawa diagrams c. Biometric devices d. Encryption

a. CRM

________ components can provide automated responses to sales inquiries, Web-based order processing, and online inventory tracking. a. CRM b. CASE c. EDI d. JIT

b. System software

________ controls the flow of data, provides data security, and manages network operations. a. Data software b. System software c. Application software d. Linear software

d. Scalability

________ determines how a system will handle future growth and demands. a. Sampling b. Observation c. Brainstorming d. Scalability

c. Relationships

________ enable objects to communicate and interact as they perform business functions and transactions required by the system. a. Messages b. Activities c. Relationships d. Methods

a. Relationships

________ enable objects to communicate and interact as they perform business functions and transactions required by the system. a. Relationships b. Activity diagrams c. State transition diagrams d. Use cases

d. Inheritance

________ enables an object, called a child, to derive one or more of its attributes from another object, called a parent. a. Polymorphism b. Cardinality c. Encapsulation d. Inheritance

d. Operational

________ feasibility means that a proposed system will be used effectively after it has been developed. a. Technical b. Schedule c. Economic d. Operational

d. Project management

________ for IT professionals includes planning, scheduling, monitoring and controlling, and reporting on information system development. a. Quantitative risk analysis b. Risk management c. Qualitative risk analysis d. Project management

b. Internal factors

________ include the strategic plan, top managers, user requests, information technology department, and existing systems and data. a. Nondiscretionary projects b. Internal factors c. External factors d. Discretionary projects

a. BPMN

________ includes various shapes and symbols to represent events, processes, and workflows. a. BPMN b. RAD c. JAD d. BPM

b. Group

________ interviews can save time and provide an opportunity to observe interaction among the participants. a. Brainstorming b. Group c. Face-to-face d. Range-of-response

c. Microsoft

________ invites prospective customers to view an extensive demo that showcases the features of their Project program, which holds the dominant share of the project management software market. a. Apptivo b. GanttProject c. Microsoft d. Intaver Institute

c. Research

________ is a fact-finding technique that can include the Internet, IT magazines, and books to obtain background information, technical material, and news about industry trends and developments. a. Observation b. Sampling c. Research d. Unstructured brainstorming

b. Iteration

________ is a logical structure that involves the completion of a process step that is repeated until a specific condition changes. a. Selection b. Iteration c. Sequence d. Control

a. Selection

________ is a logical structure that involves the completion of one of two or more process steps based on the results of a test or condition. a. Selection b. Iteration c. Sequence d. Control

a. Microsoft Visio

________ is a popular tool that systems analysts can use to create business process diagrams, flowcharts, and organization charts. a. Microsoft Visio b. CASE c. EDI d. ERP

b. Unstructured brainstorming

________ is a small group discussion of a specific problem, opportunity, or issue, in which each participant can speak at any time. a. closed-ended brainstorming b. Unstructured brainstorming c. Structured brainstorming d. open-ended brainstorming

c. Structured brainstorming

________ is a small group discussion of a specific problem, opportunity, or issue, in which each participant either speaks when it is his or her turn or passes. a. closed-ended brainstorming b. Unstructured brainstorming c. Structured brainstorming d. open-ended brainstorming

d. Terminator

________ is a synonym for DFD entity because it can be a data origin or a final destination. a. Data structure b. Functional primitive c. Control structure d. Terminator

b. Digital delivery

________ is fast, convenient, and can be consumed on everything from mobile phones to large wall-mounted TVs. a. Processing b. Digital delivery c. Express delivery d. Buffering

b. Leveling

________ is the process of drawing a series of increasingly detailed diagrams, until all functional primitives are identified. a. Looping b. Leveling c. Validating d. Balancing

b. Risk management

________ is the process of identifying, analyzing, anticipating, and monitoring risks to minimize their impact on a project. a. Best-case estimation b. Risk management c. Probable-case estimation d. Weighting

d. Balancing

________ maintains consistency among a set of data flow diagrams by ensuring that input and output data flows align properly. a. Looping b. Leveling c. Validating d. Balancing

a. Cost overruns

________ may result from unrealistic estimates that are too optimistic or based on incomplete information. a. Cost overruns b. Slack time c. Weighting d. Project creep

c. Encapsulation

________ means that all data and methods are self-contained. a. Cardinality b. Inheritance c. Encapsulation d. Focus

b. Object

________ modeling is a methodology that combines data and processes into entities that represent actual people, things, transactions, and events. a. Unified b. Object c. Structured analysis d. Requirements

b. Intaver Institute

________ offers an add-on risk management package for Microsoft Project, which includes a color-coded matrix that reflects risk probability and impact. a. GanttProject b. Intaver Institute c. Apptivo d. Final Four Industries

c. Apptivo

________ offers several levels of business applications, including project management, and has a plan that is available free of charge with unlimited duration. a. Microsoft Project b. RiskyProject Professional c. Apptivo d. GanttProject

c. Groupware

________ programs are a type of user productivity system that enables users to share data, collaborate on projects, and work in teams. a. Netware b. Teamware c. Groupware d. Shareware

a. Rapid application development

________ provide(s) a fast-track approach to a full spectrum of systems development tasks, including planning, design, construction, and implementation. a. Rapid application development b. Agile methods c. Joint application development d. Rapid Economic Justification

c. Open-ended

________ questions are useful when attempting to understand a larger process or draw out an interviewee's opinions, attitudes, or suggestions. a. Leading b. Scalability c. Open-ended d. Range-of-response

d. Range-of-response

________ questions ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale. a. Leading b. Scalability c. Open-ended d. Range-of-response

b. Processes

________ refer to logical rules that are applied to transform data into meaningful information. a. Phases b. Processes c. Inputs d. Outputs

a. Processes

________ refer to logical rules that are applied to transform data into meaningful information. a. Processes b. Outputs c. Inputs d. Phases

b. Enterprise computing

________ refers to information systems that support company-wide operations and data management requirements. a. Knowledge management b. Enterprise computing c. Transaction processing d. Business support

c. Information technology

________ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information. a. Practical technology b. Electronic technology c. Information technology d. Systems Technology

d. Information technology

________ refers to the combination of hardware, software, and services that people use to manage, communicate, and share information. a. Systems Technology b. Electronic technology c. Practical technology d. Information technology

c. System

________ requirements serve as benchmarks to measure the overall acceptability of a finished system. a. Output b. Performance c. System d. Security

b. Qualitative

________ risk analysis evaluates each risk by estimating the probability that it will occur and the degree of impact. a. Dependent b. Qualitative c. Quantitative d. Independent

c. Quantitative

________ risk analysis is performed to better understand the actual impact in terms of dollars, time, project scope, or quality. a. Dependent b. Qualitative c. Quantitative d. Independent

c. Microsoft

________ states that in most projects, at least one side of the project triangle is fixed, and you are not likely to change it. a. Apptivo b. GanttProject c. Microsoft d. MIS CourseMate

a. Business support

________ systems can analyze transactional data, generate information needed to manage and control business processes, and provide information that leads to better decision making. a. Business support b. User support c. Network administration d. Application development

b. Business support

________ systems can analyze transactional data, generate information needed to manage and control business processes, and provide information that leads to better decision making. a. User productivity b. Business support c. Business action d. Knowledge management

a. Computer-aided systems engineering

________ tools provide an overall framework for systems development and support a wide variety of design methodologies, including structured analysis and object-oriented analysis. a. Computer-aided systems engineering b. Enterprise resource planning c. Rapid application development d. Joint application development

c. Top management

________ usually initiates large-scale projects because significant resources are required. a. IT management b. Middle management c. Top management d. Operations management

b. Certification

________ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test. a. Quality control b. Certification c. Technology knowledge d. A college degree


Set pelajaran terkait

Computer Science Semester 2 True of False

View Set

TNCT Information and Communications and Technology Q4

View Set

Combo "Educational Research-Chapters

View Set

Organizational Behavior: Chapter 11

View Set

Principles of Marketing-321, Ch. 11-15

View Set

International Business: quiz questions

View Set

Genitourinary Alterations (8 questions!)

View Set

Email Protocols Used by Incoming Mail Server

View Set