You are on page 1of 150

A)

The project plan is the document that is used to _____.

describe how the project team will

A)

go about developing the proposed

describe how the project team will go about developing

system

the proposed system


B)
outline the tasks to be addressed in developing the
proposed system and develop a time estimate for each
task.
C)
outline the technical, economic, and organizational
feasibility of the proposed system
D)
summarize the business need and explain how the
proposed system supports that need and creates value
E)
all of the above

B)

Deciding how the hardware, software, and network

design

infrastructure will operate occurs during the _____ phase of


the SDLC.
A)
analysis
B)
design
C)
implementation
D)
planning
E)
strategy

D)

The _____ is generated by the department or person that

system request

has an idea for a new information system.


A)
economic feasibility analysis
B)
requirements document
C)
project charter
D)
system request
E)

project plan
B)

Overall, the consistent notation, integration among the

UML

diagramming techniques, and application of the diagrams


across the entire development process makes ________ a
powerful and flexible tool set for analysts and developers.
A)
CASE
B)
UML
C)
DFDs
D)
EPCs
E)
Flow Charts

C)

The primary goal of the systems analyst is to _____.

create value for the organization

A)
acquire a working tool
B)
create a wonderful system
C)
create value for the organization
D)
establish the phases of the SDLC
E)
identify opportunities for improvement

B)

Interfaces (e.g., menus, reports, forms) are specified

design

during the _____ phase of the SDLC.


A)
analysis
B)
design
C)
implementation
D)
planning
E)
system delivery

E)all of the above

Developing an information system is similar to building a


house because you have to
A)
start with a basic idea of what is needed
B)
create simple drawings of what is needed and allow the
customer to provide feedback
C)
develop a detailed set of blueprints
D)
actually build the project, often with some changes
directed by the customer
E)
all of the above

E)

Understanding why an information system should be built

planning

and determining how the project team will build it is part


of the _____ phase of the SDLC.
A)
analysis
B)
system request
C)
gathering
D)
initiating
E)
planning

E)

_____ development is a structured design methodology

none of the above

that proceeds in a sequence from one phase to the next.


A)
analysis
B)
design
C)
implementation
D)
all of the above
E)
none of the above

B)

The project sponsor is the _____.

person or department that

A)

requested the system

lead systems analyst on the project team


B)
person or department that requested the system
C)
lead computer programmer charged with writing the code
for the system
D)
project team leader in charge of developing the system
E)
any of the above may fill the role of the project sponsor

D)

The phase of the SDLC when the system is actually built or

implementation

purchased is the _____.


A)
analysis
B)
construction
C)
design
D)
implementation
E)
planning

B) Design

In which phase of the SDLC is the system specification


developed?
A)
analysis
B)
design
C)
implementation
D)
planning
E)
system delivery

D)

The principal disadvantages(s) with the waterfall

all of the above

development methodology is (are) _____.


A)

a long time elapses between completion of the system


proposal and the delivery of the system
B)
if the team misses important requirements, expensive
post-implementation programming may be needed
C)
the design must be completely specified on paper before
programming begins
D)
all of the above
E)
none of the above
C) Process-Centered

A development methodology that focuses on the


processes as the core of the system is said to be _____.
A)
action-oriented
B)
structure-oriented
C)
process-centered
D)
object-oriented
E)
data-centered

D) Systems development life

The process of understanding how an information system

cycle

can support business needs, design the system, build it,


and deliver it to users is the _____.
A)
analysis phase of the SDLC
B)
object oriented approach
C)
rule for creating a CASE tool
D)
systems development life cycle
E)
waterfall development methodology

True

The business analyst serves as the primary contact point

with the project.


A)
True
B)
False
False

An analyst that focuses on the technical issues of the


organization (hardware, software, databases and
networks) is commonly called a change management
analyst.
A)
True
B)
False

True

Determining who will use the system, what the system will
do, and where and when it will be used is performed
during the analysis phase of the SDLC.
A)
True
B)
False

True

The primary advantage of the Waterfall Development


methodology is requirements are completely specified and
held relatively constant prior to programming.
A)
True
B)
False

False

An analyst with business skills that understands the


business issues surrounding a system is commonly called
a project manager.
A)
True
B)
False

True

In the Unified Process, the analysis phase follows


requirements.

A)
True
B)
False
False

The primary objective of the systems analyst is to create a


wonderful system.
A)
True
B)
False

True

The new information system is purchased or built during


the implementation phase of the SDLC.
A)
True
B)
False

False

The planning phase is the fundamental process of


understanding how an information system should be built
and determining who on the project team will build it.
A)
True
B)
False

True

Phased development is considered a special case of RAD


approach to developing systems.
A)
True
B)
False

False

A project manager most likely would not have worked as a


systems analyst in the past, since project management
career track is independent of the system analyst's career
track.
A)
True
B)

False
True

In extreme programming programmers pair up to write the


code.
A)
True
B)
False

False

Parallel development relies on only one iteration of the


analysis phase.
A)
True
B)
False

True

For urgent projects, it is a good idea to use a prototyping


methodology.
A)
True
B)
False

False

Project team members focus on getting the project done,


leaving change management to the business managers.
A)
True
B)
False

False

The creation of a design prototype that is not a working


information system, but represents a part of the system
that needs additional refinement happens with the
prototyping methodology.
A)
True
B)
False

True

Extreme programming is founded on core principles such


as communication, simplicity, feedback, and courage

A)
True
B)
False
True

Scott has been assigned to focus on the users during the


upcoming information systems installation. Scott will
provide user training and documentation. His role is to
serve as a change management analyst.
A)
True
B)
False

True

The analyst that develops ideas and suggestions to


improve the application of information technology is
commonly called a systems analyst.
A)
True
B)
False

True

You are carrying out a project that involves information


systems for the operation of controls in a passenger jet
craft. This is an ideal project for you to follow a throwaway
prototyping methodology.
A)
True
B)
False

False

The waterfall development methodology derives its name


from the salmon that swim up the waterfall against the
current.
A)
True
B)
False

False

The business analyst is responsible for ensuring that the


project is completed on time and within budget and that

the system delivers all benefits that were intended by the


project sponsor.
A)
True
B)
False
False

The infrastructure analyst is responsible for the design of


the new business policies and processes.
A)
True
B)
False

True

Throwaway prototyping balances the benefits of wellthought-out analysis and design phases with the
advantages of using prototypes to refine key issues before
the system is built.
A)
True
B)
False

True

Systems analysts Lori and Mark are employed by the local


hospital. They have been assigned to develop a very
complex patient monitoring system for the cardio-care unit
using a new display technology. Throwaway prototyping is
a very suitable methodology for this project.
A)
True
B)
False

True

Kim repeatedly performs the analysis, design, and


implementation phases concurrently in a cycle until the
system is completed. She then goes back and from scratch
does a thorough design and implementation to complete
the project. She is following a throwaway prototype
methodology.
A)
True
B)

False
True

The role of the change management analyst includes


ensuring that adequate documentation and support are
available to the users.
A)
True
B)
False

True

The role of the project manager includes managing the


team members, developing the project plan, assigning
resources and serving as the primary point of contact for
people outside the project team.
A)
True
B)
False

False

For complex systems, throwaway prototyping is not a


suitable methodology, since it will lead to problems with
maintaining the system.
A)
True
B)
False

True

Agile development methodology aims at eliminating the


modeling and documentation overhead in IS projects,
while emphasizing simple, iterative application
development.
A)
True
B)
False

D) Project Manager

Most system requests include all of the following except


_____.
A)
business need
B)

business requirements
C)
project sponsor
D)
project manager
E)
business value
C)

Feasibility analysis may be defined as a(n)_____.

guide to determining whether to

A)

proceed with a project

assessment of ability of the ultimate users of the system


to accept the system and incorporate it into the ongoing
operations of the organization
B)
determination of the extent to which the system can be
technically designed, developed, and installed
C)
guide to determining whether to proceed with a project
D)
identification of only the costs and benefits associated
with the project
E)
none of the above

B)

In order to approve a system request, the approval

the high level functionality of the

committee must know

system.

A)
all of the details of the ultimate system to be developed.
B)
the high level functionality of the system.
C)
what the screens and reports will look like in the final
system.
D)
who the end users of the system will be and exactly how
they will use it in their jobs.
E)
all of the above.

B)

Which of the following factors would tend to increase the

large project size

technical risk of a project?


A)

familiarity with the technology


B)
large project size
C)
creating an application that is familiar to the users and
analysts
D)
small project size
E)
the number of other applications under development in
the firm
C)

Which of the following factors could be included in a

No previous experience with Java

technical risk assessment?

within the IS department

A)
Cost of a new Web server
B)
Cost of hiring a Webmaster
C)
No previous experience with Java within the IS department
D)
Some fear of job loss among order entry department
personnel
E)
All of the above

A) Organizational

Peter is the vice president of accounting and finance. For


the past year he has solely provided the resources
necessary to get the just-in-time accounting system
through the planning and analysis phases of the SDLC.
Other managers have openly stated that the JIT system is
not worth the investment. The SEC has just placed Peter
under investigation for insider trading and the board has
asked him to resign. This project is failing _____ feasibility
analysis.
A)
organizational
B)
champion
C)
functional
D)

economic
E)
technical
C)

The project champion is a(n)_____.

high-level non-IS executive who is

A)

usually but not always the project

high-level IS executive who is usually but not always the

sponsor who initiated the system

project sponsor who initiated the system request

request

B)
mid-level IS manager who has the responsibility of
controlling and directing the development process
C)
high-level non-IS executive who is usually but not always
the project sponsor who initiated the system request
D)
senior member of the user group who participated in the
RAD sessions
E)
none of the above

B) Tangible

_____ value can be quantified during the project initiation


phase.
A)
Expected
B)
Tangible
C)
Intangible
D)
Real
E)
Salvage

D) Equipment Upgrade

Operational costs that are examined during feasibility


analysis include _____.
A)
data conversion cost
B)
development training
C)
user training

D)
equipment upgrades
E)
initial consultant fees
A) Economic

_____ feasibility is determined by identifying costs and


benefits associated with the system.
A)
Economic
B)
Functional
C)
Organizational
D)
Intangible
E)
Technical

D) Software Licensing Fees

Examples of development costs include all EXCEPT _____.


A)
consultant fees
B)
hardware expenses
C)
salaries for the project team
D)
software licensing fees
E)
none of the above

C) Business Requirements

Explaining "the business capabilities of the information


system" is written in the _____ section of the system
request.
A)
business need
B)
business value
C)
business requirements
D)
project need

E)
special issues
B)

The four elements commonly found on a system request

project sponsor, business need,

are _____.

business requirements, and

A)

business value

economic, organizational, technical, and operational


feasibility
B)
project sponsor, business need, business requirements,
and business value
C)
risk analysis, familiarity, project size, and cost-benefit
analysis
D)
training, software, installation, and equipment
E)
upgrades, licensing fees, repairs, and charges

B) Feasibility Analysis

_____ is the process of examining the technical, economic,


and organizational pros and cons of developing a new
system.
A)
Committee approval
B)
Feasibility analysis
C)
Functionality determination
D)
Risk analysis
E)
System request

E) Return On Investment

The calculation that measures the amount of money an


organization receives in return for the money it spends is
called the _____.
A)
cash flow
B)
net present value
C)

total investment
D)
tangible costs
E)
return on investment
True

ROI calculations do not consider the present value of


future money.
A)
True
B)
False

True

It is not necessary to assign dollar values to intangible


costs and benefits; it is almost impossible to come up with
reasonable numbers for all of the costs and benefits that
haven't happened yet.
A)
True
B)
False

False

Kelly Smith, the vice president of marketing, has provided


resources and political support for the new production
management information system. She has acted as the
project manager for the project.
A)
True
B)
False

False

A feasibility analysis includes whether the project has


been permitted by the CIO of the company.
A)
True
B)
False

True

Cost benefit analysis identifies the financial costs and


benefits associated with a systems project.
A)

True
B)
False
False

System requests often include the project team members


including the project manager and the analysts.
A)
True
B)
False

True

Organizational feasibility can be evaluated by conducting


a(n) stakeholder analysis.
A)
True
B)
False

False

The return on investment (ROI) should be used as the sole


indicator of a project's worth because it considers the end
points of the investment, not the cash flow in between.
A)
True
B)
False

False

The formula for net present value (NPV) is the ratio of


(Total benefits - Total Costs) to Total Costs.
A)
True
B)
False

True

User participation should be promoted throughout the


development process to make sure that the final system
will be accepted and used.
A)
True
B)
False

False

The champion is a high-level IS executive who initiates the

system request and supports the project by providing


time, resources, and political support within the
organization by communicating the importance of the
system to other organizational decision makers.
A)
True
B)
False
False

Happy customers is a tangible cost that can be included in


a cost-benefit analysis.
A)
True
B)
False

False

How well a system is accepted by the users and


incorporated into the ongoing operations of the business is
defined in the technical feasibility.
A)
True
B)
False

False

Economic feasibility focuses on whether the system can


be built by examining the risks associated with the users'
and analysts' familiarity with the application, familiarity
with the technology, and project size.
A)
True
B)
False

False

Familiarity with the application and technology are major


factors considered under economic feasibility.
A)
True
B)
False

True

Project size is an important consideration in technical


feasibility. Larger projects create more risk, both because

they are more complicated to manage and because there


is a greater chance that some important system
requirements will be overlooked or misunderstood.
A)
True
B)
False
False

During organizational feasibility analysis the system users


are the stakeholders that are responsible for providing
enough budget and promoting the project.
A)
True
B)
False

False

A limitation of a formal cost-benefits analysis is that it


contains the costs and benefits for just one year.
A)
True
B)
False

True

Calculating the break-even point helps in understanding


how long it will take before the system creates real value
for the organization.
A)
True
B)
False

True

A high return on investment (ROI) results when benefits


far outweigh the cost of a new project or information
system.
A)
True
B)
False

False

The organizational management of a business is involved


in hands-on activities related to the project.

A)
True
B)
False
False

To identify the costs and benefits related to the computer


technology for a project the systems analyst should rely on
the business users.
A)
True
B)
False

True

Economic feasibility is determined by identifying costs and


benefits associated with the system, assigning values to
them, and then calculating the cash flow and return on
investment for the project.
A)
True
B)
False

False

Determining whether the new system will be compatible


with the existing technology that already exists in the
organization is part of the organizational feasibility study.
A)
True
B)
False

True

Present value calculation takes inflation and time into


account.
A)
True
B)
False

C) Industry Standards

Kathryn has little experience estimating the time it will


take to complete a systems project. She has just
completed the planning phase of the project. What method
should she use to estimate the time required to build the
system?

A)
adjusted project complexity
B)
function points
C)
industry standards
D)
Microsoft Project
E)
more complex approach
A) Project Management

_____ is the process of planning and controlling the


development of a system within a specified time frame at
a minimum cost with the right functionality.
A)
Project management
B)
Symantic timeline
C)
Task identification
D)
Time estimation
E)
Work plan

B) 20 Months

One method of estimating project time is to use industry


standard factors for each project phase. With this method,
if the planning phase typically takes 15% of total project
time, and a particular project requires three months for
planning, then the remainder of the project will require
_____.
A)
15 months
B)
20 months
C)
3.5 months
D)
4.5 months
E)
3 months

B)

When using a function point estimation worksheet, there

end-user efficiency, data

are 14 factors that impact the complexity of a project.

communications, and reusability

These factors include _____.


A)
data communications, time tradeoffs, and estimated effort
B)
end-user efficiency, data communications, and reusability
C)
performance and programming language
D)
reports printed and PCA
E)
x-rays, extensibility, and operational conversion

D) All the Above

Adding people to a project team in order to speed up total


development time _____.
A)
organized in a standard manner across all projects
B)
created in an iterative and incremental manner
C)
designed so one can compare the current project to past
projects
D)
all of the above
E)
none of the above

B)

The three steps of project management are _____.

creating the work plan, staffing

A)

the project, and controlling and

controlling the project, directing the project, and creating

directing the project

the work plan


B)
creating the work plan, staffing the project, and controlling
and directing the project
C)
directing the project, creating the work plan, and naming
the tasks
D)
naming the tasks, creating the work plan, and completing
the deliverables
E)

setting the start date, estimating the time, and reading the
actual time
D)

The most significant challenge to project managers is

unrealistic schedule demands by

_____.

project sponsors

A)
lack of project management training
B)
no one really understands how to manage a complex
systems development project
C)
the lack of tools that can assist in controlling project
progress
D)
unrealistic schedule demands by project sponsors
E)
all of the above

E) Much Less

Assume a systems development project effort calculation


determines that the system will require 240 function
points. If the developers choose to implement this system
in the C programming language, approximately 31,200
lines of code will have to be written. If the developers
choose Visual Basic to implement the system, the number
of lines of code will be _____.
A)
about the same
B)
can't tell without more information
C)
exactly the same
D)
much greater
E)
much less

D)

To identify the tasks for a work plan the project manager

list the four phases of the SDLC

can _____.

and the steps that occur in each

A)
control and direct the project
B)
estimate the size, staff the project, and remember

technical skills
C)
establish a possible reporting structure
D)
list the four phases of the SDLC and the steps that occur in
each
E)
set conservative numbers for the project software
A) Function Point

A(n) ____________ is a measure of program size based on


the number and complexity of inputs, outputs, queries,
files, and program interfaces.
A)
function point
B)
line of code
C)
project plan
D)
standard module
E)
workplan

C) 400

A normal system with 400 unadjusted function points


would have _____ adjusted function points when the
shortcut method is use to determine the complexity of the
project.
A)
200
B)
260
C)
400
D)
540
E)
600

B) Estimation

The process of assigning values for the time and effort


needed to perform a system project is called _____.
A)

analysis
B)
estimation
C)
identifying
D)
planning
E)
preparation
E) Work Plan

The _____ is a dynamic schedule that logs and monitors all


of the tasks that need to be accomplished for the length of
the project.
A)
margin of error
B)
project manager
C)
project objective
D)
timebox
E)
work plan

E)

A critical success factor for project management is to

start with a realistic assessment

_____.

of the work

A)
create a work plan
B)
follow the three steps of project management
C)
identify most project tasks
D)
manage the hundreds of tasks
E)
start with a realistic assessment of the work

A)

Project managers can develop task lists for a project with

established methodologies

the help of _____.


A)
established methodologies

B)
system proposals
C)
system requests
D)
user application hardware
E)
user requirements
True

A highly effective motivational technique for technical


staff is to provide recognition for each team member's
accomplishments.
A)
True
B)
False

True

The underlying cause of many missed project deadlines is


scope creep.
A)
True
B)
False

True

The most common reason for schedule and cost overruns


that surface after the project is underway is scope creep.
A)
True
B)
False

True

When planning a systems project, overly optimistic


timetables are the cause of project completion delays.
A)
True
B)
False

True

Using typical industry standards for estimating project


time schedules, the estimated analysis phase would be 10
person-months for a systems project where the planning

phase was completed in 7.5 person-months.


A)
True
B)
False
False

Scope creep is only a minor factor in projects running over


schedule, and every effort should be made to incorporate
any changes into the present system if they would truly be
beneficial.
A)
True
B)
False

False

The project charter describes the qualifications of the


people who will work on a project and the reporting
structure of the project team.
A)
True
B)
False

False

Lower CASE tools are used to create integrated diagrams


of the system and store information about system
components during the analysis phase.
A)
True
B)
False

False

The COCOMO model to convert lines of code estimates


into person-month estimates was designed by Allen
Albrecht of IBM.
A)
True
B)
False

True

Matching people's skills with the needs of the project,


motivating employees, and minimizing personnel conflict

are all part of the staffing process.


A)
True
B)
False
True

Sergei, the project manager, is worried about completing


the project on time. To increase the productivity of his 15person team he should create subteams with no more than
10 people on a subteam.
A)
True
B)
False

True

A function point is a measure of program size based on


the number and complexity of inputs, outputs, queries,
files and program interfaces.
A)
True
B)
False

False

One of the greatest weaknesses of systems consulting


firms is that they try to apply estimates and
methodologies that they have developed over time and
applied to other projects, most of which are very different
from the current project.
A)
True
B)
False

False

The project team has just determined that the deadline for
completion will not be met. In order to deliver a high
quality system on schedule, the team has requested that
the features be prioritized and that a fixed deadline be
imposed for the project. This technique is referred to as
SDLC methodology.
A)
True
B)

False
True

A good technique to help minimize conflict among team


members is to hold team members accountable for their
tasks.
A)
True
B)
False

False

The document that describes the project's objectives and


rules is called the project charter.
A)
True
B)
False

True

Christine does not have the skills that her project manager
feels are necessary and no money has been budgeted for
outside consultants. Mentoring is a good option to improve
Christine's skills in this situation.
A)
True
B)
False

False

Creating a work plan requires three steps: identify the


tasks that need to be accomplished, estimate the time
that it will take to complete the tasks, and record the task
completion time in a Gantt Chart.
A)
True
B)
False

False

It is not wise to identify tasks for a current project using


existing methodology, because methodologies that have
been used by an organization for other projects probably
will not work for this project without extensive changes.
A)
True

B)
False
False

CASE tool is a popular graphic depiction of the work plan


that lists project tasks along a y-axis, time along an x-axis,
and uses shaded boxes to represent tasks.
A)
True
B)
False

True

Integrated CASE tools are used to support tasks that


happen throughout the SDLC.
A)
True
B)
False

False

Jim Smith, the project manager for a high-profile project,


has permitted the users to add additional features to the
systems project. The schedule and costs are now running
over. This project suffers from poor standards.
A)
True
B)
False

False

To complete a 20 person-month project in 10 months, a


team should have 4 full-time staff members assigned to
the project.
A)
True
B)
False

True

Project management is the second major component of


the planning phase of the systems development life cycle
(SDLC), and it includes three steps: creating the work plan,
staffing the project, and controlling and directing the
project.
A)

True
B)
False
True

According to leading experts in software development, the


margin of error when estimating project costs is 100% and
the margin of error in project scheduling time is 25%.
A)
True
B)
False

False

A key factor in staffing a project involves motivating


people to meet the project's objectives, and the most
effective way to do this is through the use of money and
bonuses.
A)
True
B)
False

True

Using the shortcut method to determine the complexity of


a systems project, a very complex system having 300
unadjusted function points would have 405 adjust function
points.
A)
True
B)
False

True

The work plan records and keeps track of all of the tasks
that need to be accomplished over the life of the project,
listing each task, along with important information about
it, such as when it needs to be completed, the person
assigned to do the work, and any deliverables that will
result.
A)
True
B)
False

True

Timeboxing is a popular technique which sets a fixed

deadline for a project and delivers the system by that


deadline no matter what, even if functionality needs to be
reduced.
A)
True
B)
False
False

When estimating project time schedules using industry


standards for a systems project, the following values are
acceptable: 15% for planning, 25% for analysis, 50% for
design, and 10% for implementation.
A)
True
B)
False

C)

Which of the following analysis strategies incurs the

Business Process Reengineering

highest risk yet has the potential to provide high value to


the business?
A)
Business Process Automation
B)
Business Process Improvement
C)
Business Process Reengineering
D)
Business Process Renovation
E)
Root cause analysis

D) Observation

What information-gathering strategy enables the analyst


to see the reality of the situation rather than listen to
others describe it?
A)
document analysis
B)
interviewing
C)
joint application design (JAD) sessions
D)

observation
E)
questionnaires
C)

The information gathering technique that is most effective

joint application development

in combining information from a variety of perspectives,


building consensus, and resolving discrepancies is a(n)
_____.
A)
document analysis
B)
interview
C)
joint application development
D)
observation
E)
questionnaire

D) 50%

A JAD session can reduce scope creep by _____.


A)
10%
B)
20%
C)
40%
D)
50%
E)
75%

D)

The goal of this analysis strategy is to change the

business process reengineering

fundamental way the organization operates and to make


major changes by taking advantage of new ideas, methods
and technology.
A)
business process automation
B)
business process benchmarking
C)
business process improvement
D)

business process reengineering


E)
business process systemization
A) BPA

The analysis strategy that results in the existing business


processes being left essentially the same, but with a new
system that makes them more efficient is _____.
A)
BPA
B)
BPI
C)
BPR
D)
BPU
E)
Top-down approach

C) Open-Ended

Sarah would like to give the interviewee more control over


the interview and to gather rich information. She should
ask _____ questions.
A)
closed-ended
B)
inappropriate
C)
open-ended
D)
opinion
E)
probing

E)

Two BPI techniques used to identify possible improvements

activity elimination and outcome

in the current system are _____.

analysis

A)
activity based costing and activity elimination
B)
duration analysis and formal benchmarking
C)
outcome analysis and problem analysis
D)
problem analysis and root cause analysis

E)
activity elimination and outcome analysis
A)

A JAD facilitator is _____.

the person who sets the meeting

A)

agenda and guides the discussion

the person who sets the meeting agenda and guides the
discussion
B)
the person who records the discussion
C)
participates in the discussion
D)
is also a power user
E)
none of the above

D)

Two BPA techniques commonly used to identify possible

problem analysis and root cause

problems in the current system are _____.

analysis

A)
activity based costing and benchmarking
B)
duration analysis and formal benchmarking
C)
outcome analysis and duration analysis
D)
problem analysis and root cause analysis
E)
process simplification and proxy benchmarking

A) Analysis

Understanding the as-is system, identifying


improvements, and developing requirements for the to-be
system are the steps of the _____ phase.
A)
analysis
B)
design
C)
implementation
D)
planning
E)

SDLC
A)

The examination of existing paperwork in order to better

document analysis

understand the As-Is system is an example of what


information-gathering strategy?
A)
document analysis
B)
interviewing
C)
joint application design (JAD) sessions
D)
observation
E)
questionnaires

A)

The most commonly used information-gathering technique

interviewing

is _____.
A)
interviewing
B)
joint application design (JAD) sessions
C)
document analysis
D)
observation
E)
questionnaires

E)

The information gathering technique that enables the

questionnaire

analyst to collect facts and opinions from a wide range of


geographically dispersed people quickly and with the least
expense is the _____.
A)
document analysis
B)
interview
C)
JAD session
D)
observation
E)

questionnaire
C)

The goal of ______ analysis strategy is to make minor or

business process improvement

moderate changes to the business processes so that they


will become more efficient and effective.
A)
business process automation
B)
business process benchmarking
C)
business process improvement
D)
business process reengineering
E)
business process systemization

False

The two general analysis techniques performed by the


analyst for BPA during the analysis phase are problem
analysis and revise and resubmit modeling.
A)
True
B)
False

True

The interview schedule lists all the people who will be


interviewed, when, and for what purpose.
A)
True
B)
False

False

When you begin an interview, the first goal is to establish


control and let the interviewee know that you have a
mastery of the subject.
A)
True
B)
False

True

Kristin, a systems analyst, needs to know detailed


information about the accounts receivable process, but
she is not concerned with accounts payable or general

ledger, or the integration of this information. Her analysis


will assist her in designing a To-Be system for the accounts
receivable department. The appropriate requirementsgathering technique to be used would be interviewing.
A)
True
B)
False
False

The systems analyst has recommended that the existing


order entry system be totally re-engineered. The risk to
this BPR activity is low to moderate.
A)
True
B)
False

False

A systems analyst has prepared an interview agenda that


begins with a number of specific, detailed questions, and
then asks the interviewee to make general statements
about the policies and procedure of the business process.
The analyst is following a top-down interview structure.
A)
True
B)
False

False

The standard approach to select who should complete a


questionnaire during information gathering is to sample
only those departments that do not have direct contact
with the As-Is system.
A)
True
B)
False

True

Amanda had the managers at her company develop a list


of important and interesting technologies and how each
technology could be applied to current business process.
Amanda is identifying improvement opportunities through
technology analysis.
A)

True
B)
False
False

BPI requires the least cost because it has the narrowest


focus and seeks to make the least changes.
A)
True
B)
False

False

A fundamental disadvantage of the JAD sessions is that


they are subject to be dominated by a few. e-JAD attempts
to eliminate this disadvantage.
A)
True
B)
False

True

Open-ended questions gather rich information because


they are questions that permit the interviewee to
elaborate on answer.
A)
True
B)
False

True

Activity-based costing is similar to duration analysis. While


duration analysis attempts to find the time taken to
complete business processes, activity-based costing finds
the costs associated with each of the basic functional
steps or processes.
A)
True
B)
False

True

To better understand the As-Is system the project team


members can perform document analysis on existing
forms, reports, and business process models.
A)

True
B)
False
False

It is easier to ask an interviewee what is used to perform a


task than it is to show the interviewee a form and ask what
information on the form is used.
A)
True
B)
False

True

Document analysis and observation are commonly used


for understanding the As-Is system because they are
useful for obtaining facts.
A)
True
B)
False

False

Because it is important not to disrupt the normal business


function, joint application design (JAD) sessions should be
held at a location easily accessible to the participants'
office staffs, and attendees should be those most easily
released from regular duties and least likely to be missed.
A)
True
B)
False

True

Jessica has asked the users to generate a list of problems


with the current system and to prioritize the problems in
order of importance. Jessica then generated all the
possible causes for the problems, starting with the most
important. Jessica is identifying improvement opportunities
through root cause analysis.
A)
True
B)
False

False

Activity elimination technique of BPR focuses on

understanding the fundamental outcomes that provide


value to customers.
A)
True
B)
False
True

Observation is a powerful tool for gathering information


about the As-Is system and may be necessary because
managers often do not remember how they work and how
they allocate their time.
A)
True
B)
False

True

Tracy has decided to ask the users and managers to


identify problems with the current system and to
recommend how to solve these problems in the future
system. They have recommended small incremental
changes. Tracy is identifying improvement opportunities
through problem analysis.
A)
True
B)
False

False

An analyst for an insurance company determined that the


overall time required to process a property damage
insurance claim is 21 business days. When the analyst
decomposes the process into steps and aggregates the
total time requirements for all steps, she discovers a total
time of 12 hours. The analyst is employing the activitybased costing analysis technique.
A)
True
B)
False

True

JAD is the appropriate technique for gathering information


about the As-Is and To-Be systems: it that identifies

improvements, and has a high amount of user


involvement.
A)
True
B)
False
True

An interview style that seeks a broad and roughly defined


set of information is commonly called the unstructured
interview style.
A)
True
B)
False

True

Questionnaires are often used when there is only a small


number of people from which information and opinions are
needed, because it is difficult to get a large number of
participants to return questionnaires on a timely basis.
A)
True
B)
False

False

To identify improvements in BPR, the analyst should


perform outcome analysis, activity analysis, and
technology elimination.
A)
True
B)
False

True

The users of the product-sales system would like to


dramatically increase the use and value of the new orderentry system by designing a front end for the Internet and
letting customer purchase goods without the aid of a
customer service rep. The projected costs would be high
and the risk would be great. This is an example of BPR.
A)
True
B)

False
True

A systems analyst is participating in an exchange of


services with another organization. First, the analyst visits
the partner organization, studies and evaluates their
systems, and recommends changes and improvements.
Then, a team of analysts from the partner organization
visits the analyst's organization and performs the same
service. This process is an example of benchmarking.
A)
True
B)
False

False

Questions on questionnaires should be open-ended to


allow the respondent the freedom to express his/her
opinion since the analyst will not be able to follow up with
additional questions as could be done in a one-on-one
interview.
A)
True
B)
False

False

BPI typically has the greatest breadth of analysis, since it


focuses on the entire business function and beyond.
A)
True
B)
False

False

An analysis team consisting of users, managers, and


analysts, are in the midst of a daylong meeting. They are
working on systematically evaluating the consequences of
removing every activity from the current business process.
The team is performing activity-based costing.
A)
True
B)
False

B)

When drawing the use-case diagram, an analyst should do

identify the system boundary,

the steps in this order: _____.

draw the use cases on the

A)

diagram, place the actors on the

draw the use cases on the diagram, identify the system

diagram, and draw the lines

boundary, place the actors on the diagram, and draw the

connecting the actors to the use

lines connecting the actors to the use cases

cases

B)
identify the system boundary, draw the use cases on the
diagram, place the actors on the diagram, and draw the
lines connecting the actors to the use cases
C)
place the actors on the diagram, draw the use cases on
the diagram, identify the system boundary, and draw the
lines connecting the actors to the use cases
D)
identify the system boundary, place the actors on the
diagram, draw the use cases on the diagram, and draw the
lines connecting the actors to the use cases
E)
none of the above gives the correct order of steps

C)

The importance level of a use case increases for all of the

the technology is proven

following characteristics of the use case EXCEPT _____.


A)
the use case represents an important business process
B)
the use case supports revenue generation
C)
the technology is proven
D)
the functionality is complex
E)
the functionality is time-critical

D)

Which of the following diagramming symbols represents a


generalization relationship in a use case diagram?
A)

B)

C)

D)
E)
D)

The _____ relationship in use cases allows use cases to

generalization

support the concept of inheritance.


A)
association
B)
extend
C)
include
D)
generalization
E)
none of the above

C)

A scenario is the same as a(n) _____.

path through a use case

A)
use case
B)
relationship
C)
path through a use case
D)
collection of use cases
E)
role

B)

Which of the following diagramming symbols represents a


subject boundary in a use case diagram?
A)

B)

C)

D)
E)
B)

Which of the following relationships represent the

extend relationship

extension of the functionality of the use case to cover


optional behavior?
A)
association relationship
B)
extend relationship
C)
include relationship
D)
generalization relationship
E)
optional relationship

A)

The correct sequence of the major steps in creating use

identify the major use cases,

case diagrams is _____.

expand the major use cases,

A)

confirm the major use cases,

identify the major use cases, expand the major use cases,

create the use-case diagram

confirm the major use cases, create the use-case diagram


B)
identify the major use cases, expand the major use cases,
create the use-case diagram, confirm the major use cases
C)
create the use-case diagram, identify the major use cases,
expand the major use cases, confirm the major use cases
D)
create the use-case diagram, identify the major use cases,
confirm the major use cases, expand the major use cases
E)
identify the major use cases, confirm the major use cases,
expand the major use cases, create the use-case diagram

A)

Which of the following diagramming symbols represents


an actor in a use case diagram?
A)

B)

C)

D)
E)
E)

Individual steps in a use case should be written in the form

Subject, Verb, Direct Object,

_____.

Preposition, Indirect Object

A)
Direct Object, Verb, Subject, Preposition, Indirect Object
B)
Direct Object, Subject, Verb, Preposition, Indirect Object
C)
Subject, Verb, Preposition, Indirect Object, Direct Object
D)
Subject, Verb, Indirect Object, Preposition, Direct Object
E)
Subject, Verb, Direct Object, Preposition, Indirect Object

C)

Which of the following diagramming symbols represents a


use case in a use case diagram?
A)

B)

C)

D)
E)
A)

Which of the following relationships describe the

association relationship

communication between the use case and the actors?

A)
association relationship
B)
extend relationship
C)
include relationship
D)
generalization relationship
E)
none of the above
A)

A(n) _____ is a formal way of representing how a business

use case

system interacts with its environment.


A)
use case
B)
physical model
C)
relationship
D)
system boundary
E)
trigger

B)

A(n) ___________ actor is a separate system that interacts

simple

with the current system using standard communication


protocols, such as TCP/IP, FTP, or HTTP, or an external
database that can be accessed using standard SQL.
A)
incremental
B)
simple
C)
open
D)
average
E)
complex

A)

A(n) _____ use case is typically created early in the process

overview

of understanding the system requirements as a way of

documenting basic information about the use case.


A)
overview
B)
detail
C)
essential
D)
real
E)
imaginary
False

An actor in a use case always represents a specific user.


A)
True
B)
False

True

Object nodes in an activity diagram are depicted using


rectangles.
A)
True
B)
False

False

The use case Take Order has a temporal trigger if it begins


when a customer calls to place an order.
A)
True
B)
False

False

The first step in creating use case diagrams is to identify


the primary actors and their goals.
A)
True
B)
False

False

Each use case can be associated with one or more role(s)


that users have in the system.

A)
True
B)
False
True

A use case that begins at the end of the month has a


temporal trigger.
A)
True
B)
False

True

The primary actor is the person or thing that starts the


execution of a use case.
A)
True
B)
False

True

A decision node in an activity diagram is used to represent


the actual test condition that is used to determine which of
the paths exiting the node is to be traversed.
A)
True
B)
False

False

The include relationship represents the optional inclusion


of another use case.
A)
True
B)
False

True

Use cases can be used to document both the current (AsIs) system and the future (To-Be) system.
A)
True
B)
False

False

When drawing use case diagrams, higher level use cases

are drawn below lower level use cases.


A)
True
B)
False
True

The value of the unadjusted use-case points weight total


(UUCW) is the sum of the number of unique transactions in
each of the use cases.
A)
True
B)
False

True

Control flows in an activity diagram are shown using solidlines with arrows while object flows are shown using
dashed lines with arrows.
A)
True
B)
False

True

An asterisk on a relationship in a use case diagram


represents multiplicity of the association.
A)
True
B)
False

True

As Felix is documenting an order entry system, he


discovers that someone can call up to place an order that
is not a customer. In this case, the Take Order use case will
use the Create Customer use case to capture the customer
information, and then the order will be taken. This is an
example of the extend relationship between use cases.
A)
True
B)
False

True

Use cases are the primary drivers for all of the UML

diagramming techniques.
A)
True
B)
False
False

An essential use case describes the specific set of steps to


be followed.
A)
True
B)
False

False

Rectangles are used to represent association relationships


in use case diagrams.
A)
True
B)
False

False

Join nodes in an activity diagram are used to bring


concurrent or parallel flows together back into a single
flow.
A)
True
B)
False

True

Inheritance is supported in use cases through the


generalization relationship.
A)
True
B)
False

False

An alternate or exceptional flow in a use case documents


the decomposition of the normal flow of events.
A)
True
B)
False

True

A use case that describes functionality that is complex and


risky would be given a high importance level.
A)
True
B)
False

False

Paths coming out of a decision node are always mutuallyexclusive, while the paths coming out of a fork node are
sometimes concurrent and sometimes mutually-exclusive.
A)
True
B)
False

True

The SVDPI form of sentences in use cases aids in the


identification of classes.
A)
True
B)
False

True

An include relationship is modeled in a use case diagram


by an arrow with the word <<include>> above it.
A)
True
B)
False

True

It is a good idea to have the users role play the use cases
as a way of confirming them during the analysis phase.
A)
True
B)
False

False

A use case that represents an important business process


and involves the use of new technology would likely be
given an importance level of medium.
A)
True

B)
False
False

Control flows in an activity diagram show the flow of


objects into and out of activities.
A)
True
B)
False

False

A solid line without arrows between an actor and a use


case in a use case diagram represents a one-way flow of
communication from the actor to the use case.
A)
True
B)
False

False

Actor

In UML diagrams, a person who uses the system

Aggregation

Whole-part relationship between an object and its removable


parts Like a Car and its Tires

Associative entity

A data entity that represents a many-to-many relationship


between two other data entities

Attribute

One piece of specific information about a thing

Binary relationships

Relationships between two different types of things, such as a


customer and on order

Cardinality

The number of associations that occur among specific things,


such as a customer places many orders and an employee
works in one department.

Composition

Whole-part relationship in which the parts cannot be


dissociated from the object.

Compound attribute

An attribute that contains a collection of related attributes.

CRUD technique

An approach in which an analyst looks at each type of data


and includes use cases that Create, Read, Update, and Delete
the data. A Technique used to determine use cases.

Data entities

The things the system needs to store information about in the


traditional approach to information systems.

Destination

An external agent or actor that receives data from the


system.

Elementary business process

A task that is performed by one person in one place in

(EBP)

response to a business event that adds measurable business


value and that leaves the system and its data in a consistent
state.

Event

An occurrence at a specific time and place that can be


describe and is worth remembering.

Event decomposition

An analysis technique for identifying use cases that focuses


on identifying the events to which a system must respond and
then determining how the system must respond.

Event table

A table that lists events in rows and key pieces of information


about each event in columns.

External event

an event that occurs outside the system, usually initiated by


an external agent or actor.

Generalization/specialization

Hierarchies that structure or rank classes from the more

hierarchies

general superclass to the more specialized subclasses;


sometimes called inheritance hierarchies.

Identifier

An attribute that uniquely identifies a thing.

Inheritance

A concept that allows subclasses to share characteristics of


their superclasses.

Methods

The behaviors all objects of the class are capable of doing.

Multiplicity

a synonym for cardinality (used with the object-oriented


approach).

N-ary relationship

A relationship among N(any number of) different types of


things.

Perfect technology

The assumption that events should be included during

assumption

analysis only if the system would be required to respond


under perfect conditions.

Postconditions

Conditions that must be true upon completion of the use


case.

Preconditions

Conditions that must be true before a use case begins.

Relationship

A naturally occurring association among specific things, such


as an order is placed by a customer and an employee works in
a department.

Response

An output, produced by the system, that goes to a


destination.

Scenario

A unique set of internal activities within a use case that


represents a unique path through the use case (see instance).

Source

an external agent or actor that supplies data to the system.

State event

an event that occurs when something happens inside the


system that triggers the need for processing.

System controls

Checks or safety procedures put in place to protect the


integrity of the system.

Temporal event

an event that occurs as a result of reaching a point in time.

Ternary relationship

A relationship among three different types of things.

Trigger

A signal that tells the system that an event has occurred,


either the arrival of data needing processing or a point in
time.

Unary (recursive) relationship

A relationship among two things of the same type, such as


one person being married to another person.

Use case

A series of actions that a system performs that result in a


defined outcome (similar to an activity)

Use case description

A description that lists the processing details for the use case.

Use case instances

A unique set of internal activities within a sue case that


represents a unique path through the use case (see Scenario).

User goal technique

An approach for identifying use cases in which an analyst


talks to all users to get them to describe their goals in using
the system.

Whole-part hierarchies

Hierarchies that structure classes according to their


associated components.

Activity diagram

A type of workflow diagram that describes the user activities and their
sequential flow.

Closed-ended

Questions that have a simple, definitive answer.

questions
Descriptive model

Narrative memos, reports, or lists that describe some aspect of a


system.

Functional

A system requirement that describes an activity or process that the

requirement

system must perform.

Graphical model

Diagrams and schematic representations of some aspect of a system.

Group Support

A computer system that enables multiple people to participate with

System (GSS)

comments at the same time, each on the user's own computer.

Joint application

A technique to define requirements or design a system in a single

design (JAD)

session by having all necessary people participate.

Logical model

Any model that shows what the system is required to do without


committing to any one technology.

Mathematical

A series of formulas that describe technical aspects of a system.

model
Mock-up

An example of a final product that is for viewing only, and not


executable.

Open-ended

Questions that require discussion and do no necessarily have a simple,

questions

short answer.

Performance

A system requirement that describes an operational characteristic

requirement

related to workload measures, such as throughput and response time.

Physical model

Any model that shows how the system will actually be implemented.

Prototype

A preliminary working model of a larger system.

Reliability

A system requirement that describes the dependability of a system,

requirement

such as service outages, incorrect processing, and error detection and


recovery.

Security

A system requirement that describes user access to certain functions

requirement

and the conditions under which access is granted.

Stakeholders

All the people who have an interest in the success of a new system.

Structured

A review of the findings from your investigation and of the models built

walkthrough

based on those findings.

Swimlane

A rectangular area on an activity diagram representing the activities


done by a single agent.

Synchronization bar

A symbol in a activity diagram to control the splitting or uniting of


sequential paths.

System

Specifications that define the functions to be provided by a system.

requirements
Technical

A system requirement that describes an operational characteristic

requirement

related to an organization's environment, hardware, and software.

Transaction

A single occurrence of a piece of work or an activity done in an


organization.

Usability

A system requirement that describes an operational characteristic

requirement

related to users, such as the user interface, work procedures, on-line


help, and documentation.

Workflow

Systems Analysis

A sequence of steps to process a business transaction.

a problem-solving technique that breaks a system into its


components to study how well they interact to accomplish their
purpose; and is a pre-requisite to systems design; focuses more
on the business side of things

Systems Design

is putting those components back together for an improved


synergistic effect; focuses more on the technical and
implementation points

Logical Design

translates business user requirements into a system model that


depicts business requirements; does not include possible
technical design or implementation of those requirements

Physical Design

translates business user requirements into a system model that


depicts a technical implementation of the users' business
requirements; represents a specific technical solution; the
opposite of logical design

Operational Feasibility

measures how well a solution meets the identified system


requirements to solve the problems and take advantage of the
opportunities envisioned for the system; looks at whether the
problem is still worth solving vs. its expected solution cost

Technical Feasibility

determines the practicality, availability and affordability of the


proposed technology and whether we currently posses the

necessary technology and technical expertise


Schedule Feasibility

measures whether the project deadlines are reasonable

Economic Feasibility

uses cost-benefit analysis to measure the cost-effectiveness of


a project/solution; determines whether the possible benefits of
solving the problem are worthwhile

Functional Requirement

a description on activities and services a system must provide;


consist of the concrete activities and services that make up a
system, i.e., the inputs, processes, outputs and data stores, and
that are needed to meet the system improvement objectives

Non-Functional Requirement

refer to the behavioral attributes of the system, i.e.,


performance factors such as speed of operations and response
time, cost of operations, ease of use, security controls, quality
management, documentation, etc.

Data Model

a blueprint for the design of the database

Problem Statement Matrix

a succinct overview of the problems, opportunities and/or


directives that triggered the project

Feasibility Analysis Matrix

compares candidates for the solution to your problem,


evaluated against: technical feasibility, operational feasibility,
economic feasibility, and schedule feasibility

Problems, Opportunities,

a technique in which problems are studied to determine their

Objectives and Constraints

causes and effects; leads to true understanding of problems and

Matrix (POOC) - aka 'Cause

can lead to not-so-obvious, but more creative and valuable,

and Effect Analysis'

solutions

Use Case Glossary

a simple table naming and defining the use for each process
model, including use case identified, its description, and its
participating actors and roles

Use-Case Model

a drawing that represents the relationships between the actors


and the use cases; the use cases are grouped into subsystems
and the actors are depicted with stick figures; a line is drawn
between each actor and each use case it has a relationship with
(no arrows) (time can be an actor)

Use-Case Narrative

a very detailed form that tracks information about the process,


steps taken by actors and system response

Entity Definition Matrix

identify the fundamental entities and define them

Context Data Model

includes fundamental business entities and relationships with


cardinality; relationships should be named with verb phrases(ex
'sells', 'responds to', etc.)

Key-Based Data Model

add primary key to the context data model

Fully Attributed Data Model

add all attributes to be captured and stored in the database

Key

an attribute, or a group of attributes, that assumes a unique


value for each entity instance; the value of a key should not
change over time (ex. Someone's last name); the value cannot
be null

Concatenated Key

a group of attributes that uniquely identifies an instance of an


entity

Candidate Key

one of a number of keys that may serve as the primary key on


an entity

Primary Key

a candidate key that will most commonly be used to uniquely


identify a single entity instance

Alternate Key

a candidate key that is not selected to become the primary key

Foreign Key

identify associated instances of related entities; exception to


the non-redundancy rule

Intelligent Key

a business code whose structure communicates data about an


entity instance

Cardinality

the minimum and maximum number of occurrences of one


entity that may be related to a single occurrence of the other
entity

Policy

a set of rules that governs how a process is to be completed

Function

a set of related and ongoing activities of a business (ex


production planning, inventory control)

Process

respond to business events and conditions and transform data


into useful information; helps us to understand interactions with
the system's environment, other systems, and other processes

Data Attributes

adjectives; a descriptive property or characteristic of an entity;


what specific pieces of data you want to store about each
instance of a given entity (ex name, addr, ph#, etc); every
attribute should contain a logical default value that represents
the value of an attribute if its value is not specified by the user

Model Development Process

1) enterprise data model - identifies only the most fundamental


entities
2) application data model - a data model for a complete, single
information system
3) context data model
4) key-based data model
5) fully attributed data model
6) database schema - the previous logic data model transformed
into a physical data model; reflects the technical capabilities
and limitation of that database technology, as well as the
performance tuning requirements suggested by the database
administrator

Sampling

the process of collecting a representative sample of documents,


forms and records; blank forms should be avoided; study
enough samples to identify all the possible processing
conditions and exceptions

Randomization

no predetermined pattern or plan for selecting sample data

Stratification

a systematic technique that attempts to reduce the variance of


estimates by spreading out the sampling (using a formula and
avoiding very high or very low estimates)

Entity

a true entity has multiple instances and should be named with


nouns; anything about which they would like to capture, store,
and produce information

Requirements Definition

a formal document that communicates the requirements of a

Document

proposed system to key stakeholders and serves as a contract


for teh systems project

JRP (Joint Requirements

a process whereby highly structured group meetings are

Planning)

conducted for the purpose of analyzing problems and defining


requirements

User-Centered Development

a process of systems development whereby the analyst can


concentrate on how the system will be used and not how it will
be constructed

Use-Case Modeling

the process of modeling a system's functions in term of


business events, who initiated the events, and how the system
responds to those events

Use Case

1) a behaviorally related sequence of steps, both automated


and manual, for the purpose of completing a single business
task
2) an analysis tool for finding and identifying business events
and responses

Actor

anything that needs to interact with the system to exchange


information; initiates system activity, a use case, for the
purpose of completing some business task that produces
something of measurable value; can be a human, an
organization, another IS, an external device, or time

Temporal Event

a system event triggered by time

Abstract Use Case

a use case that reduces redundancy among two or more other


use cases by combining the common steps found in those cases

Depends On

a relationship between use cases indicating that one use case


cannot be performed until another use case has been performed

Inheritance

in use cases, a relationship between actors created to simplify


the drawing when an abstract actor inherits the role of multiple
real actors

Data Modeling

a technique for organizing and documenting a system's data

ERD (Entity Relationship

a data model utilizing several notations to depict data in terms

Diagram)

of the entities and relationships described by that data

Compound Attribute

an attribute that consists of other attributes

Degree

the number of entities that participate in a relationship

Recursive Relationship

a relationship that exists between instances of the same entity

Associative Entity

an entity that inherits its primary key from more than one other
entity

Parent Entity

a data entity that contributes one or more attributes to another


entity, called the child; in a one-to-many relationship the parent
is the entity on the "one" side

Child

a data entity that derives one or more attributes from another


entity, called the parent; in a one-to-many relationship, the child
is the entity on the "many" side

Non-Identifying Relationship

a relationship in which each participating entity has its own


independent primary key

Identifying Relationship

a relationship in which the parent entity's key is also part of the


primary key of the child entity

Non-Specific Relationship

a relationships where many instances of an entity are


associated with many instances of another entity (a 'many-tomany' relationship)

Generalization

a concept wherein the attributes that are common to several


types of an entity are grouped into their own entity (ex when a
student might also be an employee and the stored data is the
same)

Supertype

an entity whose instances store attributes that are common to


one or more entity subtypes (ex Person)

Subtype

an entity whose instances may inherit common attributes from


its entity supertype (ex Student and Employee are subtypes of
Person)

Data Analysis

a technique used to improve a data model for implementation


as a database

Normalization

a data analysis technique that organizes data into groups to


form non-redundant, stable, flexible, and adaptive entities

Derived Attribute

an attribute whose value can be calculated from other attributes


or derived from the values of other attributes

Transitive Dependency

when the value of a non-key attribute is dependent on the value


of another non-key attribute other than by derivation

Data-to-Location-CRUD

a matrix that is used to map data requirements to locations;

Matrix

rows indicate entities (and possible attributes), and the columns


indicate locations, and the cells document level of access

Logical Model

a pictorial representation of what a system is or does, without


technical implementation

Physical Model

a pictorial representation of what a system is or does and how it


is physically and technically implemented

DFD (Data Flow Diagram)

a process model used to depict the flow of data through a


system and the work or processing preformed by the system

Process

work performed by a system in response to incoming data flows


or conditions

Decomposition

a tool used to depict the decomposition of a system (breaking


into sub-components)

Function

a set of related and ongoing activities of a business

Event

a logical unit of work that must be completed as a whole


(sometimes called a transaction)

Elementary Process

discrete, detailed activity or task required to complete the


response to an event

Composite Data Flow

data flow that consist of other data flows

Control Flow

a condition or non-data event that triggers a process

Data Conservation

the practice of ensuring that a data flow contains only data


needed by the receiving process

Data Attribute

the smallest piece of data that has meaning to the users and
the business

Data Structure

a specific arrangement of data attributes that define a single


instance of a data flow

Data Type

a class of date that can be stored in an attribute

Domain

the legitimate values for an attribute

Diverging Data Flow

a data flow that spills into multiple data flows

Converging Data Flow

the merger of multiple data flows into a single data flow

Event Partitioning

a structured analysis strategy in which a system is factored into


subsystems based on business events and responses to those
events

Functional Decomposition

a diagram that partitions the system into logical subsystems

Diagram

and/or functions

Event-Response List

a list of the business events to which the system must provide a


response similar to a use-case list

Event Handler

a process that handles a given event in the event-response list

Event Diagram

a data flow diagram for a single even handler and the agents
and data stores that provide inputs or receive outputs

System Diagram

a data flow diagram that merges event diagrams for the entire
system or part of the system

Primitive Diagram

a data flow diagram that depicts the elementary processes,


data stores, and data flows for a single event

Decision Table

a tabular presentation that specifies a set of conditions and

their corresponding actions; they are useful for specifying


complex policies and decision-making rules
Process-to-Location-

a table used to document processes and the locations at which

Association Matrix

they must be performed; rows indicate processes, columns


indicate locations, and cells document which processes must be
performed at which locaitons

Development Costs

one-time costs such as: personnel costs, computer usage costs,


training costs, and equipment costs

Operating Costs

recurring costs such as fixed lease payments, software license


payments, and salaries, or variable computer usage costs that
are dependent on workload, supply costs, and prorated utilities

Tangible Benefit

a benefit that can be easily quantified

Intangible Benefit

a benefit that is believed to be difficult or impossible to quantify

Payback Analysis

a technique for determining if and when an investment will pay


for itself

Payback Period

the period of time that will elapse before accrued benefits


overtake accrued costs

ROI (Return-on-Investment

a technique hat compares the lifetime profitability of alternative

Analysis)

solutions

Net Present Value

an analysis technique that compares the annual discounted


costs and benefits of alternative solutions

interaction

either a communication diagram or a sequence diagram that shows the

diagram

interactions between objects

lifeline or object

the vertical line under an object on a sequence diagram to show the

lifeline

passage of time for the object

true/false condition

part of a message between objects that is evaulated before the message


is sent to determine whether the message can be sent

use case diagram

a diagram showing the various user roles and the way those users
interact with the system

system sequence

a diagram showing the sequence of messages between an external actor

diagram

and the system during a use case scenario

statechart diagram

a diagram showing the life of an object in states an transitions

scenario

or use case instance,a particular sequence of steps within a use case; a


use case may have several different scenarios

precondition

a set of criteria that must be true prior to the initiation of a use case

postcondition

a set of criteria that must be true upon completion of the execution of a


use case

pseudostate

the starting point of a statechart, indicated by a black dot

state

a condition during an object's life when it satisfies some criterion,


performs some action, or waits for an event

transition

the movement of an object from one state to another state

destination state

the state to which an object moves during a transition

origin state

the original state of an object, from which a transition occurs

message event

the trigger for a transition, which causes an object to leave its original
state

guard-condition

a true/false test to see whether a transition can fire

action-expression

a description of the activities to be performed

concurrency

or concurrent states,the condition of being in more than one state at a


time

composite state

Question
1

1 out of 1 points
System requirements serve as benchmarks to measure the overall acceptability of
a finished system.
Selected Answer:
Correct Answer:

True
True

Question

1 out of 1 points

New business support systems that produced valuable information, in addition to


performing manual tasks, were called management information systems (MIS)
because managers were the primary users.
Selected Answer:
Correct Answer:

True
True

Question

1 out of 1 points

A strategic plan that stresses technology tends to create an unfavorable climate


for IT projects that extends throughout an organization.
Selected Answer:
Correct Answer:
Question

False
False
1 out of 1 points

____ is a typical example of a system requirement for the input category.


Selected
Answer:

Student grades must be entered on machine-scannable forms


prepared by the instructor

Correct
Answer:

Student grades must be entered on machine-scannable forms


prepared by the instructor

Question

1 out of 1 points

____ components can provide automated response to sales inquiries, Web-based


order processing, and online inventory tracking.

Question

Selected Answer:

Customer relationship management (CRM)

Correct Answer:

Customer relationship management (CRM)


1 out of 1 points

6
Examples of tangible benefits include all of the following except a(n) ____.
Selected
Answer:

user-friendly system that improves employee job


satisfaction

Correct Answer:

user-friendly system that improves employee job


satisfaction

Question

1 out of 1 points

In a sequence diagram, the interaction proceeds from left to right along horizontal
arrows, while a vertical timeline represents messages from one object to another.
Selected Answer:
Correct Answer:

False
False

Question

1 out of 1 points

Internal factors that affect IT systems projects include all of the following except
____.
Selected Answer:

the economy

Correct Answer:

the economy

Question

1 out of 1 points

A vertical system is a system, such as an inventory or payroll application, that can


be adapted for use in many different companies.
Selected Answer:
Correct Answer:
Question
10

False
False
1 out of 1 points

____ is a typical example of a system requirement for the output category.

Question
11

Selected
Answer:

The contact management system must generate a daily


reminder list for all sales reps

Correct
Answer:

The contact management system must generate a daily


reminder list for all sales reps
1 out of 1 points

When evaluating systems requests, all of the following are disadvantages of a


systems review committee except ____.
Selected
Answer:

one person&#8217;s bias is more likely to affect the


decisions

Correct Answer:

one person&#8217;s bias is more likely to affect the


decisions

Question
12

1 out of 1 points
Supporters of neutral locations for interviews believe that it ____.
Selected
Answer:

keeps interruptions to a minimum so people can


concentrate fully

Correct
Answer:

keeps interruptions to a minimum so people can


concentrate fully

Question
13

1 out of 1 points
A horizontal system is designed to meet the unique requirements of a specific
business or industry, such as a Web-based retailer, a medical practice, or a video
chain.
Selected Answer:
Correct Answer:

False
False

Question
14

1 out of 1 points
All of the following are common reasons for systems requests except ____.
Selected Answer:

weaker controls

Correct Answer:

weaker controls

Question
15

1 out of 1 points
The main objective of all RAD approaches is to extend development time and
expense by excluding users from every phase of systems development.
Selected Answer:
Correct Answer:

Question
16

False
False
1 out of 1 points

Examples of company-wide applications, called ____, include order processing


systems, payroll systems, and company communications networks.
Selected Answer:

enterprise applications

Correct Answer:

enterprise applications

Question
17

1 out of 1 points
Product-oriented companies primarily offer information or services or sell goods
produced by others.
Selected Answer:
Correct Answer:

False
False

Question
18

1 out of 1 points
A systems request might propose enhancements for an existing system, the
correction of problems, or the development of an entirely new information
system.
Selected Answer:
Correct Answer:

True
True

Question
19

1 out of 1 points
Knowledge management systems are called expert systems because they ____.
Selected
Answer:

simulate human reasoning by combining a knowledge base


and inference rules that determine how the knowledge is applied

Correct
Answer:

simulate human reasoning by combining a knowledge base


and inference rules that determine how the knowledge is applied

Question
20

1 out of 1 points
When preparing a checklist of specific tasks to observe and questions to ask, a
systems analyst should consider ____.
Selected Answer:

all of the above

Correct Answer:

all of the above

Question
21

1 out of 1 points
A systems request form should not ____.

Selected Answer:

have complex instructions

Correct Answer:

have complex instructions

Question
22

1 out of 1 points
In an information system, information consists of basic facts that are the
system&#8217;s raw material.
Selected Answer:
Correct Answer:

False
False

Question
23

1 out of 1 points
In a typical company organizational model, middle managers ____.
Selected
Answer:

provide direction, necessary resources, and performance


feedback to supervisors and team leaders

Correct
Answer:

provide direction, necessary resources, and performance


feedback to supervisors and team leaders

Question
24

1 out of 1 points
Each activity within the systems analysis phase has an end product and one or
more milestones.
Selected Answer:
Correct Answer:

True
True

Question
25

1 out of 1 points
Performance limitations result when a system that was designed for a specific
hardware configuration becomes obsolete when new hardware is introduced.
Selected Answer:
Correct Answer:

Question
26

True
True
1 out of 1 points

____ is a typical example of a system requirement for the performance category.


Selected
Answer:

The student records system must produce class lists within


five hours after the end of registration

Correct
Answer:

The student records system must produce class lists within


five hours after the end of registration

Question
27

1 out of 1 points
In launching a new information system, the greatest risk occurs when a
company ____.

Question
28

Selected
Answer:

tries to decide how the system will be implemented before


determining what the system is supposed to do

Correct
Answer:

tries to decide how the system will be implemented before


determining what the system is supposed to do
1 out of 1 points

Traditionally, the SDLC is pictured as a(n) ____, like that shown in the
accompanying figure, where the result of each phase, which is called a
deliverable or end product, flows sequentially into the next phase.
Selected Answer:

waterfall model

Correct Answer:

waterfall model

Question
29

1 out of 1 points
When planning an information system, a company must consider how a new
system will interface with older systems, which are called ____.
Selected Answer:

legacy systems

Correct Answer:

legacy systems

Question
30

1 out of 1 points
In many large companies, applications called enterprise resource planning
(ERP) systems provide cost-effective support for users and managers throughout
the company.
Selected Answer:
Correct Answer:

True
True

Question
31

1 out of 1 points
In an information system, data is information that has been transformed into
output that is valuable to users.
Selected Answer:
Correct Answer:

Question
32

False
False
1 out of 1 points

Of the measures of feasibility in the accompanying figure, ____ considers


questions such as &#8220;Does management support the project?&#8221; and
&#8220;Will the new system require training for users?&#8221;

Question
33

Selected Answer:

operational feasibility

Correct Answer:

operational feasibility
1 out of 1 points

A mission-critical system is one that is unimportant to a company&#8217;s


operations.

Selected Answer:
Correct Answer:

False
False

Question
34

1 out of 1 points
To evaluate ____, a systems analyst needs information about projected future
volume for all outputs, inputs, and processes.
Selected Answer:

scalability

Correct Answer:

scalability

Question
35

1 out of 1 points
Greater user involvement in the system development process usually results in
poorer communication, slower development times, and less satisfied users.
Selected Answer:
Correct Answer:

False
False

Question
36

1 out of 1 points
Examples of intangible benefits include all of the following except a(n) ____.
Selected
Answer:

online package tracking system that decreases the need


for clerical staff

Correct
Answer:

online package tracking system that decreases the need


for clerical staff

Question
37

1 out of 1 points
The ____ phase of the SDLC includes four main activities: requirements
modeling, data and process modeling, object modeling, and consideration of
development strategies.
Selected Answer:

systems analysis

Correct Answer:

systems analysis

Question
38

1 out of 1 points
In object-oriented programming, an object is a member of a(n) ____, which is a
collection of similar objects.
Selected Answer:

class

Correct Answer:

class

Question
39

1 out of 1 points
Creating an FDD is different from drawing an organization chart &#8212;
systems analysts start at the bottom and work their way up.
Selected Answer:
Correct Answer:

False
False

Question
40

1 out of 1 points
Systems requests seldom are aimed at improving service to customers or users
within a company.
Selected Answer:
Correct Answer:

False
False

Question
41

1 out of 1 points
The primary advantage of RAD is that ____.
Selected
Answer:

systems can be developed more quickly with significant


cost savings

Correct
Answer:

systems can be developed more quickly with significant


cost savings

Question
42

1 out of 1 points
TP systems are inefficient because they process a set of transaction-related
commands individually rather than as a group.
Selected Answer:
Correct Answer:

False
False

Question
43

1 out of 1 points
While RAD typically focuses only on fact-finding and requirements
determination, JAD provides a fast-track approach to a full spectrum of system
development tasks, including planning, design, construction, and
implementation.
Selected Answer:
Correct Answer:

Question

False
False
1 out of 1 points

44
____ is a traditional, time-tested, easy to understand systems development
technique that uses a set of process models to describe a system graphically.
Selected Answer:

Structured analysis

Correct Answer:

Structured analysis

Question
45

1 out of 1 points
A risk of RAD is that a system might work well in the short term, but the
corporate and long-term objectives for the system might not be met.
Selected Answer:
Correct Answer:

True
True

Question
46

1 out of 1 points
____ is an example of a discretionary project.
Selected Answer:

Creating a new report for a user

Correct Answer:

Creating a new report for a user

Question
47

1 out of 1 points
A(n) ____ describes the logic that programmers use to write code modules.
Selected Answer:

process model

Correct Answer:

process model

Question
48

0 out of 1 points
In an interview, ____ are questions that ask a person to evaluate something by
providing limited answers to specific responses or on a numeric scale.

Question
49

Selected Answer:

closed-ended questions

Correct Answer:

range-of-response questions
1 out of 1 points

IBM claims that its WebSphere strategy is best for Web-based application
development, while Microsoft counters with a broad vision called .NET that
redefines that company&#8217;s approach to Web-based application
development.

Selected Answer:
Correct Answer:

True
True

Question
50

1 out of 1 points
Hardware-based security controls include passwords, various levels of user
access, and coding data.
Selected Answer:
Correct Answer:

False
False

Question
51

1 out of 1 points
A business process describes a specific set of transactions, events, tasks, and
results.
Selected Answer:
Correct Answer:

True
True

Question
52

1 out of 1 points
A ____, or requirements model, describes the information that a system must
provide.
Selected Answer:

business model

Correct Answer:

business model

Question
53

1 out of 1 points
Compared with traditional methods, the entire RAD process is expanded and, as
a result, the new system is built, delivered, and placed in operation much later.
Selected Answer:
Correct Answer:

False
False

Question
54

1 out of 1 points
As users rely more heavily on information systems to perform their jobs, they
are likely to request even more IT services and support.
Selected Answer:
Correct Answer:

Question
55

True
True
1 out of 1 points

Today, systems development is much more team-oriented than in the past.


Selected Answer:
Correct Answer:

True
True

Question
56

1 out of 1 points
Business support systems ____.
Selected
Answer:

provide job-related information support to users at all


levels of a company

Correct
Answer:

provide job-related information support to users at all


levels of a company

Question
57

1 out of 1 points
When setting priorities for systems requests, the highest priority goes to projects
that provide the ____.
Selected
Answer:

greatest benefit, at the lowest cost, in the shortest period


of time

Correct
Answer:

greatest benefit, at the lowest cost, in the shortest period


of time

Question
58

1 out of 1 points
System requirements fall into five general categories: outputs, inputs, processes,
performance, and controls.
Selected Answer:
Correct Answer:

True
True

Question
59

1 out of 1 points
A SWOT analysis contributes to the strategic planning process by identifying
____ resources.

Question
60

Selected Answer:

all of the above

Correct Answer:

all of the above


1 out of 1 points

Although the business-to-business (B2B) sector is more familiar to retail


customers, the volume of business-to-consumer (B2C) transactions is many

times greater.
Selected Answer:
Correct Answer:

False
False

Question
61

1 out of 1 points
IT professionals recognize that successful systems must be user-oriented, and
users need to be involved, formally or informally, at every stage of systems
development.
Selected Answer:
Correct Answer:

True
True

Question
62

1 out of 1 points
Transaction processing (TP) systems ____.
Selected
Answer:

process data generated by day-to-day business


operations

Correct Answer:

process data generated by day-to-day business


operations

Question
63

1 out of 1 points
Traditionally, a company either developed its own information systems, called
in-house applications, or purchased systems called software packages from
outside vendors.
Selected Answer:
Correct Answer:

Question
64

True
True
1 out of 1 points

User productivity systems ____.

Question
65

Selected
Answer:

include e-mail, voice mail, fax, video conferencing, word


processing, automated calendars, database management,
spreadsheets, and high-speed Internet access

Correct
Answer:

include e-mail, voice mail, fax, video conferencing, word


processing, automated calendars, database management,
spreadsheets, and high-speed Internet access
1 out of 1 points

System analysts use modeling and fact-finding interactively &#8212; first they
build fact-finding results into models, then they study the models to determine
whether additional fact-finding is needed.
Selected Answer:
Correct Answer:

True
True

Question
66

1 out of 1 points
In a typical company organizational model, top managers ____.
Selected
Answer:

develop long-range plans, called strategic plans, that define


the company&#8217;s overall mission and goals

Correct
Answer:

develop long-range plans, called strategic plans, that define


the company&#8217;s overall mission and goals

Question
67

1 out of 1 points
Using a(n) ____, an analyst can show business functions and break them down
into lower-level functions and processes.
Selected Answer:

FDD

Correct Answer:

FDD

Question
68

1 out of 1 points
When companies attempt to simplify operations or reduce costs, a popular
strategy is to have managers and systems analysts perform ____.
Selected Answer:

business process reengineering (BPR)

Correct Answer:

business process reengineering (BPR)

Question
69

1 out of 1 points
Compared with traditional methods, when properly used, JAD can result in all
of the following except ____.

Question
70

Selected
Answer:

less expense and greater manageability if the group is too


large

Correct Answer:

less expense and greater manageability if the group is too


large
1 out of 1 points

In an interview, ____ limit or restrict the response.


Selected Answer:

closed-ended questions

Correct Answer:

closed-ended questions

Question
71

1 out of 1 points
Because use cases depict a system through the eyes of a user, common business
language can be used to describe the transactions.
Selected Answer:
Correct Answer:

True
True

Question
72

1 out of 1 points
A company&#8217;s mission statement is unrelated to its major goals, shorterterm objectives, and day-to-day business operations.
Selected Answer:
Correct Answer:

False
False

Question
73

1 out of 1 points
Strategic planning looks beyond day-to-day activities and focuses on a horizon
that is 3, 5, or even 10 years in the future.
Selected Answer:
Correct Answer:

True
True

Question
74

1 out of 1 points
____ are especially important to a systems analyst who must work with people
at all organizational levels, balance conflicting needs of users, and communicate
effectively.

Question
75

Selected Answer:

Interpersonal skills

Correct Answer:

Interpersonal skills
1 out of 1 points

Of the measures of feasibility in the accompanying figure, ____ assesses tangible


and intangible benefits to the company in addition to costs.
Selected Answer:

economic feasibility

Correct Answer:

economic feasibility

Question
76

1 out of 1 points
____ is a typical example of a system requirement for the process category.
Selected
Answer:

The video rental system must not execute new rental


transactions for customers who have overdue tapes

Correct
Answer:

The video rental system must not execute new rental


transactions for customers who have overdue tapes

Question
77

1 out of 1 points
Internal and external factors affect every business decision that a company
makes, and IT systems are no exception.
Selected Answer:
Correct Answer:

True
True

Question
78

1 out of 1 points
Because it is linked to a specific development methodology, systems developers
use JAD whenever group input and interaction is not desired.
Selected Answer:
Correct Answer:

False
False

Question
79

1 out of 1 points
External factors that affect IT systems projects include all of the following
except ____.
Selected Answer:

managers

Correct Answer:

managers

Question
80

1 out of 1 points
The purpose of a JIT (just-in-time) system is to provide the right product at the
right place at the right time.
Selected Answer:
Correct Answer:

True
True

Question
81

1 out of 1 points
Some industry experts predict that bar code technology will be overshadowed in
the future by electronic product code (EPC) technology that uses RFID tags to
identify and monitor the movement of each individual product.
Selected Answer:
Correct Answer:

Question
82

True
True
1 out of 1 points

____ is a typical example of a system requirement for the control category.


Selected
Answer:

The system must maintain separate levels of security for


users and the system administrator

Correct
Answer:

The system must maintain separate levels of security for


users and the system administrator

Question
83

1 out of 1 points
Management leadership and information technology are unconnected, and no
significant changes have occurred in either area.
Selected Answer:
Correct Answer:

Question
84

False
False
1 out of 1 points

Of the measures of feasibility in the accompanying figure, ____ considers points


such as &#8220;Does the proposed platform have sufficient capacity for future
needs?&#8221; and &#8220;Will the hardware and software environment be
reliable?&#8221;

Question
85

Selected Answer:

technical feasibility

Correct Answer:

technical feasibility
1 out of 1 points

____ software controls the flow of data, provides data security, and manages
network operations.

Selected Answer:

System

Correct Answer:

System

Question
86

1 out of 1 points
Of the measures of feasibility in the accompanying figure, issues that relate to
____ include &#8220;Has management established a firm timetable for the
project?&#8221; and &#8220;Will a project manager be appointed?&#8221;
Selected Answer:

schedule feasibility

Correct Answer:

schedule feasibility

Question
87

1 out of 1 points
When assessing priorities for systems requests, a systems analyst should look
for high scores in all of the following except ____.
Selected
Answer:

Will the proposed system decrease revenue for the


company?

Correct Answer:

Will the proposed system decrease revenue for the


company?

Question
88

1 out of 1 points
Because of the limited range of input and interaction among participants, few
companies believe that a JAD group produces the best definition of a new
system.
Selected Answer:
Correct Answer:

False
False

Question
89

1 out of 1 points
Application software manages hardware components, which can include a
single workstation or a global network with many thousands of clients.
Selected Answer:
Correct Answer:

Question
90

False
False
1 out of 1 points

System software consists of programs that support day-to-day business


functions and provide users with the information they require.

Selected Answer:
Correct Answer:

False
False

Question
91

1 out of 1 points
The success or failure of an information system usually is unrelated to whether
users are satisfied with the system&#8217;s output and operations.
Selected Answer:
Correct Answer:

False
False

Question
92

1 out of 1 points
In an interview, ____ encourage spontaneous and unstructured responses.
Selected Answer:

open-ended questions

Correct Answer:

open-ended questions

Question
93

1 out of 1 points
A system must have effective controls to ensure that data is secure and accurate.
Selected Answer:
Correct Answer:

True
True

Question
94

1 out of 1 points
UML provides various graphical tools, such as use case diagrams and sequence
diagrams.
Selected Answer:
Correct Answer:

True
True

Question
95

1 out of 1 points
Service-oriented companies manufacture and sell products such as computers,
routers, or microchips.
Selected Answer:
Correct Answer:

Question
96

False
False
1 out of 1 points

Systems development typically starts with a ____.

Selected
Answer:

systems request, followed by a preliminary investigation,


which includes a feasibility study

Correct
Answer:

systems request, followed by a preliminary investigation,


which includes a feasibility study

Question
97

1 out of 1 points
A strong business case suggests that a company should pursue other options,
above the alternative, because it would be in the firm&#8217;s best interest to
do so.
Selected Answer:
Correct Answer:

False
False

Question
98

1 out of 1 points
Much of the time a systems analyst spends talking with people is spent
conducting ____, which is/are the most common fact-finding technique.
Selected Answer:

interviews

Correct Answer:

interviews

Question
99

1 out of 1 points
Data entry controls should be excessive without being effective.
Selected Answer:
Correct Answer:

False
False

Question 100

1 out of 1 points
RAD relies heavily on prototyping and user involvement.
Selected Answer:
Correct Answer:

Question 1

1 out of 1 points
When determining outsourcing fees, a ____ uses a set fee based on a specified
level of service and user support.
Correct Answer:

Question
2

True
True

fixed fee model


1 out of 1 points

The Software &amp; Information Industry Association and many software


industry leaders, including Microsoft, believe that the concept of ____ is

redefining the way that companies develop and deploy their information systems.
Correct Answer:

software as a service

Question

1 out of 1 points

3
In a DFD, the Gane and Sarson symbol for an entity is a ____.
Correct
Answer:

rectangle, which may be shaded to make it look threedimensional

Question

1 out of 1 points

Another term for IBS is managed hosting, because the operation is managed by
the outside firm, or host.

Correct Answer:

True

Question

1 out of 1 points

A ____ is a document that describes a company, lists the IT services or products


needed, and specifies the features required.
Correct Answer:

request for proposal (RFP)

Question

1 out of 1 points

All of the following are true of Web-based development except ____.


Correct
Answer:

Internet-based development treats the Web as a


communication channel, rather than as the platform

Question

1 out of 1 points

7
An object treats data and processes separately.

Correct Answer:

False

Question

1 out of 1 points

8
In a DFD, the Gane and Sarson symbol for a process is a ____.
Correct Answer:

rectangle with rounded corners

Question

1 out of 1 points

9
A gray hole process is a process that has ____.
Correct
Answer:

at least one input and one output, but the input obviously is
too insufficient to generate the output shown

Question
10

1 out of 1 points
All of the following are true of a traditional systems development environment
except ____.
Correct
Answer:

scalability is not affected by telecommunications


limitations and local networks

Question
11

1 out of 1 points
When DFDs are drawn, each of the following conventions should be followed
except ____.
Correct Answer:

use the same names within each set of symbols

Question
12

1 out of 1 points
Which of the following is NOT an attribute of a car?
Correct Answer:

parking

Question
13

1 out of 1 points
Two Web-based development environments are IBM&#8217;s WebSphere and
Microsoft&#8217;s .NET.

Correct Answer:

True

Question
14

1 out of 1 points
Some data files should be totally hidden from view, while others should have
____ so users can view, but not change, the data.
Correct Answer:

Question
15

read-only properties
1 out of 1 points

Building an application in a Web-based environment might involve different


risks and benefits, compared to a traditional environment.

Correct Answer:

True

Question
16

1 out of 1 points
Because diagram 0 is a more detailed or expanded version of process 0 on a
context diagram, diagram 0 is called a(n) ____.
Correct Answer:

exploded view

Question
17

1 out of 1 points
____ is a widely used method of visualizing and documenting an information
system.
Correct Answer:

UML

Question
18

1 out of 1 points
A logical model describes how a system will be constructed.

Correct Answer:

False

Question
19

1 out of 1 points
In a DFD, a process symbol can have only one outgoing data flow.

Correct Answer:

False

Question
20

1 out of 1 points
In a DFD, a data flow must have a process symbol on at least one end.

Correct Answer:
Question
21

True
1 out of 1 points

Typically, customers purchase licenses that give them the right to use the
software under the terms of the license agreement.

Correct Answer:

True

Question
22

1 out of 1 points
When companies use a ____, they already know the specific products or service
they want and need to obtain price quotations or bids from vendors.
Correct Answer:

request for quotation (RFQ)

Question
23

1 out of 1 points
Mergers and acquisitions typically have no impact on clients and customers of
large, financially healthy firms.

Correct Answer:

False

Question
24

1 out of 1 points
A gas pump is an example of a black box.

Correct Answer:

True

Question
25

1 out of 1 points
An IBS (Internet business services) solution is attractive to customers because it
offers online data center support, mainframe computing power for missioncritical functions, and universal access via the Internet.

Correct Answer:

True

Question
26

1 out of 1 points
Your car performs a(n) ____ called operate wipers when you send a message by
moving the proper control.
Correct Answer:

Question
27

method
1 out of 1 points

A company considering outsourcing must realize that the solution can be only as
good as the outsourcing firm that provides the service.

Correct Answer:

True

Question
28

1 out of 1 points
A black hole process is a process that has ____.
Correct Answer:

no output

Question
29

1 out of 1 points
In a use case, an external entity is called a(n) ____.
Correct Answer:

actor

Question
30

1 out of 1 points
Leveling ____.
Correct
Answer:

uses a series of increasingly detailed DFDs to describe an


information system

Question
31

1 out of 1 points
In a DFD, the Gane and Sarson symbol for a data store is a ____.
Correct
Answer:

flat rectangle that is open on the right side and closed on


the left side

Question
32

1 out of 1 points
Several years ago, Gartner, a leading IT research and consulting firm, accurately
forecast the enormous growth of offshore outsourcing.

Correct Answer:

True

Question
33

1 out of 1 points
A major advantage of O-O designs is that systems analysts can save time and
avoid errors by using modular objects.

Correct Answer:
Question

True
1 out of 1 points

34
An auto parts store inventory ____ might include part number, description,
supplier code, minimum and maximum stock levels, cost, and list price.
Correct Answer:

record

Question
35

1 out of 1 points
All of the following are true of Web-based development except ____.
Correct
Answer:

Web-based software treats the software as a service that is


more dependent on desktop computing powers and resources

Question
36

1 out of 1 points
Mission-critical IT systems should be outsourced only if the result is a costattractive, reliable, business solution that fits the company&#8217;s long-term
business strategy.

Correct Answer:

True

Question
37

0 out of 1 points
Many valuable reports can be obtained from a data dictionary, including a(n)
____.
Correct Answer:

all of the above

Question
38

1 out of 1 points
In a DFD, the Gane and Sarson symbol for a data flow is a ____.
Correct Answer:

line with a single or double arrowhead

Question
39

1 out of 1 points
Microsoft&#8217;s ____ is one of the major Web-based development
environments.
Correct Answer:

.NET

Question
40

1 out of 1 points
A data flow in a DFD represents one or more data items.

Correct Answer:

True

Question
41

1 out of 1 points
The number of attributes needed to describe an object depends on the business
requirements of the information system and its users.

Correct Answer:

True

Question
42

1 out of 1 points
An object&#8217;s ____ are the tasks or functions the object performs.
Correct Answer:

methods

Question
43

1 out of 1 points
A major advantage of outsourcing is that it eliminates employee concerns about
job security.

Correct Answer:

False

Question
44

1 out of 1 points
The UML symbol for a use case is a(n) ____ with a label that describes the
action or event.
Correct Answer:

oval

Question
45

1 out of 1 points
Using Gane and Sarson symbols, a DFD represents processes as circles.

Correct Answer:

False

Question
46

1 out of 1 points
A black box does not want or need outside interference.

Correct Answer:

True

Question
47

1 out of 1 points
The Software &amp; Information Industry Association (SIIA) believes that the
acquisition of software as a service rather than a product will have a major
impact on the software industry.

Correct Answer:

True

Question
48

1 out of 1 points
Two data stores can be connected by a data flow without an intervening process.

Correct Answer:

False

Question
49

1 out of 1 points
Just as objects are similar to adjectives, attributes resemble verbs that describe
what and how an object does something.

Correct Answer:

False

Question
50

1 out of 1 points
A class can belong to a more general category called a subclass.

Correct Answer:

False

Question
51

1 out of 1 points
The concept that a message gives different meanings to different objects is
called encapsulation.

Correct Answer:

False

Question
52

1 out of 1 points
Oracle Corporation offers a service called ____, which provides E-business
applications on a fixed fee basis.
Correct Answer:

Oracle On Demand

Question
53

1 out of 1 points
Balancing ____.
Correct
Answer:

ensures that the input and output data flows of the parent
DFD are maintained on the child DFD

Question
54

1 out of 1 points
In data and process modeling, a(n) ____ model shows what the system must do,
regardless of how it will be implemented physically.
Correct Answer:

logical

Question
55

1 out of 1 points
The UML represents an object as a(n) ____ with the object name at the top,
followed by the object&#8217;s attributes and methods.
Correct Answer:

rectangle

Question
56

1 out of 1 points
When determining outsourcing fees, a ____ has a variable fee based on the
number of users or workstations that have access to the application.
Correct Answer:

subscription model

Question
57

1 out of 1 points
All relationships have equal weight; none is stronger than any other.

Correct Answer:

False

Question
58

0 out of 1 points
A method is like a blueprint, or template, for all the objects within a class.

Correct Answer:

False

Question
59

1 out of 1 points
A DFD shows the structure and detailed contents of a data flow.

Correct Answer:

False

Question
60

1 out of 1 points
In a traditional systems development environment, security issues usually are
less complex than with Web-based systems, because the system operates on a
private telecommunications network, rather than the Internet.

Correct Answer:

True

Question
61

1 out of 1 points
System analysts define an object&#8217;s attributes during the systems design
process.

Correct Answer:

True

Question
62

1 out of 1 points
An ASP provides a license to use the software, and nothing more.

Correct Answer:

False

Question
63

1 out of 1 points
A(n) ____ defines specific tasks that an object can perform.
Correct Answer:

method

Question
64

0 out of 1 points
The same message to two different objects produces the same results.

Correct Answer:
Question
65

False
1 out of 1 points

A software package developed to handle information requirements for a specific


type of business is called a horizontal application.

Correct Answer:

False

Question
66

1 out of 1 points
Spontaneous generation, black holes, and gray holes are logically impossible in
a DFD because a process must act on input, shown by an incoming data flow,
and produce output, represented by an outgoing data flow.

Correct Answer:

True

Question
67

1 out of 1 points
A use case ____ documents the name of the use case, the actor, a description of
the use case, a step-by-step list of the tasks and actions required for successful
completion, a description of alternative courses of action, preconditions,
postconditions, and assumptions.
Correct Answer:

description

Question
68

1 out of 1 points
Data flows are shown in a context diagram because data stores are external to
the system.

Correct Answer:

False

Question
69

1 out of 1 points
A software package that can be used by many different types of organizations is
called a vertical application.

Correct Answer:

False

Question
70

1 out of 1 points
Internet-based development treats the Web as just a communications channel,
rather than as a platform.

Correct Answer:
Question

False
1 out of 1 points

71
A DFD does not show the external entities that provide data to the system or
receive output from the system.

Correct Answer:

False

Question
72

1 out of 1 points
The ____ uses a set of symbols to represent graphically the various components
and relationships within a system.
Correct Answer:

UML

Question
73

1 out of 1 points
Late in the systems design phase, you build a logical model that describes how a
system will be constructed.

Correct Answer:

False

Question
74

1 out of 1 points
The main reason for offshore outsourcing is the same as domestic outsourcing:
lower bottom-line costs.

Correct Answer:

True

Question
75

1 out of 1 points
By limiting access to internal processes, an object prevents its internal code
from being altered by another object or process.

Correct Answer:

True

Question
76

1 out of 1 points
Systems analysts call an entity that supplies data to the system a sink, and an
entity that receives data from the system a source.

Correct Answer:

False

Question
77

1 out of 1 points
Typically, companies choose in-house software development for all of the
following reasons except to ____.
Correct
Answer:

obtain input from other companies who already have


implemented the software

Question
78

1 out of 1 points
Which of the following is not a path that development can follow?
Correct Answer:

construct a legacy system

Question
79

1 out of 1 points
DFD symbols are referenced by using all ____ letters for the symbol name.
Correct Answer:

capital

Question
80

1 out of 1 points
The data dictionary usually records and describes a default value, which is the
____.
Correct
Answer:

value for the data element if a value otherwise is not


entered for it

Question
81

1 out of 1 points
Leveling also is called ____.
Correct Answer:

all of the above

Question
82

1 out of 1 points
The line from the actor to a use case is called a(n) ____.
Correct Answer:

Question
83

association
1 out of 1 points

If objects are similar to adjectives that describe the characteristics of an object,


attributes are similar to nouns.

Correct Answer:

False

Question
84

1 out of 1 points
Customer objects can perform specific tasks, such as placing an order, or paying
a bill.

Correct Answer:

True

Question
85

1 out of 1 points
A DFD does not show the detailed contents of a data store &#8212; the specific
structure and data elements are defined in the data dictionary.

Correct Answer:

True

Question
86

1 out of 1 points
A use case ____ is a visual summary of several related use cases within a
system or subsystem.
Correct Answer:

diagram

Question
87

0 out of 1 points
Advantages of purchasing a software package over developing software inhouse include all of the following except ____.
Correct Answer:

satisfaction of unique business requirements

Question
88

1 out of 1 points
Inheritance enables an object to derive one or more of its attributes from a(n)
____.
Correct Answer:

parent

Question
89

0 out of 1 points
Buyers can customize a software package by ____.
Correct Answer:

all of the above

Question
90

1 out of 1 points
Your red Mustang is a(n) ____ of the CAR class.
Correct Answer:

instance

Question
91

1 out of 1 points
Objects can have a specific attribute called a(n) ____, which describes the
object&#8217;s current status.
Correct Answer:

state

Question
92

1 out of 1 points
A physical model shows what the system must do, regardless of how it will be
implemented.

Correct Answer:

False

Question
93

1 out of 1 points
In a DFD, processes contain the business logic, also called business rules, that
transform the data and produce the required results.

Correct Answer:

True

Question
94

1 out of 1 points
Outsourcing can refer to ____.
Correct Answer:

all of the above

Question
95

1 out of 1 points
A data flow diagram (DFD) shows how the system transforms input data into
useful information.

Correct Answer:
Question
96

True
1 out of 1 points

When you create a use case diagram, the first step is to identify the system
boundary, which is represented by a ____.
Correct Answer:

rectangle

Question
97

1 out of 1 points
Some objects might have a few attributes; others might have dozens.

Correct Answer:

True

Question
98

1 out of 1 points
A set of DFDs provides a logical model that shows how the system works, not
what the system does.

Correct Answer:

False

Question
99

0 out of 1 points
A spontaneous generation process is a process that has ____.
Correct Answer:

no input

Question
100

1 out of 1 points
An object has certain ____.
Correct Answer:

Question
1

attributes

1 out of 1 points
Problems found with 1NF (first normal form) design that do not exist in 2NF
(second normal form) include all of the following except ____.
Correct Answer:

Question
2

1NF tables always contain consistent data


1 out of 1 points

When developing e-business systems, an in-house solution usually requires a


____ for a company that must adapt quickly in a dynamic e-commerce
environment.

Correct Answer:

greater initial investment but provides more flexibility

Question

1 out of 1 points

3
An existence check is a data validation check that ____.
Correct Answer:

is used for mandatory data items

Question

1 out of 1 points

Exception reports are useful when the user needs to know the details, but does
not want information only on records that might require action.

Correct Answer:

False

Question

0 out of 1 points

In a typical file processing environment, ____ problems can occur if updates are
not applied in every file.
Correct Answer:

data integrity

Question

1 out of 1 points

In a table or file, each column represents a record, which is an individual


instance, or occurrence of an entity, and each row represents a field, or
characteristic of the entity.

Correct Answer:
Question

False
1 out of 1 points

7
A combination check is a data validation check that ____.
Correct
Answer:
Question
8

is performed on two or more fields to ensure that they are


consistent or reasonable when considered together
1 out of 1 points

In a detail report, each line of output printed is called a detail line.

Correct Answer:

True

Question

1 out of 1 points

Web pages are stored on a Web server, which is a computer that receives requests
and makes Web pages available to users.

Correct Answer:

True

Question
10

1 out of 1 points
Online processing systems typically have all of the following characteristics
except ____.
Correct
Answer:

the system requires significantly fewer network resources


than batch systems

Question
11

1 out of 1 points
A ____ is a text document written in HTML.
Correct Answer:

Web page

Question
12

0 out of 1 points
A table is in first normal form (1NF) if it contains a repeating group.

Correct Answer:

False

Question
13

1 out of 1 points
Relational databases are poorly suited to client/server computing because they
are so powerless and rigid.

Correct Answer:

False

Question
14

1 out of 1 points
____ is the measure of a system&#8217;s ability to expand, change, or
downsize easily to meet the changing needs of a business enterprise.
Correct Answer:

Scalability

Question
15

1 out of 1 points
Today, client/server architecture is the dominant form of systems design, using
Internet protocols and traditional network models.

Correct Answer:

True

Question
16

1 out of 1 points
A disadvantage of server-based processing is that character-based terminals
typically are used, which provide a limited interface for users.

Correct Answer:

True

Question
17

1 out of 1 points
In a file-oriented information system, a security file ____.
Correct Answer:

is created and saved for backup and recovery purposes

Question
18

1 out of 1 points
In the OSI (open system interconnection) model, the application layer ____.
Correct
Answer:

provides network services requested by a local


workstation

Question
19

1 out of 1 points
To design data entry screens that are easy to learn and use, employ all of the
following guidelines except ____.
Correct Answer:

require users to type leading zeroes for numeric fields

Question
20

1 out of 1 points
Generally, reports used by individuals at higher levels in an organization include
more detail than reports used by lower-level employees.

Correct Answer:
Question
21

False
1 out of 1 points

A popular rule of thumb is that a design is in 3NF if every nonkey field depends
on the key, the whole key, and nothing but the key.

Correct Answer:

True

Question
22

1 out of 1 points
A batch processing system has all of the following characteristics except ____.
Correct
Answer:

the information system is available whenever necessary to


support business operations

Question
23

1 out of 1 points
In contrast to a centralized system, a client/server design separates applications
and data.

Correct Answer:

True

Question
24

1 out of 1 points
Impact printers can use multi-part forms to produce more than one copy, which
is an advantage to firms that require several copies of the same report.

Correct Answer:

True

Question
25

1 out of 1 points
In a client/server design, a database server ____.
Correct Answer:

processes individual SQL commands

Question
26

1 out of 1 points
In a Web-based database design, the Internet serves as the front end, or
interface, for the database management system.

Correct Answer:
Question
27

True
1 out of 1 points

In the OSI (open system interconnection) model, the presentation layer ____.

Correct
Answer:

assures that data is uniformly structured and formatted for


network transmission

Question
28

1 out of 1 points
Podcasts are especially important for legal reasons, or where it is necessary to
display a signature, date stamp, or other visual features of a document.

Correct Answer:

False

Question
29

1 out of 1 points
In a file-oriented information system, a transaction file ____.
Correct
Answer:

stores records that contain day-to-day business and


operational data

Question
30

1 out of 1 points
A(n) ____, which is used to access stored data, allows a user to specify a task
without specifying how the task will be accomplished.
Correct Answer:

query language

Question
31

1 out of 1 points
For upper-level managers who often want to see total figures and do not need
supporting details, a(n) ____ is appropriate.
Correct Answer:

summary report

Question
32

1 out of 1 points
In a file-oriented information system, a history file contains reference data used
by the information system.

Correct Answer:
Question
33

False
1 out of 1 points

An entity is a person, place, thing, or event for which data is collected and
maintained.

Correct Answer:

True

Question
34

1 out of 1 points
A client is a computer that supplies data, processing services, or other support to
one or more computers, called servers.

Correct Answer:

False

Question
35

1 out of 1 points
The Internet has had little impact on system architecture.

Correct Answer:

False

Question
36

1 out of 1 points
In e-commerce, data mining works best when a goal is to reduce clicks to close,
which means average page views to accomplish a purchase or obtain desired
information.

Correct Answer:

True

Question
37

1 out of 1 points
According to a usability expert at IBM, a computer user has the right to ____.
Correct Answer:

all of the above

Question
38

1 out of 1 points
A reasonableness check is a data validation check that ____.
Correct
Answer:

identifies values that are questionable, but not necessarily


wrong

Question
39

1 out of 1 points
A range check is a data validation check that ____.
Correct

tests data items to verify that they fall between a specified

Answer:

minimum and maximum value

Question
40

1 out of 1 points
A system design where the server performs all the processing is described as
____.
Correct Answer:

mainframe architecture

Question
41

1 out of 1 points
In a typical LAN, clients share data stored on a local server that supports a
group of users or a department.

Correct Answer:

True

Question
42

1 out of 1 points
Intranets and extranets are called Web-centric because they use different
protocols, or data transmission standards, than the Internet.

Correct Answer:

False

Question
43

1 out of 1 points
In a(n) ____ design, the remote user&#8217;s keystrokes are transmitted to the
mainframe, which responds by sending screen output back to the user&#8217;s
screen.
Correct Answer:

centralized

Question
44

1 out of 1 points
One problem in a file processing environment is ____, which means that data
common to two or more information systems is stored in several places.
Correct Answer:

Question
45

data redundancy
1 out of 1 points

Interface design should call attention to the interface, rather than facilitating
design objectives.

Correct Answer:

False

Question
46

1 out of 1 points
In today&#8217;s interconnected world, output from one system often becomes
input into another system.

Correct Answer:

True

Question
47

1 out of 1 points
When using Microsoft Office, documents, spreadsheets, and databases can be
stored in Unicode-compatible form by using the font called ____.
Correct Answer:

Arial Unicode MS

Question
48

1 out of 1 points
Good interface design is based partly on ____, which focuses on how an
interface can be made attractive and easy to use.
Correct Answer:

aesthetics

Question
49

1 out of 1 points
A subschema is a view of a database used by one or more systems or users.

Correct Answer:

True

Question
50

1 out of 1 points
Good user interface design is based partly on ____, which describes how people
work, learn, and interact with computers.
Correct Answer:

ergonomics

Question
51

1 out of 1 points
____ describes how instances of one entity relate to instances of another entity.
Correct Answer:

Question

Cardinality
1 out of 1 points

52
____ protects privacy rights and shields an organization&#8217;s proprietary
data from theft or unauthorized access.
Correct Answer:

Output security

Question
53

1 out of 1 points
____ means that a system can be expanded, modified, or downsized easily to
meet the rapidly changing needs of a business enterprise.
Correct Answer:

Scalability

Question
54

1 out of 1 points
Centering headings over maximum field widths is ideal when many of the actual
values are shorter than the maximum width.

Correct Answer:

False

Question
55

1 out of 1 points
Middleware provides a transparent interface that enables system designers to
integrate dissimilar software and hardware.

Correct Answer:

True

Question
56

1 out of 1 points
The speed of laser printers is rated in ____, which can be used to estimate the
time required to print a report.
Correct Answer:

ppm (pages per minute)

Question
57

0 out of 1 points
As the size of a business changes, it is easier to alter the capability of a largescale central server than it is to adjust the number of clients and the processing
functions they perform.

Correct Answer:
Question

False
1 out of 1 points

58
A repeating group is a set of one or more fields that can occur only once in a
single record, with each occurrence having the same value.

Correct Answer:

False

Question
59

1 out of 1 points
On a source document, the ____ contains codes, identification information,
numbers, and dates that are used for storing completed forms.
Correct Answer:

control zone

Question
60

1 out of 1 points
Compared to file server designs, client/server systems ____.
Correct Answer:

reduce network loads and improve response times

Question
61

1 out of 1 points
A report footer, which appears at the end of a report, can include grand totals for
numeric fields and other end-of-report information.

Correct Answer:

True

Question
62

1 out of 1 points
In a typical client/server system, the client stores the data and provides data
access and database management functions.

Correct Answer:

False

Question
63

1 out of 1 points
Apart from backup and recovery procedures necessary to sustain business
operations ____ laws and regulations apply to company data.
Correct Answer:

Question
64

file retention
1 out of 1 points

When considering physical design, a systems analyst must determine how a new
application will communicate with existing legacy systems.

Correct Answer:

True

Question
65

1 out of 1 points
After a report design is approved, the design should be documented in a ____,
which contains information about the fields, data types and lengths, report
frequency and distribution, and other comments.
Correct Answer:

report analysis form

Question
66

1 out of 1 points
A fat client, also called a thick client, design locates all or most of the
processing logic at the server.

Correct Answer:

False

Question
67

1 out of 1 points
Visio is an example of a CASE tool that can help users plan, analyze, design,
and implement an information system.

Correct Answer:

True

Question
68

1 out of 1 points
A(n) ____ produces one or more lines of output for each record processed.
Correct Answer:

detail report

Question
69

1 out of 1 points
In a file-oriented information system, a work file ____.
Correct
Answer:

Question
70

is a temporary file created by an information system for a


single task
1 out of 1 points

The type of output and the technology needed usually is decided during the
systems analysis phase, based on user requirements.

Correct Answer:

True

Question
71

1 out of 1 points
A database system stores and manages data in separate files using a method
called file processing.

Correct Answer:

False

Question
72

1 out of 1 points
When designing a report, a sample report, which is a ____, or prototype, should
be prepared for users to review.
Correct Answer:

mock-up

Question
73

1 out of 1 points
A(n) ____ displays only those records that meet a specific condition or
conditions.
Correct Answer:

exception report

Question
74

1 out of 1 points
In the OSI (open system interconnection) model, the session layer ____.
Correct
Answer:

defines control structures that manage the communications


link between computers

Question
75

0 out of 1 points
Either a page header or a page footer, which appears at the bottom of a page, is
used to display the name of the report and a page number.

Correct Answer:
Question
76

True
1 out of 1 points

A fat client design is ____ to develop than a thin client design, because the
architecture resembles traditional file-server designs where all processing is
performed at the client.
Correct Answer:

simpler and less expensive

Question
77

1 out of 1 points
A three-tier design includes a middle layer between the client and server that
processes the client requests and translates them into data access commands that
can be understood and carried out by the server.

Correct Answer:

True

Question
78

1 out of 1 points
The ____ section in a typical system design specification describes the
constraints, or conditions, affecting a system, including any requirements that
involve operations, hardware, systems software, or security.
Correct Answer:

System Environment

Question
79

1 out of 1 points
When a system produces multiple reports, each report should have completely
different design elements.

Correct Answer:

False

Question
80

1 out of 1 points
In a report, a group header can be printed after the last detail line in a group and
a group footer above the first detail line.

Correct Answer:

False

Question
81

1 out of 1 points
In a file-oriented information system, a master file ____.
Correct Answer:

Question

stores relatively permanent data about an entity


1 out of 1 points

82
A report header, which appears at the beginning of a report, identifies the report,
and contains the report title, date, and other necessary information.

Correct Answer:

True

Question
83

1 out of 1 points
In a client/server design, tasks are divided between servers, which are
workstations that users interact with, and clients, which are computers that
supply data, processing, and services to the server workstations.

Correct Answer:

False

Question
84

1 out of 1 points
When a system reads a physical record, it loads the data from storage into a
____, which is a segment of computer memory.
Correct Answer:

buffer

Question
85

1 out of 1 points
An extranet is a private, company-owned network to provide Web-based access
to users.

Correct Answer:

False

Question
86

1 out of 1 points
Specific DBMS (database management system) advantages include all of the
following except ____.
Correct Answer:

Question
87

data dependence
1 out of 1 points

Although stand-alone PCs improved employee productivity and allowed users


to perform tasks that previously required IT department assistance, stand-alone
computing was inefficient and expensive.

Correct Answer:

True

Question
88

0 out of 1 points
Physical storage refers to information as seen through a user&#8217;s eyes,
regardless of how or where the information actually is organized or stored.

Correct Answer:

False

Question
89

1 out of 1 points
Using a DDBMS (distributed database management system) offers all of the
following advantages except ____.
Correct
Answer:

the architecture of the system is simple and easy to


manage

Question
90

1 out of 1 points
File sharing designs are efficient only if the number of networked users is ____.
Correct Answer:

low and the transmitted file sizes are relatively small

Question
91

1 out of 1 points
Initial screen designs can be presented to users in the form of a(n) ____, which
is a sketch that shows the general screen layout and design.
Correct Answer:

storyboard

Question
92

1 out of 1 points
HTML uses formatting codes called ____, which specify how the text and visual
elements on a Web page will be displayed in a Web browser.
Correct Answer:

Question
93

tags
1 out of 1 points

A Web-based application encounters all of the connectivity and compatibility


problems that typically arise when different hardware environments are
involved.

Correct Answer:

False

Question
94

1 out of 1 points
A dialog box allows a user to enter information about a task that the system will
perform.

Correct Answer:

True

Question
95

1 out of 1 points
In a client/server interaction, the client submits a request for information from
the server, which carries out the operations and responds to the client.

Correct Answer:

True

Question
96

1 out of 1 points
Every information system involves ____.
Correct Answer:

all of the above

Question
97

1 out of 1 points
Scalability is especially important in implementing systems that are volumerelated, such as transaction processing systems.

Correct Answer:

True

Question
98

1 out of 1 points
User-selected Help always offers assistance for the task in progress.

Correct Answer:

False

Question
99

1 out of 1 points
In most organizations, the IT department is responsible for output control and
security measures.

Correct Answer:

True

Question
100

1 out of 1 points
In older systems, often the user interface mainly consisted of process-control
screens that allowed a user to send commands to the system.

Correct Answer:

True

systems planning phase

In the model of the SDLC shown in the


accompanying figure, the ____ usually
begins with a formal request to the IT
department, called a systems request,
which describes problems or desired
changes in an information system or a
business process.

business model

A ____, or requirements model, describes


the information that a system must
provide.

enterprise applications

Examples of company-wide applications,


called ____, includeorder processing
systems, payrollsystems, and company
communications networks.

Modeling

____ is a systems development technique


that produces a graphical representation
of a concept or process that systems
developers can analyze, test, and modify.

O-O

Whereas structured analysis treats


processes and data as separate
components, ____ combines data and the
processes that act on the data into things
called objects.

process-centered

Because it focuses on processes that


transform data into useful information,
structured analysis is called a(n) ____
technique.

waterfall model

Traditionally, the SDLC is pictured as a(n)


____, like that shown in the accompanying

figure, where the result of each phase,


which is called a deliverable or end
product, flows sequentially into the next
phase.
object-oriented analysis

The ____ method of developing systems


produces code that is modular and
reusable.

SDLC

Structured analysis is a traditional


systems development technique that uses
a series of phases, called the ____, to plan,
analyze, design, implement, and support
an information system.

provide direction, necessary


resources, and performance
feedback to supervisors and
team leaders

In a typical company organizational


model, middle managers ____.

adaptive

The ____ method of developing systems


stresses team interaction and reflects a
set of community-based values.

tries to decide how the system


will be implemented before
determining what the system is
supposed to do

In launching a new information system,


the greatest risk occurs when a company
____.

systems support and security

In the model of the SDLC shown in the


accompanying figure, during ____, the IT
staff maintains, enhances, and protects
the system.

methods

In object-oriented design, built-in


processes called ____ can change an
object's properties.

business process reengineering


(BPR)

When companies attempt to simplify


operations or reduce costs, a popular
strategy is to have managers and systems
analysts perform ____.

business process modeling

Systems analysts use a process called ____


to represent a company's operations and
information needs.

Legacy systems

When planning an information system, a


company must consider how a new
system will interface with older systems,
which are called ____.

24 months

Over 40 years ago, a concept called


Moore's Law accurately predicted that
computer processing power would double
about every ____.

include e-mail, voice mail,


fax, video conferencing, word
processing, automated
calendars, database
management, spreadsheets, and
high-seed Internet access

User productivity systems ____.

False

In a knowledge management system, a


knowledge base consists of logical rules
that identify data patterns and
relationships.

False

Because they focus on a longer time


frame, middle managers need less
detailed information than top managers,
but somewhat more than supervisors who
oversee day-to-day operations.

True

A corporate culture is the set of beliefs,


rules, traditions, values, and attitudes that
define a company and influence its way of
doing business.

True

In the systems analysis phase, the first


step is requirements modeling, where
business processes are investigated and
what the new system must do is
documented.

structured analysis

Roark has just joined the company and in


his role as lead analyst, he will be
responsible for determining which systems
development method the team uses to
create the new application for a major
medical supplier.
It is a new day at the firm. Roark has been
in place for a few weeks, strengthening

the communications skills of his


employees, getting them to work much
better together. Now, the challenge that
he faces is not an internal one; it lies with
the client, which is increasingly showing
itself to be incapable of sticking with
decisions. Roark, based on his past
experience with other clients like this, is
afraid that the client will throw them a
curveball and want to make changes late
in the game but that they also will be
unwilling to absorb the costs of those
changes. For this reason, Roark eliminates
which of the following methods of
development?
agile/adaptive methods

Roark has just joined the company and in


his role as lead analyst, he will be
responsible for determining which systems
development method the team uses to
create the new application for a major
medical supplier.
After Roark has spent a week getting to
know the members of the team, including
their strengths and weaknesses, and what
has worked well (and not so well) for this
particular team in the past, one theme
keeps recurring: the team has particularly
weak communications skills. Which of the
following methods, then, is he least likely
to use, given what he knows about the
disadvantages of each method?

economic

A feasibility study includes tests for ____


feasibility, which means that the projected
benefits of the proposed system outweigh
the estimated costs.

have complex instructions

A systems request form should not ____.

introduction

In a preliminary investigation report, the


____ contain(s) a brief description of the
system, the name of the person or group
performing the investigation, and the
name of the person or group who initiated
the investigation.

user-friendly system that


improves employee job

Examples of tangible benefits include all


of the following except a(n) ____.

satisfaction
Customer relationship
management (CRM)

____ components can provide automated


response to sales inquiries, Web-based
order processing, and online inventory
tracking.

fishbone

A popular technique for investigating


causes and effects is called a(n) ____
diagram, which is an analysis tool that
represents the possible causes of a
problem as a graphical outline.

Strategic

____ planning is the process of identifying


long-term organizational goals, strategies,
and resources.

determine the people to


interview, establish objectives for
the interview, develop interview
questions, prepare for the
interview

In sequence, the interviewing process


involves a series of steps: ____, conduct
the interview, document the interview,
and evaluate the interview.

SWOT

During strategic planning, top managers


ask a series of questions that is called a(n)
____ analysis because it examines a
company's strengths, weaknesses,
opportunities, and threats.

conduct interviews

The primary method of obtaining


information during the preliminary
investigation is to ____.

Will the proposed system


decrease revenue for the
company?

When assessing priorities for systems


requests, a systems analyst should look
for high scores in all of the following
except ____.

one person's bias is more likely


to affect the decisions

When evaluating systems requests, all of


the following are disadvantages of a
systems review committee except ____.

define project scope as clearly as


possible

To avoid the problem of project creep,


____.

fishbone

When using a ____ diagram to investigate


causes of a problem, an analyst first states
the problem and then draws a main bone
with sub-bones that represent possible
causes of the problem.

discretionary

Projects where management has a choice


in implementing them are called ____
projects.

True

Competition drives many information


systems decisions.

False

Even if users have difficulty with a new


system, it still will produce the expected
benefits.

False

When interacting with users, a systems


analyst should focus on difficulties instead
of questioning users about additional
capability they would like to have.

True

Whenever possible, a systems analyst


should evaluate a proposed project based
on tangible costs and benefits that
represent actual (or approximate) dollar
values.

Sales reps requested a more


powerful sales analysis report.

As part of the annual report for the fiscal


year just ended, Lara is working on a grid
that summarizes the major decisions that
the small business for which she works
made during the year. As part of her
review, she is identifying whether a
decision was impacted by factors internal
to the company, or external.
Which of the following does not appear on
Lara's list of external factors?

The new system is more userfriendly, thus increasing


employee job satisfaction.

Sam is the analyst with the responsibility


for assessing the economic feasibility of
the new system that his team has been
hired to develop for Widgets, Inc.
Sam's boss has asked for a quick list of the
tangible benefits of the new system,
because the client has expressed some

concerns about the project and she wants


to reassure him. Which of the following
would NOT be on such a list as developed
by Sam?
TCO

The estimated costs of a proposed system


usually are considered the ____, which
includes ongoing support and
maintenance costs, as well as acquisition
costs.

operational feasibility

Of the measures of feasibility in the


accompanying figure, ____ considers
questions such as "Does management
support the project?" and "Will the new
system require training for users?"

Creating a new report for a user

____ is an example of a discretionary


project.

preliminary

A systems analyst conducts a(n) ____


investigation to study the systems request
and recommend specific action.

economic feasibility

Of the measures of feasibility in the


accompanying figure, ____ assesses
tangible and intangible benefits to the
company in addition to costs.

greatest benefit, at the lowest


cost, in the shortest period of
time

When setting priorities for systems


requests, the highest priority goes to
projects that provide the ____.

technical

A feasibility study includes tests for ____


feasibility, which refers to the practical
resources needed to develop, purchase,
install, or operate the system.

findings

In the preliminary investigation report, the


____ section contains the results of the
preliminary investigation, including a
description of the project's scope,
constraints, and feasibility.

Performance

____ limitations result when a system that


was designed for a specific hardware

configuration becomes obsolete when new


hardware is introduced.
scope

Determining the project ____ means to


define the boundaries, or extent, of a
project being as specific as possible.

False

The purpose of an interview, and of the


preliminary investigation itself, is to
convince others that a project is justified,
not to uncover facts.

False

Data entry controls should be excessive


without being effective.

True

If only one person has the necessary IT


skills and experience to evaluate systems
requests, that person should consult
closely with users and managers
throughout the company to ensure that
business and operational needs are
considered carefully.

The new system is more userfriendly, thus increasing


employee job satisfaction.

Sam is the analyst with the responsibility


for assessing the economic feasibility of
the new system that his team has been
hired to develop for Widgets, Inc.
Sam's boss has asked for a quick list of the
tangible benefits of the new system,
because the client has expressed some
concerns about the project and she wants
to reassure him. Which of the following
would NOT be on such a list as developed
by Sam?

identify all tasks

The first step in creating a WBS is to ____.

risk

A ____ is an event that could affect a


project negatively.

milestones

When maintaining schedules, if enough


____ and frequent checkpoints exist,
problems will be detected rapidly.

successor

When two or more concurrent tasks

depend on a single prior task, the


concurrent tasks are called ____ tasks.
identify all the project tasks

The first step in the creation of a


PERT/CPM chart is to ____.

critical

A ____ path includes all tasks that are vital


to the project schedule.

completion with the same


personnel as were on the team
at the outset

All of the following are metrics of a


successful project EXCEPT ____.

critical

Project managers always must be aware


of the ____ path, so they can monitor the
vital tasks and keep the project on track.

milestones

In addition to tasks, every project has


____, which are reference points used to
monitor progress and manage the project.

all of the above


task time estimates, sequences,
personnel assignments

A project manager must balance ____ to


achieve a workable schedule; graphical
planning aids like the one in the
accompanying figure can help in the
process.

includes identifying project tasks


and estimating completion times
and costs

A project manager's planning _____.

includes monitoring the progress


of the project, evaluating results,
and taking corrective action
when necessary to stay on target

For a project manager, monitoring and


controlling _____.

the team member most


vulnerable to a given risk

Most risk identifications include a brief


description of all of the following EXCEPT
____.

all of the above


project size and scope, prior
experience with similar projects
or systems, IT resources

In developing time and cost estimates,


project managers must consider _____.

any of the above


personality conflicts among team
members, turnover of project
personnel, poor control methods

Problems with timetables and project


milestones can indicate ____.

groups

The accompanying figure shows task ____,


which each might represent several
activities that can be shown in a more
detailed chart.

inaccurate TCO forecast

All of the following are possible causes of


cost overruns related to human resource
factors EXCEPT ____.

PERT/CPM

Many project managers find ____ charts


more helpful for scheduling, monitoring,
and controlling projects.

defining project constraints

Project scheduling involves all of the


following EXCEPT ____.

True

Most managers recognize that problems


do occur on most projects; it is better to
alert management sooner rather than
later.

True

System developers can initiate a formal


project as early as the preliminary
investigation stage, or later on, as
analysis, design, and implementation
activities occur.

True

Project planning is a dynamic task and


involves constant change.

False

When tasks must be completed one after


another, they are called concurrent tasks.

They are predecessor tasks of


each other.

In discussing PERT/CPM charts, you discuss


the types of task patterns that can occur
in a project schedule. You give an example
of two tasks, A and B, that can both begin
as soon as task C is finished. Which of the
following is NOT a true statement about
tasks A and B?

predecessor

Two or more concurrent tasks often


depend on a single prior task, which is
called a(n) ____ task.

dependent task

A _____ cannot be started until one or


more other tasks are completed.

bottom-up

PERT/CPM is called a(n) ____ technique,


because it analyzes a large, complex
project as a series of individual tasks.

concurrent

When several tasks can start at the same


time, each is called a ____ task.

involves staffing, which includes


selecting the project team and
assigning specific tasks to team
members

A project manager's scheduling function


_____.

reference to successor tasks

In a PERT/CPM chart, each task has all of


the following EXCEPT a(n) ____.

response

A risk ____ plan is a proactive effort to


anticipate a risk and describe an action
plan to deal with it.

False

Using prior experience to make time and


cost estimates works best for large
projects.

False

When two or more concurrent tasks


depend on a single prior task, each of the
concurrent tasks is called a predecessor
task.

True

Although a Gantt chart provides more


detailed information about a project, a
PERT/CPM chart offers a rapid overview
that graphically displays the timing,
duration, and progress of each task.

histogram

A common tool for showing the


distribution of a questionnaire or sampling
results is a vertical bar chart called a(n)
____.

use case diagram

A(n) ____ is a UML technique that visually


represents the interaction between users
and an information system.

more satisfied users

Greater user involvement in the system


development process usually results in
____.

range-of-response questions

In an interview, ____ are questions that


ask a person to evaluate something by
providing limited answers to specific
responses or on a numeric scale.

actor

In a use case diagram, the user becomes


a(n) ____, with a specific role that
describes how he or she interacts with a
system.

Student grades must be entered


on machine-scannable forms
prepared by the instructor

____ is a typical example of a system


requirement for the input category.

systematic sample

When preparing a representative sample


from a list of 200 customers who
complained about errors in their
statements, a ____ might select every
tenth customer for review.

informal

In a(n) ____ structure, which usually is


based on interpersonal relationships, some
people have more influence or knowledge
than appears on an organization chart.

stratified sample

When preparing a representative sample


from a list of 200 customers who
complained about errors in their
statements, a ____ could ensure the
sample is balanced geographically by
selecting five customers from each of four
zip codes.

random sample

When preparing a representative sample


from a list of 200 customers who
complained about errors in their
statements, a ____ might select any 20
customers.

The contact management


system must generate a daily
reminder list for all sales reps

____ is a typical example of a system


requirement for the output category.

FDD

Using a(n) ____, an analyst can show


business functions and break them down
into lower-level functions and processes.

Analytical skills

____ enable a systems analyst to identify a


problem, evaluate the key elements, and
develop a useful solution.

FDD

A(n) ____ is a top-down representation of a


function or a process.

give the interviewee easy access


to supporting material that might
be needed

If an interviewee gives only short or


incomplete responses to open-ended
questions, a systems analyst should do all
of the following EXCEPT ____.

scrum

In a(n) ____, team members prepare to


lunge at each other to achieve their
objectives.

systems analysis

The ____ phase of the SDLC includes four


main activities: requirements modeling,
data and process modeling, object
modeling, and consideration of
development strategies.

both a and b
prototyping, user involvement

RAD relies heavily on ____.

open-ended questions

In an interview, ____ encourage


spontaneous and unstructured responses.

True

The ability to manage information is the


mark of a successful systems analyst and
an important skill for all IT professionals.

False

When fact-finding, asking what is being


done is the same as asking what could or
should be done.

False

In the early stages of systems analysis,


interviews usually focus on specific topics,
but as the fact-finding process continues,
the interviews are more general.

True

IT professionals recognize that successful


systems must be user-oriented, and users
need to be involved, formally or informally,
at every stage of systems development.

control

Perry has inherited an Excel sheet that


lists all of the system requirements for his
team's new project, but unfortunately, his
predecessor did not label the requirements
with categoriesor in some cases failed to
categorize them correctlyso he needs to
take care of this so the requirements can
be sorted correctly.
Perry has found one system requirement
that he thinks could fit into a couple of
different categories. What is the best
categorization of this requirement: An
employee record must be added, changed,
or deleted only by a member of the human
resources department?

questionnaire

In projects where it is desirable to obtain


input from a large number of people, a(n)
____, such as that shown in the
accompanying figure, can be a valuable
tool.

The student records system


must produce class lists within
five hours after the end of
registration

____ is a typical example of a system


requirement for the performance category.

random sample

When preparing a representative sample


from a list of 200 customers who
complained about errors in their
statements, a ____ might select any 20
customers.

UML

The ____ is a widely used method of


visualizing and documenting software
systems design.

The system must maintain


separate levels of security for
users and the system
administrator

____ is a typical example of a system


requirement for the control category.

closed-ended questions

In an interview, ____ limit or restrict the


response.

informal

In a(n) ____ structure, which usually is


based on interpersonal relationships, some
people have more influence or knowledge
than appears on an organization chart.

TCO

In addition to direct costs, systems


developers must identify and document
indirect expenses that contribute to the
____.

stratified sample

When preparing a representative sample


from a list of 200 customers who
complained about errors in their
statements, a ____ could ensure the
sample is balanced geographically by
selecting five customers from each of four
zip codes.

False

When designing a questionnaire, arrange


questions in a random order, intermixing
simple and more complex topics.

True

The main objective of a sample is to


ensure that it represents the overall
population accurately.

True

A list of topics should be sent to an


interviewee several days before the
meeting, especially when detailed
information is needed, so the person can
prepare for the interview and minimize the
need for a follow-up meeting.

his own

Kieran has finished compiling the list of


the various members of the JAD group: He
is the JAD project leader, Malia is the
representative from top management,
Simon is a manager, Alisa and Ian are
users, Shakira and Max are systems

analysts, and Devon is the recorder.


As Kieran develops the agenda he wants
to put the name of the appropriate person
next to the agenda item. Whose name
would he put next to the final task on the
agenda, the task of preparing the report
that will be sent to JAD team members?
validity

In a data dictionary, some data elements


have ____ rules, such as an employee's
salary must be within the range defined
for the employee's job classification.

logical

In data and process modeling, a(n) ____


model shows what the system must do,
regardless of how it will be implemented
physically.

no output

A black hole process is a process that has


____.

a process step that is repeated


until a specific condition changes

A black hole process is a process that has


____.

tree

A decision ____ is a graphical


representation of the conditions, actions,
and rules found in a decision table.

Leveling

____ is the process of drawing a series of


increasingly detailed DFDs, until all
functional primitives are identified.

All of the above


Spontaneous generation, Gray
holes, Black holes

____ is/are logically impossible in a DFD


because a process must act on input,
shown by an incoming data flow, and
produce output, represented by an
outgoing data flow.

horizontal form that resembles a


tree with the roots at the left and
the branches to the right

Decision trees show the logic structure in


a ____.

capital

DFD symbols are referenced by using all


____ letters for the symbol name.

value for the data element if a


value otherwise is not entered
for it

The data dictionary usually records and


describes a default value, which is the
____.

records

In a data dictionary, data elements are


combined into ____, which are meaningful
combinations of data elements that are
included in data flows or retained in data
stores.

domain

A data dictionary specifies a data


element's ____, which is the set of values
permitted for the data element.

field

In a data dictionary, a(n) ____ is the


smallest piece of data that has meaning
within an information system.

rectangle with rounded corners

In a DFD, the Gane and Sarson symbol for


a process is a ____.

exploded view

Because diagram 0 is a more detailed or


expanded version of process 0 on a
context diagram, diagram 0 is called a(n)
____.

alias

In a data dictionary, any name other than


the standard data element name is called
a(n) ____.

ensures that the input and


output data flows of the parent
DFD are maintained on the child
DFD

Balancing ____.

line with a single or double


arrowhead

In a DFD, the Gane and Sarson symbol for


a data flow is a ____.

False

In most data dictionaries, records are


defined together with the data flows and
data stores.

False

Two data stores can be connected by a


data flow without an intervening process.

True

In addition to describing each data


element, data flow, data store, record,
entity, and process, the data dictionary
documents the relationships among these
components.

False

In modular design, a rectangle represents


a condition or decision, a diamond shape
represents a step or a process, and the
logic follows the lines in the direction
indicated by the arrows.

Costs may be high.

The analysts at Novel Systems Worldwide


are considering the four-model approach
to system development for a new client.
If they pursue the four-model approach,
which of the following is a likely outcome?

A teleological model of the


current system

The analysts at Novel Systems Worldwide


are considering the four-model approach
to system development for a new client.
Which of the following will NOT be
developed if they decide to use the fourmodel approach?

repository

A data ____ is a central storehouse of


information about a system's data.

line with a single or double


arrowhead

In a DFD, the Gane and Sarson symbol for


a data flow is a ____.

one or more process steps based


on the results of a test or
condition

The selection structure is the completion


of ____

process descriptions

If processes must be performed in a


specific sequence, you document the
information in the ____.

Balancing

____ maintains consistency among DFDs


by ensuring that input and output data
flows align properly.

context diagrams

Typical process description tools include

all of the following EXCEPT ____.


pseudocode

Structured English might look familiar to


programming students because it
resembles ____, which is used in program
design.

decision

A(n) ____ table shows a logical structure,


with all possible combinations of
conditions and resulting actions.

rectangle, which may be shaded


to make it look three-dimensional

In a DFD, the Gane and Sarson symbol for


an entity is a ____.

type

In a data dictionary, ____ refers to whether


the data element contains numeric,
alphabetic, or character values.

True

What makes one system more complex


than another is the number of
components, the number of levels, and
the degree of interaction among its
processes, entities, data stores, and data
flows.

True

In a DFD, a data flow must have a process


symbol on at least one end.

iteration

Evan is an expert on all of the different


kinds of process description tools, so when
his colleagues have questions, they know
where to turn.
One of the firm's beginner analysts is
working on a financial process that will
continue to print vendor payments until it
reaches the end of the file. Which of the
following processes will Evan suggest that
the analyst use?

association

The line from the actor to a use case is


called a(n) ____.

oval

The UML symbol for a use case is a(n) ____


with a label that describes the action or
event.

message

A ____ is a command that tells an object to


perform a certain method.

diagram

A use case ____ is a visual summary of


several related use cases within a system
or subsystem.

attributes

An object has certain ____, which are


characteristics that describe the object.

0..*

The UML notation ____ identifies a zero or


many relation.

object

A(n) ____ represents a real person, place,


event, or transaction.

Relationships

____ describe what objects need to know


about each other, how objects respond to
changes in other objects, and the effects
of membership in classes, superclasses,
and subclasses.

instance

Your red Mustang is a(n) ____ of the CAR


class.

child

Inheritance enables an object, called a


____, to derive one or more of its attributes
from another object.

inherit

In an object-oriented system, objects can


____ certain attributes from other objects.

class

All objects within a(n) ____ share common


attributes and methods.

Encapsulation

____ allows objects to be used as modular


components anywhere in the system.

class

An object belongs to a group or category


called a(n) ____.

Relationships

____ enable objects to communicate and


interact as they perform business

functions and transactions required by the


system.
methods

An object's ____ are the tasks or functions


the object performs.

actor

In a use case, an external entity is called


a(n) ____.

state

The ____ of an object is an adjective that


describes the object's current status.

True

A major advantage of O-O designs is that


systems analysts can save time and avoid
errors by using modular objects.

False

An object treats data and processes


separately.

False

Use cases cannot interact with other use


cases.

False

Just as objects are similar to adjectives,


attributes resemble verbs that describe
what and how an object does something.

True

Class diagrams evolve into code modules,


data objects, and other system
components.

microwave oven

Alex is getting a little confused by the


terminology in the object-oriented world,
so he consults his roommate, who has
been doing a lot of work in object
modeling in previous coursework.
Which of the following does Alex's
roommate use as an example of an
instance of the APPLIANCE class?

methods

Alex is getting a little confused by the


terminology in the object-oriented world,
so he consults his roommate, who has
been doing a lot of work in object
modeling in previous coursework.

The following examplesbake cakes, selfclean, and reheat pastaare all what with
regard to the oven object, according to
Alex's roommate?
Methods

____ resemble verbs that describe what


and how an object does something.

method

Your car performs a(n) ____ called


OPERATE WIPERS when you send a
message by moving the proper control.

UML

____ is a widely used method of visualizing


and documenting an information system.

actor

In a use case, an external entity is called


a(n) ____.

True

By limiting access to internal processes,


an object prevents its internal code from
being altered by another object or process.

False

The same message to two different


objects produces the same results.

False

An object treats data and processes


separately.

True

A gas pump is an example of a black box.

0..*

Jaime, the newest analyst at Novel


Systems Worldwide, is responsible for
assigning the appropriate UML notations
to a given class diagram.
In a given diagram, Jaime is marking up a
relationship in which a given employee
can have no payroll deductions or she can
have many deductions. Which of the
following notations will Jaime write to mark
this relationship?

ASP

A(n) ____ is a firm that delivers a software


application, or access to an application, by

charging a usage or subscription fee.


fixed fee model

When determining outsourcing fees, a ____


uses a set fee based on a specified level of
service and user support.

vendors

Companies that develop software for sale


are called software ____.

request for proposal (RFP)

A ____ is a document that describes a


company, lists the IT services or products
needed, and specifies the features
required.

service

A firm that offers outsourcing solutions is


called a ____ provider.

transaction

A(n) ____ model is an outsourcing fee


model that charges a variable fee based
on the volume of transactions or
operations performed by the application.

data duplication should be


encouraged

Guidelines to follow when determining


data entry and storage considerations
include all of the following except ____.

build or buy

The choice between developing versus


purchasing software often is called a ____
decision.

systems design

The physical design is developed during


the ____ phase of the SDLC.

4GL

In a ____, the commands tend to resemble


natural statements that people use.

middleware

Web-based software usually requires


additional layers, called ____, to
communicate with existing software and
legacy systems.

obtain input from other


companies who already have
implemented the software

Typically, companies choose in-house


software development for all of the
following reasons except to ____.

parameter

A ____ is a value that the user enters


whenever a query is run, which provides
flexibility, enables users to access
information easily, and costs less.

default

A ____ is a value that a system displays


automatically.

satisfaction of unique business


requirements

Advantages of purchasing a software


package over developing software inhouse include all of the following except
____.

package

A software ____ is software that is


obtained from a vendor or application
service provider.

cloud

Some industry leaders predict that ____


computing will offer an overall online
software and data environment supported
by supercomputer technology.

all of the above


negotiating directly with the
software vendor to make
enhancements to meet the
buyer's needs by paying for the
changes, purchasing a basic
package that vendors will
customize to suit the buyer's
needs, purchasing the software
and making their own
modifications, if this is
permissible under the terms of
the software license

Buyers can customize a software package


by ____.

False

The decision to develop software in-house


will require less participation from the
systems analyst than outsourcing or
choosing a commercial package.

False

A subscription model charges a variable


fee based on the volume of transactions or
operations performed by the application.

True

Many firms feel that in-house IT resources


and capabilities provide a competitive

advantage because an in-house team can


respond quickly when business problems
or opportunities arise.
True

Mission-critical IT systems should be


outsourced only if the result is a costattractive, reliable, business solution that
fits the company's long-term business
strategy.

True

Software vendors regularly upgrade


software packages by adding
improvements and enhancements to
create a new version or release.

design

In an approach called ____ prototyping,


systems analysts use prototyping to verify
user requirements, after which the
prototype is discarded and implementation
continues.

benchmark

A ____ measures the time a package takes


to process a certain number of
transactions.

interface

In addition to configuring software, an IT


staff can create a user ____, which includes
screens, commands, controls, and features
that enable users to interact more
effectively with the application.

Web-based

Building an application in a ____


environment can offer greater benefits,
and sometimes greater risks, compared to
a traditional environment.

Prototyping

____, like that illustrated in the


accompanying figure, produces an early,
rapidly constructed working version of a
proposed system.

Outsourcing

____ is the transfer of information systems


development, operation, or maintenance
to an outside firm that provides these
services, for a fee, on a temporary or longterm basis.

read-only properties

Some data files should be totally hidden


from view, while others should have ____
so users can view, but not change, the
data.

.NET

Microsoft's ____ is one of the major Webbased development environments.

True

Building an application in a Web-based


environment might involve different risks
and benefits, compared to a traditional
environment.

False

A request for quotation (RFQ) is less


specific than an RFP (request for
proposal).

True

By designing a system in-house,


companies can develop and train an IT
staff that understands the organization's
business functions and information
support needs.

True

The primary objective of an evaluation


and selection team is to eliminate system
alternatives that will not work, rank the
system alternatives that will work, and
present the viable alternatives to
management for a final decision.

Data duplication should be


encouraged.

Now that they have joined the firm,


Priscilla is providing the junior analysts on
the team with some real-world illustrations
to explain some of the system design
concepts that they have studied in their
coursework, to solidify their
understanding.
Which of the following is NOT a guideline
Priscilla will impart to the new class of
analysts?

When Marny is tasked with the


job, her output can involve
outright purchase or a variety of
leasing options.

You might also like