Sunteți pe pagina 1din 61

 

Question
1 out of 1 points  
1
System requirements serve as benchmarks to measure the overall acceptability of
a finished system.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
2
New business support systems that produced valuable information, in addition to
performing manual tasks, were called management information systems (MIS)
because managers were the primary users.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
3
A strategic plan that stresses technology tends to create an unfavorable climate
for IT projects that extends throughout an organization.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
4
____ is a typical example of a system requirement for the input category.

Selected    Student grades must be entered on machine-scannable forms


Answer: prepared by the instructor
Correct    Student grades must be entered on machine-scannable forms
Answer: prepared by the instructor
  Question
1 out of 1 points  
5
____ components can provide automated response to sales inquiries, Web-based
order processing, and online inventory tracking.

Selected Answer:    Customer relationship management (CRM)


Correct Answer:    Customer relationship management (CRM)
  Question
1 out of 1 points  
6
Examples of tangible benefits include all of the following except a(n) ____.

Selected    user-friendly system that improves employee job


Answer: satisfaction
Correct Answer:    user-friendly system that improves employee job
satisfaction
  Question
1 out of 1 points  
7
In a sequence diagram, the interaction proceeds from left to right along horizontal
arrows, while a vertical timeline represents messages from one object to another.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
8
Internal factors that affect IT systems projects include all of the following except
____.

Selected Answer:    the economy


Correct Answer:    the economy
  Question
1 out of 1 points  
9
A vertical system is a system, such as an inventory or payroll application, that
can be adapted for use in many different companies.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
10
____ is a typical example of a system requirement for the output category.

Selected    The contact management system must generate a daily


Answer: reminder list for all sales reps
Correct    The contact management system must generate a daily
Answer: reminder list for all sales reps
  Question
1 out of 1 points  
11
When evaluating systems requests, all of the following are disadvantages of a
systems review committee except ____.
Selected    one person’s bias is more likely to affect the
Answer: decisions
Correct Answer:    one person’s bias is more likely to affect the
decisions
  Question
1 out of 1 points  
12
Supporters of neutral locations for interviews believe that it ____.

Selected    keeps interruptions to a minimum so people can


Answer: concentrate fully
Correct    keeps interruptions to a minimum so people can
Answer: concentrate fully
  Question
1 out of 1 points  
13
A horizontal system is designed to meet the unique requirements of a specific
business or industry, such as a Web-based retailer, a medical practice, or a video
chain.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
14
All of the following are common reasons for systems requests except ____.

Selected Answer:    weaker controls


Correct Answer:    weaker controls
  Question
1 out of 1 points  
15
The main objective of all RAD approaches is to extend development time and
expense by excluding users from every phase of systems development.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
16
Examples of company-wide applications, called ____, include order processing
systems, payroll systems, and company communications networks.
Selected Answer:    enterprise applications
Correct Answer:    enterprise applications
  Question
1 out of 1 points  
17
Product-oriented companies primarily offer information or services or sell
goods produced by others.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
18
A systems request might propose enhancements for an existing system, the
correction of problems, or the development of an entirely new information
system.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
19
Knowledge management systems are called expert systems because they ____.

Selected    simulate human reasoning by combining a knowledge base


Answer: and inference rules that determine how the knowledge is applied
Correct    simulate human reasoning by combining a knowledge base
Answer: and inference rules that determine how the knowledge is applied
  Question
1 out of 1 points  
20
When preparing a checklist of specific tasks to observe and questions to ask, a
systems analyst should consider ____.

Selected Answer:    all of the above


Correct Answer:    all of the above
  Question
1 out of 1 points  
21
A systems request form should not ____.

Selected Answer:    have complex instructions


Correct Answer:    have complex instructions
  Question
1 out of 1 points  
22
In an information system, information consists of basic facts that are the
system’s raw material.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
23
In a typical company organizational model, middle managers ____.

Selected    provide direction, necessary resources, and performance


Answer: feedback to supervisors and team leaders
Correct    provide direction, necessary resources, and performance
Answer: feedback to supervisors and team leaders
  Question
1 out of 1 points  
24
Each activity within the systems analysis phase has an end product and one or
more milestones.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
25
Performance limitations result when a system that was designed for a specific
hardware configuration becomes obsolete when new hardware is introduced.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
26
____ is a typical example of a system requirement for the performance category.

Selected    The student records system must produce class lists within
Answer: five hours after the end of registration
Correct    The student records system must produce class lists within
Answer: five hours after the end of registration
  Question
1 out of 1 points  
27
In launching a new information system, the greatest risk occurs when a
company ____.

Selected    tries to decide how the system will be implemented before


Answer: determining what the system is supposed to do
Correct    tries to decide how the system will be implemented before
Answer: determining what the system is supposed to do
  Question
1 out of 1 points  
28

Traditionally, the SDLC is pictured as a(n) ____, like that shown in the
accompanying figure, where the result of each phase, which is called a
deliverable or end product, flows sequentially into the next phase.

Selected Answer:    waterfall model


Correct Answer:    waterfall model
  Question
1 out of 1 points  
29
When planning an information system, a company must consider how a new
system will interface with older systems, which are called ____.

Selected Answer:    legacy systems


Correct Answer:    legacy systems
  Question
1 out of 1 points  
30
In many large companies, applications called enterprise resource planning
(ERP) systems provide cost-effective support for users and managers
throughout the company.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
31
In an information system, data is information that has been transformed into
output that is valuable to users.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
32
Of the measures of feasibility in the accompanying figure, ____ considers
questions such as “Does management support the project?” and
“Will the new system require training for users?”

Selected Answer:    operational feasibility


Correct Answer:    operational feasibility
  Question
1 out of 1 points  
33
A mission-critical system is one that is unimportant to a company’s
operations.
Selected Answer: False
Correct Answer: False
  Question
1 out of 1 points  
34
To evaluate ____, a systems analyst needs information about projected future
volume for all outputs, inputs, and processes.

Selected Answer:    scalability


Correct Answer:    scalability
  Question
1 out of 1 points  
35
Greater user involvement in the system development process usually results in
poorer communication, slower development times, and less satisfied users.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
36
Examples of intangible benefits include all of the following except a(n) ____.

Selected    online package tracking system that decreases the need for
Answer: clerical staff
Correct    online package tracking system that decreases the need for
Answer: clerical staff
  Question
1 out of 1 points  
37
The ____ phase of the SDLC includes four main activities: requirements
modeling, data and process modeling, object modeling, and consideration of
development strategies.

Selected Answer:    systems analysis


Correct Answer:    systems analysis
  Question
1 out of 1 points  
38
In object-oriented programming, an object is a member of a(n) ____, which is a
collection of similar objects.

Selected Answer:    class


Correct Answer:    class
  Question
1 out of 1 points  
39
Creating an FDD is different from drawing an organization chart —
systems analysts start at the bottom and work their way up.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
40
Systems requests seldom are aimed at improving service to customers or users
within a company.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
41
The primary advantage of RAD is that ____.

Selected    systems can be developed more quickly with significant


Answer: cost savings
Correct    systems can be developed more quickly with significant
Answer: cost savings
  Question
1 out of 1 points  
42
TP systems are inefficient because they process a set of transaction-related
commands individually rather than as a group.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
43
While RAD typically focuses only on fact-finding and requirements
determination, JAD provides a fast-track approach to a full spectrum of system
development tasks, including planning, design, construction, and
implementation.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
44
____ is a traditional, time-tested, easy to understand systems development
technique that uses a set of process models to describe a system graphically.

Selected Answer:    Structured analysis


Correct Answer:    Structured analysis
  Question
1 out of 1 points  
45
A risk of RAD is that a system might work well in the short term, but the
corporate and long-term objectives for the system might not be met.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
46
____ is an example of a discretionary project.

Selected Answer:    Creating a new report for a user


Correct Answer:    Creating a new report for a user
  Question
1 out of 1 points  
47
A(n) ____ describes the logic that programmers use to write code modules.

Selected Answer:    process model


Correct Answer:    process model
  Question
0 out of 1 points  
48
In an interview, ____ are questions that ask a person to evaluate something by
providing limited answers to specific responses or on a numeric scale.

Selected Answer:    closed-ended questions


Correct Answer:    range-of-response questions
  Question
1 out of 1 points  
49
IBM claims that its WebSphere strategy is best for Web-based application
development, while Microsoft counters with a broad vision called .NET that
redefines that company’s approach to Web-based application
development.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
50
Hardware-based security controls include passwords, various levels of user
access, and coding data.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
51
A business process describes a specific set of transactions, events, tasks, and
results.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
52
A ____, or requirements model, describes the information that a system must
provide.

Selected Answer:    business model


Correct Answer:    business model
  Question
1 out of 1 points  
53
Compared with traditional methods, the entire RAD process is expanded and, as
a result, the new system is built, delivered, and placed in operation much later.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
54
As users rely more heavily on information systems to perform their jobs, they
are likely to request even more IT services and support.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
55
Today, systems development is much more team-oriented than in the past.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
56
Business support systems ____.

Selected    provide job-related information support to users at all


Answer: levels of a company
Correct    provide job-related information support to users at all
Answer: levels of a company
  Question
1 out of 1 points  
57
When setting priorities for systems requests, the highest priority goes to projects
that provide the ____.

Selected    greatest benefit, at the lowest cost, in the shortest period


Answer: of time
Correct Answer:    greatest benefit, at the lowest cost, in the shortest period
of time
  Question
1 out of 1 points  
58
System requirements fall into five general categories: outputs, inputs, processes,
performance, and controls.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
59
A SWOT analysis contributes to the strategic planning process by identifying
____ resources.

Selected Answer:    all of the above


Correct Answer:    all of the above
  Question
1 out of 1 points  
60
Although the business-to-business (B2B) sector is more familiar to retail
customers, the volume of business-to-consumer (B2C) transactions is many
times greater.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
61
IT professionals recognize that successful systems must be user-oriented, and
users need to be involved, formally or informally, at every stage of systems
development.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
62
Transaction processing (TP) systems ____.

Selected    process data generated by day-to-day business


Answer: operations
Correct Answer:    process data generated by day-to-day business
operations
  Question
1 out of 1 points  
63
Traditionally, a company either developed its own information systems, called
in-house applications, or purchased systems called software packages from
outside vendors.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
64
User productivity systems ____.

Selected    include e-mail, voice mail, fax, video conferencing, word


Answer: processing, automated calendars, database management,
spreadsheets, and high-speed Internet access
Correct    include e-mail, voice mail, fax, video conferencing, word
Answer: processing, automated calendars, database management,
spreadsheets, and high-speed Internet access
  Question
1 out of 1 points  
65
System analysts use modeling and fact-finding interactively — first they
build fact-finding results into models, then they study the models to determine
whether additional fact-finding is needed.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
66
In a typical company organizational model, top managers ____.

Selected    develop long-range plans, called strategic plans, that define


Answer: the company’s overall mission and goals
Correct    develop long-range plans, called strategic plans, that define
Answer: the company’s overall mission and goals
  Question
1 out of 1 points  
67
Using a(n) ____, an analyst can show business functions and break them down
into lower-level functions and processes.

Selected Answer:    FDD


Correct Answer:    FDD
  Question
1 out of 1 points  
68
When companies attempt to simplify operations or reduce costs, a popular
strategy is to have managers and systems analysts perform ____.

Selected Answer:    business process reengineering (BPR)


Correct Answer:    business process reengineering (BPR)
  Question
1 out of 1 points  
69
Compared with traditional methods, when properly used, JAD can result in all
of the following except ____.

Selected    less expense and greater manageability if the group is too


Answer: large
Correct Answer:    less expense and greater manageability if the group is too
large
  Question
1 out of 1 points  
70
In an interview, ____ limit or restrict the response.

Selected Answer:    closed-ended questions


Correct Answer:    closed-ended questions
  Question
1 out of 1 points  
71
Because use cases depict a system through the eyes of a user, common business
language can be used to describe the transactions.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
72
A company’s mission statement is unrelated to its major goals, shorter-
term objectives, and day-to-day business operations.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
73
Strategic planning looks beyond day-to-day activities and focuses on a horizon
that is 3, 5, or even 10 years in the future.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
74
____ are especially important to a systems analyst who must work with people
at all organizational levels, balance conflicting needs of users, and communicate
effectively.

Selected Answer:    Interpersonal skills


Correct Answer:    Interpersonal skills
  Question
1 out of 1 points  
75
Of the measures of feasibility in the accompanying figure, ____ assesses tangible
and intangible benefits to the company in addition to costs.

Selected Answer:    economic feasibility


Correct Answer:    economic feasibility
  Question
1 out of 1 points  
76
____ is a typical example of a system requirement for the process category.

Selected    The video rental system must not execute new rental
Answer: transactions for customers who have overdue tapes
Correct    The video rental system must not execute new rental
Answer: transactions for customers who have overdue tapes
  Question
1 out of 1 points  
77
Internal and external factors affect every business decision that a company
makes, and IT systems are no exception.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
78
Because it is linked to a specific development methodology, systems developers
use JAD whenever group input and interaction is not desired.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
79
External factors that affect IT systems projects include all of the following
except ____.

Selected Answer:    managers


Correct Answer:    managers
  Question
1 out of 1 points  
80
The purpose of a JIT (just-in-time) system is to provide the right product at the
right place at the right time.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
81
Some industry experts predict that bar code technology will be overshadowed in
the future by electronic product code (EPC) technology that uses RFID tags to
identify and monitor the movement of each individual product.

Selected Answer: True


Correct Answer: True
  Question 1 out of 1 points  
82
____ is a typical example of a system requirement for the control category.

Selected    The system must maintain separate levels of security for


Answer: users and the system administrator
Correct    The system must maintain separate levels of security for
Answer: users and the system administrator
  Question
1 out of 1 points  
83
Management leadership and information technology are unconnected, and no
significant changes have occurred in either area.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
84
Of the measures of feasibility in the accompanying figure, ____ considers points
such as “Does the proposed platform have sufficient capacity for future
needs?” and “Will the hardware and software environment be
reliable?”

Selected Answer:    technical feasibility


Correct Answer:    technical feasibility
  Question
1 out of 1 points  
85
____ software controls the flow of data, provides data security, and manages
network operations.
Selected Answer:    System
Correct Answer:    System
  Question
1 out of 1 points  
86
Of the measures of feasibility in the accompanying figure, issues that relate to
____ include “Has management established a firm timetable for the
project?” and “Will a project manager be appointed?”

Selected Answer:    schedule feasibility


Correct Answer:    schedule feasibility
  Question
1 out of 1 points  
87
When assessing priorities for systems requests, a systems analyst should look
for high scores in all of the following except ____.

Selected    Will the proposed system decrease revenue for the


Answer: company?
Correct Answer:    Will the proposed system decrease revenue for the
company?
  Question
1 out of 1 points  
88
Because of the limited range of input and interaction among participants, few
companies believe that a JAD group produces the best definition of a new
system.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
89
Application software manages hardware components, which can include a
single workstation or a global network with many thousands of clients.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
90
System software consists of programs that support day-to-day business
functions and provide users with the information they require.
Selected Answer: False
Correct Answer: False
  Question
1 out of 1 points  
91
The success or failure of an information system usually is unrelated to whether
users are satisfied with the system’s output and operations.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
92
In an interview, ____ encourage spontaneous and unstructured responses.

Selected Answer:    open-ended questions


Correct Answer:    open-ended questions
  Question
1 out of 1 points  
93
A system must have effective controls to ensure that data is secure and accurate.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
94
UML provides various graphical tools, such as use case diagrams and sequence
diagrams.

Selected Answer: True


Correct Answer: True
  Question
1 out of 1 points  
95
Service-oriented companies manufacture and sell products such as computers,
routers, or microchips.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
96
Systems development typically starts with a ____.
Selected    systems request, followed by a preliminary investigation,
Answer: which includes a feasibility study
Correct    systems request, followed by a preliminary investigation,
Answer: which includes a feasibility study
  Question
1 out of 1 points  
97
A strong business case suggests that a company should pursue other options,
above the alternative, because it would be in the firm’s best interest to
do so.

Selected Answer: False


Correct Answer: False
  Question
1 out of 1 points  
98
Much of the time a systems analyst spends talking with people is spent
conducting ____, which is/are the most common fact-finding technique.

Selected Answer:    interviews


Correct Answer:    interviews
  Question
1 out of 1 points  
99
Data entry controls should be excessive without being effective.

Selected Answer: False


Correct Answer: False
  Question 100 1 out of 1 points  
RAD relies heavily on prototyping and user involvement.

Selected Answer: True


Correct Answer: True
 Question 1 1 out of 1 points  
When determining outsourcing fees, a ____ uses a set fee based on a specified
level of service and user support.

Correct    fixed fee model


Answer:
  Question
1 out of 1 points  
2
The Software & Information Industry Association and many software
industry leaders, including Microsoft, believe that the concept of ____ is
redefining the way that companies develop and deploy their information systems.

Correct    software as a service


Answer:
  Question
1 out of 1 points  
3
In a DFD, the Gane and Sarson symbol for an entity is a ____.

Correct    rectangle, which may be shaded to make it look three-


Answer: dimensional
  Question
1 out of 1 points  
4
Another term for IBS is managed hosting, because the operation is managed by
the outside firm, or host.

Correct True
Answer:
  Question
1 out of 1 points  
5
A ____ is a document that describes a company, lists the IT services or products
needed, and specifies the features required.

Correct    request for proposal (RFP)


Answer:
  Question
1 out of 1 points  
6
All of the following are true of Web-based development except ____.

Correct    Internet-based development treats the Web as a


Answer: communication channel, rather than as the platform
  Question
1 out of 1 points  
7
An object treats data and processes separately.
Correct False
Answer:
  Question
1 out of 1 points  
8
In a DFD, the Gane and Sarson symbol for a process is a ____.

Correct    rectangle with rounded corners


Answer:
  Question
1 out of 1 points  
9
A gray hole process is a process that has ____.

Correct    at least one input and one output, but the input obviously is
Answer: too insufficient to generate the output shown
  Question
1 out of 1 points  
10
All of the following are true of a traditional systems development environment
except ____.

Correct    scalability is not affected by telecommunications limitations


Answer: and local networks
  Question
1 out of 1 points  
11
When DFDs are drawn, each of the following conventions should be followed
except ____.

Correct    use the same names within each set of symbols


Answer:
  Question
1 out of 1 points  
12
Which of the following is NOT an attribute of a car?

Correct    parking
Answer:
  Question
1 out of 1 points  
13
Two Web-based development environments are IBM’s WebSphere and
Microsoft’s .NET.
Correct True
Answer:
  Question
1 out of 1 points  
14
Some data files should be totally hidden from view, while others should have
____ so users can view, but not change, the data.

Correct    read-only properties


Answer:
  Question
1 out of 1 points  
15
Building an application in a Web-based environment might involve different
risks and benefits, compared to a traditional environment.

Correct True
Answer:
  Question
1 out of 1 points  
16
Because diagram 0 is a more detailed or expanded version of process 0 on a
context diagram, diagram 0 is called a(n) ____.

Correct    exploded view


Answer:
  Question
1 out of 1 points  
17
____ is a widely used method of visualizing and documenting an information
system.

Correct    UML
Answer:
  Question
1 out of 1 points  
18
A logical model describes how a system will be constructed.

Correct False
Answer:
  Question
1 out of 1 points  
19
In a DFD, a process symbol can have only one outgoing data flow.

Correct False
Answer:
  Question
1 out of 1 points  
20
In a DFD, a data flow must have a process symbol on at least one end.

Correct True
Answer:
  Question
1 out of 1 points  
21
Typically, customers purchase licenses that give them the right to use the
software under the terms of the license agreement.

Correct True
Answer:
  Question
1 out of 1 points  
22
When companies use a ____, they already know the specific products or service
they want and need to obtain price quotations or bids from vendors.

Correct    request for quotation (RFQ)


Answer:
  Question
1 out of 1 points  
23
Mergers and acquisitions typically have no impact on clients and customers of
large, financially healthy firms.

Correct False
Answer:
  Question
1 out of 1 points  
24
A gas pump is an example of a black box.

Correct True
Answer:
  Question
1 out of 1 points  
25
An IBS (Internet business services) solution is attractive to customers because it
offers online data center support, mainframe computing power for mission-
critical functions, and universal access via the Internet.

Correct True
Answer:
  Question
1 out of 1 points  
26
Your car performs a(n) ____ called operate wipers when you send a message by
moving the proper control.

Correct    method
Answer:
  Question
1 out of 1 points  
27
A company considering outsourcing must realize that the solution can be only as
good as the outsourcing firm that provides the service.

Correct True
Answer:
  Question
1 out of 1 points  
28
A black hole process is a process that has ____.

Correct    no output
Answer:
  Question
1 out of 1 points  
29
In a use case, an external entity is called a(n) ____.

Correct    actor
Answer:
  Question
1 out of 1 points  
30
Leveling ____.

Correct    uses a series of increasingly detailed DFDs to describe an


Answer: information system
  Question
1 out of 1 points  
31
In a DFD, the Gane and Sarson symbol for a data store is a ____.

Correct    flat rectangle that is open on the right side and closed on
Answer: the left side
  Question
1 out of 1 points  
32
Several years ago, Gartner, a leading IT research and consulting firm, accurately
forecast the enormous growth of offshore outsourcing.

Correct True
Answer:
  Question
1 out of 1 points  
33
A major advantage of O-O designs is that systems analysts can save time and
avoid errors by using modular objects.

Correct True
Answer:
  Question
1 out of 1 points  
34
An auto parts store inventory ____ might include part number, description,
supplier code, minimum and maximum stock levels, cost, and list price.

Correct    record
Answer:
  Question
1 out of 1 points  
35
All of the following are true of Web-based development except ____.

Correct    Web-based software treats the software as a service that is


Answer: more dependent on desktop computing powers and resources
  Question
1 out of 1 points  
36
Mission-critical IT systems should be outsourced only if the result is a cost-
attractive, reliable, business solution that fits the company’s long-term
business strategy.

Correct True
Answer:
  Question
0 out of 1 points  
37
Many valuable reports can be obtained from a data dictionary, including a(n)
____.

Correct    all of the above


Answer:
  Question
1 out of 1 points  
38
In a DFD, the Gane and Sarson symbol for a data flow is a ____.

Correct    line with a single or double arrowhead


Answer:
  Question
1 out of 1 points  
39
Microsoft’s ____ is one of the major Web-based development
environments.

Correct    .NET
Answer:
  Question
1 out of 1 points  
40
A data flow in a DFD represents one or more data items.
Correct True
Answer:
  Question
1 out of 1 points  
41
The number of attributes needed to describe an object depends on the business
requirements of the information system and its users.

Correct True
Answer:
  Question
1 out of 1 points  
42
An object’s ____ are the tasks or functions the object performs.

Correct    methods
Answer:
  Question
1 out of 1 points  
43
A major advantage of outsourcing is that it eliminates employee concerns about
job security.

Correct False
Answer:
  Question
1 out of 1 points  
44
The UML symbol for a use case is a(n) ____ with a label that describes the
action or event.

Correct    oval
Answer:
  Question
1 out of 1 points  
45
Using Gane and Sarson symbols, a DFD represents processes as circles.
Correct False
Answer:
  Question
1 out of 1 points  
46
A black box does not want or need outside interference.

Correct True
Answer:
  Question
1 out of 1 points  
47
The Software & Information Industry Association (SIIA) believes that the
acquisition of software as a service rather than a product will have a major
impact on the software industry.

Correct True
Answer:
  Question
1 out of 1 points  
48
Two data stores can be connected by a data flow without an intervening process.

Correct False
Answer:
  Question
1 out of 1 points  
49
Just as objects are similar to adjectives, attributes resemble verbs that describe
what and how an object does something.

Correct False
Answer:
  Question
1 out of 1 points  
50
A class can belong to a more general category called a subclass.
Correct False
Answer:
  Question
1 out of 1 points  
51
The concept that a message gives different meanings to different objects is
called encapsulation.

Correct False
Answer:
  Question
1 out of 1 points  
52
Oracle Corporation offers a service called ____, which provides E-business
applications on a fixed fee basis.

Correct    Oracle On Demand


Answer:
  Question
1 out of 1 points  
53
Balancing ____.

Correct    ensures that the input and output data flows of the parent
Answer: DFD are maintained on the child DFD
  Question
1 out of 1 points  
54
In data and process modeling, a(n) ____ model shows what the system must do,
regardless of how it will be implemented physically.

Correct    logical
Answer:
  Question
1 out of 1 points  
55
The UML represents an object as a(n) ____ with the object name at the top,
followed by the object’s attributes and methods.

Correct    rectangle
Answer:
  Question
1 out of 1 points  
56
When determining outsourcing fees, a ____ has a variable fee based on the
number of users or workstations that have access to the application.

Correct    subscription model


Answer:
  Question
1 out of 1 points  
57
All relationships have equal weight; none is stronger than any other.

Correct False
Answer:
  Question
0 out of 1 points  
58
A method is like a blueprint, or template, for all the objects within a class.

Correct False
Answer:
  Question
1 out of 1 points  
59
A DFD shows the structure and detailed contents of a data flow.

Correct False
Answer:
  Question
1 out of 1 points  
60
In a traditional systems development environment, security issues usually are
less complex than with Web-based systems, because the system operates on a
private telecommunications network, rather than the Internet.

Correct True
Answer:
  Question 1 out of 1 points  
61
System analysts define an object’s attributes during the systems design
process.

Correct True
Answer:
  Question
1 out of 1 points  
62
An ASP provides a license to use the software, and nothing more.

Correct False
Answer:
  Question
1 out of 1 points  
63
A(n) ____ defines specific tasks that an object can perform.

Correct    method
Answer:
  Question
0 out of 1 points  
64
The same message to two different objects produces the same results.

Correct False
Answer:
  Question
1 out of 1 points  
65
A software package developed to handle information requirements for a specific
type of business is called a horizontal application.

Correct False
Answer:
  Question
1 out of 1 points  
66
Spontaneous generation, black holes, and gray holes are logically impossible in
a DFD because a process must act on input, shown by an incoming data flow,
and produce output, represented by an outgoing data flow.

Correct True
Answer:
  Question
1 out of 1 points  
67
A use case ____ documents the name of the use case, the actor, a description of
the use case, a step-by-step list of the tasks and actions required for successful
completion, a description of alternative courses of action, preconditions,
postconditions, and assumptions.

Correct    description
Answer:
  Question
1 out of 1 points  
68
Data flows are shown in a context diagram because data stores are external to
the system.

Correct False
Answer:
  Question
1 out of 1 points  
69
A software package that can be used by many different types of organizations is
called a vertical application.

Correct False
Answer:
  Question
1 out of 1 points  
70
Internet-based development treats the Web as just a communications channel,
rather than as a platform.
Correct False
Answer:
  Question
1 out of 1 points  
71
A DFD does not show the external entities that provide data to the system or
receive output from the system.

Correct False
Answer:
  Question
1 out of 1 points  
72
The ____ uses a set of symbols to represent graphically the various components
and relationships within a system.

Correct    UML
Answer:
  Question
1 out of 1 points  
73
Late in the systems design phase, you build a logical model that describes how a
system will be constructed.

Correct False
Answer:
  Question
1 out of 1 points  
74
The main reason for offshore outsourcing is the same as domestic outsourcing:
lower bottom-line costs.

Correct True
Answer:
  Question
1 out of 1 points  
75
By limiting access to internal processes, an object prevents its internal code
from being altered by another object or process.
Correct True
Answer:
  Question
1 out of 1 points  
76
Systems analysts call an entity that supplies data to the system a sink, and an
entity that receives data from the system a source.

Correct False
Answer:
  Question
1 out of 1 points  
77
Typically, companies choose in-house software development for all of the
following reasons except to ____.

Correct    obtain input from other companies who already have


Answer: implemented the software
  Question
1 out of 1 points  
78
Which of the following is not a path that development can follow?

Correct    construct a legacy system


Answer:
  Question
1 out of 1 points  
79
DFD symbols are referenced by using all ____ letters for the symbol name.

Correct    capital
Answer:
  Question
1 out of 1 points  
80
The data dictionary usually records and describes a default value, which is the
____.

Correct    value for the data element if a value otherwise is not


Answer: entered for it
  Question 1 out of 1 points  
81
Leveling also is called ____.

Correct    all of the above


Answer:
  Question
1 out of 1 points  
82
The line from the actor to a use case is called a(n) ____.

Correct    association
Answer:
  Question
1 out of 1 points  
83
If objects are similar to adjectives that describe the characteristics of an object,
attributes are similar to nouns.

Correct False
Answer:
  Question
1 out of 1 points  
84
Customer objects can perform specific tasks, such as placing an order, or paying
a bill.

Correct True
Answer:
  Question
1 out of 1 points  
85
A DFD does not show the detailed contents of a data store — the specific
structure and data elements are defined in the data dictionary.

Correct True
Answer:
  Question
1 out of 1 points  
86
A use case ____ is a visual summary of several related use cases within a
system or subsystem.

Correct    diagram
Answer:
  Question
0 out of 1 points  
87
Advantages of purchasing a software package over developing software in-
house include all of the following except ____.

Correct    satisfaction of unique business requirements


Answer:
  Question
1 out of 1 points  
88
Inheritance enables an object to derive one or more of its attributes from a(n)
____.

Correct    parent
Answer:
  Question
0 out of 1 points  
89
Buyers can customize a software package by ____.

Correct    all of the above


Answer:
  Question
1 out of 1 points  
90
Your red Mustang is a(n) ____ of the CAR class.

Correct    instance
Answer:
  Question
1 out of 1 points  
91
Objects can have a specific attribute called a(n) ____, which describes the
object’s current status.

Correct    state
Answer:
  Question 1 out of 1 points  
92
A physical model shows what the system must do, regardless of how it will be
implemented.

Correct False
Answer:
  Question
1 out of 1 points  
93
In a DFD, processes contain the business logic, also called business rules, that
transform the data and produce the required results.

Correct True
Answer:
  Question
1 out of 1 points  
94
Outsourcing can refer to ____.

Correct    all of the above


Answer:
  Question
1 out of 1 points  
95
A data flow diagram (DFD) shows how the system transforms input data into
useful information.

Correct True
Answer:
  Question
1 out of 1 points  
96
When you create a use case diagram, the first step is to identify the system
boundary, which is represented by a ____.

Correct    rectangle
Answer:
  Question
1 out of 1 points  
97
Some objects might have a few attributes; others might have dozens.

Correct True
Answer:
  Question
1 out of 1 points  
98
A set of DFDs provides a logical model that shows how the system works, not
what the system does.

Correct False
Answer:
  Question
0 out of 1 points  
99
A spontaneous generation process is a process that has ____.

Correct    no input
Answer:
  Question
1 out of 1 points  
100
An object has certain ____.

Correct    attributes
Answer:

Question
1 out of 1 points  
1
Problems found with 1NF (first normal form) design that do not exist in 2NF
(second normal form) include all of the following except ____.

Correct    1NF tables always contain consistent data


Answer:
  Question
1 out of 1 points  
2
When developing e-business systems, an in-house solution usually requires a
____ for a company that must adapt quickly in a dynamic e-commerce
environment.
Correct    greater initial investment but provides more flexibility
Answer:
  Question
1 out of 1 points  
3
An existence check is a data validation check that ____.

Correct    is used for mandatory data items


Answer:
  Question
1 out of 1 points  
4
Exception reports are useful when the user needs to know the details, but does
not want information only on records that might require action.

Correct False
Answer:
  Question
0 out of 1 points  
5
In a typical file processing environment, ____ problems can occur if updates are
not applied in every file.

Correct    data integrity


Answer:
  Question
1 out of 1 points  
6
In a table or file, each column represents a record, which is an individual
instance, or occurrence of an entity, and each row represents a field, or
characteristic of the entity.

Correct False
Answer:
  Question
1 out of 1 points  
7
A combination check is a data validation check that ____.

Correct    is performed on two or more fields to ensure that they are


Answer: consistent or reasonable when considered together
  Question
1 out of 1 points  
8
In a detail report, each line of output printed is called a detail line.

Correct True
Answer:
  Question
1 out of 1 points  
9
Web pages are stored on a Web server, which is a computer that receives requests
and makes Web pages available to users.

Correct True
Answer:
  Question
1 out of 1 points  
10
Online processing systems typically have all of the following characteristics
except ____.

Correct    the system requires significantly fewer network resources


Answer: than batch systems
  Question
1 out of 1 points  
11
A ____ is a text document written in HTML.

Correct    Web page


Answer:
  Question
0 out of 1 points  
12
A table is in first normal form (1NF) if it contains a repeating group.

Correct False
Answer:
  Question
1 out of 1 points  
13
Relational databases are poorly suited to client/server computing because they
are so powerless and rigid.

Correct False
Answer:
  Question
1 out of 1 points  
14
____ is the measure of a system’s ability to expand, change, or
downsize easily to meet the changing needs of a business enterprise.

Correct    Scalability
Answer:
  Question
1 out of 1 points  
15
Today, client/server architecture is the dominant form of systems design, using
Internet protocols and traditional network models.

Correct True
Answer:
  Question
1 out of 1 points  
16
A disadvantage of server-based processing is that character-based terminals
typically are used, which provide a limited interface for users.

Correct True
Answer:
  Question
1 out of 1 points  
17
In a file-oriented information system, a security file ____.

Correct    is created and saved for backup and recovery purposes


Answer:
  Question
1 out of 1 points  
18
In the OSI (open system interconnection) model, the application layer ____.
Correct    provides network services requested by a local
Answer: workstation
  Question
1 out of 1 points  
19
To design data entry screens that are easy to learn and use, employ all of the
following guidelines except ____.

Correct    require users to type leading zeroes for numeric fields


Answer:
  Question
1 out of 1 points  
20
Generally, reports used by individuals at higher levels in an organization include
more detail than reports used by lower-level employees.

Correct False
Answer:
  Question
1 out of 1 points  
21
A popular rule of thumb is that a design is in 3NF if every nonkey field depends
on the key, the whole key, and nothing but the key.

Correct True
Answer:
  Question
1 out of 1 points  
22
A batch processing system has all of the following characteristics except ____.

Correct    the information system is available whenever necessary to


Answer: support business operations
  Question
1 out of 1 points  
23
In contrast to a centralized system, a client/server design separates applications
and data.
Correct True
Answer:
  Question
1 out of 1 points  
24
Impact printers can use multi-part forms to produce more than one copy, which
is an advantage to firms that require several copies of the same report.

Correct True
Answer:
  Question
1 out of 1 points  
25
In a client/server design, a database server ____.

Correct    processes individual SQL commands


Answer:
  Question
1 out of 1 points  
26
In a Web-based database design, the Internet serves as the front end, or
interface, for the database management system.

Correct True
Answer:
  Question
1 out of 1 points  
27
In the OSI (open system interconnection) model, the presentation layer ____.

Correct    assures that data is uniformly structured and formatted for


Answer: network transmission
  Question
1 out of 1 points  
28
Podcasts are especially important for legal reasons, or where it is necessary to
display a signature, date stamp, or other visual features of a document.

Correct False
Answer:
  Question
1 out of 1 points  
29
In a file-oriented information system, a transaction file ____.

Correct    stores records that contain day-to-day business and


Answer: operational data
  Question
1 out of 1 points  
30
A(n) ____, which is used to access stored data, allows a user to specify a task
without specifying how the task will be accomplished.

Correct    query language


Answer:
  Question
1 out of 1 points  
31
For upper-level managers who often want to see total figures and do not need
supporting details, a(n) ____ is appropriate.

Correct    summary report


Answer:
  Question
1 out of 1 points  
32
In a file-oriented information system, a history file contains reference data used
by the information system.

Correct False
Answer:
  Question
1 out of 1 points  
33
An entity is a person, place, thing, or event for which data is collected and
maintained.

Correct True
Answer:
  Question
1 out of 1 points  
34
A client is a computer that supplies data, processing services, or other support to
one or more computers, called servers.

Correct False
Answer:
  Question
1 out of 1 points  
35
The Internet has had little impact on system architecture.

Correct False
Answer:
  Question
1 out of 1 points  
36
In e-commerce, data mining works best when a goal is to reduce clicks to close,
which means average page views to accomplish a purchase or obtain desired
information.

Correct True
Answer:
  Question
1 out of 1 points  
37
According to a usability expert at IBM, a computer user has the right to ____.

Correct    all of the above


Answer:
  Question
1 out of 1 points  
38
A reasonableness check is a data validation check that ____.

Correct    identifies values that are questionable, but not necessarily


Answer: wrong
  Question
1 out of 1 points  
39
A range check is a data validation check that ____.
Correct    tests data items to verify that they fall between a specified
Answer: minimum and maximum value
  Question
1 out of 1 points  
40
A system design where the server performs all the processing is described as
____.

Correct    mainframe architecture


Answer:
  Question
1 out of 1 points  
41
In a typical LAN, clients share data stored on a local server that supports a
group of users or a department.

Correct True
Answer:
  Question
1 out of 1 points  
42
Intranets and extranets are called Web-centric because they use different
protocols, or data transmission standards, than the Internet.

Correct False
Answer:
  Question
1 out of 1 points  
43
In a(n) ____ design, the remote user’s keystrokes are transmitted to the
mainframe, which responds by sending screen output back to the user’s
screen.

Correct    centralized
Answer:
  Question
1 out of 1 points  
44
One problem in a file processing environment is ____, which means that data
common to two or more information systems is stored in several places.

Correct    data redundancy


Answer:
  Question
1 out of 1 points  
45
Interface design should call attention to the interface, rather than facilitating
design objectives.

Correct False
Answer:
  Question
1 out of 1 points  
46
In today’s interconnected world, output from one system often becomes
input into another system.

Correct True
Answer:
  Question
1 out of 1 points  
47
When using Microsoft Office, documents, spreadsheets, and databases can be
stored in Unicode-compatible form by using the font called ____.

Correct    Arial Unicode MS


Answer:
  Question
1 out of 1 points  
48
Good interface design is based partly on ____, which focuses on how an
interface can be made attractive and easy to use.

Correct    aesthetics
Answer:
  Question
1 out of 1 points  
49
A subschema is a view of a database used by one or more systems or users.

Correct True
Answer:
  Question
1 out of 1 points  
50
Good user interface design is based partly on ____, which describes how people
work, learn, and interact with computers.

Correct    ergonomics
Answer:
  Question
1 out of 1 points  
51
____ describes how instances of one entity relate to instances of another entity.

Correct    Cardinality
Answer:
  Question
1 out of 1 points  
52
____ protects privacy rights and shields an organization’s proprietary
data from theft or unauthorized access.

Correct    Output security


Answer:
  Question
1 out of 1 points  
53
____ means that a system can be expanded, modified, or downsized easily to
meet the rapidly changing needs of a business enterprise.

Correct    Scalability
Answer:
  Question
1 out of 1 points  
54
Centering headings over maximum field widths is ideal when many of the actual
values are shorter than the maximum width.

Correct False
Answer:
  Question
1 out of 1 points  
55
Middleware provides a transparent interface that enables system designers to
integrate dissimilar software and hardware.
Correct True
Answer:
  Question
1 out of 1 points  
56
The speed of laser printers is rated in ____, which can be used to estimate the
time required to print a report.

Correct    ppm (pages per minute)


Answer:
  Question
0 out of 1 points  
57
As the size of a business changes, it is easier to alter the capability of a large-
scale central server than it is to adjust the number of clients and the processing
functions they perform.

Correct False
Answer:
  Question
1 out of 1 points  
58
A repeating group is a set of one or more fields that can occur only once in a
single record, with each occurrence having the same value.

Correct False
Answer:
  Question
1 out of 1 points  
59
On a source document, the ____ contains codes, identification information,
numbers, and dates that are used for storing completed forms.

Correct    control zone


Answer:
  Question
1 out of 1 points  
60
Compared to file server designs, client/server systems ____.
Correct    reduce network loads and improve response times
Answer:
  Question
1 out of 1 points  
61
A report footer, which appears at the end of a report, can include grand totals for
numeric fields and other end-of-report information.

Correct True
Answer:
  Question
1 out of 1 points  
62
In a typical client/server system, the client stores the data and provides data
access and database management functions.

Correct False
Answer:
  Question
1 out of 1 points  
63
Apart from backup and recovery procedures necessary to sustain business
operations ____ laws and regulations apply to company data.

Correct    file retention


Answer:
  Question
1 out of 1 points  
64
When considering physical design, a systems analyst must determine how a new
application will communicate with existing legacy systems.

Correct True
Answer:
  Question
1 out of 1 points  
65
After a report design is approved, the design should be documented in a ____,
which contains information about the fields, data types and lengths, report
frequency and distribution, and other comments.
Correct    report analysis form
Answer:
  Question
1 out of 1 points  
66
A fat client, also called a thick client, design locates all or most of the
processing logic at the server.

Correct False
Answer:
  Question
1 out of 1 points  
67
Visio is an example of a CASE tool that can help users plan, analyze, design,
and implement an information system.

Correct True
Answer:
  Question
1 out of 1 points  
68
A(n) ____ produces one or more lines of output for each record processed.

Correct    detail report


Answer:
  Question
1 out of 1 points  
69
In a file-oriented information system, a work file ____.

Correct    is a temporary file created by an information system for a


Answer: single task
  Question
1 out of 1 points  
70
The type of output and the technology needed usually is decided during the
systems analysis phase, based on user requirements.

Correct True
Answer:
  Question
1 out of 1 points  
71
A database system stores and manages data in separate files using a method
called file processing.

Correct False
Answer:
  Question
1 out of 1 points  
72
When designing a report, a sample report, which is a ____, or prototype, should
be prepared for users to review.

Correct    mock-up
Answer:
  Question
1 out of 1 points  
73
A(n) ____ displays only those records that meet a specific condition or
conditions.

Correct    exception report


Answer:
  Question
1 out of 1 points  
74
In the OSI (open system interconnection) model, the session layer ____.

Correct    defines control structures that manage the communications


Answer: link between computers
  Question
0 out of 1 points  
75
Either a page header or a page footer, which appears at the bottom of a page, is
used to display the name of the report and a page number.

Correct True
Answer:
  Question
1 out of 1 points  
76
A fat client design is ____ to develop than a thin client design, because the
architecture resembles traditional file-server designs where all processing is
performed at the client.

Correct    simpler and less expensive


Answer:
  Question
1 out of 1 points  
77
A three-tier design includes a middle layer between the client and server that
processes the client requests and translates them into data access commands that
can be understood and carried out by the server.

Correct True
Answer:
  Question
1 out of 1 points  
78
The ____ section in a typical system design specification describes the
constraints, or conditions, affecting a system, including any requirements that
involve operations, hardware, systems software, or security.

Correct    System Environment


Answer:
  Question
1 out of 1 points  
79
When a system produces multiple reports, each report should have completely
different design elements.

Correct False
Answer:
  Question
1 out of 1 points  
80
In a report, a group header can be printed after the last detail line in a group and
a group footer above the first detail line.

Correct False
Answer:
  Question
1 out of 1 points  
81
In a file-oriented information system, a master file ____.

Correct    stores relatively permanent data about an entity


Answer:
  Question
1 out of 1 points  
82
A report header, which appears at the beginning of a report, identifies the report,
and contains the report title, date, and other necessary information.

Correct True
Answer:
  Question
1 out of 1 points  
83
In a client/server design, tasks are divided between servers, which are
workstations that users interact with, and clients, which are computers that
supply data, processing, and services to the server workstations.

Correct False
Answer:
  Question
1 out of 1 points  
84
When a system reads a physical record, it loads the data from storage into a
____, which is a segment of computer memory.

Correct    buffer
Answer:
  Question
1 out of 1 points  
85
An extranet is a private, company-owned network to provide Web-based access
to users.

Correct False
Answer:
  Question 1 out of 1 points  
86
Specific DBMS (database management system) advantages include all of the
following except ____.

Correct    data dependence


Answer:
  Question
1 out of 1 points  
87
Although stand-alone PCs improved employee productivity and allowed users
to perform tasks that previously required IT department assistance, stand-alone
computing was inefficient and expensive.

Correct True
Answer:
  Question
0 out of 1 points  
88
Physical storage refers to information as seen through a user’s eyes,
regardless of how or where the information actually is organized or stored.

Correct False
Answer:
  Question
1 out of 1 points  
89
Using a DDBMS (distributed database management system) offers all of the
following advantages except ____.

Correct    the architecture of the system is simple and easy to


Answer: manage
  Question
1 out of 1 points  
90
File sharing designs are efficient only if the number of networked users is ____.

Correct    low and the transmitted file sizes are relatively small
Answer:
  Question
1 out of 1 points  
91
Initial screen designs can be presented to users in the form of a(n) ____, which
is a sketch that shows the general screen layout and design.

Correct    storyboard
Answer:
  Question
1 out of 1 points  
92
HTML uses formatting codes called ____, which specify how the text and
visual elements on a Web page will be displayed in a Web browser.

Correct    tags
Answer:
  Question
1 out of 1 points  
93
A Web-based application encounters all of the connectivity and compatibility
problems that typically arise when different hardware environments are
involved.

Correct False
Answer:
  Question
1 out of 1 points  
94
A dialog box allows a user to enter information about a task that the system will
perform.

Correct True
Answer:
  Question
1 out of 1 points  
95
In a client/server interaction, the client submits a request for information from
the server, which carries out the operations and responds to the client.

Correct True
Answer:
  Question
1 out of 1 points  
96
Every information system involves ____.

Correct    all of the above


Answer:
  Question
1 out of 1 points  
97
Scalability is especially important in implementing systems that are volume-
related, such as transaction processing systems.

Correct True
Answer:
  Question
1 out of 1 points  
98
User-selected Help always offers assistance for the task in progress.

Correct False
Answer:
  Question
1 out of 1 points  
99
In most organizations, the IT department is responsible for output control and
security measures.

Correct True
Answer:
  Question
1 out of 1 points  
100
In older systems, often the user interface mainly consisted of process-control
screens that allowed a user to send commands to the system.

Correct True
Answer:

S-ar putea să vă placă și