Systems Analysis Exam Review
What are the roles and responsibilities of a systems analyst in a modern business?
A system analyst needs good communication, business, critical thinking, and education skills.
When preparing a slide presentation, try to follow the 7 by 7 rule, which states that there should be _____.
An online package tracking system that improves service and decreases the need for clerical staff
Name three of the external factors which can impact a project.
Government, Economy, Supply Chain
The name for new business support systems that produced valuable information, in addition to performing manual tasks; their primary users were managers.
Management Information System
Requests specific behavior or information from another object
Message
People who rely on transaction processing (TP) systems to enter and receive data they need to perform their jobs
Operational Employees
An early working version of an information system
Prototype
An approach that proponents believe reduces risks and speeds up software development
Spiral Method
People who oversee operational employees and carry out day-to-day functions
Team Leaders
According to Lecture, what are the Five Ts an analyst needs?
Time,
A mission-critical system is one that is unimportant to a company's operations.
True False False
Compared with traditional methods, the entire rapid application development (RAD) process is expanded and, as a result, the new system is built, delivered, and placed in operation much later.
True False False
Critical time is the amount of time that the task could be late without pushing back the completion date of the entire project.
True False False
What question a business case should answer?
Why are we doing this project? -What is the project about? -How does this solution address key business issues? Business Scope - How much will it cost? - What is the return on investment and payback period? Financial Scope - How long will it take? Temporal Scope - Will we suffer a productivity loss during the transition? Organizational Scope - What are the risks of doing the project? - What are the risks of not doing the project? Risk Management - How will we measure success? - What alternatives exist?
A use case represents the steps in a specific business function or process.
a. True b. False a. True
A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.
a. True b. False a. True
A(n) _____ investigates, analyzes, designs, develops, installs, evaluates, and maintains a company's information systems.
a. database administrator b. network administrator c. systems analyst d. application developer c. systems analyst
For complex models, analysts can choose computer-based modeling tools that use _____, which includes standard shapes and symbols to represent events, processes, workflows, and more.
a. electronic data interchange (EDI) b. business process modeling notation (BPMN) c. rapid application development (RAD) d. joint application development (JAD) b. business process modeling notation (BPMN)
What is the most important element when preparing for a presentation?
a. practice b. content c. specialization d. script a. practice
What is the most important element when preparing for a presentation?
a. practice b. script c. content d. specialization a. practice
If processes must be performed in a specific sequence, the information should be documented in the _____.
a. process descriptions b. data flow diagram (DFD) c. leveling guide d. data dictionary a. process descriptions
User productivity systems _____.
a. provide job-related information to users at all levels of a company b. process data generated by day-to-day business operations c. simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied d. include groupware programs that enable users to share data, collaborate on projects, and work in teams d. include groupware programs that enable users to share data, collaborate on projects, and work in teams
For most standard documents, Microsoft suggests writers should aim for the Flesch Reading Ease score of _____.
a.10-20 b.30-40 c.60-70 d.90-100 c.60-70
For most standard documents, Microsoft suggests writers should aim for the Flesch-Kincaid Grade Level score of _____.
a.5.0 to 6.0 b.9.0 to 10.0 c.7.0 to 8.0 d.11.0 to 12.0 c.7.0 to 8.0
Which is an example of an intangible benefit?
a.A user-friendly system that improves employee job satisfaction b.A new scheduling system that reduces overtime c.An online package tracking system that improves service and decreases the need for clerical staff d.A sophisticated inventory control system that cuts excess inventory a.A user-friendly system that improves employee job satisfaction
Which is an example of a discretionary project?
a.Creating a new report for a user b.Adding a report required by a new federal law c.Including annual updates to payroll and tax percentages d.Updating quarterly changes in reporting requirements for an insurance processing system a.Creating a new report for a user
Which organization offers a friendly environment where members critique each speech in a positive manner, note the strengths, and offer suggestions about what might be improved?
a.Google Groups b.Toastmasters c.Association for Computing Machinery d.Lynda and Udemy b.Toastmasters
_____, a human resource issue, is a possible cause of cost overruns in an organization.
a.Inadequate training b.Inaccurate demand forecast c.Poor monitoring of progress d.Unrealistic estimates a.Inadequate training
When preparing written documents, which suggestion should be kept in mind?
a.Keep your writing concise and well-organized. b.Use passive voice whenever possible. c.Impress your audience with the size of your vocabulary. d.Repeat the same word frequently. a.Keep your writing concise and well-organized.
Which is a suggestion for speakers to keep in mind if they are nervous when facing an audience?
a.Neglect the environment. b.Turn the nervousness into an advantage. c.Use filler words and phrases. d.Do not practice before the presentation. a.Neglect the environment.
_____ means that a project can be implemented in an acceptable time frame.
a.Operational feasibility b.Technical feasibility c.Schedule feasibility d.Economic feasibility c.Schedule feasibility
_____ planning is the process of identifying long-term organizational goals, strategies, and resources.
a.Prospect b.Pilot c.Strategic d.Vertical c.Strategic
Which is a functional requirement?
a.Response time must not exceed four seconds. b.The contact management system shall generate a daily reminder list for all sales representatives. c.The system must be operational 7 days a week, 365 days a year. d.The system should work on Windows and Mac platforms. The contact management system shall generate a daily reminder list for all sales representatives.
Project managers always must be aware of the _____, so they can monitor the vital tasks and keep a project on track.
a.absolute path b.relative path c.critical path d.dynamic path c.critical path
The term _____ refers to the reasons, or justifications, for a proposal.
a.business case b.use case c.work statement d.problem charter a.business case
The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.
a.computer resources committee b.data storage committee c.system networking committee d.topology identification committee a.computer resources committee
What is the most important element when preparing for a presentation?
a.content b.practice c.script d.specialization b.practice
A _____ is a review of a project team member's work by other members of a team.
a.critical walk-through b.foundational walk-through c.baseline walk-through d.structured walk-through
Two or more _____ depend on a predecessor task.
a.dependent tasks b.concurrent tasks c.ancestor tasks d.precursor tasks b.concurrent tasks
Representing requirements deals with _____ the problem.
a.describing b.understanding c.validating d.agreeing upon a.describing
In an interview, _____ encourage spontaneous and unstructured responses.
a.flowchart b.histogram c.tree map d.streamgraph
A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a _____.
a.flowchart b.histogram c.tree map d.streamgraph b.histogram
Projects that provide the _____ are assigned the highest priority when setting priorities for systems requests.
a.greatest benefit, at the lowest cost, in the shortest period of time b.greatest benefit, at the highest cost, in the shortest period of time c.least benefit, at the lowest cost, in the longest period of time d.least benefit, at the highest cost, in the longest period of time a.greatest benefit, at the lowest cost, in the shortest period of time
The three legs of a project triangle are _____, scope, and time.
a.requirements b.resources c.environment d.cost d.cost
In the rapid application development (RAD) model, the _____ phase focuses on program and application development tasks similar to the SDLC.
a.requirements planning b.user design c.construction d.cutover c.construction
A _____ (sometimes called an epic) is a simple, high-level statement of a requirement.
a.schema b.feature c.script d.kernel b.feature
In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all documented requirements for the system.
a.systems implementation phase b.systems planning phase c.systems analysis phase d.systems design phase b.systems planning phase
What are the five main components of an information system?
hardware, software, data, people, and process
Describe how CASE tools can support strategic planning.
helps SA to develop and maintain information systems
Summarize the seven main functions of the IT department
Application Development, Systems Support and Security, user support, database admin, network admin, web support, quality assurance
Name the tools that enable the systems analyst to develop, manage, and maintain large-scale information systems.
Application lifecycle management (ALM), product life cycle management, integrated development environments, computer aided software engineering
What are the seven types of information systems used in business?
Enterprise Computing System, Transaction Processing Systems, Business Support Systems, Knowledge Management System, User Productivity Systems, Digital Assistants, and Systems Integration
In many large companies, these kinds of systems provide cost-effective support for users and managers throughout the company.
Enterprise Resource Planning
Name the five elements (components) of an Information System.
Hardware, Software, Data, People, and Process
Produces a graphical representation of a concept or process that systems developers can analyze, test, and modify
Modeling
Can expand to meet new business requirements and volumes
Scalable Design
A business profile contains much information about a business. One is a mission statement. Name three of the other elements needed in a business profile.
Scope, Constraints, Competitors
Steps of preliminary investigation
Step 1: Understand the Problem or Opportunity Step 2: Define the Project Scope and Constraints Step 3: Perform Fact-Finding Step 4: Analyze Project Usability, Cost, Benefit, and Schedule Data Step 5: Evaluate Feasibility Step 6: Present Results and Recommendations to Management
Compare three systems development methods.
Structured Analysis - phases, Object Oriented - everything is an object, Agile - stages of iterations
According to the text, there are three major categories or methodologies used in Systems Analysis. What are they?
Structured Analysis, Object Oriented, Agile
All companies that provide materials, services, and functions needed to provide a product to a customer.
Supply Chain
Name the five phases of the SDLC in proper sequence/order.
Systems Analysis Phase Systems Planning Phase Systems Design Phase Systems Support and Security Phase Systems Implementation Phase
What are the four organizational levels in most businesses?
Top Managers, Middle Managers, Supervisors, Operational workers
What types of information do the four organizational levels common to many businesses need?
Top Managers, Middle managers and knowledge workers, supervisors and team leaders, and operational employees
Frederick Brooks, Jr. observed that adding manpower to a late software project makes completion faster.
True False False
In a presentation, specialized or technical terminology should be used whenever possible.
True False False
In a sequence diagram, vertical arrows represent messages from one object to another.
True False False
Joint application development (JAD) provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation.
True False False
Most firms give their IT budgets a low priority in good economic times.
True False False
Progress reports may be given verbally to immediate supervisors, management, and users.
True False False
Quantitative risk analysis evaluates each risk by estimating the probability that it will occur and the degree of impact.
True False False
System developers can initiate a formal project as early as the preliminary investigation stage, or later on, as analysis, design, and implementation activities occur.
True False False
Systems requests do not deal with factors involved in improving service.
True False False
The Flesch Reading Ease score measures the average sentence length and the average number of syllables per word and produces a rating keyed to a U.S. grade-school level.
True False False
The Pareto chart, sometimes called a scatter diagram, is a problem-solving tool.
True False False
The letters SWOT stand for spending, weeks, overtures, and time.
True False False
The task duration is the same as the elapsed time.
True False False
The task name should be unique in the project.
True False False
Transaction processing (TP) systems are inefficient because they process a set of transaction-related commands individually rather than as a group.
True False False
When preparing an effective slide presentation, the first step (and perhaps the most important) is to prepare an overall outline that will be the foundation of the presentation.
True False False
When preparing slides for a presentation, use a serif style (such as Times Roman) for all body text and a sans serif style (such as Arial) for just the titles.
True False False
When preparing slides for a presentation, use special effects liberally — many graphics, colors, sounds, or other special effects will help the audience to concentrate.
True False False
When tasks must be completed one after another, they are called concurrent tasks.
True False False
A SWOT analysis examines a firm's technical, human, and financial resources.
True False True
A constraint can involve hardware, software, time, policy, law, or cost.
True False True
A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.
True False True
Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.
True False True
Currently, BellHaven's accounting is done using Microsoft Excel.
True False True
Feasibility analysis is an ongoing task that must be performed throughout the systems development process.
True False True
In a report, the executive summary is used to summarize an entire project, including recommendations, in several paragraphs.
True False True
Internal and external factors affect every business decision that a company makes, and IT systems are no exception.
True False True
Many companies find that a trend called empowerment, which gives employees more responsibility and accountability, improves employee motivation and increases customer satisfaction.
True False True
Network administration includes hardware and software maintenance, support, and security.
True False True
Quick Response codes contain more information than traditional bar codes, but less than RFID tags.
True False True
Since middle managers focus on a longer time frame, they need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations.
True False True
The ability to manage information is the mark of a successful systems analyst and an important skill for all IT professionals.
True False True
The why, who, what, when, and how of communications are important questions that an individual must answer before he or she communicates.
True False True
When designing a questionnaire, the most important rule of all is to make sure that questions collect the right data in a form that can be used to further the fact-finding effort.
True False True
Identify a method of developing systems that is well-suited to traditional project management tools and techniques.
a. Adaptive method b. Rapid application development c. Object-oriented analysis d. Structured analysis d. Structured analysis
Which is one of the main sectors of ecommerce?
a. C2B (consumer-to-business) b. C2C (consumer-to-consumer) c. B2C (business-to-consumer) d. BPM (business process model) c. B2C (business-to-consumer)
Which is an example of a discretionary project?
a. Creating a new report for a user b. Updating quarterly changes in reporting requirements for an insurance processing system c. Including annual updates to payroll and tax percentages d. Adding a report required by a new federal law a. Creating a new report for a user
A _____ chart displays complex task patterns and relationships.
a. Gantt b.Pareto c.Program Evaluation Review Technique (PERT) d.Scatter c.Program Evaluation Review Technique (PERT)
A _____ consists of horizontal bars, connected with arrows that indicate task dependencies.
a. Gantt chart b. wireframe c. viewport d. Scatter chart a. Gantt chart
_____ planning is the process of identifying long-term organizational goals, strategies, and resources.
a. Pilot b. Prospect c. Strategic d. Vertical c. Strategic
_____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.
a. Rapid application development b. Modeling c. Prototyping d. Scrum b. Modeling
Which organization offers a friendly environment where members critique each speech in a positive manner, note the strengths, and offer suggestions about what might be improved?
a. Toastmasters b. Google Groups c. Association for Computing Machinery d. Lynda and Udemy a. Toastmasters
_____ is the amount of data that can be transferred in a fixed time period.
a. Topology b. Dimensionality c. Bandwidth d. Resolution c. Bandwidth
A SWOT analysis examines a firm's technical, human, and financial resources.
a. True b. False a. True
A main advantage of ERP is that it describes a specific hardware and software environment, also called a platform, which ensures connectivity and easy integration of future systems, including in-house software and commercial packages.
a. True b. False a. True
An evaluation model is a technique that uses a common yardstick to measure and compare vendor ratings.
a. True b. False a. True
Competition drives many information systems decisions.
a. True b. False a. True
Feasibility analysis is an ongoing task that must be performed throughout the systems development process.
a. True b. False a. True
IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of system development.
a. True b. False a. True
In a report, the executive summary is used to summarize an entire project, including recommendations, in several paragraphs.
a. True b. False a. True
In the systems design phase, a logical model is built that describes how the system will be constructed.
a. True b. False a. True
Internal and external factors affect every business decision that a company makes, and IT systems are no exception.
a. True b. False a. True
Many companies find that a trend called empowerment, which gives employees more responsibility and accountability, improves employee motivation and increases customer satisfaction.
a. True b. False a. True
Network administration includes hardware and software maintenance, support, and security.
a. True b. False a. True
The why, who, what, when, and how of communications are important questions that an individual must answer before he or she communicates.
a. True b. False a. True
Today's mobile devices have enough computing power to provide processing "at the edge," which means at the end of a network, in the user's hands.
a. True b. False a. True
Tools make it easier to build an information system, thereby boosting IT productivity and improving the quality of the finished product.
a. True b. False a. True
Using flowcharts, programmers can break large systems into subsystems that are easier to understand and code.
a. True b. False a. True
After developing a model, many CASE tools can generate program code, which impedes and slows down the implementation process.
a. True b. False b. False
In a presentation, specialized or technical terminology should be used whenever possible.
a. True b. False b. False
In an efficient design, data is reentered at least two times.
a. True b. False b. False
In an information system, data is information that has been transformed into input that is valuable to users.
a. True b. False b. False
Most firms give their IT budgets a low priority in good economic times.
a. True b. False b. False
Systems requests do not deal with factors involved in improving service.
a. True b. False b. False
The Flesch Reading Ease score measures the average sentence length and the average number of syllables per word and produces a rating keyed to a U.S. grade-school level.
a. True b. False b. False
The database and the Internet speak the same language.
a. True b. False b. False
Using a work breakdown structure (WBS) allows one to manage a project as one large task.
a. True b. False b. False
When network traffic is encrypted, it is invisible and its content and purpose are masked.
a. True b. False b. False
When preparing written documents, which suggestion should be kept in mind?
a. Use passive voice whenever possible. b. Impress your audience with the size of your vocabulary. c. Repeat the same word frequently. d. Keep your writing concise and well-organized. d. Keep your writing concise and well-organized.
A _____ is a set of letters or numbers that represents a data item.
a. code b. mnemonic c. data dictionary d. business glossary a. code
A _____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve.
a. constraint b. trigger c. key d. query a. constraint
A(n) _____ produces one or more lines of output for each record processed.
a. exigency report b. detail report c. exception report d. summary report b. detail report
A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a _____.
a. flowchart b. tree map c. streamgraph d. histogram d. histogram
Projects that provide the _____ are assigned the highest priority when setting priorities for systems requests.
a. greatest benefit, at the lowest cost, in the shortest period of time b. least benefit, at the highest cost, in the longest period of time c. least benefit, at the lowest cost, in the longest period of time d. greatest benefit, at the highest cost, in the shortest period of time a. greatest benefit, at the lowest cost, in the shortest period of time
Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.
a. integrated approach b. test plan c. top-down approach d. training plan c. top-down approach
When preparing a slide presentation, try to follow the 7 by 7 rule, which states that there should be _____.
a. no more than seven items per slide and no more than seven words per item b. at least seven topics per slide and at least seven items per topic c. no more than seven topics per slide and no more than seven items per topic d. at least seven items per slide and at least seven words per item a. no more than seven items per slide and no more than seven words per item
A software package developed to handle information requirements for a specific type of business is called a(n) _____.
a. symmetric application b. asymmetric application c. horizontal application d. vertical application d. vertical application
The first step in managing IT security is to develop a _____ based on confidentiality, integrity, and availability.
a. threat report b. security policy c. risk policy d. concealment report b. security policy
The objective of a _____ is to use the combined judgement and experience of several analysts to evaluate systems projects.
a. topology identification committee b. system networking committee c. computer resources committee d. data storage committee c. computer resources committee
The term _____ refers to the reasons, or justifications, for a proposal.
a. use case b. problem charter c. business case d. work statement c. business case
An object's _____ are the tasks or functions that the object performs when it receives a command to do so.
a. utilities b. roles c. methods d. instances c. methods
Knowing what is expected and when to go into detail is directly related to knowing _____.
a. why you are communicating b. where to communicate best c. who your targets are d. when to speak and when to remain silent c. who your targets are
_____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.
a.Accessibility b.Relationship c.Feasibility d.Performance d.Performance
_____ is a full-featured program that holds the dominant share of the project management software market.
a.Apptivo b.GanttProject c.Microsoft Project d.Gantter c.Microsoft Project
_____, a free cloud-based project management tool, runs in a browser window, so there is no software to install to use it.
a.Apptivo b.Smartsheet c.Microsoft Project d.Gantter d.Gantter
_____ includes ongoing support and maintenance costs, as well as acquisition costs.
a.CRC (customer relationship costs) b.TCO (total cost of ownership) c.JIT (just-in-time costs) d.RCT (real cost of time) b.TCO (total cost of ownership)
Electronic data interchange (EDI) enables _____ inventory systems, which rely on computer-to-computer data exchange to minimize unnecessary inventory.
a.CRM (customer relationship management) b.EPOD (electronic proof of delivery) c.JIT (just-in-time) d.RFID (radio frequency identification) c.JIT (just-in-time)
The overall aim of a _____ is to avoid seeking goals that are unrealistic, unprofitable, or unachievable.
a.SWOT (strengths, weaknesses, opportunities, and threats) analysis b.CSF (critical success factor) analysis c.BCF (business case factor) analysis d.SWCT (strategy, weakness, cost, and technology) analysis a.SWOT (strengths, weaknesses, opportunities, and threats) analysis
Which is a non-functional requirement?
a.The system must provide logon security at the operating system level and at the application level. b.Each input form must include date, time, product code, customer number, and quantity. c.The system must be operational 7 days a week, 365 days a year. d.The website shall report online volume statistics every four hours and hourly during peak periods. c.The system must be operational 7 days a week, 365 days a year.
When preparing a slide presentation, try to follow the 7 by 7 rule, which states that there should be _____.
a.at least seven topics per slide and at least seven items per topic b.no more than seven topics per slide and no more than seven items per topic c.at least seven items per slide and at least seven words per item d.no more than seven items per slide and no more than seven words per item d.no more than seven items per slide and no more than seven words per item
The _____ is the most pessimistic outcome of a task.
a.best-case estimate (B) b.probable-case estimate (P) c.worst-case estimate (W) d.dominant-case estimate (D) c.worst-case estimate (W)
What process is concerned with demonstrating that the requirements define the system that the customer really wants?
a.hunting b.gathering c.representing d.validation d.validation
Project reporting, an activity of a project manager, _____.
a.involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that might delay a project b.includes informing management, users, and the project team about the progress of a project c.consists of staffing, which includes selecting the project team and assigning specific tasks to team members d.includes identifying and arranging project tasks and estimating completion times and costs b.includes informing management, users, and the project team about the progress of a project
Supporters of neutral locations for interviews believe that it _____.
a.makes the interviewee feel comfortable during the meeting b.gives the interviewee easy access to supporting material that might be needed c.keeps interruptions to a minimum so people can concentrate fully d.gives the interviewee an opportunity to take calls during the interview c.keeps interruptions to a minimum so people can concentrate fully
When several tasks can start at the same time, each is called a(n) _____ task.
a.model b.asynchronous c.baseline d.concurrent
In an interview, _____ encourage spontaneous and unstructured responses.
a.open-ended questions b.closed-ended questions c.leading questions d.range-of-response questions a.open-ended questions
In a(n) _____, team members prepare to lunge at each other to achieve their objectives.
a.pool b.resequencing session c.scrum d.adaptation c.scrum
Determining the _____ means defining the specific boundaries, or extent, of a project.
a.project index b.project matrix c.project scope d.project table c.project scope
Strategic planning starts with a _____ that reflects a firm's vision, purpose, and values.
a.relationship diagram b.feasibility study c.performance assessment d.mission statement d.mission statement
Of the measures of feasibility, questions such as "Does the proposed platform have sufficient capacity for future needs?" and "Will the hardware and software environment be reliable?" should be considered while assessing _____.
a.schedule feasibility b.technical feasibility c.economic feasibility d.ethical feasibility b.technical feasibility
To obtain answers to requirements questions, the analyst develops a _____ plan, which involves answers to five familiar questions: who, what, where, when, and how.
a.stratification b.fact-finding c.rapid application d.sequencing b.fact-finding
If an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should _____.
a.switch to closed-ended questions b.give the interviewee easy access to supporting material that might be needed c.continue using open-ended questions d.rudely conclude the meeting a.switch to closed-ended questions
A(n) _____ is a characteristic or feature that must be included in an information system to satisfy business needs and be acceptable to users.
a.system requirement b.property c.questionnaire d.object a.system requirement
When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a _____ might select every tenth customer for review.
a.systematic sample b.stratified sample c.random sample d.comprehensive sample a.systematic sample
A _____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve.
a.trigger b.constraint c.query d.key b.constraint
Knowing what is expected and when to go into detail is directly related to knowing _____.
a.who your targets are b.when to speak and when to remain silent c.why you are communicating d.where to communicate best a.who your targets are
A _____ involves breaking a project down into a series of smaller tasks.
a.work breakdown structure (WBS) b.value breakdown structure (VBS) c.risk breakdown structure (RBS) d.concept breakdown structure (CBS) a.work breakdown structure (WBS)
Which of the following is one of the main sectors of ecommerce?
a.C2C (consumer-to-consumer) b.B2C (business-to-consumer) c.C2B (consumer-to-business) d.BPM (business process model) b.B2C (business-to-consumer)
_____ enabled computer-to-computer transfer of data between companies, usually over private telecommunications networks.
a.Electronic data interchange (EDI) b.Radio frequency identification (RFID) c.Enterprise resource planning (ERP) d.Object-oriented (O-O) analysis a.Electronic data interchange (EDI)
Identify a method of developing systems that is well-suited to traditional project management tools and techniques.
a.Object-oriented analysis b.Adaptive method c.Structured analysis d.Rapid application development c.Structured analysis
_____ technology uses high-frequency radio waves to track physical objects.
a.Redundant array of independent disks (RAID) b.Radio frequency identification (RFID) c.Enterprise resource planning (ERP) d.Management information system (MIS) b.Radio frequency identification (RFID)
In a typical organizational model, top managers _____.
a.develop long-range plans, called strategic plans, which define a company's overall mission and goals b.provide direction, necessary resources, and performance feedback to supervisors and team leaders c.oversee operation employees and carry out day-to-day functions, coordinating operational tasks and people d.include users who rely on transaction processing (TP) systems to enter and receive the data they need to perform their jobs a.develop long-range plans, called strategic plans, which define a company's overall mission and goals
The _____ method of developing systems produces code that is modular and reusable.
a.object-oriented analysis b.adaptive c.structured analysis d.rapid application development a.object-oriented analysis
User productivity systems _____.
a.provide job-related information to users at all levels of a company b.simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied c.process data generated by day-to-day business operations d.include groupware programs that enable users to share data, collaborate on projects, and work in teams d.include groupware programs that enable users to share data, collaborate on projects, and work in teams
Many hardware and software companies offer _____ for IT professionals, which verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.
a.spot identification b.certification c.education d.accreditation
In a systems development life cycle (SDLC) model, the purpose of the _____ is to build a logical model of the new system.
a.systems analysis phase b.systems implementation phase c.systems design phase d.systems support and security phase a.systems analysis phase