SAAD Test 2, SAD Test 1, MIS 311 chap 11, MIS 311 chap 12, MIS 406 - Ch 10, Legit T/F Chapter 10 CSIT 338, SAAD Test 3

Ace your homework & exams now with Quizwiz!

During program design - and again here in the actual programming coordination, we find that it is best to have modules that overlap and have high coupling and low cohesion.

FALSE

During the implementation phase of the Systems Development Life Cycle (SDLC), systems analysts spend their time writing programs and coding applications.

FALSE

If a mismatch exists between available programming skills and the programming staff, the best method to solve this is to put more programmers on the project so that it comes in on time, and within budget!!!!

FALSE

Maria is working for the Minneapolis Dance Troop (MDT) and wants a database that can support text, numbers, video, and audio. She will probably select the multidimensional database format.

FALSE

Most relational database management systems support 'sticky' quantitative processing.

FALSE

One activity in the data storage design activity is to update the CRUDE matrix.

FALSE

One goal is data storage design is to spread the data over all storage devices so that the redundancy will make for more efficient storage.

FALSE

One process when considering data storage design is to move from physical data models to logical data models.

FALSE

Sanjay is creating a screen form that interfaces with a relational database. He should use the median (middle) value in the database as his default value - as that will make it easier for the users to move up and down in the table.

FALSE

Software bugs are estimated to cost the US economy $12.4 million dollars a year.

FALSE

Systems to support decision making generally need to update data frequently with a large volume of data.

FALSE

Testing is considered as a prized activity on a development project, and developers (programmers), analysts, and project managers frequently request being assigned to develop documentation.

FALSE

When changing from logical data models to physical data models, you will want to change the attributes of the logical ERD to fields in the physical ERD.

TRUE

When changing logical data models to physical data models, you will want to change entities to tables or files.

TRUE

38. Novice or infrequent users of an interface (both paper and screen) prefer interfaces with low density like under 25%.

False

38. Process models are only used to document the current system (that is, the "as-is" system), since that is the system the users know and is the system that will be modified.

False

38. Systems Analysis and Design projects are highly effective, with less than 3% of all projects cancelled or abandoned.

False

38. The SDLC moves from the current system (often called the "past system") to the new system (often called the "future system").

False

38. The key challenge in systems integration is avoiding a system wide crash upon installation of legacy software.

False

38. Use cases are always internal and rarely shared or discussed with business users.

False

38. When drawing the human-machine boundary, all processes in the physical DFD will be automated, so only external entities will be excluded.

False

39. Generally headings on a paper form should be with Arial size 24 bold the main text should be Times New Roman size 12. Subheadings should be Tahoma size 14, bold and italic and underlined. This makes a form easier to read and to delineate sections.

False

39. There are three advantages associated with client-server architecture.

False

40. Omar has designed a paper form using 'sans serif' fonts and for his screen (or web) forms he has used 'serif' fonts. He is exercising good user interface design practices.

False

40. Use cases are diagrams with three components: selection, process, iteration.

False

40. When dealing with a global information supply chain, functional requirements generally increase exponentially, while nonfunctional requirements tend to stay about the same.

False

41. Data flow diagrams (as the name implies) focus on the physical data in a system.

False

41. During the analysis phase, analysts create programming models to represent how the business system will operate.

False

41. Systems analysts are generally experts in business, finance and application development.

False

42. According to the authors "Process modeling - and the creating of PMPs in particular - is one of the most important skills needed by systems analysts".

False

42. Colors and patterns add pizzazz to a screen form and aid in its readability.

False

42. Server-based architecture is not more secure than client-based architecture.

False

42. Use cases are a type of 'data-driven modeling'.

False

42. When compared to a business analyst, the systems analyst will identify how the system will provide business value.

False

43. A structure chart shows sequence, selection and data flows.

False

43. Generally 'system requirements' are developed in the analysis phase and evolve to more technical 'business requirements' in the design phase.

False

44. Data that is moving from a process to another process is called a 'data stream'.

False

44. ERD's are drawn in several levels: Context ERD diagrams Level 0 ERD diagrams Level 1 ERD diagrams.

False

47. A diamond on a structure chart shows sequence - like a baseball player would go to first base, then second, third and home.

False

47. An IT department has just received its newest onslaught of system maintenance requests from the finance, marketing and accounting divisions and has added them to the growing list of fixes needed. Tomorrow, there will be a request placed by the CTO that there is to be a new processing system put into place that will take the place of the current MS Word system. The best alternative is to utilize a custom program that will replace the original program.

False

48. A trigger is based on cost/benefit analysis, like an employee labor report, a sale of an item, or the purchase of new hardware.

False

48. An ERD is a picture that shows how data and information is processed and transformed by a business system.

False

48. Bob is designing input screens for a re-designed system for the shipping and inventory department. For order forms, he puts Zip code first (as the database will take the zip code and look up the city and state) for receiving forms, he puts them in the order of city, then state, then zip code. His design choices will help experienced users be more productive.

False

48. Couples in structure charts always show two modules that are executed together and are drawn with horizontal lines at the top and bottom.

False

48. In BPA and BPI, analysis is generally divided into three steps understanding the as-is system developing a cost-benefit analysis and understanding the technical feasibility.

False

48. The data stores on the DFD correspond to Major Steps Performed on a use case.

False

49. In RAD or agile development methodology (especially with BPR), a significant amount of time and effort is spent in understanding the as-is system.

False

49. The Design phase of the SDLC uses the requirements that were gathered during analysis to actually build (and code if necessary) the final system.

False

50. An example of making an unstated norm explicit would be to make a field modifiable by a manager to represent the local format.

False

50. An illustration of the transformation of data into business value is an ERD.

False

50. Marta wants to focus on 'why' a particular lockout situation occurs on a customer relationship management system, rather than just developing a work-around fix. She is doing activity elimination.

False

50. User interface design is a three-step process: (1) analyze the DFDs and use cases (2) develop the interface diagrams and (3) create the interface design prototype.

False

51. A structure chart is often completed in one attempt.

False

51. Determining business requirements is generally done in the planning phase of the SDLC.

False

52. Data flows are named with verb phrases (like 'Move Payroll Information to Payroll Database').

False

52. Michelle is designing a series of user interfaces for a CRM system. She goes back and forth between various steps of use cases, DFDs, ERDs and JAD session notes.

False

52. On an ERD, similar kinds of information are listed together and placed inside boxes called data containers.

False

52. The most common ways to gather information for use cases is with questionnaires of the affected users.

False

52. The requirements-gathering process is used for building financial support for the project and establishing common understanding of technologies and rapport between the project team building the system and the users of the system.

False

53. Use cases generally have up to 20 major steps spelled out in great detail.

False

54. An effective process is an output process on a structure chart.

False

54. An entity is described by an action verb.

False

54. In terms of reaching the most number of people in requirements gathering, interviews are considered better than questionnaires.

False

54. One systems development option is to let users build their own system using tools like Excel and Access, with support from the Microsoft help desk.

False

55. CRUD stands for Create, Redesign, Update and Deploy - and is a matrix of table functions in databases.

False

55. Interface Structure Design defines the application coding structure used (such as developing prototypes in Visual Basic).

False

55. System Integration Requirements can be defined as the extent to which the system will need to operate in other environments.

False

55. The question 'Can we build it' is asked in the design phase.

False

56. Interface Structures (shown with boxes in the textbook) cannot directly interface with other interface structures on other menus and submenus, only the interface structures on the same menu or submenu.

False

56. Liang has identified the payroll authorization office as the primary actor in a use case. This would be incorrect as primary actors need to be singular like a customer or a patient or a student.

False

56. The three types of interview questions are: multiple choice, fill in the blank and short answer.

False

57. In the analysis phase, architecture decisions are made and written up in the 'hardware and software specifications'.

False

57. Juan is creating use cases. He is working in the design phase of the SDLC.

False

57. Maintainability Requirements can be defined as the extent to which the system will need to operate in other environments.

False

60. Unless ordered by the lead analyst for a project, you should not share your interview report with those that you interviewed. Doing so will almost always result in scope creep and changes in the requirements.

False

61. Relationships are drawn with lines showing cardinality and plurality.

False

62. It is possible to decompose level 1 processes even farther, so for example, process 2.1 on a Level 1 DFD might become 2.1A, 2.1B, 2.1C, etc.

False

63. The document that describes the business reasons for building a system and the value that the system is expected to provide is called the "System Proposal".

False

63. The three steps in creating an ERD are: (1) identify the entities (2) identify the processes (3) identify the relationships

False

64. A 'black hole' error on a DFD is when a process creates output without an input.

False

64. To get to more depth in understanding the as-is system, document analysis and observation generally are more beneficial as compared to interviews and JAD sessions.

False

65. Data cannot go from one process to another process without going to a data store first

False

65. One person dominating the group discussion of a JAD session will normally lead to a positive outcome?

False

66. CASE tools have 'data repositories'.

False

66. If the development team of an organization is not familiar with the technologies that may be used, the project should be cancelled.

False

66. Most existing systems are well documented which leads to document analysis being very valuable.

False

67. Structured English uses complete sentences to describe the work that a process performs in a system.

False

68. Data cannot go from one process to another process without going to a data store first

False

68. In defining LAST-NAME in the data dictionary, we might describe it as a character field having from 1 to 15 alphabetic characters.

False

69. To be compatible, all costs and benefits should use the current value of money since variations over time will (a) not affect the return on investment and (b) it is difficult (or impossible) to estimate future value of money.

False

70. Iterations are not used in good DFD design.

False

Each use case has the same name (like "Customer Relationship Management System") followed by an identifying letter ("A", "B", etc.).

False

36. Client computers, Servers and Networks are the three primary hardware components of a system.

True

37. When building the physical data flow diagram, processes may become html web pages or Visual Basic screens.

True

40. During the analysis phase logical data models are created.

True

42. Amy is an analyst for an automatic payment system. She knows that she will need to create a modular, flexible plan for programmers to follow so that the ensuing system will be maintainable.

True

42. Maria, a systems analyst, is tweaking the high-level explanation of the business requirements into a more precise list of requirements. This is called 'requirements detemination'.

True

43. Colors have been shown to affect emotion - red for intense emotion (anger) and blue for lower emotions (drowsiness).

True

43. Custom development that can be achieved by the in-house team and core business practices are both examples of times when outsourcing is not an option.

True

43. Each use case contains a fairly complete description of all the activities that occur in response to a trigger event.

True

43. One of the most commonly used techniques for data modeling is ERD's.

True

43. The business analyst role focuses on the business issues surrounding the system.

True

44. A structure chart is composed of modules that work together to form a program.

True

44. Each use case has a name and a number.

True

44. When compared to a systems analyst, the business analyst will probably have more responsibility for determining business value.

True

45. Client-server scalability is greater than server-based scalability.

True

45. Novices prefer user interfaces with 'ease of learning' features (like more explicit menu choices, clear directions).

True

45. The most important purpose of the requirements definition is to define the scope of the system.

True

46. A higher-level component that contains the logic for performing other modules (subordinate modules) is known as a control module.

True

46. The 'primary actor' is the external user that triggers the event to which the system responds.

True

46. The infrastructure cost of client-server architectures is low due to the advancement in processing power of today's personal computers.

True

46. The requirements analyst role includes complete and accurate determination of what the system requirements consist of for all stakeholders.

True

46. The score column in the Alternative Matrix represents how easily specific criteria are met by the alternative.

True

46. To create the requirements definition, the project team first should consider the kinds of functional and non-functional requirements that they will collect about the system.

True

47. A textbook-provided example of a 'full-service CASE' tool is Visible Analyst.

True

47. A well-constructed use case makes developing a data flow diagram fairly straightforward.

True

47. If a particular form or screen is used by a cadre of experienced users very frequently (like an accounting entry system), 'ease of use' should be a high priority on these system interfaces.

True

47. Miski has modified an existing time reporting system for hourly employees to be more efficient as they can text message when they are leaving a job site. This would be an example of Business Process Automation.

True

47. The SDLC generally can be broken into four phases: planning, analysis, design and implementation.

True

47. The cost differential between maintaining client-server applications and server-based applications will be offset with organizational experience.

True

48. A department head is apprehensive as to what implementation system he should employ. The best method of ensuring a successful and efficient installation of the new systems would be to utilize an alternative matrix.

True

48. An example of an asymmetric encryption algorithm is public key encryption.

True

48. Management of requirements and system scope is one of the hardest parts of managing a project.

True

49. A graphical illustration that shows the information that is created, stored and used by a business system would be an ERD.

True

49. An example of a cultural requirement would be offering the system in English and Spanish.

True

49. Data couples are shown by arrows with empty circles and show how data flows between modules.

True

49. Every process on a DFD must have at least one input data flow.

True

49. External triggers might be something like a customer calling a doctor for an appointment or a student registering for a class.

True

50. A temporal trigger might be related to time, such as 30 days have passed and a late fee needs to be assessed.

True

50. Control couples show the passing of parameters or system related messages between modules (like 'end-of-file').

True

50. Every process has a unique identification number, a name and a description.

True

50. Online loan companies (like LendingTree) attempt to return quotes for loans within an hour. With more traditional banks, getting a quote on a loan may take weeks to a month. Two techniques that were probably carefully analyzed in creating online loan quotation systems would be duration analysis and activity elimination.

True

50. The Design phase of the SDLC builds on the logical designs from the analysis phase (like logical ERDs and logical DFDs)

True

51. An analyst can read an ERD to discover the individual pieces of information in a system and how they are organized and related to each other.

True

51. An example of making an unstated norm explicit would be to make an input field explicitly defined, such as a date will use month-day-year format.

True

51. Cindi Flores distributed 'white-papers' on RFID, ERP, GPS and SOA to a user-management group. She then asked them to 'think outside the box' on where these technologies could be used in the company. This would be an example of 'technology analysis'.

True

51. Processes should be named with a verb and ending with a noun (like Calculate Sales Tax).

True

51. The design phase decides how the new system will operate.

True

51. When creating user interfaces, analysts should examine DFDs and use cases to see how users commonly perform various processes.

True

52. During the initial part of design, the project team converts the business requirements for the system into system requirements.

True

52. It is not uncommon for the cost of a power disruption to be hundreds or thousands of times the cost of failed components.

True

52. The primary output of the planning phase is the System Request.

True

52. The three basic kinds of processes on a process module are afferent, central and efferent.

True

53. An afferent process is an input process on a structure chart.

True

53. An entity is the basic building block for a data model.

True

53. Data stores are named with nouns and have an identification number and description.

True

53. Mike is the analyst creating a report. It is easy for him to unintentionally create a biased report.

True

53. One systems development option is to have a system developed by using an outsourcing strategy.

True

53. The design phase is the time to select the specific software that will operate the hardware.

True

53. The most commonly used requirements gathering technique is the interview..

True

53. The primary output of the analysis phase is the System Proposal.

True

54. Bias can be introduced into a report by the way in which lists of data are sorted.

True

54. External entities are a person, organization, or system that is external to the system, but interacts with it.

True

54. Technical Environment Requirements can be defined as special hardware, software, and network requirements imposed by business requirements

True

54. The normal sequence of SDLC phase outputs (from beginning to end) would be: System Request, System Proposal, System Specifications, and Installed system.

True

55. A transaction structure in a structure chart contains a control module that calls subordinate modules and frequently occur with menus.

True

55. Entities are further designed with attributes.

True

55. Many business processes are too complex to be explained in one DFD.

True

55. Yuri wants to interview both managers and staff in the accounting department for the updated credit analysis project. This is an appropriate group for first round interviews.

True

56. During the design phase, the project team carefully considers the nonfunctional business requirements (such as performance, cultural and political aspects).

True

56. Entities are a person, place, or thing.

True

56. Factoring is the process of separating out a function from a module in order to create a module of its own.

True

56. Interviewing is generally done in the analysis phase of the SDLC.

True

56. One important principal in process modeling with DFD's is the decomposition on the business processes into a series of DFD's.

True

56. Portability Requirements can be defined as the extent to which the system will need to operate in other environments.

True

57. A signal of poor cohesion could be the presence of control flags that are passed down to subordinate modules.

True

57. Context diagrams show the entire system in context with the environment (like external entities).

True

57. In an entity called STUDENT, you might find attributes of Student-ID, Last-Name, First-Name and cell-phone.

True

57. In preparing for an interview, TJ does research as to areas in which the interviewee has knowledge so that he does not ask questions that an interviewee cannot answer.

True

57. The first principle of designing navigational controls is to prevent users from making mistakes.

True

58. A reason to use custom development is to get exactly what you want?

True

58. Functional, coincidental, and temporal are all types of cohesion.

True

58. When creating navigational controls, you should either not display a command that cannot be used or 'gray' it out (where it shows, but cannot be used).

True

59. A reason to use a packaged software solution is when there is no need to "reinvent the wheel"

True

59. Jamal is creating a user interface. He wants what he calls an 'oops' button on every screen and form (or an 'undo' button). This is a good design consideration.

True

59. System Integration Requirements can be defined as the extent to which the system will operate with other systems.

True

59. The purpose of the Level 0 DFD is to show all the major high-level processes of the system and how they are interrelated.

True

59. The three feasibility analyses in the text were: organizational feasibility, technical feasibility, and economic feasibility.

True

60. Developing navigation methods, database and file specifications and what architecture to use would occur in the design phase of the SDLC.

True

60. In general, all process models will have as many level 1 diagrams as there are processes on the level 0 diagram.

True

60. Relationships are associations between entities.

True

61. A good indication of needing a transaction structure on a structure chart occurs when a DFD shows a single data flow entering a process that produces multiple data flows as outputs.

True

61. A support plan for the system is established in the implementation phase of the SDLC.

True

61. Backlogs and backlog creation are a CON when discussing custom development

True

61. Children processes collectively make up the parent process (but give more detail).

True

62. Online questionnaires (using tools like SurveyMonkey and similar sites) are growing in use, but generally online questionnaires have a lower completion rate.

True

62. The project sponsor should have an idea of the business value to be gained from the system.

True

63. The second law of conservation of data states: "Processes cannot consume or create data".

True

63. Your company updated its processes for financial reporting when Sarbanes-Oxley became law. Additional changes in Sarbanes-Oxley reporting have been mandated to start in one year. To help you understand the as-is system, you should review the documentation, processes and procedures that were developed with the initial Sarbanes-Oxley project.

True

64. A system request will generally have these items: project sponsor, business need, business requirements, business value, special issues or constraints.

True

64. The three steps in creating an ERD are: (1) identify the entities (2) identify the attributes (3) identify the relationships

True

65. The three factors in the text for a Feasibility analysis are: Technical Feasibility Organizational Feasibility and Economic Feasibility.

True

66. Project teams usually use process modeling tools or CASE tools to draw process models.

True

67. In defining the data characteristics of Universal Product Codes, we might describe them as twelve characters made up of digits - numeric only.

True

67. User frustration with a proposed system would fall under intangible costs.

True

68. Using 'net present value' in calculating economic feasibility will allow for variations in the time value of money.

True

69. One of the first places to start developing Entity Relationship Diagrams is by looking at the level 0 process models (DFD) and the use cases for data flows and data stores.

True

69. While there is no one right way to begin, the authors have found it useful to first build the context diagram showing all the external entities to the system.

True

70. Data modeling is an iterative process.

True

70. Numerous studies report that projects involving information technology experience failure rates from 30% - 70%.

True

71. The Champion supports the project with resources and political clout.

True

71. When validating ERD's you should balance ERD entities with the data flows and data stores from the DFD process diagrams.

True

72. CRUD stands for create, read, update and delete and can be used to verify DFDs and ERDs.

True

Interpersonal skills are those that enable a person to develop a rapport and are important for interviewing

True

20. Andrei has a diagram that shows only one process and external entities. He is developing a: a) Context diagram b) Use case diagram c) Level 0 diagram d) Level 1 diagram e) Level 2 diagram

a) Context diagram

30. When you join two relational database tables together, frequently the primary key in one table will be a ____________ in the other table. a) Foreign key b) International key c) Primary key d) Linked list e) Entity

a) Foreign key

25. If (a) the business need is unique, (b) there is a desire to build in-house skills (c) the time frame is flexible, it might be best to: a. Do in-house / custom development b. Buy an ERP system c. Outsource to India d. Purchase a software package e. Hire a consultant

a. Do in-house / custom development

10. Workarounds are: a. Not supported by a vendor who supplied the software b. Designed by the vendor c. Created to interface two software packages that are compatible with each other d. Enterprise Wide Software Packages that are designed for satellite use e. None of these

a. Not supported by a vendor who supplied the software

30. Server virtualization involves: a. Partitioning a physical server into smaller virtual servers b. Stacking blade servers c. Using a laptop as a server d. All of these

a. Partitioning a physical server into smaller virtual servers

4. Logical process models are: a) Models that describe processes without suggesting how they are conducted b) Coded logic models c) Models based upon implementing the if-then-else programming structure d) Developed by the infrastructure analyst e) Created in the system walkthough

a) Models that describe processes without suggesting how they are conducted

Integration testing focuses on ___________; while system tests focus on _______________. a) Modules working together; meeting business requirements b) Black-box tests; white-box tests c) End-users acceptance; project sponsor acceptance d) DFDs; ERDs e) Beta tests; alpha tests

a) Modules working together; meeting business requirements

17. Alice is calculating whether a system will lower costs or increase revenues. What SDLC phase is she in? a) Planning b) Analysis c) Design d) Implementation e) Evaluation

a) Planning

33. Tom is trying to change his Use Case into a Data Flow Diagram. He has found that a use case step generally is the same as a ________ on the Level 1 Data flow diagram. a) Process b) External Entity c) Data flow d) Internal Entity e) Data store

a) Process

. This type of documentation is designed to be used when the user needs to learn how to perform a specific function (such as updating a field or adding a new record): a) Reference documentation b) Procedures manuals c) Tutorials d) Systems documentation e) Final documentation

a) Reference documentation

Most relational database systems support: a) Referential integrity b) Pop-up menus c) Customizable user-interface colors and graphics d) The 'three-clicks' rule e) Broadband connectivity

a) Referential integrity

5. Processes in data flow diagramming are represented by: a) Rounded boxes b) Arrows c) Rectangles that is open on the right end d) Enclosed rectangles e) Circles

a) Rounded boxes

33. Becky is a systems analyst for Laswell Consulting. She is attending a three day intensive workshop on developing applications in php. What systems analyst skill is she working on? a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

a) Technical

Pseudocode is: a) The same as structured English b) A technique similar to structured English c) A subset of the Java programming language d) A coding environment sponsored by Oracle e) The term for designing language prototyping screens with Visual Basic or HTML

b) A technique similar to structured English

Which is generally the best understood component of the SDLC and may offer the fewest problems? a) Developing the database design b) Developing the system's software c) Writing onscreen documentation d) Changing the data into third normal form e) Doing interviews

b) Developing the system's software

32. The most efficient tables (in terms of storage efficiency) in relational database management systems: a) Have duplicate data, especially for when more than one table is joined together for queries b) Have no redundant data c) Are denormalized d) Have entire tables duplicated e) Use plasma technologies

b) Have no redundant data

4. Juan is using a file that is created by an older, legacy system. It is likely that the data is: a) Unusable b) In a proprietary format c) In a standard format (like comma separated value) d) Is sorted by customer's middle name e) In an object-oriented structure like Ariel

b) In a proprietary format

12. When gathering requirements, the most commonly used technique is: __________ a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

b) Interviews

A general suggestion about using couples in drawing structure charts is: a) The use of many couples clarify the processing b) It is best to be conservative when applying couples to your diagram c) To use 'combination' couples when both data couples and control couples are needed d) You should have at least twice as many afferent couples as efferent couples e) Use only data couples and no control couples

b) It is best to be conservative when applying couples to your diagram

Generally, transaction structures on a structure chard will have: a) Many afferent processes b) Many efferent processes c) Many data couples d) Many control couples e) Many conditional couples

b) Many efferent processes

Which of the following is NOT a general test stage? a) Unit tests b) Module tests c) Integration tests d) System tests e) Acceptance tests

b) Module tests

Which of the following is not a RDBMS? a) Oracle b) NoSQL c) SQL d) MySQL e) None of these

b) NoSQL

24. Ramya is preparing an economic feasibility study. She has a calculation where she takes total benefits minus total costs and divides that answer by the total costs. She is calculating: a) Cash flow b) Return on investment c) Break-even point d) Net present value e) Internal rate of return

b) Return on investment

7. Which of the following is probably NOT a part of most use cases? a) Primary Actor b) Secondary Actor c) Major inputs descriptions d) Major steps performed e) Identification of the trigger

b) Secondary Actor

1. The outcome of the analysis phase is the: a) Feasibility Analysis document b) System proposal document c) System specification document d) System request document e) Business Process document

b) System proposal document

36. If the logical data model does not contain attributes that have repeating values it is in _____. a) base normal form b) first normal form c) non-normal form d) second normal form e) third normal form

b) first normal form

28. DES is an example of: a. Asymmetric Encryption Algorithm b. Symmetric Encryption Algorithm c. Bi-Adjusted Encryption Algorithm d. Dynamic Encryption System e. Alternative Systems Security Algorithms

b. Symmetric Encryption Algorithm

1. In what SDLC stage do we determine the business needs for an information systems project? a. The design phase b. The analysis phase c. The dissection stage d. The installation stage e. The big bang stage

b. The analysis phase

Unit tests focus on: a) All modules (all units) b) Users and their acceptance of how a specific unit works c) A program or a program module d) Interact screen forms e) How the overall system functions

c) A program or a program module

27. TJ has prepared a spreadsheet where the total benefits are $182,000 the total cumulative costs are $120,000. The ROI would be a) $62,000 b) About 34% c) About 51.7% d) About 65.3% e) Less than 20%

c) About 51.7%

2. A process model can __________: a) Only document the as-is system b) Only document the to-be system c) Document both the as-is and the to-be system d) Only be used in BPR situations e) Only be used with JAD sessions

c) Document both the as-is and the to-be system

Which of the following is NOT a general type of navigation control for help topics? a) Table of contents b) Index c) Inverted pointer d) Text search e) Intelligence agents

c) Inverted pointer

10. Parallel methodology is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

b) A series of versions

7. A data flow is: a) An activity or a function that is performed for some specific business reason b) A single piece of data c) A collection of entities d) A trigger to a use case e) A person, organization or system outside of the system

b) A single piece of data

26. An interview report is prepared in which step of the interview process? a) Conducting the interview b) Designing interview questions c) Post interview following-up d) Preparing for the interview e) Selecting an interviewee

c) Post interview following-up

20. Danielle has asked some closed ended questions to start an interview, then some open ended questions. Now she wants to really wants to get a greater depth of information about the process. She would probably use _________ questions. a) More closed ended b) More open ended c) Probing d) Structured e) Boxing structure

c) Probing

35. When an analyst is seeking more information from a response to questions they would probably use: a) Open Ended questions b) Close ended questions c) Probing questions d) All of these

c) Probing questions

37. If the logical data model contains attribute values that depend on an attribute that is not the identifier, then it is in _____. a) base normal form b) first normal form c) non-normal form d) second normal form e) third normal form

d) second normal form

In most automated cases, data stores from logical DFDs will be converted to: a) Binary tables b) CD Rom disks c) Paper files d) Into database files / tables e) Encrypted hexadecimal values

d)Into database files / tables

12. What makes systems integration so difficult? a. Finding the original data to install on the new server b. Creating a ghost drive to house the old information c. Installing new software packages on older machines d. Bringing legacy system data and new data together e. None of these

d. Bringing legacy system data and new data together

30. In terms of project management, which option might require excellent project management skills and a proven methodology? a. Outsourcing to Nebraska b. Outsourcing to India c. Buying a packaged solution d. Doing custom development e. Buying an ERP system

d. Doing custom development

25. The current generation of system users expect a(n)_________ to access the system. a. GUI b. Web-based interface c. ERP d. GUI or Web-based interface e. None of these

d. GUI or Web-based interface

19. The scalability associated with Client-Server systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

d. High

20. Application service providers might be best associated with: a. In-house development b. Packaged software c. Unique and strategic systems d. Outsourcing e. Internet Service Providers

d. Outsourcing

26. If (a) the business need is common (b) the skills needed are not strategic (c) the time frame is short it might be best to: a. Use in-house / custom development b. Hire a vendor to write the code for you c. Outsource to India d. Purchase a software package e. Hire a consultant

d. Purchase a software package

5. The system inputs and outputs will be designed along with a plan or__________ of the way the system's features will be navigated. a. Blueprint b. Compass c. Instructional Guide d. Roadmap e. FAQ

d. Roadmap

32. Operational requirements of a system include all of the following, except: a. System Integration b. Technical Environment c. Portability d. Scalability e. Maintainability

d. Scalability

14. Which is probably true about packaged software a. In most cases, the software is a perfect fit for the companies need b. Packaged software works best where the company has a unique need c. The time frame is flexible to long d. The business need is common e. The project has a highly skills project manager who has been with the company for many years and has an excellent relationship with both business users and the IT development staff

d. The business need is common

21. Outsourcing is used when: a. The project has a project manager who can coordinate vendor efforts b. There is a desire to build in-house skills c. In-house functional and technical skills exist d. The business need is not core to the business e. None of these

d. The business need is not core to the business

15. An n-tiered architecture is distinguished by: a. The number of drives installed b. The number of logics on the local server c. The number of terminals on the network d. The number of specialized server computers e. None of these

d. The number of specialized server computers

19. Packaged systems are used when: a. The business need is not core to the business b. There is a desire to build in-house skills c. The time frame is flexible d. The project has a project manager who can coordinate vendor efforts e. The decision to outsource is strategic

d. The project has a project manager who can coordinate vendor efforts

9. Server-based architecture is: a. When the clients capture keystrokes b. The very first architecture system c. Outdated and never used d. When the clients capture keystrokes and the very first architecture system e. When the clients capture keystrokes, the very first architecture system and outdated and never used

d. When the clients capture keystrokes and the very first architecture system

1. A data model is a: a) The mathematical model of formulas and logic used in a system b) The abstract creating of an ideal system transformation c) The model that is produced by extreme programming d) The expanded, thoroughly balanced and normalized use case for a system e) A formal way of representing the data that are used and created by a business system

e) A formal way of representing the data that are used and created by a business system

24. One of the major differences between a JAD session and an interview is: a) Selecting participants b) Figuring out what is to be done c) Preparing for the session d) Writing up results and a report e) All JAD sessions are structured and must be carefully planned

e) All JAD sessions are structured and must be carefully planned

36. Practical tips states that interpersonal skills are important, they include: a) Paying attention b) Being honest c) Ability to summarize key points d) Be happy e) All of these

e) All of these

39. Extreme programming emphasizes: a) Customer satisfaction b) teamwork c) Communication as a core value d) Simplicity as a core value e) All of these

e) All of these

Many tools like ERwin can help you with database size information and the calculation of volumetrics. a) ERD master b) DFD master c) Denormalization d) Pop-up menu e) CASE

e) CASE

3. What is probably NOT a part of a Use Case? a) Name b) Number c) Trigger d) Major inputs e) Statement of business value

e) Statement of business value

38. Agile development is a group of programming-centric methodologies that focus on: a) Making assignments for a project b) Creating a cost/benefit spreadsheet c) Creating the system proposal d) Working with a highly controversial project that may have political implications e) Streamlining the SDLC

e) Streamlining the SDLC

8. According to the authors, in moving "from here to there", an analyst needs: a) An understanding of corporate politics b) Knowledge on how to stop scope creep c) Joint Application Development facilitating skills d) Microsoft Project Management software skills e) Strong critical thinking skills

e) Strong critical thinking skills

65. Using industry standards, the general estimated project time for the Implementation phase is 15%.

false

22. The first principle of designing navigation controls is _______. a) It was tough to build, it should be tough to use b) Users have attended training c) To prevent users from making mistakes d) See that all screens can be reached in the four-click rule e) Build appropriate icons (like a blank page for new document or form)

c) To prevent users from making mistakes

30. A(n) _____ entity is an entity at the "1" end of a relationship or an entity with an identifier that describes only the entity. a) dependent b) incomplete c) independent d) intersection e) non-identifying

c) independent

Reusable modules, which are represented in the structure chart as rectangles with vertical lines on both sides, may often appear several times in a structure chart. These are called _____ modules. a) conditional b) control c) library d) loop e) off-page connector

c) library

14. The lines that connect the entities are referred to as? a) Data flows b) connectors c) relationships d) crow's feet e) foreign key

c) relationships

35. When the analyst is evaluating a data model to ensure that all fields in a record depend fully on the entire primary key, which step of normalization is being performed? a) base normal form b) first normal form c) second normal form d) third normal form e) cannot tell from this information

c) second normal form

17. James is developing a DFD. What would be a good name for him to use on a data flow from the Calculate Federal Withholding process to a data store called YTD Payroll Data? a) Move withholding to YTD storage b) Transfer fed taxes to YTD storage c) Calculation Result d) Federal Withholding Taxes e) Add amounts to YTD total

d) Federal Withholding Taxes

Document-oriented databases have the following characteristics, except: a) Large bit files b) Audio files c) Video files d) Files with uniform structure e) image files

d) Files with uniform structure

3. Data flow diagramming is: a) The only process modeling currently used b) A detailed description of data c) Almost the same as a flow chart d) Focused on the processes or activities that are performed e) A visual version of a use case

d) Focused on the processes or activities that are performed

Which of the following is a concept not generally associated with decision support systems? a) Data warehouses b) Data marts c) Aggregated data d) Object orientation e) Multidimensional databases

d) Object orientation

31. What information-gathering strategy enables the analyst to see the reality of the situation rather than listen to others describe it? a) Document analysis b) Interviewing c) Joint application design (JAD) sessions d) Observation e) Questionnaires

d) Observation

32. Typically, interviews include the following type questions: a) Probing b) Open Ended c) Close ended d) Observation

d) Observation

21. When designing navigational controls, which is NOT commonly assumed? a) That users have not read the manual b) That users have not attended training c) That users do not have help readily at hand d) That users have knowledge of the system and the interface e) That users have not read the documentation

d) That users have knowledge of the system and the interface

32. Garrett has been told by management that his project MUST be completed on time. His best estimates are more than two weeks after the absolute deadline. Which technique could he use to get a functional system on time? a) Risk management b) System prototyping c) Benchmarking d) Timeboxing e) Activity elimination

d) Timeboxing

59. Gary has eight interviews to conduct over the next week. Once he has completed all interviews, he should then write up a summary report. Preparing interview reports prior to completing all interviews will generally be premature until Gary has talked to all interviewees.

False

59. Relationships are some type of information that is captured about entities.

False

60. Generally, transaction structures occur at lower levels of a structure chart.

False

60. If the expertise needed to build a system are not readily available that is a good reason to buy a packaged software solution

False

60. Research shows that in an ideal world a menu should contain no more than four items and submenus should contain no fewer than six items.

False

61. Range checks will validate if the data is numeric with two decimal places.

False

44. In interviews, Ross has learned that the new order entry system must be available in at least three formats (mobile, web browser, and local area network based) that it must function in either English or Spanish, and that the system must return order forms and data in less than 2 seconds. He recognizes these as nonfunctional requirements.

True

45. A repository for data in DFDs is called a 'data store'

True

49. Anne has asked users and managers to identify problems with the as-is system and to describe how to solve them in the to-be system. She is probably doing Business Process Automation (BPA) in this case

True

49. At least one study suggests that some variation be appropriate in user interface design as the study suggests that when all forms tend to look the same, it can be confusing to some users.

True

58. Generally beginning analysts should avoid unstructured interviews and likewise should avoid "winging it".

True

58. Maintainability Requirements can be defined as expected business changes to which the system should be able to adapt.

True

61. Rebecca, a fairly new employee in the company and Matt, her boss (who has been with the company for 22 years) are in your JAD session. It would probably be expected that Rebecca would not share much in the session.

True

62. ERD's can be quite complex and might have hundreds or thousands of entities.

True

62. Jim is working from a leveled DFD and creating structure charts. He is finding that the lower levels of the DFD generally correspond to transform structures.

True

65. Metadata is data about data.

True

26. An example of a capacity requirement would be: a. Transmissions require 287K of data b. The systems uptime will be 99% c. Response time must be <2.8 seconds for any transactions d. The inventory database will be updated in real time e. None of these

a. Transmissions require 287K of data

Generally, most errors (defects) are found in which two testing periods? a) Unit testing and integration testing b) Integration testing and system testing c) System testing and acceptance testing d) Unit testing and acceptance testing e) Alpha testing and beta testing

b) Integration testing and system testing

35. Amy is planning on talking with a clerk and a manager in the accounts payable area, a manager in the procurement department, and two vendors. She is probably doing: a) Observation b) Interviews c) JAD d) Documentation analysis e) Organizational Feasibility

b) Interviews

The type of processing system that creates reports for supervisors (and other functional users) probably would be a: a) Transaction Processing System (TPS) b) Management Information System (MIS) c) Executive Support System (ESS) d) Decision Support System (DSS) e) Rebate Management System (RMS)

b) Management Information System (MIS)

23. Which of the following is NOT a suggestion for preventing mistakes? a) Label commands and actions appropriately b) Place menu items in alphabetical order c) Limiting choices d) Gray-out commands that cannot be used e) Create secondary menus when there are many similar choices on a menu

b) Place menu items in alphabetical order

12. Thick clients contain: a. Enormous storage abilities b. Almost all or most of the application logic c. Almost none or less than half of the application logic d. Almost all of the data logic e. None of these

b. Almost all or most of the application logic

21. Maintaining a client-server architecture is: a. Easy b. Four to Five times more expensive than server-based applications c. Completely manageable with in-house expertise from the onset d. Easy since the maturity of the application is more developed e. None of these

b. Four to Five times more expensive than server-based applications

22. The development tools used to create mainframe-based systems are: a. Very user friendly b. Not very user friendly c. Require no special skills to maintain d. Difficult at first, but the skills are easy to acquire e. None of these

b. Not very user friendly

24. Server-based applications typically utilize a _______, character-based interface that can be quite powerful for the ________ user. a. Complex Basic b. Plain Skilled c. Complex Skilled d. Plain Basic e. None of these

b. Plain Skilled

The three types of basic processes on a process model: a) Sequence, selection and iteration processes b) Navigation, status and work processes c) Afferent, central and efferent processes d) Batch, online and real time processes e) Singular, bilateral and library processes

c) Afferent, central and efferent processes

Every part of a system that is not automated will: a) Be ignored in the implementation of the system b) Be drawn as only logical DFDs not physical DFDs c) Be outside the human-machine boundary d) Go back through the analysis phase to become automated e) Will be drawn as diamond shapes on the structure charts

c)Be outside the human-machine boundary

5. There are _____ primary hardware components of a system. a. 1 b. 2 c. 3 d. 4 e. 5

c. 3

14. How many advantages are client-server based architectures known for? a. 2 b. 3 c. 4 d. 5 e. 7

c. 4

The third step in creating a physical DFD (data flow diagram) is a) update the metadata in the CASE repository b) draw a human-machine boundary c) add implementation references d) add system-related data stores, data flows, and processes e) update the data elements in the data flows

d) add system-related data stores, data flows, and processes

12. An ERD is a picture which shows the information that is ________ by a business system? a) created b) stored c) used d) all of these

d) all of these

In a structure chart, the element that is drawn as an empty circle with an attached arrow is known as a(n) _____. a) conditional line b) connector c) control couple d) data couple e) module

d) data couple

27. The first step to building an Entity Relationship Diagram is to _____ a) Identify data flows from the level 0 DFD diagram b) draw the relationships between the entities c) identify the attributes for each entity d) identify the entities e) identify the processes, data flows and data stores

d) identify the entities

There are two symbols that describe special types of control in a structure chart. They are a curved arrow and a diamond. These symbols represent _____ and _____. a) connector, conditional line b) control, subordinate c) library module, conditional line d) loop, conditional line e) loop, connector

d) loop, conditional line

34. A logical data model that does not lead to repeating fields and that the data models leads to tables containing fields that are dependent on the whole identifier is in _____ normal form. a) balanced b) first c) primary d) second e) third

d) second

4. Software systems can be divided into how many basic functions? a. 1 b. 2 c. 3 d. 4 e. 5

d. 4

8. Form(s) of network connection(s) in a system include: a. ATM b. T2 c. DSL d. ATM and DSL e. T2 and DSL

d. ATM and DSL

14. A use case helps: a) Define interview questions b) Clarify ongoing costs for a system c) Identify risks with the project d) Refine project management milestones e) Understand system activities and requirements

e) Understand system activities and requirements

The critical path is the fine line between the alpha test and the beta test as you change from test data to real production data.

FALSE

The standard method language for accessing the data in relational database tables is: SQL - Standard Query Logic.

FALSE

The two basic types of documentation are: portfolio documentation and assessment documentation.

FALSE

The two primary ways to optimize a relational database are (a) for storage efficiency and (b) for using the smallest amount of space.

FALSE

User documentation includes such things as logical ERDs, logical DFDs, use-cases, physical ERDs, physical DFDs and screen mockups.

FALSE

57. Project managers, business analysts and systems analysts create all use cases without user input.

False

58. In an entity called STUDENT, you might find attributes of PROFESSOR-ID, Last-Name, FirstName and CLASSROOM.

False

35. There are some 'system-related' data stores, data flows and processes that must be added when creating the physical DFD.

True

58. The level 0 diagram shows all the major processes (at the first level of numbering - like 1 through 4), the data stores, data flows, but does not show external entities.

False

58. The planning phase of the SDLC will have two steps: project initiation and requirements determination.

False

59. Fan-In describes the number of subordinates that communicate with the control module.

False

When creating a project plan, project analysts normally figure out the 'critical path'.

TRUE

37. A workaround is a custom-built add-on program that interfaces with packaged applications to handle specific needs.

True

37. If the density on a single page form is too high, it might not be as effective for some users as creating a two-page form.

True

37. One of the first activities of an analyst is to determine the business requirements for the new system

True

37. The primary goal of a system is to create value for the organization.

True

37. Use cases illustrate the activities that are performed by the users of the system.

True

39. A use case depicts a set of activities performed to produce some output result.

True

44. Investments in information systems projects today are evaluated in the context of an entire portfolio of projects.

true

46. The corporate IT department carefully needs to prioritize, select and manage a portfolio of projects.

true

39. An audit control / audit logfile might be a system related process, data flow and data store that would be added when creating physical DFDs.

True

39. Data models can be either logical or physical.

True

39. Outsourcing requires the least in-house resources.

True

39. Process models can be used with either 'as-is' systems or 'to-be' systems.

True

48. The project methodology that takes the longest to complete is the Waterfall Development Methodology.

true

51. The Iterative approach of the RAD methodology breaks the overall project into a series of release versions.

true

39. Some people have suggested that the 'analysis' phase could be clearer if it was called the 'analysis and initial design' phase.

True

39. Systems that are not cancelled or abandoned are frequently delivered to the users significantly late or costing more than expected.

True

52. The Throwaway Prototyping methodology is especially good for exploring design alternatives.

true

40. Application Software Providers (ASPs) should be utilized when considering non-core programming and/custom needs.

True

40. Data Flow diagramming is a tool for doing process modeling.

True

User documentation must be developed at the end of the project, after all programming, testing and approvals have occurred. To do it any earlier may risk not including changes in the system.

FALSE

When converting a logical ERD into a physical data model, you will want to specify both primary keys and international keys.

FALSE

When working on a major project, project teams will always select and stay with only one database format for consistency of development and use.

FALSE

43. Mobile application interface capabilities are greater than client-server architectures.

False

43. Processes in DFDs are shown as circles in the Gane and Sarson notation.

False

44. Client-server scalability is less than server-based scalability.

False

44. The only skills that are applied during systems projects are technical.

False

44. User experience refers to minimizing the number of clicks or commands to go from one field to another.

False

45. A control module can also be called a library module and is a set of reusable code.

False

40. The key person in the SDLC is the systems analyst who analyzed the business situation, identifies opportunities for improvements and design an information system to implement the improvements.

True

40. There are four advantages associated with client-server architecture.

True

40. When creating the physical DFD, you may want to capture system information like date and time of update and user-id of the person who did the update.

True

41. A temptation when moving from analysis to design of a system is to jump right into coding.

True

41. For screen forms and reports, you should use a font of at least size 12.

True

41. Jorge, Vice President of Operations, has requested that the updated supply chain system keep a record of all 'stock-outs' for six years. This is an example of a functional requirement.

True

41. Server-based architecture is more secure than client-based architecture.

True

41. Time and arrangements deals are potentially more expensive if the service provider requires unforeseen resources to complete the project on time.

True

41. Use cases are a type of 'event-driven modeling'.

True

42. A common need to the business should be satisfied by contracting with an Application Service Provider (ASP).

True

42. A data model is a formal way of representing the data that are used and created by a business system.

True

45. Because of the need to be focused on providing information about the business value of a system, a systems analyst will probably have much training or experience in programming or application development.

False

45. ERD's and DFD's are two techniques for data modeling.

False

45. The only skills that are applied during systems projects are functional.

False

45. Use cases are always numbered sequentially from start to finish.

False

The authors suggest a book on managing programming projects called "The Mythical Mountain" written by Roberta Roth.

FALSE

The best design for accessing data faster is generally the most efficient storage as well.

FALSE

A DSS is a design support structure and does the 'ETL' (extract, transform and load) to create data warehouses.

FALSE

A great advantage of object oriented database management systems is their ease of learning.

FALSE

Adding new requirements to a project after the system design has been finalized is called "requirements creep".

FALSE

Alpha and beta tests are part of systems testing.

FALSE

An 'international key' is used to relate two tables together (like customer ID from the customer table is an international key in the order table).

FALSE

Analysts should not worry about the users' perceptions of the new system during acceptance testing.

FALSE

Brian wants an e-commerce system to be able to do a lot of rapid processing - like search for particular keywords in documents; return the price of an item; update quantities in the shopping cart. He is probably building an Expert System.

FALSE

By the time the design phase is started, all time estimates should be within 5% of the actual completion time.

FALSE

Change control in application development is a formal process for changing written documentation into online documentation, and frequently uses specialized 'cyber documentation agents' to create menus, screens and online user documentation.

FALSE

Charles has been assigned to developing modules CRM_input_web; CRM_input_validation; CRM_database_retrieval; and CRM_database_update. He is two weeks behind and is only on the second module. This is definitely a serious issue and Charles should be reprimanded or even fired for incompetence.

FALSE

Data marts are larger, aggregated legacy databases.

FALSE

Informix is a pure OODBMS package.

FALSE

46. Data (like Year-to-date totals) that come from a data store and are used in a process (like 'Calculate YTD Totals') and then the updated amounts are written back to the data store - can be drawn on a DFD model as a two-headed arrow.

False

46. ERD's and DFD's are two techniques for process modeling.

False

46. Experienced users prefer user interfaces with 'ease of learning' features.

False

31. Because project teams rely more on packaged software, program design is no longer needed.

False

33. The Human-Machine boundary is part of the Human-Computer Interface into usability systems.

False

34. Prototyping is the interface design step that often uncovers additional information that is needed in the system, leading to a revision of the physical DFDs or ERPs.

False

34. The architectural components of any system are the network and the hardware.

False

35. Aesthetics refers to designing information that can be navigated in three-clicks or less.

False

35. Use cases are the same as process diagrams.

False

47. The 'primary actor' is the internal action that occurs based on a SQL query (like: sort, select).

False

When developing navigational controls for online documentation, you should consider tables of contents, indices, text searches, intelligent agents (like context sensitive help), and web-like links between systems.

TRUE

When moving from logical data models to physical data models, you should update your CRUD matrix.

TRUE

With some software systems, a day of down-time caused by a software bug can cost more than several programmers' annual salaries.

TRUE

33. The objective of architecture design is to determine what parts of the application software will be assigned to what hardware.

True

33. Use Cases give more detail about requirements.

True

34. A Use Case is a formal way of representing how a business system interacts with its environment.

True

34. Forms should have version numbers so that users, analysts and programmers can identify outdated materials.

True

34. Micah is adding implementation resources to change a logical DFD into a physical DFD. He should describe databases, files, tables, and processes as they will be implemented on the computer.

True

Referential integrity is the idea of ensuring that values linking the tables together through the primary and foreign keys are valid and correctly synchronized.

TRUE

System documentation takes all the processes, notes, diagrams from systems analysis and systems design and puts it in a project binder for future reference.

TRUE

Testing and programming are tightly coupled.

TRUE

The main difference between integration testing and system testing is that integration testing looks to see if modules work together without errors; but system testing is more focused on meeting business requirements.

TRUE

The most efficient tables in a relational database in terms of storage space have no redundant data and very few null values.

TRUE

A CRUD matrix shows exactly how data are used and created by major processes in the system.

TRUE

A relational database that is used extensively in data warehousing is a multidimensional database.

TRUE

Although TJ did a lot of work normalizing the database so that it is in third normal form (3NF), he may want to 'denormalize' it so that access might be faster.

TRUE

An ironic fact of systems development is that the more programmers that are involved in the development of the system, the longer the project will take.

TRUE

CRUD stands for 'create', 'read', 'update' and 'delete'.

TRUE

Decision support systems are not designed to find individual records, but to find aggregated information (such as 'what three products sold the best in Boston in February').

TRUE

Generally when assigning programming development tasks, the project manager will analyze skill levels and capabilities of programming staff and also analyze the modules for complexity and try to match complex modules to more experienced and skilled programming developers.

TRUE

If a program module is taking longer to develop than expected, generally the most appropriate approach is to move the expected completion date back by the same amount of time that the module will be late.

TRUE

If the system being analyzed, designed and developed requires programming (as compared to a package or outsourcing), developing the software may be the single largest component of any systems development activity in terms of both time and money.

TRUE

Jasmine is an example of an object-oriented database system.

TRUE

Microsoft Access is an end-user DBMS.

TRUE

Rachel wants aggregated data like find the number of banking customers who have savings accounts over $100,000 and home mortgages with her bank. She probably wants to use a Decision Support System.

TRUE

35. Building a system in-house builds technical skills and functional knowledge that one may not want to allow to walk out of the door.

True

35. Data storage, Data Access Logic, Application Logic and Presentation Logic are the four basic functions of software systems.

True

31. System requirements are communicated through a collection of design documents and physical processes and data models.

True

32. Because (a) preexisting code needs to be understood, organized, and pieced together; and (b) it is still common for the project team to have to write some code and adapt packages to the business environment, it is therefore good for analysts to fully understand program design.

True

32. The decision to make, to buy, or to outsource influences the design tasks that are performed throughout the rest of the design phase.

True

33. CASE repository entries are updated to reflect specific technology decisions as they are made.

True

15. On your level 0 diagram you have a process #2 and when you create a level 1 diagram for process #2, you might have processes like: a) 2.1, 2.2, 2.3 b) 2-1, 2-2, 2-3 c) 2A, 2B, 2C d) 2-A, 2-B, 2-C e) 2-initial, 2-main, 2-end

a) 2.1, 2.2, 2.3

54. Throwaway Prototyping balances the benefits of well-thought-out analysis and design phases with the advantages of using prototypes to refine key issues before a system is built.

true

8. System prototyping is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

a) A 'Quick and Dirty' system

56. Extreme Programming (XP) stresses customer satisfaction and teamwork.

true

30. Micah is a fairly new project manager. He estimated for a project plan (on the planning phase) that the project would cost $50,000 and take 20 weeks. According to the margin of error guidelines for well-done estimates, that could range from: a) $0 and $100,000 - and between 15 and 25 weeks b) $10,000 and $60,000 - and between 12 and 28 weeks c) $0 and $100,000 - and between 0 and 40 weeks d) $5,000 and $100,000 - and between 10 and 30 weeks e) $25,000 and $75,000 - and between 10 and 30 weeks

a) $0 and $100,000 - and between 15 and 25 weeks

19. The interview process has gone well. There are a few things that need clarification and what really happens when specific financial analysts use the system. Which of the following might be the best way to verify what does happen? a) Observation of how the analysts do their work b) Document analysis of what the system was to do c) A JAD session with end users, financial analysts and top managers d) Additional interviews with top level managers in the finance area e) Questionnaires / survey of end users of the system

a) Observation of how the analysts do their work

Which of the following is NOT an approach to integration testing? a) Use-case testing b) User interface testing c) Use scenario testing d) Data flow testing e) System interface testing

a) Use-case testing

8. Omar is an analyst building a use case. Which of the following project roles might be the most important in terms of getting information about building the use case? a) Users b) Programmers c) Other analysts d) Project Sponsor e) Equipment vendors

a) Users

The concept for planning good performance of databases is known as: a) Volumetrics b) Econometrics c) Moving averages d) Correlation e) PERT

a) Volumetrics

15. Outsourcing firms called _____________ supply software applications and/or software related services through the Internet. a. Application Service Providers (ASPs) b. Enterprise Resource Providers (ERPs) c. System Development Life Cycle Companies (SDLCs) d. Information Technology Developers (ITDs) e. None of these

a. Application Service Providers (ASPs)

27. A sample access control requirement would be: a. Customer service reps can modify customer files but not delete them b. Data will be encrypted for secure ordering c. All uploaded files will be checked for viruses d. The system will cost $38,900 per minute of downtime in lost revenues e. None of these

a. Customer service reps can modify customer files but not delete them

29. Which is NOT a factor in choosing a development option? a. Data base normalization b. In-house experience c. Time frame d. Project skills e. Project management

a. Data base normalization

18. The cost of development associated with Client-Based systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

a. Low

16. Jack is developing an ERD for a small dental practice office patient record system. The dental practice has three dentists, six hygienists, and many patients. A patient is always assigned to the same dentist for all appointments. In particular, he is working on the relationship between dentists and patients. Should it be: a) 1 to 1, with a modality of null b) 1 to many with a modality of not null c) Many to many with a modality of null d) Many to many with a modality of not null e) 1 to many with a modality of null

b) 1 to many with a modality of not null

2. Approximately _______ percent of men are color blind (and thus improper use of color can impair their ability to read information) a) 5% b) 10% c) 15% d) 20% e) More than 20%

b) 10%

6. _______ repository entries are updated to reflect specific technology decisions as they are made. a. DFD b. Sequential c. CASE d. Hardware e. None of these

c. CASE

11. Systems Integration refers to: a. The process of synching all computers to the mainframe b. The delivery of systems to the final destination office c. Combining packaged software, the legacy system and new software d. Adding the original hard drives to a newer system e. Creating a new software to monitor power consumption

c. Combining packaged software, the legacy system and new software

When testing individual modules, it sometimes happens that some modules are not finished when testing starts, so the programmer usually writes _______ for the unfinished modules to enable the modules around them to be tested. a) "By-passes" b) "Temporary Modules" c) "Placeholder Modules" d) "Stub Modules" e) "End Modules"

d) "Stub Modules"

11. Extreme Programming (XP) is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

d) A method for stressing customer satisfaction

17. The cost of infrastructure associated with Server-Based systems is: a. Low b. Low-Medium c. High-medium d. High e. Very High

e. Very High

41. PMP is People - Management - Project - the three components of successful project management.

false

45. In most IT departments, the demand for IT projects is generally about the same as the department's ability to supply them.

false

47. Projects can be classified by: size, cost, purpose, length, programming language and hardware platform.

false

49. The project methodology that takes the longest to complete is Extreme Programming Methodology.

false

50. The Waterfall Methodology breaks the overall project into a series of release versions.

false

53. The Throwaway Prototyping methodology is good at creating release version 1.0 for users and then the methodology shifts to system prototyping to finish the system.

false

55. Agile Development stresses analysis, modeling and documentation over programming.

false

57. If you had a project with very clear requirements, familiar technologies, not super complex, reliable, a very long time schedule and where the need for schedule visibility is low - the best methodology might be Extreme programming

false

59. The margin of error in cost and time estimates can be as much as 20% in the planning phase for the system proposal deliverable.

false

60. The science (or art) of project management is setting a schedule and sticking to it no matter what - even if that includes working weekends and adding staff to reach the deadline on time.

false

63. A classic planning mistake mentioned in the textbook is motivating employees with financial rewards instead of recognition and genuine thanks.

false

64. Nate is managing a project that is behind by one month with five months to go. He should add four to six staff persons to the project to get it back up to speed.

false

42. CIO is an acronym for "Chief Information Officer".

true

61. Wendy has been informed by the CIO that the project she is managing MUST be done by December 20th and must be fully tested and implemented by December 31st. She realizes that will mean she will have to prioritize the functionality and build the system to meet the core functions, even if that means something gets delayed until the next release of that system. She is practicing the 'timeboxing' approach to scope management.

true

62. A classic planning mistake mentioned in the textbook is having an 'overly optimistic schedule'.

true

66. Using industry standards, the general estimated project time for the Implementation phase is 30%.

true

67. Using industry standards, the general estimated project time for the Planning phase is 15%.

true

68. Using industry standards, the general estimated project time for the Analysis phase is 20%

true

69. Scrum, XP and Dynamic systems development method (DSDM) are all classified as 'agile development' concepts.

true

36. In a custom software case, all parts of the system need to be completely customized and scripted to the company's specifications including ancillary software to the current system.

False

36. Many of the data stores in the logical DFD will be changed into encrypted word processing documents when a physical DFD is developed.

False

36. Space is generally at a premium on forms and reports , thus squeezing information onto forms is considered a wise business decision.

False

37. A process model is an informal way of showing the external entities, event triggers, inputs and outputs.

False

37. An ATM dialing a network provides the IT department with a quick cash withdrawal for emergency purposes.

False

38. Client-based architecture is complex and there is minimal chance of network circuits being overloaded due to growing network applications.

False

1. Which is NOT true about the content awareness design principle? a) A date of 8/6/09 will be understood internationally b) Drawing boxes around related items (like name / address / city / state / zip) will help users c) Field labels should be fairly short, yet with long enough so that users can not be confused d) Input fields should follow a logical progression that is familiar to users e) All printed forms should have version numbers for better control

a) A date of 8/6/09 will be understood internationally

The authors describe "writing programs" as: a) A fun, creative activity b) A tedious process c) A very mathematical and logical process d) An excellent learning process for end-users e) Answers B and C

a) A fun, creative activity

19. Vanessa has a data flow diagram with an item called 'Register for Class'. That item would be: a) A process b) A data flow c) A data store d) An external entity e) A process relationship

a) A process

4. An example of a functional requirement is _________ a) Access to the customer order system b) System should be available in English and Spanish c) System can be accessed through a Blackberry device d) Output can be displayed in Internet Explorer, in Firefox, or in Google Chrome browsers e) System is automatically updated every 5 seconds

a) Access to the customer order system

When changing a logical DFD into a physical DFD, it might be necessary to ________. a) Add system-related data stores, data flows and processes b) Normalize the logical DFD into 3NF c) Create the user-interface with smaller fonts d) Change the system architecture to three-tiered architecture e) Delete extraneous data stores and delete extraneous data flows

a) Add system-related data stores, data flows and processes

Acceptance testing is generally done in two stages: a) Alpha tests and beta tests b) Black-box tests and white-box tests c) Integration tests and systems tests d) Unit tests and module tests e) Inductive tests and deductive tests

a) Alpha tests and beta tests

21. The Major Inputs section of a use case describes their: a) File structure b) Cardinality c) Modality d) Source e) Destination

d) Source

24. A process is: a) An activity of a function that is performed for some specific business reason b) A single piece of data within a system c) A collection of data within a system d) A person, organization or system that is external to the system e) A combination of function and the data it acts upon

a) An activity of a function that is performed for some specific business reason

4. The primary actor in a use case is generally: a) An external user of the system b) The Project Sponsor c) The Champion d) The Project manager e) The Systems Analyst

a) An external user of the system

Marco is working for iTunes and needs to have a database that can store complex data. His best choice might be: a) An object database b) A relational database c) A red-green database d) A tree database e) A spanning database

a) An object database

18. Which was NOT given as a method for determining business requirements? a) Benchmarking b) Interviewing c) Observation d) Document analysis e) Questionnaires and surveys

a) Benchmarking

25. It is better to make menus ______. a) Broad and shallow b) Narrow and deep c) Broad and deep d) Narrow and shallow e) Wide and tall

a) Broad and shallow

14. Jona's project is to take a fairly straight-forward manual process and make it an electronic process. This will make the processing more efficient. Which of the following requirements analysis strategies is she using? a) Business Process Automation b) Business Process Improvement c) Business Process Internalization d) Business Process Reengineering e) Business Process Renovation

a) Business Process Automation

The process of coordinating a program as it changes through construction (like keeping files and programs in different places) is called: a) Change control b) Separation of duties c) Judicial control d) Scope creep e) None of these

a) Change control

26. A ___________ is used when several fields must be entered before the form can be processed. a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

a) Completeness check

12. Barton is an analyst developing a use case. Which of the following will probably NOT be on his use case? a) Description of data flows b) Use case name c) A use case number d) Source for the major inputs e) Type of trigger

a) Description of data flows

8. Typically, the third step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

a) Design interface standards

22. PCM Incorporated will need to purchase new servers for a system. This would be a: a) Development cost b) Operating cost c) Ongoing cost d) Intangible cost e) Intangible benefit

a) Development cost

On test plans: a) Each individual test has a specific objective and describes a set of very specific test cases to examine b) Each user must contribute to the specific goals of the test plan c) Each member of the project team, plus all developers (programmers) must identify one specific application that they will test d) Only the master project manager tests, and only after all coding has been completed in what is called the "Omega" test e) The use of multiple choice options has been shown to effectively assess to a 99.9% accuracy rate

a) Each individual test has a specific objective and describes a set of very specific test cases to examine

3. Some systems that are used infrequently (like decision support systems) should probably emphasize: a) Ease of learning b) Higher user flexibility c) Ease of use d) More short-cut keys and built in keyboard functions e) Organizational feasibility

a) Ease of learning

28. TJ is coordinating a project. Which would he probably NOT use to avoid conflicts? a) Encourage a competitive edge between team members b) Clearly defining plans for the project c) Develop a project charter d) Look at other projects and priorities and see how that might impact the project e) Communicate the business value to the team

a) Encourage a competitive edge between team members

12. Ruth is an analyst. On her DFD a) Give it a verb phrase name, like 'search inventory' b) Give it a noun description phrase, like 'Inventory-process-1' c) Level 1 diagrams d) Level 2 diagrams e) Process Diagram

a) Give it a verb phrase name, like 'search inventory'

As a structure chart is constructed, it is generally best to build modules with: a) High cohesion b) Highly coupled c) High fan-out d) Have the word "and" in the module title e) A high level of coincidental cohesion

a) High cohesion

11. Interface evaluations almost always ______________. a) Identify improvements b) Are conducted with other analysts in a structured walkthrough c) Find coding errors d) Are part of the training and implementation process e) Cause additional scope creep in the project

a) Identify improvements

23. The last step in creating basic ERD's is to: a) Identify relationships b) Define attributes and assign identifiers c) Recognize entities d) Test them with users e) Compile them with Java

a) Identify relationships

As compared to integration testing, system testing: a) Is much broader in scope b) Uses production data (rather than test data) c) Is done by hand-picked end-users (rather than systems analysts) d) Involves both black-box and red-box testing e) Makes more extensive use of stubs

a) Is much broader in scope

30. Chunxia is balancing her DFD. This means she is: a) Making sure that all information presented at one level is accurately represented in the next level b) Making sure that each data store has at least one input data flow and at least one output data flow c) Making sure that each process has at least one input data flow and at least one output data flow d) Making sure that all processes start with action verb phrases e) Making sure that all data flows have noun names

a) Making sure that all information presented at one level is accurately represented in the next level

Generally, transform structures on a structure chart will have: a) Many afferent processes b) Many efferent processes c) Many data couples d) Many control couples e) Many conditional couples

a) Many afferent processes

17. Information in the data dictionary is called: _______________ a) Metadata b) Cached information c) Compiled data d) Data repository e) File silo

a) Metadata

2. Which is a true statement about IT projects? a) Most IS departments face a demand for IT projects that far exceed the ability to do them. b) Project Managers must be certified as PMP (Project Management Professionals) c) Project estimates tend to have a built-in buffer of time d) Project teams of 12 to 15 are generally considered optimum e) The majority of projects taken on by IT departments are not strategic to the business

a) Most IS departments face a demand for IT projects that far exceed the ability to do them.

28. When normalizing data models, if you take attributes that have multiple values for a single instance of an entity and create separate entities for those attributes you are moving from: a) O normal form to 1st normal form (1NF) b) 1st normal form (1NF) to 2nd normal form (2NF) c) 2nd normal form (2NF) to 3rd normal form (3NF) d) Generalized normal form (GNF) to fully normalized form (FNF) e) Dependent normal form (DNF) to Independent normal form (INF)

a) O normal form to 1st normal form (1NF)

The authors suggest a good time to start the documentation process is: a) Once the interface design and program specifications are complete b) Once the system test is complete c) Once the alpha acceptance test is complete d) Once the beta acceptance test is complete e) Once the logical ERDs and DFDs have been translated into physical ERDs and DFDs

a) Once the interface design and program specifications are complete

In a structure chart, the purpose of a control couple is to: a) Pass parameters from a subordinate module to the control module b) Pass parameters from the control modules to a subordinate module c) Pass data from a subordinate module to the control module d) Pass data from the control module to a subordinate module e) Chaperone the dance for programmers on the project

a) Pass parameters from a subordinate module to the control module

15. A use scenario is one commonly used ________________. a) Path through a use case b) Normalized ERD structure c) Context diagram d) Buy-in flowchart e) Throwaway prototyping tool

a) Path through a use case

17. After creating the interview report you should: a) Send a copy to the interviewee with a request to read it and correct or clarify b) Change the document into a unchangeable format (like a pdf file) so that it cannot be changed or edited c) Distribute the interview report to all others that are on the interview schedule so they will not have to go over the same materials d) Edit the report into a bulleted format for easier analysis e) Distribute the interview report to the interviewee's manager.

a) Send a copy to the interviewee with a request to read it and correct or clarify

The purpose of creating physical ERDs is to: a) Show implementation details and to explain more about the 'how' of the final system b) Normalize the database to third normal form c) Do a new technology analysis d) Drive the users nuts e) Help junior analysts to find the transactions between systems

a) Show implementation details and to explain more about the 'how' of the final system

24. The Major Inputs section on a use case will give the _____________ a) Sources of that input b) Destinations of that input c) Creator of that input d) User of that input e) What triggers the input to occur

a) Sources of that input

35. Ramesh has drawn a set of DFD's that are not properly balanced. This is probably a: a) Syntax error b) Semantic error c) Modeling error d) First law of conservation of data error e) Second law of conservation of data error

a) Syntax error

7. Which of the following project roles would identify how technology can improve business processes? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Requirements analyst

a) Systems analyst

8. Which of the following project roles would insure that the system conforms to information systems standards? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

a) Systems analyst

The project team is very knowledgeable about relational database management systems. In terms of feasibility, this might be best known as: a) Technical feasibility ('can we build it') b) Economic feasibility ('should we build it') c) Managerial feasibility ('why would we build it') d) Graphical feasibility ('does it fit this project') e) Organizational feasibility ('if we build it, will they use it')

a) Technical feasibility ('can we build it')

16. Marta has asked the users of a system to picture themselves performing the processes and to write down those processes in a sequential order. She should get a good idea of ________. a) The major steps for each use case b) The use case c) The elements within steps d) The temporal triggers e) The external actors

a) The major steps for each use case

13. Which of the following methodologies might be most appropriate if you have a system project with: clear requirements, very familiar technologies, not all that complex, reasonably reliable, a very long time schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

a) Waterfall

20. Which of the following methodologies is the historic standard, but is used less today because it takes the longest to complete all the SDLC steps? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

a) Waterfall

The fifth step in creating a physical DFD (data flow diagram) is a) update the metadata in the CASE repository b) draw a human-machine boundary c) add implementation references d) add system-related data stores, data flows, and processes e) update the data elements in the data flows

a) update the metadata in the CASE repository

34. When an analyst is seeking a more wide ranging response to questions they would probably use: a) Open Ended b) Close ended c) Observation d) Probing

a)Open Ended

7. Which of the following lists indicates the correct ordering of deliverables in a system specification document? a. System Acquisition Weighted Alternative Matrix, Interface Design, Physical Data Model Data Storage Design b. Data Storage Design, Interface Design, Architecture Design, Updated Crud Matrix c. Hardware and Software Specifications, Interface Design, Data Storage Design, Architecture Design d. Program Design Specifications, Physical Data Model, Data Storage Design, Architecture Design e. Update CASE Repository Entries, Update CRUD Matrix, Interface Design, Architecture Design

a. System Acquisition Weighted Alternative Matrix, Interface Design, Physical Data Model Data Storage Design

3. In the initial stage of design, what are business requirements converted into? a. System Requirements b. Work Order Summary c. Computer Qualifications Checklist d. Vanilla System e. Hardware Blueprint

a. System Requirements

18. Custom development is used when: a. The business need is unique b. The business need is not core to the business c. The project has a project manager who can coordinate vendor efforts d. The time frame is short e. The skills are not strategic

a. The business need is unique

31. An example of a multilingual requirement is: a. The system will operate in English, French and Spanish b. Country managers can define custom fields c. All date fields will be presented in a uniform format d. Personal information about English customers cannot be sent to Chinese systems e. Country managers are able to change telephone number formats

a. The system will operate in English, French and Spanish

16. A time and arrangements deal is considered: a. Very flexible b. Very rigid c. Cheaper than any other option d. Useless when considering a systems design e. Always the best option for any project

a. Very flexible

28. An advantage of custom development might be: a. You get a system that is tailored to the current business and meets specific needs b. The rapid development of custom systems c. The low cost (as compared to buying a package) d. The low risk factor e. The ability for in-house developers to work on systems that are in new programming languages and in technologies that are unknown to them prior to the development

a. You get a system that is tailored to the current business and meets specific needs

Pseudocode is: a) A language popularized by Feinstein and Longenecker in the 1990's b) A detailed outline of the lines of code that need to be written c) A 'pretend' syntax inherent in all CASE tools d) The translation of code into ASCII e) A dialect of Visual Basic only used in program design

b) A detailed outline of the lines of code that need to be written

Bridget is managing a systems development project. The programmers have gotten farther and farther behind in the schedule. One thing she should NOT do is: a) Use a code generator that comes with high-end CASE tools b) Add more programmers to the development team c) Keep communication channels open d) Hold weekly meetings e) Keep close tabs on the process so it doesn't slip farther

b) Add more programmers to the development team

28. Arianna is an analyst studying credit card fraud. She is working on developing a use case for when a stolen credit card is used. The trigger would be: a) Customer starts to buy gas b) Alarm is activated for stolen credit card use c) Gas attendant asks for customer's driver's license d) When the card-holder reports the card as stolen e) When car pulls into gas station

b) Alarm is activated for stolen credit card use

12. Michaela is a systems analyst who is determining business requirements. What would most likely be the SDLC phase for her? a) Planning b) Analysis c) Design d) Implementation e) Business requirements are not developed by systems analysts, but by business analysts

b) Analysis

36. Kallie is creating use cases, data flow diagrams and entity relationship diagrams. In what phase of the SDLC would she do this? a) Planning b) Analysis c) Design d) Construction e) Implementation

b) Analysis

This type of file records "before" and "after" images of data as the data gets altered. a) Intelligent files b) Audit files c) Master files d) Raw files e) Prime files

b) Audit files

29. Which is an activity the users probably will NOT do on a project? a) Make decisions that influence the project b) Budget funds for the project c) Perform hands-on activities for the project d) Be assigned specific tasks to perform (with clear deadlines) e) Have some official roles on the project team

b) Budget funds for the project

31. The type of skill that is common to systems analysts to understand how IT can be applied to business situations and to ensure that the IT delivers real business value is: a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

b) Business

16. Moderate changes to existing processes falls under the _________ analysis. a) Business Process Automation (BPA) b) Business Process Improvement (BPI) c) Business Process Reengineering (BPR) d) Business Process Blue-skying (BPB) e) Business Process Efficiency (BPE)

b) Business Process Improvement (BPI)

11. Which of the following project roles would analyze the key business aspects of the system? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

b) Business analyst

The concept of putting records that are somehow related together on the same server (or storage device) is called: a) Carmelization b) Clustering c) Joining d) Normalization e) Hybrid technologies

b) Clustering

36. Which of the following is not a project characteristic that will affect the methodology selection descion? a) Schedule Visabiltiy b) Creating a cost/benefit spreadsheet c) User requirements clarity d) Complexity of the system e) System Reliability

b) Creating a cost/benefit spreadsheet

9. Typically, the fourth step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

b) Creating an interface design prototype

25. The Major Outputs section on a use case will give the _________ a) Sources of that input b) Destinations of that input c) Creator of that input d) User of that input e) What triggers the input to occur

b) Destinations of that input

31. The CRUD matrix shows a) The crud that is coming into the system and how to quarantine it b) Exactly how data are used and created by the major processes in the system c) The 1:M relationships on an ERD diagram d) The external entities, process and major data flows from the Context DFD diagram e) Where customer, relationships, users and developers will interact with a system

b) Exactly how data are used and created by the major processes in the system

15. Which is NOT a good practice in conducting interviews? a) Be happy - happy people radiate confidence b) Explain thoroughly - it is estimated that in a strong interview session, the interviewer (you) should talk and explain about 60% of the time and the interviewee should answer about 40% of the time c) Watch interviewees' facial expressions, how they sit and their body language, do they cross their arms, do they lean forward? d) Pay attention to what the interviewee is saying e) If the interviewee ask you a question, answer it truthfully - and if you don't know an answer, say so

b) Explain thoroughly - it is estimated that in a strong interview session, the interviewer (you) should talk and explain about 60% of the time and the interviewee should answer about 40% of the time

2. The two basic formats for data storage: a) Spreadsheets and documents b) Files and databases c) Databases and presentations d) Flash and web forms e) ERDs and Use cases

b) Files and databases

According to the textbook, which of the following is not a cause of project failure? a) Flaws in analysis b) Flaws in aesthetics c) Flaws in user interface design d) Flaws in database design e) Flaws in developing correct system specifications

b) Flaws in aesthetics

27. A ___________ is used when fields are numeric or contain coded data. a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

b) Format check

27. Suggestions for motivation might include all of these EXCEPT: a) Setting realistic deadlines b) Giving all team members the same bonus on a project c) Recognize and reward good efforts d) Reward those with outstanding quality and effort e) Having a good working environment

b) Giving all team members the same bonus on a project

26. Omar has a model with 85 entities. He can: a) Compress these into at most seven entity grouping units b) Group these into related subject areas c) Stop - he has all entities defined d) Sort the entities alphabetically e) Co-validate the entities with the level 2 DFD diagrams

b) Group these into related subject areas

5. When implementing the 'minimize user effort' factor, most interface designers follow the ____. a) Two-clicks rule b) Three-clicks rule c) Four-clicks rule d) User Experience rule e) The menu option rule

b) Three-clicks rule

32. The two methods to validate that an ERD is well formed are _____. a) Balancing with process models and following design guidelines created by Chen b) Normalization and balancing with process models c) Renaming theory d) Balancing with process models and renaming theory e) Normalization and following design guidelines created by Chen

b) Normalization and balancing with process models

13. You have entities of ITEM, SOLD-ITEM, SALE and PAYMENT. Which most likely is NOT a relationship? a) SALE is paid by PAYMENT b) PAYMENT pays for ITEM c) ITEM is included in SOLD-ITEM d) SALE involves SOLD-ITEM e) PAYMENT pays for SALE

b) PAYMENT pays for ITEM

15. Which of the following methodologies might be most appropriate if you have a system project with clear requirements, very familiar technologies, not all that complex, reasonably reliable, a short time schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

b) Parallel

4. Another outcome of the planning phase is the: a) Feasibility Analysis document b) Project Plan c) System specification document d) System proposal document e) Business Process document

b) Project Plan

6. Lines on an ERD diagram indicate: a) Hierarchies between processes b) Relationships among the data c) Plurality of data items d) Uniqueness of data items e) Primary keys

b) Relationships among the data

24. Bob is selecting a systems analysis and design methodology. What might be the first step? a) Selecting the shortest methodology b) Researching the organizations standards and policies for 'approved' methodologies c) Interviewing senior management as to their suggestions on methodologies d) Do a quick 'cost/benefit' analysis on which methodology will provide the most benefits at the lowest cost e) Do an analysis on which methodology might lessen or eliminate scope creep

b) Researching the organizations standards and policies for 'approved' methodologies

7. Which of the following is NOT true about ERDs? a) Special symbols are added to show high-level business rules b) The diagrams are drawn in a sequential order - from top to bottom c) Similar kinds of information are listed together in entities d) ERD's are data modeling techniques e) Lines are drawn to show relationships among the data

b) The diagrams are drawn in a sequential order - from top to bottom

The test objective is taken directly from: a) The results of the JAD session b) The program specification c) The use-cases d) The project sponsor e) The questions raised in a focus-group application

b) The program specification

When creating the index, which of these will probably NOT be a place to find terms to include in the index: a) The set of commands in the user interface (like open file, modify, etc.) b) The set of user interface design standards (like aesthetics, layout, consistency, etc.) c) The set of major concepts in the system (like in the Tune Source example of artist, tune, music genre, etc.) d) The set of business tasks (like ordering, returns, adjustments, etc.) e) The set of synonyms for other sets (like 'quit', 'stop', 'end' for 'exit' or 'erase' for 'delete')

b) The set of user interface design standards (like aesthetics, layout, consistency, etc.)

17. You might have to go back and adjust the steps in a use case, if ____________ a) There are more than three major inputs to a step b) The steps are of varying size c) The trigger is an external one d) The importance level is 'high' e) The primary actor is an external customer

b) The steps are of varying size

The term 'bug' in software came from: a) An English translation of the word for defect in German b) The story of a moth getting caught inside an early computer c) The acronym BUG - for binary unknown glitch d) No one knows the reason e) None of these

b) The story of a moth getting caught inside an early computer

Which is NOT true of structure charts? a) They show sequence b) They show the user interface c) They show couples d) They show selection e) They emphasize structure and reusability

b) They show the user interface

17. In Use Scenario Development, the goal is: a) To describe all possible use scenarios within a use case b) To describe the most commonly occurring use scenarios c) To accurately model all possible DFDs d) To give complex and complete narrative descriptions of all scenarios e) To effectively model all data flows and data models

b) To describe the most commonly occurring use scenarios

29. Primary keys are: a) The same as default keys (or default values) b) Unique values for each record in a file or table c) Elementary values (like 'primary' school) d) Prime numbers in a Fibonacci sequence e) The same as foreign keys

b) Unique values for each record in a file or table

Acceptance tests are done primarily by: a) Programmers b) Users c) Developers d) Systems Analysts e) Project Managers

b) Users

15. Modality refers to: a) Relationships of one-to-one one-to-many or many-to-many b) Whether a child entity can exist with or without a related instance in the parent entity c) The hierarchical structure that was developed in process models applied to data models d) The number of attributes generated by an entity e) Whether the entity has a unique identifier (aka 'primary key') or a concatenated identifier (aka 'composite key')

b) Whether a child entity can exist with or without a related instance in the parent entity

_____ refers to how well the lines of code within each module in a structure chart relate to each other. a) calculation b) cohesion c) control d) coupling e) fan-in

b) cohesion

In a structure chart, a transaction structure _____. a) contains a control module that calls several subordinate modules in sequence, after which something "happens" b) contains a control module that calls subordinate modules, each handling a particular transaction c) contains a transactional loop d) is a subordinate module that handles a particular transaction e) is subordinate to subordinal modules

b) contains a control module that calls subordinate modules, each handling a particular transaction

The second step in creating a physical DFD (data flow diagram) is a) update the metadata in the CASE repository b) draw a human-machine boundary c) add implementation references d) add system-related data stores, data flows, and processes e) update the data elements in the data flows

b) draw a human-machine boundary

By definition, external entities on the DFD: a) Are used as the starting point for the physical data flow diagram b) Are outside the scope of the system c) Will be the top of the structure chart d) Will become database table entries e) Are updated with metadata to become part of the physical DFD

b)Are outside the scope of the system

In determining if a process is to be automated, the project team will do all of the following EXCEPT: a) Weigh the costs b) Redraw the logical DFD as a combined logical/physical DFD c) Determine benefits d) Evaluate the efficiency e) Consider the integrity of the process to the system

b)Redraw the logical DFD as a combined logical/physical DFD

13. Another name for custom development might be: a. Offshore outsourcing b. In-house development c. Vendor supplied in-house consulting d. CASE tools e. Package software

b. In-house development

20. Client-server architectures tend to be: a. More expensive than client-based architectures b. Less expensive than client-based architectures c. More less secure than client-based architectures d. More expensive than client-based architectures and more less secure than client-based architectures e. None of these

b. Less expensive than client-based architectures

11. Client-server architecture holds the client responsible for_____ and server is only responsible for _____. a. Application Logic and Presentation Logic b. Presentation Logic and Data Access Logic and Data Storage c. Data Access Logic and Presentation Logic Data Storage d. Application Logic and Data Storage e. Data Storage and Application Logic

b. Presentation Logic and Data Access Logic and Data Storage

9. For efficiency purposes, it is wise to___________ when there is a basic software need to be satisfied. a. Implement a company-wide project team to handle a custom software scripting b. Purchase a packaged system c. Design a blueprint and contract an outside vendor to develop a program d. Make do with the current software package e. Utilize a professional consultant to develop a system of servers7

b. Purchase a packaged system

23. The following document is utilized with possible vendors on projects with smaller budgets, instead of sending a lengthy document to all possible vendors: a. Request for Proposal (RFP) b. Request for Information (RFI) c. Request for Quote (RFQ) d. Request for Efficient Information Distribution (REID) e. More Optimal Desires (MOD)

b. Request for Information (RFI)

27. One problem with using packages software systems is: a. It takes a very long time to get the system and get it installed b. The company has to accept the functionality that is provided with the system c. Many common software packages have been written and tested and are readily available d. There are many good software packages that are reasonable in price e. Most software packages allow for some customization

b. The company has to accept the functionality that is provided with the system

17. Fixed-price contracts are considered: a. Very flexible b. Very rigid c. Always cheaper than any other option d. Useless when considering a systems design e. Always the best option for any project

b. Very rigid

29. The term in the computing domain which refers to the creation of devises or storage with the use of software and not hardware is: a. Encryption b. Virtualization c. Dynamic Creation d. Alternative Devises e. None of these

b. Virtualization

2. The objective of architecture design is to determine_______________. a. How aesthetically pleasing the server system will be b. What parts of the application software will be assigned to what hardware c. How the computers will be arranged to provide ample storage d. Where the mainframe will be situated e. None of these

b. What parts of the application software will be assigned to what hardware

The authors suggest that: a) "All testing must include live production data" b) "All testing must include both alphabetic and numeric data" c) "It is impossible to test every possible combination of input and situation" d) "Testing rarely pays for itself" e) "Testing should only be used for complex programs and situations"

c) "It is impossible to test every possible combination of input and situation"

4. Which of the following might be a good choice of an icon for saving on a user interface? a) A piggy bank b) A dollar sign c) A computer diskette d) A hard drive image e) A green "S"

c) A computer diskette

11. Andrea is creating a diagram model for processes (without regard to whether it is computerized or a manual process). She is probably creating _______________. a) A physical process model b) A PMT (process management tool) model c) A logical process model d) A user process model e) A UML system case model

c) A logical process model

9. Throwaway prototyping is BEST characterized as: a) A 'Quick and Dirty' system b) A series of versions c) A method for exploring design alternatives d) A method for stressing customer satisfaction e) More explicit testing

c) A method for exploring design alternatives

19. Which would normally NOT be a reason for a project? a) When a business need has been identified b) A consultant has suggest a new customer relationship management system c) An open source platform has just come on the market d) An existing system just isn't working properly and the workaround is tedious e) To support a new business initiative

c) An open source platform has just come on the market

34. Jack is going over financial numbers for a proposed project. Which of the following system analyst skills is he exhibiting currently? a) Technical b) Business c) Analytical d) Interpersonal e) Management

c) Analytical

2. A data model can __________: a) Illustrate return-on-investment, break-even point, and economic feasibility b) Represent actions or processes that occur in the to-be system c) Be used as a logical data model in analysis and as a physical data model in design d) Only be used in BPR situations e) Only be used with JAD sessions

c) Be used as a logical data model in analysis and as a physical data model in design

25. Ramona is preparing an economic feasibility study. She is calculating the payback period. She is calculating: a) Cash flow b) Return on investment c) Break-even point d) Net present value e) Internal rate of return

c) Break-even point

18. Probably the first thing to do when conducting an interview is: a) Turn on your tape recorder b) Get started by asking the first question on your list c) Build rapport with the interviewee so he or she trusts you d) Ask a close ended question e) Ask a probing question

c) Build rapport with the interviewee so he or she trusts you

9. Which would NOT likely be an attribute of an entity called "Student"? a) Age b) Student identification number c) Class room number d) Home phone e) Gender

c) Class room number

33. When an analyst is looking for specific, precise information they would probably choose this type of question: a) Probing b) Open Ended c) Close ended d) Observation e) Questionnaires

c) Close ended

11. When gathering requirements from processing clerks and lower level managers about 'how' a system works, the best approach might be: _____. a) JAD session b) Document analysis c) Closed ended interview questions d) Probing interview questions e) Root cause analysis

c) Closed ended interview questions

1. Which of the following will probably NOT be at a system walkthrough? a) User representatives b) Management representatives c) Computer Center director d) Key decision makers e) Analyst who prepared the system proposal

c) Computer Center director

Which of the following is probably something that system testing WILL NOT verify? a) Systems documentation b) Ability to perform under heavy load c) Conformance to Sarbanes-Oxley requirements d) How well the system meets business requirements e) The systems usability

c) Conformance to Sarbanes-Oxley requirements

22. After working with Chris (who is a staff member in the registrar's office) on major steps in the registration process, Maureen (a systems analyst) will: a) Discuss these steps with Thomas, the project manager b) Create data-entity maps c) Create use cases d) Create user interface screens e) Create narrative storyboards

c) Create use cases

5. On an ERD _________________: a) Processes are listed alphabetically with relationship connections drawn between processes b) Data elements are listed alphabetically with a cross listing to the processes that manipulate them c) Data elements are described as singular (1:1) plurals (1:N) or didactic (M:N) d) Data elements are grouped in a hierarchical structure that is uniquely identified by number e) Data elements are listed together and place inside boxes called entities.

c) Data elements are described as singular (1:1) plurals (1:N) or didactic (M:N)

29. The second principal part of use cases is 'input and output'. Another name might be: a) Origin and ending b) Data normalization c) Data flows d) Parallelism e) Program specifications

c) Data flows

One common method to increase access speed is to: a) Use legacy databases in a indexed sequential access method b) Encrypt all data with 256 byte encryption c) Denormalize the tables d) Delete all primary keys e) Only use alphabetic data

c) Denormalize the tables

13. Chang is working on "How will this system work". What SDLC phase is he in? a) Planning b) Analysis c) Design d) Implementation e) Transition

c) Design

10. Typically, the fifth step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

c) Do an interface evaluation

In most cases, decision support systems are best at: a) Finding particular records that are stored in legacy databases b) Finding processes that are stored in object databases c) Finding aggregated data d) Analyzing audit (or log) files for possible intrusion and security breaches e) Red and green linked list processing

c) Finding aggregated data

33. This output is poor at helping users recognize precise numeric values and should be replaced by tables when precision is important. a) Detail report b) Summary report c) Graphs d) Turnaround document e) None are poor

c) Graphs

Legacy databases might include ________ and ______________ a) Master files and transaction files b) Audit files and look-up files c) Hierarchical databases and network databases d) Tree databases and leaf databases e) Red databases and Green databases

c) Hierarchical databases and network databases

18. Entity Relationship Diagrams show relationships between entities that are _____. a) Outputs from JAD sessions b) Consistent with the ACM guidelines c) In line with the business rules and processing d) Defined by the project sponsor e) Extensions of the process models

c) In line with the business rules and processing

The Human-Machine Boundary a) Is the keyboard and screen b) Builds on research in ergonometry c) Is a line drawn on the physical DFD to separate human action from automated processes d) Is a part of developing the HCI interface e) Separates where manual processes are separated by human completed processes

c) Is a line drawn on the physical DFD to separate human action from automated processes

17. Which of the following methodologies might be most appropriate if you have a system project with: somewhat unclear requirements, somewhat unfamiliar technologies, that is complex, reasonably reliable, a short time schedule and high schedule visibility? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

c) Iterative

version 2 (etc.) of a system? a) System Prototyping b) Waterfall Development c) Iterative Development d) System Prototyping e) Parallel Development

c) Iterative Development

6. This type of file stores 'core information that is important to the business' and for the application (such as customer mailing lists). a) History Files b) Audit files c) Master files d) Transaction files e) Intelligent files

c) Master files

34. If the skills required by a project cannot be met by the available project team, which would probably NOT be a reasonable solution? a) Use a consultant b) Use a contract employee c) Modify the project to use skills inherent on the project team d) Train the project team (or some of the team) on the skills needed e) Mentor a team member (like sending a person to work on a similar project to acquire the necessary skills)

c) Modify the project to use skills inherent on the project team

If a program module is taking longer to develop than expected, the recommended action is: a) Put more programmers on the staff b) Force the developers to work weekends to catch up c) Move the expected completion date back d) Incorporate scope creep into the requirements e) Change the development environment into an object-oriented language

c) Move the expected completion date back

3. Which of the following is an open source DBMS? a) Microsoft Access b) SQL Server c) MySQL d) Excel e) CASE

c) MySQL

. Test plans: a) Are generally developed by the programmers informally b) Generally only cover main processing and not the various sub-processes c) Often have 20 to 30 pages d) Can be massive with over 200 pages of very explicit plans and directions e) Can generally be written in three pages or less

c) Often have 20 to 30 pages

28. A ___________ is used when you want to verify that data fits within correct minimum and maximum values. a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

c) Range check

24. One strong suggestion for navigation design is: a) Limit menu items to at most ten items b) Color code common menu items with green (go) and red (stop) c) Simplify recovery from mistakes (like having an undo button) d) Lock the user's computer when a mistake has been made e) Log all mistakes, and log the user's computer when 1000 mistakes have been made

c) Simplify recovery from mistakes (like having an undo button)

5. An example of a nonfunctional requirement is ____________ a) Supplier table is available b) The system must contain customer order history for three years c) System can be used in any of 100 offices worldwide d) SQL queries from customer table and order table are available e) Customer zipcode is formatted as character data

c) System can be used in any of 100 offices worldwide

3. The outcome of the design phase is the: a) Feasibility Analysis document b) System proposal document c) System specification document d) System request document e) Business Process document

c) System specification document

21. Because the cost can be immense, _________ is one of the most critical steps in implementation. a) Documentation b) Coding c) Testing d) Developing a conversion strategy e) Training

c) Testing

33. Andrew, an analyst for PaxMedia Inc., has just learned that the business rules for a system he has been working on have changed. This means that _____. a) Nothing - once the ERD data models have been drawn, they are 'frozen' for the system b) Andrew will be reassigned to a different project that is in its beginning stages c) The ERD components will have to be changed d) The ERD data model will have to be put on hold while new DFD diagrams are created e) The project will have to be scrapped and restarted

c) The ERD components will have to be changed

21. The main difference between the Parallel Development Methodology and the Iterative Development Methodology is that: a) The Parallel Development Methodology will have various releases (like version 1.0 2.0, etc.) and the Iterative will not b) The Iterative Methodology will break the system project into sub-projects for analysis, design and implementation and then merge them into a final system and the Parallel will not c) The Parallel Methodology will have sub-projects and the Iterative Methodology will have various releases d) The Parallel Methodology will create various models or prototypes with user involvement before setting on design concepts and the Iterative will not e) The Iterative Methodology will create various models or prototypes with user involvement before setting on design concepts and the Parallel Methodology will not

c) The Parallel Methodology will have sub-projects and the Iterative Methodology will have various releases

25. One difference between the reports from interviews and from a JAD session is that: a) It describes information from the interview or JAD session b) The interview report will give a complete project management timeline while the JAD session report will not c) The interview report is generally written within 48 hours of the interview while the JAD session report may take a week or two after the JAD session. d) The JAD report will include results from questionnaires while the interview report will not e) JAD reports will include technology analysis while interviews will only include root cause analysis

c) The interview report is generally written within 48 hours of the interview while the JAD session report may take a week or two after the JAD session.

The goal of acceptance testing is: a) That modules and units work together with each other b) That the databases are properly organized for both efficiency in storage and access c) To confirm that the system is complete and meets the business needs d) That both black-box and white-box tests have been approved by upper management e) To verify that the use-cases, ERDs and DFD's have been properly converted

c) To confirm that the system is complete and meets the business needs

19. The objective of an interface evaluation is ______. a) To measure the processing speed of an interface design b) To determine the database processing requirements for an interface c) To understand how to improve the interface design d) To get users input on colors, menu names and flexibility e) To determine if all use cases and ERDs have been built into the interface

c) To understand how to improve the interface design

31. The science (or art) of project management is in making ___________ of size, time and cost. a) Benchmark comparisons b) Analytical and educated estimates c) Trade-offs d) Maximum calculations e) Minimum calculations

c) Trade-offs

6. The relation between use cases and data flow diagrams is generally: a) Use cases are developed by users and data flow diagrams are developed by systems analysts b) Data flow diagrams are developed first and then use cases ensue c) Use cases are developed first and then data flow diagrams ensue d) Use cases show logical processes, while data flow diagrams show physical processes e) There is not a relationship between use cases and data flow diagrams

c) Use cases are developed first and then data flow diagrams ensue

13. A _______________ is an outline of the steps that the users perform to accomplish some part of their work. a) Step walkthrough b) User design flow c) Use scenario d) Process model e) Layout verification

c) Use scenario

29. Independent entities are: a) When a child requires attributes from the parent b) When there is only one entity for a data process model c) When an entity can exist without the help of another entity d) Where the entity identifier is also the primary key e) When an entity comes from an external source (aka 'external entity')

c) When an entity can exist without the help of another entity

In a structure chart, the element that communicates that a message or a system flag is being passed from one module to another is known as a(n) _____. a) conditional line b) connector c) control couple d) data couple e) loop

c) control couple

24. Which of the following is normally NOT done in the design phase of the SDLC? a. Decisions for hardware and software purchases are made b. User interactions are planned out (inputs, outputs, user interfaces) c. Cost / Benefits of the new system are carefully calculated d. Logical DFDs and ERDs are converted into physical DFDs and ERDs e. The physical data model is created

c. Cost / Benefits of the new system are carefully calculated

2. System design is the determination of the overall system architecture-consisting of a set of physical processing components, _______________, and the communication among them-that will satisfy the system's essential requirements. a. Workmanship b. Order entry methods, HR feedback c. Hardware, Software, People d. Engineering data plans, fiber optic specifications e. None of these

c. Hardware, Software, People

8. If on a limited time budget, the best way to be sure you remain efficient and effective in designing a system is to utilize the ____________. a. Porters 5 Forces Model b. Outsourcing Model c. RAD and Timeboxing Techniques d. Hire/Fire Motivational Theory e. Not Attempt the Project

c. RAD and Timeboxing Techniques

22. Requests for Proposals (RFPs) serve what purpose? a. Integrate systems with one another b. Create synergy amongst staff members c. Solicit information from providers d. Engage mobile computers with mainframe technology e. Develop morale amongst managers

c. Solicit information from providers

23. Project teams often _________ the ________ associated with creating secure, efficient client- server applications. a. Overestimate b. Overestimate Simplicity c. Underestimate Difficulty d. Underestimate Simplicity e. None of these

c. Underestimate Difficulty

31. A(n) _____ entity cannot exist without the presence of another entity and is normally on the "many" end of a relationship or has an identifier that is based on another entity's attribute. a. independent b. incomplete c. dependent d. variable e. non-complying

c. dependent

A default value is: a) The first value in a table b) The median value in a table c) The smallest value in a table d) A value that probably occurs most frequently e) A mistake made by Dee (aka the name "Dee's fault")

d) A value that probably occurs most frequently

When you are updating the data elements in the data flows (when creating a physical DFD) you might need to: a) Return to users to interview them about the physical data flows b) Update the original cost/benefit analysis to reflect the physical storage c) Do a technology analysis d) Add physical data elements to the metadata descriptions in the CASE repository e) Do formal benchmarking of the data flows

d) Add physical data elements to the metadata descriptions in the CASE repository

5. Which of the following is NOT a file type described in the textbook? a) History files b) Audit files c) Look-up files d) Algebra files e) Transaction files

d) Algebra files

Which of the following is not a characteristic of Big Data? a) Huge volume b) Rapid velocity c) Great variety d) All are characteristics e) None are characteristics

d) All are characteristics

15. Wayne is a senior director of finance. His company only recently came under SarbanesOxley regulations and is the project sponsor to become compliant. He realizes that examining the as-is system may not be much help as the regulations are so radical that a major analysis and design project must be completed to make the company compliant. He is leaning towards: ______________ a) Business Process Automation b) Business Process Improvement c) Business Process Internalization d) Business Process Reengineering e) Business Process Renovation

d) Business Process Reengineering

28. Which of the following project roles would probably make a presentation about the objectives of a proposed project and its benefits to executives who will benefit directly from the project? a) Requirements Analyst b) Systems Analyst c) Project Manager d) Champion e) Chief Information Officer (CIO)

d) Champion

29. A ___________ is used when an extra digit is added to a coded field to make sure it the entered data is correct (like social security numbers). a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

d) Check digit check

22. Paul is interviewing Ming. He first explains why he is there and what he wants to accomplish in the interview. This would be done in which step of the interview process? a) Selecting interviewees b) Designing interview questions c) Preparing for the interview d) Conducting the interview e) Post-interview follow-up

d) Conducting the interview

19. Role-playing the use case with actual users is a good way to: a) Identify the use case b) Identify the major steps within each use case c) Identify elements within steps d) Confirm the use case e) Identify the primary actor

d) Confirm the use case

40. Extreme programming requires a great deal of discipline and it is recommended for: a) Large development teams b) Mission critical applications c) Large systems d) Considerable onsite user involvement e) All of these

d) Considerable onsite user involvement

3. Which is NOT a purpose of the requirements definition? a) To give a very high-level explanation of the business requirements b) A more precise list of requirements that can be used as inputs to the rest of analysis c) Create functional requirements d) Create cost/benefit analysis e) Create non-functional requirements

d) Create cost/benefit analysis

6. Typically, the first step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

d) Examine DFDs and use cases to develop use scenarios

21. Michael, a systems analyst, is preparing a closed wiki site for Northstate Bank. He has written permission from eight other companies to view their internal wiki sites, and also has approval from his manager and the project team to use these other sites for ideas and structure. This would be a form of: a) Business Process Automation b) Business Process Improvement c) Informal Benchmarking d) Formal Benchmarking e) Technology Analysis

d) Formal Benchmarking

28. Hamid has selected one middle manager from each department that will be affected by the updated system and one lower-level manager from each department, along with a few senior staff as well as the project sponsor for a JAD session. He is trying to: _________ a) Balance the work load for departments so the regular day-to-day functions can still continue while the JAD team is off-site b) Create a new hybrid department that will beta test the final system c) Prevent domination by only a few individuals in the JAD session d) Have a broad mix of organizational levels in the JAD session e) Reduce the time necessary for the length of JAD session meetings

d) Have a broad mix of organizational levels in the JAD session

20. Which phase is generally the longest and most expensive part of the development process? a) Planning b) Analysis c) Design d) Implementation e) Feasibility

d) Implementation

23. Linda is a clerk in the accounting department. She was interviewed by David and is excited about the proposed system that will utilize electronic funds transfer. This would be an example of ______. a) Tangible benefit b) Cash flow c) Break even analysis d) Intangible benefit e) Return on investment

d) Intangible benefit

18. The ____________ defines the basic components of the interface and how they work together to provide functionality to users. a) Use Scenario Design b) Interface Standards Design c) Interface Metaphor d) Interface Structure Design e) Interface Template Design

d) Interface Structure Design

16. The ______________ defines the basic components of the interface and how they work together to provide functionality to users. a) User Scenario plan b) Layout schema c) Consistency structure design d) Interface structure design e) Completeness diagrams

d) Interface structure design

32. Rocky is dealing one-on-one with users and business managers (including some that have little experience with technology). He is demonstrating what system analyst skill? a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

d) Interpersonal

8. An entity: a) Is the association between two related processes b) Has cardinality (1:1, 1:N, or M:N) c) Shows if it can be null or no null d) Is a person, place or thing e) Is described with a verb phrase

d) Is a person, place or thing

26. Robert is doing an economic analysis using today's dollar values. He is doing: a) Cash flow analysis b) Return on investment analysis c) Break-even point analysis d) Net present value analysis e) Internal rate of return analysis

d) Net present value analysis

4. An entity relationship diagram (ERD): a) Is a use-case diagram enhanced graphically to show data and process modeling b) Is a high-level CASE diagram of data modeling used in business systems c) Is an illustration of external data flows to and from a business systems d) Is a picture that shows the information that is created, stored and used by a business system e) Is a graphical display of the processes in a business system

d) Is a picture that shows the information that is created, stored and used by a business system

. A program is not considered finished until: a) It has been used successfully for six months b) The cost of developing the program 'breaks-even' with the benefits of the program c) The ROI is positive d) It has passed its testing e) It 'dies' and is replaced by a newer version

d) It has passed its testing

20. What is true about creating an entity relationship diagram? a) There will be at most seven entities b) There will be at most seven relationships c) If you identify more than seven entities, analyze and combine until you have seven or less d) It is an iterative process e) Entities will have at most seven attributes

d) It is an iterative process

24. What type of process is creating an ERD? a) Well defined process b) Sequential process c) Process defined by five steps d) Iterative process e) User defined process

d) Iterative process

In a registration database, Ross has tables for student, professor, classroom, class, class-hour. Since his campus has about 12,000 students, when he runs queries about what student is in what class, taught by what professor in what classroom at which hour, the DBMS software will have to perform many _________ a) Axes b) Parallels c) Concretes d) Joins e) Enrolls

d) Joins

1. Which of the following is not a general function of any application program? a) Data storage b) Presentation logic c) Data access logic d) Linked-list modules e) Application logic

d) Linked-list modules

25. Anthony is working on the cardinality of doctors and patients in a large urban hospital. With the large number of doctors with varying specialties and patients that may have more than one aliment, he thinks the relationship might be noted as: a) 1 to 1 b) 1 to 2 c) 1 to many d) Many to many e) Many to 1

d) Many to many

Which of the following is NOT true? a) Analysts design programs in the design phase of the SDLC, programmers code programs in the Implementation phase b) Analysts can use structure charts to design programming logic c) Analysts can build in the three structures of sequence, selection and iteration into structure charts d) Programmers can take the logical DFDs and directly implement into code by compiling the metadata in the CASE tools e) Physical DFDs show additional details, such as what tables in the database replace data stores on the logical DFD

d) Programmers can take the logical DFDs and directly implement into code by compiling the metadata in the CASE tool

3. Which is NOT suggested for IT development projects? a) Projects need to be prioritized b) Projects need to be carefully selected c) Projects need to be carefully managed d) Projects need to give a positive return on investment within four years e) Projects need to give value to the business

d) Projects need to give a positive return on investment within four years

13. A technique where a set of written (or online) questions are distributed to people (frequently to a large number of people) is: _____. a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

d) Questionnaires / surveys

Barb is working on a database design. For the most efficient storage she should remove: ______ and ______. a) Primary keys and foreign keys b) International keys and redundancy c) Adjectives and adverbs d) Redundancy and null values e) Special characters and primary keys

d) Redundancy and null values

The most popular type of database today is the: a) Hierarchical database b) Tree database c) Green database d) Relational database e) Piecemeal database

d) Relational database

19. The three major parts of an ERD diagram are: a) Process, data flow, data store b) Attribute, modularity, cardinality c) Relationship, data flow, entity d) Relationship, attribute, entity e) Process, entity and relationship

d) Relationship, attribute, entity

29. The most common reason for schedule and cost overruns is ___________ a) Team conflict b) Lack of communication from project manager to project team c) Lack of support by sponsor and champion d) Scope creep e) Adding people to a late project

d) Scope creep

1. A critical success factor in project management is to: a) Say "no" to all requests as they add to 'scope creep' b) Use throwaway prototyping c) Use a CASE tool to delineate requirements from work tasks d) Start with a realistic assessment of the work that needs to be done e) Hire an outside project management consulting group

d) Start with a realistic assessment of the work that needs to be done

32. This report is used when a user needs brief information on many items a) Detail Report b) Turnaround document c) Exception report d) Summary report e) Consistency check

d) Summary report

The two fundamental documentation types are: a) System documentation and integration documentation b) Screen documentation and batch documentation c) User documentation and online documentation d) System documentation and user documentation e) Acceptance documentation and integration documentation

d) System documentation and user documentation

2. The outcome of the planning phase is the: a) Test plan b) System proposal document c) System specification document d) System request document e) Business Process document

d) System request document

System tests are usually conducted by: a) Programmers (developers) b) Project managers c) Users d) Systems analysts e) Project sponsors or project champions

d) Systems analysts

12. What the MAIN difference between systems prototyping and throwaway prototyping? a) Systems prototyping involves users while throwaway prototyping does not b) Throwaway prototyping involves users while systems prototyping does not c) Systems prototyping is a rapid application development methodology while throwaway prototyping is not d) Systems prototyping works with users to quickly develop a simplified working version of the proposed system while throwaway prototyping focuses more on exploring design alternatives e) Throwaway prototyping develops systems that will be use as 'stop-gap' systems - and generally for less than six months while systems prototyping results in systems that will be used extensively for several years.

d) Systems prototyping works with users to quickly develop a simplified working version of the proposed system while throwaway prototyping focuses more on exploring design alternatives

5. The V-model pays more explicit attention to ___________: a) Iteration b) Return on investment (ROI) c) Business Value (the "V") d) Testing e) Prototyping

d) Testing

25. A team of developers and customers are in close communication, with frequent communications, simplicity, feedback and courage. This would best describe: a) The parallel development methodology b) The waterfall development methodology c) The iterative development methodology d) The Extreme Programming methodology e) The throwaway prototyping methodology

d) The Extreme Programming methodology

16. In the interview report, what will probably NOT be included? a) Summary of what the interviewee said b) Interview's name, interviewee's name c) Details from crucial areas of the interview relating to the project at hand d) The actual questions that were asked as a permanent record e) Any materials, documents, etc. that the interviewee gave you relevant to the project at hand

d) The actual questions that were asked as a permanent record

22. Which of the following would BEST describe "system complexity"? Systems Analysis and Design - Dennis / Wixom / Roth - Chapter 2 - page 7 a) The aspect of using technologies that analysts and developers are familiar with b) The aspect of what the business side really wants the system to do c) The aspect of how quickly the system can be developed and implemented d) The aspect of how intricate and difficult the system must be e) The aspect of how accurate the system must be (such as medical equipment or for games)

d) The aspect of how intricate and difficult the system must be

Beth is considering a simple process for immediate orders. When processing an immediate order, a phone clerk writes the order on a paper form. Which of the following might be a reason NOT to automate this process? a) The clerk could make errors when writing the information wrong on the paper form b) The paper form could be lost when sent to the order filling /shipping area c) The writing on the paper form could be hard to decipher d) The costs to automate might be significantly higher than doing it manually e) The time to get the paper form from the clerk's desk to the order filling / shipping area is one day or longer

d) The costs to automate might be significantly higher than doing it manually

5. A 'temporal' trigger might be which of the following: a) A patient calls to make an appointment with a doctor b) The accounting department needs information for a report c) The human resources department needs a tax withholding form to be filled out by a new employee d) The date changes to the first day

d) The date changes to the first day

26. Kumar is the project manager for a revised TTP system. Which of the following most likely would NOT be considered in developing a work plan? a) Identifying tasks that need to be completed b) Estimating the time that will be needed on tasks c) Creating a dependency chart d) The organizational readiness for the project e) Key milestones that need to be met

d) The organizational readiness for the project

22. In adding attributes to an ERD, which of the following might NOT be a good resource for attributes? a) From the CASE tool b) Data flows from DFD's c) Requirements documents d) The system proposal document e) Through interviews (what users need for reports and processing)

d) The system proposal document

Which is NOT true of Structure Charts when designing programs? a) They show all the components of code that must be included in a program at a high level b) They are arranged in a hierarchical format that implies sequence c) They help analysts create programs that are easy to understand and maintain d) They are generally implemented with control flags that pass from the control modules to the subordinate modules e) They may have on-page and off-page connectors

d) They are generally implemented with control flags that pass from the control modules to the subordinate modules

FoodTitan is a large grocery store chain in the Chicago, Milwaukee, and the Upper Midwest. Generally their stores have from 18 to 36 checkout lanes with scanners. When somebody scans a bar code, the system is probably using a _____ to process the purchased items. a) Executive support system (ESS) b) Barcode processing system (BPS) c) Management information system (MIS) d) Transaction Processing system (TPS) e) A grocery store processing system (GSPS)

d) Transaction Processing system (TPS)

This type of file is used to update a master file: a) Roster Files b) Training files c) Master files d) Transaction files e) Integrated files

d) Transaction files

14. Use scenarios builds upon ___________. a) Entity relationship diagrams b) JAD sessions c) PERT charts d) Use cases e) HIPO charts

d) Use cases

20. Which of the following is not a common Interface Evaluation technique? a) Interactive evaluation b) Walk-through evaluation c) Heuristic evaluation d) Use scenario normalization e) Formal usability testing

d) Use scenario normalization

37. Rapid Application Development is a collection of methodologies that include all of the following except: a) Iterative Development b) System Prototyping c) Throwaway Prototyping d) V-model Methodology.

d) V-model Methodology.

35. Interpersonal skills for a project manager might be important when: a) Making assignments for a project b) Creating a cost/benefit spreadsheet c) Creating the system proposal d) Working with a highly controversial project that may have political implications e) Using the V-model variation of the Waterfall Methodology.

d) Working with a highly controversial project that may have political implications

The largest single component of any systems development project in terms of both time and cost could be: a) Conducting JAD sessions b) Gamma testing c) Developing the user interface d) Writing programs e) Having meetings

d) Writing programs

10. Which would NOT likely be an entity on a car insurance ERD? a) Customer b) Policy c) Agent d) Zip code e) Car

d) Zip code

38. Balance occurs between DFDs and ERDs when the data stores _____ a) Are uniquely named b) Have only one input and one output flow c) Are named the same as the relationships on the ERD d) Can be compared to ERD data flows and attributes on the ERD are included in data stores on the DFD e) Can be equated to entities on the ERD and when entities are referred to by data stores on the DFD

e) Can be equated to entities on the ERD and when entities are referred to by data stores on the DFD

11. Which would likely be an entity on a car insurance ERD? a) date b) Gender c) company d) fire district e) Car

e) Car

30. A ___________ is used when all combinations of data are valid (like birth year is prior to marriage year). a) Completeness check b) Format check c) Range check d) Check digit check e) Consistency check

e) Consistency check

21. In creating ERD's, which would most likely NOT be a source for entities? a) Use cases b) Level 0 DFD diagrams c) External entities d) Data flows e) Cost / benefit reports

e) Cost / benefit reports

10. The authors suggest that an analyst is 'very much like a ____________' and business users are like elusive suspects. a) Police professional b) Politician c) Forensic scientist d) Air traffic controller e) Detective

e) Detective

7. Typically, the second step in the user interface design process is: a) Design interface standards b) Creating an interface design prototype c) Do an interface evaluation d) Examine DFDs and use cases to develop use scenarios e) Develop the interface structure diagram (ISD)

e) Develop the interface structure diagram (ISD)

30. The type of skill that is common to systems analysts to deal fairly and honestly with other project team members is: a) Technical b) Business c) Analytical d) Interpersonal e) Ethical

e) Ethical

18. Which of the following methodologies might be most appropriate if you have a system project with: unclear requirements, very familiar technologies, not all that complex, reasonably reliable, a short time schedule and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Extreme Programming

e) Extreme Programming

Which is NOT a type of database file? a) Hierarchical databases b) Relational databases c) Object databases d) Multidimensional databases e) Federal database

e) Federal database

Processes from logical DFDs might show up on a physical data flow diagram as: a) Tables in a database b) External entities c) Outside the human-machine boundary d) Audit log files e) HTML screens or Visual Basic forms

e) HTML screens or Visual Basic forms

9. Myles is studying a system to lessen the number of complaints about the Help Desk. He has formally studied the service counter at Wal-Mart, Target and Kohl's department stores, as well as listened in to complaint phone calls to a hotel booking site. He is trying to see how other organizations work at lessening complaints and also how they handle complaints. This would be what type of analysis? a) Complaint processing b) Design analysis c) Problem analysis d) Outcome analysis e) Informal benchmarking

e) Informal benchmarking

3. Which is NOT true about using Visible Analyst Workbench? a) It can be used with many different databases b) It integrates the data model with other parts of the project c) It is a full-service CASE tool d) Data modeling is one of many capabilities e) It can generate Java code when the data modeling is done

e) It can generate Java code when the data modeling is done

12. Which is generally NOT true for interface evaluations? a) It is iterative b) It almost always identifies improvements c) It generally involves users working with analysts d) It is cyclic e) It is built on ERDs

e) It is built on ERDs

21. Black-box testing: a) Is reserved for special circumstances in which the tester wants to review the actual program code b) Is reserved for NASA space missions c) Is reserved for very complex systems d) Is only used by highly skilled testers e) None of these

e) None of these

During the implementation phase of the SDLC: a) Analysts will write programs b) Programmers will develop user interfaces c) Project managers will convert logical ERDs into physical DFDs d) Champions will do the data management design e) None of these

e) None of these

14. A technique where the analyst watches how people perform their activities is _______ a) Document Analysis b) Interviews c) Joint Application Development (JAD) sessions d) Questionnaires / surveys e) Observation

e) Observation

33. Which of the following is NOT a classic planning mistake? a) Overly optimistic schedule b) Failing to monitor the schedule c) Failing to update the schedule d) Adding people to a late project e) Omitting key requirements

e) Omitting key requirements

A major credit card company has an hour of system downtime on the Friday after Thanksgiving (generally one of the biggest shopping days of the year). Which might be a good estimate of the amount of income lost from this outage? a) Under $50,000 b) From $50,000 to $99,999 c) From $100,000 to $249,999 d) From $250,000 to $500,000 e) Over $500,000

e) Over $500,000

23. Rafael, Fraud Unit Manager, has just received an interview report from Stefano, a systems analyst. Rafael was interviewed by Stefano, and was asked to make corrections and clarifications to the interview report. In what interview phase would this occur? a) Selecting interviewees b) Designing interview questions c) Preparing for the interview d) Conducting the interview e) Post-interview follow-up

e) Post-interview follow-up

10. Which of the following project roles would serve as a primary point of contact for a project? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Project manager

e) Project manager

29. Marta wants to collect facts and opinions from a wide range of geographically dispersed people quickly and with the least expense. She would probably want to use: a) Document analysis b) Interview c) JAD session d) Observation e) Questionnaires

e) Questionnaires

30. Blaine is using a requirements gathering technique that begins with non-threatening questions, avoids abbreviations, groups items into logically coherent sections, and might best be used with outside users. He probably is using: a) Document analysis b) Interview c) JAD session d) Observation e) Questionnaires

e) Questionnaires

6. RAD is an acronym for: a) Real Application Development b) Rapid Application Design c) Rapid Authentic Development d) Real Autonomous Development e) Rapid Application Development

e) Rapid Application Development

Omar is creating an order database for a multiple site car dealership. The data will be fairly simple: names, addresses, city, state, zip code, make of car, model, style, color, etc. Probably the best choice for him would be a _____________ database. a) Multidimensional b) Hierarchical c) Legacy d) Object e) Relational

e) Relational

New databases collectively referred to as NoSQL databases have appeared in recent years. Which of the following are categorized as a NoSQL database? a) Document-oriented database b) Wide column stores c) Graph databases d) Extensible record stores e) Relational Database system

e) Relational Database system

9. Which of the following project roles would focus on stakeholder requirements? a) Systems analyst b) Business analyst c) Infrastructure analyst d) Change management analyst e) Requirements analyst

e) Requirements analyst

The acronym for the standard language used to access data in relational databases is: a) ERD b) CRM c) ERP d) BPR e) SQL

e) SQL

6. Which is NOT an attribute of a systems analyst? a) Understanding what to change b) Knowing how to change it c) Convincing others of the need to change d) Serving as a change agent e) Selecting which projects to approve

e) Selecting which projects to approve

6. Which is generally NOT true of non-functional requirements? a) Cultural differences can be considered b) Color interpretations on screens and forms may be different in different geographical places c) Multi-lingual interfaces many be needed d) Systems may need to adapt from global solutions to local realities e) Systems may need to have actual expenses from global operations

e) Systems may need to have actual expenses from global operations

This particular type of documentation control lists the information in a logical form, as though the users were to read the reference documentation from start to finish: a) Index b) Text search c) Content sensitive help d) Intelligence agents e) Table of contents

e) Table of contents

23. Which of the following would BEST describe "system reliability"? a) The aspect of using technologies that analysts and developers are familiar with b) The aspect of what the business side really wants the system to do c) The aspect of how quickly the system can be developed and implemented d) The aspect of how complex the system must be e) The aspect of how accurate the system must be (such as medical equipment or for games)

e) The aspect of how accurate the system must be (such as medical equipment or for games)

4. Which would generally NOT be taken into consideration for project portfolio management in an organization? a) The number of large projects b) The number of tactical projects c) The number of high risk projects d) The number of strategic projects e) The number of financially feasible projects

e) The number of financially feasible projects

5. Which is NOT true for systems analysts? a) They create value for an organization b) They enable the organization to perform work better c) They do things and challenge the current way that an organization works d) They play a key role in information systems development projects e) They are the project sponsors for system proposals

e) They are the project sponsors for system proposals

27. Which of the following is true about a JAD facilitator? a) They can participate in the discussion to settle a disagreement b) They keep track of all discussions by entering information into the computer c) They allow sidebar discussions and unstructured activities d) They recognize that some people know more about the system and proposed system and will dominate the discussion and know that is a positive thing e) They set the meeting agenda

e) They set the meeting agenda

14. Which of the following methodologies might be most appropriate if you have a system project with unclear user requirements, unfamiliar technologies, somewhat complex, needs to be reliable, time is not an issue and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

e) Throwaway prototyping

19. Which of the following methodologies might be most appropriate if you have a system project with: unclear user requirements, unfamiliar technologies, very complex, must be reliable, a short to medium time schedule and the schedule visibility is somewhat important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) Throwaway prototyping

e) Throwaway prototyping

7. Which is NOT a requirements analysis strategy? a) Understanding of the as-is system b) Identifying improvements c) Developing requirements for the to-be system d) Root cause analysis e) Understanding of screen design, layout and navigation

e) Understanding of screen design, layout and navigation

Systems that support decision making will probably: a) Do a lot of updating of data b) Be transaction processing systems c) Be audit files d) Use Gantt charts e) Usually just read data - and often in ad hoc ways

e) Usually just read data - and often in ad hoc ways

16. Which of the following methodologies might be most appropriate if you have a system project with: clear requirements, very familiar technologies, not all that complex, must be reliable, a somewhat longer schedule and the schedule visibility is not important? a) Waterfall b) Parallel c) Iterative d) System prototyping e) V-model

e) V-model

27. Which is not a common data type? a) Character b) Text c) Integer d) Date e) Video

e) Video

31. There are many types of reports, they include: a) Summary reports b) Exception reports c) Turnaround documents d) graphs e) all of these are outputs

e) all of these are outputs

2. The line between analysis and design is sometimes very blurry. One reason is that _____: a) Object-oriented methods are generally fuzzier as compared to waterfall methods b) there is inadequate funding for the analysis phase to do a complete analysis c) analysts are generally rushed to complete the system proposal d) scope creep has occurred e) the deliverables are really the first step in the design of the new system

e) the deliverables are really the first step in the design of the new system

The fourth step in creating a physical DFD (data flow diagram) is a) update the metadata in the CASE repository b) draw a human-machine boundary c) add implementation references d) add system-related data stores, data flows, and processes e) update the data elements in the data flows

e) update the data elements in the data flows

10. Mobile application architectures are where the: a. Client devise is responsible for presentation logic b. Client devise is responsible for application logic c. The server is responsible for data access logic d. The server stores the data e. All of these

e. All of these

13. Which of the following is an advantage of client-server architectures? a. They are scalable b. They can support different types of systems c. It is easy to separate different logic functions d. Reliability e. All of these

e. All of these

6. The primary hardware components of a system consist of: a. Client Computers b. Servers c. Network d. Client Computers and Servers e. Client Computers, Servers and Network

e. Client Computers, Servers and Network

1. Designing an architecture can be_______________. a. Tedious and therefore younger members of the team are usually urged to take the lead. b. Easy and therefore more experienced members of the department take the lead. c. Difficult and therefore outside consultants are often sourced to do the task. d. Difficult and therefore experienced internal members are sourced to the task e. Difficult and therefore outside consultants are often sourced to do the task and difficult and therefore experienced internal members are sourced to the task

e. Difficult and therefore outside consultants are often sourced to do the task and difficult and therefore experienced internal members are sourced to the task

16. What is/are the disadvantage(s) associated with n-tiered architecture? a. Great load on the network b. When the clients capture keystrokes and the very first architecture system c. They are always slower d. When the clients capture keystrokes and the very first architecture system and they are always slower e. Great load on the network and when the clients capture keystrokes and the very first architecture system

e. Great load on the network and when the clients capture keystrokes and the very first architecture system

3. The major architectural components of any system are the___________. a. IT Department b. Hardware c. Software d. IT Department and Hardware e. Hardware and Software

e. Hardware and Software

4. Where are the decisions stored that are made regarding the hardware and software that will be purchased to support the new system? a. Order Manifest b. Hardware Sales Receipt c. Suppliers' Computer System d. President's Office e. Hardware and Software Specification

e. Hardware and Software Specification

7. Servers can take on what "flavors"? a. Mainframes b. Minicomputers c. Microcomputers d. Mainframes and Minicomputers e. Mainframes, Minicomputers and Microcomputers

e. Mainframes, Minicomputers and Microcomputers

43. A critical success factor for project management is to start with a realistic assessment of the work that needs to be accomplished.

true

58. Scope creep is when new requirements are added to the project after the original project scope was defined and 'frozen'.

true

70. Either systems prototyping or throwaway prototyping are generally a good methodology choice when the project has unclear user requirements.

true

61. The actor of a use case refers to only a person that interacts with the system?

False

58. The final step in Building Use Cases is to use a CASE analysis tool to verify that the inputs and outputs are discrete items triggered by external events.

False

62. The event that causes the use case to begin is referred to as the Name?

False

63. Triggers are referred to as external or internal?

False

64. It is common practice to create smaller, more focused use cases breaking the whole process down into parts.

True

36. The normal order of processes would be: requirements gathering, use case development, process modeling (data flow diagrams).

True

36. Use cases sometimes are called 'business scenarios'.

True

51. Use cases will have inputs and outputs.

True

54. Dr. O'Brien's dental office calls a patient three days before an appointment. This could be an example of a temporal trigger.

True

55. Tina is a systems analysis and is describing how a system should react to an event. She is creating a use case.

True

59. Use cases can vary from one organization to another in terms of the content included?

True

60. Use cases can vary from one organization to another in terms of the degree of formality employed?

True

18. Special cases (like customer cancels an appointment or returns an item) are: ____________ a) Frequently overlooked by users b) Described on special 'exception' use cases c) Not of importance at this stage d) Written as exceptions at the bottom of the relevant use case e) Given use case ID's of "SC" (for special case) and a number

a) Frequently overlooked by users

10. The relationship between use cases and data flow diagrams is: a) Use cases tend to be developed with users to make sure the analyst has fully captured the processes and relationships DFD's are built upon the use cases to more fully formally understand the processes involved b) Both are tools in a systems analysts toolbox, although they do unrelated things c) Use cases are developed by users exclusively while DFD's are developed by analysts exclusively d) Use cases come out of JAD sessions and clarify what was discussed by users in those sessions DFD's come out of analysts interviews. e) They are the same thing - use cases are process models using the DeMarco and Yourdon notation and DFD's are process models using the Gane and Sarson notation.

a) Use cases tend to be developed with users to make sure the analyst has fully captured the processes and relationships DFD's are built upon the use cases to more fully formally understand the processes involved

34. Which of the following would be a 'black hole' error on a DFD? a) A process has no input b) A process has no output c) A process has four inputs and only three outputs d) Data moves directly from a data store from an external entity e) Two processes send data flows to the same data store

b) A process has no output

25. A data flow is: a) An activity of a function that is performed for some specific business reason b) A single piece of data within a system c) A collection of data within a system d) A person, organization or system that is external to the system e) A combination of function and the data it acts upon

b) A single piece of data within a system

10. Austin is a systems analyst. Which of the follow people might be the most valuable to him in developing a use case for an accounts payable system upgrade? a) Beth, a software vendor for Peachtree Accounting Software b) Amy, a team manager in the accounts payable department c) Lisa, the project manager for the project d) Casey, a fellow analyst who is more experienced in making use cases e) Bill, a Java programmer in the applications development area.

b) Amy, a team manager in the accounts payable department

23. As a last step in building a use case for the study-abroad registration system, Brianna will: a) Ask Patrick in the study abroad office to confirm the use case b) Ask Wendy in the registrar's office to confirm the use case c) Ask Jonathan, a student who just completed a study-abroad experience, to confirm the use case d) Ask Drew in the students affairs office to confirm the use case e) Ask Taylor, another systems analyst to confirm the use case

b) Ask Wendy in the registrar's office to confirm the use case

29. Decomposing a DFD means: a) Balancing the processes so that each process has three and only three sub-processes b) Breaking complex processes into a structured set of detailed diagrams c) Doing a walk through on the entire DFD structure with all the analysts on the project team d) Taking lower levels of process refinement and aggregating them into a major system e) Making sure that all data stores are shown on each child DFD diagram

b) Breaking complex processes into a structured set of detailed diagrams

28. Which of the following is NOT correct? a) Every set of DFD's must have one context diagram b) Every process is wholly and completely described by the processes on its children DFD's c) Every process must be broken down farther on Level 1 and Level 2 diagrams d) Every data store has at least one input data flow someplace in the entire DFD system e) Every process has a unique name that is an action oriented verb phrase

c) Every process must be broken down farther on Level 1 and Level 2 diagrams

16. A payroll data flow diagram has a data-store called Accumulated Salary Data. At one stage in the DFD, a process "Calculate YTD-Taxes" gets data from that data store, updates it in the process, and writes it back out. The diagram should show: a) A single line with arrows on both ends labeled YTD Payroll Details b) A dashed line with arrows on both ends labeled YTD Payroll Details c) A line out of the data store labeled: Current YTD Payroll Details and a line into the data store labeled Updated YTD Payroll Details d) Two separate data flow lines but each with the same name YTD Payroll Details e) Two dashed lines but each with the same name of YTD Payroll Details

c) A line out of the data store labeled: Current YTD Payroll Details and a line into the data store labeled Updated YTD Payroll Details

27. When developing the Major Inputs and Major Outputs for a use case, the analyst and users should consider: a) Only the common inputs and outputs b) Developing separate use cases for every possible input and every possible output c) All possible inputs and outputs (even with rare occurrences) d) What triggers these inputs and outputs e) Using activity elimination to see if these inputs and outputs are really needed

c) All possible inputs and outputs (even with rare occurrences)

32. Which would be the normal order of tasks? a) Requirements gathering, creating DFDs, creating use cases b) Creating use cases, creating DFD, holding JAD sessions c) Interviewing and/or JAD sessions, creating use cases, creating data flow diagrams d) Doing BPR, analyzing documents, creating DFDs, creating use cases e) Doing activity elimination, doing use cases, doing DFDs

c) Interviewing and/or JAD sessions, creating use cases, creating data flow diagrams

21. What diagram will have processes with one decimal place (like 3.1, 3.2, and 3.3) and might have flows coming in (or going out) that are not illustrated? a) Context diagram b) Level 0 diagram c) Level 1 diagram d) UML state diagram e) Level 0 diagram

c) Level 1 diagram

13. Destination would be described on a use case in which of the following areas?: a) Trigger b) Major inputs c) Major outputs d) Primary actor e) Importance level

c) Major outputs

26. Carlos has a Level 0 DFD diagram where one of the external entities is the "Internal Revenue Service" - and he has a data store called "Tax Rate Table". He has drawn a data flow arrow from the Internal Revenue Service to the data store as the data has been loaded into the Tax Rate Table prior to the processing. What would be true? a) This is correct b) This is incorrect, 'data at rest stays at rest until moved by a process' so he needs a process (like 'load Tax Rate Table') first in this system c) This is incorrect - he doesn't need a data flow as the data was loaded into the Tax Rate Table someplace else (within the payroll system someplace, but not in this process) d) This is almost correct. The correct diagram would be a dashed line indicating that the loading of the data was implied prior to the start of this process e) This is incorrect. What should happen is an 'external process' should be called at the start of the process - like "Call IRS for data load"

c) This is incorrect - he doesn't need a data flow as the data was loaded into the Tax Rate Table someplace else (within the payroll system someplace, but not in this process)

31. Data flow diagrams are: a) Usually created by users and reviewed by analysts b) Usually jointly created by analysts and users c) Usually created by the project team and reviewed by users for correctness d) Usually created by the project champion and reviewed by the project team e) Usually created by business analyst and reviewed by the infrastructure analyst

c) Usually created by the project team and reviewed by users for correctness

27. Amy has created a context diagram. What one DFD component is probably not shown? a) Process b) Data flow c) UML Stage d) Data store e) External Entity

d) Data store

11. Barb is an analyst developing a use case. Which of the following will probably NOT be on her use case? a) Importance level b) Short Description c) Information for steps d) Destination for the major inputs e) Type of trigger

d) Destination for the major inputs

6. Which of the following is probably NOT a step for writing a use case? a) Identify the use case b) Identify the major steps within each use case c) Identify elements within steps d) Identify the analyst e) Confirm the use case

d) Identify the analyst

1. Which is probably NOT true about building use cases? a) Analysts are involved b) Users are involved c) Major processes are analyzed d) Major costs are analyzed e) External or internal triggers are analyzed

d) Major costs are analyzed

9. Use cases are used to more fully delineate _____. a) Resources used in the system b) System boundaries c) System proposals d) System requirements e) Data flows

d) System requirements

23. The context diagram shows: a) Detailed processing logic b) All major processes c) All the data stores in the system d) The "big picture" of the system with external entities and only one process e) The system in context with all other systems in that department (for example, accounts payable, accounts receivable, etc.)

d) The "big picture" of the system with external entities and only one process

2. Which is NOT true of use cases? a) They are formal ways of representing how a business system interacts with its environment b) They illustrates the activities that are performed by the users of the system c) They can be thought of as an external or functional view of a business process d) They illustrate what starts (or triggers) an event, all the people that are involved, and how the system provides value e) They sometimes are called 'business scenarios' (although 'use case' is generally preferred)

d) They illustrate what starts (or triggers) an event, all the people that are involved, and how the system provides value

9. Brianna has a process has two inputs but only one output. a) This is an error as there needs to be the same amount of inputs as outputs b) This is an error as process do not have inputs or outputs c) This is normal as all processes have two inputs and one output d) This is normal as all processes need at least one input and at least one output e) This is an error as processes only produce output

d) This is normal as all processes need at least one input and at least one output

15. Ralph wants to illustrate how a system interacts with the environment. The best solution for him would be to use a ________: a) Requirements flow chart b) Storyboard c) HIPO chart (hierarchy, input, process, output) d) Use case e) Gantt chart

d) Use case

1. A process model is: a) The output of the interviewing process b) The work plan c) The model that is produced by extreme prototyping d) The expanded and thoroughly balanced use case for a system e) A formal way of representing how a business system operates

e) A formal way of representing how a business system operates

8. An external entity is: a) An activity or a function that is performed for some specific business reason b) A single piece of data c) A collection of data d) A trigger to a use case e) A person, organization or system outside of the system

e) A person, organization or system outside of the system

31. Some organizations may choose to include additional sections on their use case forms, these may include: a) Frequency of use b) Assumptions c) Notes and issues d) None of these e) All of these

e) All of these

20. Use cases generally have three parts: _____. a) Basic information, details, and event-driven modeling b) Inputs and outputs, and events c) Details, event-driven modeling, basic information d) Technical feasibility, economic feasibility and organizational feasibility e) Basic information, inputs and outputs, and details

e) Basic information, inputs and outputs, and details

26. The Major Steps Performed section on a use case will give the _________ a) Name of the user for each step b) What triggers each step c) Where the processes will run (such as manual processes, client-server processes, etc.) d) The telecommunications infrastructure requirements for that step e) Information for each step

e) Information for each step

22. What diagram will have sub-processes with numbers like 3.3.1, 3.3.2, 3.3.3 (etc.) and also have flows coming in (or going out) that are not illustrated? a) Context diagram b) Level 0 diagram c) Gantt diagram d) Level 1 diagram e) Level 2 diagram

e) Level 2 diagram

18. Mark has a data store called 'Items' and it includes all the items sold in a convenience store - sorted by UPC code with the retail price of the item. He has only one data flow called 'Item Details' that flows from the data store to the Process Checkout process. What will be true in this case? a) This is incorrect as every data store must have both inputs and outputs b) This is incorrect as every process must have both inputs and outputs c) This is incorrect as the data flow should have a verb phrase like 'Get Item Details' d) This is incorrect as there is no way to update the 'Items' data store e) This is correct

e) This is correct

30. Which is NOT true of use cases? a) They contain all the information needed to build one part of a process model b) Each use case has a name, a number, importance level, brief description, primary actor, trigger, major inputs and outputs, and a list of major steps c) Use cases can be identified by reviewing the functional requirements d) Use cases should be confirmed by users e) Use cases normally contain ten to twelve major steps

e) Use cases normally contain ten to twelve major steps

32. Which is NOT true of use cases? a) They contain all the information needed to build one part of a process model b) Each use case has a name, a number, importance level, brief description, primary actor, trigger, major inputs and outputs, and a list of major steps c) Use cases can be identified by reviewing the functional requirements d) Use cases should be confirmed by users e) Use cases normally contain ten to twelve major steps

e) Use cases normally contain ten to twelve major steps


Related study sets

MODULE 7: Chapter 12 - Pay for Performance & Financial Incentives

View Set

Chapter 3: Life Insurance Policies

View Set

Corporate Finance - Ch. 11 FINAL

View Set

Industrial Revolution / Guilded Age

View Set