Documente Academic
Documente Profesional
Documente Cultură
Question
1 out of 1 points
1
System requirements serve as benchmarks to measure the overall acceptability of
a finished system.
Selected The student records system must produce class lists within
Answer: five hours after the end of registration
Correct The student records system must produce class lists within
Answer: five hours after the end of registration
Question
1 out of 1 points
27
In launching a new information system, the greatest risk occurs when a
company ____.
Traditionally, the SDLC is pictured as a(n) ____, like that shown in the
accompanying figure, where the result of each phase, which is called a
deliverable or end product, flows sequentially into the next phase.
Selected online package tracking system that decreases the need for
Answer: clerical staff
Correct online package tracking system that decreases the need for
Answer: clerical staff
Question
1 out of 1 points
37
The ____ phase of the SDLC includes four main activities: requirements
modeling, data and process modeling, object modeling, and consideration of
development strategies.
Selected The video rental system must not execute new rental
Answer: transactions for customers who have overdue tapes
Correct The video rental system must not execute new rental
Answer: transactions for customers who have overdue tapes
Question
1 out of 1 points
77
Internal and external factors affect every business decision that a company
makes, and IT systems are no exception.
Correct True
Answer:
Question
1 out of 1 points
5
A ____ is a document that describes a company, lists the IT services or products
needed, and specifies the features required.
Correct at least one input and one output, but the input obviously is
Answer: too insufficient to generate the output shown
Question
1 out of 1 points
10
All of the following are true of a traditional systems development environment
except ____.
Correct parking
Answer:
Question
1 out of 1 points
13
Two Web-based development environments are IBM’s WebSphere and
Microsoft’s .NET.
Correct True
Answer:
Question
1 out of 1 points
14
Some data files should be totally hidden from view, while others should have
____ so users can view, but not change, the data.
Correct True
Answer:
Question
1 out of 1 points
16
Because diagram 0 is a more detailed or expanded version of process 0 on a
context diagram, diagram 0 is called a(n) ____.
Correct UML
Answer:
Question
1 out of 1 points
18
A logical model describes how a system will be constructed.
Correct False
Answer:
Question
1 out of 1 points
19
In a DFD, a process symbol can have only one outgoing data flow.
Correct False
Answer:
Question
1 out of 1 points
20
In a DFD, a data flow must have a process symbol on at least one end.
Correct True
Answer:
Question
1 out of 1 points
21
Typically, customers purchase licenses that give them the right to use the
software under the terms of the license agreement.
Correct True
Answer:
Question
1 out of 1 points
22
When companies use a ____, they already know the specific products or service
they want and need to obtain price quotations or bids from vendors.
Correct False
Answer:
Question
1 out of 1 points
24
A gas pump is an example of a black box.
Correct True
Answer:
Question
1 out of 1 points
25
An IBS (Internet business services) solution is attractive to customers because it
offers online data center support, mainframe computing power for mission-
critical functions, and universal access via the Internet.
Correct True
Answer:
Question
1 out of 1 points
26
Your car performs a(n) ____ called operate wipers when you send a message by
moving the proper control.
Correct method
Answer:
Question
1 out of 1 points
27
A company considering outsourcing must realize that the solution can be only as
good as the outsourcing firm that provides the service.
Correct True
Answer:
Question
1 out of 1 points
28
A black hole process is a process that has ____.
Correct no output
Answer:
Question
1 out of 1 points
29
In a use case, an external entity is called a(n) ____.
Correct actor
Answer:
Question
1 out of 1 points
30
Leveling ____.
Correct flat rectangle that is open on the right side and closed on
Answer: the left side
Question
1 out of 1 points
32
Several years ago, Gartner, a leading IT research and consulting firm, accurately
forecast the enormous growth of offshore outsourcing.
Correct True
Answer:
Question
1 out of 1 points
33
A major advantage of O-O designs is that systems analysts can save time and
avoid errors by using modular objects.
Correct True
Answer:
Question
1 out of 1 points
34
An auto parts store inventory ____ might include part number, description,
supplier code, minimum and maximum stock levels, cost, and list price.
Correct record
Answer:
Question
1 out of 1 points
35
All of the following are true of Web-based development except ____.
Correct True
Answer:
Question
0 out of 1 points
37
Many valuable reports can be obtained from a data dictionary, including a(n)
____.
Correct .NET
Answer:
Question
1 out of 1 points
40
A data flow in a DFD represents one or more data items.
Correct True
Answer:
Question
1 out of 1 points
41
The number of attributes needed to describe an object depends on the business
requirements of the information system and its users.
Correct True
Answer:
Question
1 out of 1 points
42
An object’s ____ are the tasks or functions the object performs.
Correct methods
Answer:
Question
1 out of 1 points
43
A major advantage of outsourcing is that it eliminates employee concerns about
job security.
Correct False
Answer:
Question
1 out of 1 points
44
The UML symbol for a use case is a(n) ____ with a label that describes the
action or event.
Correct oval
Answer:
Question
1 out of 1 points
45
Using Gane and Sarson symbols, a DFD represents processes as circles.
Correct False
Answer:
Question
1 out of 1 points
46
A black box does not want or need outside interference.
Correct True
Answer:
Question
1 out of 1 points
47
The Software & Information Industry Association (SIIA) believes that the
acquisition of software as a service rather than a product will have a major
impact on the software industry.
Correct True
Answer:
Question
1 out of 1 points
48
Two data stores can be connected by a data flow without an intervening process.
Correct False
Answer:
Question
1 out of 1 points
49
Just as objects are similar to adjectives, attributes resemble verbs that describe
what and how an object does something.
Correct False
Answer:
Question
1 out of 1 points
50
A class can belong to a more general category called a subclass.
Correct False
Answer:
Question
1 out of 1 points
51
The concept that a message gives different meanings to different objects is
called encapsulation.
Correct False
Answer:
Question
1 out of 1 points
52
Oracle Corporation offers a service called ____, which provides E-business
applications on a fixed fee basis.
Correct ensures that the input and output data flows of the parent
Answer: DFD are maintained on the child DFD
Question
1 out of 1 points
54
In data and process modeling, a(n) ____ model shows what the system must do,
regardless of how it will be implemented physically.
Correct logical
Answer:
Question
1 out of 1 points
55
The UML represents an object as a(n) ____ with the object name at the top,
followed by the object’s attributes and methods.
Correct rectangle
Answer:
Question
1 out of 1 points
56
When determining outsourcing fees, a ____ has a variable fee based on the
number of users or workstations that have access to the application.
Correct False
Answer:
Question
0 out of 1 points
58
A method is like a blueprint, or template, for all the objects within a class.
Correct False
Answer:
Question
1 out of 1 points
59
A DFD shows the structure and detailed contents of a data flow.
Correct False
Answer:
Question
1 out of 1 points
60
In a traditional systems development environment, security issues usually are
less complex than with Web-based systems, because the system operates on a
private telecommunications network, rather than the Internet.
Correct True
Answer:
Question 1 out of 1 points
61
System analysts define an object’s attributes during the systems design
process.
Correct True
Answer:
Question
1 out of 1 points
62
An ASP provides a license to use the software, and nothing more.
Correct False
Answer:
Question
1 out of 1 points
63
A(n) ____ defines specific tasks that an object can perform.
Correct method
Answer:
Question
0 out of 1 points
64
The same message to two different objects produces the same results.
Correct False
Answer:
Question
1 out of 1 points
65
A software package developed to handle information requirements for a specific
type of business is called a horizontal application.
Correct False
Answer:
Question
1 out of 1 points
66
Spontaneous generation, black holes, and gray holes are logically impossible in
a DFD because a process must act on input, shown by an incoming data flow,
and produce output, represented by an outgoing data flow.
Correct True
Answer:
Question
1 out of 1 points
67
A use case ____ documents the name of the use case, the actor, a description of
the use case, a step-by-step list of the tasks and actions required for successful
completion, a description of alternative courses of action, preconditions,
postconditions, and assumptions.
Correct description
Answer:
Question
1 out of 1 points
68
Data flows are shown in a context diagram because data stores are external to
the system.
Correct False
Answer:
Question
1 out of 1 points
69
A software package that can be used by many different types of organizations is
called a vertical application.
Correct False
Answer:
Question
1 out of 1 points
70
Internet-based development treats the Web as just a communications channel,
rather than as a platform.
Correct False
Answer:
Question
1 out of 1 points
71
A DFD does not show the external entities that provide data to the system or
receive output from the system.
Correct False
Answer:
Question
1 out of 1 points
72
The ____ uses a set of symbols to represent graphically the various components
and relationships within a system.
Correct UML
Answer:
Question
1 out of 1 points
73
Late in the systems design phase, you build a logical model that describes how a
system will be constructed.
Correct False
Answer:
Question
1 out of 1 points
74
The main reason for offshore outsourcing is the same as domestic outsourcing:
lower bottom-line costs.
Correct True
Answer:
Question
1 out of 1 points
75
By limiting access to internal processes, an object prevents its internal code
from being altered by another object or process.
Correct True
Answer:
Question
1 out of 1 points
76
Systems analysts call an entity that supplies data to the system a sink, and an
entity that receives data from the system a source.
Correct False
Answer:
Question
1 out of 1 points
77
Typically, companies choose in-house software development for all of the
following reasons except to ____.
Correct capital
Answer:
Question
1 out of 1 points
80
The data dictionary usually records and describes a default value, which is the
____.
Correct association
Answer:
Question
1 out of 1 points
83
If objects are similar to adjectives that describe the characteristics of an object,
attributes are similar to nouns.
Correct False
Answer:
Question
1 out of 1 points
84
Customer objects can perform specific tasks, such as placing an order, or paying
a bill.
Correct True
Answer:
Question
1 out of 1 points
85
A DFD does not show the detailed contents of a data store — the specific
structure and data elements are defined in the data dictionary.
Correct True
Answer:
Question
1 out of 1 points
86
A use case ____ is a visual summary of several related use cases within a
system or subsystem.
Correct diagram
Answer:
Question
0 out of 1 points
87
Advantages of purchasing a software package over developing software in-
house include all of the following except ____.
Correct parent
Answer:
Question
0 out of 1 points
89
Buyers can customize a software package by ____.
Correct instance
Answer:
Question
1 out of 1 points
91
Objects can have a specific attribute called a(n) ____, which describes the
object’s current status.
Correct state
Answer:
Question 1 out of 1 points
92
A physical model shows what the system must do, regardless of how it will be
implemented.
Correct False
Answer:
Question
1 out of 1 points
93
In a DFD, processes contain the business logic, also called business rules, that
transform the data and produce the required results.
Correct True
Answer:
Question
1 out of 1 points
94
Outsourcing can refer to ____.
Correct True
Answer:
Question
1 out of 1 points
96
When you create a use case diagram, the first step is to identify the system
boundary, which is represented by a ____.
Correct rectangle
Answer:
Question
1 out of 1 points
97
Some objects might have a few attributes; others might have dozens.
Correct True
Answer:
Question
1 out of 1 points
98
A set of DFDs provides a logical model that shows how the system works, not
what the system does.
Correct False
Answer:
Question
0 out of 1 points
99
A spontaneous generation process is a process that has ____.
Correct no input
Answer:
Question
1 out of 1 points
100
An object has certain ____.
Correct attributes
Answer:
Question
1 out of 1 points
1
Problems found with 1NF (first normal form) design that do not exist in 2NF
(second normal form) include all of the following except ____.
Correct False
Answer:
Question
0 out of 1 points
5
In a typical file processing environment, ____ problems can occur if updates are
not applied in every file.
Correct False
Answer:
Question
1 out of 1 points
7
A combination check is a data validation check that ____.
Correct True
Answer:
Question
1 out of 1 points
9
Web pages are stored on a Web server, which is a computer that receives requests
and makes Web pages available to users.
Correct True
Answer:
Question
1 out of 1 points
10
Online processing systems typically have all of the following characteristics
except ____.
Correct False
Answer:
Question
1 out of 1 points
13
Relational databases are poorly suited to client/server computing because they
are so powerless and rigid.
Correct False
Answer:
Question
1 out of 1 points
14
____ is the measure of a system’s ability to expand, change, or
downsize easily to meet the changing needs of a business enterprise.
Correct Scalability
Answer:
Question
1 out of 1 points
15
Today, client/server architecture is the dominant form of systems design, using
Internet protocols and traditional network models.
Correct True
Answer:
Question
1 out of 1 points
16
A disadvantage of server-based processing is that character-based terminals
typically are used, which provide a limited interface for users.
Correct True
Answer:
Question
1 out of 1 points
17
In a file-oriented information system, a security file ____.
Correct False
Answer:
Question
1 out of 1 points
21
A popular rule of thumb is that a design is in 3NF if every nonkey field depends
on the key, the whole key, and nothing but the key.
Correct True
Answer:
Question
1 out of 1 points
22
A batch processing system has all of the following characteristics except ____.
Correct True
Answer:
Question
1 out of 1 points
25
In a client/server design, a database server ____.
Correct True
Answer:
Question
1 out of 1 points
27
In the OSI (open system interconnection) model, the presentation layer ____.
Correct False
Answer:
Question
1 out of 1 points
29
In a file-oriented information system, a transaction file ____.
Correct False
Answer:
Question
1 out of 1 points
33
An entity is a person, place, thing, or event for which data is collected and
maintained.
Correct True
Answer:
Question
1 out of 1 points
34
A client is a computer that supplies data, processing services, or other support to
one or more computers, called servers.
Correct False
Answer:
Question
1 out of 1 points
35
The Internet has had little impact on system architecture.
Correct False
Answer:
Question
1 out of 1 points
36
In e-commerce, data mining works best when a goal is to reduce clicks to close,
which means average page views to accomplish a purchase or obtain desired
information.
Correct True
Answer:
Question
1 out of 1 points
37
According to a usability expert at IBM, a computer user has the right to ____.
Correct True
Answer:
Question
1 out of 1 points
42
Intranets and extranets are called Web-centric because they use different
protocols, or data transmission standards, than the Internet.
Correct False
Answer:
Question
1 out of 1 points
43
In a(n) ____ design, the remote user’s keystrokes are transmitted to the
mainframe, which responds by sending screen output back to the user’s
screen.
Correct centralized
Answer:
Question
1 out of 1 points
44
One problem in a file processing environment is ____, which means that data
common to two or more information systems is stored in several places.
Correct False
Answer:
Question
1 out of 1 points
46
In today’s interconnected world, output from one system often becomes
input into another system.
Correct True
Answer:
Question
1 out of 1 points
47
When using Microsoft Office, documents, spreadsheets, and databases can be
stored in Unicode-compatible form by using the font called ____.
Correct aesthetics
Answer:
Question
1 out of 1 points
49
A subschema is a view of a database used by one or more systems or users.
Correct True
Answer:
Question
1 out of 1 points
50
Good user interface design is based partly on ____, which describes how people
work, learn, and interact with computers.
Correct ergonomics
Answer:
Question
1 out of 1 points
51
____ describes how instances of one entity relate to instances of another entity.
Correct Cardinality
Answer:
Question
1 out of 1 points
52
____ protects privacy rights and shields an organization’s proprietary
data from theft or unauthorized access.
Correct Scalability
Answer:
Question
1 out of 1 points
54
Centering headings over maximum field widths is ideal when many of the actual
values are shorter than the maximum width.
Correct False
Answer:
Question
1 out of 1 points
55
Middleware provides a transparent interface that enables system designers to
integrate dissimilar software and hardware.
Correct True
Answer:
Question
1 out of 1 points
56
The speed of laser printers is rated in ____, which can be used to estimate the
time required to print a report.
Correct False
Answer:
Question
1 out of 1 points
58
A repeating group is a set of one or more fields that can occur only once in a
single record, with each occurrence having the same value.
Correct False
Answer:
Question
1 out of 1 points
59
On a source document, the ____ contains codes, identification information,
numbers, and dates that are used for storing completed forms.
Correct True
Answer:
Question
1 out of 1 points
62
In a typical client/server system, the client stores the data and provides data
access and database management functions.
Correct False
Answer:
Question
1 out of 1 points
63
Apart from backup and recovery procedures necessary to sustain business
operations ____ laws and regulations apply to company data.
Correct True
Answer:
Question
1 out of 1 points
65
After a report design is approved, the design should be documented in a ____,
which contains information about the fields, data types and lengths, report
frequency and distribution, and other comments.
Correct report analysis form
Answer:
Question
1 out of 1 points
66
A fat client, also called a thick client, design locates all or most of the
processing logic at the server.
Correct False
Answer:
Question
1 out of 1 points
67
Visio is an example of a CASE tool that can help users plan, analyze, design,
and implement an information system.
Correct True
Answer:
Question
1 out of 1 points
68
A(n) ____ produces one or more lines of output for each record processed.
Correct True
Answer:
Question
1 out of 1 points
71
A database system stores and manages data in separate files using a method
called file processing.
Correct False
Answer:
Question
1 out of 1 points
72
When designing a report, a sample report, which is a ____, or prototype, should
be prepared for users to review.
Correct mock-up
Answer:
Question
1 out of 1 points
73
A(n) ____ displays only those records that meet a specific condition or
conditions.
Correct True
Answer:
Question
1 out of 1 points
76
A fat client design is ____ to develop than a thin client design, because the
architecture resembles traditional file-server designs where all processing is
performed at the client.
Correct True
Answer:
Question
1 out of 1 points
78
The ____ section in a typical system design specification describes the
constraints, or conditions, affecting a system, including any requirements that
involve operations, hardware, systems software, or security.
Correct False
Answer:
Question
1 out of 1 points
80
In a report, a group header can be printed after the last detail line in a group and
a group footer above the first detail line.
Correct False
Answer:
Question
1 out of 1 points
81
In a file-oriented information system, a master file ____.
Correct True
Answer:
Question
1 out of 1 points
83
In a client/server design, tasks are divided between servers, which are
workstations that users interact with, and clients, which are computers that
supply data, processing, and services to the server workstations.
Correct False
Answer:
Question
1 out of 1 points
84
When a system reads a physical record, it loads the data from storage into a
____, which is a segment of computer memory.
Correct buffer
Answer:
Question
1 out of 1 points
85
An extranet is a private, company-owned network to provide Web-based access
to users.
Correct False
Answer:
Question 1 out of 1 points
86
Specific DBMS (database management system) advantages include all of the
following except ____.
Correct True
Answer:
Question
0 out of 1 points
88
Physical storage refers to information as seen through a user’s eyes,
regardless of how or where the information actually is organized or stored.
Correct False
Answer:
Question
1 out of 1 points
89
Using a DDBMS (distributed database management system) offers all of the
following advantages except ____.
Correct low and the transmitted file sizes are relatively small
Answer:
Question
1 out of 1 points
91
Initial screen designs can be presented to users in the form of a(n) ____, which
is a sketch that shows the general screen layout and design.
Correct storyboard
Answer:
Question
1 out of 1 points
92
HTML uses formatting codes called ____, which specify how the text and
visual elements on a Web page will be displayed in a Web browser.
Correct tags
Answer:
Question
1 out of 1 points
93
A Web-based application encounters all of the connectivity and compatibility
problems that typically arise when different hardware environments are
involved.
Correct False
Answer:
Question
1 out of 1 points
94
A dialog box allows a user to enter information about a task that the system will
perform.
Correct True
Answer:
Question
1 out of 1 points
95
In a client/server interaction, the client submits a request for information from
the server, which carries out the operations and responds to the client.
Correct True
Answer:
Question
1 out of 1 points
96
Every information system involves ____.
Correct True
Answer:
Question
1 out of 1 points
98
User-selected Help always offers assistance for the task in progress.
Correct False
Answer:
Question
1 out of 1 points
99
In most organizations, the IT department is responsible for output control and
security measures.
Correct True
Answer:
Question
1 out of 1 points
100
In older systems, often the user interface mainly consisted of process-control
screens that allowed a user to send commands to the system.
Correct True
Answer: