Chapter 7 pt.1 Revised, Moving on to Design Chapter7, Systems Analysis & Design CH 9, Ch. 9 quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Convention

A class has an attribute in which a range of values has a semantic meaning. This class has _____ connascence.

1. The purpose of the design phase is to create a blueprint for the new system.

True

A file that stores information on who, when, and how data was altered is an audit file.

True

A file that stores static values used for reference and validation is a look-up file.

True

A message with the information [aStudent exists] will be sent only when this condition is true.

True

A method for improving data access that involves physically arranging the records on the storage medium is called clustering.

True

An audit file contains information about how data changes over time; it records before and after images of data as it is altered so that it can be validated later.

True

When the analyst is evaluating a data model to ensure that all fields in a record depend fully on the entire primary key, the analyst is making sure that the data model conforms to the second normal form.

True

_____ is the process of estimating the amount of data that the hardware will need to support, so that the server hardware specifications are sufficient for the project s needs.

Volumetrics

interaction, inheritance

What are the two types of coupling in object-oriented systems?

common or global

When a global data area exists outside individual objects, the resulting system has _____ interaction coupling.

content or pathological

When a method of one object refers to the inside hidden parts of another object, these methods are exhibiting _____ coupling.

Case statement

Which of the following Structured English statements is an advanced form of an IF statement?

data

Which of the following types of interaction coupling is "best?"

UML

_____ has emerged as the standard for the design of object-oriented systems.

polymorphism

_____ means having the ability to send the same message to different objects, which can be interpreted differently by different objects.

coupling

_____ refers to the level of interdependency or interrelationship among the modules in a system.

information hiding

_____ suggests that only the information required to use an object should be available outside the object.

The acronym CRUD stands for _____.

create, read, update, delete

When arranging actors and objects on a sequence diagram, it is nice to list them _____.

in order in which they participate in the sequence across the top of the diagram

A mini-table that contains values from one or more columns in a table and the location of the values within the table is called a(n) _____. A. index B. interfile cluster C. intrafile cluster D. raw data calculation E. volumetric

index

A(n) _____ is an instantiation of a class.

object

cohesion

A class/object should only represent one thing, and a method should only solve a single task. This principle is often referred to as _____.

Which of the following is NOT a layer of a software architecture. a. foundation b. Problem domain c. data management d. data structure e human computer interface

D. data structure

it is common for the project team to write some code and produce original classes that support the application logic of the system

Detailed design is important for two reasons. First, preexisting classes and components need to be understood, organized, and pieced together, and second, _____.

1. Enterprise resource planning (ERP) applications are small single-function software packages that are inexpensive and easy to install and have only minor problems and fast, easily recognizable benefits.

False

1. Pirate Adventures, Inc., a company that owns and operates hotels in tropical locations, is interested in replacing the 15-year-old room reservation system in all of its hotels. Custom development would be the best design strategy.

False

A file that stores core information important to the business is an audit file.

False

A sequence diagram can only be drawn to represent a single scenario in a use case.

False

As behavioral models are developed, the use cases and structural models should not be modified.

False

CRUD matrices are useful in the step "Set the Context" of building a collaboration diagram?

False

If a class represents only temporary objects, then there should be a C in the column of the CRUD matrix.

False

In terms of storage space, the most efficient tables in a relational database have redundant data and many null values.

False

Information in a file\'s records that specifies the location of related records is called a marker.

False

Mapping from the problem domain to the data management objects in an RDBMS format is a straightforward one-to-one mapping.

False

Modeling the real world with behavioral models is relatively easy.

False

Null values in a database are easy to interpret.

False

Optimization is a process whereby a series of rules are applied to a logical data model to determine how well-formed it is; these rules help analysts identify entities that are not represented correctly.

False

The most efficient tables in a relational database in terms of storage space have redundant data and few null values.

False

The object persistence format that supports simple data types only is OODBMS.

False

Adding messages is the last step in building a communication diagram?

False 1. Set context 2. Identify objects, actors, and associations 3. Lay out diagram 4. Add messages 5. Validate

When looking for a specific object of interest, on average 25% of a sequential access file will have to be searched in order to find that object.

False, 50%

SQL, the standard language for accessing data in tables in relational databases, stands for Standard Query Language.

False, Structured query language

An image file stores past transactions that may no longer be needed, is usually stored off-line, and can be accessed on an as-needed basis.

False, a history file (I think)

When creating a CRUD matrix, you should use the letter C to represent Confirm.

False, create

1. Michelle would like the opportunity to increase the experience level of her IS staff by having them analyze and design a new web-based distribution system. The skills learned from this project may help with future strategic applications. Since the time period for the project is very flexible and this is a somewhat unique business need, Michelle has decided to use packaged software for this project.

False, custom development

1. When the timeframe for implementation is short, it is best to consider custom development.

False, custom development takes the longest

In a CRUD matrix, D represents Done.

False, delete

Joanne, a systems analyst trained at this university, has been asked to lead a team that will recommend a new data storage system for her company. After careful analysis of the five divisions that comprise the entire 35 million company, Joanne s team should recommend a end-user database management system.

False, end-user DMS are for small business or personal use

It is difficult to find professionals with the necessary skill set for RDBMS.

False, it is for OODBMS

The destruction of temporary objects is shown on sequence diagrams with a solid circle at the end of the lifeline.

False, it is shown with an x

A master file holds information temporarily so that it can be used to update other master files.

False, master files hold complete and sub-permanent data

Actors and objects are placed on a sequence diagram in order of appearance in the use case.

False, messages and responses are

1. Custom development of software is usually the best strategy for common business needs, particularly when the business need is not unique and does not have special requirements.

False, packaged software

Communication diagram can show return messages.

False, sequence diagrams can

If you are interested in the time ordering of the messages in a system, you should use a communication diagram.

False, sequential diagram

The two primary dimensions to optimize a relational database are storage efficiency and future needs.

False, storage efficiency and data access speed

1. Max has been a project manager for 10 years and is considered one of the best in his department of well qualified IS professionals. The approval committee is considering the approval of a new unique Internet system that could possibly catapult the firm ahead of all of the competition. Buying a packaged system would be the best design strategy.

False, the unique nature of the system plus expertise calls for custom development

the number of messages sent by a method

Fan-out refers to _____.

variable, method, class/object, cluster

In an object-oriented system, changes can take place at the following level of abstraction.

message

In order to get an object to perform a method, a(n) _____ is sent to the object.

method

In terms of levels of abstraction, which of the following is at the lowest level relative to the rest?

method, class, generalization/specialization

Object-oriented systems have three general types of cohesion: _____, _____, and _____.

content or pathological

Of all of the types of interaction coupling, _____ is the worst.

A simple rule to follow when creating problem domain classes and data access and manipulation classes is that there should be ______________.

One data access and manipulation class for each concrete problem domain class

programmer

The audience for pseudocode is the _____.

object

The basic building block of a system is the _____.

1. A package is a logical grouping of UML elements.

True

1. The layer that would include the classes that would interact with middleware applications is the physical architecture layer.

True

CRUD matrices are created by creating a matrix that lists the classes across the top and actions down the side.

True

Clustering similar records together is one way of reducing access time.

True

Conditions on conditional messages in communication diagrams are placed in [ ] symbols.

True

Each object can both send and receive messages.

True

It is possible for an object to delete another object.

True

Lauren and her team have been hired to create a transaction system for Mike s Motorcycles. Mike s is a medium size shop with 10 employees that sells motorcycle parts and does repair on motorcycles, lawn mowers, and other small engine systems (boats, dune buggies, tractors, etc. ) As part of Lauren s team, you need to recommend relational database management system.

True

Mapping between the problem domain objects and an OODBMS is a straightforward one-to-one mapping.

True

Normalization is a process that applies a series of rules to a logical data model to determine how well the model is formed.

True

Sequential access files are very efficient for operations such as report writing.

True

The behavioral state diagram shows the different states that an interaction between objects passes through in response to events, together with its responses and actions.

True

The initial state in a behavioral state diagram represents the point at which the object begins to act.

True

The leader in the database market and a system that can handle diverse data needs is the relational DBMS.

True

The second step in drawing a communication diagram is to identify which objects and associations between the objects participate in the communication.

True

Up until recently, an object-oriented database is mainly used to support multimedia applications or complex systems involving graphics, video and sound.

True

Update anomalies occur when some instances of redundantly stored data are overlooked when an update occurs.

True

1. A disadvantage of purchasing packaged software is that the organization may _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. make strategic changes during implementation d. remove all risk from the project e. save money on the purchase

a. accept functionality that is not a perfect fit

22. A(n) ______ matrix can be used to organize the pros and cons of the design alternatives so that the best solution will be chosen in the end. a. alternative b. cost-benefit c. feasibility d. design e. evaluation

a. alternative

1. The design phase of the SDLC creates a(n) _____. a. blueprint for the future system b. picture of the as-is system c. understanding of who, what, when, and where the future system will be d. understanding of why build the system e. none of the above

a. blueprint for the future system

In a communication diagram, a(n) _____ between actors and objects is shown with an undirected line.

association

6. A(n) _____ describes information about an object.

attribute

1. An advantage of custom development is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. install in a short period of time d. remove all risk from the project e. save money on the purchase

b. build technical skills and functional knowledge

1. The following are all classic design mistakes EXCEPT _____. a. feature creep b. including design time c. reducing design time d. silver bullet syndrome e. switching tools in mid-project

b. including design time

1. A(n) _____ is the equivalent to a subsystem. a. collaboration b. partition c. layer d. factor e. abstraction

b. partition

1. Manipulating certain parameters to refine the way features work in a software package is called _____. a. a workaround b. adjustment c. customization d. feature adjustability e. parameterizing

c. customization

1. When an analyst discovers that a set of classes have a similar set of attributes and methods, it may make sense to _____ out the similarities into a separate class. a. refine b. abstract c. factor d. partition e. separate

c. factor

1. The layer that keeps the user interface implementation separate from the application or problem domain classes is the _____ layer. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

c. human-computer interaction

1. The _____ layer addresses the issues involving the persistence of the objects contained in the system. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

d. data management

1. There are three methods to create a new system. They are _____. a. buy a package, external vender, external service provider b. develop custom application in-house, external service provider, and external vender c. external service provider, rely on a developer, and external vender d. in-house custom application, buy a package, and external vender e. in-house custom application, external service provider, and external vender

d. in house custom application, buy a package, and external vender

1. The following are all strengths of a custom development design strategy EXCEPT _____. a. builds technical skills b. greater creativity c. greater flexibility d. lower risk none of the above

d. lower risk

1. To avoid the classic design mistake of "silver bullet syndrome," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade development tools unless there is a compelling need d. not use a design tool that appears too good to be true e. use rapid application development techniques or timeboxing

d. not use a design tool that appears too good to be true

1. Which of the following is not a fundamental way to approach the creation of a new information system? a. develop a custom application in-house b. rely on an external vendor to build the system c. purchase a software package and customize it d. rely on end-users to develop it themselves e. all of the above are ways to create new information systems

d. rely on end-users to develop it themselves

1. The process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate everything together is called _____. a. customization b. formal methodology c. outsourcing d. systems integration e. workaround

d. systems integration

1. The following are all strengths of a packaged software design strategy EXCEPT _____. a. it may be bought and installed in a short time b. many business needs are not unique c. the package is already tested and generally proven to work d. there is an exact match of functionality to requirements e. none of the above

d. this is an exact match of functionality to requirements

In order to reduce the number of joins that must be performed in a query and to increase the speed of data access, the data analyst will _____ the physical model. A. cluster B. denormalize C. index D. normalize E. optimize

denormalize

1. The decision on which design strategy to use depends on _____. a. how unique the business need is b. the expertise of the project manager c. the urgency of the project d. the amount of in-house experience e. all of the above

e. all of the above

1. The _____ layer contains, among other things, the classes that represent the fundamental data types. a. problem domain b. system architecture c. human-computer interaction d. data management e. foundation

e. foundation

1. The _____ layer addresses how the software will execute on specific computers and networks. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

e. problem domain

1. An advantage of purchasing packaged software is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. have developers climb the knowledge ladder d. make strategic changes during implementation e. save money on the purchase

e. save money on the purchase

1. To avoid the classic design mistake of "feature creep," the analyst should _____. a. not switch or upgrade unless there is a compelling need for specific features b. increase the schedule to include learning time c. move proposed changes into future versions d. not use a design tool that appears too good to be true e. use rapid application development techniques or timeboxing

e. use rapid application development techniques or timeboxing

1. To avoid the classic design mistake of "reducing the design time," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade unless there is a compelling need for specific features d. not use a design tool that appears too good to be true e. use timeboxing

e. use time boxing

A(n) _____ is less expensive and easier for novice users to use, but it does not have the features that are necessary to support mission-critical or large scale systems.

end-user database management system

Data may be stored in the following formats _____. A. databases B. entities C. entities and files D. files E. files and databases

files and databases

If the data model does not have any repeating fields it is in _____. A. base normal form B. first normal form C. non-normal form D. second normal form E. third normal form

first normal form

The external behavior of a system is described by

functional models

To improve the access speed of a database, similar records in a table are stored together in primary key order. This optimizing access speed process is called _____. A. denormalization B. indexing C. interfile clustering D. intrafile clustering E. volumetrics

intrafile clustering

7. _____ are information that is sent to objects to tell it to execute one of its behaviors.

messages

The modeling focus of the interaction diagram is at the _____ level while the modeling focus on the class diagram is at the _____ level.

object and class

The type of database that is most capable of supporting complex data types is _____. A. sequential files B. relational DBMS C. object-oriented DBMS D. object-relational DBMS E. random access files

object-oriented DBMS

The process of ensuring that values linking tables together through the primary and foreign keys are valid and correctly synchronized is _____.

referential integrity

A data model that does not contain repeating fields and that the data models leads to tables containing fields that are dependent on a whole primary key is in _____ normal form. A. balanced B. first C. primary D. second E. third

second

When an object sends a message to itself in a sequence diagram, it is referred to as _____.

self-delegation

The two types of interaction diagrams are ______________ diagrams.

sequence and communication

Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time for one particular use case.

sequence diagrams

The first step in building a sequence diagram is to _____

set the context

The ____ of an object is defined by the value of its attributes and its relationships with other objects at a particular point in time.

state

A relational database may be optimized for _____. A. data type and storage efficiency B. relational type C. speed of access D. storage efficiency E. storage efficiency and speed of access

storage efficiency and speed of access

An analyst depicts the static view of an information system with _____.

structural models

SQL operates on _____. A. rows of data at a time B. columns of data at a time C. tables of data at a time D. the entire database E. any of the above

tables of data at a time

If the logical data model contains fields that depend on another non-primary key field, then it is in violation of the rules of _____. A. base normal form B. first normal form C. non-normal form D. second normal form E. third normal form

third normal form

The focus in a sequence diagram is on __________________

time ordering of messages being passed between objects

The order of messages on a sequence diagram goes from ____ to _____.

top to bottom

A(n) _____ is basically an electronic list of information that is stored on a disk.

unordered sequential access file


Set pelajaran terkait

Accounting Information Systems Exam 1

View Set

Econ 411 Chapter 13, 15, 16, & 18

View Set

Vocabulary 2. Republic- a government in which citizens rule through elected representatives 3. Ordinance- a law 4. Depreciate- to fall in value

View Set

Energiomsætning og energivurdering

View Set

Server 2016 ch 1-3 & Server 2019 ch 1-4 Midterm eview

View Set

Chapter 13 Brain and Cranial Nerves

View Set

PSY 312 Research Methods: Chapters 1-2

View Set

Jason Dion comptia A+ Practice Exam #1 (220-1102) - Results

View Set

Chapter 3 Cybercrime, Fraud, and Ethics

View Set

Chapter Exam - Life Premiums and Benefits

View Set