INSY 3305- Chapter 6,7,9(Comprehensive Exam 1 & 2)

Ace your homework & exams now with Quizwiz!

Users typically do not think in terms of data or processes; instead, they see their business as a collection of logical units that contain both - so communicating in terms of __________ improves the interaction between a user and an analyst or developer. a. objects b. business rules c. business units d. attributes and methods e. workflow units

a. objects

The executive summary in system proposal is typically no more than __________ page(s) long. a. one b. two c. three d. four e. five

a. one

A(n) _____ is an instantiation of a class. a. attribute b. behavior c. operation d. message e. object

Object

Feasibility analysis examines several questions, including "_____?" a. Can it be built (technical feasibility) b. Do we have the right people to build it (organizational feasibility) c. Can we get afford it (economic feasibility) d. All of these e. None of the above

a. Can it be built (technical feasibility)

20. A simple rule to follow when creating problem domain classes and data access and manipulation classes is that there should be ______________. a. One data access and manipulation class for each concrete problem domain class b. Two data access and manipulation classes for each concrete problem domain class c. N data access and manipulation classes for each concrete problem domain class, where N is the number of methods in the problem domain class d. N data access and manipulation classes for each concrete problem domain class, where N is the number of subclasses of the problem domain class e. none of these

a. One data access and manipulation class for each concrete problem domain class

_____ is the process of planning and controlling the development of a system within a specified time frame at a minimum cost with the right functionality. a. Project management b. Semantic timeline c. Task identification d. Time estimation e. Work plan

a. Project management

On a sequence diagram, an object name of Students:List would indicate that _____. a. Students is an instance of the List class that contains individual student objects b. List is an instance of the Students class c. List is a method of the Students class d. the Students and Lists objects are combined for that step in the sequence diagram e. a message is being passed from the Students class to the List

a. Students is an instance of the List class that contains individual student objects

Which of the following is a functional requirement? a. The system should allow students to view a course schedule while registering for classes. b. Only direct managers can see personnel records of staff. c. The system should be able to distinguish between U.S. currency and currency from other nations. d. Customers can see their order history only during business hours. e. The system downloads new status parameters within 5 minutes of a change.

a. The system should allow students to view a course schedule while registering for classes.

Merge nodes in an activity diagram are used to bring concurrent or parallel flows together back into a single flow. a. True b. False

a. True

20. A set of rules are used for performing the verification and validation walkthrough of behavioral model. One of the rules is: all entries in a CRUDE matrix imply _____________ being sent from an actor or object to another actor or object a. a message b. a transition c. an association d. a guard condition e. a behavior

a. a message

A disadvantage of purchasing packaged software is that the organization may _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. make strategic changes during implementation d. remove all risk from the project e. save money on the purchase

a. accept functionality that is not a perfect fit

In which phase of the SDLC is the system proposal developed? a. analysis b. design c. implementation d. planning e. system delivery

a. analysis

A(n) _____ describes information about an object. a. attribute b. behavior c. operation d. message e. instance

a. attribute

The design phase of the SDLC creates a(n) _____. a. blueprint for the future system b. picture of the as-is system c. understanding of who, what, when, and where the future system will be d. understanding of why build the system e. none of these

a. blueprint for the future system

_____ refers to the level of interdependency or interrelationship among the modules in a system. a. coupling b. cohesion c. connascence d. multiple inheritance e. single inheritance

a. coupling

The acronym CRUD stands for _____. a. create, read, update, delete b. create, reference, underline, delete c. create, re-do, underline, delete d. collaborate, read, update, delete e. collaborate, reference, update, discard

a. create, read, update, delete

____________ is the mechanism that combines the processes and data into a single object. a. encapsulation b. polymorphism c. inheritance d. information hiding e. None of the above

a. encapsulation

The external behavior of a system is described by _____. a. functional models b. structural models c. behavioral models d. interaction diagrams e. statechart diagrams

a. functional models

19. A mini-table that contains values from one or more columns in a table and the location of the values within the table is called a(n) _____. a. index b. interfile cluster c. intrafile cluster d. raw data calculation e. volumetric

a. index

The most commonly used information-gathering technique is _____. a. interviewing b. joint application design (JAD) sessions c. document analysis d. observation e. questionnaires

a. interviewing

A behavioral state machine is a dynamic model that shows the different state through which a single _____ passes through its life in response to events, along with its responses and actions a. object b. actor c. use case d. sequence diagram e. communication diagram

a. object

The basic building block of a system is the _____. a. object b. attribute c. message d. partition e. method

a. object

Peter is the vice president of accounting and finance. For the past year he has solely provided the resources necessary to get the just-in-time accounting system through the planning and analysis phases of the SDLC. Other managers have openly stated that the JIT system is not worth the investment. The SEC has just placed Peter under investigation for insider trading and the board has asked him to resign. This project is failing _____ feasibility analysis. a. organizational b. champion c. functional d. economic e. technical

a. organizational

.The first step in building a sequence diagram is to _____. a. set the context b. identify which objects will participate c. set the lifeline for each object d. add the focus of control to each object's lifeline e. validate the sequence diagram

a. set the context

A(n) _____ is a formal way of representing how a business system interacts with its environment. a. use case b. physical model c. relationship d. system boundary e. trigger

a. use case

Any modern object-oriented approach to software development must be use case driven, ____________, and iterative and incremental. a. User-centric b. Architecture-centric c. Requirements-driven d. Model-driven e. Object-centric

b. Architecture-centric

An actor in a use case must be a person. a. True b. False

b. False

18. The size of a database is determined by the _____. a. amount of raw data in the tables b. amount of raw data in the tables and overhead requirements for the DBMS c. number of instances in the tables d. overhead requirements for the DBMS overhead requirements for the DBMS and number of instances in the tables

b. amount of raw data in the tables and overhead requirements for the DBMS

A systems analyst draws a lifeline with an X at the end. This lifeline represents _____. a. a message that cannot be delivered b. an object that is destroyed at a point in time c. a message that is delivered at that point in time d. an object that is complete at that point in time e. an object that arrives at its final destination

b. an object that is destroyed at a point in time

An advantage of custom development is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. install in a short period of time d. remove all risk from the project e. save money on the purchase

b. build technical skills and functional knowledge

A class/object should only represent one thing, and a method should only solve a single task. This principle is often referred to as _____. a. coupling b. cohesion c. connascence d. multiple inheritance e. none of these

b. cohesion

If a use case becomes too complex, it should be _____. a. rewritten to simplify it b. decomposed into a set of use cases c. written with a series of repeating steps to simplify it d. written from the perspective of an independent observe to simplify it e. dropped from the system, as it will be too complex to implement in the final system

b. decomposed into a set of use cases

15. In order to reduce the number of joins that must be performed in a query and to increase the speed of data access, the data analyst will _____ the physical model. a. cluster b. denormalize c. index d. normalize e. optimize

b. denormalize

Polymorphism is made possible through ________________ : a. static binding b. dynamic binding c. initialization d. messaging e. information hiding

b. dynamic binding

Which of the following relationships represent the extension of the functionality of the use case to cover optional behavior? a. association relationship b. extend relationship c. include relationship d. generalization relationship e. optional relationship

b. extend relationship

13. If the data model does not have any repeating fields it is in _____. a. base normal form b. first normal form c. non-normal form d. second normal form e. third normal form

b. first normal form

The following are all classic design mistakes EXCEPT _____. a. feature creep b. including design time c. reducing design time d. silver bullet syndrome e. switching tools in mid-project

b. including design time

Which of the following factors would tend to increase the technical risk of a project? a. familiarity with the technology b. large project size c. creating an application that is familiar to the users and analysts d. small project size e. the number of other applications under development in the firm

b. large project size

_________ means having the ability to send the same message to different objects, which can be interpreted differently by different objects. a. encapsulation b. polymorphism c. inheritance d. information hiding e. None of the above

b. polymorphism

Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time for one particular use case. a. structural models b. sequence diagrams c. collaboration diagram d. class diagrams e. behavioral state machines

b. sequence diagrams

An analyst depicts the static view of an information system with _____. a. use-case models b. structural models c. behavioral models d. interaction diagrams e. statechart diagrams

b. structural models

The ________ brings together into a single comprehensive document the material created during planning and analysis a. project charter b. system proposal c. system request d. requirements document e. vision document

b. system proposal

A(n) _____ is basically an electronic list of information that is stored on a disk. a. sequential access file b. unordered sequential access file c. ordered sequential access file d. random access file e. transaction file

b. unordered sequential access file

11. A(n) _____ occurs when data are stored redundantly in a database and only some of the instances are updated when a change is needed. a. error b. update anomaly c. data integrity concern d. storage efficiency e. none of these

b. update anomaly

Which of the following factors could be included in a technical risk assessment? a. Cost of a new Web server b. Cost of hiring a Webmaster c. No previous experience with Java within the IS department d. Some fear of job loss among order entry department personnel e. all of these

c. No previous experience with Java within the IS department

In a communication diagram, a(n) _____ between actors and objects is shown with an undirected line. a. procedure calls b. data flow c. association d. message e. relationship

c. association

Manipulating certain parameters to refine the way features work in a software package is called _____. a. a workaround b. adjustment c. customization d. feature adjustability e. parameterizing

c. customization

When an analyst discovers that a set of classes have a similar set of attributes and methods, it may make sense to _____ out the similarities into a separate class. a. refine b. abstract c. factor d. partition e. separate

c. factor

The layer that keeps the user interface implementation separate from the application or problem domain classes is the _____ layer. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

c. human-computer interaction

Which of the relationship types in use cases enables functional decomposition? a. association relationship b. extend relationship c. include relationship d. generalization relationship e. decompose relationship

c. include relationship

______ allows a class to have the same behavior as another class and extend or tailor that behavior to provide special action for specific needs. a. encapsulation b. polymorphism c. inheritance d. information hiding e. None of the above

c. inheritance

The information gathering technique that is most effective in combining information from a variety of perspectives, building consensus, and resolving discrepancies is a(n) _____. a. document analysis b. interview c. joint application development d. observation e. questionnaire

c. joint application development

_____ are information that is sent to objects to tell it to execute one of its behaviors. a. attributes b. operations c. messages d. instances e. use-cases

c. messages

8. The type of database that is most capable of supporting complex data types is _____. a. sequential files b. relational DBMS c. object-oriented DBMS d. object-relational DBMS e. random access files

c. object-oriented DBMS

When an object sends a message to itself in a sequence diagram, that is referred to as _____. a. recursive-messaging b. self-messaging c. self-delegation d. recursive-delegation e. none of these

c. self-delegation

SQL operates on _____. a. rows of data at a time b. columns of data at a time c. tables of data at a time d. the entire database e. any of the above

c. tables of data at a time

21. A set of rules are used for performing the verification and validation walkthrough of behavioral model. One of the rules is: all _______________ contained in a behavior state machine must be associated with a message being sent on a sequence and communication diagram, and it must be classified as a (C)reate, (U)pdate, or (D)elete message in a CRUDE matrix. a. messages b. behaviors c. transitions d. associations e. dependences

c. transitions

Which one in the following is NOT a layer of a software architecture. a. Foundation b. Problem Domain c. Data management d. Data structure e. Human-computer Interface

d. Data structure

When a global data area exists outside individual objects, the resulting system has _____ interaction coupling. a. stamp b. data c. content or pathological d. common or global e. control

d. common or global

The _____ layer addresses the issues involving the persistence of the objects contained in the system. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

d. data management

2. A(n) _____ is less expensive and easier for novice users to use, but it does not have the features that are necessary to support mission-critical or large scale systems. a. database b. database management system c. end-user database administrative system d. end-user database management system e. enterprise database management system

d. end-user database management system

Operational costs that are examined during feasibility analysis include _____. a. data conversion cost b. development training c. user training d. equipment upgrades e. initial consultant fees

d. equipment upgrades

When arranging actors and objects on a sequence diagram, it is nice to list them _____. a. in alphabetical order down the side of the diagram b. in alphabetical order across the top of the diagram c. in order in which they participate in the sequence down the side of the diagram d. in order in which they participate in the sequence across the top of the diagram e. actors and objects are not both shown on a sequence diagram

d. in order in which they participate in the sequence across the top of the diagram

There are three methods to create a new system. They are _____. a. buy a package, external vender, external service provider b. develop custom application in-house, external service provider, and external vender c. external service provider, rely on a developer, and external vender d. in-house custom application, buy a package, and external vender e. in-house custom application, external service provider, and external vender

d. in-house custom application, buy a package, and external vender

____________ suggests that only the information required to use an object be available outside the object. a. encapsulation b. polymorphism c. inheritance d. information hiding e. None of the above

d. information hiding

The following are all strengths of a custom development design strategy EXCEPT _____. a. builds technical skills b. greater creativity c. greater flexibility d. lower risk e. none of these

d. lower risk

In order to get an object to perform a method, a(n) _____ is sent to the object. a. state b. object c. attribute d. message e. instance

d. message

To avoid the classic design mistake of "silver bullet syndrome," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade development tools unless there is a compelling need d. not use a design tool that appears too good to be true e. use rapid application development techniques or timeboxing

d. not use a design tool that appears too good to be true

The modeling focus of the interaction diagram is at the _____ level while the modeling focus on the class diagram is at the _____ level. a. class, object b. interaction, class c. class, interaction d. object, class e. high, low

d. object, class

In which phase of the SDLC is the project plan developed? a. analysis b. design c. implementation d. planning e. reconstruction

d. planning

The four phases of the Systems Development Life Cycle are _____. a. analysis, gathering, modeling, and diagramming b. construction, installation, testing, and converting c. initiating, planning, controlling, and implementing d. planning, analysis, design, and implementation e. system request, feasibility, staffing, and construction

d. planning, analysis, design, and implementation

Which of the following is not a fundamental way to approach the creation of a new information system? a. develop a custom application in-house b. rely on an external vendor to build the system c. purchase a software package and customize it d. rely on end-users to develop it themselves e. all of these are ways to create new information systems

d. rely on end-users to develop it themselves

12. A data model that does not contain repeating fields and that the data models leads to tables containing fields that are dependent on a whole primary key is in _____ normal form. a. balanced b. first c. primary d. second e. third

d. second

14. If the logical data model contains fields that depend on another non-primary key field, then it is in violation of the rules of _____. a. base normal form b. first normal form c. non-normal form d. second normal form e. third normal form

d. second normal form

A Fork Node in an activity diagram is used to __________ behavior into a set of parallel or concurrent flows of activities (or actions). a. combine b. create c. initialize d. split e. represent

d. split

The process of building new systems by combining packaged software, existing legacy systems, and new software written to integrate everything together is called _____. a. customization b. formal methodology c. outsourcing d. systems integration e. workaround

d. systems integration

Iterative and Incremental development means that a. the team is using a prototyping methodology b. the system will be developed through versions c. the system will be developed in phases d. the system will undergo continuous testing and refinement e. the team is using an agile methodology

d. the system will undergo continuous testing and refinement

The following are all strengths of a packaged software design strategy EXCEPT _____. a. it may be bought and installed in a short time b. many business needs are not unique c. the package is already tested and generally proven to work d. there is an exact match of functionality to requirements e. none of these

d. there is an exact match of functionality to requirements

The order of messages on a sequence diagram goes from ____ to _____. a. right to left b. bottom to top c. left to right d. top to bottom e. left to right, top to bottom

d. top to bottom

The most significant challenge to project managers is _____. a. lack of project management training b. no one really understands how to manage a complex systems development project c. the lack of tools that can assist in controlling project progress d. unrealistic schedule demands by project sponsors e. all of these

d. unrealistic schedule demands by project sponsors

21. Which one in the following list is an example of NOSQL data store . a. Oracle b. SQL Server c. Access d. OODBMS e. Google's Big Table

e. Google's Big Table

Which of the following is a nonfunctional requirement? a. The system must allow registered customers to review their own order history for the past three years. b. The system must check incoming customer orders for inventory availability. c. The system must include real-time inventory levels at all warehouses. d. The system must retain customer order history for three years. e. The system should be able to work on any Web browser.

e. The system should be able to work on any Web browser

Developing an information system is similar to building a house because you have to a. start with a basic idea of what is needed b. create simple drawings of what is needed and allow the customer to provide feedback c. develop a detailed set of blueprints d. actually build the project, often with some changes directed by the customer e. all of the above

e. all of the above

In an object-oriented system, changes can take place at the following level of abstraction. a. variable b. method c. class/object d. cluster (examples: partition, package) e. all of these

e. all of these

The decision on which design strategy to use depends on _____. a. how unique the business need is b. the expertise of the project manager c. the urgency of the project d. the amount of in-house experience e. all of these

e. all of these

A(n) _____ can support large volumes of data and support applications that run an entire company. a. database b. database management system c. end-user database administrative system d. end-user database management system e. enterprise database management system

e. enterprise database management system

Data may be stored in the following formats _____. a. databases b. entities c. entities and files d. files e. files and databases

e. files and databases

The _____ layer contains, among other things, the classes that represent the fundamental data types. a. problem domain b. system architecture c. human-computer interaction d. data management e. foundation

e. foundation

Understanding why an information system should be built and determining how the project team will build it is part of the _____ phase of the SDLC. a. analysis b. system request c. gathering d. initiating e. planning

e. planning

The _____ layer addresses how the software will execute on specific computers and networks. a. foundation b. system architecture c. human-computer interaction d. data management e. problem domain

e. problem domain

9. The process of ensuring that values linking tables together through the primary and foreign keys are valid and correctly synchronized is _____. a. hierarchical integrity b. primary integrity c. table integrity d. referential unity e. referential integrity

e. referential integrity

An advantage of purchasing packaged software is that the organization can _____. a. accept functionality that is not a perfect fit b. build technical skills and functional knowledge c. have developers climb the knowledge ladder d. make strategic changes during implementation e. save money on the purchase

e. save money on the purchase

Which of the following objects would be most likely to be destroyed at some point in time in a sequence diagram? a. customer b. order c. order item d. invoice e. shopping cart

e. shopping cart

A critical success factor for project management is to _____. a. create a work plan b. follow the three steps of project management c. identify most project tasks d. manage the hundreds of tasks e. start with a realistic assessment of the work

e. start with a realistic assessment of the work

A relational database may be optimized for _____. a. data type and storage efficiency b. relational type c. speed of access d. storage efficiency e. storage efficiency and speed of access

e. storage efficiency and speed of access

The focus in a sequence diagram is on __________________ a. How actors interact with objects to realize a given use case b. Messages sent by actors to other objects c. when an object is being created d. when messages are being destroyed e. time ordering of messages being passed between objects

e. time ordering of messages being passed between objects

To avoid the classic design mistake of "reducing the design time," the analyst should _____. a. increase the schedule to include learning time b. move proposed changes into future versions c. not switch or upgrade unless there is a compelling need for specific features d. not use a design tool that appears too good to be true e. use timeboxing

e. use timeboxing

The two types of interaction diagrams are ______________ diagrams. a. use-case and sequence b. class and sequence c. sequence and communication d. object and communication e. statechart and object

sequence and communication


Related study sets

Accounting 2121 Exam 1 Part 5: What is the normal balance for the following account types?

View Set

Evolve: Urinary/Reproductive System

View Set

Data Collection, Behavior, & Decisions

View Set

Concentration Mastering Chemistry

View Set

Ch. 12 Dealing with Union and Employee - Management Issues

View Set

Pharm Ch 57 Drugs Affecting Gastrointestinal Secretions

View Set

Module 5 SmartBook International Business

View Set

NUR 205 Ch 30 Nursing Management: Diabetes Mellitus

View Set