systems analysis and design 9th edition review

65
System Analysis and Design 9 th Edition Chapters 1-12 Review Chapter 1 1. Structured analysis is called a ____ approach since it is based on an overall plan. A: managed B: foundation C: basic D: predictive 2. One of the two main sectors of E-commerce is ____. A: business-to-consumer B: brick-and-mortar C: consumer-to-business D: dot-com 3. Software consists of system software and ____. A: application software B: network operating system C: linear software D: data software 4. The term ____ refers to the combination of hardware and software products and services that companies use to manage, access, communicate, and share information. A: practical technology B: electronic technology C: information technology D: systems technology 5. ____ tests system concepts and examine input, output, and user interfaces before final decisions are made. A: CASE tools B: Prototyping C: Investigative design D: Group typing 6. Google is an example of ____. A: an Internet-dependent company B: a brick-and-mortar company

Upload: loretta-lynn-altmayer

Post on 25-Oct-2015

981 views

Category:

Documents


6 download

DESCRIPTION

CIS1321 Introduction to Systems Analysis and Design ReviewThis course introduces computer science and non-majors to fundamental skills of analysis and design of management information systems. Students learn the concept of charting, investigating, documenting and reporting using current information systems, system analysis tools and system design tools. The related concept of management, organization, computers, information processing and the system approach are combined and applied to case studies.Textbook: Title: Systems Analysis and Design, 9th editionAuthor Shelly and RosenblattPublisher: Course Technology, CengageISBN: 13:9780538481618

TRANSCRIPT

System Analysis and Design 9th EditionChapters 1-12 Review Chapter 1 1. Structured analysis is called a ____ approach since it is based on an overall plan.A: managed B: foundation C: basic D: predictive  2. One of the two main sectors of E-commerce is ____.A: business-to-consumer B: brick-and-mortar C: consumer-to-business D: dot-com 3. Software consists of system software and ____.A: application software B: network operating system C: linear software D: data software  4. The term ____ refers to the combination of hardware and software products and services that companies use to manage, access, communicate, and share information.A: practical technology B: electronic technology C: information technology D: systems technology 5. ____ tests system concepts and examine input, output, and user interfaces before final decisions are made.A: CASE tools B: Prototyping C: Investigative design D: Group typing  6. Google is an example of ____.A: an Internet-dependent company B: a brick-and-mortar company C: a B2B company D: an Internet-independent company  7. The programs that control the hardware and produce the desired information or results are referred to as ____.A: data B: people C: processes D: software

 8. ____ verifies that an individual demonstrated a certain level of knowledge and skill on a standardized test.A: Certification B: Validation C: Documentation D: Authentication  9. The ____ are logical rules that identify data patterns and relationships.A: linear rules B: system rules C: inference rules D: productivity rules  10. A graphical representation of one or more tasks that a company performs is considered ____.A: a business model B: a business process C: a business profile D: an analytic profile  11. Data that has been transformed into output that is valuable to users is ____.A: mission B: information C: operations D: processes  12. The IT group provides technical support that includes all of the following EXCEPT ____.A: Web support B: application development C: user systems requests D: database administration  13. The newest development in data acquisition is called ____ technology, which uses high-frequency radio waves to track physical objects.A: RID B: RAD C: RFID D: FID  14. A ____ is an overview that describes a company's overall functions, processes, organization, products, services, customers, suppliers, competitors, constraints, and future direction.A: business model B: business process C: business system D: business profile  15. A set of related components that produce specific results is a ____.A: system B: compound

C: strategy D: package   16. A development system that focuses on team-based fact-finding is ____.A: RAD B: JAD C: either a. or b. D: neither a. nor b.  17. When first introduced, management information systems (MIS) was a category of systems which served ____.A: managers B: administrative staff C: operational personnel D: maintenance staff  18. The ____ is NOT an example of an internal user of a company's information system.A: customers who track their orders on a company's Web site B: company's technicians C: company's sales staff D: company's corporate officers  19. The correct definition of an in-house application is ____.A: an information system developed by outside vendors B: an information system developed by the company that uses the information system C: a software package D: an information system that is Internet-based  20. Structured analysis uses a set of process models to describe a system ____.A: in words B: in numbers C: dynamically D: graphically 21. A way in which businesses use information is ________. A: to deliver quality products and services       B: to make sound decisions     C: to maintain customer loyalty            D: all of these choices

 22. The combination of information technology, people, and data to support business requirements is called a(n) ________.A: active data system B: information system        C: electronic system           D: communal system

 23. In an information system, the system's raw material is ________.A: data B: critical quota

C: people D: matter    24. The ________ component is NOT a key part of an information system.A: Internet access B: processes         C: software            D: people

 25. An inventory or payroll application is an example of a ________. A: data system             B: vertical system         C: legacy system D: horizontal system 26. The building blocks of an information system, representing actual day-to-day business operations are called ________. A: business models     B: processes    C: hardware      D: data  27. The process used by systems analysts to represent company operations and information needs is called ________. A: user targeted modeling        B: business action modeling    C: business process modeling             D: product modeling  28. BPMN refers to ________. A: business process modeling notation           B: business profile modeling notation             C: none of these choices          D: business process modeling names              29. Computer-to-computer data transfer between companies, usually over private telecommunications lines is referred to as ________. A: electronic data interchange              B: B2C  C: Internet module exchange    D: transaction processing        30. The ________ systems are also referred to as expert systems. A: business support  B: user productivity      C: TP  D: knowledge management

 31.   ________ refers to information systems that support company-wide operations and data management requirements. A: EDI  B: WebSphere strategy             C: E-commerce            D: Enterprise computing          

32. The most popular options for developing information systems are structured analysis, object-oriented analysis, and ________. A: data flow analysis    B: network methods     C: modeling     D: agile methods          33.        The systems planning phase usually begins with a formal request to the IT department, called a ________. A: systems order          B: client complaint  C: planning request      D: systems request 34.        A development method that Microsoft calls ________ documents the experience of its own software development teams. A: Rational Unified Process      B: Microsoft Application Development             C: Microsoft Solutions Framework       D: Microsoft Xtreme Programming     

 Chapter 2 Review 

1. An evaluation of the resources needed for users to be trained on a new system is part of ____ feasibility.

A: economic B: technical C: operational D: schedule

2. The first step in evaluating feasibility is ____.

A: setting priorities B: identifying systems requests that are not feasible or necessary C: conducting a preliminary investigation D: building a prototype

3. The first step in a preliminary investigation is generally to ____.

A: evaluate feasibility B: perform fact-finding C: understand the problem or opportunity D: estimate project development time and cost

4. An organizational chart does NOT show ____.

A: formal reporting relationships B: an overview of the way each department functions C: the informal alignment of a group D: the names of employees and their positions

5. Many companies use ____ request forms that can be filled out and submitted electronically.

A: printed B: faxed C: online D: offline

6. A company's ____ are broken down into one-year, three-year, and five-year categories.

A: objectives B: goals C: requirements D: inventory

7. The coding of data to keep it safe from unauthorized users is called ____.

A: prototyping B: encryption C: password access D: key access

 8. EDI refers to ____.

A: external development interchange B: electronic data interchange C: external data interchange D: none of the above

9. A risk is an event that can affect a project ____.

A: negatively B: positively C: both a. and b. D: neither a. nor b.

10. Chapter 2 explained four types of project feasibility tests that a systems request must pass and did NOT include ____ feasibility.A: technical B: marketing

C: economic D: schedule

11. An examination of the reliability of the hardware and software environment for a new system is part of ____ feasibility.

A: economic B: technical C: operational D: schedule

12. A project where management has a yes/no choice to implement is called a ____ project.A: nondiscretionary B: discretionary C: resource D: non-resource

13. A popular technique for investigating causes and effects is called a(n) ____.

A: Ishikawa diagram B: arrowhead diagram C: Moore diagram D: Problem/Solution diagram

14. A fact-finding method during the preliminary investigation includes all of the following EXCEPT ____.

A: observing the current system in operation B: conducting a survey of users C: reviewing current system documentation D: figuring out the costs of the solution

15. ____ feasibility means that a project can be implemented in an acceptable time frame.A: Technical B: Time C: Schedule D: Operational  16. A SWOT analysis does NOT include an examination of ____.

A: weaknesses B: options C: strengths D: threats

17. Vital objectives that must be achieved for the enterprise to fulfill its mission are considered ____.

A: the SDLC B: critical success factors C: critical business issues D: CASE tools

18. Hardware-based security controls that can identify a person by a retina scan or by mapping a facial pattern are referred to as ____.

A: biological devices B: encrypted devices C: strategic scanning devices D: biometric devices

19. The purpose of a(n) ____ system is to provide the right product in the right place at the right time.

A: EDI B: CRM C: CASE D: JIT

20. Microsoft Project is a tool that is often used by ____.

A: end users B: project managers C: customer service personnel D: top managers

21. A systems request form should not ____. A: have complex instructions B: be easy to understand C: include enough space for all required information D: indicate what supporting documents are needed 22. A(n: ____ is a requirement or condition that a system must satisfy or an outcome that a system must achieve. A: condition B: constraint C: impediment D: obstacle 23. To avoid the problem of project creep, ____. A: define project scope as vaguely as possible B: leave project scope undefined C: define project scope as clearly as possible D: expand the focus beyond the problem at hand 24. ____ considers questions such as “Does management support the project?” and “Will the new system require training for users?” A: schedule feasibility B: technical feasibility C: economic feasibility D: operational feasibility 25. ____ components can provide automated response to sales inquiries, Web-based order processing, and online inventory tracking. A: Mission statement B: Customer relationship management (CRM) C: Feasibility study D: Total cost of ownership (TCO: 26. A feasibility study includes tests for ____ feasibility, which means that the projected benefits of the proposed system outweigh the estimated costs. A: economic B: schedule C: operational D: technical 

27. ____ is an example of a discretionary project. A: Creating a new report for a user B: Adding a report required by a new federal law C: Including annual updates to payroll and tax percentages D: All of the above 28. When setting priorities for systems requests, the highest priority goes to projects that provide the ____. A: least benefit, at the highest cost, in the longest period of time B: least benefit, at the lowest cost, in the longest period of time C: greatest benefit, at the highest cost, in the shortest period of time D: greatest benefit, at the lowest cost, in the shortest period of time 29. Projects where management has a choice in implementing them are called ____ projects. A: discretionary B: nondiscretionary C: appended D: concatenated 30. A systems analyst conducts a(n: ____ investigation to study the systems request and recommend specific action. A: preliminary B: appendix C: systems D: transitional  Chapter 3 Review

1. The project ____ handles administrative responsibilities for the development team and negotiates with users you might have conflicting requirements.

A: expediter B: supporter C: coordinator D: leader

2. PERT/CPM is considered to be a ____ technique.

A: side-to-side B: parallel task C: bottom-up D: top-down

3. Analyzing risks is a two-step process that includes both ____ analysis.

A: qualitative and quantitative B: profit and loss C: timing and critical path D: identification and response

4. Project ____ includes identifying project tasks and estimating completion time and costs.

A: planning B: scheduling

C: monitoring and controlling D: reporting

5. With PERT/CPM, the ____ is the amount of time it will take to complete a task.

A: time assignment B: time duration C: time length D: time pattern

6. A ____ walk-through is a review of a project team member's work by other members of the team.

A: status B: structured C: open D: private

7. Project ____ involves the creation of a specific timetable, usually in the form of charts that show tasks, task dependencies, and critical tasks that may delay a project.

A: planning B: scheduling C: monitoring and controlling D: reporting

8. With PERT/CPM, tasks that must be completed one after the other, like a relay race, are called ____ tasks.A: dependent B: independent C: fast D: tiered  

9. Walk-throughs that take place throughout the SDLC are also called all of the following EXCEPT ____.

A: code reviews B: design reviews C: testing reviews D: timing review

10. Project ____ requires guiding, supervising, and coordinating the project team's workload.

A: planning B: scheduling C: monitoring and controlling D: reporting

11. Task patterns can involve ____ tasks.

A: dependent

B: multiple successor C: multiple predecessor D: all of the above

12. Project managers can use ____ software to help plan, estimate, schedule, monitor, and report on a project.

A: change control B: project management C: project resource D: path management

13. Project ____ tasks include regular progress reports to management, users, and the project team itself.

A: planning B: scheduling C: monitoring and controlling D: reporting

14. When several tasks can start at the same time, each is called a ____ task.

A: concurrent B: successor C: predecessor D: dependent

15. When software is ____ it is free, and supported by a large group of users and developers.

A: free-source B: open-source C: private-source D: share-source

16. A(n) ____, or activity, is any work that has a beginning and an end and requires the use of company resources such as people, time, or money.

A: event B: task

C: habit D: plan

17. Often, two or more concurrent tasks, depend on a single prior task, which is called a ____.

A: concurrent B: successor C: predecessor D: dependent

18. The most popular project management software is ____.

A: ACT B: Microsoft Office Project 2007 C: Open Workbench D: Project Solution

19. A(n) ____, or milestone, is a recognizable reference point that can be used to monitor progress and manage the project.

A: plan B: habit C: event D: task

20. In the situation where concurrent tasks depend on a predecessor task, each concurrent task is called a ____ task.

A: dependent B: successor C: predecessor D: dependent

21. A ____ path includes all tasks that are vital to the project schedule. A: vital B: baseline C: critical D: foundational 22. A(n: ____ chart displays complex task patterns and relationships. A: Gantt B: index C: PERT/CPM D: task 23. In developing time and cost estimates, project managers must consider _____. A: project size and scope B: IT resources C: prior experience with similar projects or systems D: all of the above 24. A project manager’s scheduling function _____. A: involves guiding, supervising, and coordinating the project team’s workload B: includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target C: involves staffing, which includes selecting the project team and assigning specific tasks to team members D: includes identifying and arranging project tasks and estimating completion times and costs 25. A task is any work that requires the use of company resources including all of the following EXCEPT ____. A: controlling capital B: people C: time

 D: money 26. A risk management plan includes a review of all of the following EXCEPT ____. A: employees B: project scope C: stakeholders D: budget 27. Project scheduling involves all of the following EXCEPT ____. A: defining project constraints B: staffing the project team C: arranging for necessary resources D: assigning specific tasks to team members 28. Microsoft’s risk management model includes all of the following EXCEPT ____. A: category, which specifies the risk type B: probability, which indicates the degree of adverse effect should the risk occur, on a scale of 1 to 10 C: mitigation plan, which identifies plans to control or limit the risk D: trigger, which identifies a condition that would initiate the contingency plan 29. A project manager’s planning _____. A: involves guiding, supervising, and coordinating the project team’s workload B: includes monitoring the progress of the project, evaluating results, and taking corrective action when necessary to stay on target C: consists of staffing, which includes selecting the project team and assigning specific tasks to team members D: includes identifying project tasks and estimating completion times and costs 30. All of the following are versions of Microsoft Office Project 2007 EXCEPT ____. A: Standard B: Enterprise C: Professional D: Server 

Chapter 4 Review  

1. The sales tracking system must produce a daily fast-moving-item report, listing all products that exceed the forecasted sales volume grouped by style, color, size, and reorder status is an example of a(n) ____ requirement.

A: output B: input C: processes D: performance

2. Response time must not exceed four seconds is an example of a(n) ____ requirement.

A: control B: input C: process D: performance

3. ____ questions encourage spontaneous and unstructured responses.

A: Open-ended B: Closed-ended C: Range-of-response D: Leading

4. A ____ is a document containing a number of standard questions that can be sent to many individuals.

A: questionnaire B: survey C: both a. and b. D: neither a. nor b.

5. If you want to ensure that the sample is balanced geographically, you could use a ____ sample to select five customers from each of four zip codes.

A: random B: systematic C: stratified D: structured

6. In ____ brainstorming, each participant speaks when it is his or her turn, or passes.

A: unstructured B: structured C: random D: systematic

7. A ____, such as Microsoft Outlook or Lotus Organizer, can help manage those tasks and provide a personal calendar and a to-do list, with priorities and the capability to check off completed items.A: PDA B: DPA C: PIM D: PMI  

8. Chapter 4 describes ____, which involves fact-finding to describe the current system and identification of the requirements for the new system, such as outputs, inputs, processes, performance, and security.

A: output design B: requirements modeling C: requirements design D: output modeling

9. ____ refer to the logical rules that are applied to transform the data into meaningful information.

A: Outputs B: Inputs

C: Processes D: Performance

10. ____ analysis identifies the data flowing into a process, the business rules that transform the data, and the resulting output data flow.

A: Structured B: Data C: Enterprise D: Process

11. ____ skills are especially valuable to a systems analyst who must work with people at all organizational levels, balance conflicting needs of users, and communicate effectively.

A: Data processing B: Personal C: Analytical D: Interpersonal

12. ____ methods represent a recent trend that stresses intense interaction between system developers and users.

A: Co-op B: Object C: Flow D: Agile

13. The end product of ____ is the new information system.

A: JAD B: RAD C: both a. and b. D: neither a. nor b.

14. During the ____ phase, users interact with systems analysts and develop models and prototypes that represent all system processes, outputs, and inputs.

A: software design B: software rollout C: user design D: user rollout

15. A functional decomposition diagram (FDD: is a top-down representation of a function or process. FDDs also are called ____ charts.

A: structure B: pie C: flow D: modeling

16. A ____ diagram visually represents the interaction between users and the information system.

A: data case B: requirements case C: use case D: design case

17. A ____ requirement is a characteristic or feature that must be included in an information system to satisfy business requirements and be acceptable to users.

A: management B: system C: program D: data

18. The department head must enter overtime hours on a separate screen is an example of a(n) ____ requirement.

A: output B: input C: processes

D: performance

19. All transactions must have audit trails is an example of a(n) ____ requirement.

A: control B: input C: process D: performance

20. Your primary responsibility during an interview is to listen carefully to the answers, concentrate on what is said and notice any nonverbal communication that takes place. This process is called ____ listening.

A: closed B: tracked C: open D: engaged

21. A common tool for showing the distribution of a questionnaire or sampling results is a vertical bar chart called a(n) ____. A: flowchart B: histogram C: agile method D: Venn diagram 22. A(n) ____ is a top-down representation of a function or a process. A: UML B: TCO C: FDD D: REJ 23. All of the following are categories of system requirements EXCEPT ____.

 A: outputs B: dynamics C: performance D: controls 24. The term ____ refers to a system’s ability to handle increased business volume and transactions in the future. A: scalability B: reliability C: compatibility D: applicability25. Microsoft has developed a method for measuring a system’s total costs and benefits, called ____, which is a framework to help IT professionals analyze and optimize IT investments. A: TCO B: REJ C: FDD D: UML 26. ____ enable a systems analyst to identify a problem, evaluate the key elements, and develop a useful solution. A: Analytical skills B: Artistic skills C: Interpersonal skills D: Confrontational skills 27. ____ is a typical example of a system requirement for the output category. A: Manufacturing employees must swipe their ID cards into data collection terminals that record labor costs B: The contact management system must generate a daily reminder list for all sales reps C: The student records system must allow record access by either the student name or the student number D: The system must support 25 users simultaneously 

28. One of the main activities in the systems analysis phase is ____ modeling, which involves fact-finding to describe the current system and identification requirements for the new system.

 A: objective B: requirements C: goal-based D: user-based 29. Using a(n) ____, an analyst can show business functions and break them down into lower-level functions and processes. A: UML B: TCO C: FDD D: REJ 30. A(n) ____ diagram shows the timing of interactions between objects as they occur. A: timing B: ordering C: orientation D: sequence 

Chapter 5 Review  1. Whether to use a decision table or a decision tree often is a matter of ____.A: personal preference B: data requirements C: cycle times D: number of domains

2. A set of DFDs provides a ____ model that shows what the system does, not how it does it.

A: control B: data C: logical D: physical

3. The symbol for an entity is a ____, which may be shaded to make it look three dimensional.

A: circle B: triangle C: rectangle D: square

4. ____ maintains consistency among a set of DFDs by ensuring that input and output data flows align properly.

A: Diverging B: Balancing C: Looping D: Decomposing

5. The data ____ serves as a central storehouse of documentation for an information system.

A: dictionary B: store C: diagram D: partition

6. ____ English is a subset of standard English that describes logical processes clearly and accurately.A: Logical B: Structured C: Simple D: Dictionary  

7. A ____ model describes how the system will be constructed.

A: physical B: dictionary C: structured D: logical

8. A ____ process is a process that has input, but produces no output.

A: blue box B: black box C: gray hole

D: black hole

9. When you explode a DFD, the higher-level diagram is called the parent diagram, and the lower-level diagram is referred to as the ____ diagram.

A: subset B: child C: pet D: subordinate

10. ____ refers to whether the data element contains numeric, alphabetic, or character values.

A: Domain B: Type C: Category D: Rules

11. Iteration also is called ____.

A: looping B: sequencing C: partitioning D: decomposing

12. In DFDs, a process symbol can be referred to as a ____, because the inputs, outputs, and general functions of the process are known, but the underlying details and logic of the process are hidden.

A: blue box B: black box C: gray hole D: black hole

13. To draw a context diagram, you start by placing a single process symbol ____.

A: in the center of the page B: at the top of the page C: at the bottom of the page D: anywhere on the page

14. Data elements are combined into ____, also called data structures.

A: domains B: records C: skeletons D: iterations

15. Modular design is based on combinations of three logical structures that does NOT include ____.

A: sequence B: source C: selection D: iteration

16. The only disadvantage of the four-model approach is the added ____ needed to develop a logical and physical model of the current system.

A: time B: cost C: both a. and b. D: neither a. nor b.

17. DFDs use four basic symbols that represent all EXCEPT the following ____.

A: data flows B: data stores C: entities D: attributes

18. DFD entities also are called ____, because they are data origins or final destinations.

A: pseudocode B: terminators C: originators D: sink holes

19. ____ also is called exploding, partitioning, or decomposing.

A: Balancing B: Leveling C: Processing D: Sequencing

20. A ____ documents the details of a functional primitive, and represents a specific set of processing steps and business logic.

A: diagram description B: physical model C: data structure D: process description

 Chapter 6 Review

1. A ____ is a command that tells an object to perform a certain method.

A: note B: tag

C: action D: message

2. O-O methodology is popular because it integrates easily with object-oriented programming languages such as ____.

A: Java B: Smalltalk C: Perl D: all of the above

3. Objects within a class can be grouped into ____, which are more specific categories within a class.

A: sub-states B: mini-states C: subclasses D: mini-classes

4. The line from the actor to the use case is called a(n) ____, because it links a particular actor to a use case.

A: association B: partition C: instance D: relationship

5. Just as structured analysis uses DFDs to model data and processes, systems analysts use the ____ to describe object-oriented systems.

A: UML B: Java C: FTP D: OOD

6. The ____ shows what is included in the system (inside the rectangle) and what is not included in the system (outside the rectangle).

A: system diagram B: system boundary C: system border D: system template

7. When you identify use cases, try to group all the related transactions into ____.

A: a single use case B: several use cases C: either a. or b. D: neither a. nor b.

8. All possible states must be documented in the____ diagram.

A: state transition B: use case C: object-model D: logical-model

9. Like a DFD, a class diagram is a(n) ____ model, which evolves into a physical model and finally becomes a functioning information system.

A: static B: logical C: random D: object

10. The end product of object-oriented analysis is an object ____.

A: diagram B: model C: box D: use case

11. A ____ is identified by a dashed line and represents the time during which the object above it is able to interact with the other objects in the use case.

A: lifeline B: timeline C: interaction line D: safe line

12. If objects are similar to nouns, attributes are similar to ____.

A: adjectives B: verbs C: adverbs D: punctuation

13. A(n) ____ diagram resembles a horizontal flowchart that shows the actions and events as they occur.

A: activity B: action C: movement D: process

14. The concept that a message gives different meanings to different objects is called ____.

A: multi-use B: state versatility C: action flexibility D: polymorphism

15. All objects within a class share common ____.

A: attributes B: methods C: both a. and b. D: neither a. nor b.

16. A class can belong to a more general category called a ____.

A: pseudoclass B: superclass C: subclass D: case

17. When the outcome of one use case is incorporated by another use case, we say that the second case ____ the first case.

A: uses B: incorporates C: needs D: pairs with

18. A ____ represents the steps in a specific business function or process.

A: task flow B: task case C: use flow D: use case

19. In a class diagram, each class appears as a(n) ____, with the class name at the top, followed by the class's attributes and methods.

A: rounded rectangle B: rectangle C: oval D: circle

20. A use case diagram is a visual summary of several related use cases within a ____.

A: system B: subsystem C: either a. or b. D: neither a. nor b.

21. ____ is a widely used method of visualizing and documenting an information system. A: UML B: Java C: UNIX D: DFD 22. Objects can have a specific attribute called a(n) ____, which describes the object’s current status.

 A: state B: cycle C: instance D: status 23. A(n) ____ is a group of similar objects. A: aggregate B: concatenation C: class D: packet 24. Sequence diagrams include symbols that represent all of the following EXCEPT ____. A: classes B: indices C: lifelines D: messages 25. The number of ____ needed to describe an object depends on the business requirements of the information system and its users. A: attributes B: packets C: indices D: keys 26. When you create a use case diagram, the first step is to identify the system boundary, which is represented by a ____. A: triangle B: circle C: rectangle D: square 27. Inheritance enables an object to derive one or more of its attributes from a(n) ____. A: user B: precedent C: antecedent D: parent 28. ____ enables an object to derive one or more of its attributes from another object. A: Concatenation B: Encapsulation C: Inheritance D: Polymorphism 29. An object has certain ____, which are characteristics that describe the object. A: keys B: attributes C: indices D: packets                Chapter 7 Review

1. Another term for IBS is ____, because system operations are managed by the outside firm, or host.

A: managed hosting B: direct hosting

C: outside hosting D: enterprise hosting

2. The choice between developing versus purchasing software often is called a ____ decision.

A: make or buy B: build or buy C: either a. or b. D: neither a. nor b.

3. A software package that can be used by many different types of organizations is called a(n) ____ application.

A: vertical B: horizontal C: limited D: unlimited

4. ____ was NOT listed as a reason that companies would develop software in-house versus buying it from an outside source.

A: Meet constraints of existing systems B: Develop internal resources and capabilities C: Lower costs D: Satisfy unique business requirements

5. Some user applications have powerful screen and report ____ that allow users to design their own data entry forms and reports.

A: generators B: creators C: templates D: files

6. The ____ of a project is the total value of the benefits minus the total value of the costs, with both costs and benefits adjusted to reflect the point in time at which they occur.

A: ROI B: NPV C: EPS D: IRR

7. When you use an ____, you already know the specific product or service you want and you need to obtain price quotations or bids.

A: RFP B: RFQ C: NPV D: TCO

8. The goal of systems design is to build a system that is ____.

A: effective B: reliable C: maintainable D: all of the above

9. ____ is a model of software deployment where an application is hosted as a service provided to customers over the Internet.

A: SAS B: SaaS C: SSA D: SSaa

10. Web-based software usually requires additional layers, called ____, to communicate with existing software and legacy systems.

A: hubs B: portals C: channels D: middleware

11. The outsourcing of a basic business process is often called ____.

A: BPO B: BOP C: ISB D: IBS

12. A ____ model has a variable fee based on the number of users or workstations that have access to the application.

A: managed B: subscription C: service D: cloud computing

13. The ____ makes, builds, and develops in-house software.

A: company's IT department B: company's ASP C: company's IBS D: all of the above

14. An accounting package is a good example of a(n) ____ application because it can be utilized by many different businesses, or separate divisions that exist in large, diversified companies.

A: vertical B: horizontal C: limited D: unlimited

15. The following is NOT one of the three ways the chapter listed as a way to customize a software package: ____.

A: You can merge two existing packages into one solution B: You can purchase a basic package that vendors will customize to suit your needs. C: You can purchase the package and make your own modifications, if this is permissible under

the terms of the software license. D: You can negotiate directly with the software vendor to make enhancements to meet your needs

by paying for the changes.

16. Read-only properties means that users can ____.

A: view the data B: change the data C: either a. or b. D: neither a. nor b.

17. The Systems Analyst's Toolkit explains how to use three main cost analysis tools that do NOT include ____.

A: payback analysis B: ROI C: NPV D: EPS

18. Another valuable resource is the Internet bulletin board system that contains thousands of forums, called ____, that cover every imaginable topic.

A: gatherings B: newsgroups C: social groups D: feeds

19. The two major Web-based development environments are IBM's WebSphere and Microsoft's ____.

A: .NET B: JavaScript C: Office D: Access

20. ____ development treats the Web as the platform, rather than just a communication channel.A: Internet-based

B: Traditional C: both a. and b. D: neither a. nor b.

21. Although the traditional model of software acquisition still accounts for more software acquisition, a new model called ____ is changing the picture dramatically. A: Hardware as a Help B: Software as a Service

 C: Processing as a Product D: Storage as a Solution 22. A ____ measures the time a package takes to process a certain number of transactions. A: newsgroup B: parameter C: benchmark D: default 23. A user ____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity. A: application B: configuration C: interface D: interpolation 24. ____, like that illustrated in the accompanying figure, produces an early, rapidly constructed working version of a proposed system.

 

  A: Prototyping B: Outsourcing C: Coding D: Benchmarking 25. IBM’s ____ is one of the major Web-based development environments. A: WebSphere B: .NET C: NetSphere D: .WEB 26. A(n: ____ model is an outsourcing fee model that charges a variable fee based on the volume of transactions or operations performed by the application. A: method B: administrative C: transaction D: interpolated 27. In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment. A: 2GL B: 3GL C: 4GL D: 5GL 28. In addition to configuring software, an IT staff can create a user ____, which includes screens, commands, controls, and features that enable users to interact more effectively with the application. A: montage B: index C: interface D: package

 29. Guidelines to follow when determining data entry and storage considerations include all of the following except ____. A: data should be entered into the system where and when it occurs B: data should be verified when it is entered C: data duplication should be encouraged D: data should be entered into a system only once 30. Reports that trace the entry of and changes to critical data values are called ____ and are essential in every system. A: audit trails B: protective pathways C: backtracks D: value tracks 

Chapter 8 Review

1. A ____ check tests data items to verify that they fall between a specified minimum and maximum value. A: process-control B: toggle button C: data validation D: range 2. Web-based logs, called ____, are journals written from a particular point of view. A: wogs B: jogs C: blogs D: logs 3. ____ interaction describes the relationship between computers and people who use them to perform business-related tasks. A: Human-computer B: Person-computer C: Human-PC D: Person-PC 4. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered. A: output reporting B: output listing C: output control D: output checking 5. ____ includes the necessary measures to ensure that input data is correct, complete, and secure. A: Output control B: Input control C: either a. or b. D: neither a. nor b. 6. When designing a report, you should prepare a sample report, which is called a ____, for users to review.

 A: mock-up B: prototype C: either a. or b. D: neither a. nor b. 7. An option button, or ____ button, represents one choice in a set of options. A: television B: DVD player C: stereo D: radio 8. A ____ report produces one or more lines of output for each record processed. A: summary B: highlights C: control D: detail 9. A ____ check identifies values that are questionable, but not necessarily wrong. A: reasonableness B: process-control C: data validation D: range 10. A ____ is a specially formatted digital audio file that can be downloaded by Internet users from a variety of content providers. A: songcast B: podcast C: listencast D: voicecast 11. A ____ interface uses icons, graphical objects, and pointing devices. A: green screen B: Web 1.0 C: human-computer D: graphical user 12. Output ____ protects privacy rights and shields the organization's proprietary data from theft or unauthorized access. A: reporting B: prototyping C: security D: safety 13. Once data is entered, the company should store source documents in a safe location for some specified length of time according to their ____ policy. A: records retention B: records safety C: records filing D: records scanning

14. After a report design is approved, you should document the design by creating a report ____ form, which contains information about the fields, data types and lengths, and report frequency. A: system B: analysis C: design D: prototype

 15. The main part of the form, called the ____ zone, usually takes up at least half of the space on the form and contains captions and areas for entering variable data. A: body B: heading C: footer D: authorization 16. Each line of output printed is called a ____ line. A: detail B: information C: data D: control 17. A ____ check is used for data items that must have certain values. A: process-control B: reasonableness C: validity D: range 18. An automated facsimile or ____ system allows a customer to request a fax using e-mail, via the company Web site, or by telephone. A: fax fast B: fax mail C: fax now D: faxback 19. A ____ check improves input quality by testing the data and rejecting any entry that fails to meet specified conditions. A: data resources B: data dependency C: data validation D: data quality 20. A ____ workstation is a network terminal that supports a full-featured user interface, but limits the printing or copying of data, except to certain network resources that can be monitored and controlled. A: disk B: diskless C: either a. or b. D: neither a. nor b. 21. Sensitive data can be coded, in a process called ____, so only users with decoding software can read it.A: filtering B: context safety C: spam D: encryption

22. A popular security solution is the use of a network based application, often called a ____, that controls access to and from workstation interfaces.A: port cop B: port protector C: workstation cop D: workstation protector 

23. A ____ report displays only those records that meet a specific condition or conditions.A: exception B: error C: end D: estimation 24. Good form ____ makes the form easy to complete and provides enough space, both vertically and horizontally, for users to enter the data.A: layout B: processing C: data entry D: output 25. ____ is often used by large firms to scan and store images of original documents to provide high-quality records management and archiving.A: COF B: COL C: COS D: COM 26. Using ____ input, data entry usually is performed on a specified time schedule, such as daily, weekly, monthly, or longer.A: batch B: intermittent C: sequence D: combination  27. Every page should include a page ____, which appears at the top of the page and includes the column headings that identify the data.A: footer B: header C: control D: signature 28. The ____ zone usually contains the company name or logo and the title and number of the form.A: control B: heading C: footer D: body  29. Although the vast majority of reports are designed graphically, some systems still produce one or more character-based reports that use a character set with ____ spacing.A: fixed B: variable C: either a. or b. D: neither a. nor b.  30. When the value of a control field changes, a control ____ occurs. A: break B: miss C: mistake D: error  31. A ____ check is performed on two or more fields to ensure that they are consistent or reasonable when considered together.

A: dual B: two-time C: combination D: readiness  32. ____ design focuses on user needs for screen and printed forms of output.A: Output B: User interface C: both a. and b. D: neither a. nor b.  33. A ____ describes how users interact with a computer system, and consists of all the hardware, software, screens, menus, functions, output, and features that affect two-way communications between the user and the computer.A: user scope map B: user interface C: user path D: user process 34. A ____ document is a form used to request and collect input data, trigger or authorize an input action, and provide a record of the original transaction.A: reportB: sequenceC: sourceD: output 35. In addition to built-in design tools, popular software packages such as ____ Reports offer powerful features that help designers deal with professional-level design issues across the enterprise.A: CrystalB: DiamondC: GoldD: Platinum 36. The ____ zone contains codes, identification information, numbers, and dates that are used for storing completed forms.A: footerB: controlC: bodyD: heading 37. Database programs such as Microsoft Access include a variety of report design tools, including a ____, which is a menu-driven feature that designers can use to create reports quickly and easily.A: Data WizardB: Data GeneratorC: Report WizardD: Report Generator 38. A ____ box can display messages or provide a place for a user to enter data.A: optionB: textC: graphicsD: storyboard 39. In a user-centered system, the distinction blurs between ____ and the interface itself.

A: inputB: outputC: both a. and b.D: neither a. nor b. 40. A sales manager might want to know total sales for each sales representative, but not want a detail report listing every sale made by them. In that case, a ____ report is appropriate.A: summaryB: highlightsC: errorD: regression analysis

41. A control break usually causes specific actions, such as printing subtotals for a group of records. That type of detail report is called a ____ report.A: control outputB: control seriesC: control breakD: control error 42. Companies use various ____ methods to maintain output integrity and security. For example, every report should include an appropriate title, report number or code, printing date, and time period covered.A: output reportingB: output listingC: output controlD: output checking 43. Data ____ is the process of manually entering data into the information system, usually in the form of keystrokes or mouse clicks.A: entryB: checkingC: layoutD: switching 44. Batch ____ are totals used to verify batch input.A: controlsB: zonesC: buttonsD: tags 45. Data ____ policies and procedures protect data from loss or damage, which is a vital goal in every organization.A: controlB: processC: securityD: integrity 46. Good interface design is based partly on ____, which provides the operational structure required to carry out the design objectives.

A: aestheticsB: interface technologyC: ergonomicsD: output security 

47. When designing data entry screens, provide an on-screen instruction to let users know the date format, and provide an example if the user must enter ____.A: verifiersB: clonesC: separatorsD: masks 48. A key physical design element is the ____, which describes how users interact with a computer system.A: HCIB: PCIC: UID: PI 49. In a well-designed detail report, a field called a(n) ____ field controls the output.A: breakB: indexedC: dominantD: control 51. In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the system.A: physicalB: processC: inputD: command 52. In a source document, if totals are included on a form, they appear in the ____ zone.A: calculatedB: controlC: totalsD: heading 53. Initial screen designs can be presented to users in the form of a(n) ____, which is a sketch that shows the general screen layout and design.A: storyboardB: turnaround documentC: faxbackD: output control 54. A combination check is a data validation check that ____.A: tests data items to verify that they fall between a specified minimum and maximum valueB: identifies values that are questionable, but not necessarily wrongC: is performed on two or more fields to ensure that they are consistent or reasonable when considered togetherD: is used for mandatory data items 55. In a data entry screen, a(n) ____ is a control feature that is used to represent on or off status and switches to the other status when clicked.A: command buttonB: option buttonC: toggle buttonD: radio button   Chapter 9 Review 

1.  A ____ is a set of one or more fields that can occur any number of times in a single record, with each occurrence having different values.A: loopB: repeating groupC: variety groupD: combination field 2.  ____, which record details of all accesses and changes to the file or database, can be used to recover changes made since the last backup.A: Primary table filesB: Audit log filesC: Backup encryption filesD: Data warehouse records 3.  A ____ file is created for archiving purposes.A: workB: tableC: securityD: history 4.  During the system design phase, you use ____ to organize, access, and maintain data structures.A: key filesB: key recordsC: key fieldsD: key tables 5.  ____ describes the numeric relationship between two entities and shows how instances of one entity relate to instances of another entity.A: CardinalityB: ERDC: The primary keyD: Normalization 6.  ____ codes distinguish items by using a series of subgroups of digits.A: Significant digitB: ActionC: DerivationD: Cipher 7. A(n) ____ date is the total number of days from some specific base date.A: arithmeticB: controlC: absoluteD: variable 8. Data ____ problems can occur if updates are not applied in every file.A: structureB: securityC: integrityD: redundancy 9.  Because intranets and extranets use the same protocols as the Internet, they are called ____.A: protocol-centricB: client/server focusedC: middleware focused

D: Web-centric                10. A(n) ____ relationship exists when exactly one of the second entity occurs for each instance of the first entity.A: one-to-oneB: one-to-manyC: many-to-manyD: none of the above11. Some abbreviation codes are called ____ codes because they use a specific combination of letters that are easy to remember.A: mnemonicB: harmonicC: rhymingD: alphabetic

12. EBCDIC and ASCII require eight bits, or ____ byte(s), for each character.A: oneB: twoC: threeD: four 13. A ____ language controls database operations, including storing, retrieving, updating, and deleting data.A: data manipulationB: data queryC: data informationD: data communication 14. A ____ key is a field in one table that must match a primary key value in another table in order to establish the relationship between the two tables.A: primaryB: secondaryC: foreignD: referential 15. A table is ____ if it does not contain a repeating group.A: first normal formB: second normal formC: concatenatedD: considered invalid 16. Data ____ software looks for meaningful patterns and relationships among data.A: processB: validationC: martD: mining 17. ____ fields are special fields within data records to provide additional control or security information.A: PrimaryB: AuditC: CheckD: Limit                18. The inherent efficiency of high-volume processing on larger computers is called ____.A: flexible data sharing

B: data independenceC: controlled redundancyD: economy of scale 19. A record, also called a ____, is a set of related fields that describes one instance of an entity.A: tupleB: coupleC: tableD: label 20. A DBMS is usually managed by a person called a ____.A: database administrator B: file administrator C: system administrator D: security administrator 21. Any field that could serve as a primary key is called a ____ key.A: candidate B: summary C: potential D: primary

22. A ____ specifies the fields and identifies the primary key in a particular table or file.A: output design B: market basket design C: table design D: diagram design23. A ____ is an integrated collection of data that can include seemingly unrelated information, no matter where it is stored in the company.A: data warehouse B: data storehouse C: database D: database set 24. In the event of a file catastrophe, ____ procedures can be used to restore the file or database to its current state at the time of the last backup.A: recovery B: reinstatement C: back-up D: security 25. A ____ file stores records that contain day-to-day business and operational data.A: master B: table C: transaction D: work 26. A(n) ____ is a person, place, thing, or event for which data is collected and maintained.A: table B: entity C: field D: record 27. A ____ relationship exists when one instance of the first entity can relate to many instances of the second entity, and one instance of the second entity can relate to many instances of the first entity.

A: one-to-one B: one-to-many C: many-to-many D: none of the above 28. ____ codes combine data from different item attributes, or characteristics, to build the code.A: Significant digit B: Action C: Derivation D: Cipher 29. A ____ format uses only 16 bits to represent the number 12,345 in binary form.A: integer B: binary storage C: long integer D: character-based 30. A ____ consists of linked tables that form one overall data structure.A: database structure B: database system C: open structure D: open system 31. A ____ is a text document written in HTML.A: Web browser B: Web page C: Web site D: Web server 32. Without referential integrity, you might have a sales order called a(n) ____, because it has no related customer.A: orphan B: loop C: gap D: error 33. A ____ is a set of numbers or letters that represent a data item.A: key B: state C: code D: unit 34. ____ storage refers to data that a user can view, understand, and access, regardless of how or where that information actually is organized or stored.A: Logical B: Physical C: either a. or b. D: neither a. nor b. 35. A ____ is a view of the database used by one or more systems or users.A: schema B: subschema C: class D: subclass 

36. A nonkey field is any field that is NOT a ____.A: primary key B: candidate key C: both a. and b. D: neither a. nor b. 37. Field X is ____ on field Y if the value of field X depends on the value of field Y.A: functionally independent B: functionally dependent C: either a. or b. D: neither a. nor b. 38. Different privileges, also called ____, can be associated with different users of a computer system.A: passwords B: user IDs C: filters D: permissions 39. A(n) ____ is a graphical model of an information system that depicts the relationships among system entities.A: SQLB: OCEC: ODBCD: ERD 40. With a(n) ____ language, the user provides an example of the data requested.A: SQLB: IDEC: QBED: interpolated 41. One common method of indicating ____ is called crow's foot notation because of the shapes, which include circles, bars, and symbols that indicate various possibilities.A: scalabilityB: compatibilityC: cardinalityD: functionality 42. When a system reads a physical record, it loads the data from storage into a ____, which is a segment of computer memory.A: clientB: tableC: passwordD: buffer 

Chapter 10

1. A form of wireless transmission called ____ is very popular for short-distance wireless communication that does not require high poweA: BluetoothB: USBC: RFIDD: Mbps

 2.     In the ____ section in a typical system design specification, startup processing, initial data entry or acquisition, user training requirements, and software test plans are specified.A: System EnvironmentB: Executive SummaryC: System ComponentsD: Implementation Requirement 

3.     The ____ technology is compatible with earlier 802.11 versionsA: BSSB: ESSC: ISSD: MIMO 4.     A ____, such as that illustrated in the accompanying figure, has a central networking device that manages the networkA: hierarchical networkB: star networkC: bus networkD: ring network

 5.     In the OSI (open system interconnection: model, the application layer ____.A: defines specific methods of transmitting data over the physical layerB: provides network services requested by a local workstationC: defines control structures that manage the communications link between computersD: contains physical components that carry data

 6. The maximum speed for wireless network standards is measured in ____.A: BpsB: GbpsC: Mbps D: Tbps 7.    To increase bandwidth, the IEEE created two ____ to its initial standard to offer considerable improvement in transmission speed. A: amendmentsB: optionsC: LANs

D: versions 8.     The ____ section in a typical system design specification describes the constraints, or conditions, affecting a system, including any requirements that involve operations, hardware, systems software, or security.A: Time and Cost EstimatesB: System EnvironmentC: Executive SummaryD: System Components 9.     During business hours, a salesperson can enter a sale on a ____ terminal, which is part of an information system that handles daily sales transactions and maintains the online inventory file.A: POSB: batchC: topologicalD: portal 10.   All of the following use access points except ____.A: BSSB: ESSC: ISSD: none of the above 11. When using the ____ configuration, a central wireless device called an access point is used to serve all wireless clientsA: Basic Service Set B: Extended Service Set C: Independent Service Set D: Dependent Service Set  12. An  ____ Service Set is made up of two or more Basic Service Set networks. A: Distributed B: Extended C: Dependent D: Independent 13. In addition to Wi-Fi, another form of wireless transmission called ____ is very popular for short-distance wireless communication that does not require high power.A: Bluetooth B: Redtooth C: Blueconnect D: Redconnect 14. ____ translates the logical design of an information system into a physical structure that includes hardware, software, network support, processing methods, and security.A: Network architecture B: System architecture C: Open architecture D: Data architecture 15. A specific hardware and software environment is also called a ____.A: platform B: master

C: setting D: foundation 16. Scalability is also called ____.A: extensibility B: switchability C: sharing D: n-tier  17. IBM uses the term ____ to describe Internet-based solutions that allow sellers and buyers to automate procurement processes and achieve substantial benefits.A: e-marketplaces B: e-resources C: e-salesforce D: e-networking   18. A ____ is a computer that supplies data, processing services, or other support to one or more computers.A: server B: client C: either a. or b. D: neither a. nor b.  19. In addition to centralized data processing, early systems performed all data input and output at a central location, often called a data processing ____.A: marketplace B: portal C: center D: hub  20. As technology became available, companies resolved the problems of stand-alone computing by joining clients into a ____ that allows sharing of data and hardware resources.A: cloud network B: peer-to-peer network C: Web-centric network D: local area network  21. In a ____ design, also called a file sharing architecture, an individual LAN client has a copy of the application program installed locally, while the data is stored on a central file server.A: file server B: data server C: independent server D: peer-to-peer server  22. The ____ stores the data and provides data access and database management functions.A: client B: server C: either a. or b. D: neither a. nor b.  

23. A ____ client design locates all or most of the processing logic at the server.A: fat B: thin C: tall D: short  24. You can think of the middle layer in an n-tier design as a(n) ____, because it provides the application logic, or business logic, required by the system.A: functional server B: application server C: data server D: file server  25. Just as processing can be done at various places in a client/server design, data can be stored in more than one location using a distributed ____.A: database centric B: database access C: database gateway D: database management  26. In the past, a device known as a ____ was used to connect star networks, but a switch offers advanced technology and much better performance.A: portal B: peer network C: gateway D: hub  27. A ____ local area network is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk or location.A: cordless B: metropolitan C: peer-based D: wireless  28. The Basic Service Set (BSS) in also called the ____ mode.A: dependent B: independent C: structured D: infrastructure  Chapter 11 Review 1. In a structure chart, a____ line, which has a diamond on one end, indicates that a control module determines which subordinate modules will be invokeD:A: methodB: conditionC: classD: attribute 2. During ____ testing, programmers must test programs that interact with other programs and files individually, before they are integrated into the system.

A: unitB: integratedC: linkD: outcome 

3. Many organizations require a more formal type of desk checking called a(n) ____ review.A: designB: integratedC: codeD: interpolated 4. The objective of ____ testing is to identify and eliminate execution errors that could cause a program to terminate abnormally, and logic errors that could have been missed during desk checking.A: unitB: integrationC: userD: system 5. ____ is the process of reviewing the program code to spot logic errors, which produce incorrect results.A: Logic review B: Code reviewC: Results walkthroughD: Desk checking 6. ____ describes the relationships and interdependence among modules.A: ResolutionB: ModularityC: CouplingD: Dynamism  7. In ____ programming, two programmers work on the same task on the same computer.A: parallelB: duoC: doubleD: driver 8. To achieve better, faster, and less expensive methods of software development, ____ designed a Capability Maturity Model (CMM)®, which improves quality, reduces development time, and cuts costs.A: ISO (International Organization for Standardization)B: SEI (Software Engineering Institute)C: ODBC (Open Database Connectivity)D: CAIT (Center for the Application of Information Technologies) 9. The ____ changeover method allows the new system to be implemented in stages, or modules.A: phased operationB: parallel operationC: pilot operationD: direct cutover 10. A class diagram includes the class ____, which represent the program logiC:A: attributesB: eventsC: methodsD: characters

11. O-O analysis makes it easier to translate an object model directly into an object-oriented programming language. This process is called object-oriented ____.A: changeover B: development C: tracking D: cycling 12. ____ measures a module's scope and processing characteristics.A: Stimulation B: Cohesion C: Code review D: Integration  13. A ____ evaluation assesses the overall quality of the information system.A: pre-implementation B: post-implementation C: pilot-implementation D: testing-implementation  14. A control couple shows a message, also called a ____ flag, which one module sends to another.A: cycle B: data C: status D: cutover  15. The ____ cutover approach causes the changeover from the old system to the new system to occur immediately when the new system becomes operational.A: direct B: parallel C: pilot D: phased  16. Typically, a higher-level module, called a ____ module, directs lower-level modules.A: control B: terminal C: iteration D: method  17. The environment for the actual system operation is called the ____ environment.A: operational B: production C: either a. or b.D: neither a.  nor v. 18. ____ can be used to model business logic for an information system. A: Decision tables B: Decision trees C: either a. or b.D: neither a.  nor b. 19. Defect tracking software documents and tracks replacement code, called ____.A: stubs B: units

C: flags D: patches 20. A module consists of related program code organized into ____ units that are easy to understand and maintain.A: small B: large C: either a.  or b.D: neither a.  nor b. 21. Testing two or more programs that depend on each other is called integration testing, or ____ testing.A: stub B: desk C: loop D: link  22. More recently, the Software Engineering Institute established a new model, called Capability Maturity Model ____, that integrates software and systems development into a much larger framework called process improvement.A: International B: Cohesion C: Process D: Integration  23. Objects contain both data and program logic, called ____.A: methods B: conditions C: attributes D: tests  24. During systems implementation, the ____ serves as a blueprint for constructing the new system.A: system design specification B: RFQ C: RFP D: system structure chart  25. A condition line indicates that a control module determines which ____ modules will be invoked, depending on a specific condition.A: parent B: peer C: subordinate D: pilot  26. The ____ operation changeover method requires that both the old and the new information systems operate fully for a specified perioD:A: direct B: parallel C: pilot D: phased  27. A successful information system requires ____ for users, managers, and IT staff members so people understand the system and know how to use it effectively.

A: tracking B: flowcharting C: code reviews D: training  28. Structured application development usually involves a ____ approach, which proceeds from a general design to a detailed structure.A: bottom-up B: top-down C: parallel process D: parent-child  29. Compiling the program using a CASE tool or a language compiler detects syntax errors, which are ____ errors.A: cycleB: math dataC: testingD: language grammar  30. The main objective of ____ is to avoid problems or to detect them as soon as possible.A: systems implementationB: quality assuranceC: status flagsD: partitioning Chapter 12 Review 1.     A____ is an unauthorized attempt to increase permission levels.A: privilege escalation attackB: denial-of-service attackC: Trojan horseD: identity management invasion 2.     ____ also can be used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem.A: BandwidthB: Turnaround timeC: ThroughputD: Response time 3.     Risk ____ develops safeguards that reduce risks and their impact.A: assessmentB: managementC: identificationD: control 4.     The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requirements and design constraints.A: functional baselineB: operational baselineC: allocated baselineD: product baseline 5.     ____ shifts the risk to another asset or party, such as an insurance company, in risk control.

A: AcceptanceB: AvoidanceC: MitigationD: Transference 6.     The release methodology offers all of the following advantages except ____.A: all changes are tested together before a new system version is releasedB: costs are reduced because only one set of system tests is neededC: documentation changes are coordinated and become effective simultaneouslyD: new features or upgrades are available more often 7.     ____ prevents unauthorized users from creating, modifying, or deleting information.A: AvailabilityB: IntegrityC: ConfidentialityD: Risk management 8.    Depending on the system, bandwidth might be measured in any of the following except ____.A: Kbps (kilobits per second.B: Mbps (megabits per second.C: Dbps (decibits per second.D: Gbps (gigabits per second. 9.   In a typical system, the initial version of the system is 1.0, and the release that includes the first set of maintenance changes is version ____.A: 1.0B: 1.1C: 2.0D: 2.1 10.____ means that nothing is done, in risk control.A: AcceptanceB: AvoidanceC: MitigationD: Transference 11. The ____ triangle has three main elements of system security: confidentiality, integrity, and availability.A: CPAB: CIAC: CSID: CIS 12. ____ includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.A: Error analysisB: Fault analysisC: Error managementD: Fault management            13. When a____ methodology is used, all noncritical changes are held until they can be implemented at the same time.A: in-house developmentB: version controlC: maintenance release

D: bug fix14. The maintenance team includes a system administrator and one or more ____.A: systems analystsB: programmersC: both a. and b.D: neither a. nor b.            15.  ____ include items such as supplies, equipment rental, and software leases.A: Maintenance costsB: Operational costsC: Connection costsD: User costs            16. ____ refers to copying data in prescribed intervals, or continuously.A: SecurityB: ClassifyingC: BackupD: Recovery            17.        ____ measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency.A: BandwidthB: ThroughputC: Response timeD: Answer time            18. A ____ is a formal reference point that measures system characteristics at a specific time.A: baselineB: foundationC: bottom lineD: core            19. A____ programmer concentrates on operating system software and utilities.A: systemsB: securityC: applicationsD: database            20.        ____ maintenance reduces the possibility of future system failure.A: CorrectiveB: AdaptiveC: PerfectiveD: Preventive            21. If significant changes take place in the existing system, the IT department might develop a ____ that could include online support, a special Web site, and formal training sessions.A: user training packageB: management training packageC: buyer training packageD: seller training package            22. ____ protects information from unauthorized disclosure and safeguards privacy.A: ConfidentialityB: AvailabilityC: IntegrityD: Flexibility

            23. To measure system performance, many firms use ____ testing, which uses a set of standard tests to evaluate system performance and capacity.A: foundationB: benchmarkC: comparisonD: baseline            24. In a typical system, the initial release version of the system is ____.A: 0.0B: 0.1C: 1.0D: 10.0            25. A ____ manages computer and network systems.A: system supervisorB: system administratorC: system analystD: system programmer 26. ____ activities include changing programs, procedures, or documentation to ensure correct system performance.A: MaintenanceB: OperationalC: ConnectionD: Analyst            27. A ____ network is a dedicated connection, similar to a leased telephone line.A: privateB: publicC: virtualD: protected 28. Bandwidth requirements are made in ____.A: bits per millisecondB: bits per secondC: packets per millisecondD: packets per second 29. The ____ baseline documents the system at the end of the design phase.A: functionalB: allocatedC: productD: formal 30. A(n) ____ programmer focuses on creating and supporting large-scale database systems.A: systemsB: securityC: applicationsD: database