Top Banner
Questi on 1 1 out of 1 points System requirements serve as benchmarks to measure the overall acceptability of a finished system. Selected Answer: Tru e Correct Answer: Tru e Quest ion 2 1 out of 1 points New business support systems that produced valuable information, in addition to performing manual tasks, were called management information systems (MIS) because managers were the primary users. Selected Answer: Tru e Correct Answer: Tru e Quest ion 3 1 out of 1 points A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization. Selected Answer: Fal se Correct Answer: Fal se Quest ion 4 1 out of 1 points ____ is a typical example of a system requirement for the input category. Selected Student grades must be entered on
311
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 53842535-CTS285-Final (1)

 Question 1

1 out of 1 points

System requirements serve as benchmarks to measure the overall acceptability of a finished system.

Selected Answer: True

Correct Answer: True

  Question 2

1 out of 1 points

New business support systems that produced valuable information, in addition to performing manual tasks, were called management information systems (MIS) because managers were the primary users.

Selected Answer: True

Correct Answer: True

  Question 3

1 out of 1 points

A strategic plan that stresses technology tends to create an unfavorable climate for IT projects that extends throughout an organization.

Selected Answer: False

Correct Answer: False

  Question 4

1 out of 1 points

____ is a typical example of a system requirement for the input category.

Selected Answer:

   Student grades must be entered on machine-scannable forms prepared by the instructor

Correct Answer:

   Student grades must be entered on machine-scannable forms prepared by the instructor

  Question 5

1 out of 1 points

____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

Selected Answer:    Customer relationship management (CRM)

Correct Answer:    Customer relationship management (CRM)

  Question 6

1 out of 1 points

Page 2: 53842535-CTS285-Final (1)

Examples of tangible benefits include all of the following except a(n) ____.

Selected Answer:

   user-friendly system that improves employee job satisfaction

Correct Answer:    user-friendly system that improves employee job satisfaction

  Question 7

1 out of 1 points

In a sequence diagram, the interaction proceeds from left to right along horizontal arrows, while a vertical timeline represents messages from one object to another.

Selected Answer: False

Correct Answer: False

  Question 8

1 out of 1 points

Internal factors that affect IT systems projects include all of the following except ____.

Selected Answer:    the economy

Correct Answer:    the economy

  Question 9

1 out of 1 points

A vertical system is a system, such as an inventory or payroll application, that can be adapted for use in many different companies.

Selected Answer: False

Correct Answer: False

  Question 10

1 out of 1 points

____ is a typical example of a system requirement for the output category.

Selected Answer:

   The contact management system must generate a daily reminder list for all sales reps

Correct Answer:

   The contact management system must generate a daily reminder list for all sales reps

  Question 11

1 out of 1 points

When evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

Page 3: 53842535-CTS285-Final (1)

Selected Answer:

   one person’s bias is more likely to affect the decisions

Correct Answer:    one person’s bias is more likely to affect the decisions

  Question 12

1 out of 1 points

Supporters of neutral locations for interviews believe that it ____.

Selected Answer:

   keeps interruptions to a minimum so people can concentrate fully

Correct Answer:

   keeps interruptions to a minimum so people can concentrate fully

  Question 13

1 out of 1 points

A horizontal system is designed to meet the unique requirements of a specific business or industry, such as a Web-based retailer, a medical practice, or a video chain.

Selected Answer: False

Correct Answer: False

  Question 14

1 out of 1 points

All of the following are common reasons for systems requests except ____.

Selected Answer:    weaker controls

Correct Answer:    weaker controls

  Question 15

1 out of 1 points

The main objective of all RAD approaches is to extend development time and expense by excluding users from every phase of systems development.

Selected Answer: False

Correct Answer: False

  Question 16

1 out of 1 points

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Page 4: 53842535-CTS285-Final (1)

Selected Answer:    enterprise applications

Correct Answer:    enterprise applications

  Question 17

1 out of 1 points

Product-oriented companies primarily offer information or services or sell goods produced by others.

Selected Answer: False

Correct Answer: False

  Question 18

1 out of 1 points

A systems request might propose enhancements for an existing system, the correction of problems, or the development of an entirely new information system.

Selected Answer: True

Correct Answer: True

  Question 19

1 out of 1 points

Knowledge management systems are called expert systems because they ____.

Selected Answer:

   simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

Correct Answer:

   simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

  Question 20

1 out of 1 points

When preparing a checklist of specific tasks to observe and questions to ask, a systems analyst should consider ____.

Selected Answer:    all of the above

Correct Answer:    all of the above

  Question 21

1 out of 1 points

A systems request form should not ____.

Selected Answer:    have complex instructions

Correct Answer:    have complex instructions

Page 5: 53842535-CTS285-Final (1)

  Question 22

1 out of 1 points

In an information system, information consists of basic facts that are the system’s raw material.

Selected Answer: False

Correct Answer: False

  Question 23

1 out of 1 points

In a typical company organizational model, middle managers ____.

Selected Answer:

   provide direction, necessary resources, and performance feedback to supervisors and team leaders

Correct Answer:

   provide direction, necessary resources, and performance feedback to supervisors and team leaders

  Question 24

1 out of 1 points

Each activity within the systems analysis phase has an end product and one or more milestones.

Selected Answer: True

Correct Answer: True

  Question 25

1 out of 1 points

Performance limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

Selected Answer: True

Correct Answer: True

  Question 26

1 out of 1 points

____ is a typical example of a system requirement for the performance category.

Selected Answer:

   The student records system must produce class lists within five hours after the end of registration

Correct Answer:

   The student records system must produce class lists within five hours after the end of registration

  Question 27

1 out of 1 points

Page 6: 53842535-CTS285-Final (1)

In launching a new information system, the greatest risk occurs when a company ____.

Selected Answer:

   tries to decide how the system will be implemented before determining what the system is supposed to do

Correct Answer:

   tries to decide how the system will be implemented before determining what the system is supposed to do

  Question 28

1 out of 1 points

Traditionally, the SDLC is pictured as a(n) ____, like that shown in the

Page 7: 53842535-CTS285-Final (1)

accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

Selected Answer:    waterfall model

Correct Answer:    waterfall model

  Question 29

1 out of 1 points

When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

Selected Answer:    legacy systems

Correct Answer:    legacy systems

  Question 30

1 out of 1 points

In many large companies, applications called enterprise resource planning (ERP) systems provide cost-effective support for users and managers throughout the company.

Selected Answer: True

Correct Answer: True

  Question 31

1 out of 1 points

In an information system, data is information that has been transformed into output that is valuable to users.

Selected Answer: False

Correct Answer: False

  Question 32

1 out of 1 points

Page 8: 53842535-CTS285-Final (1)

Of the measures of feasibility in the accompanying figure, ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?”

Selected Answer:    operational feasibility

Correct Answer:    operational feasibility

  Question 33

1 out of 1 points

A mission-critical system is one that is unimportant to a company’s operations.

Page 9: 53842535-CTS285-Final (1)

Selected Answer: False

Correct Answer: False

  Question 34

1 out of 1 points

To evaluate ____, a systems analyst needs information about projected future volume for all outputs, inputs, and processes.

Selected Answer:    scalability

Correct Answer:    scalability

  Question 35

1 out of 1 points

Greater user involvement in the system development process usually results in poorer communication, slower development times, and less satisfied users.

Selected Answer: False

Correct Answer: False

  Question 36

1 out of 1 points

Examples of intangible benefits include all of the following except a(n) ____.

Selected Answer:

   online package tracking system that decreases the need for clerical staff

Correct Answer:

   online package tracking system that decreases the need for clerical staff

  Question 37

1 out of 1 points

The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

Selected Answer:    systems analysis

Correct Answer:    systems analysis

  Question 38

1 out of 1 points

In object-oriented programming, an object is a member of a(n) ____, which is a collection of similar objects.

Selected Answer:    class

Page 10: 53842535-CTS285-Final (1)

Correct Answer:    class

  Question 39

1 out of 1 points

Creating an FDD is different from drawing an organization chart — systems analysts start at the bottom and work their way up.

Selected Answer: False

Correct Answer: False

  Question 40

1 out of 1 points

Systems requests seldom are aimed at improving service to customers or users within a company.

Selected Answer: False

Correct Answer: False

  Question 41

1 out of 1 points

The primary advantage of RAD is that ____.

Selected Answer:

   systems can be developed more quickly with significant cost savings

Correct Answer:

   systems can be developed more quickly with significant cost savings

  Question 42

1 out of 1 points

TP systems are inefficient because they process a set of transaction-related commands individually rather than as a group.

Selected Answer: False

Correct Answer: False

  Question 43

1 out of 1 points

While RAD typically focuses only on fact-finding and requirements determination, JAD provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation.

Selected Answer: False

Correct Answer: False

Page 11: 53842535-CTS285-Final (1)

  Question 44

1 out of 1 points

____ is a traditional, time-tested, easy to understand systems development technique that uses a set of process models to describe a system graphically.

Selected Answer:    Structured analysis

Correct Answer:    Structured analysis

  Question 45

1 out of 1 points

A risk of RAD is that a system might work well in the short term, but the corporate and long-term objectives for the system might not be met.

Selected Answer: True

Correct Answer: True

  Question 46

1 out of 1 points

____ is an example of a discretionary project.

Selected Answer:    Creating a new report for a user

Correct Answer:    Creating a new report for a user

  Question 47

1 out of 1 points

A(n) ____ describes the logic that programmers use to write code modules.

Selected Answer:    process model

Correct Answer:    process model

  Question 48

0 out of 1 points

In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.

Selected Answer:    closed-ended questions

Correct Answer:    range-of-response questions

  Question 49

1 out of 1 points

IBM claims that its WebSphere strategy is best for Web-based application development, while Microsoft counters with a broad vision called .NET that redefines that company’s approach to Web-based application

Page 12: 53842535-CTS285-Final (1)

development.

Selected Answer: True

Correct Answer: True

  Question 50

1 out of 1 points

Hardware-based security controls include passwords, various levels of user access, and coding data.

Selected Answer: False

Correct Answer: False

  Question 51

1 out of 1 points

A business process describes a specific set of transactions, events, tasks, and results.

Selected Answer: True

Correct Answer: True

  Question 52

1 out of 1 points

A ____, or requirements model, describes the information that a system must provide.

Selected Answer:    business model

Correct Answer:    business model

  Question 53

1 out of 1 points

Compared with traditional methods, the entire RAD process is expanded and, as a result, the new system is built, delivered, and placed in operation much later.

Selected Answer: False

Correct Answer: False

  Question 54

1 out of 1 points

As users rely more heavily on information systems to perform their jobs, they are likely to request even more IT services and support.

Selected Answer: True

Correct Answer: True

Page 13: 53842535-CTS285-Final (1)

  Question 55

1 out of 1 points

Today, systems development is much more team-oriented than in the past.

Selected Answer: True

Correct Answer: True

  Question 56

1 out of 1 points

Business support systems ____.

Selected Answer:

   provide job-related information support to users at all levels of a company

Correct Answer:

   provide job-related information support to users at all levels of a company

  Question 57

1 out of 1 points

When setting priorities for systems requests, the highest priority goes to projects that provide the ____.

Selected Answer:

   greatest benefit, at the lowest cost, in the shortest period of time

Correct Answer:

   greatest benefit, at the lowest cost, in the shortest period of time

  Question 58

1 out of 1 points

System requirements fall into five general categories: outputs, inputs, processes, performance, and controls.

Selected Answer: True

Correct Answer: True

  Question 59

1 out of 1 points

A SWOT analysis contributes to the strategic planning process by identifying ____ resources.

Selected Answer:    all of the above

Correct Answer:    all of the above

  Question 60

1 out of 1 points

Page 14: 53842535-CTS285-Final (1)

Although the business-to-business (B2B) sector is more familiar to retail customers, the volume of business-to-consumer (B2C) transactions is many times greater.

Selected Answer: False

Correct Answer: False

  Question 61

1 out of 1 points

IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

Selected Answer: True

Correct Answer: True

  Question 62

1 out of 1 points

Transaction processing (TP) systems ____.

Selected Answer:

   process data generated by day-to-day business operations

Correct Answer:    process data generated by day-to-day business operations

  Question 63

1 out of 1 points

Traditionally, a company either developed its own information systems, called in-house applications, or purchased systems called software packages from outside vendors.

Selected Answer: True

Correct Answer: True

  Question 64

1 out of 1 points

User productivity systems ____.

Selected Answer:

   include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

Correct Answer:

   include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-speed Internet access

Page 15: 53842535-CTS285-Final (1)

  Question 65

1 out of 1 points

System analysts use modeling and fact-finding interactively — first they build fact-finding results into models, then they study the models to determine whether additional fact-finding is needed.

Selected Answer: True

Correct Answer: True

  Question 66

1 out of 1 points

In a typical company organizational model, top managers ____.

Selected Answer:

   develop long-range plans, called strategic plans, that define the company’s overall mission and goals

Correct Answer:

   develop long-range plans, called strategic plans, that define the company’s overall mission and goals

  Question 67

1 out of 1 points

Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

Selected Answer:    FDD

Correct Answer:    FDD

  Question 68

1 out of 1 points

When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

Selected Answer:    business process reengineering (BPR)

Correct Answer:    business process reengineering (BPR)

  Question 69

1 out of 1 points

Compared with traditional methods, when properly used, JAD can result in all of the following except ____.

Selected Answer:

   less expense and greater manageability if the group is too large

Correct Answer:    less expense and greater manageability if the group is too large

Page 16: 53842535-CTS285-Final (1)

  Question 70

1 out of 1 points

In an interview, ____ limit or restrict the response.

Selected Answer:    closed-ended questions

Correct Answer:    closed-ended questions

  Question 71

1 out of 1 points

Because use cases depict a system through the eyes of a user, common business language can be used to describe the transactions.

Selected Answer: True

Correct Answer: True

  Question 72

1 out of 1 points

A company’s mission statement is unrelated to its major goals, shorter-term objectives, and day-to-day business operations.

Selected Answer: False

Correct Answer: False

  Question 73

1 out of 1 points

Strategic planning looks beyond day-to-day activities and focuses on a horizon that is 3, 5, or even 10 years in the future.

Selected Answer: True

Correct Answer: True

  Question 74

1 out of 1 points

____ are especially important to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively.

Selected Answer:    Interpersonal skills

Correct Answer:    Interpersonal skills

  Question 75

1 out of 1 points

Page 17: 53842535-CTS285-Final (1)

Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

Selected Answer:    economic feasibility

Correct Answer:    economic feasibility

  Question 76

1 out of 1 points

____ is a typical example of a system requirement for the process category.

Selected Answer:

   The video rental system must not execute new rental transactions for customers who have overdue tapes

Page 18: 53842535-CTS285-Final (1)

Correct Answer:

   The video rental system must not execute new rental transactions for customers who have overdue tapes

  Question 77

1 out of 1 points

Internal and external factors affect every business decision that a company makes, and IT systems are no exception.

Selected Answer: True

Correct Answer: True

  Question 78

1 out of 1 points

Because it is linked to a specific development methodology, systems developers use JAD whenever group input and interaction is not desired.

Selected Answer: False

Correct Answer: False

  Question 79

1 out of 1 points

External factors that affect IT systems projects include all of the following except ____.

Selected Answer:    managers

Correct Answer:    managers

  Question 80

1 out of 1 points

The purpose of a JIT (just-in-time) system is to provide the right product at the right place at the right time.

Selected Answer: True

Correct Answer: True

  Question 81

1 out of 1 points

Some industry experts predict that bar code technology will be overshadowed in the future by electronic product code (EPC) technology that uses RFID tags to identify and monitor the movement of each individual product.

Selected Answer: True

Correct Answer: True

  Question 1 out of 1 points

Page 19: 53842535-CTS285-Final (1)

82

____ is a typical example of a system requirement for the control category.

Selected Answer:

   The system must maintain separate levels of security for users and the system administrator

Correct Answer:

   The system must maintain separate levels of security for users and the system administrator

  Question 83

1 out of 1 points

Management leadership and information technology are unconnected, and no significant changes have occurred in either area.

Selected Answer: False

Correct Answer: False

  Question 84

1 out of 1 points

Page 20: 53842535-CTS285-Final (1)

Of the measures of feasibility in the accompanying figure, ____ considers points such as “Does the proposed platform have sufficient capacity for future needs?” and “Will the hardware and software environment be reliable?”

Selected Answer:    technical feasibility

Correct Answer:    technical feasibility

  Question 85

1 out of 1 points

____ software controls the flow of data, provides data security, and manages network operations.

Page 21: 53842535-CTS285-Final (1)

Selected Answer:    System

Correct Answer:    System

  Question 86

1 out of 1 points

Of the measures of feasibility in the accompanying figure, issues that relate to ____ include “Has management established a firm timetable for the project?” and “Will a project manager be appointed?”

Selected Answer:    schedule feasibility

Correct Answer:    schedule feasibility

  Question 87

1 out of 1 points

When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

Selected Answer:

   Will the proposed system decrease revenue for the company?

Correct Answer:    Will the proposed system decrease revenue for the company?

  Question 88

1 out of 1 points

Because of the limited range of input and interaction among participants, few companies believe that a JAD group produces the best definition of a new system.

Selected Answer: False

Correct Answer: False

  Question 89

1 out of 1 points

Application software manages hardware components, which can include a single workstation or a global network with many thousands of clients.

Selected Answer: False

Correct Answer: False

  Question 90

1 out of 1 points

System software consists of programs that support day-to-day business functions and provide users with the information they require.

Page 22: 53842535-CTS285-Final (1)

Selected Answer: False

Correct Answer: False

  Question 91

1 out of 1 points

The success or failure of an information system usually is unrelated to whether users are satisfied with the system’s output and operations.

Selected Answer: False

Correct Answer: False

  Question 92

1 out of 1 points

In an interview, ____ encourage spontaneous and unstructured responses.

Selected Answer:    open-ended questions

Correct Answer:    open-ended questions

  Question 93

1 out of 1 points

A system must have effective controls to ensure that data is secure and accurate.

Selected Answer: True

Correct Answer: True

  Question 94

1 out of 1 points

UML provides various graphical tools, such as use case diagrams and sequence diagrams.

Selected Answer: True

Correct Answer: True

  Question 95

1 out of 1 points

Service-oriented companies manufacture and sell products such as computers, routers, or microchips.

Selected Answer: False

Correct Answer: False

  Question 96

1 out of 1 points

Systems development typically starts with a ____.

Page 23: 53842535-CTS285-Final (1)

Selected Answer:

   systems request, followed by a preliminary investigation, which includes a feasibility study

Correct Answer:

   systems request, followed by a preliminary investigation, which includes a feasibility study

  Question 97

1 out of 1 points

A strong business case suggests that a company should pursue other options, above the alternative, because it would be in the firm’s best interest to do so.

Selected Answer: False

Correct Answer: False

  Question 98

1 out of 1 points

Much of the time a systems analyst spends talking with people is spent conducting ____, which is/are the most common fact-finding technique.

Selected Answer:    interviews

Correct Answer:    interviews

  Question 99

1 out of 1 points

Data entry controls should be excessive without being effective.

Selected Answer: False

Correct Answer: False

  Question 100 1 out of 1 points

RAD relies heavily on prototyping and user involvement.

Selected Answer: True

Correct Answer: True

 Question 1 1 out of 1 points

When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.

Correct Answer:    fixed fee model

  Question 2

1 out of 1 points

Page 24: 53842535-CTS285-Final (1)

The Software & Information Industry Association and many software industry leaders, including Microsoft, believe that the concept of ____ is redefining the way that companies develop and deploy their information systems.

Correct Answer:

   software as a service

  Question 3

1 out of 1 points

In a DFD, the Gane and Sarson symbol for an entity is a ____.

Correct Answer:

   rectangle, which may be shaded to make it look three-dimensional

  Question 4

1 out of 1 points

Another term for IBS is managed hosting, because the operation is managed by the outside firm, or host.

Correct Answer:

True

  Question 5

1 out of 1 points

A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.

Correct Answer:

   request for proposal (RFP)

  Question 6

1 out of 1 points

All of the following are true of Web-based development except ____.

Correct Answer:

   Internet-based development treats the Web as a communication channel, rather than as the platform

  Question 7

1 out of 1 points

An object treats data and processes separately.

Page 25: 53842535-CTS285-Final (1)

Correct Answer: False

  Question 8

1 out of 1 points

In a DFD, the Gane and Sarson symbol for a process is a ____.

Correct Answer:

   rectangle with rounded corners

  Question 9

1 out of 1 points

A gray hole process is a process that has ____.

Correct Answer:

   at least one input and one output, but the input obviously is too insufficient to generate the output shown

  Question 10

1 out of 1 points

All of the following are true of a traditional systems development environment except ____.

Correct Answer:

   scalability is not affected by telecommunications limitations and local networks

  Question 11

1 out of 1 points

When DFDs are drawn, each of the following conventions should be followed except ____.

Correct Answer:    use the same names within each set of symbols

  Question 12

1 out of 1 points

Which of the following is NOT an attribute of a car?

Correct Answer:

   parking

  Question 13

1 out of 1 points

Two Web-based development environments are IBM’s WebSphere and Microsoft’s .NET.

Page 26: 53842535-CTS285-Final (1)

Correct Answer:

True

  Question 14

1 out of 1 points

Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.

Correct Answer:    read-only properties

  Question 15

1 out of 1 points

Building an application in a Web-based environment might involve different risks and benefits, compared to a traditional environment.

Correct Answer:

True

  Question 16

1 out of 1 points

Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

Correct Answer:

   exploded view

  Question 17

1 out of 1 points

____ is a widely used method of visualizing and documenting an information system.

Correct Answer:

   UML

  Question 18

1 out of 1 points

A logical model describes how a system will be constructed.

Correct Answer: False

  Question 19

1 out of 1 points

Page 27: 53842535-CTS285-Final (1)

In a DFD, a process symbol can have only one outgoing data flow.

Correct Answer: False

  Question 20

1 out of 1 points

In a DFD, a data flow must have a process symbol on at least one end.

Correct Answer:

True

  Question 21

1 out of 1 points

Typically, customers purchase licenses that give them the right to use the software under the terms of the license agreement.

Correct Answer:

True

  Question 22

1 out of 1 points

When companies use a ____, they already know the specific products or service they want and need to obtain price quotations or bids from vendors.

Correct Answer:

   request for quotation (RFQ)

  Question 23

1 out of 1 points

Mergers and acquisitions typically have no impact on clients and customers of large, financially healthy firms.

Correct Answer: False

  Question 24

1 out of 1 points

A gas pump is an example of a black box.

Page 28: 53842535-CTS285-Final (1)

Correct Answer:

True

  Question 25

1 out of 1 points

An IBS (Internet business services) solution is attractive to customers because it offers online data center support, mainframe computing power for mission-critical functions, and universal access via the Internet.

Correct Answer:

True

  Question 26

1 out of 1 points

Your car performs a(n) ____ called operate wipers when you send a message by moving the proper control.

Correct Answer:    method

  Question 27

1 out of 1 points

A company considering outsourcing must realize that the solution can be only as good as the outsourcing firm that provides the service.

Correct Answer:

True

  Question 28

1 out of 1 points

A black hole process is a process that has ____.

Correct Answer:    no output

  Question 29

1 out of 1 points

In a use case, an external entity is called a(n) ____.

Correct Answer:    actor

  Question 1 out of 1 points

Page 29: 53842535-CTS285-Final (1)

30

Leveling ____.

Correct Answer:

   uses a series of increasingly detailed DFDs to describe an information system

  Question 31

1 out of 1 points

In a DFD, the Gane and Sarson symbol for a data store is a ____.

Correct Answer:

   flat rectangle that is open on the right side and closed on the left side

  Question 32

1 out of 1 points

Several years ago, Gartner, a leading IT research and consulting firm, accurately forecast the enormous growth of offshore outsourcing.

Correct Answer:

True

  Question 33

1 out of 1 points

A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects.

Correct Answer:

True

  Question 34

1 out of 1 points

An auto parts store inventory ____ might include part number, description, supplier code, minimum and maximum stock levels, cost, and list price.

Correct Answer:    record

  Question 35

1 out of 1 points

All of the following are true of Web-based development except ____.

Correct    Web-based software treats the software as a service that is

Page 30: 53842535-CTS285-Final (1)

Answer: more dependent on desktop computing powers and resources

  Question 36

1 out of 1 points

Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable, business solution that fits the company’s long-term business strategy.

Correct Answer:

True

  Question 37

0 out of 1 points

Many valuable reports can be obtained from a data dictionary, including a(n) ____.

Correct Answer:

   all of the above

  Question 38

1 out of 1 points

In a DFD, the Gane and Sarson symbol for a data flow is a ____.

Correct Answer:    line with a single or double arrowhead

  Question 39

1 out of 1 points

Microsoft’s ____ is one of the major Web-based development environments.

Correct Answer:    .NET

  Question 40

1 out of 1 points

A data flow in a DFD represents one or more data items.

Correct Answer:

True

  Question 41

1 out of 1 points

Page 31: 53842535-CTS285-Final (1)

The number of attributes needed to describe an object depends on the business requirements of the information system and its users.

Correct Answer:

True

  Question 42

1 out of 1 points

An object’s ____ are the tasks or functions the object performs.

Correct Answer:

   methods

  Question 43

1 out of 1 points

A major advantage of outsourcing is that it eliminates employee concerns about job security.

Correct Answer: False

  Question 44

1 out of 1 points

The UML symbol for a use case is a(n) ____ with a label that describes the action or event.

Correct Answer:

   oval

  Question 45

1 out of 1 points

Using Gane and Sarson symbols, a DFD represents processes as circles.

Correct Answer: False

  Question 46

1 out of 1 points

A black box does not want or need outside interference.

Page 32: 53842535-CTS285-Final (1)

Correct Answer:

True

  Question 47

1 out of 1 points

The Software & Information Industry Association (SIIA) believes that the acquisition of software as a service rather than a product will have a major impact on the software industry.

Correct Answer:

True

  Question 48

1 out of 1 points

Two data stores can be connected by a data flow without an intervening process.

Correct Answer: False

  Question 49

1 out of 1 points

Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.

Correct Answer: False

  Question 50

1 out of 1 points

A class can belong to a more general category called a subclass.

Correct Answer: False

  Question 51

1 out of 1 points

The concept that a message gives different meanings to different objects is called encapsulation.

Correct Answer: False

Page 33: 53842535-CTS285-Final (1)

  Question 52

1 out of 1 points

Oracle Corporation offers a service called ____, which provides E-business applications on a fixed fee basis.

Correct Answer:    Oracle On Demand

  Question 53

1 out of 1 points

Balancing ____.

Correct Answer:

   ensures that the input and output data flows of the parent DFD are maintained on the child DFD

  Question 54

1 out of 1 points

In data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

Correct Answer:    logical

  Question 55

1 out of 1 points

The UML represents an object as a(n) ____ with the object name at the top, followed by the object’s attributes and methods.

Correct Answer:

   rectangle

  Question 56

1 out of 1 points

When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.

Correct Answer:    subscription model

  Question 57

1 out of 1 points

All relationships have equal weight; none is stronger than any other.

Correct Answer: False

  Question 0 out of 1 points

Page 34: 53842535-CTS285-Final (1)

58

A method is like a blueprint, or template, for all the objects within a class.

Correct Answer: False

  Question 59

1 out of 1 points

A DFD shows the structure and detailed contents of a data flow.

Correct Answer: False

  Question 60

1 out of 1 points

In a traditional systems development environment, security issues usually are less complex than with Web-based systems, because the system operates on a private telecommunications network, rather than the Internet.

Correct Answer:

True

  Question 61

1 out of 1 points

System analysts define an object’s attributes during the systems design process.

Correct Answer:

True

  Question 62

1 out of 1 points

An ASP provides a license to use the software, and nothing more.

Correct Answer: False

  Question 63

1 out of 1 points

A(n) ____ defines specific tasks that an object can perform.

Page 35: 53842535-CTS285-Final (1)

Correct Answer:    method

  Question 64

0 out of 1 points

The same message to two different objects produces the same results.

Correct Answer: False

  Question 65

1 out of 1 points

A software package developed to handle information requirements for a specific type of business is called a horizontal application.

Correct Answer: False

  Question 66

1 out of 1 points

Spontaneous generation, black holes, and gray holes are logically impossible in a DFD because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow.

Correct Answer:

True

  Question 67

1 out of 1 points

A use case ____ documents the name of the use case, the actor, a description of the use case, a step-by-step list of the tasks and actions required for successful completion, a description of alternative courses of action, preconditions, postconditions, and assumptions.

Correct Answer:    description

  Question 68

1 out of 1 points

Data flows are shown in a context diagram because data stores are external to the system.

Page 36: 53842535-CTS285-Final (1)

Correct Answer: False

  Question 69

1 out of 1 points

A software package that can be used by many different types of organizations is called a vertical application.

Correct Answer: False

  Question 70

1 out of 1 points

Internet-based development treats the Web as just a communications channel, rather than as a platform.

Correct Answer: False

  Question 71

1 out of 1 points

A DFD does not show the external entities that provide data to the system or receive output from the system.

Correct Answer: False

  Question 72

1 out of 1 points

The ____ uses a set of symbols to represent graphically the various components and relationships within a system.

Correct Answer:

   UML

  Question 73

1 out of 1 points

Late in the systems design phase, you build a logical model that describes how a system will be constructed.

Page 37: 53842535-CTS285-Final (1)

Correct Answer: False

  Question 74

1 out of 1 points

The main reason for offshore outsourcing is the same as domestic outsourcing: lower bottom-line costs.

Correct Answer:

True

  Question 75

1 out of 1 points

By limiting access to internal processes, an object prevents its internal code from being altered by another object or process.

Correct Answer:

True

  Question 76

1 out of 1 points

Systems analysts call an entity that supplies data to the system a sink, and an entity that receives data from the system a source.

Correct Answer: False

  Question 77

1 out of 1 points

Typically, companies choose in-house software development for all of the following reasons except to ____.

Correct Answer:

   obtain input from other companies who already have implemented the software

  Question 78

1 out of 1 points

Which of the following is not a path that development can follow?

Correct Answer:

   construct a legacy system

  Question 1 out of 1 points

Page 38: 53842535-CTS285-Final (1)

79

DFD symbols are referenced by using all ____ letters for the symbol name.

Correct Answer:    capital

  Question 80

1 out of 1 points

The data dictionary usually records and describes a default value, which is the ____.

Correct Answer:

   value for the data element if a value otherwise is not entered for it

  Question 81

1 out of 1 points

Leveling also is called ____.

Correct Answer:

   all of the above

  Question 82

1 out of 1 points

The line from the actor to a use case is called a(n) ____.

Correct Answer:    association

  Question 83

1 out of 1 points

If objects are similar to adjectives that describe the characteristics of an object, attributes are similar to nouns.

Correct Answer: False

  Question 84

1 out of 1 points

Customer objects can perform specific tasks, such as placing an order, or paying a bill.

Correct Answer:

True

  Question 1 out of 1 points

Page 39: 53842535-CTS285-Final (1)

85

A DFD does not show the detailed contents of a data store — the specific structure and data elements are defined in the data dictionary.

Correct Answer:

True

  Question 86

1 out of 1 points

A use case ____ is a visual summary of several related use cases within a system or subsystem.

Correct Answer:    diagram

  Question 87

0 out of 1 points

Advantages of purchasing a software package over developing software in-house include all of the following except ____.

Correct Answer:

   satisfaction of unique business requirements

  Question 88

1 out of 1 points

Inheritance enables an object to derive one or more of its attributes from a(n) ____.

Correct Answer:

   parent

  Question 89

0 out of 1 points

Buyers can customize a software package by ____.

Correct Answer:

   all of the above

  Question 90

1 out of 1 points

Your red Mustang is a(n) ____ of the CAR class.

Correct Answer:    instance

Page 40: 53842535-CTS285-Final (1)

  Question 91

1 out of 1 points

Objects can have a specific attribute called a(n) ____, which describes the object’s current status.

Correct Answer:

   state

  Question 92

1 out of 1 points

A physical model shows what the system must do, regardless of how it will be implemented.

Correct Answer: False

  Question 93

1 out of 1 points

In a DFD, processes contain the business logic, also called business rules, that transform the data and produce the required results.

Correct Answer:

True

  Question 94

1 out of 1 points

Outsourcing can refer to ____.

Correct Answer:

   all of the above

  Question 95

1 out of 1 points

A data flow diagram (DFD) shows how the system transforms input data into useful information.

Correct Answer:

True

  Question 96

1 out of 1 points

Page 41: 53842535-CTS285-Final (1)

When you create a use case diagram, the first step is to identify the system boundary, which is represented by a ____.

Correct Answer:

   rectangle

  Question 97

1 out of 1 points

Some objects might have a few attributes; others might have dozens.

Correct Answer:

True

  Question 98

1 out of 1 points

A set of DFDs provides a logical model that shows how the system works, not what the system does.

Correct Answer: False

  Question 99

0 out of 1 points

A spontaneous generation process is a process that has ____.

Correct Answer:

   no input

  Question 100

1 out of 1 points

An object has certain ____.

Correct Answer:    attributes

Question 1

1 out of 1 points

Problems found with 1NF (first normal form) design that do not exist in 2NF (second normal form) include all of the following except ____.

Correct Answer:    1NF tables always contain consistent data

Page 42: 53842535-CTS285-Final (1)

  Question 2

1 out of 1 points

When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dynamic e-commerce environment.

Correct Answer:    greater initial investment but provides more flexibility

  Question 3

1 out of 1 points

An existence check is a data validation check that ____.

Correct Answer:

   is used for mandatory data items

  Question 4

1 out of 1 points

Exception reports are useful when the user needs to know the details, but does not want information only on records that might require action.

Correct Answer: False

  Question 5

0 out of 1 points

In a typical file processing environment, ____ problems can occur if updates are not applied in every file.

Correct Answer:

   data integrity

  Question 6

1 out of 1 points

In a table or file, each column represents a record, which is an individual instance, or occurrence of an entity, and each row represents a field, or characteristic of the entity.

Correct Answer: False

  Question 7

1 out of 1 points

A combination check is a data validation check that ____.

Page 43: 53842535-CTS285-Final (1)

Correct Answer:

   is performed on two or more fields to ensure that they are consistent or reasonable when considered together

  Question 8

1 out of 1 points

In a detail report, each line of output printed is called a detail line.

Correct Answer:

True

  Question 9

1 out of 1 points

Web pages are stored on a Web server, which is a computer that receives requests and makes Web pages available to users.

Correct Answer:

True

  Question 10

1 out of 1 points

Online processing systems typically have all of the following characteristics except ____.

Correct Answer:

   the system requires significantly fewer network resources than batch systems

  Question 11

1 out of 1 points

A ____ is a text document written in HTML.

Correct Answer:

   Web page

  Question 12

0 out of 1 points

A table is in first normal form (1NF) if it contains a repeating group.

Correct Answer: False

  Question 1 out of 1 points

Page 44: 53842535-CTS285-Final (1)

13

Relational databases are poorly suited to client/server computing because they are so powerless and rigid.

Correct Answer: False

  Question 14

1 out of 1 points

____ is the measure of a system’s ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.

Correct Answer:

   Scalability

  Question 15

1 out of 1 points

Today, client/server architecture is the dominant form of systems design, using Internet protocols and traditional network models.

Correct Answer:

True

  Question 16

1 out of 1 points

A disadvantage of server-based processing is that character-based terminals typically are used, which provide a limited interface for users.

Correct Answer:

True

  Question 17

1 out of 1 points

In a file-oriented information system, a security file ____.

Correct Answer:    is created and saved for backup and recovery purposes

  Question 18

1 out of 1 points

In the OSI (open system interconnection) model, the application layer ____.

Page 45: 53842535-CTS285-Final (1)

Correct Answer:

   provides network services requested by a local workstation

  Question 19

1 out of 1 points

To design data entry screens that are easy to learn and use, employ all of the following guidelines except ____.

Correct Answer:

   require users to type leading zeroes for numeric fields

  Question 20

1 out of 1 points

Generally, reports used by individuals at higher levels in an organization include more detail than reports used by lower-level employees.

Correct Answer: False

  Question 21

1 out of 1 points

A popular rule of thumb is that a design is in 3NF if every nonkey field depends on the key, the whole key, and nothing but the key.

Correct Answer:

True

  Question 22

1 out of 1 points

A batch processing system has all of the following characteristics except ____.

Correct Answer:

   the information system is available whenever necessary to support business operations

  Question 23

1 out of 1 points

In contrast to a centralized system, a client/server design separates applications and data.

Correct Answer:

True

Page 46: 53842535-CTS285-Final (1)

  Question 24

1 out of 1 points

Impact printers can use multi-part forms to produce more than one copy, which is an advantage to firms that require several copies of the same report.

Correct Answer:

True

  Question 25

1 out of 1 points

In a client/server design, a database server ____.

Correct Answer:    processes individual SQL commands

  Question 26

1 out of 1 points

In a Web-based database design, the Internet serves as the front end, or interface, for the database management system.

Correct Answer:

True

  Question 27

1 out of 1 points

In the OSI (open system interconnection) model, the presentation layer ____.

Correct Answer:

   assures that data is uniformly structured and formatted for network transmission

  Question 28

1 out of 1 points

Podcasts are especially important for legal reasons, or where it is necessary to display a signature, date stamp, or other visual features of a document.

Correct Answer: False

  Question 29

1 out of 1 points

In a file-oriented information system, a transaction file ____.

Page 47: 53842535-CTS285-Final (1)

Correct Answer:

   stores records that contain day-to-day business and operational data

  Question 30

1 out of 1 points

A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

Correct Answer:    query language

  Question 31

1 out of 1 points

For upper-level managers who often want to see total figures and do not need supporting details, a(n) ____ is appropriate.

Correct Answer:

   summary report

  Question 32

1 out of 1 points

In a file-oriented information system, a history file contains reference data used by the information system.

Correct Answer: False

  Question 33

1 out of 1 points

An entity is a person, place, thing, or event for which data is collected and maintained.

Correct Answer:

True

  Question 34

1 out of 1 points

A client is a computer that supplies data, processing services, or other support to one or more computers, called servers.

Correct Answer: False

Page 48: 53842535-CTS285-Final (1)

  Question 35

1 out of 1 points

The Internet has had little impact on system architecture.

Correct Answer: False

  Question 36

1 out of 1 points

In e-commerce, data mining works best when a goal is to reduce clicks to close, which means average page views to accomplish a purchase or obtain desired information.

Correct Answer:

True

  Question 37

1 out of 1 points

According to a usability expert at IBM, a computer user has the right to ____.

Correct Answer:

   all of the above

  Question 38

1 out of 1 points

A reasonableness check is a data validation check that ____.

Correct Answer:

   identifies values that are questionable, but not necessarily wrong

  Question 39

1 out of 1 points

A range check is a data validation check that ____.

Correct Answer:

   tests data items to verify that they fall between a specified minimum and maximum value

  Question 40

1 out of 1 points

A system design where the server performs all the processing is described as ____.

Page 49: 53842535-CTS285-Final (1)

Correct Answer:    mainframe architecture

  Question 41

1 out of 1 points

In a typical LAN, clients share data stored on a local server that supports a group of users or a department.

Correct Answer:

True

  Question 42

1 out of 1 points

Intranets and extranets are called Web-centric because they use different protocols, or data transmission standards, than the Internet.

Correct Answer: False

  Question 43

1 out of 1 points

In a(n) ____ design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen.

Correct Answer:

   centralized

  Question 44

1 out of 1 points

One problem in a file processing environment is ____, which means that data common to two or more information systems is stored in several places.

Correct Answer:

   data redundancy

  Question 45

1 out of 1 points

Interface design should call attention to the interface, rather than facilitating design objectives.

Correct Answer: False

Page 50: 53842535-CTS285-Final (1)

  Question 46

1 out of 1 points

In today’s interconnected world, output from one system often becomes input into another system.

Correct Answer:

True

  Question 47

1 out of 1 points

When using Microsoft Office, documents, spreadsheets, and databases can be stored in Unicode-compatible form by using the font called ____.

Correct Answer:

   Arial Unicode MS

  Question 48

1 out of 1 points

Good interface design is based partly on ____, which focuses on how an interface can be made attractive and easy to use.

Correct Answer:    aesthetics

  Question 49

1 out of 1 points

A subschema is a view of a database used by one or more systems or users.

Correct Answer:

True

  Question 50

1 out of 1 points

Good user interface design is based partly on ____, which describes how people work, learn, and interact with computers.

Correct Answer:    ergonomics

  Question 51

1 out of 1 points

____ describes how instances of one entity relate to instances of another entity.

Page 51: 53842535-CTS285-Final (1)

Correct Answer:    Cardinality

  Question 52

1 out of 1 points

____ protects privacy rights and shields an organization’s proprietary data from theft or unauthorized access.

Correct Answer:

   Output security

  Question 53

1 out of 1 points

____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Correct Answer:

   Scalability

  Question 54

1 out of 1 points

Centering headings over maximum field widths is ideal when many of the actual values are shorter than the maximum width.

Correct Answer: False

  Question 55

1 out of 1 points

Middleware provides a transparent interface that enables system designers to integrate dissimilar software and hardware.

Correct Answer:

True

  Question 56

1 out of 1 points

The speed of laser printers is rated in ____, which can be used to estimate the time required to print a report.

Correct Answer:

   ppm (pages per minute)

  Question 0 out of 1 points

Page 52: 53842535-CTS285-Final (1)

57

As the size of a business changes, it is easier to alter the capability of a large-scale central server than it is to adjust the number of clients and the processing functions they perform.

Correct Answer: False

  Question 58

1 out of 1 points

A repeating group is a set of one or more fields that can occur only once in a single record, with each occurrence having the same value.

Correct Answer: False

  Question 59

1 out of 1 points

On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms.

Correct Answer:

   control zone

  Question 60

1 out of 1 points

Compared to file server designs, client/server systems ____.

Correct Answer:    reduce network loads and improve response times

  Question 61

1 out of 1 points

A report footer, which appears at the end of a report, can include grand totals for numeric fields and other end-of-report information.

Correct Answer:

True

  Question 62

1 out of 1 points

In a typical client/server system, the client stores the data and provides data access and database management functions.

Page 53: 53842535-CTS285-Final (1)

Correct Answer: False

  Question 63

1 out of 1 points

Apart from backup and recovery procedures necessary to sustain business operations ____ laws and regulations apply to company data.

Correct Answer:    file retention

  Question 64

1 out of 1 points

When considering physical design, a systems analyst must determine how a new application will communicate with existing legacy systems.

Correct Answer:

True

  Question 65

1 out of 1 points

After a report design is approved, the design should be documented in a ____, which contains information about the fields, data types and lengths, report frequency and distribution, and other comments.

Correct Answer:    report analysis form

  Question 66

1 out of 1 points

A fat client, also called a thick client, design locates all or most of the processing logic at the server.

Correct Answer: False

  Question 67

1 out of 1 points

Visio is an example of a CASE tool that can help users plan, analyze, design, and implement an information system.

Page 54: 53842535-CTS285-Final (1)

Correct Answer:

True

  Question 68

1 out of 1 points

A(n) ____ produces one or more lines of output for each record processed.

Correct Answer:

   detail report

  Question 69

1 out of 1 points

In a file-oriented information system, a work file ____.

Correct Answer:

   is a temporary file created by an information system for a single task

  Question 70

1 out of 1 points

The type of output and the technology needed usually is decided during the systems analysis phase, based on user requirements.

Correct Answer:

True

  Question 71

1 out of 1 points

A database system stores and manages data in separate files using a method called file processing.

Correct Answer: False

  Question 72

1 out of 1 points

When designing a report, a sample report, which is a ____, or prototype, should be prepared for users to review.

Correct Answer:    mock-up

  Question 73

1 out of 1 points

Page 55: 53842535-CTS285-Final (1)

A(n) ____ displays only those records that meet a specific condition or conditions.

Correct Answer:

   exception report

  Question 74

1 out of 1 points

In the OSI (open system interconnection) model, the session layer ____.

Correct Answer:

   defines control structures that manage the communications link between computers

  Question 75

0 out of 1 points

Either a page header or a page footer, which appears at the bottom of a page, is used to display the name of the report and a page number.

Correct Answer:

True

  Question 76

1 out of 1 points

A fat client design is ____ to develop than a thin client design, because the architecture resembles traditional file-server designs where all processing is performed at the client.

Correct Answer:

   simpler and less expensive

  Question 77

1 out of 1 points

A three-tier design includes a middle layer between the client and server that processes the client requests and translates them into data access commands that can be understood and carried out by the server.

Correct Answer:

True

  Question 78

1 out of 1 points

Page 56: 53842535-CTS285-Final (1)

The ____ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.

Correct Answer:    System Environment

  Question 79

1 out of 1 points

When a system produces multiple reports, each report should have completely different design elements.

Correct Answer: False

  Question 80

1 out of 1 points

In a report, a group header can be printed after the last detail line in a group and a group footer above the first detail line.

Correct Answer: False

  Question 81

1 out of 1 points

In a file-oriented information system, a master file ____.

Correct Answer:    stores relatively permanent data about an entity

  Question 82

1 out of 1 points

A report header, which appears at the beginning of a report, identifies the report, and contains the report title, date, and other necessary information.

Correct Answer:

True

  Question 83

1 out of 1 points

In a client/server design, tasks are divided between servers, which are workstations that users interact with, and clients, which are computers that supply data, processing, and services to the server workstations.

Page 57: 53842535-CTS285-Final (1)

Correct Answer: False

  Question 84

1 out of 1 points

When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.

Correct Answer:

   buffer

  Question 85

1 out of 1 points

An extranet is a private, company-owned network to provide Web-based access to users.

Correct Answer: False

  Question 86

1 out of 1 points

Specific DBMS (database management system) advantages include all of the following except ____.

Correct Answer:    data dependence

  Question 87

1 out of 1 points

Although stand-alone PCs improved employee productivity and allowed users to perform tasks that previously required IT department assistance, stand-alone computing was inefficient and expensive.

Correct Answer:

True

  Question 88

0 out of 1 points

Physical storage refers to information as seen through a user’s eyes, regardless of how or where the information actually is organized or stored.

Page 58: 53842535-CTS285-Final (1)

Correct Answer: False

  Question 89

1 out of 1 points

Using a DDBMS (distributed database management system) offers all of the following advantages except ____.

Correct Answer:

   the architecture of the system is simple and easy to manage

  Question 90

1 out of 1 points

File sharing designs are efficient only if the number of networked users is ____.

Correct Answer:    low and the transmitted file sizes are relatively small

  Question 91

1 out of 1 points

Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.

Correct Answer:

   storyboard

  Question 92

1 out of 1 points

HTML uses formatting codes called ____, which specify how the text and visual elements on a Web page will be displayed in a Web browser.

Correct Answer:

   tags

  Question 93

1 out of 1 points

A Web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.

Correct Answer: False

  Question 94

1 out of 1 points

A dialog box allows a user to enter information about a task that the system will perform.

Page 59: 53842535-CTS285-Final (1)

Correct Answer:

True

  Question 95

1 out of 1 points

In a client/server interaction, the client submits a request for information from the server, which carries out the operations and responds to the client.

Correct Answer:

True

  Question 96

1 out of 1 points

Every information system involves ____.

Correct Answer:

   all of the above

  Question 97

1 out of 1 points

Scalability is especially important in implementing systems that are volume-related, such as transaction processing systems.

Correct Answer:

True

  Question 98

1 out of 1 points

User-selected Help always offers assistance for the task in progress.

Correct Answer: False

  Question 99

1 out of 1 points

In most organizations, the IT department is responsible for output control and security measures.

Page 60: 53842535-CTS285-Final (1)

Correct Answer:

True

  Question 100

1 out of 1 points

In older systems, often the user interface mainly consisted of process-control screens that allowed a user to send commands to the system.

Correct Answer:

True

systems planning phase In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.

business model A ____, or requirements model, describes the information that a system must provide.

enterprise applications Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Modeling ____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

O-O Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.

process-centered Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.

waterfall model Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

object-oriented analysisThe ____ method of developing systems produces code that is modular and reusable.

SDLC Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.

provide direction, necessary resources, and performance feedback to supervisors and team leadersIn a typical company organizational model, middle managers ____.

Page 61: 53842535-CTS285-Final (1)

adaptive The ____ method of developing systems stresses team interaction and reflects a set of community-based values.

tries to decide how the system will be implemented before determining what the system is supposed to do In launching a new information system, the greatest risk occurs when a company ____.

systems support and security In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.

methods In object-oriented design, built-in processes called ____ can change an object's properties.

business process reengineering (BPR) When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

business process modeling Systems analysts use a process called ____ to represent a company's operations and information needs.

Legacy systems When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

24 months Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-seed Internet access User productivity systems ____.

False In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships.

False Because they focus on a longer time frame, middle managers need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations.

True A corporate culture is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

True In the systems analysis phase, the first step is requirements modeling, where business processes are investigated and what the new system must do is documented.

structured analysis Roark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.

It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly showing itself to be incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client

Page 62: 53842535-CTS285-Final (1)

will throw them a curveball and want to make changes late in the game — but that they also will be unwilling to absorb the costs of those changes. For this reason, Roark eliminates which of the following methods of development?

agile/adaptive methods Roark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.

After Roark has spent a week getting to know the members of the team, including their strengths and weaknesses, and what has worked well (and not so well) for this particular team in the past, one theme keeps recurring: the team has particularly weak communications skills. Which of the following methods, then, is he least likely to use, given what he knows about the disadvantages of each method?

economic A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs.

have complex instructions A systems request form should not ____.

introduction In a preliminary investigation report, the ____ contain(s) a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.

user-friendly system that improves employee job satisfaction Examples of tangible benefits include all of the following except a(n) ____.

Customer relationship management (CRM) ____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

fishbone A popular technique for investigating causes and effects is called a(n) ____ diagram, which is an analysis tool that represents the possible causes of a problem as a graphical outline.

Strategic ____ planning is the process of identifying long-term organizational goals, strategies, and resources.

determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interview In sequence, the interviewing process involves a series of steps: ____, conduct the interview, document the interview, and evaluate the interview.

SWOT During strategic planning, top managers ask a series of questions that is called a(n) ____ analysis because it examines a company's strengths, weaknesses, opportunities, and threats.

conduct interviews The primary method of obtaining information during the preliminary investigation is to ____.

Will the proposed system decrease revenue for the company? When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

Page 63: 53842535-CTS285-Final (1)

one person's bias is more likely to affect the decisions When evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

define project scope as clearly as possible To avoid the problem of project creep, ____.

fishbone When using a ____ diagram to investigate causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.

discretionary Projects where management has a choice in implementing them are called ____ projects.

True Competition drives many information systems decisions.

False Even if users have difficulty with a new system, it still will produce the expected benefits.

False When interacting with users, a systems analyst should focus on difficulties instead of questioning users about additional capability they would like to have.

True Whenever possible, a systems analyst should evaluate a proposed project based on tangible costs and benefits that represent actual (or approximate) dollar values.

Sales reps requested a more powerful sales analysis report. As part of the annual report for the fiscal year just ended, Lara is working on a grid that summarizes the major decisions that the small business for which she works made during the year. As part of her review, she is identifying whether a decision was impacted by factors internal to the company, or external.

Which of the following does not appear on Lara's list of external factors?

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

TCO The estimated costs of a proposed system usually are considered the ____, which includes ongoing support and maintenance costs, as well as acquisition costs.

operational feasibility Of the measures of feasibility in the accompanying figure, ____ considers questions such as "Does management support the project?" and "Will the new system require training for users?"

Page 64: 53842535-CTS285-Final (1)

Creating a new report for a user____ is an example of a discretionary project.

preliminary A systems analyst conducts a(n) ____ investigation to study the systems request and recommend specific action.

economic feasibility Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

greatest benefit, at the lowest cost, in the shortest period of time When setting priorities for systems requests, the highest priority goes to projects that provide the ____.

technical A feasibility study includes tests for ____ feasibility, which refers to the practical resources needed to develop, purchase, install, or operate the system.

findingsIn the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the project's scope, constraints, and feasibility.

Performance ____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

scope Determining the project ____ means to define the boundaries, or extent, of a project — being as specific as possible.

False The purpose of an interview, and of the preliminary investigation itself, is to convince others that a project is justified, not to uncover facts.

False Data entry controls should be excessive without being effective.

True If only one person has the necessary IT skills and experience to evaluate systems requests, that person should consult closely with users and managers throughout the company to ensure that business and operational needs are considered carefully.

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

identify all tasksThe first step in creating a WBS is to ____.

risk A ____ is an event that could affect a project negatively.

Page 65: 53842535-CTS285-Final (1)

milestones When maintaining schedules, if enough ____ and frequent checkpoints exist, problems will be detected rapidly.

successor When two or more concurrent tasks depend on a single prior task, the concurrent tasks are called ____ tasks.

identify all the project tasks The first step in the creation of a PERT/CPM chart is to ____.

critical A ____ path includes all tasks that are vital to the project schedule.

completion with the same personnel as were on the team at the outset All of the following are metrics of a successful project EXCEPT ____.

critical Project managers always must be aware of the ____ path, so they can monitor the vital tasks and keep the project on track.

milestones In addition to tasks, every project has ____, which are reference points used to monitor progress and manage the project.

all of the above

task time estimates, sequences, personnel assignments A project manager must balance ____ to achieve a workable schedule; graphical planning aids like the one in the accompanying figure can help in the process.

includes identifying project tasks and estimating completion times and costs A project manager's planning _____.

includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target For a project manager, monitoring and controlling _____.

the team member most vulnerable to a given risk Most risk identifications include a brief description of all of the following EXCEPT ____.

all of the above

project size and scope, prior experience with similar projects or systems, IT resources In developing time and cost estimates, project managers must consider _____.

any of the above

personality conflicts among team members, turnover of project personnel, poor control methodsProblems with timetables and project milestones can indicate ____.

groups The accompanying figure shows task ____, which each might represent several activities that can be shown in a more detailed chart.

Page 66: 53842535-CTS285-Final (1)

inaccurate TCO forecast All of the following are possible causes of cost overruns related to human resource factors EXCEPT ____.

PERT/CPM Many project managers find ____ charts more helpful for scheduling, monitoring, and controlling projects.

defining project constraints Project scheduling involves all of the following EXCEPT ____.

True Most managers recognize that problems do occur on most projects; it is better to alert management sooner rather than later.

True System developers can initiate a formal project as early as the preliminary investigation stage, or later on, as analysis, design, and implementation activities occur.

True Project planning is a dynamic task and involves constant change.

False When tasks must be completed one after another, they are called concurrent tasks.

They are predecessor tasks of each other. In discussing PERT/CPM charts, you discuss the types of task patterns that can occur in a project schedule. You give an example of two tasks, A and B, that can both begin as soon as task C is finished. Which of the following is NOT a true statement about tasks A and B?

predecessor Two or more concurrent tasks often depend on a single prior task, which is called a(n) ____ task.

dependent task A _____ cannot be started until one or more other tasks are completed.

bottom-up PERT/CPM is called a(n) ____ technique, because it analyzes a large, complex project as a series of individual tasks.

concurrent When several tasks can start at the same time, each is called a ____ task.

involves staffing, which includes selecting the project team and assigning specific tasks to team members A project manager's scheduling function _____.

reference to successor tasks In a PERT/CPM chart, each task has all of the following EXCEPT a(n) ____.

response A risk ____ plan is a proactive effort to anticipate a risk and describe an action plan to deal with it.

False Using prior experience to make time and cost estimates works best for large projects.

False When two or more concurrent tasks depend on a single prior task, each of the concurrent tasks is called a predecessor task.

Page 67: 53842535-CTS285-Final (1)

True Although a Gantt chart provides more detailed information about a project, a PERT/CPM chart offers a rapid overview that graphically displays the timing, duration, and progress of each task.

histogram A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____.

use case diagram A(n) ____ is a UML technique that visually represents the interaction between users and an information system.

more satisfied users Greater user involvement in the system development process usually results in ____.

range-of-response questions In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.

actor In a use case diagram, the user becomes a(n) ____, with a specific role that describes how he or she interacts with a system.

Student grades must be entered on machine-scannable forms prepared by the instructor ____ is a typical example of a system requirement for the input category.

systematic sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select every tenth customer for review.

informal In a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.

stratified sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

random sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

The contact management system must generate a daily reminder list for all sales reps ____ is a typical example of a system requirement for the output category.

FDD Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

Analytical skills ____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution.

FDD A(n) ____ is a top-down representation of a function or a process.

Page 68: 53842535-CTS285-Final (1)

give the interviewee easy access to supporting material that might be needed If an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should do all of the following EXCEPT ____.

scrum In a(n) ____, team members prepare to lunge at each other to achieve their objectives.

systems analysis The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

both a and b

prototyping, user involvement RAD relies heavily on ____.

open-ended questions In an interview, ____ encourage spontaneous and unstructured responses.

True The ability to manage information is the mark of a successful systems analyst and an important skill for all IT professionals.

False When fact-finding, asking what is being done is the same as asking what could or should be done.

False In the early stages of systems analysis, interviews usually focus on specific topics, but as the fact-finding process continues, the interviews are more general.

True IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

control Perry has inherited an Excel sheet that lists all of the system requirements for his team's new project, but unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly—so he needs to take care of this so the requirements can be sorted correctly.

Perry has found one system requirement that he thinks could fit into a couple of different categories. What is the best categorization of this requirement: An employee record must be added, changed, or deleted only by a member of the human resources department?

questionnaire In projects where it is desirable to obtain input from a large number of people, a(n) ____, such as that shown in the accompanying figure, can be a valuable tool.

The student records system must produce class lists within five hours after the end of registration____ is a typical example of a system requirement for the performance category.

random sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

Page 69: 53842535-CTS285-Final (1)

UML The ____ is a widely used method of visualizing and documenting software systems design.

The system must maintain separate levels of security for users and the system administrator ____ is a typical example of a system requirement for the control category.

closed-ended questions In an interview, ____ limit or restrict the response.

informal In a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.

TCO In addition to direct costs, systems developers must identify and document indirect expenses that contribute to the ____.

stratified sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

False When designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics.

True The main objective of a sample is to ensure that it represents the overall population accurately.

True A list of topics should be sent to an interviewee several days before the meeting, especially when detailed information is needed, so the person can prepare for the interview and minimize the need for a follow-up meeting.

his own Kieran has finished compiling the list of the various members of the JAD group: He is the JAD project leader, Malia is the representative from top management, Simon is a manager, Alisa and Ian are users, Shakira and Max are systems analysts, and Devon is the recorder.

As Kieran develops the agenda he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of preparing the report that will be sent to JAD team members?

validity In a data dictionary, some data elements have ____ rules, such as an employee's salary must be within the range defined for the employee's job classification.

logical In data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

no output A black hole process is a process that has ____.

a process step that is repeated until a specific condition changes A black hole process is a process that has ____.

Page 70: 53842535-CTS285-Final (1)

tree A decision ____ is a graphical representation of the conditions, actions, and rules found in a decision table.

Leveling ____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.

All of the above

Spontaneous generation, Gray holes, Black holes ____ is/are logically impossible in a DFD because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow.

horizontal form that resembles a tree with the roots at the left and the branches to the rightDecision trees show the logic structure in a ____.

capital DFD symbols are referenced by using all ____ letters for the symbol name.

value for the data element if a value otherwise is not entered for it The data dictionary usually records and describes a default value, which is the ____.

records In a data dictionary, data elements are combined into ____, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

domain A data dictionary specifies a data element's ____, which is the set of values permitted for the data element.

field In a data dictionary, a(n) ____ is the smallest piece of data that has meaning within an information system.

rectangle with rounded corners In a DFD, the Gane and Sarson symbol for a process is a ____.

exploded view Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

alias In a data dictionary, any name other than the standard data element name is called a(n) ____.

ensures that the input and output data flows of the parent DFD are maintained on the child DFDBalancing ____.

line with a single or double arrowhead In a DFD, the Gane and Sarson symbol for a data flow is a ____.

False In most data dictionaries, records are defined together with the data flows and data stores.

False Two data stores can be connected by a data flow without an intervening process.

True In addition to describing each data element, data flow, data store, record, entity, and process, the data dictionary documents the relationships among these components.

Page 71: 53842535-CTS285-Final (1)

False In modular design, a rectangle represents a condition or decision, a diamond shape represents a step or a process, and the logic follows the lines in the direction indicated by the arrows.

Costs may be high. The analysts at Novel Systems Worldwide are considering the four-model approach to system development for a new client.

If they pursue the four-model approach, which of the following is a likely outcome?

A teleological model of the current system The analysts at Novel Systems Worldwide are considering the four-model approach to system development for a new client.

Which of the following will NOT be developed if they decide to use the four-model approach?

repository A data ____ is a central storehouse of information about a system's data.

line with a single or double arrowhead In a DFD, the Gane and Sarson symbol for a data flow is a ____.

one or more process steps based on the results of a test or condition The selection structure is the completion of ____

process descriptions If processes must be performed in a specific sequence, you document the information in the ____.

Balancing ____ maintains consistency among DFDs by ensuring that input and output data flows align properly.

context diagrams Typical process description tools include all of the following EXCEPT ____.

pseudocode Structured English might look familiar to programming students because it resembles ____, which is used in program design.

decision A(n) ____ table shows a logical structure, with all possible combinations of conditions and resulting actions.

rectangle, which may be shaded to make it look three-dimensional In a DFD, the Gane and Sarson symbol for an entity is a ____.

type In a data dictionary, ____ refers to whether the data element contains numeric, alphabetic, or character values.

True What makes one system more complex than another is the number of components, the number of levels, and the degree of interaction among its processes, entities, data stores, and data flows.

True In a DFD, a data flow must have a process symbol on at least one end.

Page 72: 53842535-CTS285-Final (1)

iteration Evan is an expert on all of the different kinds of process description tools, so when his colleagues have questions, they know where to turn.

One of the firm's beginner analysts is working on a financial process that will continue to print vendor payments until it reaches the end of the file. Which of the following processes will Evan suggest that the analyst use?

association The line from the actor to a use case is called a(n) ____.

oval The UML symbol for a use case is a(n) ____ with a label that describes the action or event.

message A ____ is a command that tells an object to perform a certain method.

diagram A use case ____ is a visual summary of several related use cases within a system or subsystem.

attributes An object has certain ____, which are characteristics that describe the object.

0..* The UML notation ____ identifies a zero or many relation.

object A(n) ____ represents a real person, place, event, or transaction.

Relationships ____ describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses.

instance Your red Mustang is a(n) ____ of the CAR class.

child Inheritance enables an object, called a ____, to derive one or more of its attributes from another object.

inherit In an object-oriented system, objects can ____ certain attributes from other objects.

class All objects within a(n) ____ share common attributes and methods.

Encapsulation ____ allows objects to be used as modular components anywhere in the system.

class An object belongs to a group or category called a(n) ____.

Relationships ____ enable objects to communicate and interact as they perform business functions and transactions required by the system.

methods An object's ____ are the tasks or functions the object performs.

actor In a use case, an external entity is called a(n) ____.

state The ____ of an object is an adjective that describes the object's current status.

Page 73: 53842535-CTS285-Final (1)

True A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects.

False An object treats data and processes separately.

False Use cases cannot interact with other use cases.

False Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.

True Class diagrams evolve into code modules, data objects, and other system components.

microwave oven Alex is getting a little confused by the terminology in the object-oriented world, so he consults his roommate, who has been doing a lot of work in object modeling in previous coursework.

Which of the following does Alex's roommate use as an example of an instance of the APPLIANCE class?

methods Alex is getting a little confused by the terminology in the object-oriented world, so he consults his roommate, who has been doing a lot of work in object modeling in previous coursework.

The following examples—bake cakes, self-clean, and reheat pasta—are all what with regard to the oven object, according to Alex's roommate?

Methods ____ resemble verbs that describe what and how an object does something.

methodYour car performs a(n) ____ called OPERATE WIPERS when you send a message by moving the proper control.

UML ____ is a widely used method of visualizing and documenting an information system.

actor In a use case, an external entity is called a(n) ____.

True By limiting access to internal processes, an object prevents its internal code from being altered by another object or process.

False The same message to two different objects produces the same results.

False An object treats data and processes separately.

True A gas pump is an example of a black box.

0..* Jaime, the newest analyst at Novel Systems Worldwide, is responsible for assigning the appropriate UML notations to a given class diagram.

Page 74: 53842535-CTS285-Final (1)

In a given diagram, Jaime is marking up a relationship in which a given employee can have no payroll deductions or she can have many deductions. Which of the following notations will Jaime write to mark this relationship?

ASP A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.

fixed fee model When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.

vendorsCompanies that develop software for sale are called software ____.

request for proposal (RFP) A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.

service A firm that offers outsourcing solutions is called a ____ provider.

transaction A(n) ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.

data duplication should be encouraged Guidelines to follow when determining data entry and storage considerations include all of the following except ____.

build or buy The choice between developing versus purchasing software often is called a ____ decision.

systems design The physical design is developed during the ____ phase of the SDLC.

4GL In a ____, the commands tend to resemble natural statements that people use.

middleware Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.

obtain input from other companies who already have implemented the software Typically, companies choose in-house software development for all of the following reasons except to ____.

parameter A ____ is a value that the user enters whenever a query is run, which provides flexibility, enables users to access information easily, and costs less.

default A ____ is a value that a system displays automatically.

satisfaction of unique business requirements Advantages of purchasing a software package over developing software in-house include all of the following except ____.

package A software ____ is software that is obtained from a vendor or application service provider.

Page 75: 53842535-CTS285-Final (1)

cloud Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology.

all of the above

negotiating directly with the software vendor to make enhancements to meet the buyer's needs by paying for the changes, purchasing a basic package that vendors will customize to suit the buyer's needs, purchasing the software and making their own modifications, if this is permissible under the terms of the software license Buyers can customize a software package by ____.

False The decision to develop software in-house will require less participation from the systems analyst than outsourcing or choosing a commercial package.

False A subscription model charges a variable fee based on the volume of transactions or operations performed by the application.

True Many firms feel that in-house IT resources and capabilities provide a competitive advantage because an in-house team can respond quickly when business problems or opportunities arise.

True Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable, business solution that fits the company's long-term business strategy.

True Software vendors regularly upgrade software packages by adding improvements and enhancements to create a new version or release.

design In an approach called ____ prototyping, systems analysts use prototyping to verify user requirements, after which the prototype is discarded and implementation continues.

benchmark A ____ measures the time a package takes to process a certain number of transactions.

interface In addition to configuring software, an IT staff can create a user ____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application.

Web-based Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment.

Prototyping ____, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system.

Outsourcing ____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.

read-only properties Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.

.NET Microsoft's ____ is one of the major Web-based development environments.

Page 76: 53842535-CTS285-Final (1)

True Building an application in a Web-based environment might involve different risks and benefits, compared to a traditional environment.

False A request for quotation (RFQ) is less specific than an RFP (request for proposal).

True By designing a system in-house, companies can develop and train an IT staff that understands the organization's business functions and information support needs.

True The primary objective of an evaluation and selection team is to eliminate system alternatives that will not work, rank the system alternatives that will work, and present the viable alternatives to management for a final decision.

Data duplication should be encouraged. Now that they have joined the firm, Priscilla is providing the junior analysts on the team with some real-world illustrations to explain some of the system design concepts that they have studied in their coursework, to solidify their understanding.

Which of the following is NOT a guideline Priscilla will impart to the new class of analysts?

When Marny is tasked with the job, her output can involve outright purchase or a variety of leasing options. You have started the process of selecting a new system for the firm and you are weighing all of the various issues that need to be considered and the resources you have at yourosal as you make this important decision.

As you prepare to winnow the field in your selection of a new system, you want a quick refresher on the difference between RFPs and RFQs. If you need an RFP, Simone will write it, and if you need an RFQ, Marny is responsible for writing that. Which of the following is true?

systems planning phaseIn the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.

business modelA ____, or requirements model, describes the information that a system must provide.

enterprise applications

Page 77: 53842535-CTS285-Final (1)

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Modeling____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

O-OWhereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.

process-centeredBecause it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.

waterfall modelTraditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

object-oriented analysisThe ____ method of developing systems produces code that is modular and reusable.

SDLCStructured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.

Page 78: 53842535-CTS285-Final (1)

provide direction, necessary resources, and performance feedback to supervisors and team leadersIn a typical company organizational model, middle managers ____.

adaptiveThe ____ method of developing systems stresses team interaction and reflects a set of community-based values.

tries to decide how the system will be implemented before determining what the system is supposed to doIn launching a new information system, the greatest risk occurs when a company ____.

systems support and securityIn the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.

methodsIn object-oriented design, built-in processes called ____ can change an object's properties.

business process reengineering (BPR)When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

business process modelingSystems analysts use a process called ____ to represent a company's operations and information needs.

Legacy systemsWhen planning an information system, a company must consider how a new

Page 79: 53842535-CTS285-Final (1)

system will interface with older systems, which are called ____.

24 monthsOver 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-seed Internet accessUser productivity systems ____.

FalseIn a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships.

FalseBecause they focus on a longer time frame, middle managers need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations.

TrueA corporate culture is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

TrueIn the systems analysis phase, the first step is requirements modeling, where business processes are investigated and what the new system must do is documented.

structured analysis

Page 80: 53842535-CTS285-Final (1)

Roark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly showing itself to be incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client will throw them a curveball and want to make changes late in the game — but that they also will be unwilling to absorb the costs of those changes. For this reason, Roark eliminates which of the following methods of development?

agile/adaptive methodsRoark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.After Roark has spent a week getting to know the members of the team, including their strengths and weaknesses, and what has worked well (and not so well) for this particular team in the past, one theme keeps recurring: the team has particularly weak communications skills. Which of the following methods, then, is he least likely to use, given what he knows about the disadvantages of each method?

economicA feasibility study includes tests for ____ feasibility, which means that the

Page 81: 53842535-CTS285-Final (1)

projected benefits of the proposed system outweigh the estimated costs.

have complex instructionsA systems request form should not ____.

introductionIn a preliminary investigation report, the ____ contain(s) a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.

user-friendly system that improves employee job satisfactionExamples of tangible benefits include all of the following except a(n) ____.

Customer relationship management (CRM)____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

fishboneA popular technique for investigating causes and effects is called a(n) ____ diagram, which is an analysis tool that represents the possible causes of a problem as a graphical outline.

Strategic____ planning is the process of identifying long-term organizational goals, strategies, and resources.

determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interviewIn sequence, the interviewing process involves a series of steps: ____, conduct

Page 82: 53842535-CTS285-Final (1)

the interview, document the interview, and evaluate the interview.

SWOTDuring strategic planning, top managers ask a series of questions that is called a(n) ____ analysis because it examines a company's strengths, weaknesses, opportunities, and threats.

conduct interviewsThe primary method of obtaining information during the preliminary investigation is to ____.

Will the proposed system decrease revenue for the company?When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

one person's bias is more likely to affect the decisionsWhen evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

define project scope as clearly as possibleTo avoid the problem of project creep, ____.

fishboneWhen using a ____ diagram to investigate causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.

discretionaryProjects where management has a choice in implementing them are called ____ projects.

Page 83: 53842535-CTS285-Final (1)

TrueCompetition drives many information systems decisions.

FalseEven if users have difficulty with a new system, it still will produce the expected benefits.

FalseWhen interacting with users, a systems analyst should focus on difficulties instead of questioning users about additional capability they would like to have.

TrueWhenever possible, a systems analyst should evaluate a proposed project based on tangible costs and benefits that represent actual (or approximate) dollar values.

Sales reps requested a more powerful sales analysis report.As part of the annual report for the fiscal year just ended, Lara is working on a grid that summarizes the major decisions that the small business for which she works made during the year. As part of her review, she is identifying whether a decision was impacted by factors internal to the company, or external.

Which of the following does not appear on Lara's list of external factors?

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Page 84: 53842535-CTS285-Final (1)

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

TCOThe estimated costs of a proposed system usually are considered the ____, which includes ongoing support and maintenance costs, as well as acquisition costs.

operational feasibilityOf the measures of feasibility in the accompanying figure, ____ considers questions such as "Does management support the project?" and "Will the new system require training for users?"

Creating a new report for a user____ is an example of a discretionary project.

preliminaryA systems analyst conducts a(n) ____ investigation to study the systems request and recommend specific action.

economic feasibilityOf the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

greatest benefit, at the lowest cost, in the shortest period of timeWhen setting priorities for systems requests, the highest priority goes to projects that provide the ____.

Page 85: 53842535-CTS285-Final (1)

technicalA feasibility study includes tests for ____ feasibility, which refers to the practical resources needed to develop, purchase, install, or operate the system.

findingsIn the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the project's scope, constraints, and feasibility.

Performance____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

scopeDetermining the project ____ means to define the boundaries, or extent, of a project — being as specific as possible.

FalseThe purpose of an interview, and of the preliminary investigation itself, is to convince others that a project is justified, not to uncover facts.

FalseData entry controls should be excessive without being effective.

TrueIf only one person has the necessary IT skills and experience to evaluate systems requests, that person should consult closely with users and managers throughout the company to ensure that business and operational needs are considered carefully.

Page 86: 53842535-CTS285-Final (1)

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

identify all tasksThe first step in creating a WBS is to ____.

riskA ____ is an event that could affect a project negatively.

milestonesWhen maintaining schedules, if enough ____ and frequent checkpoints exist, problems will be detected rapidly.

successorWhen two or more concurrent tasks depend on a single prior task, the concurrent tasks are called ____ tasks.

identify all the project tasksThe first step in the creation of a PERT/CPM chart is to ____.

criticalA ____ path includes all tasks that are vital to the project schedule.

completion with the same personnel as were on the team at the outsetAll of the following are metrics of a successful project EXCEPT ____.

Page 87: 53842535-CTS285-Final (1)

criticalProject managers always must be aware of the ____ path, so they can monitor the vital tasks and keep the project on track.

milestonesIn addition to tasks, every project has ____, which are reference points used to monitor progress and manage the project.

all of the abovetask time estimates, sequences, personnel assignmentsA project manager must balance ____ to achieve a workable schedule; graphical planning aids like the one in the accompanying figure can help in the process.

includes identifying project tasks and estimating completion times and costsA project manager's planning _____.

includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on targetFor a project manager, monitoring and controlling _____.

the team member most vulnerable to a given riskMost risk identifications include a brief description of all of the following EXCEPT ____.

all of the aboveproject size and scope, prior experience with similar projects or systems, IT resourcesIn developing time and cost estimates, project managers must consider _____.

Page 88: 53842535-CTS285-Final (1)

any of the abovepersonality conflicts among team members, turnover of project personnel, poor control methodsProblems with timetables and project milestones can indicate ____.

groupsThe accompanying figure shows task ____, which each might represent several activities that can be shown in a more detailed chart.

inaccurate TCO forecastAll of the following are possible causes of cost overruns related to human resource factors EXCEPT ____.

PERT/CPMMany project managers find ____ charts more helpful for scheduling, monitoring, and controlling projects.

defining project constraintsProject scheduling involves all of the following EXCEPT ____.

TrueMost managers recognize that problems do occur on most projects; it is better to alert management sooner rather than later.

TrueSystem developers can initiate a formal project as early as the preliminary investigation stage, or later on, as analysis, design, and implementation activities occur.

True

Page 89: 53842535-CTS285-Final (1)

Project planning is a dynamic task and involves constant change.

FalseWhen tasks must be completed one after another, they are called concurrent tasks.

They are predecessor tasks of each other.In discussing PERT/CPM charts, you discuss the types of task patterns that can occur in a project schedule. You give an example of two tasks, A and B, that can both begin as soon as task C is finished. Which of the following is NOT a true statement about tasks A and B?

predecessorTwo or more concurrent tasks often depend on a single prior task, which is called a(n) ____ task.

dependent taskA _____ cannot be started until one or more other tasks are completed.

bottom-upPERT/CPM is called a(n) ____ technique, because it analyzes a large, complex project as a series of individual tasks.

concurrentWhen several tasks can start at the same time, each is called a ____ task.

involves staffing, which includes selecting the project team and assigning specific tasks to team membersA project manager's scheduling function _____.

reference to successor tasksIn a PERT/CPM chart, each task has all of the following EXCEPT a(n) ____.

Page 90: 53842535-CTS285-Final (1)

responseA risk ____ plan is a proactive effort to anticipate a risk and describe an action plan to deal with it.

FalseUsing prior experience to make time and cost estimates works best for large projects.

FalseWhen two or more concurrent tasks depend on a single prior task, each of the concurrent tasks is called a predecessor task.

TrueAlthough a Gantt chart provides more detailed information about a project, a PERT/CPM chart offers a rapid overview that graphically displays the timing, duration, and progress of each task.

histogramA common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____.

use case diagramA(n) ____ is a UML technique that visually represents the interaction between users and an information system.

more satisfied usersGreater user involvement in the system development process usually results in ____.

range-of-response questionsIn an interview, ____ are questions that ask a person to evaluate something by

Page 91: 53842535-CTS285-Final (1)

providing limited answers to specific responses or on a numeric scale.

actorIn a use case diagram, the user becomes a(n) ____, with a specific role that describes how he or she interacts with a system.

Student grades must be entered on machine-scannable forms prepared by the instructor____ is a typical example of a system requirement for the input category.

systematic sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select every tenth customer for review.

informalIn a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.

stratified sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

random sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

Page 92: 53842535-CTS285-Final (1)

The contact management system must generate a daily reminder list for all sales reps____ is a typical example of a system requirement for the output category.

FDDUsing a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

Analytical skills____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution.

FDDA(n) ____ is a top-down representation of a function or a process.

give the interviewee easy access to supporting material that might be neededIf an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should do all of the following EXCEPT ____.

scrumIn a(n) ____, team members prepare to lunge at each other to achieve their objectives.

systems analysisThe ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

both a and bprototyping, user involvementRAD relies heavily on ____.

Page 93: 53842535-CTS285-Final (1)

open-ended questionsIn an interview, ____ encourage spontaneous and unstructured responses.

TrueThe ability to manage information is the mark of a successful systems analyst and an important skill for all IT professionals.

FalseWhen fact-finding, asking what is being done is the same as asking what could or should be done.

FalseIn the early stages of systems analysis, interviews usually focus on specific topics, but as the fact-finding process continues, the interviews are more general.

TrueIT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

controlPerry has inherited an Excel sheet that lists all of the system requirements for his team's new project, but unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly—so he needs to take care of this so the requirements can be sorted correctly.

Perry has found one system requirement that he thinks could fit into a couple of different categories. What is the best categorization of this requirement: An employee record must be added,

Page 94: 53842535-CTS285-Final (1)

changed, or deleted only by a member of the human resources department?

questionnaireIn projects where it is desirable to obtain input from a large number of people, a(n) ____, such as that shown in the accompanying figure, can be a valuable tool.

The student records system must produce class lists within five hours after the end of registration____ is a typical example of a system requirement for the performance category.

random sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

UMLThe ____ is a widely used method of visualizing and documenting software systems design.

The system must maintain separate levels of security for users and the system administrator____ is a typical example of a system requirement for the control category.

closed-ended questionsIn an interview, ____ limit or restrict the response.

informalIn a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or

Page 95: 53842535-CTS285-Final (1)

knowledge than appears on an organization chart.

TCOIn addition to direct costs, systems developers must identify and document indirect expenses that contribute to the ____.

stratified sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

FalseWhen designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics.

TrueThe main objective of a sample is to ensure that it represents the overall population accurately.

TrueA list of topics should be sent to an interviewee several days before the meeting, especially when detailed information is needed, so the person can prepare for the interview and minimize the need for a follow-up meeting.

his ownKieran has finished compiling the list of the various members of the JAD group: He is the JAD project leader, Malia is the representative from top management, Simon is a manager, Alisa and Ian are users, Shakira and Max are systems analysts, and Devon is the recorder.

Page 96: 53842535-CTS285-Final (1)

As Kieran develops the agenda he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of preparing the report that will be sent to JAD team members?

validityIn a data dictionary, some data elements have ____ rules, such as an employee's salary must be within the range defined for the employee's job classification.

logicalIn data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

no outputA black hole process is a process that has ____.

a process step that is repeated until a specific condition changesA black hole process is a process that has ____.

treeA decision ____ is a graphical representation of the conditions, actions, and rules found in a decision table.

Leveling____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.

All of the aboveSpontaneous generation, Gray holes, Black holes____ is/are logically impossible in a DFD because a process must act on input,

Page 97: 53842535-CTS285-Final (1)

shown by an incoming data flow, and produce output, represented by an outgoing data flow.

horizontal form that resembles a tree with the roots at the left and the branches to the rightDecision trees show the logic structure in a ____.

capitalDFD symbols are referenced by using all ____ letters for the symbol name.

value for the data element if a value otherwise is not entered for itThe data dictionary usually records and describes a default value, which is the ____.

recordsIn a data dictionary, data elements are combined into ____, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

domainA data dictionary specifies a data element's ____, which is the set of values permitted for the data element.

fieldIn a data dictionary, a(n) ____ is the smallest piece of data that has meaning within an information system.

rectangle with rounded cornersIn a DFD, the Gane and Sarson symbol for a process is a ____.

exploded view

Page 98: 53842535-CTS285-Final (1)

Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

aliasIn a data dictionary, any name other than the standard data element name is called a(n) ____.

ensures that the input and output data flows of the parent DFD are maintained on the child DFDBalancing ____.

systems planning phase In the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.

business model A ____, or requirements model, describes the information that a system must provide.

enterprise applications Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Modeling ____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

O-O Whereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.

process-centered Because it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.

waterfall model Traditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

object-oriented analysisThe ____ method of developing systems produces code that is modular and reusable.

SDLC Structured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.

provide direction, necessary resources, and performance feedback to supervisors and team leadersIn a typical company organizational model, middle managers ____.

Page 99: 53842535-CTS285-Final (1)

adaptive The ____ method of developing systems stresses team interaction and reflects a set of community-based values.

tries to decide how the system will be implemented before determining what the system is supposed to do In launching a new information system, the greatest risk occurs when a company ____.

systems support and security In the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.

methods In object-oriented design, built-in processes called ____ can change an object's properties.

business process reengineering (BPR) When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

business process modeling Systems analysts use a process called ____ to represent a company's operations and information needs.

Legacy systems When planning an information system, a company must consider how a new system will interface with older systems, which are called ____.

24 months Over 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-seed Internet access User productivity systems ____.

False In a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships.

False Because they focus on a longer time frame, middle managers need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations.

True A corporate culture is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

True In the systems analysis phase, the first step is requirements modeling, where business processes are investigated and what the new system must do is documented.

structured analysis Roark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.

It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly showing itself to be incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client

Page 100: 53842535-CTS285-Final (1)

will throw them a curveball and want to make changes late in the game — but that they also will be unwilling to absorb the costs of those changes. For this reason, Roark eliminates which of the following methods of development?

agile/adaptive methods Roark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.

After Roark has spent a week getting to know the members of the team, including their strengths and weaknesses, and what has worked well (and not so well) for this particular team in the past, one theme keeps recurring: the team has particularly weak communications skills. Which of the following methods, then, is he least likely to use, given what he knows about the disadvantages of each method?

economic A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs.

have complex instructions A systems request form should not ____.

introduction In a preliminary investigation report, the ____ contain(s) a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.

user-friendly system that improves employee job satisfaction Examples of tangible benefits include all of the following except a(n) ____.

Customer relationship management (CRM) ____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

fishbone A popular technique for investigating causes and effects is called a(n) ____ diagram, which is an analysis tool that represents the possible causes of a problem as a graphical outline.

Strategic ____ planning is the process of identifying long-term organizational goals, strategies, and resources.

determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interview In sequence, the interviewing process involves a series of steps: ____, conduct the interview, document the interview, and evaluate the interview.

SWOT During strategic planning, top managers ask a series of questions that is called a(n) ____ analysis because it examines a company's strengths, weaknesses, opportunities, and threats.

conduct interviews The primary method of obtaining information during the preliminary investigation is to ____.

Will the proposed system decrease revenue for the company? When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

Page 101: 53842535-CTS285-Final (1)

one person's bias is more likely to affect the decisions When evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

define project scope as clearly as possible To avoid the problem of project creep, ____.

fishbone When using a ____ diagram to investigate causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.

discretionary Projects where management has a choice in implementing them are called ____ projects.

True Competition drives many information systems decisions.

False Even if users have difficulty with a new system, it still will produce the expected benefits.

False When interacting with users, a systems analyst should focus on difficulties instead of questioning users about additional capability they would like to have.

True Whenever possible, a systems analyst should evaluate a proposed project based on tangible costs and benefits that represent actual (or approximate) dollar values.

Sales reps requested a more powerful sales analysis report. As part of the annual report for the fiscal year just ended, Lara is working on a grid that summarizes the major decisions that the small business for which she works made during the year. As part of her review, she is identifying whether a decision was impacted by factors internal to the company, or external.

Which of the following does not appear on Lara's list of external factors?

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

TCO The estimated costs of a proposed system usually are considered the ____, which includes ongoing support and maintenance costs, as well as acquisition costs.

operational feasibility Of the measures of feasibility in the accompanying figure, ____ considers questions such as "Does management support the project?" and "Will the new system require training for users?"

Page 102: 53842535-CTS285-Final (1)

Creating a new report for a user____ is an example of a discretionary project.

preliminary A systems analyst conducts a(n) ____ investigation to study the systems request and recommend specific action.

economic feasibility Of the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

greatest benefit, at the lowest cost, in the shortest period of time When setting priorities for systems requests, the highest priority goes to projects that provide the ____.

technical A feasibility study includes tests for ____ feasibility, which refers to the practical resources needed to develop, purchase, install, or operate the system.

findingsIn the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the project's scope, constraints, and feasibility.

Performance ____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

scope Determining the project ____ means to define the boundaries, or extent, of a project — being as specific as possible.

False The purpose of an interview, and of the preliminary investigation itself, is to convince others that a project is justified, not to uncover facts.

False Data entry controls should be excessive without being effective.

True If only one person has the necessary IT skills and experience to evaluate systems requests, that person should consult closely with users and managers throughout the company to ensure that business and operational needs are considered carefully.

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

identify all tasksThe first step in creating a WBS is to ____.

risk A ____ is an event that could affect a project negatively.

Page 103: 53842535-CTS285-Final (1)

milestones When maintaining schedules, if enough ____ and frequent checkpoints exist, problems will be detected rapidly.

successor When two or more concurrent tasks depend on a single prior task, the concurrent tasks are called ____ tasks.

identify all the project tasks The first step in the creation of a PERT/CPM chart is to ____.

critical A ____ path includes all tasks that are vital to the project schedule.

completion with the same personnel as were on the team at the outset All of the following are metrics of a successful project EXCEPT ____.

critical Project managers always must be aware of the ____ path, so they can monitor the vital tasks and keep the project on track.

milestones In addition to tasks, every project has ____, which are reference points used to monitor progress and manage the project.

all of the above

task time estimates, sequences, personnel assignments A project manager must balance ____ to achieve a workable schedule; graphical planning aids like the one in the accompanying figure can help in the process.

includes identifying project tasks and estimating completion times and costs A project manager's planning _____.

includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target For a project manager, monitoring and controlling _____.

the team member most vulnerable to a given risk Most risk identifications include a brief description of all of the following EXCEPT ____.

all of the above

project size and scope, prior experience with similar projects or systems, IT resources In developing time and cost estimates, project managers must consider _____.

any of the above

personality conflicts among team members, turnover of project personnel, poor control methodsProblems with timetables and project milestones can indicate ____.

groups The accompanying figure shows task ____, which each might represent several activities that can be shown in a more detailed chart.

Page 104: 53842535-CTS285-Final (1)

inaccurate TCO forecast All of the following are possible causes of cost overruns related to human resource factors EXCEPT ____.

PERT/CPM Many project managers find ____ charts more helpful for scheduling, monitoring, and controlling projects.

defining project constraints Project scheduling involves all of the following EXCEPT ____.

True Most managers recognize that problems do occur on most projects; it is better to alert management sooner rather than later.

True System developers can initiate a formal project as early as the preliminary investigation stage, or later on, as analysis, design, and implementation activities occur.

True Project planning is a dynamic task and involves constant change.

False When tasks must be completed one after another, they are called concurrent tasks.

They are predecessor tasks of each other. In discussing PERT/CPM charts, you discuss the types of task patterns that can occur in a project schedule. You give an example of two tasks, A and B, that can both begin as soon as task C is finished. Which of the following is NOT a true statement about tasks A and B?

predecessor Two or more concurrent tasks often depend on a single prior task, which is called a(n) ____ task.

dependent task A _____ cannot be started until one or more other tasks are completed.

bottom-up PERT/CPM is called a(n) ____ technique, because it analyzes a large, complex project as a series of individual tasks.

concurrent When several tasks can start at the same time, each is called a ____ task.

involves staffing, which includes selecting the project team and assigning specific tasks to team members A project manager's scheduling function _____.

reference to successor tasks In a PERT/CPM chart, each task has all of the following EXCEPT a(n) ____.

response A risk ____ plan is a proactive effort to anticipate a risk and describe an action plan to deal with it.

False Using prior experience to make time and cost estimates works best for large projects.

False When two or more concurrent tasks depend on a single prior task, each of the concurrent tasks is called a predecessor task.

Page 105: 53842535-CTS285-Final (1)

True Although a Gantt chart provides more detailed information about a project, a PERT/CPM chart offers a rapid overview that graphically displays the timing, duration, and progress of each task.

histogram A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____.

use case diagram A(n) ____ is a UML technique that visually represents the interaction between users and an information system.

more satisfied users Greater user involvement in the system development process usually results in ____.

range-of-response questions In an interview, ____ are questions that ask a person to evaluate something by providing limited answers to specific responses or on a numeric scale.

actor In a use case diagram, the user becomes a(n) ____, with a specific role that describes how he or she interacts with a system.

Student grades must be entered on machine-scannable forms prepared by the instructor ____ is a typical example of a system requirement for the input category.

systematic sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select every tenth customer for review.

informal In a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.

stratified sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

random sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

The contact management system must generate a daily reminder list for all sales reps ____ is a typical example of a system requirement for the output category.

FDD Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

Analytical skills ____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution.

FDD A(n) ____ is a top-down representation of a function or a process.

Page 106: 53842535-CTS285-Final (1)

give the interviewee easy access to supporting material that might be needed If an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should do all of the following EXCEPT ____.

scrum In a(n) ____, team members prepare to lunge at each other to achieve their objectives.

systems analysis The ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

both a and b

prototyping, user involvement RAD relies heavily on ____.

open-ended questions In an interview, ____ encourage spontaneous and unstructured responses.

True The ability to manage information is the mark of a successful systems analyst and an important skill for all IT professionals.

False When fact-finding, asking what is being done is the same as asking what could or should be done.

False In the early stages of systems analysis, interviews usually focus on specific topics, but as the fact-finding process continues, the interviews are more general.

True IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

control Perry has inherited an Excel sheet that lists all of the system requirements for his team's new project, but unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly—so he needs to take care of this so the requirements can be sorted correctly.

Perry has found one system requirement that he thinks could fit into a couple of different categories. What is the best categorization of this requirement: An employee record must be added, changed, or deleted only by a member of the human resources department?

questionnaire In projects where it is desirable to obtain input from a large number of people, a(n) ____, such as that shown in the accompanying figure, can be a valuable tool.

The student records system must produce class lists within five hours after the end of registration____ is a typical example of a system requirement for the performance category.

random sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

Page 107: 53842535-CTS285-Final (1)

UML The ____ is a widely used method of visualizing and documenting software systems design.

The system must maintain separate levels of security for users and the system administrator ____ is a typical example of a system requirement for the control category.

closed-ended questions In an interview, ____ limit or restrict the response.

informal In a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.

TCO In addition to direct costs, systems developers must identify and document indirect expenses that contribute to the ____.

stratified sample When preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

False When designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics.

True The main objective of a sample is to ensure that it represents the overall population accurately.

True A list of topics should be sent to an interviewee several days before the meeting, especially when detailed information is needed, so the person can prepare for the interview and minimize the need for a follow-up meeting.

his own Kieran has finished compiling the list of the various members of the JAD group: He is the JAD project leader, Malia is the representative from top management, Simon is a manager, Alisa and Ian are users, Shakira and Max are systems analysts, and Devon is the recorder.

As Kieran develops the agenda he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of preparing the report that will be sent to JAD team members?

validity In a data dictionary, some data elements have ____ rules, such as an employee's salary must be within the range defined for the employee's job classification.

logical In data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

no output A black hole process is a process that has ____.

a process step that is repeated until a specific condition changes A black hole process is a process that has ____.

Page 108: 53842535-CTS285-Final (1)

tree A decision ____ is a graphical representation of the conditions, actions, and rules found in a decision table.

Leveling ____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.

All of the above

Spontaneous generation, Gray holes, Black holes ____ is/are logically impossible in a DFD because a process must act on input, shown by an incoming data flow, and produce output, represented by an outgoing data flow.

horizontal form that resembles a tree with the roots at the left and the branches to the rightDecision trees show the logic structure in a ____.

capital DFD symbols are referenced by using all ____ letters for the symbol name.

value for the data element if a value otherwise is not entered for it The data dictionary usually records and describes a default value, which is the ____.

records In a data dictionary, data elements are combined into ____, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

domain A data dictionary specifies a data element's ____, which is the set of values permitted for the data element.

field In a data dictionary, a(n) ____ is the smallest piece of data that has meaning within an information system.

rectangle with rounded corners In a DFD, the Gane and Sarson symbol for a process is a ____.

exploded view Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

alias In a data dictionary, any name other than the standard data element name is called a(n) ____.

ensures that the input and output data flows of the parent DFD are maintained on the child DFDBalancing ____.

line with a single or double arrowhead In a DFD, the Gane and Sarson symbol for a data flow is a ____.

False In most data dictionaries, records are defined together with the data flows and data stores.

False Two data stores can be connected by a data flow without an intervening process.

True In addition to describing each data element, data flow, data store, record, entity, and process, the data dictionary documents the relationships among these components.

Page 109: 53842535-CTS285-Final (1)

False In modular design, a rectangle represents a condition or decision, a diamond shape represents a step or a process, and the logic follows the lines in the direction indicated by the arrows.

Costs may be high. The analysts at Novel Systems Worldwide are considering the four-model approach to system development for a new client.

If they pursue the four-model approach, which of the following is a likely outcome?

A teleological model of the current system The analysts at Novel Systems Worldwide are considering the four-model approach to system development for a new client.

Which of the following will NOT be developed if they decide to use the four-model approach?

repository A data ____ is a central storehouse of information about a system's data.

line with a single or double arrowhead In a DFD, the Gane and Sarson symbol for a data flow is a ____.

one or more process steps based on the results of a test or condition The selection structure is the completion of ____

process descriptions If processes must be performed in a specific sequence, you document the information in the ____.

Balancing ____ maintains consistency among DFDs by ensuring that input and output data flows align properly.

context diagrams Typical process description tools include all of the following EXCEPT ____.

pseudocode Structured English might look familiar to programming students because it resembles ____, which is used in program design.

decision A(n) ____ table shows a logical structure, with all possible combinations of conditions and resulting actions.

rectangle, which may be shaded to make it look three-dimensional In a DFD, the Gane and Sarson symbol for an entity is a ____.

type In a data dictionary, ____ refers to whether the data element contains numeric, alphabetic, or character values.

True What makes one system more complex than another is the number of components, the number of levels, and the degree of interaction among its processes, entities, data stores, and data flows.

True In a DFD, a data flow must have a process symbol on at least one end.

Page 110: 53842535-CTS285-Final (1)

iteration Evan is an expert on all of the different kinds of process description tools, so when his colleagues have questions, they know where to turn.

One of the firm's beginner analysts is working on a financial process that will continue to print vendor payments until it reaches the end of the file. Which of the following processes will Evan suggest that the analyst use?

association The line from the actor to a use case is called a(n) ____.

oval The UML symbol for a use case is a(n) ____ with a label that describes the action or event.

message A ____ is a command that tells an object to perform a certain method.

diagram A use case ____ is a visual summary of several related use cases within a system or subsystem.

attributes An object has certain ____, which are characteristics that describe the object.

0..* The UML notation ____ identifies a zero or many relation.

object A(n) ____ represents a real person, place, event, or transaction.

Relationships ____ describe what objects need to know about each other, how objects respond to changes in other objects, and the effects of membership in classes, superclasses, and subclasses.

instance Your red Mustang is a(n) ____ of the CAR class.

child Inheritance enables an object, called a ____, to derive one or more of its attributes from another object.

inherit In an object-oriented system, objects can ____ certain attributes from other objects.

class All objects within a(n) ____ share common attributes and methods.

Encapsulation ____ allows objects to be used as modular components anywhere in the system.

class An object belongs to a group or category called a(n) ____.

Relationships ____ enable objects to communicate and interact as they perform business functions and transactions required by the system.

methods An object's ____ are the tasks or functions the object performs.

actor In a use case, an external entity is called a(n) ____.

state The ____ of an object is an adjective that describes the object's current status.

Page 111: 53842535-CTS285-Final (1)

True A major advantage of O-O designs is that systems analysts can save time and avoid errors by using modular objects.

False An object treats data and processes separately.

False Use cases cannot interact with other use cases.

False Just as objects are similar to adjectives, attributes resemble verbs that describe what and how an object does something.

True Class diagrams evolve into code modules, data objects, and other system components.

microwave oven Alex is getting a little confused by the terminology in the object-oriented world, so he consults his roommate, who has been doing a lot of work in object modeling in previous coursework.

Which of the following does Alex's roommate use as an example of an instance of the APPLIANCE class?

methods Alex is getting a little confused by the terminology in the object-oriented world, so he consults his roommate, who has been doing a lot of work in object modeling in previous coursework.

The following examples—bake cakes, self-clean, and reheat pasta—are all what with regard to the oven object, according to Alex's roommate?

Methods ____ resemble verbs that describe what and how an object does something.

methodYour car performs a(n) ____ called OPERATE WIPERS when you send a message by moving the proper control.

UML ____ is a widely used method of visualizing and documenting an information system.

actor In a use case, an external entity is called a(n) ____.

True By limiting access to internal processes, an object prevents its internal code from being altered by another object or process.

False The same message to two different objects produces the same results.

False An object treats data and processes separately.

True A gas pump is an example of a black box.

0..* Jaime, the newest analyst at Novel Systems Worldwide, is responsible for assigning the appropriate UML notations to a given class diagram.

Page 112: 53842535-CTS285-Final (1)

In a given diagram, Jaime is marking up a relationship in which a given employee can have no payroll deductions or she can have many deductions. Which of the following notations will Jaime write to mark this relationship?

ASP A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.

fixed fee model When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.

vendorsCompanies that develop software for sale are called software ____.

request for proposal (RFP) A ____ is a document that describes a company, lists the IT services or products needed, and specifies the features required.

service A firm that offers outsourcing solutions is called a ____ provider.

transaction A(n) ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.

data duplication should be encouraged Guidelines to follow when determining data entry and storage considerations include all of the following except ____.

build or buy The choice between developing versus purchasing software often is called a ____ decision.

systems design The physical design is developed during the ____ phase of the SDLC.

4GL In a ____, the commands tend to resemble natural statements that people use.

middleware Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.

obtain input from other companies who already have implemented the software Typically, companies choose in-house software development for all of the following reasons except to ____.

parameter A ____ is a value that the user enters whenever a query is run, which provides flexibility, enables users to access information easily, and costs less.

default A ____ is a value that a system displays automatically.

satisfaction of unique business requirements Advantages of purchasing a software package over developing software in-house include all of the following except ____.

package A software ____ is software that is obtained from a vendor or application service provider.

Page 113: 53842535-CTS285-Final (1)

cloud Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology.

all of the above

negotiating directly with the software vendor to make enhancements to meet the buyer's needs by paying for the changes, purchasing a basic package that vendors will customize to suit the buyer's needs, purchasing the software and making their own modifications, if this is permissible under the terms of the software license Buyers can customize a software package by ____.

False The decision to develop software in-house will require less participation from the systems analyst than outsourcing or choosing a commercial package.

False A subscription model charges a variable fee based on the volume of transactions or operations performed by the application.

True Many firms feel that in-house IT resources and capabilities provide a competitive advantage because an in-house team can respond quickly when business problems or opportunities arise.

True Mission-critical IT systems should be outsourced only if the result is a cost-attractive, reliable, business solution that fits the company's long-term business strategy.

True Software vendors regularly upgrade software packages by adding improvements and enhancements to create a new version or release.

design In an approach called ____ prototyping, systems analysts use prototyping to verify user requirements, after which the prototype is discarded and implementation continues.

benchmark A ____ measures the time a package takes to process a certain number of transactions.

interface In addition to configuring software, an IT staff can create a user ____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application.

Web-based Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment.

Prototyping ____, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system.

Outsourcing ____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.

read-only properties Some data files should be totally hidden from view, while others should have ____ so users can view, but not change, the data.

.NET Microsoft's ____ is one of the major Web-based development environments.

Page 114: 53842535-CTS285-Final (1)

True Building an application in a Web-based environment might involve different risks and benefits, compared to a traditional environment.

False A request for quotation (RFQ) is less specific than an RFP (request for proposal).

True By designing a system in-house, companies can develop and train an IT staff that understands the organization's business functions and information support needs.

True The primary objective of an evaluation and selection team is to eliminate system alternatives that will not work, rank the system alternatives that will work, and present the viable alternatives to management for a final decision.

Data duplication should be encouraged. Now that they have joined the firm, Priscilla is providing the junior analysts on the team with some real-world illustrations to explain some of the system design concepts that they have studied in their coursework, to solidify their understanding.

Which of the following is NOT a guideline Priscilla will impart to the new class of analysts?

When Marny is tasked with the job, her output can involve outright purchase or a variety of leasing options. You have started the process of selecting a new system for the firm and you are weighing all of the various issues that need to be considered and the resources you have at your disposal as you make this important decision.

As you prepare to winnow the field in your selection of a new system, you want a quick refresher on the difference between RFPs and RFQs. If you need an RFP, Simone will write it, and if you need an RFQ, Marny is responsible for writing that. Which of the following is true?

systems planning phaseIn the model of the SDLC shown in the accompanying figure, the ____ usually begins with a formal request to the IT department, called a systems request, which describes problems or desired changes in an information system or a business process.

business modelA ____, or requirements model, describes the information that a system must provide.

enterprise applications

Page 115: 53842535-CTS285-Final (1)

Examples of company-wide applications, called ____, include order processing systems, payroll systems, and company communications networks.

Modeling____ is a systems development technique that produces a graphical representation of a concept or process that systems developers can analyze, test, and modify.

O-OWhereas structured analysis treats processes and data as separate components, ____ combines data and the processes that act on the data into things called objects.

process-centeredBecause it focuses on processes that transform data into useful information, structured analysis is called a(n) ____ technique.

waterfall modelTraditionally, the SDLC is pictured as a(n) ____, like that shown in the accompanying figure, where the result of each phase, which is called a deliverable or end product, flows sequentially into the next phase.

object-oriented analysisThe ____ method of developing systems produces code that is modular and reusable.

SDLCStructured analysis is a traditional systems development technique that uses a series of phases, called the ____, to plan, analyze, design, implement, and support an information system.

Page 116: 53842535-CTS285-Final (1)

provide direction, necessary resources, and performance feedback to supervisors and team leadersIn a typical company organizational model, middle managers ____.

adaptiveThe ____ method of developing systems stresses team interaction and reflects a set of community-based values.

tries to decide how the system will be implemented before determining what the system is supposed to doIn launching a new information system, the greatest risk occurs when a company ____.

systems support and securityIn the model of the SDLC shown in the accompanying figure, during ____, the IT staff maintains, enhances, and protects the system.

methodsIn object-oriented design, built-in processes called ____ can change an object's properties.

business process reengineering (BPR)When companies attempt to simplify operations or reduce costs, a popular strategy is to have managers and systems analysts perform ____.

business process modelingSystems analysts use a process called ____ to represent a company's operations and information needs.

Legacy systemsWhen planning an information system, a company must consider how a new

Page 117: 53842535-CTS285-Final (1)

system will interface with older systems, which are called ____.

24 monthsOver 40 years ago, a concept called Moore's Law accurately predicted that computer processing power would double about every ____.

include e-mail, voice mail, fax, video conferencing, word processing, automated calendars, database management, spreadsheets, and high-seed Internet accessUser productivity systems ____.

FalseIn a knowledge management system, a knowledge base consists of logical rules that identify data patterns and relationships.

FalseBecause they focus on a longer time frame, middle managers need less detailed information than top managers, but somewhat more than supervisors who oversee day-to-day operations.

TrueA corporate culture is the set of beliefs, rules, traditions, values, and attitudes that define a company and influence its way of doing business.

TrueIn the systems analysis phase, the first step is requirements modeling, where business processes are investigated and what the new system must do is documented.

structured analysis

Page 118: 53842535-CTS285-Final (1)

Roark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.It is a new day at the firm. Roark has been in place for a few weeks, strengthening the communications skills of his employees, getting them to work much better together. Now, the challenge that he faces is not an internal one; it lies with the client, which is increasingly showing itself to be incapable of sticking with decisions. Roark, based on his past experience with other clients like this, is afraid that the client will throw them a curveball and want to make changes late in the game — but that they also will be unwilling to absorb the costs of those changes. For this reason, Roark eliminates which of the following methods of development?

agile/adaptive methodsRoark has just joined the company and in his role as lead analyst, he will be responsible for determining which systems development method the team uses to create the new application for a major medical supplier.After Roark has spent a week getting to know the members of the team, including their strengths and weaknesses, and what has worked well (and not so well) for this particular team in the past, one theme keeps recurring: the team has particularly weak communications skills. Which of the following methods, then, is he least likely to use, given what he knows about the disadvantages of each method?

economicA feasibility study includes tests for ____ feasibility, which means that the

Page 119: 53842535-CTS285-Final (1)

projected benefits of the proposed system outweigh the estimated costs.

have complex instructionsA systems request form should not ____.

introductionIn a preliminary investigation report, the ____ contain(s) a brief description of the system, the name of the person or group performing the investigation, and the name of the person or group who initiated the investigation.

user-friendly system that improves employee job satisfactionExamples of tangible benefits include all of the following except a(n) ____.

Customer relationship management (CRM)____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking.

fishboneA popular technique for investigating causes and effects is called a(n) ____ diagram, which is an analysis tool that represents the possible causes of a problem as a graphical outline.

Strategic____ planning is the process of identifying long-term organizational goals, strategies, and resources.

determine the people to interview, establish objectives for the interview, develop interview questions, prepare for the interviewIn sequence, the interviewing process involves a series of steps: ____, conduct

Page 120: 53842535-CTS285-Final (1)

the interview, document the interview, and evaluate the interview.

SWOTDuring strategic planning, top managers ask a series of questions that is called a(n) ____ analysis because it examines a company's strengths, weaknesses, opportunities, and threats.

conduct interviewsThe primary method of obtaining information during the preliminary investigation is to ____.

Will the proposed system decrease revenue for the company?When assessing priorities for systems requests, a systems analyst should look for high scores in all of the following except ____.

one person's bias is more likely to affect the decisionsWhen evaluating systems requests, all of the following are disadvantages of a systems review committee except ____.

define project scope as clearly as possibleTo avoid the problem of project creep, ____.

fishboneWhen using a ____ diagram to investigate causes of a problem, an analyst first states the problem and then draws a main bone with sub-bones that represent possible causes of the problem.

discretionaryProjects where management has a choice in implementing them are called ____ projects.

Page 121: 53842535-CTS285-Final (1)

TrueCompetition drives many information systems decisions.

FalseEven if users have difficulty with a new system, it still will produce the expected benefits.

FalseWhen interacting with users, a systems analyst should focus on difficulties instead of questioning users about additional capability they would like to have.

TrueWhenever possible, a systems analyst should evaluate a proposed project based on tangible costs and benefits that represent actual (or approximate) dollar values.

Sales reps requested a more powerful sales analysis report.As part of the annual report for the fiscal year just ended, Lara is working on a grid that summarizes the major decisions that the small business for which she works made during the year. As part of her review, she is identifying whether a decision was impacted by factors internal to the company, or external.

Which of the following does not appear on Lara's list of external factors?

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Page 122: 53842535-CTS285-Final (1)

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

TCOThe estimated costs of a proposed system usually are considered the ____, which includes ongoing support and maintenance costs, as well as acquisition costs.

operational feasibilityOf the measures of feasibility in the accompanying figure, ____ considers questions such as "Does management support the project?" and "Will the new system require training for users?"

Creating a new report for a user____ is an example of a discretionary project.

preliminaryA systems analyst conducts a(n) ____ investigation to study the systems request and recommend specific action.

economic feasibilityOf the measures of feasibility in the accompanying figure, ____ assesses tangible and intangible benefits to the company in addition to costs.

greatest benefit, at the lowest cost, in the shortest period of timeWhen setting priorities for systems requests, the highest priority goes to projects that provide the ____.

Page 123: 53842535-CTS285-Final (1)

technicalA feasibility study includes tests for ____ feasibility, which refers to the practical resources needed to develop, purchase, install, or operate the system.

findingsIn the preliminary investigation report, the ____ section contains the results of the preliminary investigation, including a description of the project's scope, constraints, and feasibility.

Performance____ limitations result when a system that was designed for a specific hardware configuration becomes obsolete when new hardware is introduced.

scopeDetermining the project ____ means to define the boundaries, or extent, of a project — being as specific as possible.

FalseThe purpose of an interview, and of the preliminary investigation itself, is to convince others that a project is justified, not to uncover facts.

FalseData entry controls should be excessive without being effective.

TrueIf only one person has the necessary IT skills and experience to evaluate systems requests, that person should consult closely with users and managers throughout the company to ensure that business and operational needs are considered carefully.

Page 124: 53842535-CTS285-Final (1)

The new system is more user-friendly, thus increasing employee job satisfaction.Sam is the analyst with the responsibility for assessing the economic feasibility of the new system that his team has been hired to develop for Widgets, Inc.

Sam's boss has asked for a quick list of the tangible benefits of the new system, because the client has expressed some concerns about the project and she wants to reassure him. Which of the following would NOT be on such a list as developed by Sam?

identify all tasksThe first step in creating a WBS is to ____.

riskA ____ is an event that could affect a project negatively.

milestonesWhen maintaining schedules, if enough ____ and frequent checkpoints exist, problems will be detected rapidly.

successorWhen two or more concurrent tasks depend on a single prior task, the concurrent tasks are called ____ tasks.

identify all the project tasksThe first step in the creation of a PERT/CPM chart is to ____.

criticalA ____ path includes all tasks that are vital to the project schedule.

completion with the same personnel as were on the team at the outsetAll of the following are metrics of a successful project EXCEPT ____.

Page 125: 53842535-CTS285-Final (1)

criticalProject managers always must be aware of the ____ path, so they can monitor the vital tasks and keep the project on track.

milestonesIn addition to tasks, every project has ____, which are reference points used to monitor progress and manage the project.

all of the abovetask time estimates, sequences, personnel assignmentsA project manager must balance ____ to achieve a workable schedule; graphical planning aids like the one in the accompanying figure can help in the process.

includes identifying project tasks and estimating completion times and costsA project manager's planning _____.

includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on targetFor a project manager, monitoring and controlling _____.

the team member most vulnerable to a given riskMost risk identifications include a brief description of all of the following EXCEPT ____.

all of the aboveproject size and scope, prior experience with similar projects or systems, IT resourcesIn developing time and cost estimates, project managers must consider _____.

Page 126: 53842535-CTS285-Final (1)

any of the abovepersonality conflicts among team members, turnover of project personnel, poor control methodsProblems with timetables and project milestones can indicate ____.

groupsThe accompanying figure shows task ____, which each might represent several activities that can be shown in a more detailed chart.

inaccurate TCO forecastAll of the following are possible causes of cost overruns related to human resource factors EXCEPT ____.

PERT/CPMMany project managers find ____ charts more helpful for scheduling, monitoring, and controlling projects.

defining project constraintsProject scheduling involves all of the following EXCEPT ____.

TrueMost managers recognize that problems do occur on most projects; it is better to alert management sooner rather than later.

TrueSystem developers can initiate a formal project as early as the preliminary investigation stage, or later on, as analysis, design, and implementation activities occur.

True

Page 127: 53842535-CTS285-Final (1)

Project planning is a dynamic task and involves constant change.

FalseWhen tasks must be completed one after another, they are called concurrent tasks.

They are predecessor tasks of each other.In discussing PERT/CPM charts, you discuss the types of task patterns that can occur in a project schedule. You give an example of two tasks, A and B, that can both begin as soon as task C is finished. Which of the following is NOT a true statement about tasks A and B?

predecessorTwo or more concurrent tasks often depend on a single prior task, which is called a(n) ____ task.

dependent taskA _____ cannot be started until one or more other tasks are completed.

bottom-upPERT/CPM is called a(n) ____ technique, because it analyzes a large, complex project as a series of individual tasks.

concurrentWhen several tasks can start at the same time, each is called a ____ task.

involves staffing, which includes selecting the project team and assigning specific tasks to team membersA project manager's scheduling function _____.

reference to successor tasksIn a PERT/CPM chart, each task has all of the following EXCEPT a(n) ____.

Page 128: 53842535-CTS285-Final (1)

responseA risk ____ plan is a proactive effort to anticipate a risk and describe an action plan to deal with it.

FalseUsing prior experience to make time and cost estimates works best for large projects.

FalseWhen two or more concurrent tasks depend on a single prior task, each of the concurrent tasks is called a predecessor task.

TrueAlthough a Gantt chart provides more detailed information about a project, a PERT/CPM chart offers a rapid overview that graphically displays the timing, duration, and progress of each task.

histogramA common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____.

use case diagramA(n) ____ is a UML technique that visually represents the interaction between users and an information system.

more satisfied usersGreater user involvement in the system development process usually results in ____.

range-of-response questionsIn an interview, ____ are questions that ask a person to evaluate something by

Page 129: 53842535-CTS285-Final (1)

providing limited answers to specific responses or on a numeric scale.

actorIn a use case diagram, the user becomes a(n) ____, with a specific role that describes how he or she interacts with a system.

Student grades must be entered on machine-scannable forms prepared by the instructor____ is a typical example of a system requirement for the input category.

systematic sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select every tenth customer for review.

informalIn a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or knowledge than appears on an organization chart.

stratified sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

random sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

Page 130: 53842535-CTS285-Final (1)

The contact management system must generate a daily reminder list for all sales reps____ is a typical example of a system requirement for the output category.

FDDUsing a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes.

Analytical skills____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution.

FDDA(n) ____ is a top-down representation of a function or a process.

give the interviewee easy access to supporting material that might be neededIf an interviewee gives only short or incomplete responses to open-ended questions, a systems analyst should do all of the following EXCEPT ____.

scrumIn a(n) ____, team members prepare to lunge at each other to achieve their objectives.

systems analysisThe ____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

both a and bprototyping, user involvementRAD relies heavily on ____.

Page 131: 53842535-CTS285-Final (1)

open-ended questionsIn an interview, ____ encourage spontaneous and unstructured responses.

TrueThe ability to manage information is the mark of a successful systems analyst and an important skill for all IT professionals.

FalseWhen fact-finding, asking what is being done is the same as asking what could or should be done.

FalseIn the early stages of systems analysis, interviews usually focus on specific topics, but as the fact-finding process continues, the interviews are more general.

TrueIT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally, at every stage of systems development.

controlPerry has inherited an Excel sheet that lists all of the system requirements for his team's new project, but unfortunately, his predecessor did not label the requirements with categories—or in some cases failed to categorize them correctly—so he needs to take care of this so the requirements can be sorted correctly.

Perry has found one system requirement that he thinks could fit into a couple of different categories. What is the best categorization of this requirement: An employee record must be added,

Page 132: 53842535-CTS285-Final (1)

changed, or deleted only by a member of the human resources department?

questionnaireIn projects where it is desirable to obtain input from a large number of people, a(n) ____, such as that shown in the accompanying figure, can be a valuable tool.

The student records system must produce class lists within five hours after the end of registration____ is a typical example of a system requirement for the performance category.

random sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ might select any 20 customers.

UMLThe ____ is a widely used method of visualizing and documenting software systems design.

The system must maintain separate levels of security for users and the system administrator____ is a typical example of a system requirement for the control category.

closed-ended questionsIn an interview, ____ limit or restrict the response.

informalIn a(n) ____ structure, which usually is based on interpersonal relationships, some people have more influence or

Page 133: 53842535-CTS285-Final (1)

knowledge than appears on an organization chart.

TCOIn addition to direct costs, systems developers must identify and document indirect expenses that contribute to the ____.

stratified sampleWhen preparing a representative sample from a list of 200 customers who complained about errors in their statements, a ____ could ensure the sample is balanced geographically by selecting five customers from each of four zip codes.

FalseWhen designing a questionnaire, arrange questions in a random order, intermixing simple and more complex topics.

TrueThe main objective of a sample is to ensure that it represents the overall population accurately.

TrueA list of topics should be sent to an interviewee several days before the meeting, especially when detailed information is needed, so the person can prepare for the interview and minimize the need for a follow-up meeting.

his ownKieran has finished compiling the list of the various members of the JAD group: He is the JAD project leader, Malia is the representative from top management, Simon is a manager, Alisa and Ian are users, Shakira and Max are systems analysts, and Devon is the recorder.

Page 134: 53842535-CTS285-Final (1)

As Kieran develops the agenda he wants to put the name of the appropriate person next to the agenda item. Whose name would he put next to the final task on the agenda, the task of preparing the report that will be sent to JAD team members?

validityIn a data dictionary, some data elements have ____ rules, such as an employee's salary must be within the range defined for the employee's job classification.

logicalIn data and process modeling, a(n) ____ model shows what the system must do, regardless of how it will be implemented physically.

no outputA black hole process is a process that has ____.

a process step that is repeated until a specific condition changesA black hole process is a process that has ____.

treeA decision ____ is a graphical representation of the conditions, actions, and rules found in a decision table.

Leveling____ is the process of drawing a series of increasingly detailed DFDs, until all functional primitives are identified.

All of the aboveSpontaneous generation, Gray holes, Black holes____ is/are logically impossible in a DFD because a process must act on input,

Page 135: 53842535-CTS285-Final (1)

shown by an incoming data flow, and produce output, represented by an outgoing data flow.

horizontal form that resembles a tree with the roots at the left and the branches to the rightDecision trees show the logic structure in a ____.

capitalDFD symbols are referenced by using all ____ letters for the symbol name.

value for the data element if a value otherwise is not entered for itThe data dictionary usually records and describes a default value, which is the ____.

recordsIn a data dictionary, data elements are combined into ____, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

domainA data dictionary specifies a data element's ____, which is the set of values permitted for the data element.

fieldIn a data dictionary, a(n) ____ is the smallest piece of data that has meaning within an information system.

rectangle with rounded cornersIn a DFD, the Gane and Sarson symbol for a process is a ____.

exploded view

Page 136: 53842535-CTS285-Final (1)

Because diagram 0 is a more detailed or expanded version of process 0 on a context diagram, diagram 0 is called a(n) ____.

aliasIn a data dictionary, any name other than the standard data element name is called a(n) ____.

ensures that the input and output data flows of the parent DFD are maintained on the child DFDBalancing ____.

1.____ is the measure of a system¶s ability to expand, change, or downsize easily to meet thechanging needs of a business enterprise.Scalability2. Every information system involves ____.all of the above3. A system design where the server performs all the processing is described as ____.mainframe architecture4. In a(n) ____ design, the remote user¶s keystrokes are transmitted to the mainframe, whichresponds by sending screen output back to the user¶s screen.Centralized5. a client/server design, a database server ____.Processes individual SQL commands6. In an n-tier system, special utility software called ____ enables the tiers to communicate and pass data back and forth.Middleware7. In a client/server architecture, just as processing can be done at various places, data can bestored in more than one location using a(n) ____.DDBMS8. When developing e-business systems, an in-house solution usually requires a ____ for acompany that must adapt quickly in a dynamic e-commerce environment.greater initial investment but provides more flexibility9. A ____ is an entrance to a multifunction Web site.portal10. During business hours, a salesperson can enter a sale on a ____ terminal, which is part of an information system that handles daily sales transactions and maintains the online inventoryfile.POS11. A batch processing system has all of the following characteristicsexcept ____.the information system is available whenever necessary to support business operationsA)describe how the project team will go about developing the proposed system

Page 137: 53842535-CTS285-Final (1)

The project plan is the document that is used to _____.A)describe how the project team will go about developing the proposed systemB)outline the tasks to be addressed in developing the proposed system and develop a time estimate for each task.C)outline the technical, economic, and organizational feasibility of the proposed systemD)summarize the business need and explain how the proposed system supports that need and creates valueE)all of the above

B)designDeciding how the hardware, software, and network infrastructure will operate occurs during the _____ phase of the SDLC.A)analysisB)designC)implementationD)planningE)strategy

D)system requestThe _____ is generated by the department or person that has an idea for a new information system.A)economic feasibility analysisB)requirements documentC)

Page 138: 53842535-CTS285-Final (1)

project charterD)system requestE)project plan

B)UMLOverall, the consistent notation, integration among the diagramming techniques, and application of the diagrams across the entire development process makes ________ a powerful and flexible tool set for analysts and developers.A)CASEB)UMLC)DFDsD)EPCsE)Flow Charts

C)create value for the organizationThe primary goal of the systems analyst is to _____.A)acquire a working toolB)create a wonderful systemC)create value for the organizationD)establish the phases of the SDLCE)identify opportunities for improvement

B)designInterfaces (e.g., menus, reports, forms) are specified during the _____ phase of the SDLC.

Page 139: 53842535-CTS285-Final (1)

A)analysisB)designC)implementationD)planningE)system delivery

E)all of the aboveDeveloping an information system is similar to building a house because you have toA)start with a basic idea of what is neededB)create simple drawings of what is needed and allow the customer to provide feedbackC)develop a detailed set of blueprintsD)actually build the project, often with some changes directed by the customerE)all of the above

E)planningUnderstanding why an information system should be built and determining how the project team will build it is part of the _____ phase of the SDLC.A)analysisB)system requestC)gatheringD)initiatingE)planning

Page 140: 53842535-CTS285-Final (1)

E)none of the above_____ development is a structured design methodology that proceeds in a sequence from one phase to the next.A)analysisB)designC)implementationD)all of the aboveE)none of the above

B)person or department that requested the systemThe project sponsor is the _____.A)lead systems analyst on the project teamB)person or department that requested the systemC)lead computer programmer charged with writing the code for the systemD)project team leader in charge of developing the systemE)any of the above may fill the role of the project sponsor

D)implementationThe phase of the SDLC when the system is actually built or purchased is the _____.A)analysisB)constructionC)designD)implementation

Page 141: 53842535-CTS285-Final (1)

E)planning

B) DesignIn which phase of the SDLC is the system specification developed?A)analysisB)designC)implementationD)planningE)system delivery

D)all of the aboveThe principal disadvantages(s) with the waterfall development methodology is (are) _____.A)a long time elapses between completion of the system proposal and the delivery of the systemB)if the team misses important requirements, expensive post-implementation programming may be neededC)the design must be completely specified on paper before programming beginsD)all of the aboveE)none of the above

C) Process-CenteredA development methodology that focuses on the processes as the core of the system is said to be _____.A)action-orientedB)

Page 142: 53842535-CTS285-Final (1)

structure-orientedC)process-centeredD)object-orientedE)data-centered

D) Systems development life cycleThe process of understanding how an information system can support business needs, design the system, build it, and deliver it to users is the _____.A)analysis phase of the SDLCB)object oriented approachC)rule for creating a CASE toolD)systems development life cycleE)waterfall development methodology

TrueThe business analyst serves as the primary contact point with the project.A)TrueB)False

FalseAn analyst that focuses on the technical issues of the organization (hardware, software, databases and networks) is commonly called a change management analyst.A)TrueB)False

TrueDetermining who will use the system, what the system will do, and where and

Page 143: 53842535-CTS285-Final (1)

when it will be used is performed during the analysis phase of the SDLC.A)TrueB)False

TrueThe primary advantage of the Waterfall Development methodology is requirements are completely specified and held relatively constant prior to programming.A)TrueB)False

FalseAn analyst with business skills that understands the business issues surrounding a system is commonly called a project manager.A)TrueB)False

TrueIn the Unified Process, the analysis phase follows requirements.A)TrueB)False

FalseThe primary objective of the systems analyst is to create a wonderful system. A)TrueB)False

True

Page 144: 53842535-CTS285-Final (1)

The new information system is purchased or built during the implementation phase of the SDLC.A)TrueB)False

FalseThe planning phase is the fundamental process of understanding how an information system should be built and determining who on the project team will build it.A)TrueB)False

TruePhased development is considered a special case of RAD approach to developing systems.A)TrueB)False

FalseA project manager most likely would not have worked as a systems analyst in the past, since project management career track is independent of the system analyst's career track. A)TrueB)False

TrueIn extreme programming programmers pair up to write the code.A)TrueB)False

Page 145: 53842535-CTS285-Final (1)

FalseParallel development relies on only one iteration of the analysis phase.A)TrueB)False

TrueFor urgent projects, it is a good idea to use a prototyping methodology.A)TrueB)False

FalseProject team members focus on getting the project done, leaving change management to the business managers. A)TrueB)False

FalseThe creation of a design prototype that is not a working information system, but represents a part of the system that needs additional refinement happens with the prototyping methodology.A)TrueB)False

TrueExtreme programming is founded on core principles such as communication, simplicity, feedback, and courageA)TrueB)False

Page 146: 53842535-CTS285-Final (1)

TrueScott has been assigned to focus on the users during the upcoming information systems installation. Scott will provide user training and documentation. His role is to serve as a change management analyst.A)TrueB)False

TrueThe analyst that develops ideas and suggestions to improve the application of information technology is commonly called a systems analyst.A)TrueB)False

TrueYou are carrying out a project that involves information systems for the operation of controls in a passenger jet craft. This is an ideal project for you to follow a throwaway prototyping methodology.A)TrueB)False

FalseThe waterfall development methodology derives its name from the salmon that swim up the waterfall against the current. A)TrueB)False

Page 147: 53842535-CTS285-Final (1)

FalseThe business analyst is responsible for ensuring that the project is completed on time and within budget and that the system delivers all benefits that were intended by the project sponsor. A)TrueB)False

FalseThe infrastructure analyst is responsible for the design of the new business policies and processes.A)TrueB)False

TrueThrowaway prototyping balances the benefits of well-thought-out analysis and design phases with the advantages of using prototypes to refine key issues before the system is built.A)TrueB)False

TrueSystems analysts Lori and Mark are employed by the local hospital. They have been assigned to develop a very complex patient monitoring system for the cardio-care unit using a new display technology. Throwaway prototyping is a very suitable methodology for this project. A)TrueB)False

True

Page 148: 53842535-CTS285-Final (1)

Kim repeatedly performs the analysis, design, and implementation phases concurrently in a cycle until the system is completed. She then goes back and from scratch does a thorough design and implementation to complete the project. She is following a throwaway prototype methodology.A)TrueB)False

TrueThe role of the change management analyst includes ensuring that adequate documentation and support are available to the users. A)TrueB)False

TrueThe role of the project manager includes managing the team members, developing the project plan, assigning resources and serving as the primary point of contact for people outside the project team. A)TrueB)False

FalseFor complex systems, throwaway prototyping is not a suitable methodology, since it will lead to problems with maintaining the system. A)TrueB)False

True

Page 149: 53842535-CTS285-Final (1)

Agile development methodology aims at eliminating the modeling and documentation overhead in IS projects, while emphasizing simple, iterative application development.A)TrueB)False

D) Project ManagerMost system requests include all of the following except _____.A)business needB)business requirementsC)project sponsorD)project managerE)business value

C)guide to determining whether to proceed with a projectFeasibility analysis may be defined as a(n)_____.A)assessment of ability of the ultimate users of the system to accept the system and incorporate it into the ongoing operations of the organizationB)determination of the extent to which the system can be technically designed, developed, and installedC)guide to determining whether to proceed with a projectD)identification of only the costs and benefits associated with the projectE)none of the above

Page 150: 53842535-CTS285-Final (1)

B)the high level functionality of the system.In order to approve a system request, the approval committee must knowA)all of the details of the ultimate system to be developed.B)the high level functionality of the system.C)what the screens and reports will look like in the final system.D)who the end users of the system will be and exactly how they will use it in their jobs.E)all of the above.

B)large project sizeWhich of the following factors would tend to increase the technical risk of a project?A)familiarity with the technologyB)large project sizeC)creating an application that is familiar to the users and analystsD)small project sizeE)the number of other applications under development in the firm

C)No previous experience with Java within the IS departmentWhich of the following factors could be included in a technical risk assessment?A)Cost of a new Web serverB)Cost of hiring a Webmaster

Page 151: 53842535-CTS285-Final (1)

C)No previous experience with Java within the IS departmentD)Some fear of job loss among order entry department personnelE)All of the above

A) OrganizationalPeter is the vice president of accounting and finance. For the past year he has solely provided the resources necessary to get the just-in-time accounting system through the planning and analysis phases of the SDLC. Other managers have openly stated that the JIT system is not worth the investment. The SEC has just placed Peter under investigation for insider trading and the board has asked him to resign. This project is failing _____ feasibility analysis.A)organizationalB)championC)functionalD)economicE)technical

C)high-level non-IS executive who is usually but not always the project sponsor who initiated the system requestThe project champion is a(n)_____.A)high-level IS executive who is usually but not always the project sponsor who initiated the system requestB)mid-level IS manager who has the responsibility of controlling and directing the development processC)

Page 152: 53842535-CTS285-Final (1)

high-level non-IS executive who is usually but not always the project sponsor who initiated the system requestD)senior member of the user group who participated in the RAD sessionsE)none of the above

B) Tangible_____ value can be quantified during the project initiation phase.A)ExpectedB)TangibleC)IntangibleD)RealE)Salvage

D) Equipment UpgradeOperational costs that are examined during feasibility analysis include _____.A)data conversion costB)development trainingC)user trainingD)equipment upgradesE)initial consultant fees

A) Economic_____ feasibility is determined by identifying costs and benefits associated with the system.A)EconomicB)FunctionalC)

Page 153: 53842535-CTS285-Final (1)

OrganizationalD)IntangibleE)Technical

D) Software Licensing FeesExamples of development costs include all EXCEPT _____.A)consultant feesB)hardware expensesC)salaries for the project teamD)software licensing feesE)none of the above

C) Business RequirementsExplaining "the business capabilities of the information system" is written in the _____ section of the system request.A)business needB)business valueC)business requirementsD)project needE)special issues

B)project sponsor, business need, business requirements, and business valueThe four elements commonly found on a system request are _____.A)economic, organizational, technical, and operational feasibilityB)project sponsor, business need, business requirements, and business value

Page 154: 53842535-CTS285-Final (1)

C)risk analysis, familiarity, project size, and cost-benefit analysisD)training, software, installation, and equipmentE)upgrades, licensing fees, repairs, and charges

B) Feasibility Analysis_____ is the process of examining the technical, economic, and organizational pros and cons of developing a new system.A)Committee approvalB)Feasibility analysisC)Functionality determinationD)Risk analysisE)System request

E) Return On InvestmentThe calculation that measures the amount of money an organization receives in return for the money it spends is called the _____.A)cash flowB)net present valueC)total investmentD)tangible costsE)return on investment

TrueROI calculations do not consider the present value of future money.A)

Page 155: 53842535-CTS285-Final (1)

TrueB)False

TrueIt is not necessary to assign dollar values to intangible costs and benefits; it is almost impossible to come up with reasonable numbers for all of the costs and benefits that haven't happened yet. A)TrueB)False

FalseKelly Smith, the vice president of marketing, has provided resources and political support for the new production management information system. She has acted as the project manager for the project.A)TrueB)False

FalseA feasibility analysis includes whether the project has been permitted by the CIO of the company.A)TrueB)False

TrueCost benefit analysis identifies the financial costs and benefits associated with a systems project.A)TrueB)False

Page 156: 53842535-CTS285-Final (1)

FalseSystem requests often include the project team members including the project manager and the analysts.A)TrueB)False

TrueOrganizational feasibility can be evaluated by conducting a(n) stakeholder analysis.A)TrueB)False

FalseThe return on investment (ROI) should be used as the sole indicator of a project's worth because it considers the end points of the investment, not the cash flow in between.A)TrueB)False

FalseThe formula for net present value (NPV) is the ratio of (Total benefits - Total Costs) to Total Costs.A)TrueB)False

TrueUser participation should be promoted throughout the development process to make sure that the final system will be accepted and used.A)True

Page 157: 53842535-CTS285-Final (1)

B)False

FalseThe champion is a high-level IS executive who initiates the system request and supports the project by providing time, resources, and political support within the organization by communicating the importance of the system to other organizational decision makers.A)TrueB)False

FalseHappy customers is a tangible cost that can be included in a cost-benefit analysis. A)TrueB)False

FalseHow well a system is accepted by the users and incorporated into the ongoing operations of the business is defined in the technical feasibility. A)TrueB)False

FalseEconomic feasibility focuses on whether the system can be built by examining the risks associated with the users' and analysts' familiarity with the application, familiarity with the technology, and project size. A)TrueB)False

Page 158: 53842535-CTS285-Final (1)

FalseFamiliarity with the application and technology are major factors considered under economic feasibility.A)TrueB)False

TrueProject size is an important consideration in technical feasibility. Larger projects create more risk, both because they are more complicated to manage and because there is a greater chance that some important system requirements will be overlooked or misunderstood.A)TrueB)False

FalseDuring organizational feasibility analysis the system users are the stakeholders that are responsible for providing enough budget and promoting the project.A)TrueB)False

FalseA limitation of a formal cost-benefits analysis is that it contains the costs and benefits for just one year. A)TrueB)False

TrueCalculating the break-even point helps in understanding how long it will take

Page 159: 53842535-CTS285-Final (1)

before the system creates real value for the organization.A)TrueB)False

TrueA high return on investment (ROI) results when benefits far outweigh the cost of a new project or information system. A)TrueB)False

FalseThe organizational management of a business is involved in hands-on activities related to the project. A)TrueB)False

FalseTo identify the costs and benefits related to the computer technology for a project the systems analyst should rely on the business users.A)TrueB)False

TrueEconomic feasibility is determined by identifying costs and benefits associated with the system, assigning values to them, and then calculating the cash flow and return on investment for the project.A)TrueB)False

Page 160: 53842535-CTS285-Final (1)

FalseDetermining whether the new system will be compatible with the existing technology that already exists in the organization is part of the organizational feasibility study.A)TrueB)False

TruePresent value calculation takes inflation and time into account.A)TrueB)False

C) Industry StandardsKathryn has little experience estimating the time it will take to complete a systems project. She has just completed the planning phase of the project. What method should she use to estimate the time required to build the system?A)adjusted project complexityB)function pointsC)industry standardsD)Microsoft ProjectE)more complex approach

A) Project Management_____ is the process of planning and controlling the development of a system within a specified time frame at a minimum cost with the right functionality.A)Project managementB)

Page 161: 53842535-CTS285-Final (1)

Symantic timelineC)Task identificationD)Time estimationE)Work plan

B) 20 MonthsOne method of estimating project time is to use industry standard factors for each project phase. With this method, if the planning phase typically takes 15% of total project time, and a particular project requires three months for planning, then the remainder of the project will require _____.A)15 monthsB)20 monthsC)3.5 monthsD)4.5 monthsE)3 months

B)end-user efficiency, data communications, and reusabilityWhen using a function point estimation worksheet, there are 14 factors that impact the complexity of a project. These factors include _____.A)data communications, time tradeoffs, and estimated effortB)end-user efficiency, data communications, and reusabilityC)performance and programming languageD)reports printed and PCAE)

Page 162: 53842535-CTS285-Final (1)

x-rays, extensibility, and operational conversion

D) All the AboveAdding people to a project team in order to speed up total development time _____.A)organized in a standard manner across all projectsB)created in an iterative and incremental mannerC)designed so one can compare the current project to past projectsD)all of the aboveE)none of the above

B)creating the work plan, staffing the project, and controlling and directing the projectThe three steps of project management are _____.A)controlling the project, directing the project, and creating the work planB)creating the work plan, staffing the project, and controlling and directing the projectC)directing the project, creating the work plan, and naming the tasksD)naming the tasks, creating the work plan, and completing the deliverablesE)setting the start date, estimating the time, and reading the actual time

D)unrealistic schedule demands by project sponsors

Page 163: 53842535-CTS285-Final (1)

The most significant challenge to project managers is _____.A)lack of project management trainingB)no one really understands how to manage a complex systems development projectC)the lack of tools that can assist in controlling project progressD)unrealistic schedule demands by project sponsorsE)all of the above

E) Much LessAssume a systems development project effort calculation determines that the system will require 240 function points. If the developers choose to implement this system in the C programming language, approximately 31,200 lines of code will have to be written. If the developers choose Visual Basic to implement the system, the number of lines of code will be _____.A)about the sameB)can't tell without more informationC)exactly the sameD)much greaterE)much less

D)list the four phases of the SDLC and the steps that occur in eachTo identify the tasks for a work plan the project manager can _____.A)control and direct the projectB)estimate the size, staff the project, and

Page 164: 53842535-CTS285-Final (1)

remember technical skillsC)establish a possible reporting structureD)list the four phases of the SDLC and the steps that occur in eachE)set conservative numbers for the project software

A) Function PointA(n) ____________ is a measure of program size based on the number and complexity of inputs, outputs, queries, files, and program interfaces.A)function pointB)line of codeC)project planD)standard moduleE)workplan

C) 400A normal system with 400 unadjusted function points would have _____ adjusted function points when the shortcut method is use to determine the complexity of the project.A)200B)260C)400D)540E)600

B) EstimationThe process of assigning values for the time and effort needed to perform a

Page 165: 53842535-CTS285-Final (1)

system project is called _____.A)analysisB)estimationC)identifyingD)planningE)preparation

E) Work PlanThe _____ is a dynamic schedule that logs and monitors all of the tasks that need to be accomplished for the length of the project.A)margin of errorB)project managerC)project objectiveD)timeboxE)work plan

E)start with a realistic assessment of the workA critical success factor for project management is to _____.A)create a work planB)follow the three steps of project managementC)identify most project tasksD)manage the hundreds of tasksE)start with a realistic assessment of the work

Page 166: 53842535-CTS285-Final (1)

A)established methodologiesProject managers can develop task lists for a project with the help of _____.A)established methodologiesB)system proposalsC)system requestsD)user application hardwareE)user requirements

TrueA highly effective motivational technique for technical staff is to provide recognition for each team member's accomplishments.A)TrueB)False

TrueThe underlying cause of many missed project deadlines is scope creep.A)TrueB)False

TrueThe most common reason for schedule and cost overruns that surface after the project is underway is scope creep.A)TrueB)False

TrueWhen planning a systems project, overly optimistic timetables are the cause of project completion delays.

Page 167: 53842535-CTS285-Final (1)

A)TrueB)False

TrueUsing typical industry standards for estimating project time schedules, the estimated analysis phase would be 10 person-months for a systems project where the planning phase was completed in 7.5 person-months. A)TrueB)False

FalseScope creep is only a minor factor in projects running over schedule, and every effort should be made to incorporate any changes into the present system if they would truly be beneficial. A)TrueB)False

FalseThe project charter describes the qualifications of the people who will work on a project and the reporting structure of the project team.A)TrueB)False

FalseLower CASE tools are used to create integrated diagrams of the system and store information about system components during the analysis phase.A)True

Page 168: 53842535-CTS285-Final (1)

B)False

FalseThe COCOMO model to convert lines of code estimates into person-month estimates was designed by Allen Albrecht of IBM. A)TrueB)False

TrueMatching people's skills with the needs of the project, motivating employees, and minimizing personnel conflict are all part of the staffing process.A)TrueB)False

TrueSergei, the project manager, is worried about completing the project on time. To increase the productivity of his 15-person team he should create subteams with no more than 10 people on a subteam.A)TrueB)False

TrueA function point is a measure of program size based on the number and complexity of inputs, outputs, queries, files and program interfaces. A)TrueB)False

False

Page 169: 53842535-CTS285-Final (1)

One of the greatest weaknesses of systems consulting firms is that they try to apply estimates and methodologies that they have developed over time and applied to other projects, most of which are very different from the current project. A)TrueB)False

FalseThe project team has just determined that the deadline for completion will not be met. In order to deliver a high quality system on schedule, the team has requested that the features be prioritized and that a fixed deadline be imposed for the project. This technique is referred to as SDLC methodology.A)TrueB)False

TrueA good technique to help minimize conflict among team members is to hold team members accountable for their tasks.A)TrueB)False

FalseThe document that describes the project's objectives and rules is called the project charter.A)TrueB)False

True

Page 170: 53842535-CTS285-Final (1)

Christine does not have the skills that her project manager feels are necessary and no money has been budgeted for outside consultants. Mentoring is a good option to improve Christine's skills in this situation.A)TrueB)False

FalseCreating a work plan requires three steps: identify the tasks that need to be accomplished, estimate the time that it will take to complete the tasks, and record the task completion time in a Gantt Chart. A)TrueB)False

FalseIt is not wise to identify tasks for a current project using existing methodology, because methodologies that have been used by an organization for other projects probably will not work for this project without extensive changes. A)TrueB)False

FalseCASE tool is a popular graphic depiction of the work plan that lists project tasks along a y-axis, time along an x-axis, and uses shaded boxes to represent tasks.A)TrueB)False

True

Page 171: 53842535-CTS285-Final (1)

Integrated CASE tools are used to support tasks that happen throughout the SDLC.A)TrueB)False

FalseJim Smith, the project manager for a high-profile project, has permitted the users to add additional features to the systems project. The schedule and costs are now running over. This project suffers from poor standards.A)TrueB)False

FalseTo complete a 20 person-month project in 10 months, a team should have 4 full-time staff members assigned to the project. A)TrueB)False

TrueProject management is the second major component of the planning phase of the systems development life cycle (SDLC), and it includes three steps: creating the work plan, staffing the project, and controlling and directing the project.A)TrueB)False

TrueAccording to leading experts in software development, the margin of error when estimating project costs is 100% and the margin of error in project scheduling time

Page 172: 53842535-CTS285-Final (1)

is 25%.A)TrueB)False

FalseA key factor in staffing a project involves motivating people to meet the project's objectives, and the most effective way to do this is through the use of money and bonuses. A)TrueB)False

TrueUsing the shortcut method to determine the complexity of a systems project, a very complex system having 300 unadjusted function points would have 405 adjust function points. A)TrueB)False

TrueThe work plan records and keeps track of all of the tasks that need to be accomplished over the life of the project, listing each task, along with important information about it, such as when it needs to be completed, the person assigned to do the work, and any deliverables that will result.A)TrueB)False

TrueTimeboxing is a popular technique which sets a fixed deadline for a project and delivers the system by that deadline no

Page 173: 53842535-CTS285-Final (1)

matter what, even if functionality needs to be reduced.A)TrueB)False

FalseWhen estimating project time schedules using industry standards for a systems project, the following values are acceptable: 15% for planning, 25% for analysis, 50% for design, and 10% for implementation. A)TrueB)False

C)Business Process ReengineeringWhich of the following analysis strategies incurs the highest risk yet has the potential to provide high value to the business?A)Business Process AutomationB)Business Process ImprovementC)Business Process ReengineeringD)Business Process RenovationE)Root cause analysis

D) ObservationWhat information-gathering strategy enables the analyst to see the reality of the situation rather than listen to others describe it?A)document analysisB)interviewingC)

Page 174: 53842535-CTS285-Final (1)

joint application design (JAD) sessionsD)observationE)questionnaires

C)joint application developmentThe information gathering technique that is most effective in combining information from a variety of perspectives, building consensus, and resolving discrepancies is a(n) _____.A)document analysisB)interviewC)joint application developmentD)observationE)questionnaire

D) 50%A JAD session can reduce scope creep by _____.A)10%B)20%C)40%D)50%E)75%

D)business process reengineeringThe goal of this analysis strategy is to change the fundamental way the organization operates and to make major changes by taking advantage of new ideas, methods and technology.A)

Page 175: 53842535-CTS285-Final (1)

business process automationB)business process benchmarkingC)business process improvementD)business process reengineeringE)business process systemization

A) BPAThe analysis strategy that results in the existing business processes being left essentially the same, but with a new system that makes them more efficient is _____.A)BPAB)BPIC)BPRD)BPUE)Top-down approach

C) Open-EndedSarah would like to give the interviewee more control over the interview and to gather rich information. She should ask _____ questions.A)closed-endedB)inappropriateC)open-endedD)opinionE)probing

E)activity elimination and outcome analysis

Page 176: 53842535-CTS285-Final (1)

Two BPI techniques used to identify possible improvements in the current system are _____.A)activity based costing and activity eliminationB)duration analysis and formal benchmarkingC)outcome analysis and problem analysisD)problem analysis and root cause analysisE)activity elimination and outcome analysis

A)the person who sets the meeting agenda and guides the discussionA JAD facilitator is _____.A)the person who sets the meeting agenda and guides the discussionB)the person who records the discussionC)participates in the discussionD)is also a power userE)none of the above

D)problem analysis and root cause analysisTwo BPA techniques commonly used to identify possible problems in the current system are _____.A)activity based costing and benchmarkingB)duration analysis and formal benchmarkingC)outcome analysis and duration analysisD)problem analysis and root cause analysisE)

Page 177: 53842535-CTS285-Final (1)

process simplification and proxy benchmarking

A) AnalysisUnderstanding the as-is system, identifying improvements, and developing requirements for the to-be system are the steps of the _____ phase.A)analysisB)designC)implementationD)planningE)SDLC

A)document analysisThe examination of existing paperwork in order to better understand the As-Is system is an example of what information-gathering strategy?A)document analysisB)interviewingC)joint application design (JAD) sessionsD)observationE)questionnaires

A)interviewingThe most commonly used information-gathering technique is _____.A)interviewingB)joint application design (JAD) sessionsC)document analysis

Page 178: 53842535-CTS285-Final (1)

D)observationE)questionnaires

E)questionnaireThe information gathering technique that enables the analyst to collect facts and opinions from a wide range of geographically dispersed people quickly and with the least expense is the _____.A)document analysisB)interviewC)JAD sessionD)observationE)questionnaire

C)business process improvementThe goal of ______ analysis strategy is to make minor or moderate changes to the business processes so that they will become more efficient and effective.A)business process automationB)business process benchmarkingC)business process improvementD)business process reengineeringE)business process systemization

FalseThe two general analysis techniques performed by the analyst for BPA during the analysis phase are problem analysis and revise and resubmit modeling. A)

Page 179: 53842535-CTS285-Final (1)

TrueB)False

TrueThe interview schedule lists all the people who will be interviewed, when, and for what purpose. A)TrueB)False

FalseWhen you begin an interview, the first goal is to establish control and let the interviewee know that you have a mastery of the subject.A)TrueB)False

TrueKristin, a systems analyst, needs to know detailed information about the accounts receivable process, but she is not concerned with accounts payable or general ledger, or the integration of this information. Her analysis will assist her in designing a To-Be system for the accounts receivable department. The appropriate requirements-gathering technique to be used would be interviewing.A)TrueB)False

1.In a ____ processing system, data is collected and processed in groups.

A: distributed B: data entry C: central D: batch

Page 180: 53842535-CTS285-Final (1)

469 2.The ____ stores the data and provides data access and database management functions.A: client B: server C: either a. or b. D: neither a. nor b.

456 3.The system design ____ is a document that presents the complete design for the new information system, along with detailed costs, staffing, and scheduling for completing the next SDLC phase - systems implementation.A: summary B: specification C: request for proposal D: evaluation

479 4.Computers supported by a server are called ____.A: servers B: clients C: both a. and b. D: neither a. nor b.

453 5.The most popular wireless networks are based on IEEE ____, which is a family of standards developed by the Institute of Electrical and Electronics Engineers (IEEE) for wireless LANs.A: 802.11 B: 802.16 C: 802.19 D: 802.21

476 6.The objective of ____ is to establish a company-wide strategy for using IT resources. A: ARP B: TRP C: ERP D: LRP

448 7.A ____ client design locates all or most of the processing logic at the server.A: fat B: thin C: tall D: short

458 8.In legacy systems, a ____ included a keyboard and display screen to handle input and output, but lacked independent processing capability.A: terminal B: PC C: server D: modem

453 9.When using the ____ configuration, a central wireless device called an access point is used to serve all wireless clientsA: Basic Service Set B: Extended Service Set C: Independent Service Set

Page 181: 53842535-CTS285-Final (1)

D: Dependent Service Set

477 10.____ refers to a system's ability to expand, change, or downsize easily to meet the changing needs of a business enterprise.A: Roaming B: Enterprising C: Switchability D: Scalability

450 11.You can think of the middle layer in an n-tier design as a(n) ____, because it provides the application logic, or business logic, required by the system.A: functional server B: application server C: data server D: file server

458 12.A ____ spans long distances and can connect LANs that are continents apart.A: CAN B: TAN C: WAN D: BAN

454 13.A(n) ____ Service Set is made up of two or more Basic Service Set networks. A: Distributed B: Extended C: Dependent D: Independent

477 14.____ architecture follows Internet design protocols and enables a company to integrate the new application into its e-commerce strategy.A: Server-centric B: Web-centric C: User-centric D: PC-centric

451 15.Just as processing can be done at various places in a client/server design, data can be stored in more than one location using a distributed ____.A: database centric B: database access C: database gateway D: database management

461 16.Although no standard definition exists, the term ____ architecture generally refers to systems that divide processing between one or more networked clients and a central server.A: client/server B: server/client C: host/terminal D: parent/child

455 17.In addition to Wi-Fi, another form of wireless transmission called ____ is very popular for short-distance wireless communication that does not require high power.A: Bluetooth B: Redtooth

Page 182: 53842535-CTS285-Final (1)

C: Blueconnect D: Redconnect

479 18.Every information system involves three main functions that does NOT include ____.A: data storage and access methods B: wireless networking C: application programs D: user interface

452 19.In the past, a device known as a ____ was used to connect star networks, but a switch offers advanced technology and much better performance.A: portal B: peer network C: gateway D: hub

474 20.____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security.A: Network architecture B: System architecture C: Open architecture D: Data architecture 446System ArchitectureTranslates the logical design of an information system into a physical structure . Between systems analysis and design

Environment/platformensures connectivity and easy integration of future systems

Scalability/extensibilitya systems ability to expand change or downsize easily to meet changing needs of company

applicationsprograms that handle the input, manage processing logic, and provide required output

Servera computer that supplies data, processing services, or other support to one or more computers called clients

Page 183: 53842535-CTS285-Final (1)

Mainframe architechturesystem design where the server performs all the processing

Data processing centersystem that perform all data input and output at central locaiton

termialincluded a keyboard and display screen

Stand aloneworkstation performs all functions of server by storing and processing data and providing a user interface

Local arean network LANsharing of data and hardware such as printers and scanners

Wide area network WANspans long distance and connects LANs

transparentuser sees data as if it were stored on his own workstation

distributed systemscompany wide systems that connect one or more LAN or WAN

Client/server architecturesystems that divide processing bewtwwn clients and central server where the client handles user interface and the server stores the data.

legacy database of data

fat client/thick client

Page 184: 53842535-CTS285-Final (1)

locates all to most of the application processing logic at the client

thin client *locates most of processing logic at the server

Two tier designuser interface=clientall data=server

application servermiddle layer of two and three tier

three tier (n tier)includes application server which reduces servers work load and relives clients processing tasks

middlewarein n tier system, enable tiers to communicate and pass data back and forth (glue of clients and servers)

DDBMSDistributed database management system-allows data to be stored in more than one location

Portalan entrance to a multi function web site

cloud computinga users computer does not perform processing or computing tasks. the cloud does. "third party" (more bandwidth)

Scaling on demandmatches resources to needs at any given time

bandwidth

Page 185: 53842535-CTS285-Final (1)

amount of data that can be transfered in a fixed time period

Web 2.0a shift to internet based collaboration(facebook, twitter)

Wikiweb based information repository anyone can access and change

Internet Operating systemnew layers of information are added in an overall environment

Online systemhandles transactions when a where they occur and provide output directly to users

Batch Processingdata is collected and processed in groups

POSpoint of sale-provide customer sales support and transaction processing capability

OSI modelOpen systems interconnection- describes how data actually moves form an application on one computer to a networked computer

protocolset of standards that govern network data transmission

TCP/IPbackbone of internet/popular network protocol

FTP

Page 186: 53842535-CTS285-Final (1)

file transfer protocol-provides a reliable means of copying files from one computer to another over TCP/IP network

Network topologythe way a network is configured

physical topologyactual network cabling and connections

logical topologydescribes the way the components interact

Hierarchical networkone or more powerful severs contorl the entire network

bus networksingle communication path connects the central server, departmental servers. workstations, and peripheral devices

Ring networkbus network with ends connected resembling a circle. Info transfer only goes one way

Multistation access Unitinternally wires the workstations into logical ring and manages the flow of data form one device to the next

Star networkhas central networking device called a switch, departmental server, and a connected workstation

hubused to connect star network but was replaced by a switch

Page 187: 53842535-CTS285-Final (1)

data fromesdata traffic broadcasted by hub to all connected devices

switchcommunication conduit and sends traffic only to specific network device that needs data

mesh networkused where high degree of redundancy is needed such as military. multipe data paths

routerdevice that connects network segments and determines the best data path

gatewayany network topology can connect to a larger dissimilar network like the internet

proxy serverprovides internet connectivity for internal LAN users

WLANwireless local area network

Mbsmegabits per second

MIMOmultiple input/output-relies on multiple data paths called multi path design to increase bandwidth range

BBSBasic service set(infrastructure mode) connected to an access point

access point or WAP

Page 188: 53842535-CTS285-Final (1)

central wireless device

ESSextended service set-made of of two or more BSS's

roamingmoving from one access point closer to the next

ISSindependent Service set (peer to peer mode) no access point is use and the clients connect to each other

SCMSupply chain management

ERPEnterprise resource planningThe three fundamental parts to a user interface design are:1. Navigation Mechanism2. Input mechanism, 3. Output mechanism

Which is NOT a user interface design principle?Four click rule

Typically, the first step in the user interface design process is:Examine DFDs and use cases to develop use scenarios

All but one of the following should be avoided in a message. Which one is it?Acknowledgement of a delay

User interfaces are defined in the nonfunctional requirements during the analysis phases of the SDLC.False

Page 189: 53842535-CTS285-Final (1)

The authors mention that the greatest problem facing experienced designers is using colors and fonts appropriately.False

Omar has designed a paper form using 'sans serif' fonts and for his screen (or web) forms he has used 'serif' fonts. . He is exercising good user interface design practices.True

Juan uses the term 'patient' on an appointment form, but uses the word 'client' on the payment entry screen. This violates the consistency principle of user interface design.False

Capturing data at the source is highly recommended.True

Consistency is probably the single most important factor in making a screen simple to use.True

Using a piggy bank icon on interactive forms to represent the 'save' operation is a reasonable choice.False

This report is a good choice when users want to compare data.Graphs

This report is a good choice when users want to identify something that went wrong.Exception report

Page 190: 53842535-CTS285-Final (1)

Which is NOT one of the fundamental parts to a user interface design?navigation mechanism

Chapter 10...

Program Design ___________________.Is done by analysts and then the design is passed on to programmers to code

Program design is part of which SDLC phase?Design

When changing a logical DFD into a physical DFD, it might be necessary to ________.Add system-related data stores, data flows and processes

Which is NOT a consideration when designing programs in the program design step?Use COBOL for pseudocoding

Which is NOT true of Structure Charts when designing programs?They are generally implemented with control flags that pass from the control modules to the subordinate modules

Because project teams rely more on packaged software, program design is no longer needed.False

Because (a) preexisting code needs to be understood, organized, and pieced together; and (b) it is still common for the project team to have to write some code and adapt packages to the business environment, it is therefore good for

Page 191: 53842535-CTS285-Final (1)

analysts to fully understand program design.True

The Human-Machine boundary is part of the Human-Computer Interface into usability systems.False

An audit control / audit logfile might be a system related process, data flow and data store that would be added when creating physical DFDs.True

A structure chart is a high-level diagram showing the organization and interactions of the different pieces of code within the program.False

In program design, which is NOT an activity done by analysts?Develop the database schema

As analysts move from logical design to physical design, one of the actions they will do is:Create physical DFDs

A higher-level component that contains the logic for performing other modules and the components that it calls and controls is called a _____.control module

The 'transform structure' on a structure chart has a control module that calls several subordinate modules, after which something happens.True

Page 192: 53842535-CTS285-Final (1)

Library modules are encouraged as their reusability can save programmers from rewriting the same piece of code over and over.True

Chapter 11...

1. Generally, the best way to optimize data storage for efficiency is:Normalization

2. Null valuesThreaten data integrity because they are difficult to interpret

3. Which is not an element of a CRUD matrix?Combine or join

One of the goals of the data storage design activity in the Design Phase of the SDLC is to revise logical use cases into physical use cases.False

Changing the logical data model into a physical data model is one of the activities of data storage design.True

The data storage design activity is done in which phase of the Systems Development Life Cycle?Design

Which is NOT a type of database file?Federal database

The acronym for the standard language used to access data in relational databases is:

Page 193: 53842535-CTS285-Final (1)

SQL

A type of relational database that is used extensively in data warehousing is:Multidimensional databases

The most efficient tables (in terms of storage efficiency) in relational database management systems:Have no redundant data

The most popular kind of database for applications development today is the relational database.True

Applications are of little use without the data that they support.True

Although TJ did a lot of work normalizing the database so that it is in third normal form (3NF), he may want to 'denormalize' it so that access might be faster.True

Brian wants an e-commerce system to be able to do a lot of rapid processing - like search for particular keywords in documents; return the price of an item; update quantities in the shopping cart. He is probably building an Expert System.False

Chapter 12...

The final phase of the Systems Development Life Cycle (SDLC) is Implementation.True

Page 194: 53842535-CTS285-Final (1)

Even if there were flaws in the analysis and design phases, those can easily be overcome in the implementation phase.False

Sometimes a project manager can help programmers acquire additional skills through training or through working with more skilled programmers who serve as mentors.True

Type of documentation teaches people how to use major components of the system (like an introduction to the basic operations of the system):Tutorials

Creating user manuals, training manuals, and online help system are related to:User documentation

Carlos is working on testing and documentation for a new systems project. What phase of the SDLC is he in?implementation

One of the mistakes of system development is:Thinking that programming is the focal point of systems development

Bridget is managing a systems development project. The programmers have gotten farther and farther behind in the schedule. One thing she should NOT do is:Add more programmers to the development team

On test plans:Each individual test has a specific objective and describes a set of very specific test cases to examine

Page 195: 53842535-CTS285-Final (1)

The two fundamental documentation types are:System documentation and User documentation

During the implementation phase of the Systems Development Life Cycle (SDLC), systems analysts will probably be designing a variety of tests that will be performed on the new system. As programs are finalized, the systems analysts may conduct these tests to verify that the system actually does what it was designed to do. (false.....designing tests, working on documentation, selecting a conversion strategy, and implementing the new system.)true

During project planning, the project manager identified the programming tasks and assigned them to programming staff for programming.true

Online documentation will probably be the dominant form of user documentation in the near future.True

Alpha and beta tests are part of systems testingTrue

Programming-Resources-Coordination-Schedule

Testing

Page 196: 53842535-CTS285-Final (1)

-test plan-test cases-test types

Documentation-User: manuals, training, tutorials, help (msdn for c#)- System: specs, DFDs, ERDs, Feasibility, Project Plan

Aggregationsfigures out "how much did we do in sales today"

VolumetricsProcess of estimating the amount of data that the hardware will need to support. Is used for determining how much space is needed for database. Record Size x Overhead = _______ (add this to orig. record size)

Sandbox environmentfor developers/programmers. An isolated computing environment that works and looks just like the real business environment. This is important bc you don't want testing being done where people are trying to run the business.

Two reasons we would use data files:Complexity and Cost

DBMS "Database Management System"software that creates and manipulates these databases. A software system that is used to create, maintain, and provide controlled access to user databases.

end user DBMSMicrosoft Access- small-scale databases that are used to enhance personal productivity

Page 197: 53842535-CTS285-Final (1)

enterprise DBMSA product that processes large organizational workgroup databases. These products support many users, perhaps thousands, and many different database applications. Such DBMS products support 24/7 operations and can manage databases that span dozens of different magnetic disks with hundreds of gigabytes or more of data. (Ex: IBM's DB2, Microsoft's SQL Server, and Oracle's Oracle are examples of enterprise DBMS products,)

fileselectronic lists of data that have been optimized

psuedocodetalking the same language as programmers, without using syntax

Chapter 13...

What are the two 'conversion styles' to use on a project?direct and parallel

In a parallel conversion:both the old and new systems are run for a period of time

Which of the following conversion options is the most risk-filled?the direct conversion style

One of the activities when considering post-implementation activities of a new system is to include systems maintenance.True

Page 198: 53842535-CTS285-Final (1)

Project assessment is part of post-implementation.True

What is NOT normally part of transitioning to a new system?Developing the user interface screens

Which is NOT a step in Lewin's model for managing organization changeProgram

Lewin's Change Management ModelUnfreeze- first stage of change involves preparing the organization to accept that change is necessary, which involves break down the existing status quo before you can build up a new way of operating.

Change- the change stage is where people begin to resolve their uncertainty and look for new ways to do things. People start to believe and act in ways that support the new direction.

Refreeze- the organization is ready to refreeze when the changes are taking shape and people have embraced the new ways of working, The outward signs of the refreeze are a stable organization chart, consistent job descriptions, and so on. The refreeze stage also needs to help people and the organization internalize or institutionalize the changes. This means making sure that the changes are used all the time; and that they are incorporated into everyday business. With a new sense of stability, employees feel confident and comfortable with the new ways of working.

Plans to handle potential business disruption due to technical problems during conversion are covered in the:

Page 199: 53842535-CTS285-Final (1)

Business Contingency Plan

One of the problems with a parallel conversion is:the users have to enter data into both systems

If a trainer has been hired to train all staff before the new system goes 'live', it might be best to use:phased conversion

Frequently, as people get used to certain ways of doing things, they view their job in terms of those processes rather than in terms of the business goals of serving customers.True

Knowing that sometimes things happen due to technical problems when implementing a new system is a great reason to have a business contingency plan.True

Part of the migration / transition plan should include helping people adopt the new system.True

Post-implementation activities include:Support: providing assistance in the use of the new systemMaintenance: continuing the refine and improve the systemProject Assessment: analyzing the project to understand what activities were done well- and should be repeated-and what activities need improvement in future projects.

The three key roles in any major organization change are:

Page 200: 53842535-CTS285-Final (1)

1. Project sponsor is the person or organizational unit that wants the change. 2. Change agent is the person or group who leads the change effort.3. Potential adopter is the person or group who must actually do the changing.

Two basic strategies to motivating adoption:Informational strategy- to convince potential adopters that the change is for the better. (works best when more benefits than costs)Political strategy- organizational power, not information, is used to motivate change. (this is used when the cost-benefit set of the target adopters has more costs than benefits)

Change requests typically come from five sources:1. most common is problem reports from the operations group that identifies bugs in the system that must be fixed.2. enhancements to the systems from users. 3. other system development projects4. those that occur when underlying software or networks change. 5. Senior management. (driven by changes in the organization's strategy)

Four types of databases that are likely to be encountered during a project:legacy, relational, object, and multidimensional.

Legacy- use older and sometimes outdated technology and are rarely used to develop new technology.Relational- most popular kind of database for app dev. today. (based on collections of tables that are related to each other through common fields known as foreign keys) Object- contain data and processes that

Page 201: 53842535-CTS285-Final (1)

are represented by object classes, and relationships btw object classes are shown by encapsulating one object class within another and are mainly used for multimedia applications (graphics, video & sound)Multidimensional- popular with the increase in data warehousing. it stores pre-calculated quantitative information (totals, averages) at the intersection of dimensions (time, salesperson, product) to support appl that require data to be sliced and diced.

Direct Conversion strategy stylestopping the old system and starting the new system on a given date (high risk, Low resources, Low time, Hi Cost)

Parallel Conversion strategy styleusing both old and new systems until it is evident that the new system performs correctly. (Low risk, high Resources, Hi potential/time , Hi Cost)

Pilot Conversion location styleimplementation process that introduces the new system in one part of the organization on a trial basis; when new system is working properly, it is introduced in other parts of the organization. (Med Risk, Med resources, Med time, Med cost)

Phased Conversion location styleimplementation process that introduces components of the new system in stages, until the entire new system is operational. (ex: start with all the colorado locations, and if it works, then do all the other locations) (Low Risk, Hi resources, High time, Med cost)

Simultaneous Conversion

Page 202: 53842535-CTS285-Final (1)

converting all locations at the same time. High risk, high cost, short time. (Hi Risk, Low resources, Low time, Med cost)

In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system.process 2A key physical design element is the ____, which describes how users interact with a computer system.UI 3____ describes the relationship between computers and the people who use them to perform business-related tasks.HCI 4A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices.GUI 5Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.storyboard 6Interface designers can obtain data, called ____ metrics, by using software that can record and measure user interaction with a system.usability 7Good user interface design is based partly on ____, which describes how people work, learn, and interact with computers.ergonomics

Page 203: 53842535-CTS285-Final (1)

8Good interface design is based partly on ____, which focuses on how an interface can be made attractive and easy to use.aesthetics 9Good interface design is based partly on ____, which provides the operational structure required to carry out the design objectives.interface technology 10Input ____ are templates that make it easier for users to enter data.masks 11The ____ is a control feature at the top of a data entry screen that displays the main menu options.menu bar 12

In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature that initiates an action such as printing a form or requesting help.command button 13

In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature that is used to represent on or off status and switches to the other status when clicked.toggle button 14

In a data entry screen, such as that shown in the accompanying figure, a ____ is a control feature that displays the

Page 204: 53842535-CTS285-Final (1)

current selection and, when a user clicks the arrow, a roster of available choices displays.drop-down list box 15

In a data entry screen, such as that shown in the accompanying figure, a ____ can display messages or provide a place for a user to enter data.text box 16

In a data entry screen, such as that shown in the accompanying figure, a ____ is a control feature that is used to select one or more choices from a group.check box 17Printed output is used in ____ documents, which are output documents that are later entered back into the same or another information system.turnaround 18Although the vast majority of reports are designed graphically, some systems still produce one or more ____ reports that use a character set with fixed spacing.character-based 19A(n) ____ produces one or more lines of output for each record processed.detail report 20A(n) ____ displays only those records that meet a specific condition or conditions.exception report 21For upper-level managers who often want to see total figures and do not need

Page 205: 53842535-CTS285-Final (1)

supporting details, a(n) ____ is appropriate.summary report 22In a well-designed detail report, a field called a(n) ____ field controls the output.control 23A ____ report is a type of detail report in which a control break causes specific actions, such as printing subtotals for a group of records.control break 24Some firms use ____ facsimile to allow a customer to request a fax using e-mail, the company Web site, or by telephone.automated 25____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving.COM 26The concept that the quality of the output is only as good as the quality of the input, which sometimes is known as ____, is familiar to IT professionals, who recognize that the best time to avoid problems is when data is entered.garbage in, garbage out (GIGO) 27On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms.control zone 28

Page 206: 53842535-CTS285-Final (1)

In a source document, if totals are included on a form, they appear in the ____ zone.totals 29On a source document, the main part of the form, called the ____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.body zone 30Because users tend to skim a Web page, picking out individual words and sentences, Web designers must use ____ to capture and hold a user’s attention.scannable text 31When designing data entry screens, provide an on-screen instruction to let users know the date format, and provide an example if the user must enter ____.separators 32An existence check is a data validation check that ____.is used for mandatory data items 33A range check is a data validation check that ____.tests data items to verify that they fall between a specified minimum and maximum value 34A reasonableness check is a data validation check that ____.identifies values that are questionable, but not necessarily wrong 35A combination check is a data validation check that ____.

Page 207: 53842535-CTS285-Final (1)

is performed on two or more fields to ensure that they are consistent or reasonable when considered together 36____ protects privacy rights and shields an organization’s proprietary data from theft or unauthorized access.output security 37Companies use various output ____ methods to maintain output integrity and security.control 38A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily.diskless 39In most organizations, the ____ department is responsible for output control and security measures.IT 40Because every piece of information should be traceable back to the input data that produced it, a(n) ____ trail must be provided that records the source of each data item and when it entered the system.audit 41detail lineIn a detail report, each line of output printed. 42controlsTo build an interface that is easy to learn and use, select only those images that

Page 208: 53842535-CTS285-Final (1)

users can understand easily, if images are used to identify these.

43report headerIdentifies the report, and contains the report title, date, and other necessary information.

44existenceType of check that is used for mandatory data items. 45report footerCan include grand totals for numeric fields and other end-of-report information. 46dialog boxAllows a user to enter information about a task that the system will perform. 47source documentIn this, information should flow on the form from left to right and top to bottom, in accordance with the way users read documents naturally. 48exceptionType of report that is useful when the user wants information only on records that might require action. 49input volumeTo reduce this, do not input data that the user can retrieve from system files or calculate from other data. 50interface

Page 209: 53842535-CTS285-Final (1)

When designing this, to provide feedback to users, display messages at a logical place on the screen, and be consistent.

In an object-oriented system, objects can ____ certain attributes from other objects.inherit 2____ is a widely used method of visualizing and documenting an information system.UML 3An object’s ____ are the tasks or functions the object performs. methods 4____ allows objects to be used as modular components anywhere in the system.Encapsulation 5The concept that a message gives different meanings to different objects is called ____polymorphism 6Your red Mustang is a(n) ____ of the CAR class.instance 7Objects can have a specific attribute called a(n) ____, which describes the object’s current status.state 8As shown in the accompanying figure, objects within a class can be grouped into ____, which are more specific categories within a class.subclasses

Page 210: 53842535-CTS285-Final (1)

9A use case ____ is a visual summary of several related use cases within a system or subsystem.diagram 10A(n) ____ defines specific tasks that an object can perform.method 11A(n) ____ represents a real person, place, event, or transaction.object 12A class can belong to a more general category called a ____.superclass 13A(n) ____ is a specific member of a class.instance 14____ are characteristics that describe the object.attributes 15____ enable objects to communicate and interact as they perform business functions and transactions required by the system.relationships 16A major advantage of O-O designs is that systems analysts can save time and avoid errors by using ____ objects.modular 17In a use case, an external entity is called a(n) ____.actor

Page 211: 53842535-CTS285-Final (1)

18The UML represents an object as a(n) ____ with the object name at the top, followed by the object’s attributes and methods.rectangle 19A(n) ____ is a group of similar objects.class 20An object has certain ____, like the make, model, and color of a car.attributes 21A firm that offers outsourcing solutions is called a ____ provider.service 22Typically, companies choose in-house software development for all of the following reasons EXCEPT to ____obtain input from other companies who already have implemented the software 23A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.ASP 24Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.middleware 25Some industry leaders predict that ____ computing will offer an overall online software and data environment supported by supercomputer technology.cloud

Page 212: 53842535-CTS285-Final (1)

26Companies that develop software for sale are called software ____.vendors 27Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ____, is changing the picture dramatically.Software as a Service 28Some firms offer ____, which provide powerful Web-based support for transactions such as order processing, billing, and customer relationship management.IBS 29A software ____ is software that is obtained from a vendor or application service provider.package 30Building an application in a ____ environment can offer greater benefits, and sometimes greater risks, compared to a traditional environment.web-based 31The choice between developing versus purchasing software often is called a ____ decision.build-or-buy 32____ is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services, for a fee, on a temporary or long-term basis.outsourcing

Page 213: 53842535-CTS285-Final (1)

33When determining outsourcing fees, a ____ has a variable fee based on the number of users or workstations that have access to the application.subscription model 34The software that a company’s IT department makes, builds, and develops is called ____ software.in-house 35A(n) ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.transaction 36When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and user support.fixed fee model 37Microsoft’s ____ is one of the major Web-based development environments..NET 38A firm that enhances a commercial software package by adding custom features and configuring it for a particular industry is called a(n) ____.VAR 39Oracle Corporation offers a service called ____, which provides e-business applications on a fixed fee basis.Oracle On Demand 40A ____ is a document that describes a company, lists the IT services or products

Page 214: 53842535-CTS285-Final (1)

needed, and specifies the features required.request for proposal (RFP) 41A key physical design element is the ____, which describes how users interact with a computer system.UI 42A(n) ____ is a user interface that allows users to interact with graphical objects and pointing devices.GUI 43Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and designStoryboard 44Good interface design is based partly on ____, which provides the operational structure required to carry out the design objectives.interface technology 45Input ____ are templates that make it easier for users to enter data.masks 46In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature that initiates an action such as printing a form or requesting help.command button 47In a data entry screen, such as that shown in the accompanying figure, a(n) ____ is a control feature that is used to

Page 215: 53842535-CTS285-Final (1)

represent on or off status and switches to the other status when clicked.toggle 48In a data entry screen, such as that shown in the accompanying figure, a ____ can display messages or provide a place for a user to enter data.text 49In a data entry screen, such as that shown in the accompanying figure, a ____ is a control feature that is used to select one or more choices from a group.check box 50A(n) ____ displays only those records that meet a specific condition or conditions.exception report 51The concept that the quality of the output is only as good as the quality of the input, which sometimes is known as ____, is familiar to IT professionals, who recognize that the best time to avoid problems is when data is entered.garbage in, garbage out 52On a source document, the ____ contains codes, identification information, numbers, and dates that are used for storing completed forms.control zone 53On a source document, the main part of the form, called the ____, usually takes up at least half of the space on the form and contains captions and areas for entering variable data.body zone 54

Page 216: 53842535-CTS285-Final (1)

Because users tend to skim a Web page, picking out individual words and sentences, Web designers must use ____ to capture and hold a user’s attention.scannable text 55When designing data entry screens, provide an on-screen instruction to let users know the date format, and provide an example if the user must enter ____.separators 56An existence check is a data validation check that ____.is used for mandatory data 57A range check is a data validation check that ____.tests data items to verify that they fall between a specified minimum and maximum value 58A reasonableness check is a data validation check that ____.identifies values that are questionable, but not necessarily wrong 59A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled more easily.diskless 60In most organizations, the ____ department is responsible for output control and security measures.IT 61

Page 217: 53842535-CTS285-Final (1)

A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.manipulation 62A(n) ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a databaseDBMS 63In a file-oriented information system, a transaction file ____.stores records that contain day-to-day business and operational data 64When a primary key combines two or more fields, it is called any of the following EXCEPT a ____ key.constructed 65When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.buffer 66A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.structure 67In the event of a file catastrophe, ____ can be used to restore the file or database to its current state at the time of the last backup.recovery procedures 68____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.normalization

Page 218: 53842535-CTS285-Final (1)

69One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.referential 70The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.schema 71Any field that is not a primary key or a candidate key is called a ____ key.nonkey 72A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.query language 73____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange dataODBC 74Most date formats now are based on the model established by the International Organization for Standardization (ISO), which requires a format of ____.YYYYMMDD 75In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.primary key 76

Page 219: 53842535-CTS285-Final (1)

____ describes how instances of one entity relate to instances of another entity.cardinality 77In the accompanying figure, any field that could serve as a primary key is called a ____.candidate key 78A(n) ____ is a set of letters or numbers that represents a data item.code 79____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.scalability 80In a file-oriented information system, a security file ____.is created and saved for backup and recovery purposes 81At the center of the network shown in the accompanying figure is the ____, which manages the network and acts as a communications conduit for all network traffic.switch 82The ____ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.system environment 83In a(n) ____ design, the remote user’s keystrokes are transmitted to the

Page 220: 53842535-CTS285-Final (1)

mainframe, which responds by sending screen output back to the user’s screen.centralized 84____ describes how data actually moves from an application on one computer to an application on another networked computer.OSI 85The ____ topology allows the expansion of wireless access over a wide area.ESS 86When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dynamic e-commerce environment.greater initial investment but provides more flexibility 87Most business WLANs use access points and do not utilize the ____.ISS 88A batch processing system has all of the following characteristics except ____.the information system is available whenever necessary to support business operations 89All of the following use access points except ____.ISS 90The ____ standard is compatible with the 802.11b standard.802.11g802.11n 91

Page 221: 53842535-CTS285-Final (1)

A system design where the server performs all the processing is described as ____.mainframe architecture 92A ____ is an entrance to a multifunction Web site.portal 93In a ____, one or more powerful servers controls the network, and departmental servers control lower levels of processing and network devices.hierarchical network 94A(n) ____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.WLAN 95A ____ resembles a circle of computers that communicate with each other.ring network 96In the OSI (Open System Interconnection) model, the presentation layer ____.ssures that data is uniformly structured and formatted for network transmission 97The ____ section in a typical system design specification contains the complete design for a new system, including the user interface, outputs, inputs, files, databases, and network specificationssystem components 98In the ____ configuration, a central wireless device is used to serve all wireless clients.

Page 222: 53842535-CTS285-Final (1)

BSS 99In a client/server design, a database server ____.processes individual SQL commands 100In the OSI (Open System Interconnection) model, the application layer ____.provides network services requested by a local workstation 101A module that performs a single function or task has a high degree of ____, which is desirable.cohesion 102Application ____ is the process of constructing the programs and code modules that serves as the building blocks of an information system.development 103Software ____ is a software development process that stresses solid design, effective structure, accurate documentation, and careful testing.engineering 104In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, to review the interface with a cross-section of people who will work with the new system and ensure that all the necessary features have been included.design 105In a technique called ____ testing, the programmer simulates each program outcome or result and displays a message

Page 223: 53842535-CTS285-Final (1)

to indicate whether or not the program executed successfully.stub 106In a(n) ____ approach, the systems analyst defines the overall objectives of a system and then breaks them down into subsystems and modules.top-down 107____ describes the degree of interdependence among modules.coupling 108____ graphically represent the logic and interaction between program modules using a series of symbols connected by arrows.flowcharts 109In sequence, the four steps typically followed to create a structure chart are ____.review the DFDs; identify modules and relationships; add couples, loops, and conditions; analyze the structure chart and the data dictionary 110____ requires that a software supplier document all testing and maintain records of test results.ISO (International Organization for Standardization) 111____ measures a module’s scope and processing characteristics.cohesion 112A class diagram includes the class ____, which describe the characteristics of objects in the class.

Page 224: 53842535-CTS285-Final (1)

attributes 113As the accompanying figure illustrates, the ____ changeover method involves implementing the complete new system at a selected location of the company.pilot operation 114The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.unit 115A Web site for the ____ describes a variety of IT education and training resources.Center for the Application of Information Technologies (CAIT) 116Successful completion of system testing is the key to user and management approval, which is why system tests sometimes are called ____.acceptance tests 117Many organizations require a more formal type of desk checking called a structured walkthrough, or ____ review.code 118In a structure chart, a control couple shows a message, also called a status ____, which one module sends to another.flag 119Unless a problem must be corrected, or modifications or enhancements must be made, access to the operational environment is limited to ____ and must be strictly controlled.

Page 225: 53842535-CTS285-Final (1)

users 120To achieve better, faster, and less expensive methods of software development, ____ designed the Capability Maturity Model (CMM)®, which improves quality, reduces development time, and cuts costs.SEI (Software Engineering Institute)

Chapter 7 – Development Strategies MULTIPLE CHOICE 1. Although the traditional model of software acquisition still accounts for more software acquisition, anew model called ____ is changing the picture dramatically.a. Hardware as a Help c. Processing as a Productb. Software as a Service d. Storage as a Solution2.Microsoft’s ____ is one of the major Web-based development environments.a. WebSphere c. NetSphereb. .NET d. .WEB3. Building an application in a ____ environment can offer greater benefits, and sometimes greater risks,compared to a traditional environment.a. GUI c. cloudb. Web-based d. multinational4. Web-based software usually requires additional layers, called ____, to communicate with existingsoftware and legacy systems.a. freeware c. middlewareb. shareware d. public domain software5. Some industry leaders predict that ____ computing will offer an overall online software and dataenvironment supported by supercomputer technology.a. interpolated c. outsourcedb. mainframe d. cloud6. ____ is the transfer of information systems development, operation, or maintenance to an outside firmthat provides these services, for a fee, on a temporary or

Page 226: 53842535-CTS285-Final (1)

long-term basis.a. Outsourcing c. Subscriptionb. Commission d. External provision7. A firm that offers outsourcing solutions is called a ____ provider.a. subscription c. serviceb. software d. resource8. A(n) ____ is a firm that delivers a software application, or access to an application, by charging a usageor subscription fee.a. ASP c. ISPb. OSP d. USP9. Some firms offer ____, which provide powerful Web-based support for transactions such as orderprocessing, billing, and customer relationship management.a. ASP c. fixed usageb. IBS d. fixed-fee transfer

10. Oracle Corporation offers a service called ____, which provides e-business applications on a fixed feebasis.a. WebSphere c. Business Process Outsourcingb. .NET d. Oracle On Demand11. When determining outsourcing fees, a ____ uses a set fee based on a specified level of service and usersupport.a. fixed fee model c. subscription modelb. usage model d. transaction model12. When determining outsourcing fees, a ____ has a variable fee based on the number of users orworkstations that have access to the application.a. fixed fee model c. subscription modelb. usage model d. transaction model13. A(n) ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application.a. method c. transactionb. administrative d. interpolated14. The choice between developing versus purchasing software often is called a ____ decision.a. build or make c. transactionalb. subscription d. build or buy15.The software that a company’s IT department makes, builds, and develops is called ____ software.

Page 227: 53842535-CTS285-Final (1)

a. in-house c. externalb. internal d. indexed16. A software ____ is software that is obtained from a vendor or application service provider.a. package c. subscriptionb. cluster d. aggregate17. Companies that develop software for sale are called software ____.a. VARs c. vendorsb. resellers d. packages18. A firm that enhances a commercial software package by adding custom features and configuring it for aparticular industry is called a(n) ____.a. BRE c. OSPb. IRH d. VAR19. Typically, companies choose in-house software development for all of the following reasonsexcept to____.a. minimize changes in business procedures and policiesb. meet constraints of existing systems and existing technologyc. develop internal resources and capabilitiesd. obtain input from other companies who already have implemented the software

20. Advantages of purchasing a software package over developing software in-house include all of thefollowingexcept ____.a. satisfaction of unique business requirementsb. lower costs and less time to implementc. proven reliability and performance benchmarksd. less technical development staff 21. A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which hasbeen configured in a specific manner to enhance user productivity.a. application c. interfaceb. configuration d. interpolation22. In addition to configuring software, an IT staff can create a user ____, which includes screens,commands, controls, and features that enable users to interact more effectively with the application.a. montage c. interfaceb. index d. package23. Buyers can customize a software package by ____.a.

Page 228: 53842535-CTS285-Final (1)

negotiating directly with the software vendor to make enhancements to meet the buyer’sneeds by paying for the changesb. purchasing a basic package that vendorswill customize to suit the buyer’s needs c. purchasing the software and making their own modifications, if this is permissible under theterms of the software licensed. all of the above24. Some data files should be totally hidden from view, while others should have ____ so users can view,but not change, the data.a. no-access properties c. full-access propertiesb. read-only properties d. write-only properties25. A ____ is a document that describes a company, lists the IT services or products needed, and specifiesthe features required.a. request for quotation (RFQ) c. request for proposal (RFP)b. net present value (NPV) d. return on investment (ROI)26. When companies use a ____, they already know the specific products or service they want and need toobtain price quotations or bids from vendors.a. request for quotation (RFQ) c. request for proposal (RFP)b. net present value (NPV) d. return on investment (ROI)27. A ____ measures the time a package takes to process a certain number of transactions.a. newsgroup c. benchmark b. parameter d. default28. When planning a slide presentation to management at the end of the systems analysis phase, systemsanalysts should keep all of the following suggestions in mindexcept ____.a. summarize the primary viable alternativesb. ignore time for discussion and questions and answers

A data ____, which is a framework for organizing and storing data, consists of one or more files or tables.

structure

One problem in a file processing environment is ____, which means that data common to two or

data redundancy

Page 229: 53842535-CTS285-Final (1)

more information systems is stored in several places.In a typical file processing environment, ____ problems can occur if updates are not applied in every file.

data integrity

In a file-oriented information system, a transaction file ____.

stores records that contain day-to-day business and operational data

In a file-oriented information system, a work file ____.

is a temporary file created by an information system for a single task

A(n) ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database.

DBMS

____ means that a system can be expanded, modified, or downsized easily to meet the rapidly changing needs of a business enterprise.

Scalability

A(n) ____, which is used to access stored data, allows a user to specify a task without specifying how the task will be accomplished.

query language

With a(n) ____ language, the user provides an example of the data requested.

QBE

A data ____ language controls database operations, including storing, retrieving, updating, and deleting data.

manipulation

The complete definition of a database, including descriptions of all fields, tables, and relationships, is called a(n) ____.

schema

____ is an industry-standard protocol that makes it possible for software from different vendors to interact and exchange data

ODBC

JDBC enables ____ applications to exchange data with any database that uses SQL statements and is compliant with the standard.

java

A ____ is a text document written in HTML. web pageHTML uses formatting codes called ____, which specify how the text and visual elements on a Web page will be displayed in a Web browser.

tags

To bridge the gap between a database and the middleware

Page 230: 53842535-CTS285-Final (1)

Web and enable data to be viewed and updated, it is necessary to use ____, which is software that integrates different applications and allows them to exchange data.During the systems design phase, ____ fields are used to organize, access, and maintain data structures.

key

When a primary key combines two or more fields, it is called any of the following EXCEPT a ____ key.

A) constructed   B) composite   C) combination   D) concatenated

Any field that is not a primary key or a candidate key is called a ____ key.

nonkey

primary key

Page 231: 53842535-CTS285-Final (1)

In the accompanying figure, a ____ is a field or combination of fields that uniquely and minimally identifies a particular member of an entity.

In the accompanying figure, any field that could serve as a primary key is called a ____.

candidate key

Page 232: 53842535-CTS285-Final (1)

In the accompanying figure, a ____ is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.

foreign key

One type of validity check, called ____ integrity, is a set of rules that avoids data inconsistency and quality problems.

referential

A(n) ____ is a graphical model of an information system that depicts the relationships among system entities.

ERD

In an entity-relationship diagram, entities are represented as ____.

rectangles

____ describes how instances of one entity relate Cardinality

Page 233: 53842535-CTS285-Final (1)

to instances of another entity.One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.

cardinality

____ is the process of creating table designs by assigning specific fields or attributes to each table in a database.

Normalization

A(n) ____ is a set of letters or numbers that represents a data item.

code

Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.

mnemonic

____ codes are numbers or letters assigned in a specific order.

Sequence

____ codes combine data from different item attributes, or characteristics, to build the code.

Derivation

____ codes use a keyword to encode a number. Cipher

 1.____ is the measure of a system¶s ability to expand, change, or downsize easily to meet thechanging needs of a business enterprise.Scalability2. Every information system involves ____.all of the above3. A system design where the server performs all the processing is described as ____.mainframe architecture4. In a(n) ____ design, the remote user¶s keystrokes are transmitted to the mainframe, whichresponds by sending screen output back to the user¶s screen.Centralized5. a client/server design, a database server ____.Processes individual SQL commands6. In an n-tier system, special utility software called ____ enables the tiers to communicate and pass data back and forth.Middleware7. In a client/server architecture, just as processing can be done at various places,

Page 234: 53842535-CTS285-Final (1)

data can bestored in more than one location using a(n) ____.DDBMS8. When developing e-business systems, an in-house solution usually requires a ____ for acompany that must adapt quickly in a dynamic e-commerce environment.greater initial investment but provides more flexibility9. A ____ is an entrance to a multifunction Web site.portal10. During business hours, a salesperson can enter a sale on a ____ terminal, which is part of an information system that handles daily sales transactions and maintains the online inventoryfile.POS11. A batch processing system has all of the following characteristicsexcept ____.the information system is available whenever necessary to support business operations 12. In the OSI (open system interconnection) model, the application layer ____.provides network services requested by a local workstation13. ____ describes how data actually moves from an application on one computer to anapplication on another networked computer.OSI14. In the OSI (open system interconnection) model, the presentation layer ____.assures that data is uniformly structured and formatted for network transmission15. In the OSI (open system interconnection) model, the session layer ____.

Page 235: 53842535-CTS285-Final (1)

defines control structures that manage the communications link between computers16. In a ____, one or more powerful servers controls the network, and departmental serverscontrol lower levels of processing and network devices.hierarchical network 17. In a ____, a single communication path connects the network server, departmental servers,workstations, and peripheral devices.bus network 18. A disadvantage of a bus network is that ____.performance can decline as more users and devices are added19. A ____ resembles a circle of computers that communicate with each other.ring network 20. A ____, such as that illustrated in the accompanying figure, has a central networkingdevice that manages the network.star network 21. At the center of the network shown in the accompanying figure is the ____, which managesthe network and acts as a communications conduit for all network traffic.Switch 22. In all cases, a network must use a(n) ____, which is a set of standards that govern datatransmission.Protocol23. A popular network protocol is ____, which today is the backbone of the Internet.TCP/IP24. A(n) ____ is relatively inexpensive to install and is well-suited to workstations and userswho are not anchored to a specific desk or location.WLAN25. The maximum speed for wireless network standards is measured in ____.Mbps

Page 236: 53842535-CTS285-Final (1)

26. To increase bandwidth, the IEEE created two ____ to its initial standard to offer considerable improvement in transmission speed.Amendments27. The ____ standard is compatible with the 802.11b standard.both B and C28. The ____ standard is used by most WLANs.802.11g29. The ____ technology is compatible with earlier 802.11 versions.MIMO30. In its wireless configuration, the ____ point is similar to a hub in the LAN star topology,except it provides network services to wireless clients instead of wired clients.Access31. In the ____ configuration, a central wireless device is used to serve all wireless clients.BSS32. The ____ topology allows the expansion of wireless access over a wide area.ESS