5 8 10 7 6 9 info

Ace your homework & exams now with Quizwiz!

8. Explain the usefulness of alternate flows and when they are used.

Ans: Alternate or exceptional flows are those that can happen, but they are not the normal flow. They are documented separately to keep the normal flow of events as simple as possible. For example, in a student registration system, you may have alternate flows for students with financial or academic holds on registration, or those who have to deal with a closed class situation before they can complete their registration. Response: See page 171

7. Explain how the "project management" factor influences the selection of a design strategy for a project.

Ans: Managing a custom developed system requires excellent in-house project management skills. Packaged software requires a project manager who can coordinate a vendor's efforts. Outsourcing requires a highly skilled project manager at the level of the organization that matches the scope of the outsourcing deal. Response: See page 305

10. There are three primary types of outsourcing contracts: 1) time and arrangements, 2) variable-price, and 3) value added.

False

13. An actor in a use case must be a person.

False

1. The purpose of the design phase is to create a blueprint for the new system.

True

1. Use cases can be used to document both the current (As-Is) system and the future (To-Be) system.

True

10. A very complex use case should be broken down into a set of use cases.

True

11. An actor is represented in a use case diagram by a stick figure of a man.

True

6. A scenario is the same as a(n) _____. a. use case b. relationship c. path through a use case d. collection of use cases e. role

c

15. The following are all strengths of a packaged software design strategy EXCEPT _____. a. it may be bought and installed in a short time b. many business needs are not unique c. the package is already tested and generally proven to work d. there is an exact match of functionality to requirements e. none of the above

d

16. Object-oriented systems have three general types of cohesion: _____, _____, and _____. a. method, class, inheritance b. method, generalization/specialization, inheritance c. generalization/specialization, class, object d. method, class, generalization/specialization e. functional, sequential, procedural

d

16. To improve the access speed of a database, similar records in a table are stored together in primary key order. This optimizing access speed process is called _____. a. denormalization b. indexing c. interfile clustering d. intrafile clustering e. volumetrics

d

19. The process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate everything together is called _____. a. customization b. formal methodology c. outsourcing d. systems integration e. workaround

d

19. Which of the following Structured English statements is an advanced form of an IF statement? a. action statement b. For statement c. While statement d. Case statement e. Do statement

d

2. A(n) _____ is less expensive and easier for novice users to use, but it does not have the features that are necessary to support mission-critical or large scale systems. a. database b. database management system c. end-user database administrative system d. end-user database management system e. enterprise database management system

d

20. A public attribute is shown in a class diagram with the symbol _____ before the name. a. - b. # c. * d. + e. /

d

21. A(n) ___________ actor is a separate system that interacts with the current system using standard communication protocols, such as TCP/IP, FTP, or HTTP, or an external database that can be accessed using standard SQL. a. incremental b. simple c. open d. average e. complex

d

21. One way to identify objects for the class diagram is to scan the use case descriptions for ____. a. relationships b. object lists c. patterns d. nouns e. verbs

d

3. _____ has emerged as the standard for the design of object-oriented systems. a. Java b. C++ c. VisualBasic d. UML e. Microsoft .NET

d

4. The modeling focus of the interaction diagram is at the _____ level while the modeling focus on the class diagram is at the _____ level. a. class, object b. interaction, class c. class, interaction d. object, class e. high, low

d

8. In order to get an object to perform a method, a(n) _____ is sent to the object. a. state b. object c. attribute d. message e. instance

d

10. Which of the following objects would be most likely to be destroyed at some point in time in a sequence diagram? a. customer b. order c. order item d. invoice e. shopping cart

e

15. When a method of one object refers to the inside hidden parts of another object, these methods are exhibiting _____ coupling. a. data b. stamp c. control d. common or global e. content or pathological

e

12. What is an actor? What is their role in a system? Ans: An actor is a role played by an individual while they are interacting with the system, or it may be another system that interacts with the current system. An actor is not a specific person. Actors can provide input to the system, receive output from the system, or both. A primary actor is an actor who triggers the use case. Response: See page 173

13. Distinguish between logical models and physical models.

19. A behavioral state machine is a dynamic model that shows the different state through which a single _____ passes through its life in response to events, along with its responses and actions a. object b. actor c. use case d. sequence diagram e. communication diagram

: a

10. Draw a sketch of the diagramming symbol for each of the following components of a use-case diagram. • Actor • Use case • Subject boundary • Association relationship • Include relationship • Extend relationship • Generalization relationship

Actor Use case Subject boundary Association relationship * * Include relationship <<include>> Extend relationship <<extend>> Generalization relationship Response: See page 174

17. What is a walkthrough?

Ans. A walkthrough is a peer-review of a product. They can be used to verify and validate the models developed during analysis. Members of the walkthrough come from the client, the analysis team, and the design team. A presenter "walks" the team through the models. The team members are free to ask questions. The goal is identify errors. A scribe or recorder makes notes of the errors and problems identified by the team so these can fixed later. The team does not fix the problems, they are here to find problem spot only. To ensure reusability of the models that were developed, a special person called the "maintenance oracle" asks questions regarding maintenance of the models. The analysis team will correct the errors before handing the project over to the design team. Response: See page 273-274

11. List and briefly describe the four major steps in writing effective use-case descriptions and use-case diagrams.

Ans: Identify the major use cases In this step you find the boundary of the system, identify the primary actors, list the goals for those actors, identify and write the overviews for the major use cases, and review any current use cases. Expand the major use cases In this step choose one of the use cases to expand, fill in the details, write the normal flow for the events in that use case, decompose the flow into subflows if needed, list the possible alternate or exceptional flows, and describe how the actor or system should react when an alternate or exceptional flow occurs. Confirm the major use cases Review the set of use cases, and revise as needed, and then start at the top again. Create the use-case diagram Draw the system boundary, place the use cases on the diagram, place the actors on the diagram, and then draw the associations. Revise as needed. Response: See page 178

14. Describe the terms action, activity and object nodes that are found in an activity diagram.

Ans: Action is a simple non-decomposable piece of the overall behavior that is being modeled. On the other hand, an activity is used to represent a set of actions. An activity can further be decomposed into other activities or actions. Actions and activities can represent both computerized or manual behavior. They are depicted using rounded rectangles. Object nodes model objects in the activity diagram. They are represented using rectangles. Object nodes represent the flow of information from one activity to another activity. Response: See pages 160-162

12. What is the purpose of an alternatives matrix? What is the typical content? How will this tool be used by a project team in the context of design strategy selection?

Ans: An alternatives matrix organizes the pros and cons of the design alternatives so that the best solution will be chosen in the end. On one side of the matrix, technical, budget, and organizational feasibility is listed, along with the pros and cons of each alternative plus any other pertinent information. The various system candidates are listed along the top of the matrix. In each cell of the grid, detailed information on each alternative is inserted. The alternatives matrix provides a concise representation of the relevant issues on each option in an easily compared format. The team may just use it to facilitate discussion. Or, the team may assign weights to each of the factors, and then score each alternative on each factor, enabling them to compute a weighted average score for each alternative. This quantification may help the team identify the alternative that provides the best overall 'package' of feasibility. Response: See pages 306-307

6. Distinguish between the association and generalization relationships in use case diagrams. When would you use each of these relationships?

Ans: An association relationship documents the communication between the use case and the actors that use the use case. All actors involved in the use case will be documented with the association relationship. The generalization relationship allows use cases to support the concept of inheritance, since use cases can inherit the behaviors of other use cases. For example, Athlete Registration and New Student Registration can both have generalization relationships with Register for Classes, which would be used by the typical student. Response: See page 170

5. Distinguish between the extend and include relationships in use case diagrams. When would you use each of these relationships?

Ans: An extend relationship documents the extension of the functionality of the use case to incorporate optional behavior. For example, if the use case Register for Classes describes the registration process at your university, the use case Clear Financial Hold would only be executed for students who have financial holds on their registration, and the relationship between these two use cases would be an extend relationship. An include relationship represents the mandatory inclusion of another use case, which would happen if you had decomposed a particularly complex use case into several simpler ones. The text points out that this type of relationship allows for functional decomposition. Response: See page 170

15. What is an "object wrapper" and how can one be used to help integrate systems?

Ans: An object wrapper is an object that wraps around a legacy system, enabling an object-oriented system to send messages to the legacy system. Object wrappers create an application program interface (API) to the legacy system. This allows a firm to retain their investment in their legacy systems while integrating them with their object-oriented systems. Response; See page 302

16. Describe how to balance the functional and structural models.

Ans: Balancing means making sure that both sets represent the same thing, what is on one side is also on the side. In other works, the functional models (activity diagrams, use-case descriptions and use case diagram) must agree with the structural models (class diagram and CRC cards. In addition to role playing the CRC cards, there are four steps one can take to balance these models. First, every class in a CRC or in the class diagram must be associated to at least one use case. Second, every action or activity in an activity diagram and every event in a use case must be associated to at least one responsibility in a CRC card. Third, every object node in an activity diagram must be associated with an instance of a class in the class diagram and a CRC card, with an attribute contained in a class or CRC card. And fourth, every attribute and association/aggregation relationship contained on a CRC card should be related to the subject or object of an event in a use-case description. See page283-284

16. Erica has completed the use-case point analysis for the system she is building and found that it has 12 unadjusted actor weight points (UAW), 70 unadjusted use-case weight total (UUCW), a technical factor (Tfactor) of 15 and an environmental factor (Efactor) of 21. In computing this Efactor value Erica accounted for the fact that although she is very experienced, has top-notch technical skills, knows how to motivate her teams, her team for this project is partially staffed with part-timers who are not familiar with the system development process being used and who lack object-oriented experience. In other words, she has three environmental factors that count towards the person-hours multiplier (PHM). (a) How many person-hours will it take Erica to complete the project? (b) Next suppose that in addition to these three environmental difficulties, that she has two more strikes against her: the programming language being used is very difficult and the requirements are not stable. Should Erica rethink taking on this project? Explain.

Ans: Before anything else Erica first needs to compute the unadjusted use-case points (UUCP). UUCP is simply the sum of the UAW and the UUCW. In other words the UUCP equation is UUCP = UAW + UUCW. The values for UAW and UUCW are provided above. Plugging these values into the UUCP equation and computing, we find that the system has 82 unadjusted use-case points (UUCP). Next Erica needs to compute the adjusted use-case points (UCP). UCP is the product of UUCP, the technical complexity factor (TCF), and the environmental factor (EF). In other words the UCP equation is UCP = UUCP*TCF*EF. Erica has just computed the UUCP value. Unfortunately, she does not yet know the TCF and EF values. There are formulas for each: TCF = 0.6 + (0.01*Tfactor) EF = 1.4 + (-0.03*Efactor) Since the Tfactor and Efactor values are provided, Erica can plug these into these formulas and find that TCF = 0.75 EF = 0.635 Then plugging these values into the UCP equation and computing we find that the system has a value of 33.3375 adjusted use-case points (UCP) Now that Erica knows the UCP, she can compute the number of person-hours. The equation states that this is simply the product of the UCP and person-hours multiplier (PHM). In other words the conversion formula is Effort = PHM*UCP. We can now answer parts (a) and (b) a. Normally, when there are two or less environmental factors working against the timely delivery of the project, the PHM is taken to be 20 person-hours per adjusted use-case point. However, Erica has three strikes against her and must use a PHM value of 28: Effort = 33.3375*28 = 666.75 person-hours (since this is only an estimate, it makes sense to round this number to 670) b. Yes. Rethink it Erica. The rule of thumb is that if you have five or more environmental factors working against you, you need to rethink whether to take on the project. Here you have five. Maybe hire the part-timers to work full time, or get part-timers with more experience, or limit the scope of the project so the requirements are more stable. Without some adjustments, this project is too risky. You might never complete it. Response: See pages 182-187

15. Distinguish between control flows and object flows in an activity diagram.

Ans: Control flows model the paths of execution through a business process. Control flows can only be attached to actions or activities, and are depicted using a solid line with an arrowhead depicting the direction of flow. Object flows model the flow of objects through the business process. Since activities or actions modify or transform objects, object flows are necessary to show the actual objects that are used by and modified by these actions and activities. Object flows are depicted using dashed lines with arrows, and must have an activity at one end and an object at the other end. Response: See page 162

1. Describe the custom development design strategy. Discuss its advantages and disadvantages.

Ans: During custom development the project team actually builds the new system from scratch. Advantages to custom development include control over the way the system looks and functions, flexibility and creativity in the way the business problem is solved; and the ability to build technical and functional knowledge within the company. Disadvantages to custom development include factors such as the use of an already over committed IS staff, a fully trained and experienced staff must already be in place before attempting custom development, and the risks (testing and recreating the wheel) associated with building a system from the ground up. Response: See pages 299-300

11. Outsourcing can be a risky strategy to use when developing new information systems. Discuss ways to improve the likelihood of a successful outsourcing agreement.

Ans: First, select the outsourcer carefully. Find an outsourcer with whom you can establish a partnership arrangement; both sides should benefit from the contract. Second, be very clear on the requirements you have before signing the contract. Don't outsource what you don't understand. Third, assign someone to manage the outsourcing relationship. Don't assume it will maintain itself. Keep the line of communication open between you and your outsourcer. Finally, develop a contract that emphasizes flexible requirements, long-term relationships, and short-term contracts. Response: See page 303

14. Describe the five-step process for creating package diagrams.

Ans: First, set the context for the package diagram. Second, cluster the classes together into partitions based on the relationships that the classes share. Third, place the clustered classes together in a partition and model the partitions as packages. Fourth, identify the dependency relationships among the packages. Fifth, place the dependency relationships on the evolved package diagram. Response: See pages 297

9. Kiki, the marketing manager, and Joan, the director of information systems, have just returned from a conference on state-of-the art technology for marketing management. Each day after viewing vendor presentations and listening to other marketing managers discuss "what they don't have and what they really need," Kiki and Joan would brain storm ideas and record them in Joan's laptop. On the flight home, Joan, a successful project manager, and Kiki, an experienced marketing professional, recognize that they have the foundation for a one-of-a-kind marketing management system that would improve the decisions the marketing staff must make. This new system could possibly change the way their primary products are marketed. In the process, this new system could save the company millions of dollars and possibly make millions more. Joan has an expert IS staff that is just completing a production management system. They are always interested in learning new technology and often request additional training. No new projects have been approved by the steering committee. What would you recommend Kiki and Joan do? Include in your discussion the design strategy selection process and the important characteristics that apply to the strategy selected.

Ans: I would recommend that Kiki and Joan make a formal request for a new marketing management system to the steering committee. The new system should be custom developed because all of the following selection characteristics point towards that decision. The business need is unique and has been identified by marketing managers as a big money saver and maker. Joan is identified as a successful project manager with an expert IS staff, so the in-house technical experience probably exist. Kiki is identified as an experienced marketing professional, so the in-house functional experience probably exists. The IS staff have a history of building new in-house skills on prior projects and from continued professional training. Joan is identified as a successful project manager that probably employees a proven methodology. The time frame appears to be flexible since not projects are currently in the pipeline for development and the current project is about to be completed. Response: See pages 304-306

6. Explain how the factor "project skills" influences the selection of a design strategy for a project.

Ans: Improving technical and functional project skills of in-house employees may be a strategic process within an organization. Custom development is good if an organization wishes to build in-house skills. Purchasing packaged software or outsourcing may be done if building skills is not strategic. Response: See page 305

10. Mariana, the IS manager, has just received a note from the accounting department stating that they wish a new purchasing system could be placed on the priority list. The chief accounting officer (CAO) has just learned that three of their competitors have new purchasing systems. Since purchasing has not been considered a key business function in the past, the CAO is concerned that his department lacks the functional expertise to implement a new purchasing system. She feels that purchasing is becoming a strategic necessity for the company and a new system should be in place by this time next year. The CAO has managed the automation of numerous accounting functions, such as the purchase of a combined general ledger with accounts receivable and accounts payable, the custom development of a just-in-time inventory control system, and the management of a financial projections and stock funds project that was contracted to an outside vendor. What would you recommend Mariana do? Include in your discussion the design strategy selection process and the important characteristics that apply to the strategy selected.

Ans: Mariana should place a new purchasing system on the priority list if the funds are available to outsource the project. The reasons for outsourcing are quite clear. The business need is not unique, common to the business, or critical to the company. The accounting department lacks functional experience in the purchasing process (no mention is made of technical experience). The CAO has a vast amount of project management experience with many different types of oversight expertise, one of which was managing a project that was contracted to an outside vendor. The purchasing process is becoming more of a strategic concern of the organization and the decision to include this project on the priority list should be a strategic one. Finally, the time frame is about a year, which is short but flexible. All of the strategic characteristics point toward outsourcing as the type of development strategy. Response: See pages 304-306

3. Describe the outsourcing design strategy. Discuss its advantages and disadvantages.

Ans: Outsourcing is when an external vendor, developer, or service provider is hired to create the system. This type of development strategy has increased in popularity recently. Advantages of outsourcing include factors such as the outsourcer may have more experience, technology, and resources. Outsourcing is often seen as adding value to the organization instead of reducing costs. A disadvantage to outsourcing is that the outsourcer gains the knowledge of building the new system and the customer does not. Response: See page 302-303

2. Describe the packaged system design strategy. Discuss its advantages and disadvantages.

Ans: Packaged software is the purchase of software for a non-unique business need. Advantages for buying packaged software include efficiency (the programs are already created, tested, and proven), quick installation, and the expertise and experience from the vendor who created the software. Disadvantages of packaged software include the functionality of the system is inflexible and may not be a perfect fit, and the new software package may not integrate with existing legacy software. Response: See page 300-301

9. What is the SVDPI form for steps in a use case, and why is it important to use this format when writing use cases? Provide an example of a sentence written in this format.

Ans: SVDPI represents Subject-Verb-Direct Object and optionally Preposition-Indirect Object. This form of the sentence is useful for identifying classes and operations from the use case description. An example may be something like "The Student contacts the academic department to obtain a closed-class waiver." Response: See page 172

5. Explain how the "in-house experience" factor influences the selection of a design strategy for a project.

Ans: The availability of in-house experience for all functional and technical needs is important. A packaged system is an alternative for organizations that do not have in-house technical experience. Outsourcing is a way to bring outside functional or technical experience into the organization that is missing in-house, but outsourcing does not build experience for the in-house staff. Response: See pages 304-305

13. Briefly describe the five different software layers.

Ans: The foundation layer contains classes that are necessary for any object-oriented application to exist, such as fundamental data types, data structures, and abstractions. The system architecture layer addresses how the software will execute on specific computers and networks. This layer includes classes that deal with communications between the software and the operating system and the network. This also includes classes that would interact with middleware applications. The human-computer interaction layer contains the classes associated with the implementation of the user interface. This deals with issues like the navigation through the system, help system, and the types of input and output elements to be included. The data management layer addresses the issues involving the persistence of the objects contained in the system. The types of classes that appear in this layer deal with how objects can be stored and retrieved. The problem domain layer is the layer that the majority of this course focuses on - the actual business problem that the system is designed to address. Response: See pages 293-294

7. Explain the difference between normal flows and sub-flows that would be documented in a use case.

Ans: The normal flow of events describes the steps that are normally executed in a use case. The steps in a normal flow are listed in the order in which they are performed. In some cases it is recommended that the steps in a normal flow be decomposed to simplify the normal flow. Thus, subflows are used to help keep the normal flow of events as simple as possible. Subflows represent the decomposition of normal flow steps. At times, subflows could be replaced with a separate use case, if it makes sense. Response: See pages 170-171

2. How does a project team go about obtaining the information they need to create use case descriptions?

Ans: The project team must work closely with the users as they develop the use cases. Often the project team will use interviews, JAD sessions, and observation to gain this information. In reality, the techniques are similar to those discussed in Chapter 4 of the text. The key will be keeping in mind that a use case is associated with a role that a person plays in the system, not with a specific person. Response: See pages 167

8. Explain how the "time frame" factor influences the selection of a design strategy for a project.

Ans: The time frame for a project is an important characteristic. Custom development requires a very flexible time frame. It normally takes longer than expected. A packaged system can be implemented in a shorter time frame. Outsourcing may be completed in a flexible or short period depending on the size and scope. Response: See pages 305-306

4. What are the five characteristics of a use case that impacts its importance level? Describe each, and indicate what conditions would result in a higher importance level.

Ans: The use case may represent an important business process, which results in a higher importance level. The use case may support the generation of revenue or cost reduction. If so, this would result in a higher importance level. If the technology needed to support the use case is new or risky, that will result in a higher importance level. If the functionality in the use case is complex, risky, and/or time-critical, then the importance level will be higher. If the use case could help increase the level of understanding of the evolving design of the system, and this increase in understanding comes with little relative effort, then the importance level will be higher. Response: See pages 168-169

4. Explain how the "business need" factor influences the selection of a design strategy for a project.

Ans: There are five characteristics of any design strategy. They are business need, in-house experience, project skills, project management, and the time frame. Out of these five factors, if the business is quite common, there may be technical solutions in the market place that already meet this common business need. A common need means that the solution probably already exists in the marketplace and can be purchased in package software. A unique business need means a solution will need to be created from scratch by custom development. Non-core business needs can be outsourced. Response: See page 304

1. Write a complete use case description for the interaction that a student would have with your college or university's class registration system.

Ans: There is no single correct answer to this question, as it will depend on the particular details of your school's system. Also, it may vary based on the student's perspective on the system. For example, at most schools athletes go through a different registration process than the rest of the students. This use case description, though, should document the following to be correct: • Use case name • Primary actor • Use case type • Stakeholders and interests • Brief description • Trigger • Relationships • Normal flow of events • Alternate/exceptional flows (this should include closed classes or others where special permits may be needed, holds on registration because of uncleared financial situations, etc.) Response: See pages 166-173

3. What are the four types of use cases? When are each used?

Ans: Use cases will vary based on the purpose of the use case and the level of detail they contain. Thus, there will be overview versus detail use cases, and essential versus real ones. Overview use cases allow the analyst and the user to agree on a high-level overview of the requirements. This use case will only document information such as the name, ID number, primary actor, type, and a brief description. Detail use cases will document all of the information for the use case. These will be developed after all of the overview use cases have been agreed to by the users and the analysts. An essential use case describes only the minimum information necessary to understand the required functionality of the system. A real use case goes beyond the essential use case and describes the specific set of steps required to understand the functionality of the system. Essential use cases are implementation independent whereas real use cases are detailed descriptions of how to use the system once it is implemented. Response: See pages 167-168

14. If the logical data model contains fields that depend on another non-primary key field, then it is in violation of the rules of _____. a. base normal form b. first normal form c. non-normal form d. second normal form e. third normal form

D

11. Pirate Adventures, Inc., a company that owns and operates hotels in tropical locations, is interested in replacing the 15-year-old room reservation system in all of its hotels. Custom development would be the best design strategy.

False

12. Max has been a project manager for 10 years and is considered one of the best in his department of well qualified IS professionals. The approval committee is considering the approval of a new unique Internet system that could possibly catapult the firm ahead of all of the competition. Buying a packaged system would be the best design strategy.

False

14. An actor in a use case always represents a specific user.

False

14. Many project teams believe that packaged software is the best way to create a system because they have complete control over the way the system looks and functions, and they can be flexible and creative in the way they solve business problems.

False

15. Enterprise resource planning (ERP) applications are small single-function software packages that are inexpensive and easy to install and have only minor problems and fast, easily recognizable benefits.

False

17. Custom development of software is usually the best strategy for common business needs, particularly when the business need is not unique and does not have special requirements.

False

18. Rectangles are used to represent association relationships in use case diagrams.

False

19. Each use case can be associated with one or more role(s) that users have in the system.

False

19. If in-house experience exists for all the functional and technical needs of the new system, it will be easier to outsource the building of the system, because the company employees with those skills will be able to quickly learn the new system with very little training.

False

20. A use case that represents an important business process and involves the use of new technology would likely be given an importance level of medium.

False

20. Object-oriented systems can send messages to a legacy system through the use of a package wrapper.

False

21. The design strategy that would be most logical to a firm with a very limited amount of in-house IS expertise is allow end-users to create the system.

False

22. A company adopting an enterprise resource planning (ERP) application, has adopted the strategy of outsourcing.

False

22. The use case Take Order has a temporal trigger if it begins when a customer calls to place an order.

False

24. A use case should be written from the perspective of at least one of the actors associated with the use case.

False

24. When using the packaged software design strategy, substantial time can be saved because the project team no longer has to spend time defining the requirements of the new system.

False

25. A solid line without arrows between an actor and a use case in a use case diagram represents a one-way flow of communication from the actor to the use case.

False

26. Use cases are typically written to document the normal flow of events. Exceptions that occur in the normal flow need not be documented as part of the use case description.

False

27. As many as 70% of companies with IT budgets over $5 million are currently outsourcing development of systems.

False

28. When drawing use case diagrams, higher level use cases are drawn below lower level use cases.

False

29. Outsourcing eliminates all risks from the project.

False

29. The first step in creating use case diagrams is to identify the primary actors and their goals.

False

3. An essential use case describes the specific set of steps to be followed.

False

30. A value added contract provides for flexibility, but may result in a larger than expected bill.

False

31. Control flows in an activity diagram show the flow of objects into and out of activities.

False

33. When the business need is unique and the process is critical to the business, the most appropriate development strategy is packaged software.

False

34. Paths coming out of a decision node are always mutually-exclusive, while the paths coming out of a fork node are sometimes concurrent and sometimes mutually-exclusive.

False

36. When selecting a design strategy an organization should consider project management experience, project skills, functional skill development, time frame, costs, and flexibility.

False

37. Michelle would like the opportunity to increase the experience level of her IS staff by having them analyze and design a new web-based distribution system. The skills learned from this project may help with future strategic applications. Since the time period for the project is very flexible and this is a somewhat unique business need, Michelle has decided to use packaged software for this project.

False

37. Setting the scope of the activity being modeled is a task that can be accomplished after completing the activity diagram.

False

38. The value of the unadjusted use-case points weight total (UUCW) is the sum of the number of unique transactions in each of the use cases.

False

39. When the timeframe for implementation is short, it is best to consider custom development.

False

4. A package diagram is a class diagram that shows only packages and classes.

False

41. To compute the adjusted use-case points (UCP), the unadjusted use-case points weight total (UUCW) is multiplied by the technical complexity factor (TCF), the environmental complexity factor (ECF), and the business-impact factor (BIF).

False

43. In the design phase we address the functional requirements.

False

5. There are three design strategies: 1) developing a custom application in-house, 2) hiring a consultant, and 3) relying on an external vendor, developer, or service provider to build the system.

False

6. The include relationship represents the optional inclusion of another use case.

False

7. It is much less efficient to buy packaged software that has already been created, tested, and proven than to build a system from scratch.

False

8. An alternate or exceptional flow in a use case documents the decomposition of the normal flow of events.

False

12. An include relationship is modeled in a use case diagram by an arrow with the word <<include>> above it.

True

13. It can be much more efficient to buy programs that have already been created, tested, and proven, and a packaged software system can be bought and installed in a relatively short period of time compared with a custom system.

True

15. As you work through the SDLC, it is likely that the system boundaries will change.

True

16. It is a good idea to have the users role play the use cases as a way of confirming them during the analysis phase.

True

16. The three primary types of contracts that can be drawn to control the outsourcing deal are (1) a time and arrangements contract, (2) a fixed-price contract, and (3) a value-added contract.

True

17. A formal way of representing how a business system interacts with its environment is termed a use case.

True

18. Custom applications require excellent project management and a proven methodology, and the project team should choose to develop a custom application only if it is certain that the underlying coordination and control mechanisms will be in place.

True

2. The layer that would include the classes that would interact with middleware applications is the physical architecture layer.

True

2. Use cases are the primary drivers for all of the UML diagramming techniques.

True

21. A use case that begins at the end of the month has a temporal trigger.

True

23. A workaround is a custom-built add-on program that interfaces with the packaged application to handle special needs.

True

23. As Felix is documenting an order entry system, he discovers that someone can call up to place an order that is not a customer. In this case, the Take Order use case will use the Create Customer use case to capture the customer information, and then the order will be taken. This is an example of the extend relationship between use cases.

True

25. Time and arrangements types of outsourcing contracts would be preferred when the client and the outsourcer have difficulty specifying the work required to complete the project.

True

26. A disadvantage of outsourcing the application development process is that the organization may lose control over confidential information.

True

27. An asterisk on a relationship in a use case diagram represents multiplicity of the association.

True

28. An advantage of outsourcing the application development process is that the organization may acquire technical skills and functional knowledge from the vendor.

True

3. A package is a logical grouping of UML elements.

True

30. Object nodes in an activity diagram are depicted using rectangles.

True

31. A(n) fixed price contract provides for a stable customer price, but requirements will be well defined by the outsourcer at the beginning of the contract period.

True

32. A(n) value added contract, that is gaining in popularity, provides for the outsourcer to gain a percentage of the completed systems benefits.

True

32. Control flows in an activity diagram are shown using solid-lines with arrows while object flows are shown using dashed lines with arrows.

True

33. A decision node in an activity diagram is used to represent the actual test condition that is used to determine which of the paths exiting the node is to be traversed.

True

34. Packaged software is preferred when the business need is common and time is a constraining factor?

True

35. Join nodes in an activity diagram are used to bring concurrent or parallel flows together back into a single flow.

True

35. When the project skills are not strategic but they do exist in-house and the time frame is short, the most appropriate development strategy is packaged software.

True

36. A guard condition represents the value of the decision-test, based on which a particular path from the decision node will be traversed.

True

38. Michael would like to complete this development project quickly so that the IS department may move onto more strategic needs. He has assigned Joan to coordinate the project because she worked recently with a local vendor and has an established relationship. Michael has decided to use package software for this project.

True

39. A use case with seven unique transactions contributes ten unadjusted use-case points.

True

4. A use case that describes functionality that is complex and risky would be given a high importance level.

True

40. A use case with eight unique transactions contributes fifteen unadjusted use-case points.

True

40. An alternative matrix combines several feasibility analyses into one table so that the pros and cons of alternatives can be easily compared.

True

41. A request for information is used to solicit proposals from vendors.

True

42. Design models refine analysis models by adding details from the solution domain.

True

42. To compute the adjusted use-case points (UCP), the unadjusted use-case points weight total (UUCW) is multiplied by the technical complexity factor (TCF) and the environmental complexity factor (ECF).

True

44. Every sequence diagram must be associated to a use case in the use-case diagram.

True

45. The attributes that change in a behavior state machine must appear in the object attribute list.

True

5. The primary actor is the person or thing that starts the execution of a use case.

True

6. Custom development allows developers to be flexible and creative in the way they solve business problems.

True

7. Inheritance is supported in use cases through the generalization relationship.

True

8. An object wrapper creates an application program interface (API) to a legacy system, enabling object-oriented systems to interact with it.

True

9. Some benefits of outsourcing are that the service provider may be more experienced in the technology that would greatly benefit your organization and may have more experienced programmers.

True

9. The SVDPI form of sentences in use cases aids in the identification of classes.

True

1. Detailed design is important for two reasons. First, preexisting classes and components need to be understood, organized, and pieced together, and second, _____. a. it is common for the project team to write some code and produce original classes that support the application logic of the system b. it is tempting to jump in without planning c. modular design is outdated d. the SDLC continues to be used instead of a more reliable method of analysis for systems e. top-down modular approaches are an acceptable method of analysis that must be performed during the planning phase

a

1. The design phase of the SDLC creates a(n) _____. a. blueprint for the future system b. picture of the as-is system c. understanding of who, what, when, and where the future system will be d. understanding of why build the system e. none of the above

a

1. The external behavior of a system is described by _____. a. functional models b. structural models c. behavioral models d. interaction diagrams e. statechart diagrams

a

11. CRC cards are used to document the responsibilities and collaborations of a(n) _____. a. class b. relationship c. object d. attribute e. operation

a

13. On a sequence diagram, an object name of Students:List would indicate that _____. a. Students is an instance of the List class that contains individual student objects b. List is an instance of the Students class c. List is a method of the Students class d. the Students and Lists objects are combined for that step in the sequence diagram e. a message is being passed from the Students class to the List class

a

13. Which of the following relationships describe the communication between the use case and the actors? a. association relationship b. extend relationship c. include relationship d. generalization relationship e. none of the above

a

14. A _____ object is an instance of a class that sends a request to an instance of another class for an operation to be executed. a. client b. server c. contract d. requester e. CRC

a

16. The first step in building a sequence diagram is to _____. a. set the context b. identify which objects will participate c. set the lifeline for each object d. add the focus of control to each object's lifeline e. validate the sequence diagram

a

18. A disadvantage of purchasing packaged software is that the organization may _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. make strategic changes during implementation d. remove all risk from the project e. save money on the purchase

a

18. The acronym CRUD stands for _____. a. create, read, update, delete b. create, reference, underline, delete c. create, re-do, underline, delete d. collaborate, read, update, delete e. collaborate, reference, update, discard

a

18. The correct sequence of the major steps in creating use case diagrams is _____. a. identify the major use cases, expand the major use cases, confirm the major use cases, create the use-case diagram b. identify the major use cases, expand the major use cases, create the use-case diagram, confirm the major use cases c. create the use-case diagram, identify the major use cases, expand the major use cases, confirm the major use cases d. create the use-case diagram, identify the major use cases, confirm the major use cases, expand the major use cases e. identify the major use cases, confirm the major use cases, expand the major use cases, create the use-case diagram

a

19. A class diagram is a(n) _____ model. a. static b. dynamic c. evolving d. obsolete e. none of the above

a

19. A mini-table that contains values from one or more columns in a table and the location of the values within the table is called a(n) _____. a. index b. interfile cluster c. intrafile cluster d. raw data calculation e. volumetric

a

20. A simple rule to follow when creating problem domain classes and data access and manipulation classes is that there should be ______________. a. One data access and manipulation class for each concrete problem domain class b. Two data access and manipulation classes for each concrete problem domain class c. N data access and manipulation classes for each concrete problem domain class, where N is the number of methods in the problem domain class d. N data access and manipulation classes for each concrete problem domain class, where N is the number of subclasses of the problem domain class e. None of the above

a

22. A(n) ______ matrix can be used to organize the pros and cons of the design alternatives so that the best solution will be chosen in the end. a. alternative b. cost-benefit c. feasibility d. design e. evaluation

a

5. A(n) _____ of an analysis class is where the behavior of the class is defined. a. operation b. attribute c. class d. object e. abstract class

a

5. The basic building block of a system is the _____. a. object b. attribute c. message d. partition e. method

a

6. A(n) _____ describes information about an object. a. attribute b. behavior c. operation d. message e. instance

a

7. Each use case describes _____ function(s) in which users interact with the system. a. one b. one or more c. many d. zero, one, or more e. all

a

8. "A-kind-of" relationships represent _____ relationships. a. generalization b. association c. aggregation d. subsetting e. vague

a

9. A(n) _____ use case is typically created early in the process of understanding the system requirements as a way of documenting basic information about the use case. a. overview b. detail c. essential d. real e. imaginary

a

9. _____ refers to the level of interdependency or interrelationship among the modules in a system. a. coupling b. cohesion c. connascence d. multiple inheritance e. single inheritance

a

A(n) _____ is a formal way of representing how a business system interacts with its environment. a. use case b. physical model c. relationship d. system boundary e. trigger

a

10. A class/object should only represent one thing, and a method should only solve a single task. This principle is often referred to as _____. a. coupling b. cohesion c. connascence d. multiple inheritance e. none of the above

b

10. If a "student signs up for a class," which type of relationship would you use to model the relationship between the two? a. generalization b. association c. aggregation d. subsetting e. vague

b

11. A systems analyst draws a lifeline with an X at the end. This lifeline represents _____. a. a message that cannot be delivered b. an object that is destroyed at a point in time c. a message that is delivered at that point in time d. an object that is complete at that point in time e. an object that arrives at its final destination

b

11. A(n) _____ occurs when data are stored redundantly in a database and only some of the instances are updated when a change is needed. a. error b. update anomaly c. data integrity concern d. storage efficiency e. none of the above

b

12. A(n) _____ formalizes the interactions between a client and server object. a. relationship b. contract c. abstract object d. concrete object e. abstraction

b

12. The event that causes a use case to begin is called a(n) _____. a. action b. trigger c. hammer d. anvil e. stakeholder

b

12. Which of the following types of interaction coupling is "best?" a. stamp b. data c. content or pathological d. common or global e. control

b

13. If the data model does not have any repeating fields it is in _____. a. base normal form b. first normal form c. non-normal form d. second normal form e. third normal form

b

13. The following are all classic design mistakes EXCEPT _____. a. feature creep b. including design time c. reducing design time d. silver bullet syndrome e. switching tools in mid-project

b

14. Which of the following relationships represent the extension of the functionality of the use case to cover optional behavior? a. association relationship b. extend relationship c. include relationship d. generalization relationship e. optional relationship

b

15. A _____ object is the instance of a class that receives a request from another object. a. client b. server c. contract d. provider e. CRC

b

15. In order to reduce the number of joins that must be performed in a query and to increase the speed of data access, the data analyst will _____ the physical model. a. cluster b. denormalize c. index d. normalize e. optimize

b

16. A mechanism for developing CRC cards is for the user or analyst to role-play as if they are an instance of the class. This process is called _____. a. acting b. anthropomorphism c. interviewing d. anamorphous e. observation

b

16. An advantage of custom development is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. install in a short period of time d. remove all risk from the project e. save money on the purchase

b

17. If a use case becomes too complex, it should be _____. a. rewritten to simplify it b. decomposed into a set of use cases c. written with a series of repeating steps to simplify it d. written from the perspective of an independent observe to simplify it e. dropped from the system, as it will be too complex to implement in the final system

b

18. Fan-out refers to _____. a. the number of attributes a class has b. the number of messages sent by a method c. the number of times a message is sent by a method d. the number of times an attribute is passed from a class e. none of the above

b

18. The size of a database is determined by the _____. a. amount of raw data in the tables b. amount of raw data in the tables and overhead requirements for the DBMS c. number of instances in the tables d. overhead requirements for the DBMS overhead requirements for the DBMS and number of instances in the tables

b

19. When drawing the use-case diagram, an analyst should do the steps in this order: _____. a. draw the use cases on the diagram, identify the system boundary, place the actors on the diagram, and draw the lines connecting the actors to the use cases b. identify the system boundary, draw the use cases on the diagram, place the actors on the diagram, and draw the lines connecting the actors to the use cases c. place the actors on the diagram, draw the use cases on the diagram, identify the system boundary, and draw the lines connecting the actors to the use cases d. identify the system boundary, place the actors on the diagram, draw the use cases on the diagram, and draw the lines connecting the actors to the use cases e. none of the above gives the correct order of steps

b

2. An analyst depicts the static view of an information system with _____. a. use-case models b. structural models c. behavioral models d. interaction diagrams e. statechart diagrams

b

20. The audience for pseudocode is the _____. a. analyst b. programmer c. manager d. user e. customer

b

22. A complex use case is one that has more than _____ unique transactions. a. 5 b. 7 c. 9 d. 10 e. 12

b

4. A(n) _____ is basically an electronic list of information that is stored on a disk. a. sequential access file b. unordered sequential access file c. ordered sequential access file d. random access file e. transaction file

b

5. A(n) _____ is the equivalent to a subsystem. a. collaboration b. partition c. layer d. factor e. abstraction

b

6. Which of the following will be converted to methods in later phases of the SDLC? a. attributes b. operations c. classes d. objects e. abstract classes

b

6. _____ means having the ability to send the same message to different objects, which can be interpreted differently by different objects. a. encapsulation b. polymorphism c. inheritance d. coupling e. cohesion

b

7. _____ suggests that only the information required to use an object should be available outside the object. a. encapsulation b. information hiding c. polymorphism d. inheritance e. cohesion

b

8. Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time for one particular use case. a. structural models b. sequence diagrams c. collaboration diagram d. class diagrams e. behavioral state machines

b

1. Which of the following are used to create objects? a. concrete objects b. abstract objects c. concrete classes d. abstract classes e. concrete instances

c

10. The importance level of a use case increases for all of the following characteristics of the use case EXCEPT _____. a. the use case represents an important business process b. the use case supports revenue generation c. the technology is proven d. the functionality is complex e. the functionality is time-critical

c

13. Of all of the types of interaction coupling, _____ is the worst. a. stamp b. data c. content or pathological d. common or global e. control

c

15. When an object sends a message to itself in a sequence diagram, that is referred to as _____. a. recursive-messaging b. self-messaging c. self-delegation d. recursive-delegation e. none of the above

c

15. Which of the relationship types in use cases enables functional decomposition? a. association relationship b. extend relationship c. include relationship d. generalization relationship e. decompose relationship

c

17. A class has an attribute in which a range of values has a semantic meaning. This class has _____ connascence. a. Name b. Type or Class c. Convention d. Algorithm e. Position

c

17. In a communication diagram, a(n) _____ between actors and objects is shown with an undirected line. a. procedure calls b. data flow c. association d. message e. relationship

c

18. Which of the following would not be an appropriate class name? a. student b. patient c. John d. customer e. doctor

c

2. An _____ of an analysis class represents a piece of information that is relevant to the description of the class. a. instance b. object c. attribute d. operation e. relationship

c

20. In estimating size and effort using use-case points, once the use-cases and use case diagram have been created, the actors and use cases must be classified as _____, _____, or ______. a. incremental, average, or radical b. small, average, or large c. simple, average, or complex d. discretionary, average, or urgent e. open, average, or closed

c

20. Manipulating certain parameters to refine the way features work in a software package is called _____. a. a workaround b. adjustment c. customization d. feature adjustability e. parameterizing

c

3. The two types of interaction diagrams are ______________ diagrams. a. use-case and sequence b. class and sequence c. sequence and communication d. object and communication e. statechart and object

c

4. When an analyst discovers that a set of classes have a similar set of attributes and methods, it may make sense to _____ out the similarities into a separate class. a. refine b. abstract c. factor d. partition e. separate

c

5. SQL operates on _____. a. rows of data at a time b. columns of data at a time c. tables of data at a time d. the entire database e. any of the above

c

7. In an object-oriented database, an extent is the equivalent to a(n) _____ in a relational database. a. attribute b. row c. table d. relationship e. unique identifier

c

7. _____ are information that is sent to objects to tell it to execute one of its behaviors. a. attributes b. operations c. messages d. instances e. use-cases

c

8. The layer that keeps the user interface implementation separate from the application or problem domain classes is the _____ layer. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

c

8. The type of database that is most capable of supporting complex data types is _____. a. sequential files b. relational DBMS c. object-oriented DBMS d. object-relational DBMS e. random access files

c

9. "A-part-of" or "has-parts" relationships represent _____ relationships. a. generalization b. association c. aggregation d. subsetting e. vague

c

10. Which of the following is not a fundamental way to approach the creation of a new information system? a. develop a custom application in-house b. rely on an external vendor to build the system c. purchase a software package and customize it d. rely on end-users to develop it themselves e. all of the above are ways to create new information systems

d

11. The _____ relationship in use cases allows use cases to support the concept of inheritance. a. association b. extend c. include d. generalization e. none of the above

d

11. To avoid the classic design mistake of "silver bullet syndrome," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade development tools unless there is a compelling need d. not use a design tool that appears too good to be true e. use rapid application development techniques or timeboxing

d

11. What are the two types of coupling in object-oriented systems? a. interaction, data b. data, inheritance c. data, stamp d. interaction, inheritance e. data, common

d

12. A data model that does not contain repeating fields and that the data models leads to tables containing fields that are dependent on a whole primary key is in _____ normal form. a. balanced b. first c. primary d. second e. third

d

12. There are three methods to create a new system. They are _____. a. buy a package, external vender, external service provider b. develop custom application in-house, external service provider, and external vender c. external service provider, rely on a developer, and external vender d. in-house custom application, buy a package, and external vender e. in-house custom application, external service provider, and external vender

d

14. The following are all strengths of a custom development design strategy EXCEPT _____. a. builds technical skills b. greater creativity c. greater flexibility d. lower risk e. none of the above

d

14. The order of messages on a sequence diagram goes from ____ to _____. a. right to left b. bottom to top c. left to right d. top to bottom e. left to right, top to bottom

d

14. When a global data area exists outside individual objects, the resulting system has _____ interaction coupling. a. stamp b. data c. content or pathological d. common or global e. control

d

4. Which of the following types of attributes is not proper in an analysis class? a. integers b. strings c. doubles d. compound e. date

d

6. Which of the following is NOT a characteristic of current object-relational databases? a. storage of objects in the relational table structure b. good support for typical data management operations c. SQL support d. support for inheritance e. all of the above are characteristics of object-relational databases

d

7. Service is another name for _____. a. attribute b. class c. abstract class d. operation e. object

d

8. Jim has documented a use case that describes the functionality of a system as "To compute gross pay, multiply the hours worked that are recorded on the time card from the time clock by the hourly rate that is recorded in the employee master file from the MS SQL server database." This is an example of a(n) _____ use case. a. overview b. detail c. essential d. real e. imaginary

d

9. The _____ layer addresses the issues involving the persistence of the objects contained in the system. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

d

9. When arranging actors and objects on a sequence diagram, it is nice to list them _____. a. in alphabetical order down the side of the diagram b. in alphabetical order across the top of the diagram c. in order in which they participate in the sequence down the side of the diagram d. in order in which they participate in the sequence across the top of the diagram e. actors and objects are not both shown on a sequence diagram

d

1. Data may be stored in the following formats _____. a. databases b. entities c. entities and files d. files e. files and databases

e

10. A relational database may be optimized for _____. a. data type and storage efficiency b. relational type c. speed of access d. storage efficiency e. storage efficiency and speed of access

e

12. The focus in a sequence diagram is on __________________ a. How actors interact with objects to realize a given use case b. Messages sent by actors to other objects c. when an object is being created d. when messages are being destroyed e. time ordering of messages being passed between objects

e

13. A collaboration consists of _____. a. two instances of a class talking with each other b. two instances of a class knowing the value of each others attributes c. a set of classes that share common operations d. a set of classes that are all related to one another e. a set of classes involved in a use case

e

16. Individual steps in a use case should be written in the form _____. a. Direct Object, Verb, Subject, Preposition, Indirect Object b. Direct Object, Subject, Verb, Preposition, Indirect Object c. Subject, Verb, Preposition, Indirect Object, Direct Object d. Subject, Verb, Indirect Object, Preposition, Direct Object e. Subject, Verb, Direct Object, Preposition, Indirect Object

e

17. An advantage of purchasing packaged software is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. have developers climb the knowledge ladder d. make strategic changes during implementation e. save money on the purchase

e

17. Which of the following is part of a CRC card? a. class name b. type c. description d. responsibilities e. all of the above

e

17. _____ is the process of estimating the amount of data that the hardware will need to support, so that the server hardware specifications are sufficient for the project's needs. a. Indexing b. Interfile clustering c. Intrafile clustering d. Raw data calculating e. Volumetrics

e

2. In an object-oriented system, changes can take place at the following level of abstraction. a. variable b. method c. class/object d. cluster (examples: partition, package) e. all of the above

e

2. To avoid the classic design mistake of "reducing the design time," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade unless there is a compelling need for specific features d. not use a design tool that appears too good to be true e. use timeboxing

e

21. The decision on which design strategy to use depends on _____. a. how unique the business need is b. the expertise of the project manager c. the urgency of the project d. the amount of in-house experience e. all of the above

e

3. A(n) _____ can support large volumes of data and support applications that run an entire company. a. database b. database management system c. end-user database administrative system d. end-user database management system e. enterprise database management system

e

3. To avoid the classic design mistake of "feature creep," the analyst should _____. a. not switch or upgrade unless there is a compelling need for specific features b. increase the schedule to include learning time c. move proposed changes into future versions d. not use a design tool that appears too good to be true e. use rapid application development techniques or timeboxing

e

3. Which of the following would most likely not be an example of an attribute? a. employee name b. customer address c. stock number d. ISBN number e. cancel appointment

e

4. In terms of levels of abstraction, which of the following is at the lowest level relative to the rest? a. system b. partition/package c. library d. class/object e. method

e

5. A(n) _____ is an instantiation of a class. a. attribute b. behavior c. operation d. message e. object

e

6. The _____ layer contains, among other things, the classes that represent the fundamental data types. a. problem domain b. system architecture c. human-computer interaction d. data management e. foundation

e

7. The _____ layer addresses how the software will execute on specific computers and networks. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

e

9. The process of ensuring that values linking tables together through the primary and foreign keys are valid and correctly synchronized is _____. a. hierarchical integrity b. primary integrity c. table integrity d. referential unity e. referential integrity

e

Ans: Logical models are models that describe the business domain's activities witho

ut suggesting how they are conducted. Logical models are also referred to as problem domain models. Examples of logical models include activity diagrams and use case diagrams. Logical models are constructed in the analysis phase while physical models are constructed in the design phase. In the design phase, logical models are refined into physical models, which provide information that is ultimately used to build the system. Logical models allow the analyst to focus on the business operations without getting distracted by the implementation details. Response: See pages 158-159


Related study sets

A&P Final (Autonomic Nervous System)

View Set

Lab Simulation 3-1: Working with Steganography

View Set

California Real Estate LAWS OF AGENCY AND FIDUCIARY DUTIES

View Set

Management Chapter 10 Managing Organizational Structure and Culture

View Set

organizational identity, image & issue management

View Set

NUR 2092 Ch 54 Drugs acting on the upper respiratory system

View Set

AP World Studies Early Modern Era

View Set

Mike Meyer's Guide to Network+ Chapter 9

View Set

NBDHE Head and Neck Anatomy and Physiology

View Set

Business Law Chapter 13 Sales Law: Terms, Formation, Obligations, and Titles

View Set