CSC 481 Midterm
________, ________, and ________ are the three unknowns that must be dealt with when designing and building Internet applications.
User, connection speed, and access method
Identify the most common criteria for choosing off-the-shelf software. Which two criteria would be among the most important?
cost, functionality, vendor support, vendor viability, flexibility, documentation, response time, and ease of installation. Vendor support and viability will be among the most important.
When purchasing off-the-shelf software, you should consider: a) flexibility b) response time c) vendor viability d) All of these
d) All of these
All off-the-shelf software systems can be modified to meet the specific, individual needs of a particular organization. (T/F)
False
Documentation and training programs are finalized during the physical design phase. (T/F)
False
Functionality refers to how easy it is for you, or the vendor, to customize the software. (T/F)
False
In OOASD, it is better to make highly detailed plans for each iteration. (T/F)
False
In order to promote more truthful responses, the general nature of the interview should not be explained to the interviewee in advance. (T/F)
False
Mission statements are often referred to as critical success factors.
False
Object-oriented analysis and design (OOAD) is becoming less popular. (T/F)
False
One of the primary benefits of using an enterprise software solution is the short time period required for implementation. (T/F)
False
Which of the following are true statements regarding today's analysis and design of information systems? a) More and more systems implementation involves a three-tier design. b) There is a movement to wireless system components. c) There is a continued focus on developing systems for the Internet and for firms' intranets and extranets. d) All of these.
d) All of these.
The search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services best defines: a) Joint Application Design b) Rapid Application Development c) structured programming d) business process reengineering
d) business process reengineering
Techniques are comprehensive, multiple-step approaches to systems development that guide an analyst's work and influence the quality of the final product. (T/F)
False
The most instrumental person to the successful completion of a project is the database analyst. (T/F)
False
Top-down planning is an ISP methodology which attempts to gain a specific understanding of the information system needs of a part of the organization. (T/F)
False
_______ is the part of the design phase of the SDLC in which all functional features of the system chosen for development in analysis are described independently of any computer platform.
Logical design
An organization may move to outsourcing for political reasons. (T/F)
True
During project identification and selection, all possible systems development projects that an organizational unit can undertake are identified and assessed. (T/F)
True
EDI is the use of telecommunications technologies to transfer business documents directly between organizations.
True
Extreme Programming is an example of Rapid Application Development (RAD). (T/F)
True
Gantt charts typically do not show how tasks must be ordered. (T/F)
True
Opening new markets and increasing sales opportunities is a tangible benefit.
True
Planning for cutover must begin early because the RAD approach is so fast. (T/F)
True
Sometimes the systems development life cycle is iterative. (T/F)
True
The Project Scope Statement provides a detailed estimate of the project's tasks and resource requirements. (T/F)
True
The objective of the project planning process is the development of a Baseline Project Plan and a Statement of Work. (T/F)
True
The rising costs of information systems is one reason why improved information systems project identification and selection is needed. (T/F)
True
The skills of a systems analyst are often central to many BPR efforts. (T/F)
True
Using a discount rate of 10%, the present value of a $2,500 benefit received 5 years from now is $1,552.30.
True
Walkthroughs are a common occurrence in most system development groups. (T/F)
True
A ________ is a peer group review of any product created during the systems development process.
walkthrough
A JAD is an inexpensive, popular requirements determination technique. (T/F)
False
A reasonable estimate is that off-the-shelf software can at best meet 70 percent of an organization's needs. (T/F)
True
Briefly identify and describe the participants of a JAD session.
A JAD session consists of a JAD session leader, users, managers, sponsors, systems analysts, a scribe, and information systems staff. The JAD session leader is responsible for running the session. The scribe is the individual who takes notes during the session. Users are important because they understand the current system. Managers are needed to provide insight into new organizational directions, motivations, organizational impacts of systems, and support for requirements determined during the JAD. Since new systems cost money, high-level management support is demonstrated through the appearance of system sponsors. Attendance by these individuals is usually at the beginning or ending of the session. Systems analysts are present so they can learn from the users and managers. Information systems staff can contribute ideas to the process as well as learn from it.
Briefly explain the process of managing an information systems project.
A project is a planned undertaking of a series of related activities to reach an objective that has a beginning and an end. Project management is a controlled process of initiating, planning, executing, and closing down a project. The individual responsible for the project and project management is the project manager. The project manager is an individual with a diverse set of skills. Management, leadership, technical, conflict management, and customer relationship are necessary skills that the project manager should have. Also, the project manager is responsible for initiating, planning, executing, and closing down a project.
________ is the process of arranging planning matrix information so the clusters of information with some predetermined level or type of affinity are placed next to each other on a matrix report.
Affinity clustering
An Internet-based communication that supports business-to-business activities best describes: a) Internet b) electronic commerce c) electronic data interchange d) B2B
B2B
The ________ is the major outcome and deliverable from the project initiation and planning phase that contains the best estimate of the project's scope, benefits, costs, risks, and resource requirements.
Baseline Project Plan
________ is the search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services.
Business process reengineering
________ is a measure of the difficulty of loading the software and making it operational.
Ease of installation
List and define the five major SDLC phases.
Planning phase: creating the system must first determine what the system needs to do for the organization Analysis phase: when the group that has been placed in charge of the project must decide if the project should go ahead with the resources available Design phase: involves the actual creation and design of a system Implementation phase: the actual construction and installation of a system Maintenance: perform routine maintenance activities within the database
________ is the third phase of the project management process in which the plans created in the prior phases are put into action.
Project Execution
Assume a proposed system has a useful life of 5 years, one-time costs of $50,000, recurring costs of $25,000 per year, and tangible benefits of $35,000 per year. If the cost of capital is 10%, what is the overall NPV? Overall ROI? Break-even point?
The overall NPV is ($12,092), and the overall ROI is negative. Based on the information given, this project will not break-even during its useful life.
Which of the following best describes the top-down planning approach advantage, improved integration? a) If not viewed from the top, totally new management information systems may be implemented rather than planning how to evolve existing systems. b) If not viewed from the top, planners may lack sufficient management acceptance of the role of information systems in helping them achieve business objectives. c) If not viewed from the top, planners may lack the understanding necessary to implement information systems across the entire business rather than simply to individual operating units. d) If not viewed from the top, information systems may be implemented without first understanding the business from general management's viewpoint.
a) If not viewed from the top, totally new management information systems may be implemented rather than planning how to evolve existing systems.
Techniques developed to keep the analysis effort minimal, yet still effective include: a) JAD b) interviewing c) observations d) quiz sessions
a) JAD
The reduction of waste creation is an example of a(n): a) intangible benefit b) qualitative benefit c) tangible benefit d) operational benefit
a) intangible benefit
For each reuse approach, briefly describe its process and policies.
ad hoc approach - does not have a process or policies facilitated approach - uses incentives, an asset check-in process, and limited review before publication The managed approach - includes a reuse-adapted process, mandated with specific goals; reuse reviews and asset documentation, packaging, and certification guidelines, and specified metrics The designed approach - includes some domain analysis, reuse-oriented architecture, and specific steps to design for and with reuse.
A specialized systems development life cycle is useful for : a) all organizations b) an organization that does not need all phases of the systems development life cycle or needs to modify phases c) an organization that needs only one phase of the SDLC d) None of these
b) an organization that does not need all phases of the systems development life cycle or needs to modify phases
Hiring a company to run your applications at your site on your computers is an example of: a) a turnkey system b) outsourcing c) downsizing d) realignment
b) outsourcing
A new system or the renovation of existing systems, user perceptions, and management commitment to the system are examples of which of the following risk factors? a) development group b) project structure c) project size d) user group
b) project structure
The process of dividing the project into manageable tasks and logically ordering them to ensure a smooth evolution between tasks defines: a) task division b) work breakdown structure c) work structuring d) project division
b) work breakdown structure
Which of the following is a need for improved information systems project identification and selection? a) The costs of information systems are steadily decreasing. b) Many systems can handle applications that cross organization boundaries. c) Data redundancy is often out of control, and users may have little confidence in the quality of the data. d) Systems maintenance costs are well under control.
c) Data redundancy is often out of control, and users may have little confidence in the quality of the data.
A scheduling technique where the order and duration of the sequence of activities directly affect the completion date of a project refers to: a) sequencing strategy b) Gantt scheduling c) critical path scheduling d) activity scheduling
c) critical path scheduling
Which of the following would be classified as an intangible cost? a) hardware costs b) labor costs c) employee morale d) operational costs
c) employee morale
Which of the following is the software reuse step that involves making the reusable asset understandable to developers who want to use it in their systems? a) storage b) abstraction c) recontextualization d) conceptualization
c) recontextualization
Realistic time is: a) the maximum period of time for an activity to be completed b) the minimum period of time for an activity to be completed c) the planner's "best guess" of the amount of time the activity actually will require for completion d) the maximum period of time for an entire project to be completed
c) the planner's "best guess" of the amount of time the activity actually will require for completion
Managing conflict within a project team to assure that conflict is not too high or too low describes the ________ project manager activity.
conflict management
A report: a) indicates the inputs required for the new system b) describes how a particular job or task is performed, including data and information that are used and reated in the process of performing the job c) indicates what data flow in or out of a system and which are necessary for the system to function d) enables you to work backwards from the information on a report to the data that must have been necessary to generate them
d) enables you to work backwards from the information on a report to the data that must have been necessary to generate them
All of the following are advantages of eXtreme Programming except: a) more communication among the developers b) higher levels of productivity c) reinforcement of the code-and-test discipline d) lower quality code
d) lower quality code
A facilitated process that supports idea generation by groups where at the beginning of the process, group members work alone to generate ideas, which are then pooled under the guidance of a trained facilitator best describes: a) affinity clustering b) requirements structuring c) group interviews d) nominal group technique
d) nominal group technique
Which of the following is the eXtreme Programming Planning Game phase where Business has a chance to see how the development process is progressing and to work with Development to adjust the plan accordingly? a) commitment b) exploration c) choice d) steering
d) steering